blob: dc93a9d7fafd91255514625ab7edb72baca84844 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
18Given a target-files zipfile, produces an OTA package that installs
19that build. An incremental OTA is produced if -i is given, otherwise
20a full OTA is produced.
21
22Usage: ota_from_target_files [flags] input_target_files output_ota_package
23
Doug Zongker25568482014-03-03 10:21:27 -080024 --board_config <file>
Doug Zongkerfdd8e692009-08-03 17:27:48 -070025 Deprecated.
Doug Zongkereef39442009-04-02 12:14:19 -070026
Doug Zongkerafb32ea2011-09-22 10:28:04 -070027 -k (--package_key) <key> Key to use to sign the package (default is
28 the value of default_system_dev_certificate from the input
29 target-files's META/misc_info.txt, or
30 "build/target/product/security/testkey" if that value is not
31 specified).
32
33 For incremental OTAs, the default value is based on the source
34 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070035
36 -i (--incremental_from) <file>
37 Generate an incremental OTA using the given target-files zip as
38 the starting build.
39
Tao Bao43078aa2015-04-21 14:32:35 -070040 --full_radio
41 When generating an incremental OTA, always include a full copy of
42 radio image. This option is only meaningful when -i is specified,
43 because a full radio is always included in a full OTA if applicable.
44
leozwangaa6c1a12015-08-14 10:57:58 -070045 --full_bootloader
46 Similar to --full_radio. When generating an incremental OTA, always
47 include a full copy of bootloader image.
48
Michael Runge63f01de2014-10-28 19:24:19 -070049 -v (--verify)
50 Remount and verify the checksums of the files written to the
51 system and vendor (if used) partitions. Incremental builds only.
52
Michael Runge6e836112014-04-15 17:40:21 -070053 -o (--oem_settings) <file>
54 Use the file to specify the expected OEM-specific properties
55 on the OEM partition of the intended device.
56
Tao Bao8608cde2016-02-25 19:49:55 -080057 --oem_no_mount
58 For devices with OEM-specific properties but without an OEM partition,
59 do not mount the OEM partition in the updater-script. This should be
60 very rarely used, since it's expected to have a dedicated OEM partition
61 for OEM-specific properties. Only meaningful when -o is specified.
62
Doug Zongkerdbfaae52009-04-21 17:12:54 -070063 -w (--wipe_user_data)
64 Generate an OTA package that will wipe the user data partition
65 when installed.
66
Tao Bao5d182562016-02-23 11:38:39 -080067 --downgrade
68 Intentionally generate an incremental OTA that updates from a newer
69 build to an older one (based on timestamp comparison). "post-timestamp"
70 will be replaced by "ota-downgrade=yes" in the metadata file. A data
71 wipe will always be enforced, so "ota-wipe=yes" will also be included in
Tao Bao4996cf02016-03-08 17:53:39 -080072 the metadata file. The update-binary in the source build will be used in
73 the OTA package, unless --binary flag is specified.
Tao Bao5d182562016-02-23 11:38:39 -080074
Doug Zongker1c390a22009-05-14 19:06:36 -070075 -e (--extra_script) <file>
76 Insert the contents of file at the end of the update script.
77
Hristo Bojinovdafb0422010-08-26 14:35:16 -070078 -a (--aslr_mode) <on|off>
79 Specify whether to turn on ASLR for the package (on by default).
Stephen Smalley56882bf2012-02-09 13:36:21 -050080
Doug Zongker9b23f2c2013-11-25 14:44:12 -080081 -2 (--two_step)
82 Generate a 'two-step' OTA package, where recovery is updated
83 first, so that any changes made to the system partition are done
84 using the new recovery (new kernel, etc.).
85
Doug Zongker26e66192014-02-20 13:22:07 -080086 --block
87 Generate a block-based OTA if possible. Will fall back to a
88 file-based OTA if the target_files is older and doesn't support
89 block-based OTAs.
90
Doug Zongker25568482014-03-03 10:21:27 -080091 -b (--binary) <file>
92 Use the given binary as the update-binary in the output package,
93 instead of the binary in the build's target_files. Use for
94 development only.
95
Martin Blumenstingl374e1142014-05-31 20:42:55 +020096 -t (--worker_threads) <int>
97 Specifies the number of worker-threads that will be used when
98 generating patches for incremental updates (defaults to 3).
99
Tao Bao8dcf7382015-05-21 14:09:49 -0700100 --stash_threshold <float>
101 Specifies the threshold that will be used to compute the maximum
102 allowed stash size (defaults to 0.8).
Tao Bao9bc6bb22015-11-09 16:58:28 -0800103
104 --gen_verify
105 Generate an OTA package that verifies the partitions.
Tao Baod62c6032015-11-30 09:40:20 -0800106
107 --log_diff <file>
108 Generate a log file that shows the differences in the source and target
109 builds for an incremental package. This option is only meaningful when
110 -i is specified.
Tao Baodea0f8b2016-06-20 17:55:06 -0700111
112 --payload_signer <signer>
113 Specify the signer when signing the payload and metadata for A/B OTAs.
114 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
115 with the package private key. If the private key cannot be accessed
116 directly, a payload signer that knows how to do that should be specified.
117 The signer will be supplied with "-inkey <path_to_key>",
118 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700119
120 --payload_signer_args <args>
121 Specify the arguments needed for payload signer.
Doug Zongkereef39442009-04-02 12:14:19 -0700122"""
123
124import sys
125
Doug Zongkercf6d5a92014-02-18 10:57:07 -0800126if sys.hexversion < 0x02070000:
127 print >> sys.stderr, "Python 2.7 or newer is required."
Doug Zongkereef39442009-04-02 12:14:19 -0700128 sys.exit(1)
129
Doug Zongkerfc44a512014-08-26 13:10:25 -0700130import multiprocessing
Doug Zongkereef39442009-04-02 12:14:19 -0700131import os
Tao Baoc098e9e2016-01-07 13:03:56 -0800132import subprocess
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700133import shlex
Doug Zongkereef39442009-04-02 12:14:19 -0700134import tempfile
Doug Zongkereef39442009-04-02 12:14:19 -0700135import zipfile
136
137import common
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700138import edify_generator
Doug Zongkerfc44a512014-08-26 13:10:25 -0700139import sparse_img
Doug Zongkereef39442009-04-02 12:14:19 -0700140
141OPTIONS = common.OPTIONS
Doug Zongkerafb32ea2011-09-22 10:28:04 -0700142OPTIONS.package_key = None
Doug Zongkereef39442009-04-02 12:14:19 -0700143OPTIONS.incremental_source = None
Michael Runge63f01de2014-10-28 19:24:19 -0700144OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700145OPTIONS.require_verbatim = set()
146OPTIONS.prohibit_verbatim = set(("system/build.prop",))
147OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700148OPTIONS.wipe_user_data = False
Tao Bao5d182562016-02-23 11:38:39 -0800149OPTIONS.downgrade = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700150OPTIONS.extra_script = None
Hristo Bojinovdafb0422010-08-26 14:35:16 -0700151OPTIONS.aslr_mode = True
Doug Zongkerfc44a512014-08-26 13:10:25 -0700152OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
153if OPTIONS.worker_threads == 0:
154 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800155OPTIONS.two_step = False
Takeshi Kanemotoe153b342013-11-14 17:20:50 +0900156OPTIONS.no_signing = False
Doug Zongker26e66192014-02-20 13:22:07 -0800157OPTIONS.block_based = False
Doug Zongker25568482014-03-03 10:21:27 -0800158OPTIONS.updater_binary = None
Michael Runge6e836112014-04-15 17:40:21 -0700159OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800160OPTIONS.oem_no_mount = False
Doug Zongker62d4f182014-08-04 16:06:43 -0700161OPTIONS.fallback_to_full = True
Tao Bao43078aa2015-04-21 14:32:35 -0700162OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700163OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700164# Stash size cannot exceed cache_size * threshold.
165OPTIONS.cache_size = None
166OPTIONS.stash_threshold = 0.8
Tao Bao9bc6bb22015-11-09 16:58:28 -0800167OPTIONS.gen_verify = False
Tao Baod62c6032015-11-30 09:40:20 -0800168OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700169OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700170OPTIONS.payload_signer_args = []
Tao Bao8dcf7382015-05-21 14:09:49 -0700171
Doug Zongkereef39442009-04-02 12:14:19 -0700172def MostPopularKey(d, default):
173 """Given a dict, return the key corresponding to the largest
174 value. Returns 'default' if the dict is empty."""
175 x = [(v, k) for (k, v) in d.iteritems()]
Dan Albert8b72aef2015-03-23 19:13:21 -0700176 if not x:
177 return default
Doug Zongkereef39442009-04-02 12:14:19 -0700178 x.sort()
179 return x[-1][1]
180
181
182def IsSymlink(info):
183 """Return true if the zipfile.ZipInfo object passed in represents a
184 symlink."""
Ying Wang2ffb3142015-07-06 14:02:01 -0700185 return (info.external_attr >> 16) & 0o770000 == 0o120000
Doug Zongkereef39442009-04-02 12:14:19 -0700186
Hristo Bojinov96be7202010-08-02 10:26:17 -0700187def IsRegular(info):
188 """Return true if the zipfile.ZipInfo object passed in represents a
Ying Wang2ffb3142015-07-06 14:02:01 -0700189 regular file."""
190 return (info.external_attr >> 16) & 0o770000 == 0o100000
Doug Zongkereef39442009-04-02 12:14:19 -0700191
Michael Runge4038aa82013-12-13 18:06:28 -0800192def ClosestFileMatch(src, tgtfiles, existing):
193 """Returns the closest file match between a source file and list
194 of potential matches. The exact filename match is preferred,
195 then the sha1 is searched for, and finally a file with the same
196 basename is evaluated. Rename support in the updater-binary is
197 required for the latter checks to be used."""
198
199 result = tgtfiles.get("path:" + src.name)
200 if result is not None:
201 return result
202
203 if not OPTIONS.target_info_dict.get("update_rename_support", False):
204 return None
205
206 if src.size < 1000:
207 return None
208
209 result = tgtfiles.get("sha1:" + src.sha1)
210 if result is not None and existing.get(result.name) is None:
211 return result
212 result = tgtfiles.get("file:" + src.name.split("/")[-1])
213 if result is not None and existing.get(result.name) is None:
214 return result
215 return None
216
Dan Albert8b72aef2015-03-23 19:13:21 -0700217class ItemSet(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700218 def __init__(self, partition, fs_config):
219 self.partition = partition
220 self.fs_config = fs_config
221 self.ITEMS = {}
Doug Zongkereef39442009-04-02 12:14:19 -0700222
Dan Albert8b72aef2015-03-23 19:13:21 -0700223 def Get(self, name, is_dir=False):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700224 if name not in self.ITEMS:
Dan Albert8b72aef2015-03-23 19:13:21 -0700225 self.ITEMS[name] = Item(self, name, is_dir=is_dir)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700226 return self.ITEMS[name]
Doug Zongkereef39442009-04-02 12:14:19 -0700227
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700228 def GetMetadata(self, input_zip):
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700229 # The target_files contains a record of what the uid,
230 # gid, and mode are supposed to be.
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700231 output = input_zip.read(self.fs_config)
Doug Zongkereef39442009-04-02 12:14:19 -0700232
233 for line in output.split("\n"):
Dan Albert8b72aef2015-03-23 19:13:21 -0700234 if not line:
235 continue
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700236 columns = line.split()
237 name, uid, gid, mode = columns[:4]
238 selabel = None
239 capabilities = None
240
241 # After the first 4 columns, there are a series of key=value
242 # pairs. Extract out the fields we care about.
243 for element in columns[4:]:
244 key, value = element.split("=")
245 if key == "selabel":
246 selabel = value
247 if key == "capabilities":
248 capabilities = value
249
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700250 i = self.ITEMS.get(name, None)
Doug Zongker283e2a12010-03-15 17:52:32 -0700251 if i is not None:
252 i.uid = int(uid)
253 i.gid = int(gid)
254 i.mode = int(mode, 8)
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700255 i.selabel = selabel
256 i.capabilities = capabilities
Dan Albert8b72aef2015-03-23 19:13:21 -0700257 if i.is_dir:
Doug Zongker283e2a12010-03-15 17:52:32 -0700258 i.children.sort(key=lambda i: i.name)
259
Tao Baof2cffbd2015-07-22 12:33:18 -0700260 # Set metadata for the files generated by this script. For full recovery
261 # image at system/etc/recovery.img, it will be taken care by fs_config.
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700262 i = self.ITEMS.get("system/recovery-from-boot.p", None)
Dan Albert8b72aef2015-03-23 19:13:21 -0700263 if i:
264 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700265 i = self.ITEMS.get("system/etc/install-recovery.sh", None)
Dan Albert8b72aef2015-03-23 19:13:21 -0700266 if i:
267 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None
Doug Zongkereef39442009-04-02 12:14:19 -0700268
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700269
Dan Albert8b72aef2015-03-23 19:13:21 -0700270class Item(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700271 """Items represent the metadata (user, group, mode) of files and
272 directories in the system image."""
Dan Albert8b72aef2015-03-23 19:13:21 -0700273 def __init__(self, itemset, name, is_dir=False):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700274 self.itemset = itemset
275 self.name = name
276 self.uid = None
277 self.gid = None
278 self.mode = None
279 self.selabel = None
280 self.capabilities = None
Dan Albert8b72aef2015-03-23 19:13:21 -0700281 self.is_dir = is_dir
282 self.descendants = None
283 self.best_subtree = None
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700284
285 if name:
Dan Albert8b72aef2015-03-23 19:13:21 -0700286 self.parent = itemset.Get(os.path.dirname(name), is_dir=True)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700287 self.parent.children.append(self)
288 else:
289 self.parent = None
Dan Albert8b72aef2015-03-23 19:13:21 -0700290 if self.is_dir:
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700291 self.children = []
292
293 def Dump(self, indent=0):
294 if self.uid is not None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700295 print "%s%s %d %d %o" % (
296 " " * indent, self.name, self.uid, self.gid, self.mode)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700297 else:
Dan Albert8b72aef2015-03-23 19:13:21 -0700298 print "%s%s %s %s %s" % (
299 " " * indent, self.name, self.uid, self.gid, self.mode)
300 if self.is_dir:
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700301 print "%s%s" % (" "*indent, self.descendants)
302 print "%s%s" % (" "*indent, self.best_subtree)
303 for i in self.children:
304 i.Dump(indent=indent+1)
305
Doug Zongkereef39442009-04-02 12:14:19 -0700306 def CountChildMetadata(self):
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700307 """Count up the (uid, gid, mode, selabel, capabilities) tuples for
Dan Albert8b72aef2015-03-23 19:13:21 -0700308 all children and determine the best strategy for using set_perm_recursive
309 and set_perm to correctly chown/chmod all the files to their desired
Doug Zongkereef39442009-04-02 12:14:19 -0700310 values. Recursively calls itself for all descendants.
311
Dan Albert8b72aef2015-03-23 19:13:21 -0700312 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count}
313 counting up all descendants of this node. (dmode or fmode may be None.)
314 Also sets the best_subtree of each directory Item to the (uid, gid, dmode,
315 fmode, selabel, capabilities) tuple that will match the most descendants of
316 that Item.
