blob: 777ddbe3bae5c706e4bbcd7cdffbf88a81204a94 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
18Given a target-files zipfile, produces an OTA package that installs
19that build. An incremental OTA is produced if -i is given, otherwise
20a full OTA is produced.
21
22Usage: ota_from_target_files [flags] input_target_files output_ota_package
23
Doug Zongker25568482014-03-03 10:21:27 -080024 --board_config <file>
Doug Zongkerfdd8e692009-08-03 17:27:48 -070025 Deprecated.
Doug Zongkereef39442009-04-02 12:14:19 -070026
Doug Zongkerafb32ea2011-09-22 10:28:04 -070027 -k (--package_key) <key> Key to use to sign the package (default is
28 the value of default_system_dev_certificate from the input
29 target-files's META/misc_info.txt, or
30 "build/target/product/security/testkey" if that value is not
31 specified).
32
33 For incremental OTAs, the default value is based on the source
34 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070035
36 -i (--incremental_from) <file>
37 Generate an incremental OTA using the given target-files zip as
38 the starting build.
39
Tao Bao43078aa2015-04-21 14:32:35 -070040 --full_radio
41 When generating an incremental OTA, always include a full copy of
42 radio image. This option is only meaningful when -i is specified,
43 because a full radio is always included in a full OTA if applicable.
44
leozwangaa6c1a12015-08-14 10:57:58 -070045 --full_bootloader
46 Similar to --full_radio. When generating an incremental OTA, always
47 include a full copy of bootloader image.
48
Michael Runge63f01de2014-10-28 19:24:19 -070049 -v (--verify)
50 Remount and verify the checksums of the files written to the
51 system and vendor (if used) partitions. Incremental builds only.
52
Michael Runge6e836112014-04-15 17:40:21 -070053 -o (--oem_settings) <file>
54 Use the file to specify the expected OEM-specific properties
55 on the OEM partition of the intended device.
56
Tao Bao8608cde2016-02-25 19:49:55 -080057 --oem_no_mount
58 For devices with OEM-specific properties but without an OEM partition,
59 do not mount the OEM partition in the updater-script. This should be
60 very rarely used, since it's expected to have a dedicated OEM partition
61 for OEM-specific properties. Only meaningful when -o is specified.
62
Doug Zongkerdbfaae52009-04-21 17:12:54 -070063 -w (--wipe_user_data)
64 Generate an OTA package that will wipe the user data partition
65 when installed.
66
Tao Bao5d182562016-02-23 11:38:39 -080067 --downgrade
68 Intentionally generate an incremental OTA that updates from a newer
69 build to an older one (based on timestamp comparison). "post-timestamp"
70 will be replaced by "ota-downgrade=yes" in the metadata file. A data
71 wipe will always be enforced, so "ota-wipe=yes" will also be included in
Tao Bao4996cf02016-03-08 17:53:39 -080072 the metadata file. The update-binary in the source build will be used in
73 the OTA package, unless --binary flag is specified.
Tao Bao5d182562016-02-23 11:38:39 -080074
Doug Zongker1c390a22009-05-14 19:06:36 -070075 -e (--extra_script) <file>
76 Insert the contents of file at the end of the update script.
77
Hristo Bojinovdafb0422010-08-26 14:35:16 -070078 -a (--aslr_mode) <on|off>
79 Specify whether to turn on ASLR for the package (on by default).
Stephen Smalley56882bf2012-02-09 13:36:21 -050080
Doug Zongker9b23f2c2013-11-25 14:44:12 -080081 -2 (--two_step)
82 Generate a 'two-step' OTA package, where recovery is updated
83 first, so that any changes made to the system partition are done
84 using the new recovery (new kernel, etc.).
85
Doug Zongker26e66192014-02-20 13:22:07 -080086 --block
87 Generate a block-based OTA if possible. Will fall back to a
88 file-based OTA if the target_files is older and doesn't support
89 block-based OTAs.
90
Doug Zongker25568482014-03-03 10:21:27 -080091 -b (--binary) <file>
92 Use the given binary as the update-binary in the output package,
93 instead of the binary in the build's target_files. Use for
94 development only.
95
Martin Blumenstingl374e1142014-05-31 20:42:55 +020096 -t (--worker_threads) <int>
97 Specifies the number of worker-threads that will be used when
98 generating patches for incremental updates (defaults to 3).
99
Tao Bao8dcf7382015-05-21 14:09:49 -0700100 --stash_threshold <float>
101 Specifies the threshold that will be used to compute the maximum
102 allowed stash size (defaults to 0.8).
Tao Bao9bc6bb22015-11-09 16:58:28 -0800103
104 --gen_verify
105 Generate an OTA package that verifies the partitions.
Tao Baod62c6032015-11-30 09:40:20 -0800106
107 --log_diff <file>
108 Generate a log file that shows the differences in the source and target
109 builds for an incremental package. This option is only meaningful when
110 -i is specified.
Doug Zongkereef39442009-04-02 12:14:19 -0700111"""
112
113import sys
114
Doug Zongkercf6d5a92014-02-18 10:57:07 -0800115if sys.hexversion < 0x02070000:
116 print >> sys.stderr, "Python 2.7 or newer is required."