Doug Zongkereef39442009-04-02 12:14:19 -0700317 """
318
Dan Albert8b72aef2015-03-23 19:13:21 -0700319 assert self.is_dir
320 key = (self.uid, self.gid, self.mode, None, self.selabel,
321 self.capabilities)
322 self.descendants = {key: 1}
323 d = self.descendants
Doug Zongkereef39442009-04-02 12:14:19 -0700324 for i in self.children:
Dan Albert8b72aef2015-03-23 19:13:21 -0700325 if i.is_dir:
Doug Zongkereef39442009-04-02 12:14:19 -0700326 for k, v in i.CountChildMetadata().iteritems():
327 d[k] = d.get(k, 0) + v
328 else:
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700329 k = (i.uid, i.gid, None, i.mode, i.selabel, i.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700330 d[k] = d.get(k, 0) + 1
331
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700332 # Find the (uid, gid, dmode, fmode, selabel, capabilities)
333 # tuple that matches the most descendants.
Doug Zongkereef39442009-04-02 12:14:19 -0700334
335 # First, find the (uid, gid) pair that matches the most
336 # descendants.
337 ug = {}
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700338 for (uid, gid, _, _, _, _), count in d.iteritems():
Doug Zongkereef39442009-04-02 12:14:19 -0700339 ug[(uid, gid)] = ug.get((uid, gid), 0) + count
340 ug = MostPopularKey(ug, (0, 0))
341
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700342 # Now find the dmode, fmode, selabel, and capabilities that match
343 # the most descendants with that (uid, gid), and choose those.
Dan Albert8b72aef2015-03-23 19:13:21 -0700344 best_dmode = (0, 0o755)
345 best_fmode = (0, 0o644)
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700346 best_selabel = (0, None)
347 best_capabilities = (0, None)
Doug Zongkereef39442009-04-02 12:14:19 -0700348 for k, count in d.iteritems():
Dan Albert8b72aef2015-03-23 19:13:21 -0700349 if k[:2] != ug:
350 continue
351 if k[2] is not None and count >= best_dmode[0]:
352 best_dmode = (count, k[2])
353 if k[3] is not None and count >= best_fmode[0]:
354 best_fmode = (count, k[3])
355 if k[4] is not None and count >= best_selabel[0]:
356 best_selabel = (count, k[4])
357 if k[5] is not None and count >= best_capabilities[0]:
358 best_capabilities = (count, k[5])
359 self.best_subtree = ug + (
360 best_dmode[1], best_fmode[1], best_selabel[1], best_capabilities[1])
Doug Zongkereef39442009-04-02 12:14:19 -0700361
362 return d
363
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700364 def SetPermissions(self, script):
Doug Zongkereef39442009-04-02 12:14:19 -0700365 """Append set_perm/set_perm_recursive commands to 'script' to
366 set all permissions, users, and groups for the tree of files
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700367 rooted at 'self'."""
Doug Zongkereef39442009-04-02 12:14:19 -0700368
369 self.CountChildMetadata()
370
371 def recurse(item, current):
Dan Albert8b72aef2015-03-23 19:13:21 -0700372 # current is the (uid, gid, dmode, fmode, selabel, capabilities) tuple
373 # that the current item (and all its children) have already been set to.
374 # We only need to issue set_perm/set_perm_recursive commands if we're
Doug Zongkereef39442009-04-02 12:14:19 -0700375 # supposed to be something different.
Dan Albert8b72aef2015-03-23 19:13:21 -0700376 if item.is_dir:
Doug Zongkereef39442009-04-02 12:14:19 -0700377 if current != item.best_subtree:
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700378 script.SetPermissionsRecursive("/"+item.name, *item.best_subtree)
Doug Zongkereef39442009-04-02 12:14:19 -0700379 current = item.best_subtree
380
381 if item.uid != current[0] or item.gid != current[1] or \
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700382 item.mode != current[2] or item.selabel != current[4] or \
383 item.capabilities != current[5]:
384 script.SetPermissions("/"+item.name, item.uid, item.gid,
385 item.mode, item.selabel, item.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700386
387 for i in item.children:
388 recurse(i, current)
389 else:
390 if item.uid != current[0] or item.gid != current[1] or \
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700391 item.mode != current[3] or item.selabel != current[4] or \
392 item.capabilities != current[5]:
393 script.SetPermissions("/"+item.name, item.uid, item.gid,
394 item.mode, item.selabel, item.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700395
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700396 recurse(self, (-1, -1, -1, -1, None, None))
Doug Zongkereef39442009-04-02 12:14:19 -0700397
398
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700399def CopyPartitionFiles(itemset, input_zip, output_zip=None, substitute=None):
400 """Copies files for the partition in the input zip to the output
Doug Zongkereef39442009-04-02 12:14:19 -0700401 zip. Populates the Item class with their metadata, and returns a
Doug Zongker1807e702012-02-28 12:21:08 -0800402 list of symlinks. output_zip may be None, in which case the copy is
403 skipped (but the other side effects still happen). substitute is an
404 optional dict of {output filename: contents} to be output instead of
405 certain input files.
Doug Zongkereef39442009-04-02 12:14:19 -0700406 """
407
408 symlinks = []
409
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700410 partition = itemset.partition
411
Doug Zongkereef39442009-04-02 12:14:19 -0700412 for info in input_zip.infolist():
Tao Baoeaf885b2015-03-23 16:01:17 -0700413 prefix = partition.upper() + "/"
414 if info.filename.startswith(prefix):
415 basefilename = info.filename[len(prefix):]
Doug Zongkereef39442009-04-02 12:14:19 -0700416 if IsSymlink(info):
417 symlinks.append((input_zip.read(info.filename),
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700418 "/" + partition + "/" + basefilename))
Doug Zongkereef39442009-04-02 12:14:19 -0700419 else:
Tao Bao2ed665a2015-04-01 11:21:55 -0700420 import copy
Doug Zongkereef39442009-04-02 12:14:19 -0700421 info2 = copy.copy(info)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700422 fn = info2.filename = partition + "/" + basefilename
Doug Zongkereef39442009-04-02 12:14:19 -0700423 if substitute and fn in substitute and substitute[fn] is None:
424 continue
425 if output_zip is not None:
426 if substitute and fn in substitute:
427 data = substitute[fn]
428 else:
429 data = input_zip.read(info.filename)
Tao Bao2ed665a2015-04-01 11:21:55 -0700430 common.ZipWriteStr(output_zip, info2, data)
Doug Zongkereef39442009-04-02 12:14:19 -0700431 if fn.endswith("/"):
Dan Albert8b72aef2015-03-23 19:13:21 -0700432 itemset.Get(fn[:-1], is_dir=True)
Doug Zongkereef39442009-04-02 12:14:19 -0700433 else:
Dan Albert8b72aef2015-03-23 19:13:21 -0700434 itemset.Get(fn)
Doug Zongkereef39442009-04-02 12:14:19 -0700435
436 symlinks.sort()
Doug Zongker1807e702012-02-28 12:21:08 -0800437 return symlinks
Doug Zongkereef39442009-04-02 12:14:19 -0700438
439
Doug Zongkereef39442009-04-02 12:14:19 -0700440def SignOutput(temp_zip_name, output_zip_name):
441 key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
442 pw = key_passwords[OPTIONS.package_key]
443
Doug Zongker951495f2009-08-14 12:44:19 -0700444 common.SignFile(temp_zip_name, output_zip_name, OPTIONS.package_key, pw,
445 whole_file=True)
Doug Zongkereef39442009-04-02 12:14:19 -0700446
447
Dan Albert8b72aef2015-03-23 19:13:21 -0700448def AppendAssertions(script, info_dict, oem_dict=None):
Michael Runge6e836112014-04-15 17:40:21 -0700449 oem_props = info_dict.get("oem_fingerprint_properties")
Tao Bao3e30d972016-03-15 13:20:19 -0700450 if not oem_props:
Michael Runge6e836112014-04-15 17:40:21 -0700451 device = GetBuildProp("ro.product.device", info_dict)
452 script.AssertDevice(device)
453 else:
454 if oem_dict is None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700455 raise common.ExternalError(
456 "No OEM file provided to answer expected assertions")
Michael Runge6e836112014-04-15 17:40:21 -0700457 for prop in oem_props.split():
458 if oem_dict.get(prop) is None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700459 raise common.ExternalError(
460 "The OEM file is missing the property %s" % prop)
Michael Runge6e836112014-04-15 17:40:21 -0700461 script.AssertOemProperty(prop, oem_dict.get(prop))
Doug Zongkereef39442009-04-02 12:14:19 -0700462
Doug Zongkereef39442009-04-02 12:14:19 -0700463
Doug Zongkerc9253822014-02-04 12:17:58 -0800464def HasRecoveryPatch(target_files_zip):
Tao Baof2cffbd2015-07-22 12:33:18 -0700465 namelist = [name for name in target_files_zip.namelist()]
466 return ("SYSTEM/recovery-from-boot.p" in namelist or
467 "SYSTEM/etc/recovery.img" in namelist)
Doug Zongker73ef8252009-07-23 15:12:53 -0700468
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700469def HasVendorPartition(target_files_zip):
470 try:
471 target_files_zip.getinfo("VENDOR/")
472 return True
473 except KeyError:
474 return False
475
Michael Runge6e836112014-04-15 17:40:21 -0700476def GetOemProperty(name, oem_props, oem_dict, info_dict):
477 if oem_props is not None and name in oem_props:
478 return oem_dict[name]
479 return GetBuildProp(name, info_dict)
480
481
482def CalculateFingerprint(oem_props, oem_dict, info_dict):
483 if oem_props is None:
484 return GetBuildProp("ro.build.fingerprint", info_dict)
485 return "%s/%s/%s:%s" % (
Dan Albert8b72aef2015-03-23 19:13:21 -0700486 GetOemProperty("ro.product.brand", oem_props, oem_dict, info_dict),
487 GetOemProperty("ro.product.name", oem_props, oem_dict, info_dict),
488 GetOemProperty("ro.product.device", oem_props, oem_dict, info_dict),
489 GetBuildProp("ro.build.thumbprint", info_dict))
Doug Zongker73ef8252009-07-23 15:12:53 -0700490
Doug Zongkerfc44a512014-08-26 13:10:25 -0700491
Doug Zongker3c84f562014-07-31 11:06:30 -0700492def GetImage(which, tmpdir, info_dict):
Doug Zongkerfc44a512014-08-26 13:10:25 -0700493 # Return an image object (suitable for passing to BlockImageDiff)
494 # for the 'which' partition (most be "system" or "vendor"). If a
495 # prebuilt image and file map are found in tmpdir they are used,
496 # otherwise they are reconstructed from the individual files.
Doug Zongker3c84f562014-07-31 11:06:30 -0700497
498 assert which in ("system", "vendor")
499
500 path = os.path.join(tmpdir, "IMAGES", which + ".img")
Doug Zongkerfc44a512014-08-26 13:10:25 -0700501 mappath = os.path.join(tmpdir, "IMAGES", which + ".map")
502 if os.path.exists(path) and os.path.exists(mappath):
Doug Zongker3c84f562014-07-31 11:06:30 -0700503 print "using %s.img from target-files" % (which,)
Doug Zongker3c84f562014-07-31 11:06:30 -0700504 # This is a 'new' target-files, which already has the image in it.
Doug Zongker3c84f562014-07-31 11:06:30 -0700505
506 else:
507 print "building %s.img from target-files" % (which,)
508
509 # This is an 'old' target-files, which does not contain images
510 # already built. Build them.
511
Doug Zongkerfc44a512014-08-26 13:10:25 -0700512 mappath = tempfile.mkstemp()[1]
513 OPTIONS.tempfiles.append(mappath)
514
Doug Zongker3c84f562014-07-31 11:06:30 -0700515 import add_img_to_target_files
516 if which == "system":
Doug Zongkerfc44a512014-08-26 13:10:25 -0700517 path = add_img_to_target_files.BuildSystem(
518 tmpdir, info_dict, block_list=mappath)
Doug Zongker3c84f562014-07-31 11:06:30 -0700519 elif which == "vendor":
Doug Zongkerfc44a512014-08-26 13:10:25 -0700520 path = add_img_to_target_files.BuildVendor(
521 tmpdir, info_dict, block_list=mappath)
Doug Zongker3c84f562014-07-31 11:06:30 -0700522
Tao Baoff777812015-05-12 11:42:31 -0700523 # Bug: http://b/20939131
524 # In ext4 filesystems, block 0 might be changed even being mounted
525 # R/O. We add it to clobbered_blocks so that it will be written to the
526 # target unconditionally. Note that they are still part of care_map.
527 clobbered_blocks = "0"
528
529 return sparse_img.SparseImage(path, mappath, clobbered_blocks)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700530
531
Doug Zongkerc77a9ad2010-09-16 11:28:43 -0700532def WriteFullOTAPackage(input_zip, output_zip):
Doug Zongker9ce2ebf2010-04-21 14:08:44 -0700533 # TODO: how to determine this? We don't know what version it will
Tao Bao34b47bf2015-06-22 19:17:41 -0700534 # be installed on top of. For now, we expect the API just won't
535 # change very often. Similarly for fstab, it might have changed
536 # in the target build.
Doug Zongkerc77a9ad2010-09-16 11:28:43 -0700537 script = edify_generator.EdifyGenerator(3, OPTIONS.info_dict)
Doug Zongkereef39442009-04-02 12:14:19 -0700538
Tao Bao838c68f2016-03-15 19:16:18 +0000539 recovery_mount_options = OPTIONS.info_dict.get("recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -0700540 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties")
Michael Runge6e836112014-04-15 17:40:21 -0700541 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -0700542 if oem_props:
Michael Runge6e836112014-04-15 17:40:21 -0700543 if OPTIONS.oem_source is None:
544 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -0800545 if not OPTIONS.oem_no_mount:
546 script.Mount("/oem", recovery_mount_options)
Dan Albert8b72aef2015-03-23 19:13:21 -0700547 oem_dict = common.LoadDictionaryFromLines(
548 open(OPTIONS.oem_source).readlines())
Michael Runge6e836112014-04-15 17:40:21 -0700549
Tao Bao3e30d972016-03-15 13:20:19 -0700550 target_fp = CalculateFingerprint(oem_props, oem_dict, OPTIONS.info_dict)
Dan Albert8b72aef2015-03-23 19:13:21 -0700551 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -0700552 "post-build": target_fp,
Dan Albert8b72aef2015-03-23 19:13:21 -0700553 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
554 OPTIONS.info_dict),
555 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
556 }
Doug Zongker2ea21062010-04-28 16:05:21 -0700557
Doug Zongker05d3dea2009-06-22 11:32:31 -0700558 device_specific = common.DeviceSpecificParams(
559 input_zip=input_zip,
Doug Zongker37974732010-09-16 17:44:38 -0700560 input_version=OPTIONS.info_dict["recovery_api_version"],
Doug Zongker05d3dea2009-06-22 11:32:31 -0700561 output_zip=output_zip,
562 script=script,
Doug Zongker2ea21062010-04-28 16:05:21 -0700563 input_tmp=OPTIONS.input_tmp,
Doug Zongker96a57e72010-09-26 14:57:41 -0700564 metadata=metadata,
565 info_dict=OPTIONS.info_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700566
Doug Zongkerc9253822014-02-04 12:17:58 -0800567 has_recovery_patch = HasRecoveryPatch(input_zip)
Doug Zongker26e66192014-02-20 13:22:07 -0800568 block_based = OPTIONS.block_based and has_recovery_patch
Doug Zongkerc9253822014-02-04 12:17:58 -0800569
Tao Baod8d14be2016-02-04 14:26:02 -0800570 metadata["ota-type"] = "BLOCK" if block_based else "FILE"
571
Elliott Hughesd8a52f92016-06-20 14:35:47 -0700572 ts = GetBuildProp("ro.build.date.utc", OPTIONS.info_dict)
573 ts_text = GetBuildProp("ro.build.date", OPTIONS.info_dict)
574 script.AssertOlderBuild(ts, ts_text)
Doug Zongkereef39442009-04-02 12:14:19 -0700575
Michael Runge6e836112014-04-15 17:40:21 -0700576 AppendAssertions(script, OPTIONS.info_dict, oem_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700577 device_specific.FullOTA_Assertions()
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800578
579 # Two-step package strategy (in chronological order, which is *not*
580 # the order in which the generated script has things):
581 #
582 # if stage is not "2/3" or "3/3":
583 # write recovery image to boot partition
584 # set stage to "2/3"
585 # reboot to boot partition and restart recovery
586 # else if stage is "2/3":
587 # write recovery image to recovery partition
588 # set stage to "3/3"
589 # reboot to recovery partition and restart recovery
590 # else:
591 # (stage must be "3/3")
592 # set stage to ""
593 # do normal full package installation:
594 # wipe and install system, boot image, etc.
595 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -0700596 # complete script normally
597 # (allow recovery to mark itself finished and reboot)
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800598
599 recovery_img = common.GetBootableImage("recovery.img", "recovery.img",
600 OPTIONS.input_tmp, "RECOVERY")
601 if OPTIONS.two_step:
602 if not OPTIONS.info_dict.get("multistage_support", None):
603 assert False, "two-step packages not supported by this build"
604 fs = OPTIONS.info_dict["fstab"]["/misc"]
605 assert fs.fs_type.upper() == "EMMC", \
606 "two-step packages only supported on devices with EMMC /misc partitions"
607 bcb_dev = {"bcb_dev": fs.device}
608 common.ZipWriteStr(output_zip, "recovery.img", recovery_img.data)
609 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -0700610if get_stage("%(bcb_dev)s") == "2/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800611""" % bcb_dev)
612 script.WriteRawImage("/recovery", "recovery.img")
613 script.AppendExtra("""
614set_stage("%(bcb_dev)s", "3/3");
615reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -0700616else if get_stage("%(bcb_dev)s") == "3/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800617""" % bcb_dev)
618
Tao Bao6c55a8a2015-04-08 15:30:27 -0700619 # Dump fingerprints
Tao Bao3e30d972016-03-15 13:20:19 -0700620 script.Print("Target: %s" % target_fp)
Tao Bao6c55a8a2015-04-08 15:30:27 -0700621
Doug Zongkere5ff5902012-01-17 10:55:37 -0800622 device_specific.FullOTA_InstallBegin()
Doug Zongker171f1cd2009-06-15 22:36:37 -0700623
Doug Zongker01ce19c2014-02-04 13:48:15 -0800624 system_progress = 0.75
Doug Zongkereef39442009-04-02 12:14:19 -0700625
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700626 if OPTIONS.wipe_user_data:
Doug Zongker01ce19c2014-02-04 13:48:15 -0800627 system_progress -= 0.1
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700628 if HasVendorPartition(input_zip):
629 system_progress -= 0.1
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700630
Stephen Smalleyd3a803e2015-08-04 14:59:06 -0400631 # Place a copy of file_contexts.bin into the OTA package which will be used
632 # by the recovery program.
Kenny Rootf32dc712012-04-08 10:42:34 -0700633 if "selinux_fc" in OPTIONS.info_dict:
634 WritePolicyConfig(OPTIONS.info_dict["selinux_fc"], output_zip)
Stephen Smalley56882bf2012-02-09 13:36:21 -0500635
Michael Runge7cd99ba2014-10-22 17:21:48 -0700636 recovery_mount_options = OPTIONS.info_dict.get("recovery_mount_options")
637
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700638 system_items = ItemSet("system", "META/filesystem_config.txt")
Doug Zongker4b9596f2014-06-09 14:15:45 -0700639 script.ShowProgress(system_progress, 0)
Jesse Zhao75bcea02015-01-06 10:59:53 -0800640
Doug Zongker26e66192014-02-20 13:22:07 -0800641 if block_based:
Doug Zongkerfc44a512014-08-26 13:10:25 -0700642 # Full OTA is done as an "incremental" against an empty source
643 # image. This has the effect of writing new data from the package
644 # to the entire partition, but lets us reuse the updater code that
645 # writes incrementals to do it.
646 system_tgt = GetImage("system", OPTIONS.input_tmp, OPTIONS.info_dict)
647 system_tgt.ResetFileMap()
Doug Zongkerab7ca1d2014-08-26 10:40:28 -0700648 system_diff = common.BlockDifference("system", system_tgt, src=None)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700649 system_diff.WriteScript(script, output_zip)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800650 else:
651 script.FormatPartition("/system")
Michael Runge7cd99ba2014-10-22 17:21:48 -0700652 script.Mount("/system", recovery_mount_options)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800653 if not has_recovery_patch:
654 script.UnpackPackageDir("recovery", "/system")
Doug Zongker26e66192014-02-20 13:22:07 -0800655 script.UnpackPackageDir("system", "/system")
Doug Zongkereef39442009-04-02 12:14:19 -0700656
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700657 symlinks = CopyPartitionFiles(system_items, input_zip, output_zip)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800658 script.MakeSymlinks(symlinks)
Doug Zongkereef39442009-04-02 12:14:19 -0700659
Tao Bao7a5bf8a2015-07-21 18:01:20 -0700660 boot_img = common.GetBootableImage(
661 "boot.img", "boot.img", OPTIONS.input_tmp, "BOOT")
Doug Zongkerc9253822014-02-04 12:17:58 -0800662
Doug Zongker91a99c22014-05-09 13:15:01 -0700663 if not block_based:
Doug Zongkerc9253822014-02-04 12:17:58 -0800664 def output_sink(fn, data):
665 common.ZipWriteStr(output_zip, "recovery/" + fn, data)
Dan Albert8b72aef2015-03-23 19:13:21 -0700666 system_items.Get("system/" + fn)
Doug Zongkerc9253822014-02-04 12:17:58 -0800667
668 common.MakeRecoveryPatch(OPTIONS.input_tmp, output_sink,
669 recovery_img, boot_img)
Doug Zongkereef39442009-04-02 12:14:19 -0700670
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700671 system_items.GetMetadata(input_zip)
672 system_items.Get("system").SetPermissions(script)
673
674 if HasVendorPartition(input_zip):
675 vendor_items = ItemSet("vendor", "META/vendor_filesystem_config.txt")
676 script.ShowProgress(0.1, 0)
677
678 if block_based:
Doug Zongkerfc44a512014-08-26 13:10:25 -0700679 vendor_tgt = GetImage("vendor", OPTIONS.input_tmp, OPTIONS.info_dict)
680 vendor_tgt.ResetFileMap()
Doug Zongkerab7ca1d2014-08-26 10:40:28 -0700681 vendor_diff = common.BlockDifference("vendor", vendor_tgt)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700682 vendor_diff.WriteScript(script, output_zip)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700683 else:
684 script.FormatPartition("/vendor")
Michael Runge7cd99ba2014-10-22 17:21:48 -0700685 script.Mount("/vendor", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700686 script.UnpackPackageDir("vendor", "/vendor")
687
688 symlinks = CopyPartitionFiles(vendor_items, input_zip, output_zip)
689 script.MakeSymlinks(symlinks)
690
691 vendor_items.GetMetadata(input_zip)
692 vendor_items.Get("vendor").SetPermissions(script)
Doug Zongker73ef8252009-07-23 15:12:53 -0700693
Doug Zongker37974732010-09-16 17:44:38 -0700694 common.CheckSize(boot_img.data, "boot.img", OPTIONS.info_dict)
Doug Zongker73ef8252009-07-23 15:12:53 -0700695 common.ZipWriteStr(output_zip, "boot.img", boot_img.data)
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700696
Doug Zongker01ce19c2014-02-04 13:48:15 -0800697 script.ShowProgress(0.05, 5)
Doug Zongker9ce0fb62010-09-20 18:04:41 -0700698 script.WriteRawImage("/boot", "boot.img")
Doug Zongker05d3dea2009-06-22 11:32:31 -0700699
Doug Zongker01ce19c2014-02-04 13:48:15 -0800700 script.ShowProgress(0.2, 10)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700701 device_specific.FullOTA_InstallEnd()
Doug Zongkereef39442009-04-02 12:14:19 -0700702
Doug Zongker1c390a22009-05-14 19:06:36 -0700703 if OPTIONS.extra_script is not None:
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700704 script.AppendExtra(OPTIONS.extra_script)
Doug Zongker1c390a22009-05-14 19:06:36 -0700705
Doug Zongker14833602010-02-02 13:12:04 -0800706 script.UnmountAll()
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800707
Doug Zongker922206e2014-03-04 13:16:24 -0800708 if OPTIONS.wipe_user_data:
709 script.ShowProgress(0.1, 10)
710 script.FormatPartition("/data")
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700711
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800712 if OPTIONS.two_step:
713 script.AppendExtra("""
714set_stage("%(bcb_dev)s", "");
715""" % bcb_dev)
716 script.AppendExtra("else\n")
717 script.WriteRawImage("/boot", "recovery.img")
718 script.AppendExtra("""
719set_stage("%(bcb_dev)s", "2/3");
720reboot_now("%(bcb_dev)s", "");
721endif;
722endif;
723""" % bcb_dev)
Tao Baod8d14be2016-02-04 14:26:02 -0800724
Tao Bao5d182562016-02-23 11:38:39 -0800725 script.SetProgress(1)
726 script.AddToZip(input_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -0800727 metadata["ota-required-cache"] = str(script.required_cache)
Doug Zongker2ea21062010-04-28 16:05:21 -0700728 WriteMetadata(metadata, output_zip)
729
Doug Zongkerfc44a512014-08-26 13:10:25 -0700730
Dan Albert8e0178d2015-01-27 15:53:15 -0800731def WritePolicyConfig(file_name, output_zip):
732 common.ZipWrite(output_zip, file_name, os.path.basename(file_name))
Stephen Smalley56882bf2012-02-09 13:36:21 -0500733
Doug Zongker2ea21062010-04-28 16:05:21 -0700734
735def WriteMetadata(metadata, output_zip):
736 common.ZipWriteStr(output_zip, "META-INF/com/android/metadata",
737 "".join(["%s=%s\n" % kv
738 for kv in sorted(metadata.iteritems())]))
Doug Zongkereef39442009-04-02 12:14:19 -0700739
Doug Zongkerfc44a512014-08-26 13:10:25 -0700740
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700741def LoadPartitionFiles(z, partition):
742 """Load all the files from the given partition in a given target-files
Doug Zongkereef39442009-04-02 12:14:19 -0700743 ZipFile, and return a dict of {filename: File object}."""
744 out = {}
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700745 prefix = partition.upper() + "/"
Doug Zongkereef39442009-04-02 12:14:19 -0700746 for info in z.infolist():
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700747 if info.filename.startswith(prefix) and not IsSymlink(info):
Tao Baoeaf885b2015-03-23 16:01:17 -0700748 basefilename = info.filename[len(prefix):]
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700749 fn = partition + "/" + basefilename
Doug Zongkereef39442009-04-02 12:14:19 -0700750 data = z.read(info.filename)
Doug Zongkerea5d7a92010-09-12 15:26:16 -0700751 out[fn] = common.File(fn, data)
Doug Zongker1807e702012-02-28 12:21:08 -0800752 return out
Doug Zongkereef39442009-04-02 12:14:19 -0700753
754
Doug Zongker1eb74dd2012-08-16 16:19:00 -0700755def GetBuildProp(prop, info_dict):
756 """Return the fingerprint of the build of a given target-files info_dict."""
757 try:
758 return info_dict.get("build.prop", {})[prop]
759 except KeyError:
Ying Wangc73e4612014-04-15 15:27:43 -0700760 raise common.ExternalError("couldn't find %s in build.prop" % (prop,))
Doug Zongkereef39442009-04-02 12:14:19 -0700761
Doug Zongkerfc44a512014-08-26 13:10:25 -0700762
Michael Runge4038aa82013-12-13 18:06:28 -0800763def AddToKnownPaths(filename, known_paths):
764 if filename[-1] == "/":
765 return
766 dirs = filename.split("/")[:-1]
767 while len(dirs) > 0:
768 path = "/".join(dirs)
769 if path in known_paths:
Dan Albert8b72aef2015-03-23 19:13:21 -0700770 break
Michael Runge4038aa82013-12-13 18:06:28 -0800771 known_paths.add(path)
772 dirs.pop()
Doug Zongkereef39442009-04-02 12:14:19 -0700773
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700774
Geremy Condra36bd3652014-02-06 19:45:10 -0800775def WriteBlockIncrementalOTAPackage(target_zip, source_zip, output_zip):
Tao Bao3806c232015-07-05 21:08:33 -0700776 # TODO(tbao): We should factor out the common parts between
777 # WriteBlockIncrementalOTAPackage() and WriteIncrementalOTAPackage().
Geremy Condra36bd3652014-02-06 19:45:10 -0800778 source_version = OPTIONS.source_info_dict["recovery_api_version"]
779 target_version = OPTIONS.target_info_dict["recovery_api_version"]
780
781 if source_version == 0:
Tao Bao3e30d972016-03-15 13:20:19 -0700782 print("WARNING: generating edify script for a source that "
783 "can't install it.")
Tao Bao34b47bf2015-06-22 19:17:41 -0700784 script = edify_generator.EdifyGenerator(
785 source_version, OPTIONS.target_info_dict,
786 fstab=OPTIONS.source_info_dict["fstab"])
Geremy Condra36bd3652014-02-06 19:45:10 -0800787
Tao Bao3806c232015-07-05 21:08:33 -0700788 recovery_mount_options = OPTIONS.source_info_dict.get(
789 "recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -0700790 source_oem_props = OPTIONS.source_info_dict.get("oem_fingerprint_properties")
791 target_oem_props = OPTIONS.target_info_dict.get("oem_fingerprint_properties")
Tao Bao3806c232015-07-05 21:08:33 -0700792 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -0700793 if source_oem_props or target_oem_props:
Tao Bao3806c232015-07-05 21:08:33 -0700794 if OPTIONS.oem_source is None:
795 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -0800796 if not OPTIONS.oem_no_mount:
797 script.Mount("/oem", recovery_mount_options)
Tao Bao3806c232015-07-05 21:08:33 -0700798 oem_dict = common.LoadDictionaryFromLines(
799 open(OPTIONS.oem_source).readlines())
800
Dan Albert8b72aef2015-03-23 19:13:21 -0700801 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -0700802 "pre-device": GetOemProperty("ro.product.device", source_oem_props,
803 oem_dict, OPTIONS.source_info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -0800804 "ota-type": "BLOCK",
Dan Albert8b72aef2015-03-23 19:13:21 -0700805 }
Geremy Condra36bd3652014-02-06 19:45:10 -0800806
Tao Bao5d182562016-02-23 11:38:39 -0800807 post_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.target_info_dict)
808 pre_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.source_info_dict)
809 is_downgrade = long(post_timestamp) < long(pre_timestamp)
810
811 if OPTIONS.downgrade:
812 metadata["ota-downgrade"] = "yes"
813 if not is_downgrade:
814 raise RuntimeError("--downgrade specified but no downgrade detected: "
815 "pre: %s, post: %s" % (pre_timestamp, post_timestamp))
816 else:
817 if is_downgrade:
818 # Non-fatal here to allow generating such a package which may require
819 # manual work to adjust the post-timestamp. A legit use case is that we
820 # cut a new build C (after having A and B), but want to enfore the
821 # update path of A -> C -> B. Specifying --downgrade may not help since
822 # that would enforce a data wipe for C -> B update.