Doug Zongkereef39442009-04-02 12:14:19 -0700117 sys.exit(1)
118
Doug Zongkerfc44a512014-08-26 13:10:25 -0700119import multiprocessing
Doug Zongkereef39442009-04-02 12:14:19 -0700120import os
Tao Baoc098e9e2016-01-07 13:03:56 -0800121import subprocess
Doug Zongkereef39442009-04-02 12:14:19 -0700122import tempfile
Doug Zongkereef39442009-04-02 12:14:19 -0700123import zipfile
124
125import common
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700126import edify_generator
Doug Zongkerfc44a512014-08-26 13:10:25 -0700127import sparse_img
Doug Zongkereef39442009-04-02 12:14:19 -0700128
129OPTIONS = common.OPTIONS
Doug Zongkerafb32ea2011-09-22 10:28:04 -0700130OPTIONS.package_key = None
Doug Zongkereef39442009-04-02 12:14:19 -0700131OPTIONS.incremental_source = None
Michael Runge63f01de2014-10-28 19:24:19 -0700132OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700133OPTIONS.require_verbatim = set()
134OPTIONS.prohibit_verbatim = set(("system/build.prop",))
135OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700136OPTIONS.wipe_user_data = False
Tao Bao5d182562016-02-23 11:38:39 -0800137OPTIONS.downgrade = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700138OPTIONS.extra_script = None
Hristo Bojinovdafb0422010-08-26 14:35:16 -0700139OPTIONS.aslr_mode = True
Doug Zongkerfc44a512014-08-26 13:10:25 -0700140OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
141if OPTIONS.worker_threads == 0:
142 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800143OPTIONS.two_step = False
Takeshi Kanemotoe153b342013-11-14 17:20:50 +0900144OPTIONS.no_signing = False
Doug Zongker26e66192014-02-20 13:22:07 -0800145OPTIONS.block_based = False
Doug Zongker25568482014-03-03 10:21:27 -0800146OPTIONS.updater_binary = None
Michael Runge6e836112014-04-15 17:40:21 -0700147OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800148OPTIONS.oem_no_mount = False
Doug Zongker62d4f182014-08-04 16:06:43 -0700149OPTIONS.fallback_to_full = True
Tao Bao43078aa2015-04-21 14:32:35 -0700150OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700151OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700152# Stash size cannot exceed cache_size * threshold.
153OPTIONS.cache_size = None
154OPTIONS.stash_threshold = 0.8
Tao Bao9bc6bb22015-11-09 16:58:28 -0800155OPTIONS.gen_verify = False
Tao Baod62c6032015-11-30 09:40:20 -0800156OPTIONS.log_diff = None
Tao Bao8dcf7382015-05-21 14:09:49 -0700157
Doug Zongkereef39442009-04-02 12:14:19 -0700158def MostPopularKey(d, default):
159 """Given a dict, return the key corresponding to the largest
160 value. Returns 'default' if the dict is empty."""
161 x = [(v, k) for (k, v) in d.iteritems()]
Dan Albert8b72aef2015-03-23 19:13:21 -0700162 if not x:
163 return default
Doug Zongkereef39442009-04-02 12:14:19 -0700164 x.sort()
165 return x[-1][1]
166
167
168def IsSymlink(info):
169 """Return true if the zipfile.ZipInfo object passed in represents a
170 symlink."""
Ying Wang2ffb3142015-07-06 14:02:01 -0700171 return (info.external_attr >> 16) & 0o770000 == 0o120000
Doug Zongkereef39442009-04-02 12:14:19 -0700172
Hristo Bojinov96be7202010-08-02 10:26:17 -0700173def IsRegular(info):
174 """Return true if the zipfile.ZipInfo object passed in represents a
Ying Wang2ffb3142015-07-06 14:02:01 -0700175 regular file."""
176 return (info.external_attr >> 16) & 0o770000 == 0o100000
Doug Zongkereef39442009-04-02 12:14:19 -0700177
Michael Runge4038aa82013-12-13 18:06:28 -0800178def ClosestFileMatch(src, tgtfiles, existing):
179 """Returns the closest file match between a source file and list
180 of potential matches. The exact filename match is preferred,
181 then the sha1 is searched for, and finally a file with the same
182 basename is evaluated. Rename support in the updater-binary is
183 required for the latter checks to be used."""
184
185 result = tgtfiles.get("path:" + src.name)
186 if result is not None:
187 return result
188
189 if not OPTIONS.target_info_dict.get("update_rename_support", False):
190 return None
191
192 if src.size < 1000:
193 return None
194
195 result = tgtfiles.get("sha1:" + src.sha1)
196 if result is not None and existing.get(result.name) is None:
197 return result
198 result = tgtfiles.get("file:" + src.name.split("/")[-1])
199 if result is not None and existing.get(result.name) is None:
200 return result
201 return None
202
Dan Albert8b72aef2015-03-23 19:13:21 -0700203class ItemSet(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700204 def __init__(self, partition, fs_config):
205 self.partition = partition
206 self.fs_config = fs_config
207 self.ITEMS = {}
Doug Zongkereef39442009-04-02 12:14:19 -0700208
Dan Albert8b72aef2015-03-23 19:13:21 -0700209 def Get(self, name, is_dir=False):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700210 if name not in self.ITEMS:
Dan Albert8b72aef2015-03-23 19:13:21 -0700211 self.ITEMS[name] = Item(self, name, is_dir=is_dir)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700212 return self.ITEMS[name]
Doug Zongkereef39442009-04-02 12:14:19 -0700213
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700214 def GetMetadata(self, input_zip):
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700215 # The target_files contains a record of what the uid,
216 # gid, and mode are supposed to be.
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700217 output = input_zip.read(self.fs_config)
Doug Zongkereef39442009-04-02 12:14:19 -0700218
219 for line in output.split("\n"):
Dan Albert8b72aef2015-03-23 19:13:21 -0700220 if not line:
221 continue
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700222 columns = line.split()
223 name, uid, gid, mode = columns[:4]
224 selabel = None
225 capabilities = None
226
227 # After the first 4 columns, there are a series of key=value
228 # pairs. Extract out the fields we care about.
229 for element in columns[4:]:
230 key, value = element.split("=")
231 if key == "selabel":
232 selabel = value
233 if key == "capabilities":
234 capabilities = value
235
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700236 i = self.ITEMS.get(name, None)
Doug Zongker283e2a12010-03-15 17:52:32 -0700237 if i is not None:
238 i.uid = int(uid)
239 i.gid = int(gid)
240 i.mode = int(mode, 8)
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700241 i.selabel = selabel
242 i.capabilities = capabilities
Dan Albert8b72aef2015-03-23 19:13:21 -0700243 if i.is_dir:
Doug Zongker283e2a12010-03-15 17:52:32 -0700244 i.children.sort(key=lambda i: i.name)
245
Tao Baof2cffbd2015-07-22 12:33:18 -0700246 # Set metadata for the files generated by this script. For full recovery
247 # image at system/etc/recovery.img, it will be taken care by fs_config.
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700248 i = self.ITEMS.get("system/recovery-from-boot.p", None)
Dan Albert8b72aef2015-03-23 19:13:21 -0700249 if i:
250 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o644, None, None
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700251 i = self.ITEMS.get("system/etc/install-recovery.sh", None)
Dan Albert8b72aef2015-03-23 19:13:21 -0700252 if i:
253 i.uid, i.gid, i.mode, i.selabel, i.capabilities = 0, 0, 0o544, None, None
Doug Zongkereef39442009-04-02 12:14:19 -0700254
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700255
Dan Albert8b72aef2015-03-23 19:13:21 -0700256class Item(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700257 """Items represent the metadata (user, group, mode) of files and
258 directories in the system image."""
Dan Albert8b72aef2015-03-23 19:13:21 -0700259 def __init__(self, itemset, name, is_dir=False):
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700260 self.itemset = itemset
261 self.name = name
262 self.uid = None
263 self.gid = None
264 self.mode = None
265 self.selabel = None
266 self.capabilities = None
Dan Albert8b72aef2015-03-23 19:13:21 -0700267 self.is_dir = is_dir
268 self.descendants = None
269 self.best_subtree = None
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700270
271 if name:
Dan Albert8b72aef2015-03-23 19:13:21 -0700272 self.parent = itemset.Get(os.path.dirname(name), is_dir=True)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700273 self.parent.children.append(self)
274 else:
275 self.parent = None
Dan Albert8b72aef2015-03-23 19:13:21 -0700276 if self.is_dir:
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700277 self.children = []
278
279 def Dump(self, indent=0):
280 if self.uid is not None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700281 print "%s%s %d %d %o" % (
282 " " * indent, self.name, self.uid, self.gid, self.mode)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700283 else:
Dan Albert8b72aef2015-03-23 19:13:21 -0700284 print "%s%s %s %s %s" % (
285 " " * indent, self.name, self.uid, self.gid, self.mode)
286 if self.is_dir:
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700287 print "%s%s" % (" "*indent, self.descendants)
288 print "%s%s" % (" "*indent, self.best_subtree)
289 for i in self.children:
290 i.Dump(indent=indent+1)
291
Doug Zongkereef39442009-04-02 12:14:19 -0700292 def CountChildMetadata(self):
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700293 """Count up the (uid, gid, mode, selabel, capabilities) tuples for
Dan Albert8b72aef2015-03-23 19:13:21 -0700294 all children and determine the best strategy for using set_perm_recursive
295 and set_perm to correctly chown/chmod all the files to their desired
Doug Zongkereef39442009-04-02 12:14:19 -0700296 values. Recursively calls itself for all descendants.
297
Dan Albert8b72aef2015-03-23 19:13:21 -0700298 Returns a dict of {(uid, gid, dmode, fmode, selabel, capabilities): count}
299 counting up all descendants of this node. (dmode or fmode may be None.)
300 Also sets the best_subtree of each directory Item to the (uid, gid, dmode,
301 fmode, selabel, capabilities) tuple that will match the most descendants of
302 that Item.
Doug Zongkereef39442009-04-02 12:14:19 -0700303 """
304
Dan Albert8b72aef2015-03-23 19:13:21 -0700305 assert self.is_dir
306 key = (self.uid, self.gid, self.mode, None, self.selabel,
307 self.capabilities)
308 self.descendants = {key: 1}
309 d = self.descendants
Doug Zongkereef39442009-04-02 12:14:19 -0700310 for i in self.children:
Dan Albert8b72aef2015-03-23 19:13:21 -0700311 if i.is_dir:
Doug Zongkereef39442009-04-02 12:14:19 -0700312 for k, v in i.CountChildMetadata().iteritems():
313 d[k] = d.get(k, 0) + v
314 else:
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700315 k = (i.uid, i.gid, None, i.mode, i.selabel, i.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700316 d[k] = d.get(k, 0) + 1
317
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700318 # Find the (uid, gid, dmode, fmode, selabel, capabilities)
319 # tuple that matches the most descendants.