823 print("\nWARNING: downgrade detected: pre: %s, post: %s.\n"
824 "The package may not be deployed properly. "
825 "Try --downgrade?\n" % (pre_timestamp, post_timestamp))
826 metadata["post-timestamp"] = post_timestamp
827
Geremy Condra36bd3652014-02-06 19:45:10 -0800828 device_specific = common.DeviceSpecificParams(
829 source_zip=source_zip,
830 source_version=source_version,
831 target_zip=target_zip,
832 target_version=target_version,
833 output_zip=output_zip,
834 script=script,
835 metadata=metadata,
Tao Bao6f0b2192015-10-13 16:37:12 -0700836 info_dict=OPTIONS.source_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800837
Tao Bao3e30d972016-03-15 13:20:19 -0700838 source_fp = CalculateFingerprint(source_oem_props, oem_dict,
Tao Bao3806c232015-07-05 21:08:33 -0700839 OPTIONS.source_info_dict)
Tao Bao3e30d972016-03-15 13:20:19 -0700840 target_fp = CalculateFingerprint(target_oem_props, oem_dict,
Tao Bao3806c232015-07-05 21:08:33 -0700841 OPTIONS.target_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800842 metadata["pre-build"] = source_fp
843 metadata["post-build"] = target_fp
Tianjie Xud06f07e2016-06-09 14:18:45 -0700844 metadata["pre-build-incremental"] = GetBuildProp(
845 "ro.build.version.incremental", OPTIONS.source_info_dict)
846 metadata["post-build-incremental"] = GetBuildProp(
847 "ro.build.version.incremental", OPTIONS.target_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800848
849 source_boot = common.GetBootableImage(
850 "/tmp/boot.img", "boot.img", OPTIONS.source_tmp, "BOOT",
851 OPTIONS.source_info_dict)
852 target_boot = common.GetBootableImage(
853 "/tmp/boot.img", "boot.img", OPTIONS.target_tmp, "BOOT")
854 updating_boot = (not OPTIONS.two_step and
855 (source_boot.data != target_boot.data))
856
Geremy Condra36bd3652014-02-06 19:45:10 -0800857 target_recovery = common.GetBootableImage(
858 "/tmp/recovery.img", "recovery.img", OPTIONS.target_tmp, "RECOVERY")
Geremy Condra36bd3652014-02-06 19:45:10 -0800859
Doug Zongkerfc44a512014-08-26 13:10:25 -0700860 system_src = GetImage("system", OPTIONS.source_tmp, OPTIONS.source_info_dict)
861 system_tgt = GetImage("system", OPTIONS.target_tmp, OPTIONS.target_info_dict)
Tao Baodd2a5892015-03-12 12:32:37 -0700862
863 blockimgdiff_version = 1
864 if OPTIONS.info_dict:
865 blockimgdiff_version = max(
866 int(i) for i in
867 OPTIONS.info_dict.get("blockimgdiff_versions", "1").split(","))
868
Tao Baof8acad12016-07-07 09:09:58 -0700869 # Check the first block of the source system partition for remount R/W only
870 # if the filesystem is ext4.
871 system_src_partition = OPTIONS.source_info_dict["fstab"]["/system"]
872 check_first_block = system_src_partition.fs_type == "ext4"
Tao Bao293fd132016-06-11 12:19:23 -0700873 # Disable using imgdiff for squashfs. 'imgdiff -z' expects input files to be
874 # in zip formats. However with squashfs, a) all files are compressed in LZ4;
875 # b) the blocks listed in block map may not contain all the bytes for a given
876 # file (because they're rounded to be 4K-aligned).
Tao Baof8acad12016-07-07 09:09:58 -0700877 system_tgt_partition = OPTIONS.target_info_dict["fstab"]["/system"]
878 disable_imgdiff = (system_src_partition.fs_type == "squashfs" or
879 system_tgt_partition.fs_type == "squashfs")
Doug Zongkerb34fcce2014-09-11 09:34:56 -0700880 system_diff = common.BlockDifference("system", system_tgt, system_src,
Tianjie Xufc3422a2015-12-15 11:53:59 -0800881 check_first_block,
Tao Bao293fd132016-06-11 12:19:23 -0700882 version=blockimgdiff_version,
883 disable_imgdiff=disable_imgdiff)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700884
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700885 if HasVendorPartition(target_zip):
886 if not HasVendorPartition(source_zip):
887 raise RuntimeError("can't generate incremental that adds /vendor")
Dan Albert8b72aef2015-03-23 19:13:21 -0700888 vendor_src = GetImage("vendor", OPTIONS.source_tmp,
889 OPTIONS.source_info_dict)
890 vendor_tgt = GetImage("vendor", OPTIONS.target_tmp,
891 OPTIONS.target_info_dict)
Tianjie Xufc3422a2015-12-15 11:53:59 -0800892
893 # Check first block of vendor partition for remount R/W only if
894 # disk type is ext4
895 vendor_partition = OPTIONS.source_info_dict["fstab"]["/vendor"]
Tao Baod8d14be2016-02-04 14:26:02 -0800896 check_first_block = vendor_partition.fs_type == "ext4"
Tao Bao293fd132016-06-11 12:19:23 -0700897 disable_imgdiff = vendor_partition.fs_type == "squashfs"
Doug Zongkerb34fcce2014-09-11 09:34:56 -0700898 vendor_diff = common.BlockDifference("vendor", vendor_tgt, vendor_src,
Tianjie Xufc3422a2015-12-15 11:53:59 -0800899 check_first_block,
Tao Bao293fd132016-06-11 12:19:23 -0700900 version=blockimgdiff_version,
901 disable_imgdiff=disable_imgdiff)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700902 else:
903 vendor_diff = None
Geremy Condra36bd3652014-02-06 19:45:10 -0800904
Michael Rungec6e3afd2014-05-05 11:55:47 -0700905 AppendAssertions(script, OPTIONS.target_info_dict, oem_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800906 device_specific.IncrementalOTA_Assertions()
907
908 # Two-step incremental package strategy (in chronological order,
909 # which is *not* the order in which the generated script has
910 # things):
911 #
912 # if stage is not "2/3" or "3/3":
913 # do verification on current system
914 # write recovery image to boot partition
915 # set stage to "2/3"
916 # reboot to boot partition and restart recovery
917 # else if stage is "2/3":
918 # write recovery image to recovery partition
919 # set stage to "3/3"
920 # reboot to recovery partition and restart recovery
921 # else:
922 # (stage must be "3/3")
923 # perform update:
924 # patch system files, etc.
925 # force full install of new boot image
926 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -0700927 # complete script normally
928 # (allow recovery to mark itself finished and reboot)
Geremy Condra36bd3652014-02-06 19:45:10 -0800929
930 if OPTIONS.two_step:
Tao Baodd24da92015-07-29 14:09:23 -0700931 if not OPTIONS.source_info_dict.get("multistage_support", None):
Geremy Condra36bd3652014-02-06 19:45:10 -0800932 assert False, "two-step packages not supported by this build"
Tao Baodd24da92015-07-29 14:09:23 -0700933 fs = OPTIONS.source_info_dict["fstab"]["/misc"]
Geremy Condra36bd3652014-02-06 19:45:10 -0800934 assert fs.fs_type.upper() == "EMMC", \
935 "two-step packages only supported on devices with EMMC /misc partitions"
936 bcb_dev = {"bcb_dev": fs.device}
937 common.ZipWriteStr(output_zip, "recovery.img", target_recovery.data)
938 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -0700939if get_stage("%(bcb_dev)s") == "2/3" then
Geremy Condra36bd3652014-02-06 19:45:10 -0800940""" % bcb_dev)
Dan Albert8b72aef2015-03-23 19:13:21 -0700941 script.AppendExtra("sleep(20);\n")
Geremy Condra36bd3652014-02-06 19:45:10 -0800942 script.WriteRawImage("/recovery", "recovery.img")
943 script.AppendExtra("""
944set_stage("%(bcb_dev)s", "3/3");
945reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -0700946else if get_stage("%(bcb_dev)s") != "3/3" then
Geremy Condra36bd3652014-02-06 19:45:10 -0800947""" % bcb_dev)
948
Tao Bao6c55a8a2015-04-08 15:30:27 -0700949 # Dump fingerprints
Tao Bao3e30d972016-03-15 13:20:19 -0700950 script.Print(source_fp)
951 script.Print(target_fp)
Tao Bao6c55a8a2015-04-08 15:30:27 -0700952
Geremy Condra36bd3652014-02-06 19:45:10 -0800953 script.Print("Verifying current system...")
954
955 device_specific.IncrementalOTA_VerifyBegin()
956
Tao Bao3e30d972016-03-15 13:20:19 -0700957 # When blockimgdiff version is less than 3 (non-resumable block-based OTA),
958 # patching on a device that's already on the target build will damage the
959 # system. Because operations like move don't check the block state, they
960 # always apply the changes unconditionally.
961 if blockimgdiff_version <= 2:
962 if source_oem_props is None:
Tao Baodd2a5892015-03-12 12:32:37 -0700963 script.AssertSomeFingerprint(source_fp)
964 else:
Tao Baodd2a5892015-03-12 12:32:37 -0700965 script.AssertSomeThumbprint(
966 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -0700967
968 else: # blockimgdiff_version > 2
969 if source_oem_props is None and target_oem_props is None:
970 script.AssertSomeFingerprint(source_fp, target_fp)
971 elif source_oem_props is not None and target_oem_props is not None:
Tao Baodd2a5892015-03-12 12:32:37 -0700972 script.AssertSomeThumbprint(
973 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict),
974 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -0700975 elif source_oem_props is None and target_oem_props is not None:
976 script.AssertFingerprintOrThumbprint(
977 source_fp,
978 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict))
979 else:
980 script.AssertFingerprintOrThumbprint(
981 target_fp,
982 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Geremy Condra36bd3652014-02-06 19:45:10 -0800983
Tao Baod8d14be2016-02-04 14:26:02 -0800984 # Check the required cache size (i.e. stashed blocks).
985 size = []
986 if system_diff:
987 size.append(system_diff.required_cache)
988 if vendor_diff:
989 size.append(vendor_diff.required_cache)
990
Geremy Condra36bd3652014-02-06 19:45:10 -0800991 if updating_boot:
Tao Baodd24da92015-07-29 14:09:23 -0700992 boot_type, boot_device = common.GetTypeAndDevice(
993 "/boot", OPTIONS.source_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800994 d = common.Difference(target_boot, source_boot)
995 _, _, d = d.ComputePatch()
Doug Zongkerf8340082014-08-05 10:39:37 -0700996 if d is None:
997 include_full_boot = True
998 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
999 else:
1000 include_full_boot = False
Geremy Condra36bd3652014-02-06 19:45:10 -08001001
Doug Zongkerf8340082014-08-05 10:39:37 -07001002 print "boot target: %d source: %d diff: %d" % (
1003 target_boot.size, source_boot.size, len(d))
Geremy Condra36bd3652014-02-06 19:45:10 -08001004
Doug Zongkerf8340082014-08-05 10:39:37 -07001005 common.ZipWriteStr(output_zip, "patch/boot.img.p", d)
Geremy Condra36bd3652014-02-06 19:45:10 -08001006
Doug Zongkerf8340082014-08-05 10:39:37 -07001007 script.PatchCheck("%s:%s:%d:%s:%d:%s" %
1008 (boot_type, boot_device,
1009 source_boot.size, source_boot.sha1,
1010 target_boot.size, target_boot.sha1))
Tao Baod8d14be2016-02-04 14:26:02 -08001011 size.append(target_boot.size)
1012
1013 if size:
1014 script.CacheFreeSpaceCheck(max(size))
Geremy Condra36bd3652014-02-06 19:45:10 -08001015
1016 device_specific.IncrementalOTA_VerifyEnd()
1017
1018 if OPTIONS.two_step:
1019 script.WriteRawImage("/boot", "recovery.img")
1020 script.AppendExtra("""
1021set_stage("%(bcb_dev)s", "2/3");
1022reboot_now("%(bcb_dev)s", "");
1023else
1024""" % bcb_dev)
1025
Jesse Zhao75bcea02015-01-06 10:59:53 -08001026 # Verify the existing partitions.
Tao Baod522bdc2016-04-12 15:53:16 -07001027 system_diff.WriteVerifyScript(script, touched_blocks_only=True)
Jesse Zhao75bcea02015-01-06 10:59:53 -08001028 if vendor_diff:
Tao Baod522bdc2016-04-12 15:53:16 -07001029 vendor_diff.WriteVerifyScript(script, touched_blocks_only=True)
Jesse Zhao75bcea02015-01-06 10:59:53 -08001030
Geremy Condra36bd3652014-02-06 19:45:10 -08001031 script.Comment("---- start making changes here ----")
1032
1033 device_specific.IncrementalOTA_InstallBegin()
1034
Doug Zongkerab7ca1d2014-08-26 10:40:28 -07001035 system_diff.WriteScript(script, output_zip,
1036 progress=0.8 if vendor_diff else 0.9)
Tao Bao68658c02015-06-01 13:40:49 -07001037
Doug Zongkerfc44a512014-08-26 13:10:25 -07001038 if vendor_diff:
Doug Zongkerab7ca1d2014-08-26 10:40:28 -07001039 vendor_diff.WriteScript(script, output_zip, progress=0.1)
Geremy Condra36bd3652014-02-06 19:45:10 -08001040
1041 if OPTIONS.two_step:
1042 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
1043 script.WriteRawImage("/boot", "boot.img")
1044 print "writing full boot image (forced by two-step mode)"
1045
1046 if not OPTIONS.two_step:
1047 if updating_boot:
Doug Zongkerf8340082014-08-05 10:39:37 -07001048 if include_full_boot:
1049 print "boot image changed; including full."
1050 script.Print("Installing boot image...")
1051 script.WriteRawImage("/boot", "boot.img")
1052 else:
1053 # Produce the boot image by applying a patch to the current
1054 # contents of the boot partition, and write it back to the
1055 # partition.
1056 print "boot image changed; including patch."
1057 script.Print("Patching boot image...")
1058 script.ShowProgress(0.1, 10)
1059 script.ApplyPatch("%s:%s:%d:%s:%d:%s"
1060 % (boot_type, boot_device,
1061 source_boot.size, source_boot.sha1,
1062 target_boot.size, target_boot.sha1),
1063 "-",
1064 target_boot.size, target_boot.sha1,
1065 source_boot.sha1, "patch/boot.img.p")
Geremy Condra36bd3652014-02-06 19:45:10 -08001066 else:
1067 print "boot image unchanged; skipping."