Doug Zongkereef39442009-04-02 12:14:19 -0700320
321 # First, find the (uid, gid) pair that matches the most
322 # descendants.
323 ug = {}
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700324 for (uid, gid, _, _, _, _), count in d.iteritems():
Doug Zongkereef39442009-04-02 12:14:19 -0700325 ug[(uid, gid)] = ug.get((uid, gid), 0) + count
326 ug = MostPopularKey(ug, (0, 0))
327
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700328 # Now find the dmode, fmode, selabel, and capabilities that match
329 # the most descendants with that (uid, gid), and choose those.
Dan Albert8b72aef2015-03-23 19:13:21 -0700330 best_dmode = (0, 0o755)
331 best_fmode = (0, 0o644)
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700332 best_selabel = (0, None)
333 best_capabilities = (0, None)
Doug Zongkereef39442009-04-02 12:14:19 -0700334 for k, count in d.iteritems():
Dan Albert8b72aef2015-03-23 19:13:21 -0700335 if k[:2] != ug:
336 continue
337 if k[2] is not None and count >= best_dmode[0]:
338 best_dmode = (count, k[2])
339 if k[3] is not None and count >= best_fmode[0]:
340 best_fmode = (count, k[3])
341 if k[4] is not None and count >= best_selabel[0]:
342 best_selabel = (count, k[4])
343 if k[5] is not None and count >= best_capabilities[0]:
344 best_capabilities = (count, k[5])
345 self.best_subtree = ug + (
346 best_dmode[1], best_fmode[1], best_selabel[1], best_capabilities[1])
Doug Zongkereef39442009-04-02 12:14:19 -0700347
348 return d
349
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700350 def SetPermissions(self, script):
Doug Zongkereef39442009-04-02 12:14:19 -0700351 """Append set_perm/set_perm_recursive commands to 'script' to
352 set all permissions, users, and groups for the tree of files
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700353 rooted at 'self'."""
Doug Zongkereef39442009-04-02 12:14:19 -0700354
355 self.CountChildMetadata()
356
357 def recurse(item, current):
Dan Albert8b72aef2015-03-23 19:13:21 -0700358 # current is the (uid, gid, dmode, fmode, selabel, capabilities) tuple
359 # that the current item (and all its children) have already been set to.
360 # We only need to issue set_perm/set_perm_recursive commands if we're
Doug Zongkereef39442009-04-02 12:14:19 -0700361 # supposed to be something different.
Dan Albert8b72aef2015-03-23 19:13:21 -0700362 if item.is_dir:
Doug Zongkereef39442009-04-02 12:14:19 -0700363 if current != item.best_subtree:
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700364 script.SetPermissionsRecursive("/"+item.name, *item.best_subtree)
Doug Zongkereef39442009-04-02 12:14:19 -0700365 current = item.best_subtree
366
367 if item.uid != current[0] or item.gid != current[1] or \
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700368 item.mode != current[2] or item.selabel != current[4] or \
369 item.capabilities != current[5]:
370 script.SetPermissions("/"+item.name, item.uid, item.gid,
371 item.mode, item.selabel, item.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700372
373 for i in item.children:
374 recurse(i, current)
375 else:
376 if item.uid != current[0] or item.gid != current[1] or \
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700377 item.mode != current[3] or item.selabel != current[4] or \
378 item.capabilities != current[5]:
379 script.SetPermissions("/"+item.name, item.uid, item.gid,
380 item.mode, item.selabel, item.capabilities)
Doug Zongkereef39442009-04-02 12:14:19 -0700381
Nick Kralevich0eb17d92013-09-07 17:10:29 -0700382 recurse(self, (-1, -1, -1, -1, None, None))
Doug Zongkereef39442009-04-02 12:14:19 -0700383
384
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700385def CopyPartitionFiles(itemset, input_zip, output_zip=None, substitute=None):
386 """Copies files for the partition in the input zip to the output
Doug Zongkereef39442009-04-02 12:14:19 -0700387 zip. Populates the Item class with their metadata, and returns a
Doug Zongker1807e702012-02-28 12:21:08 -0800388 list of symlinks. output_zip may be None, in which case the copy is
389 skipped (but the other side effects still happen). substitute is an
390 optional dict of {output filename: contents} to be output instead of
391 certain input files.
Doug Zongkereef39442009-04-02 12:14:19 -0700392 """
393
394 symlinks = []
395
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700396 partition = itemset.partition
397
Doug Zongkereef39442009-04-02 12:14:19 -0700398 for info in input_zip.infolist():
Tao Baoeaf885b2015-03-23 16:01:17 -0700399 prefix = partition.upper() + "/"
400 if info.filename.startswith(prefix):
401 basefilename = info.filename[len(prefix):]
Doug Zongkereef39442009-04-02 12:14:19 -0700402 if IsSymlink(info):
403 symlinks.append((input_zip.read(info.filename),
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700404 "/" + partition + "/" + basefilename))
Doug Zongkereef39442009-04-02 12:14:19 -0700405 else:
Tao Bao2ed665a2015-04-01 11:21:55 -0700406 import copy
Doug Zongkereef39442009-04-02 12:14:19 -0700407 info2 = copy.copy(info)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700408 fn = info2.filename = partition + "/" + basefilename
Doug Zongkereef39442009-04-02 12:14:19 -0700409 if substitute and fn in substitute and substitute[fn] is None:
410 continue
411 if output_zip is not None:
412 if substitute and fn in substitute:
413 data = substitute[fn]
414 else:
415 data = input_zip.read(info.filename)
Tao Bao2ed665a2015-04-01 11:21:55 -0700416 common.ZipWriteStr(output_zip, info2, data)
Doug Zongkereef39442009-04-02 12:14:19 -0700417 if fn.endswith("/"):
Dan Albert8b72aef2015-03-23 19:13:21 -0700418 itemset.Get(fn[:-1], is_dir=True)
Doug Zongkereef39442009-04-02 12:14:19 -0700419 else:
Dan Albert8b72aef2015-03-23 19:13:21 -0700420 itemset.Get(fn)
Doug Zongkereef39442009-04-02 12:14:19 -0700421
422 symlinks.sort()
Doug Zongker1807e702012-02-28 12:21:08 -0800423 return symlinks
Doug Zongkereef39442009-04-02 12:14:19 -0700424
425
Doug Zongkereef39442009-04-02 12:14:19 -0700426def SignOutput(temp_zip_name, output_zip_name):
427 key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
428 pw = key_passwords[OPTIONS.package_key]
429
Doug Zongker951495f2009-08-14 12:44:19 -0700430 common.SignFile(temp_zip_name, output_zip_name, OPTIONS.package_key, pw,
431 whole_file=True)
Doug Zongkereef39442009-04-02 12:14:19 -0700432
433
Dan Albert8b72aef2015-03-23 19:13:21 -0700434def AppendAssertions(script, info_dict, oem_dict=None):
Michael Runge6e836112014-04-15 17:40:21 -0700435 oem_props = info_dict.get("oem_fingerprint_properties")
Tao Bao3e30d972016-03-15 13:20:19 -0700436 if not oem_props:
Michael Runge6e836112014-04-15 17:40:21 -0700437 device = GetBuildProp("ro.product.device", info_dict)
438 script.AssertDevice(device)
439 else:
440 if oem_dict is None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700441 raise common.ExternalError(
442 "No OEM file provided to answer expected assertions")
Michael Runge6e836112014-04-15 17:40:21 -0700443 for prop in oem_props.split():
444 if oem_dict.get(prop) is None:
Dan Albert8b72aef2015-03-23 19:13:21 -0700445 raise common.ExternalError(
446 "The OEM file is missing the property %s" % prop)
Michael Runge6e836112014-04-15 17:40:21 -0700447 script.AssertOemProperty(prop, oem_dict.get(prop))
Doug Zongkereef39442009-04-02 12:14:19 -0700448
Doug Zongkereef39442009-04-02 12:14:19 -0700449
Doug Zongkerc9253822014-02-04 12:17:58 -0800450def HasRecoveryPatch(target_files_zip):
Tao Baof2cffbd2015-07-22 12:33:18 -0700451 namelist = [name for name in target_files_zip.namelist()]
452 return ("SYSTEM/recovery-from-boot.p" in namelist or
453 "SYSTEM/etc/recovery.img" in namelist)
Doug Zongker73ef8252009-07-23 15:12:53 -0700454
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700455def HasVendorPartition(target_files_zip):
456 try:
457 target_files_zip.getinfo("VENDOR/")
458 return True
459 except KeyError:
460 return False
461
Michael Runge6e836112014-04-15 17:40:21 -0700462def GetOemProperty(name, oem_props, oem_dict, info_dict):
463 if oem_props is not None and name in oem_props:
464 return oem_dict[name]
465 return GetBuildProp(name, info_dict)
466
467
468def CalculateFingerprint(oem_props, oem_dict, info_dict):
469 if oem_props is None:
470 return GetBuildProp("ro.build.fingerprint", info_dict)
471 return "%s/%s/%s:%s" % (
Dan Albert8b72aef2015-03-23 19:13:21 -0700472 GetOemProperty("ro.product.brand", oem_props, oem_dict, info_dict),
473 GetOemProperty("ro.product.name", oem_props, oem_dict, info_dict),
474 GetOemProperty("ro.product.device", oem_props, oem_dict, info_dict),
475 GetBuildProp("ro.build.thumbprint", info_dict))
Doug Zongker73ef8252009-07-23 15:12:53 -0700476
Doug Zongkerfc44a512014-08-26 13:10:25 -0700477
Doug Zongker3c84f562014-07-31 11:06:30 -0700478def GetImage(which, tmpdir, info_dict):
Doug Zongkerfc44a512014-08-26 13:10:25 -0700479 # Return an image object (suitable for passing to BlockImageDiff)
480 # for the 'which' partition (most be "system" or "vendor"). If a
481 # prebuilt image and file map are found in tmpdir they are used,
482 # otherwise they are reconstructed from the individual files.
Doug Zongker3c84f562014-07-31 11:06:30 -0700483
484 assert which in ("system", "vendor")
485
486 path = os.path.join(tmpdir, "IMAGES", which + ".img")
Doug Zongkerfc44a512014-08-26 13:10:25 -0700487 mappath = os.path.join(tmpdir, "IMAGES", which + ".map")
488 if os.path.exists(path) and os.path.exists(mappath):
Doug Zongker3c84f562014-07-31 11:06:30 -0700489 print "using %s.img from target-files" % (which,)
Doug Zongker3c84f562014-07-31 11:06:30 -0700490 # This is a 'new' target-files, which already has the image in it.