1068
1069 # Do device-specific installation (eg, write radio image).
1070 device_specific.IncrementalOTA_InstallEnd()
1071
1072 if OPTIONS.extra_script is not None:
1073 script.AppendExtra(OPTIONS.extra_script)
1074
Doug Zongker922206e2014-03-04 13:16:24 -08001075 if OPTIONS.wipe_user_data:
1076 script.Print("Erasing user data...")
1077 script.FormatPartition("/data")
Tao Bao5d182562016-02-23 11:38:39 -08001078 metadata["ota-wipe"] = "yes"
Doug Zongker922206e2014-03-04 13:16:24 -08001079
Geremy Condra36bd3652014-02-06 19:45:10 -08001080 if OPTIONS.two_step:
1081 script.AppendExtra("""
1082set_stage("%(bcb_dev)s", "");
1083endif;
1084endif;
1085""" % bcb_dev)
1086
1087 script.SetProgress(1)
Tao Bao4996cf02016-03-08 17:53:39 -08001088 # For downgrade OTAs, we prefer to use the update-binary in the source
1089 # build that is actually newer than the one in the target build.
1090 if OPTIONS.downgrade:
1091 script.AddToZip(source_zip, output_zip, input_path=OPTIONS.updater_binary)
1092 else:
1093 script.AddToZip(target_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -08001094 metadata["ota-required-cache"] = str(script.required_cache)
Geremy Condra36bd3652014-02-06 19:45:10 -08001095 WriteMetadata(metadata, output_zip)
1096
Doug Zongker32b527d2014-03-04 10:03:02 -08001097
Tao Bao9bc6bb22015-11-09 16:58:28 -08001098def WriteVerifyPackage(input_zip, output_zip):
1099 script = edify_generator.EdifyGenerator(3, OPTIONS.info_dict)
1100
1101 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties")
1102 recovery_mount_options = OPTIONS.info_dict.get(
1103 "recovery_mount_options")
1104 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -07001105 if oem_props:
Tao Bao9bc6bb22015-11-09 16:58:28 -08001106 if OPTIONS.oem_source is None:
1107 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -08001108 if not OPTIONS.oem_no_mount:
1109 script.Mount("/oem", recovery_mount_options)
Tao Bao9bc6bb22015-11-09 16:58:28 -08001110 oem_dict = common.LoadDictionaryFromLines(
1111 open(OPTIONS.oem_source).readlines())
1112
1113 target_fp = CalculateFingerprint(oem_props, oem_dict, OPTIONS.info_dict)
1114 metadata = {
1115 "post-build": target_fp,
1116 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
1117 OPTIONS.info_dict),
1118 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
1119 }
1120
1121 device_specific = common.DeviceSpecificParams(
1122 input_zip=input_zip,
1123 input_version=OPTIONS.info_dict["recovery_api_version"],
1124 output_zip=output_zip,
1125 script=script,
1126 input_tmp=OPTIONS.input_tmp,
1127 metadata=metadata,
1128 info_dict=OPTIONS.info_dict)
1129
1130 AppendAssertions(script, OPTIONS.info_dict, oem_dict)
1131
1132 script.Print("Verifying device images against %s..." % target_fp)
1133 script.AppendExtra("")
1134
1135 script.Print("Verifying boot...")
1136 boot_img = common.GetBootableImage(
1137 "boot.img", "boot.img", OPTIONS.input_tmp, "BOOT")
1138 boot_type, boot_device = common.GetTypeAndDevice(
1139 "/boot", OPTIONS.info_dict)
1140 script.Verify("%s:%s:%d:%s" % (
1141 boot_type, boot_device, boot_img.size, boot_img.sha1))
1142 script.AppendExtra("")
1143
1144 script.Print("Verifying recovery...")
1145 recovery_img = common.GetBootableImage(
1146 "recovery.img", "recovery.img", OPTIONS.input_tmp, "RECOVERY")
1147 recovery_type, recovery_device = common.GetTypeAndDevice(
1148 "/recovery", OPTIONS.info_dict)
1149 script.Verify("%s:%s:%d:%s" % (
1150 recovery_type, recovery_device, recovery_img.size, recovery_img.sha1))
1151 script.AppendExtra("")
1152
1153 system_tgt = GetImage("system", OPTIONS.input_tmp, OPTIONS.info_dict)
1154 system_tgt.ResetFileMap()
1155 system_diff = common.BlockDifference("system", system_tgt, src=None)
1156 system_diff.WriteStrictVerifyScript(script)
1157
1158 if HasVendorPartition(input_zip):
1159 vendor_tgt = GetImage("vendor", OPTIONS.input_tmp, OPTIONS.info_dict)
1160 vendor_tgt.ResetFileMap()
1161 vendor_diff = common.BlockDifference("vendor", vendor_tgt, src=None)
1162 vendor_diff.WriteStrictVerifyScript(script)
1163
1164 # Device specific partitions, such as radio, bootloader and etc.
1165 device_specific.VerifyOTA_Assertions()
1166
1167 script.SetProgress(1.0)
1168 script.AddToZip(input_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -08001169 metadata["ota-required-cache"] = str(script.required_cache)
Tao Bao9bc6bb22015-11-09 16:58:28 -08001170 WriteMetadata(metadata, output_zip)
1171
1172
Tao Baoc098e9e2016-01-07 13:03:56 -08001173def WriteABOTAPackageWithBrilloScript(target_file, output_file,
1174 source_file=None):
1175 """Generate an Android OTA package that has A/B update payload."""
1176
Alex Deymod8d96ec2016-06-10 16:38:31 -07001177 # The place where the output from the subprocess should go.
1178 log_file = sys.stdout if OPTIONS.verbose else subprocess.PIPE
1179
Tao Baoc098e9e2016-01-07 13:03:56 -08001180 # Setup signing keys.
1181 if OPTIONS.package_key is None:
1182 OPTIONS.package_key = OPTIONS.info_dict.get(
1183 "default_system_dev_certificate",
1184 "build/target/product/security/testkey")
1185
Tao Baodea0f8b2016-06-20 17:55:06 -07001186 # A/B updater expects a signing key in RSA format. Gets the key ready for
1187 # later use in step 3, unless a payload_signer has been specified.
1188 if OPTIONS.payload_signer is None:
1189 cmd = ["openssl", "pkcs8",
1190 "-in", OPTIONS.package_key + OPTIONS.private_key_suffix,
1191 "-inform", "DER", "-nocrypt"]
1192 rsa_key = common.MakeTempFile(prefix="key-", suffix=".key")
1193 cmd.extend(["-out", rsa_key])
Tao Bao6047c242016-06-21 13:35:26 -07001194 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1195 p1.communicate()
Tao Baodea0f8b2016-06-20 17:55:06 -07001196 assert p1.returncode == 0, "openssl pkcs8 failed"
Tao Baoc098e9e2016-01-07 13:03:56 -08001197
Tao Baodea0f8b2016-06-20 17:55:06 -07001198 # Stage the output zip package for package signing.
Tao Baoc098e9e2016-01-07 13:03:56 -08001199 temp_zip_file = tempfile.NamedTemporaryFile()
1200 output_zip = zipfile.ZipFile(temp_zip_file, "w",
1201 compression=zipfile.ZIP_DEFLATED)
1202
1203 # Metadata to comply with Android OTA package format.
1204 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties", None)
1205 oem_dict = None
1206 if oem_props:
1207 if OPTIONS.oem_source is None:
1208 raise common.ExternalError("OEM source required for this build")
1209 oem_dict = common.LoadDictionaryFromLines(
1210 open(OPTIONS.oem_source).readlines())
1211
1212 metadata = {
1213 "post-build": CalculateFingerprint(oem_props, oem_dict,
1214 OPTIONS.info_dict),
Tianjie Xud06f07e2016-06-09 14:18:45 -07001215 "post-build-incremental" : GetBuildProp("ro.build.version.incremental",
1216 OPTIONS.info_dict),
Tao Baoc098e9e2016-01-07 13:03:56 -08001217 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
1218 OPTIONS.info_dict),
1219 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -08001220 "ota-required-cache": "0",
1221 "ota-type": "AB",
Tao Baoc098e9e2016-01-07 13:03:56 -08001222 }
1223
1224 if source_file is not None:
1225 metadata["pre-build"] = CalculateFingerprint(oem_props, oem_dict,
1226 OPTIONS.source_info_dict)
Tianjie Xud06f07e2016-06-09 14:18:45 -07001227 metadata["pre-build-incremental"] = GetBuildProp(
1228 "ro.build.version.incremental", OPTIONS.source_info_dict)
Tao Baoc098e9e2016-01-07 13:03:56 -08001229
1230 # 1. Generate payload.
1231 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
1232 cmd = ["brillo_update_payload", "generate",
1233 "--payload", payload_file,
1234 "--target_image", target_file]
1235 if source_file is not None:
1236 cmd.extend(["--source_image", source_file])
Alex Deymod8d96ec2016-06-10 16:38:31 -07001237 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1238 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001239 assert p1.returncode == 0, "brillo_update_payload generate failed"
1240
1241 # 2. Generate hashes of the payload and metadata files.
1242 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1243 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1244 cmd = ["brillo_update_payload", "hash",
1245 "--unsigned_payload", payload_file,
1246 "--signature_size", "256",
1247 "--metadata_hash_file", metadata_sig_file,
1248 "--payload_hash_file", payload_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001249 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1250 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001251 assert p1.returncode == 0, "brillo_update_payload hash failed"
1252
1253 # 3. Sign the hashes and insert them back into the payload file.
1254 signed_payload_sig_file = common.MakeTempFile(prefix="signed-sig-",
1255 suffix=".bin")
1256 signed_metadata_sig_file = common.MakeTempFile(prefix="signed-sig-",
1257 suffix=".bin")
1258 # 3a. Sign the payload hash.
Tao Baodea0f8b2016-06-20 17:55:06 -07001259 if OPTIONS.payload_signer is not None:
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001260 cmd = [OPTIONS.payload_signer]
1261 cmd.extend(OPTIONS.payload_signer_args)
Tao Baodea0f8b2016-06-20 17:55:06 -07001262 else:
1263 cmd = ["openssl", "pkeyutl", "-sign",
1264 "-inkey", rsa_key,
1265 "-pkeyopt", "digest:sha256"]
1266 cmd.extend(["-in", payload_sig_file,
1267 "-out", signed_payload_sig_file])
Alex Deymod8d96ec2016-06-10 16:38:31 -07001268 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1269 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001270 assert p1.returncode == 0, "openssl sign payload failed"
1271
1272 # 3b. Sign the metadata hash.
Tao Baodea0f8b2016-06-20 17:55:06 -07001273 if OPTIONS.payload_signer is not None:
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001274 cmd = [OPTIONS.payload_signer]
1275 cmd.extend(OPTIONS.payload_signer_args)
Tao Baodea0f8b2016-06-20 17:55:06 -07001276 else:
1277 cmd = ["openssl", "pkeyutl", "-sign",
1278 "-inkey", rsa_key,
1279 "-pkeyopt", "digest:sha256"]
1280 cmd.extend(["-in", metadata_sig_file,
1281 "-out", signed_metadata_sig_file])
Alex Deymod8d96ec2016-06-10 16:38:31 -07001282 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1283 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001284 assert p1.returncode == 0, "openssl sign metadata failed"
1285
1286 # 3c. Insert the signatures back into the payload file.
1287 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
1288 suffix=".bin")
1289 cmd = ["brillo_update_payload", "sign",
1290 "--unsigned_payload", payload_file,
1291 "--payload", signed_payload_file,
1292 "--signature_size", "256",
1293 "--metadata_signature_file", signed_metadata_sig_file,
1294 "--payload_signature_file", signed_payload_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001295 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1296 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001297 assert p1.returncode == 0, "brillo_update_payload sign failed"
1298
Alex Deymo19241c12016-02-04 22:29:29 -08001299 # 4. Dump the signed payload properties.
1300 properties_file = common.MakeTempFile(prefix="payload-properties-",
1301 suffix=".txt")
1302 cmd = ["brillo_update_payload", "properties",
1303 "--payload", signed_payload_file,
1304 "--properties_file", properties_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001305 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1306 p1.communicate()
Alex Deymo19241c12016-02-04 22:29:29 -08001307 assert p1.returncode == 0, "brillo_update_payload properties failed"
1308
Tao Bao7c5dc572016-06-14 17:48:11 -07001309 if OPTIONS.wipe_user_data:
1310 with open(properties_file, "a") as f:
1311 f.write("POWERWASH=1\n")
1312 metadata["ota-wipe"] = "yes"
1313
Alex Deymo19241c12016-02-04 22:29:29 -08001314 # Add the signed payload file and properties into the zip.
1315 common.ZipWrite(output_zip, properties_file, arcname="payload_properties.txt")
Tao Baoc098e9e2016-01-07 13:03:56 -08001316 common.ZipWrite(output_zip, signed_payload_file, arcname="payload.bin",
1317 compress_type=zipfile.ZIP_STORED)
1318 WriteMetadata(metadata, output_zip)
1319
Tianjie Xucfa86222016-03-07 16:31:19 -08001320 # If dm-verity is supported for the device, copy contents of care_map
1321 # into A/B OTA package.
1322 if OPTIONS.info_dict.get("verity") == "true":
1323 target_zip = zipfile.ZipFile(target_file, "r")
1324 care_map_path = "META/care_map.txt"
1325 namelist = target_zip.namelist()
1326 if care_map_path in namelist:
1327 care_map_data = target_zip.read(care_map_path)
1328 common.ZipWriteStr(output_zip, "care_map.txt", care_map_data)
1329 else:
1330 print "Warning: cannot find care map file in target_file package"
1331 common.ZipClose(target_zip)
1332
Tao Baoc098e9e2016-01-07 13:03:56 -08001333 # Sign the whole package to comply with the Android OTA package format.
1334 common.ZipClose(output_zip)
1335 SignOutput(temp_zip_file.name, output_file)
1336 temp_zip_file.close()
1337
1338
Dan Albert8b72aef2015-03-23 19:13:21 -07001339class FileDifference(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001340 def __init__(self, partition, source_zip, target_zip, output_zip):
Dan Albert8b72aef2015-03-23 19:13:21 -07001341 self.deferred_patch_list = None
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001342 print "Loading target..."
1343 self.target_data = target_data = LoadPartitionFiles(target_zip, partition)
1344 print "Loading source..."
1345 self.source_data = source_data = LoadPartitionFiles(source_zip, partition)
1346
1347 self.verbatim_targets = verbatim_targets = []
1348 self.patch_list = patch_list = []
1349 diffs = []
1350 self.renames = renames = {}
1351 known_paths = set()
1352 largest_source_size = 0
1353
1354 matching_file_cache = {}
1355 for fn, sf in source_data.items():
1356 assert fn == sf.name
1357 matching_file_cache["path:" + fn] = sf
1358 if fn in target_data.keys():
1359 AddToKnownPaths(fn, known_paths)
1360 # Only allow eligibility for filename/sha matching
1361 # if there isn't a perfect path match.
1362 if target_data.get(sf.name) is None:
1363 matching_file_cache["file:" + fn.split("/")[-1]] = sf
1364 matching_file_cache["sha:" + sf.sha1] = sf
1365
1366 for fn in sorted(target_data.keys()):
1367 tf = target_data[fn]
1368 assert fn == tf.name
1369 sf = ClosestFileMatch(tf, matching_file_cache, renames)
1370 if sf is not None and sf.name != tf.name:
1371 print "File has moved from " + sf.name + " to " + tf.name
1372 renames[sf.name] = tf
1373
1374 if sf is None or fn in OPTIONS.require_verbatim:
1375 # This file should be included verbatim
1376 if fn in OPTIONS.prohibit_verbatim:
1377 raise common.ExternalError("\"%s\" must be sent verbatim" % (fn,))
1378 print "send", fn, "verbatim"
1379 tf.AddToZip(output_zip)
Michael Runge63f01de2014-10-28 19:24:19 -07001380 verbatim_targets.append((fn, tf.size, tf.sha1))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001381 if fn in target_data.keys():
1382 AddToKnownPaths(fn, known_paths)
1383 elif tf.sha1 != sf.sha1:
1384 # File is different; consider sending as a patch
1385 diffs.append(common.Difference(tf, sf))
1386 else:
1387 # Target file data identical to source (may still be renamed)
1388 pass
1389
1390 common.ComputeDifferences(diffs)
1391
1392 for diff in diffs:
1393 tf, sf, d = diff.GetPatch()
1394 path = "/".join(tf.name.split("/")[:-1])
1395 if d is None or len(d) > tf.size * OPTIONS.patch_threshold or \
1396 path not in known_paths:
1397 # patch is almost as big as the file; don't bother patching
1398 # or a patch + rename cannot take place due to the target
1399 # directory not existing
1400 tf.AddToZip(output_zip)
Michael Runge63f01de2014-10-28 19:24:19 -07001401 verbatim_targets.append((tf.name, tf.size, tf.sha1))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001402 if sf.name in renames:
1403 del renames[sf.name]
1404 AddToKnownPaths(tf.name, known_paths)
1405 else:
1406 common.ZipWriteStr(output_zip, "patch/" + sf.name + ".p", d)
1407 patch_list.append((tf, sf, tf.size, common.sha1(d).hexdigest()))
1408 largest_source_size = max(largest_source_size, sf.size)
1409
1410 self.largest_source_size = largest_source_size
1411
1412 def EmitVerification(self, script):
1413 so_far = 0
Dan Albert8b72aef2015-03-23 19:13:21 -07001414 for tf, sf, _, _ in self.patch_list:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001415 if tf.name != sf.name:
1416 script.SkipNextActionIfTargetExists(tf.name, tf.sha1)
1417 script.PatchCheck("/"+sf.name, tf.sha1, sf.sha1)
1418 so_far += sf.size
1419 return so_far
1420
Michael Runge63f01de2014-10-28 19:24:19 -07001421 def EmitExplicitTargetVerification(self, script):
Dan Albert8b72aef2015-03-23 19:13:21 -07001422 for fn, _, sha1 in self.verbatim_targets:
1423 if fn[-1] != "/":
Michael Runge63f01de2014-10-28 19:24:19 -07001424 script.FileCheck("/"+fn, sha1)
1425 for tf, _, _, _ in self.patch_list:
1426 script.FileCheck(tf.name, tf.sha1)
1427
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001428 def RemoveUnneededFiles(self, script, extras=()):
Tao Baoa77d41e2015-09-03 21:17:37 -07001429 file_list = ["/" + i[0] for i in self.verbatim_targets]
1430 file_list += ["/" + i for i in self.source_data
1431 if i not in self.target_data and i not in self.renames]
1432 file_list += list(extras)
1433 # Sort the list in descending order, which removes all the files first
1434 # before attempting to remove the folder. (Bug: 22960996)
1435 script.DeleteFiles(sorted(file_list, reverse=True))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001436
1437 def TotalPatchSize(self):
1438 return sum(i[1].size for i in self.patch_list)
1439
1440 def EmitPatches(self, script, total_patch_size, so_far):
1441 self.deferred_patch_list = deferred_patch_list = []
1442 for item in self.patch_list:
Dan Albert8b72aef2015-03-23 19:13:21 -07001443 tf, sf, _, _ = item
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001444 if tf.name == "system/build.prop":
1445 deferred_patch_list.append(item)
1446 continue
Dan Albert8b72aef2015-03-23 19:13:21 -07001447 if sf.name != tf.name:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001448 script.SkipNextActionIfTargetExists(tf.name, tf.sha1)
Dan Albert8b72aef2015-03-23 19:13:21 -07001449 script.ApplyPatch("/" + sf.name, "-", tf.size, tf.sha1, sf.sha1,
1450 "patch/" + sf.name + ".p")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001451 so_far += tf.size
1452 script.SetProgress(so_far / total_patch_size)
1453 return so_far
1454
1455 def EmitDeferredPatches(self, script):
1456 for item in self.deferred_patch_list:
Dan Albert8b72aef2015-03-23 19:13:21 -07001457 tf, sf, _, _ = item
1458 script.ApplyPatch("/"+sf.name, "-", tf.size, tf.sha1, sf.sha1,
1459 "patch/" + sf.name + ".p")
1460 script.SetPermissions("/system/build.prop", 0, 0, 0o644, None, None)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001461
1462 def EmitRenames(self, script):
1463 if len(self.renames) > 0:
1464 script.Print("Renaming files...")
1465 for src, tgt in self.renames.iteritems():
1466 print "Renaming " + src + " to " + tgt.name
1467 script.RenameFile(src, tgt.name)
1468
1469
Doug Zongkerc77a9ad2010-09-16 11:28:43 -07001470def WriteIncrementalOTAPackage(target_zip, source_zip, output_zip):
Geremy Condra36bd3652014-02-06 19:45:10 -08001471 target_has_recovery_patch = HasRecoveryPatch(target_zip)
1472 source_has_recovery_patch = HasRecoveryPatch(source_zip)
1473
Doug Zongker26e66192014-02-20 13:22:07 -08001474 if (OPTIONS.block_based and
1475 target_has_recovery_patch and
1476 source_has_recovery_patch):
Geremy Condra36bd3652014-02-06 19:45:10 -08001477 return WriteBlockIncrementalOTAPackage(target_zip, source_zip, output_zip)
1478
Doug Zongker37974732010-09-16 17:44:38 -07001479 source_version = OPTIONS.source_info_dict["recovery_api_version"]
1480 target_version = OPTIONS.target_info_dict["recovery_api_version"]
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001481
Doug Zongker9ce2ebf2010-04-21 14:08:44 -07001482 if source_version == 0:
Tao Bao3e30d972016-03-15 13:20:19 -07001483 print("WARNING: generating edify script for a source that "
1484 "can't install it.")
Tao Bao34b47bf2015-06-22 19:17:41 -07001485 script = edify_generator.EdifyGenerator(
1486 source_version, OPTIONS.target_info_dict,
1487 fstab=OPTIONS.source_info_dict["fstab"])
Doug Zongkereef39442009-04-02 12:14:19 -07001488
Tao Bao34b47bf2015-06-22 19:17:41 -07001489 recovery_mount_options = OPTIONS.source_info_dict.get(
1490 "recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -07001491 source_oem_props = OPTIONS.source_info_dict.get("oem_fingerprint_properties")
1492 target_oem_props = OPTIONS.target_info_dict.get("oem_fingerprint_properties")
Michael Runge6e836112014-04-15 17:40:21 -07001493 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -07001494 if source_oem_props or target_oem_props:
Michael Runge6e836112014-04-15 17:40:21 -07001495 if OPTIONS.oem_source is None:
1496 raise common.ExternalError("OEM source required for this build")
Tao Bao1bb5a182016-03-04 09:45:03 -08001497 if not OPTIONS.oem_no_mount:
1498 script.Mount("/oem", recovery_mount_options)
Dan Albert8b72aef2015-03-23 19:13:21 -07001499 oem_dict = common.LoadDictionaryFromLines(
1500 open(OPTIONS.oem_source).readlines())
Michael Runge6e836112014-04-15 17:40:21 -07001501
Dan Albert8b72aef2015-03-23 19:13:21 -07001502 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -07001503 "pre-device": GetOemProperty("ro.product.device", source_oem_props,
1504 oem_dict, OPTIONS.source_info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -08001505 "ota-type": "FILE",
Dan Albert8b72aef2015-03-23 19:13:21 -07001506 }
Doug Zongker2ea21062010-04-28 16:05:21 -07001507
Tao Bao5d182562016-02-23 11:38:39 -08001508 post_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.target_info_dict)
1509 pre_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.source_info_dict)
1510 is_downgrade = long(post_timestamp) < long(pre_timestamp)
1511
1512 if OPTIONS.downgrade:
1513 metadata["ota-downgrade"] = "yes"
1514 if not is_downgrade:
1515 raise RuntimeError("--downgrade specified but no downgrade detected: "
1516 "pre: %s, post: %s" % (pre_timestamp, post_timestamp))
1517 else:
1518 if is_downgrade:
1519 # Non-fatal here to allow generating such a package which may require
1520 # manual work to adjust the post-timestamp. A legit use case is that we
1521 # cut a new build C (after having A and B), but want to enfore the
1522 # update path of A -> C -> B. Specifying --downgrade may not help since
1523 # that would enforce a data wipe for C -> B update.
1524 print("\nWARNING: downgrade detected: pre: %s, post: %s.\n"
1525 "The package may not be deployed properly. "
1526 "Try --downgrade?\n" % (pre_timestamp, post_timestamp))
1527 metadata["post-timestamp"] = post_timestamp
1528
Doug Zongker05d3dea2009-06-22 11:32:31 -07001529 device_specific = common.DeviceSpecificParams(
1530 source_zip=source_zip,
Doug Zongker14833602010-02-02 13:12:04 -08001531 source_version=source_version,
Doug Zongker05d3dea2009-06-22 11:32:31 -07001532 target_zip=target_zip,
Doug Zongker14833602010-02-02 13:12:04 -08001533 target_version=target_version,
Doug Zongker05d3dea2009-06-22 11:32:31 -07001534 output_zip=output_zip,
Doug Zongker2ea21062010-04-28 16:05:21 -07001535 script=script,
Doug Zongker96a57e72010-09-26 14:57:41 -07001536 metadata=metadata,
Tao Bao6f0b2192015-10-13 16:37:12 -07001537 info_dict=OPTIONS.source_info_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -07001538
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001539 system_diff = FileDifference("system", source_zip, target_zip, output_zip)
Michael Runge7cd99ba2014-10-22 17:21:48 -07001540 script.Mount("/system", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001541 if HasVendorPartition(target_zip):
1542 vendor_diff = FileDifference("vendor", source_zip, target_zip, output_zip)
Michael Runge7cd99ba2014-10-22 17:21:48 -07001543 script.Mount("/vendor", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001544 else:
1545 vendor_diff = None
Michael Runge6e836112014-04-15 17:40:21 -07001546
Tao Bao3e30d972016-03-15 13:20:19 -07001547 target_fp = CalculateFingerprint(target_oem_props, oem_dict,
Dan Albert8b72aef2015-03-23 19:13:21 -07001548 OPTIONS.target_info_dict)
Tao Bao3e30d972016-03-15 13:20:19 -07001549 source_fp = CalculateFingerprint(source_oem_props, oem_dict,
Dan Albert8b72aef2015-03-23 19:13:21 -07001550 OPTIONS.source_info_dict)
Michael Runge6e836112014-04-15 17:40:21 -07001551
Tao Bao3e30d972016-03-15 13:20:19 -07001552 if source_oem_props is None and target_oem_props is None:
Michael Runge6e836112014-04-15 17:40:21 -07001553 script.AssertSomeFingerprint(source_fp, target_fp)
Tao Bao3e30d972016-03-15 13:20:19 -07001554 elif source_oem_props is not None and target_oem_props is not None:
Michael Runge6e836112014-04-15 17:40:21 -07001555 script.AssertSomeThumbprint(
1556 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict),
1557 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -07001558 elif source_oem_props is None and target_oem_props is not None:
1559 script.AssertFingerprintOrThumbprint(
1560 source_fp,
1561 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict))
1562 else:
1563 script.AssertFingerprintOrThumbprint(
1564 target_fp,
1565 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Michael Runge6e836112014-04-15 17:40:21 -07001566
Doug Zongker2ea21062010-04-28 16:05:21 -07001567 metadata["pre-build"] = source_fp
1568 metadata["post-build"] = target_fp
Tianjie Xud06f07e2016-06-09 14:18:45 -07001569 metadata["pre-build-incremental"] = GetBuildProp(
1570 "ro.build.version.incremental", OPTIONS.source_info_dict)
1571 metadata["post-build-incremental"] = GetBuildProp(
1572 "ro.build.version.incremental", OPTIONS.target_info_dict)
Doug Zongkereef39442009-04-02 12:14:19 -07001573
Doug Zongker55d93282011-01-25 17:03:34 -08001574 source_boot = common.GetBootableImage(
Doug Zongkerd5131602012-08-02 14:46:42 -07001575 "/tmp/boot.img", "boot.img", OPTIONS.source_tmp, "BOOT",
1576 OPTIONS.source_info_dict)
Doug Zongker55d93282011-01-25 17:03:34 -08001577 target_boot = common.GetBootableImage(
1578 "/tmp/boot.img", "boot.img", OPTIONS.target_tmp, "BOOT")
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001579 updating_boot = (not OPTIONS.two_step and
1580 (source_boot.data != target_boot.data))
Doug Zongkereef39442009-04-02 12:14:19 -07001581
Doug Zongker55d93282011-01-25 17:03:34 -08001582 source_recovery = common.GetBootableImage(
Doug Zongkerd5131602012-08-02 14:46:42 -07001583 "/tmp/recovery.img", "recovery.img", OPTIONS.source_tmp, "RECOVERY",
1584 OPTIONS.source_info_dict)
Doug Zongker55d93282011-01-25 17:03:34 -08001585 target_recovery = common.GetBootableImage(
1586 "/tmp/recovery.img", "recovery.img", OPTIONS.target_tmp, "RECOVERY")
Doug Zongkerf6a8bad2009-05-29 11:41:21 -07001587 updating_recovery = (source_recovery.data != target_recovery.data)
Doug Zongkereef39442009-04-02 12:14:19 -07001588
Doug Zongker881dd402009-09-20 14:03:55 -07001589 # Here's how we divide up the progress bar:
1590 # 0.1 for verifying the start state (PatchCheck calls)
1591 # 0.8 for applying patches (ApplyPatch calls)
1592 # 0.1 for unpacking verbatim files, symlinking, and doing the
1593 # device-specific commands.
Doug Zongkereef39442009-04-02 12:14:19 -07001594
Michael Runge6e836112014-04-15 17:40:21 -07001595 AppendAssertions(script, OPTIONS.target_info_dict, oem_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -07001596 device_specific.IncrementalOTA_Assertions()
Doug Zongkereef39442009-04-02 12:14:19 -07001597
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001598 # Two-step incremental package strategy (in chronological order,
1599 # which is *not* the order in which the generated script has
1600 # things):
1601 #
1602 # if stage is not "2/3" or "3/3":
1603 # do verification on current system
1604 # write recovery image to boot partition
1605 # set stage to "2/3"
1606 # reboot to boot partition and restart recovery
1607 # else if stage is "2/3":
1608 # write recovery image to recovery partition
1609 # set stage to "3/3"
1610 # reboot to recovery partition and restart recovery
1611 # else:
1612 # (stage must be "3/3")
1613 # perform update:
1614 # patch system files, etc.