Doug Zongker3c84f562014-07-31 11:06:30 -0700491
492 else:
493 print "building %s.img from target-files" % (which,)
494
495 # This is an 'old' target-files, which does not contain images
496 # already built. Build them.
497
Doug Zongkerfc44a512014-08-26 13:10:25 -0700498 mappath = tempfile.mkstemp()[1]
499 OPTIONS.tempfiles.append(mappath)
500
Doug Zongker3c84f562014-07-31 11:06:30 -0700501 import add_img_to_target_files
502 if which == "system":
Doug Zongkerfc44a512014-08-26 13:10:25 -0700503 path = add_img_to_target_files.BuildSystem(
504 tmpdir, info_dict, block_list=mappath)
Doug Zongker3c84f562014-07-31 11:06:30 -0700505 elif which == "vendor":
Doug Zongkerfc44a512014-08-26 13:10:25 -0700506 path = add_img_to_target_files.BuildVendor(
507 tmpdir, info_dict, block_list=mappath)
Doug Zongker3c84f562014-07-31 11:06:30 -0700508
Tao Baoff777812015-05-12 11:42:31 -0700509 # Bug: http://b/20939131
510 # In ext4 filesystems, block 0 might be changed even being mounted
511 # R/O. We add it to clobbered_blocks so that it will be written to the
512 # target unconditionally. Note that they are still part of care_map.
513 clobbered_blocks = "0"
514
515 return sparse_img.SparseImage(path, mappath, clobbered_blocks)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700516
517
Doug Zongkerc77a9ad2010-09-16 11:28:43 -0700518def WriteFullOTAPackage(input_zip, output_zip):
Doug Zongker9ce2ebf2010-04-21 14:08:44 -0700519 # TODO: how to determine this? We don't know what version it will
Tao Bao34b47bf2015-06-22 19:17:41 -0700520 # be installed on top of. For now, we expect the API just won't
521 # change very often. Similarly for fstab, it might have changed
522 # in the target build.
Doug Zongkerc77a9ad2010-09-16 11:28:43 -0700523 script = edify_generator.EdifyGenerator(3, OPTIONS.info_dict)
Doug Zongkereef39442009-04-02 12:14:19 -0700524
Tao Bao838c68f2016-03-15 19:16:18 +0000525 recovery_mount_options = OPTIONS.info_dict.get("recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -0700526 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties")
Michael Runge6e836112014-04-15 17:40:21 -0700527 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -0700528 if oem_props:
Michael Runge6e836112014-04-15 17:40:21 -0700529 if OPTIONS.oem_source is None:
530 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -0800531 if not OPTIONS.oem_no_mount:
532 script.Mount("/oem", recovery_mount_options)
Dan Albert8b72aef2015-03-23 19:13:21 -0700533 oem_dict = common.LoadDictionaryFromLines(
534 open(OPTIONS.oem_source).readlines())
Michael Runge6e836112014-04-15 17:40:21 -0700535
Tao Bao3e30d972016-03-15 13:20:19 -0700536 target_fp = CalculateFingerprint(oem_props, oem_dict, OPTIONS.info_dict)
Dan Albert8b72aef2015-03-23 19:13:21 -0700537 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -0700538 "post-build": target_fp,
Dan Albert8b72aef2015-03-23 19:13:21 -0700539 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
540 OPTIONS.info_dict),
541 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
542 }
Doug Zongker2ea21062010-04-28 16:05:21 -0700543
Doug Zongker05d3dea2009-06-22 11:32:31 -0700544 device_specific = common.DeviceSpecificParams(
545 input_zip=input_zip,
Doug Zongker37974732010-09-16 17:44:38 -0700546 input_version=OPTIONS.info_dict["recovery_api_version"],
Doug Zongker05d3dea2009-06-22 11:32:31 -0700547 output_zip=output_zip,
548 script=script,
Doug Zongker2ea21062010-04-28 16:05:21 -0700549 input_tmp=OPTIONS.input_tmp,
Doug Zongker96a57e72010-09-26 14:57:41 -0700550 metadata=metadata,
551 info_dict=OPTIONS.info_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700552
Doug Zongkerc9253822014-02-04 12:17:58 -0800553 has_recovery_patch = HasRecoveryPatch(input_zip)
Doug Zongker26e66192014-02-20 13:22:07 -0800554 block_based = OPTIONS.block_based and has_recovery_patch
Doug Zongkerc9253822014-02-04 12:17:58 -0800555
Tao Baod8d14be2016-02-04 14:26:02 -0800556 metadata["ota-type"] = "BLOCK" if block_based else "FILE"
557
Elliott Hughesd8a52f92016-06-20 14:35:47 -0700558 ts = GetBuildProp("ro.build.date.utc", OPTIONS.info_dict)
559 ts_text = GetBuildProp("ro.build.date", OPTIONS.info_dict)
560 script.AssertOlderBuild(ts, ts_text)
Doug Zongkereef39442009-04-02 12:14:19 -0700561
Michael Runge6e836112014-04-15 17:40:21 -0700562 AppendAssertions(script, OPTIONS.info_dict, oem_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700563 device_specific.FullOTA_Assertions()
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800564
565 # Two-step package strategy (in chronological order, which is *not*
566 # the order in which the generated script has things):
567 #
568 # if stage is not "2/3" or "3/3":
569 # write recovery image to boot partition
570 # set stage to "2/3"
571 # reboot to boot partition and restart recovery
572 # else if stage is "2/3":
573 # write recovery image to recovery partition
574 # set stage to "3/3"
575 # reboot to recovery partition and restart recovery
576 # else:
577 # (stage must be "3/3")
578 # set stage to ""
579 # do normal full package installation:
580 # wipe and install system, boot image, etc.
581 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -0700582 # complete script normally
583 # (allow recovery to mark itself finished and reboot)
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800584
585 recovery_img = common.GetBootableImage("recovery.img", "recovery.img",
586 OPTIONS.input_tmp, "RECOVERY")
587 if OPTIONS.two_step:
588 if not OPTIONS.info_dict.get("multistage_support", None):
589 assert False, "two-step packages not supported by this build"
590 fs = OPTIONS.info_dict["fstab"]["/misc"]
591 assert fs.fs_type.upper() == "EMMC", \
592 "two-step packages only supported on devices with EMMC /misc partitions"
593 bcb_dev = {"bcb_dev": fs.device}
594 common.ZipWriteStr(output_zip, "recovery.img", recovery_img.data)
595 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -0700596if get_stage("%(bcb_dev)s") == "2/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800597""" % bcb_dev)
598 script.WriteRawImage("/recovery", "recovery.img")
599 script.AppendExtra("""
600set_stage("%(bcb_dev)s", "3/3");
601reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -0700602else if get_stage("%(bcb_dev)s") == "3/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800603""" % bcb_dev)
604
Tao Bao6c55a8a2015-04-08 15:30:27 -0700605 # Dump fingerprints
Tao Bao3e30d972016-03-15 13:20:19 -0700606 script.Print("Target: %s" % target_fp)
Tao Bao6c55a8a2015-04-08 15:30:27 -0700607
Doug Zongkere5ff5902012-01-17 10:55:37 -0800608 device_specific.FullOTA_InstallBegin()
Doug Zongker171f1cd2009-06-15 22:36:37 -0700609
Doug Zongker01ce19c2014-02-04 13:48:15 -0800610 system_progress = 0.75
Doug Zongkereef39442009-04-02 12:14:19 -0700611
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700612 if OPTIONS.wipe_user_data:
Doug Zongker01ce19c2014-02-04 13:48:15 -0800613 system_progress -= 0.1
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700614 if HasVendorPartition(input_zip):
615 system_progress -= 0.1
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700616
Stephen Smalleyd3a803e2015-08-04 14:59:06 -0400617 # Place a copy of file_contexts.bin into the OTA package which will be used
618 # by the recovery program.
Kenny Rootf32dc712012-04-08 10:42:34 -0700619 if "selinux_fc" in OPTIONS.info_dict:
620 WritePolicyConfig(OPTIONS.info_dict["selinux_fc"], output_zip)
Stephen Smalley56882bf2012-02-09 13:36:21 -0500621
Michael Runge7cd99ba2014-10-22 17:21:48 -0700622 recovery_mount_options = OPTIONS.info_dict.get("recovery_mount_options")
623
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700624 system_items = ItemSet("system", "META/filesystem_config.txt")
Doug Zongker4b9596f2014-06-09 14:15:45 -0700625 script.ShowProgress(system_progress, 0)
Jesse Zhao75bcea02015-01-06 10:59:53 -0800626
Doug Zongker26e66192014-02-20 13:22:07 -0800627 if block_based:
Doug Zongkerfc44a512014-08-26 13:10:25 -0700628 # Full OTA is done as an "incremental" against an empty source
629 # image. This has the effect of writing new data from the package
630 # to the entire partition, but lets us reuse the updater code that
631 # writes incrementals to do it.
632 system_tgt = GetImage("system", OPTIONS.input_tmp, OPTIONS.info_dict)
633 system_tgt.ResetFileMap()
Doug Zongkerab7ca1d2014-08-26 10:40:28 -0700634 system_diff = common.BlockDifference("system", system_tgt, src=None)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700635 system_diff.WriteScript(script, output_zip)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800636 else:
637 script.FormatPartition("/system")
Michael Runge7cd99ba2014-10-22 17:21:48 -0700638 script.Mount("/system", recovery_mount_options)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800639 if not has_recovery_patch:
640 script.UnpackPackageDir("recovery", "/system")
Doug Zongker26e66192014-02-20 13:22:07 -0800641 script.UnpackPackageDir("system", "/system")
Doug Zongkereef39442009-04-02 12:14:19 -0700642
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700643 symlinks = CopyPartitionFiles(system_items, input_zip, output_zip)
Doug Zongker01ce19c2014-02-04 13:48:15 -0800644 script.MakeSymlinks(symlinks)
Doug Zongkereef39442009-04-02 12:14:19 -0700645
Tao Bao7a5bf8a2015-07-21 18:01:20 -0700646 boot_img = common.GetBootableImage(
647 "boot.img", "boot.img", OPTIONS.input_tmp, "BOOT")
Doug Zongkerc9253822014-02-04 12:17:58 -0800648
Doug Zongker91a99c22014-05-09 13:15:01 -0700649 if not block_based:
Doug Zongkerc9253822014-02-04 12:17:58 -0800650 def output_sink(fn, data):
651 common.ZipWriteStr(output_zip, "recovery/" + fn, data)
Dan Albert8b72aef2015-03-23 19:13:21 -0700652 system_items.Get("system/" + fn)