1615 # force full install of new boot image
1616 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -07001617 # complete script normally
1618 # (allow recovery to mark itself finished and reboot)
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001619
1620 if OPTIONS.two_step:
Tao Baodd24da92015-07-29 14:09:23 -07001621 if not OPTIONS.source_info_dict.get("multistage_support", None):
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001622 assert False, "two-step packages not supported by this build"
Tao Baodd24da92015-07-29 14:09:23 -07001623 fs = OPTIONS.source_info_dict["fstab"]["/misc"]
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001624 assert fs.fs_type.upper() == "EMMC", \
1625 "two-step packages only supported on devices with EMMC /misc partitions"
1626 bcb_dev = {"bcb_dev": fs.device}
1627 common.ZipWriteStr(output_zip, "recovery.img", target_recovery.data)
1628 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -07001629if get_stage("%(bcb_dev)s") == "2/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001630""" % bcb_dev)
Dan Albert8b72aef2015-03-23 19:13:21 -07001631 script.AppendExtra("sleep(20);\n")
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001632 script.WriteRawImage("/recovery", "recovery.img")
1633 script.AppendExtra("""
1634set_stage("%(bcb_dev)s", "3/3");
1635reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -07001636else if get_stage("%(bcb_dev)s") != "3/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001637""" % bcb_dev)
1638
Tao Bao6c55a8a2015-04-08 15:30:27 -07001639 # Dump fingerprints
1640 script.Print("Source: %s" % (source_fp,))
1641 script.Print("Target: %s" % (target_fp,))
1642
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001643 script.Print("Verifying current system...")
1644
Doug Zongkere5ff5902012-01-17 10:55:37 -08001645 device_specific.IncrementalOTA_VerifyBegin()
1646
Doug Zongker881dd402009-09-20 14:03:55 -07001647 script.ShowProgress(0.1, 0)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001648 so_far = system_diff.EmitVerification(script)
1649 if vendor_diff:
1650 so_far += vendor_diff.EmitVerification(script)
Doug Zongkereef39442009-04-02 12:14:19 -07001651
Tao Baod8d14be2016-02-04 14:26:02 -08001652 size = []
1653 if system_diff.patch_list:
1654 size.append(system_diff.largest_source_size)
1655 if vendor_diff:
1656 if vendor_diff.patch_list:
1657 size.append(vendor_diff.largest_source_size)
1658
Doug Zongker5da317e2009-06-02 13:38:17 -07001659 if updating_boot:
Doug Zongkerea5d7a92010-09-12 15:26:16 -07001660 d = common.Difference(target_boot, source_boot)
Doug Zongker761e6422009-09-25 10:45:39 -07001661 _, _, d = d.ComputePatch()
Doug Zongker5da317e2009-06-02 13:38:17 -07001662 print "boot target: %d source: %d diff: %d" % (
1663 target_boot.size, source_boot.size, len(d))
1664
Doug Zongker048e7ca2009-06-15 14:31:53 -07001665 common.ZipWriteStr(output_zip, "patch/boot.img.p", d)
Doug Zongker5da317e2009-06-02 13:38:17 -07001666
Tao Baodd24da92015-07-29 14:09:23 -07001667 boot_type, boot_device = common.GetTypeAndDevice(
1668 "/boot", OPTIONS.source_info_dict)
Doug Zongkerf2ab2902010-09-22 10:12:54 -07001669
1670 script.PatchCheck("%s:%s:%d:%s:%d:%s" %
1671 (boot_type, boot_device,
Doug Zongker67369982010-07-07 13:53:32 -07001672 source_boot.size, source_boot.sha1,
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001673 target_boot.size, target_boot.sha1))
Doug Zongker881dd402009-09-20 14:03:55 -07001674 so_far += source_boot.size
Tao Baod8d14be2016-02-04 14:26:02 -08001675 size.append(target_boot.size)
Doug Zongker5da317e2009-06-02 13:38:17 -07001676
Tao Baod8d14be2016-02-04 14:26:02 -08001677 if size:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001678 script.CacheFreeSpaceCheck(max(size))
Doug Zongker5a482092010-02-17 16:09:18 -08001679
Doug Zongker05d3dea2009-06-22 11:32:31 -07001680 device_specific.IncrementalOTA_VerifyEnd()
1681
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001682 if OPTIONS.two_step:
1683 script.WriteRawImage("/boot", "recovery.img")
1684 script.AppendExtra("""
1685set_stage("%(bcb_dev)s", "2/3");
1686reboot_now("%(bcb_dev)s", "");
1687else
1688""" % bcb_dev)
1689
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001690 script.Comment("---- start making changes here ----")
Doug Zongkereef39442009-04-02 12:14:19 -07001691
Doug Zongkere5ff5902012-01-17 10:55:37 -08001692 device_specific.IncrementalOTA_InstallBegin()
1693
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001694 if OPTIONS.two_step:
1695 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
1696 script.WriteRawImage("/boot", "boot.img")
1697 print "writing full boot image (forced by two-step mode)"
1698
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001699 script.Print("Removing unneeded files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001700 system_diff.RemoveUnneededFiles(script, ("/system/recovery.img",))
1701 if vendor_diff:
1702 vendor_diff.RemoveUnneededFiles(script)
Doug Zongkereef39442009-04-02 12:14:19 -07001703
Doug Zongker881dd402009-09-20 14:03:55 -07001704 script.ShowProgress(0.8, 0)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001705 total_patch_size = 1.0 + system_diff.TotalPatchSize()
1706 if vendor_diff:
1707 total_patch_size += vendor_diff.TotalPatchSize()
Doug Zongker881dd402009-09-20 14:03:55 -07001708 if updating_boot:
1709 total_patch_size += target_boot.size
Doug Zongker881dd402009-09-20 14:03:55 -07001710
1711 script.Print("Patching system files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001712 so_far = system_diff.EmitPatches(script, total_patch_size, 0)
1713 if vendor_diff:
1714 script.Print("Patching vendor files...")
1715 so_far = vendor_diff.EmitPatches(script, total_patch_size, so_far)
Doug Zongker881dd402009-09-20 14:03:55 -07001716
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001717 if not OPTIONS.two_step:
1718 if updating_boot:
1719 # Produce the boot image by applying a patch to the current
1720 # contents of the boot partition, and write it back to the
1721 # partition.
1722 script.Print("Patching boot image...")
1723 script.ApplyPatch("%s:%s:%d:%s:%d:%s"
1724 % (boot_type, boot_device,
1725 source_boot.size, source_boot.sha1,
1726 target_boot.size, target_boot.sha1),
1727 "-",
1728 target_boot.size, target_boot.sha1,
1729 source_boot.sha1, "patch/boot.img.p")
1730 so_far += target_boot.size
1731 script.SetProgress(so_far / total_patch_size)
1732 print "boot image changed; including."
1733 else:
1734 print "boot image unchanged; skipping."
Doug Zongkereef39442009-04-02 12:14:19 -07001735
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001736 system_items = ItemSet("system", "META/filesystem_config.txt")
1737 if vendor_diff:
1738 vendor_items = ItemSet("vendor", "META/vendor_filesystem_config.txt")
1739
Doug Zongkereef39442009-04-02 12:14:19 -07001740 if updating_recovery:
Doug Zongkerb32161a2012-08-21 10:33:44 -07001741 # Recovery is generated as a patch using both the boot image
1742 # (which contains the same linux kernel as recovery) and the file
1743 # /system/etc/recovery-resource.dat (which contains all the images
1744 # used in the recovery UI) as sources. This lets us minimize the
1745 # size of the patch, which must be included in every OTA package.
Doug Zongker73ef8252009-07-23 15:12:53 -07001746 #
Doug Zongkerb32161a2012-08-21 10:33:44 -07001747 # For older builds where recovery-resource.dat is not present, we
1748 # use only the boot image as the source.
1749
Doug Zongkerc9253822014-02-04 12:17:58 -08001750 if not target_has_recovery_patch:
1751 def output_sink(fn, data):
1752 common.ZipWriteStr(output_zip, "recovery/" + fn, data)
Dan Albert8b72aef2015-03-23 19:13:21 -07001753 system_items.Get("system/" + fn)
Doug Zongkerc9253822014-02-04 12:17:58 -08001754
1755 common.MakeRecoveryPatch(OPTIONS.target_tmp, output_sink,
1756 target_recovery, target_boot)
1757 script.DeleteFiles(["/system/recovery-from-boot.p",
Tao Baof2cffbd2015-07-22 12:33:18 -07001758 "/system/etc/recovery.img",
Doug Zongkerc9253822014-02-04 12:17:58 -08001759 "/system/etc/install-recovery.sh"])
Doug Zongker73ef8252009-07-23 15:12:53 -07001760 print "recovery image changed; including as patch from boot."
Doug Zongkereef39442009-04-02 12:14:19 -07001761 else:
1762 print "recovery image unchanged; skipping."
1763
Doug Zongker881dd402009-09-20 14:03:55 -07001764 script.ShowProgress(0.1, 10)
Doug Zongkereef39442009-04-02 12:14:19 -07001765
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001766 target_symlinks = CopyPartitionFiles(system_items, target_zip, None)
1767 if vendor_diff:
1768 target_symlinks.extend(CopyPartitionFiles(vendor_items, target_zip, None))
1769
1770 temp_script = script.MakeTemporary()
1771 system_items.GetMetadata(target_zip)
1772 system_items.Get("system").SetPermissions(temp_script)
1773 if vendor_diff:
1774 vendor_items.GetMetadata(target_zip)
1775 vendor_items.Get("vendor").SetPermissions(temp_script)
1776
1777 # Note that this call will mess up the trees of Items, so make sure
1778 # we're done with them.
1779 source_symlinks = CopyPartitionFiles(system_items, source_zip, None)
1780 if vendor_diff:
1781 source_symlinks.extend(CopyPartitionFiles(vendor_items, source_zip, None))
Doug Zongkereef39442009-04-02 12:14:19 -07001782
1783 target_symlinks_d = dict([(i[1], i[0]) for i in target_symlinks])
Doug Zongkereef39442009-04-02 12:14:19 -07001784 source_symlinks_d = dict([(i[1], i[0]) for i in source_symlinks])
1785
1786 # Delete all the symlinks in source that aren't in target. This
1787 # needs to happen before verbatim files are unpacked, in case a
1788 # symlink in the source is replaced by a real file in the target.
Tao Bao84006ea2015-09-02 10:28:08 -07001789
1790 # If a symlink in the source will be replaced by a regular file, we cannot
1791 # delete the symlink/file in case the package gets applied again. For such
1792 # a symlink, we prepend a sha1_check() to detect if it has been updated.
1793 # (Bug: 23646151)
1794 replaced_symlinks = dict()
1795 if system_diff:
1796 for i in system_diff.verbatim_targets:
1797 replaced_symlinks["/%s" % (i[0],)] = i[2]
1798 if vendor_diff:
1799 for i in vendor_diff.verbatim_targets:
1800 replaced_symlinks["/%s" % (i[0],)] = i[2]
1801
1802 if system_diff:
1803 for tf in system_diff.renames.values():
1804 replaced_symlinks["/%s" % (tf.name,)] = tf.sha1
1805 if vendor_diff:
1806 for tf in vendor_diff.renames.values():
1807 replaced_symlinks["/%s" % (tf.name,)] = tf.sha1
1808
1809 always_delete = []
1810 may_delete = []
Doug Zongkereef39442009-04-02 12:14:19 -07001811 for dest, link in source_symlinks:
1812 if link not in target_symlinks_d:
Tao Bao84006ea2015-09-02 10:28:08 -07001813 if link in replaced_symlinks:
1814 may_delete.append((link, replaced_symlinks[link]))
1815 else:
1816 always_delete.append(link)
1817 script.DeleteFiles(always_delete)
1818 script.DeleteFilesIfNotMatching(may_delete)
Doug Zongkereef39442009-04-02 12:14:19 -07001819
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001820 if system_diff.verbatim_targets:
1821 script.Print("Unpacking new system files...")
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001822 script.UnpackPackageDir("system", "/system")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001823 if vendor_diff and vendor_diff.verbatim_targets:
1824 script.Print("Unpacking new vendor files...")
1825 script.UnpackPackageDir("vendor", "/vendor")
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001826
Doug Zongkerc9253822014-02-04 12:17:58 -08001827 if updating_recovery and not target_has_recovery_patch:
Doug Zongker42265392010-02-12 10:21:00 -08001828 script.Print("Unpacking new recovery...")
1829 script.UnpackPackageDir("recovery", "/system")
1830
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001831 system_diff.EmitRenames(script)
1832 if vendor_diff:
1833 vendor_diff.EmitRenames(script)
Michael Runge4038aa82013-12-13 18:06:28 -08001834
Doug Zongker05d3dea2009-06-22 11:32:31 -07001835 script.Print("Symlinks and permissions...")
Doug Zongkereef39442009-04-02 12:14:19 -07001836
1837 # Create all the symlinks that don't already exist, or point to
1838 # somewhere different than what we want. Delete each symlink before
1839 # creating it, since the 'symlink' command won't overwrite.
1840 to_create = []
1841 for dest, link in target_symlinks:
1842 if link in source_symlinks_d:
1843 if dest != source_symlinks_d[link]:
1844 to_create.append((dest, link))
1845 else:
1846 to_create.append((dest, link))
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001847 script.DeleteFiles([i[1] for i in to_create])
1848 script.MakeSymlinks(to_create)
Doug Zongkereef39442009-04-02 12:14:19 -07001849
1850 # Now that the symlinks are created, we can set all the
1851 # permissions.
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001852 script.AppendScript(temp_script)
Doug Zongkereef39442009-04-02 12:14:19 -07001853
Doug Zongker881dd402009-09-20 14:03:55 -07001854 # Do device-specific installation (eg, write radio image).
Doug Zongker05d3dea2009-06-22 11:32:31 -07001855 device_specific.IncrementalOTA_InstallEnd()
1856
Doug Zongker1c390a22009-05-14 19:06:36 -07001857 if OPTIONS.extra_script is not None:
Doug Zongker67369982010-07-07 13:53:32 -07001858 script.AppendExtra(OPTIONS.extra_script)
Doug Zongker1c390a22009-05-14 19:06:36 -07001859
Doug Zongkere92f15a2011-08-26 13:46:40 -07001860 # Patch the build.prop file last, so if something fails but the
1861 # device can still come up, it appears to be the old build and will
1862 # get set the OTA package again to retry.
1863 script.Print("Patching remaining system files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001864 system_diff.EmitDeferredPatches(script)
Doug Zongkere92f15a2011-08-26 13:46:40 -07001865
Doug Zongker922206e2014-03-04 13:16:24 -08001866 if OPTIONS.wipe_user_data:
1867 script.Print("Erasing user data...")
1868 script.FormatPartition("/data")
Tao Bao5d182562016-02-23 11:38:39 -08001869 metadata["ota-wipe"] = "yes"
Doug Zongker922206e2014-03-04 13:16:24 -08001870
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001871 if OPTIONS.two_step:
1872 script.AppendExtra("""
1873set_stage("%(bcb_dev)s", "");
1874endif;
1875endif;
1876""" % bcb_dev)
1877
Michael Runge63f01de2014-10-28 19:24:19 -07001878 if OPTIONS.verify and system_diff:
1879 script.Print("Remounting and verifying system partition files...")
1880 script.Unmount("/system")
Tao Bao269d7852015-12-02 15:49:13 -08001881 script.Mount("/system", recovery_mount_options)
Michael Runge63f01de2014-10-28 19:24:19 -07001882 system_diff.EmitExplicitTargetVerification(script)
1883
1884 if OPTIONS.verify and vendor_diff:
1885 script.Print("Remounting and verifying vendor partition files...")
1886 script.Unmount("/vendor")
Tao Bao269d7852015-12-02 15:49:13 -08001887 script.Mount("/vendor", recovery_mount_options)
Michael Runge63f01de2014-10-28 19:24:19 -07001888 vendor_diff.EmitExplicitTargetVerification(script)
Tao Bao4996cf02016-03-08 17:53:39 -08001889
1890 # For downgrade OTAs, we prefer to use the update-binary in the source
1891 # build that is actually newer than the one in the target build.
1892 if OPTIONS.downgrade:
1893 script.AddToZip(source_zip, output_zip, input_path=OPTIONS.updater_binary)
1894 else:
1895 script.AddToZip(target_zip, output_zip, input_path=OPTIONS.updater_binary)
Michael Runge63f01de2014-10-28 19:24:19 -07001896
Tao Baod8d14be2016-02-04 14:26:02 -08001897 metadata["ota-required-cache"] = str(script.required_cache)
Doug Zongker2ea21062010-04-28 16:05:21 -07001898 WriteMetadata(metadata, output_zip)
Doug Zongkereef39442009-04-02 12:14:19 -07001899
1900
1901def main(argv):
1902
1903 def option_handler(o, a):
Doug Zongker25568482014-03-03 10:21:27 -08001904 if o == "--board_config":
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001905 pass # deprecated
Doug Zongkereef39442009-04-02 12:14:19 -07001906 elif o in ("-k", "--package_key"):
1907 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001908 elif o in ("-i", "--incremental_from"):
1909 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001910 elif o == "--full_radio":
1911 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001912 elif o == "--full_bootloader":
1913 OPTIONS.full_bootloader = True
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001914 elif o in ("-w", "--wipe_user_data"):
1915 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001916 elif o == "--downgrade":
1917 OPTIONS.downgrade = True
1918 OPTIONS.wipe_user_data = True
Michael Runge6e836112014-04-15 17:40:21 -07001919 elif o in ("-o", "--oem_settings"):
1920 OPTIONS.oem_source = a
Tao Bao8608cde2016-02-25 19:49:55 -08001921 elif o == "--oem_no_mount":
1922 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001923 elif o in ("-e", "--extra_script"):
1924 OPTIONS.extra_script = a
Hristo Bojinovdafb0422010-08-26 14:35:16 -07001925 elif o in ("-a", "--aslr_mode"):
1926 if a in ("on", "On", "true", "True", "yes", "Yes"):
1927 OPTIONS.aslr_mode = True
1928 else:
1929 OPTIONS.aslr_mode = False
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001930 elif o in ("-t", "--worker_threads"):
1931 if a.isdigit():
1932 OPTIONS.worker_threads = int(a)
1933 else:
1934 raise ValueError("Cannot parse value %r for option %r - only "
1935 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001936 elif o in ("-2", "--two_step"):
1937 OPTIONS.two_step = True
Doug Zongker26e66192014-02-20 13:22:07 -08001938 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001939 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001940 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001941 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001942 elif o == "--block":
1943 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001944 elif o in ("-b", "--binary"):
1945 OPTIONS.updater_binary = a
Doug Zongker62d4f182014-08-04 16:06:43 -07001946 elif o in ("--no_fallback_to_full",):
1947 OPTIONS.fallback_to_full = False
Tao Bao8dcf7382015-05-21 14:09:49 -07001948 elif o == "--stash_threshold":
1949 try:
1950 OPTIONS.stash_threshold = float(a)
1951 except ValueError:
1952 raise ValueError("Cannot parse value %r for option %r - expecting "
1953 "a float" % (a, o))
Tao Bao9bc6bb22015-11-09 16:58:28 -08001954 elif o == "--gen_verify":
1955 OPTIONS.gen_verify = True
Tao Baod62c6032015-11-30 09:40:20 -08001956 elif o == "--log_diff":
1957 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001958 elif o == "--payload_signer":
1959 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001960 elif o == "--payload_signer_args":
1961 OPTIONS.payload_signer_args = shlex.split(a)
Doug Zongkereef39442009-04-02 12:14:19 -07001962 else:
1963 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001964 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001965
1966 args = common.ParseOptions(argv, __doc__,
Elliott Hughesd8a52f92016-06-20 14:35:47 -07001967 extra_opts="b:k:i:d:we:t:a:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001968 extra_long_opts=[
1969 "board_config=",
1970 "package_key=",
1971 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001972 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001973 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001974 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001975 "downgrade",
Dan Albert8b72aef2015-03-23 19:13:21 -07001976 "extra_script=",
1977 "worker_threads=",
1978 "aslr_mode=",
1979 "two_step",
1980 "no_signing",
1981 "block",
1982 "binary=",
1983 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001984 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001985 "verify",
1986 "no_fallback_to_full",
Tao Bao8dcf7382015-05-21 14:09:49 -07001987 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001988 "gen_verify",
1989 "log_diff=",
Tao Baodea0f8b2016-06-20 17:55:06 -07001990 "payload_signer=",
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001991 "payload_signer_args=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001992 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001993
1994 if len(args) != 2:
1995 common.Usage(__doc__)
1996 sys.exit(1)
1997
Tao Bao5d182562016-02-23 11:38:39 -08001998 if OPTIONS.downgrade:
1999 # Sanity check to enforce a data wipe.
2000 if not OPTIONS.wipe_user_data:
2001 raise ValueError("Cannot downgrade without a data wipe")
2002
2003 # We should only allow downgrading incrementals (as opposed to full).
2004 # Otherwise the device may go back from arbitrary build with this full
2005 # OTA package.
2006 if OPTIONS.incremental_source is None:
Elliott Hughesd8a52f92016-06-20 14:35:47 -07002007 raise ValueError("Cannot generate downgradable full OTAs")
Tao Bao5d182562016-02-23 11:38:39 -08002008
Tao Baoc098e9e2016-01-07 13:03:56 -08002009 # Load the dict file from the zip directly to have a peek at the OTA type.
2010 # For packages using A/B update, unzipping is not needed.
2011 input_zip = zipfile.ZipFile(args[0], "r")
2012 OPTIONS.info_dict = common.LoadInfoDict(input_zip)
2013 common.ZipClose(input_zip)
2014
2015 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
2016
2017 if ab_update:
2018 if OPTIONS.incremental_source is not None:
2019 OPTIONS.target_info_dict = OPTIONS.info_dict
2020 source_zip = zipfile.ZipFile(OPTIONS.incremental_source, "r")
2021 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip)
2022 common.ZipClose(source_zip)
2023
2024 if OPTIONS.verbose:
2025 print "--- target info ---"
2026 common.DumpInfoDict(OPTIONS.info_dict)
2027
2028 if OPTIONS.incremental_source is not None:
2029 print "--- source info ---"
2030 common.DumpInfoDict(OPTIONS.source_info_dict)
2031
2032 WriteABOTAPackageWithBrilloScript(
2033 target_file=args[0],
2034 output_file=args[1],
2035 source_file=OPTIONS.incremental_source)
2036
2037 print "done."
2038 return
2039
Doug Zongker1c390a22009-05-14 19:06:36 -07002040 if OPTIONS.extra_script is not None:
2041 OPTIONS.extra_script = open(OPTIONS.extra_script).read()
2042
Doug Zongkereef39442009-04-02 12:14:19 -07002043 print "unzipping target target-files..."
Doug Zongker55d93282011-01-25 17:03:34 -08002044 OPTIONS.input_tmp, input_zip = common.UnzipTemp(args[0])
Doug Zongkerfdd8e692009-08-03 17:27:48 -07002045
Doug Zongkereef39442009-04-02 12:14:19 -07002046 OPTIONS.target_tmp = OPTIONS.input_tmp
Tao Bao2c15d9e2015-07-09 11:51:16 -07002047 OPTIONS.info_dict = common.LoadInfoDict(input_zip, OPTIONS.target_tmp)
Kenny Roote2e9f612013-05-29 12:59:35 -07002048
Doug Zongker37974732010-09-16 17:44:38 -07002049 if OPTIONS.verbose:
2050 print "--- target info ---"
2051 common.DumpInfoDict(OPTIONS.info_dict)
2052
Doug Zongkereb0a78a2014-01-27 10:01:06 -08002053 # If the caller explicitly specified the device-specific extensions
2054 # path via -s/--device_specific, use that. Otherwise, use
2055 # META/releasetools.py if it is present in the target target_files.
2056 # Otherwise, take the path of the file from 'tool_extensions' in the
2057 # info dict and look for that in the local filesystem, relative to
2058 # the current directory.
2059
Doug Zongker37974732010-09-16 17:44:38 -07002060 if OPTIONS.device_specific is None:
Doug Zongkereb0a78a2014-01-27 10:01:06 -08002061 from_input = os.path.join(OPTIONS.input_tmp, "META", "releasetools.py")
2062 if os.path.exists(from_input):
2063 print "(using device-specific extensions from target_files)"
2064 OPTIONS.device_specific = from_input
2065 else:
2066 OPTIONS.device_specific = OPTIONS.info_dict.get("tool_extensions", None)
2067
Doug Zongker37974732010-09-16 17:44:38 -07002068 if OPTIONS.device_specific is not None:
Doug Zongkereb0a78a2014-01-27 10:01:06 -08002069 OPTIONS.device_specific = os.path.abspath(OPTIONS.device_specific)
Doug Zongker37974732010-09-16 17:44:38 -07002070
Tao Baoc098e9e2016-01-07 13:03:56 -08002071 if OPTIONS.info_dict.get("no_recovery") == "true":
Tao Baodb45efa2015-10-27 19:25:18 -07002072 raise common.ExternalError(
2073 "--- target build has specified no recovery ---")
2074
Tao Bao767e3ac2015-11-10 12:19:19 -08002075 # Use the default key to sign the package if not specified with package_key.
2076 if not OPTIONS.no_signing:
2077 if OPTIONS.package_key is None:
2078 OPTIONS.package_key = OPTIONS.info_dict.get(
2079 "default_system_dev_certificate",
2080 "build/target/product/security/testkey")
Doug Zongkereef39442009-04-02 12:14:19 -07002081
Tao Bao767e3ac2015-11-10 12:19:19 -08002082 # Set up the output zip. Create a temporary zip file if signing is needed.
2083 if OPTIONS.no_signing:
2084 if os.path.exists(args[1]):
2085 os.unlink(args[1])
2086 output_zip = zipfile.ZipFile(args[1], "w",
2087 compression=zipfile.ZIP_DEFLATED)
2088 else:
2089 temp_zip_file = tempfile.NamedTemporaryFile()
2090 output_zip = zipfile.ZipFile(temp_zip_file, "w",
2091 compression=zipfile.ZIP_DEFLATED)
Doug Zongker62d4f182014-08-04 16:06:43 -07002092
Daniel Rosenberg40ef35b2015-11-10 19:21:34 -08002093 # Non A/B OTAs rely on /cache partition to store temporary files.
Tao Bao767e3ac2015-11-10 12:19:19 -08002094 cache_size = OPTIONS.info_dict.get("cache_size", None)
Tao Baoc098e9e2016-01-07 13:03:56 -08002095 if cache_size is None:
Tao Bao767e3ac2015-11-10 12:19:19 -08002096 print "--- can't determine the cache partition size ---"
2097 OPTIONS.cache_size = cache_size
Tao Bao8dcf7382015-05-21 14:09:49 -07002098
Tao Bao9bc6bb22015-11-09 16:58:28 -08002099 # Generate a verify package.
2100 if OPTIONS.gen_verify:
2101 WriteVerifyPackage(input_zip, output_zip)
2102
Tao Bao767e3ac2015-11-10 12:19:19 -08002103 # Generate a full OTA.
Tao Bao9bc6bb22015-11-09 16:58:28 -08002104 elif OPTIONS.incremental_source is None:
Tao Baoc098e9e2016-01-07 13:03:56 -08002105 WriteFullOTAPackage(input_zip, output_zip)
Tao Bao767e3ac2015-11-10 12:19:19 -08002106
2107 # Generate an incremental OTA. It will fall back to generate a full OTA on
2108 # failure unless no_fallback_to_full is specified.
2109 else:
2110 print "unzipping source target-files..."
2111 OPTIONS.source_tmp, source_zip = common.UnzipTemp(
2112 OPTIONS.incremental_source)
2113 OPTIONS.target_info_dict = OPTIONS.info_dict
2114 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip,
2115 OPTIONS.source_tmp)
2116 if OPTIONS.verbose:
2117 print "--- source info ---"
2118 common.DumpInfoDict(OPTIONS.source_info_dict)
2119 try:
2120 WriteIncrementalOTAPackage(input_zip, source_zip, output_zip)
Tao Baod62c6032015-11-30 09:40:20 -08002121 if OPTIONS.log_diff:
2122 out_file = open(OPTIONS.log_diff, 'w')
2123 import target_files_diff
2124 target_files_diff.recursiveDiff('',
2125 OPTIONS.source_tmp,
2126 OPTIONS.input_tmp,
2127 out_file)
2128 out_file.close()
Tao Bao767e3ac2015-11-10 12:19:19 -08002129 except ValueError:
2130 if not OPTIONS.fallback_to_full:
2131 raise
2132 print "--- failed to build incremental; falling back to full ---"
2133 OPTIONS.incremental_source = None
Doug Zongker62d4f182014-08-04 16:06:43 -07002134 WriteFullOTAPackage(input_zip, output_zip)
Doug Zongker62d4f182014-08-04 16:06:43 -07002135
Tao Bao767e3ac2015-11-10 12:19:19 -08002136 common.ZipClose(output_zip)
Doug Zongkerafb32ea2011-09-22 10:28:04 -07002137
Tao Bao767e3ac2015-11-10 12:19:19 -08002138 # Sign the generated zip package unless no_signing is specified.
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09002139 if not OPTIONS.no_signing:
2140 SignOutput(temp_zip_file.name, args[1])
2141 temp_zip_file.close()
Doug Zongkereef39442009-04-02 12:14:19 -07002142
Doug Zongkereef39442009-04-02 12:14:19 -07002143 print "done."
2144
2145
2146if __name__ == '__main__':
2147 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08002148 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07002149 main(sys.argv[1:])
Dan Albert8b72aef2015-03-23 19:13:21 -07002150 except common.ExternalError as e:
Doug Zongkereef39442009-04-02 12:14:19 -07002151 print
2152 print " ERROR: %s" % (e,)
2153 print
2154 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07002155 finally:
2156 common.Cleanup()