Doug Zongkerc9253822014-02-04 12:17:58 -0800653
654 common.MakeRecoveryPatch(OPTIONS.input_tmp, output_sink,
655 recovery_img, boot_img)
Doug Zongkereef39442009-04-02 12:14:19 -0700656
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700657 system_items.GetMetadata(input_zip)
658 system_items.Get("system").SetPermissions(script)
659
660 if HasVendorPartition(input_zip):
661 vendor_items = ItemSet("vendor", "META/vendor_filesystem_config.txt")
662 script.ShowProgress(0.1, 0)
663
664 if block_based:
Doug Zongkerfc44a512014-08-26 13:10:25 -0700665 vendor_tgt = GetImage("vendor", OPTIONS.input_tmp, OPTIONS.info_dict)
666 vendor_tgt.ResetFileMap()
Doug Zongkerab7ca1d2014-08-26 10:40:28 -0700667 vendor_diff = common.BlockDifference("vendor", vendor_tgt)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700668 vendor_diff.WriteScript(script, output_zip)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700669 else:
670 script.FormatPartition("/vendor")
Michael Runge7cd99ba2014-10-22 17:21:48 -0700671 script.Mount("/vendor", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700672 script.UnpackPackageDir("vendor", "/vendor")
673
674 symlinks = CopyPartitionFiles(vendor_items, input_zip, output_zip)
675 script.MakeSymlinks(symlinks)
676
677 vendor_items.GetMetadata(input_zip)
678 vendor_items.Get("vendor").SetPermissions(script)
Doug Zongker73ef8252009-07-23 15:12:53 -0700679
Doug Zongker37974732010-09-16 17:44:38 -0700680 common.CheckSize(boot_img.data, "boot.img", OPTIONS.info_dict)
Doug Zongker73ef8252009-07-23 15:12:53 -0700681 common.ZipWriteStr(output_zip, "boot.img", boot_img.data)
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700682
Doug Zongker01ce19c2014-02-04 13:48:15 -0800683 script.ShowProgress(0.05, 5)
Doug Zongker9ce0fb62010-09-20 18:04:41 -0700684 script.WriteRawImage("/boot", "boot.img")
Doug Zongker05d3dea2009-06-22 11:32:31 -0700685
Doug Zongker01ce19c2014-02-04 13:48:15 -0800686 script.ShowProgress(0.2, 10)
Doug Zongker05d3dea2009-06-22 11:32:31 -0700687 device_specific.FullOTA_InstallEnd()
Doug Zongkereef39442009-04-02 12:14:19 -0700688
Doug Zongker1c390a22009-05-14 19:06:36 -0700689 if OPTIONS.extra_script is not None:
Doug Zongkerc494d7c2009-06-18 08:43:44 -0700690 script.AppendExtra(OPTIONS.extra_script)
Doug Zongker1c390a22009-05-14 19:06:36 -0700691
Doug Zongker14833602010-02-02 13:12:04 -0800692 script.UnmountAll()
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800693
Doug Zongker922206e2014-03-04 13:16:24 -0800694 if OPTIONS.wipe_user_data:
695 script.ShowProgress(0.1, 10)
696 script.FormatPartition("/data")
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700697
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800698 if OPTIONS.two_step:
699 script.AppendExtra("""
700set_stage("%(bcb_dev)s", "");
701""" % bcb_dev)
702 script.AppendExtra("else\n")
703 script.WriteRawImage("/boot", "recovery.img")
704 script.AppendExtra("""
705set_stage("%(bcb_dev)s", "2/3");
706reboot_now("%(bcb_dev)s", "");
707endif;
708endif;
709""" % bcb_dev)
Tao Baod8d14be2016-02-04 14:26:02 -0800710
Tao Bao5d182562016-02-23 11:38:39 -0800711 script.SetProgress(1)
712 script.AddToZip(input_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -0800713 metadata["ota-required-cache"] = str(script.required_cache)
Doug Zongker2ea21062010-04-28 16:05:21 -0700714 WriteMetadata(metadata, output_zip)
715
Doug Zongkerfc44a512014-08-26 13:10:25 -0700716
Dan Albert8e0178d2015-01-27 15:53:15 -0800717def WritePolicyConfig(file_name, output_zip):
718 common.ZipWrite(output_zip, file_name, os.path.basename(file_name))
Stephen Smalley56882bf2012-02-09 13:36:21 -0500719
Doug Zongker2ea21062010-04-28 16:05:21 -0700720
721def WriteMetadata(metadata, output_zip):
722 common.ZipWriteStr(output_zip, "META-INF/com/android/metadata",
723 "".join(["%s=%s\n" % kv
724 for kv in sorted(metadata.iteritems())]))
Doug Zongkereef39442009-04-02 12:14:19 -0700725
Doug Zongkerfc44a512014-08-26 13:10:25 -0700726
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700727def LoadPartitionFiles(z, partition):
728 """Load all the files from the given partition in a given target-files
Doug Zongkereef39442009-04-02 12:14:19 -0700729 ZipFile, and return a dict of {filename: File object}."""
730 out = {}
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700731 prefix = partition.upper() + "/"
Doug Zongkereef39442009-04-02 12:14:19 -0700732 for info in z.infolist():
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700733 if info.filename.startswith(prefix) and not IsSymlink(info):
Tao Baoeaf885b2015-03-23 16:01:17 -0700734 basefilename = info.filename[len(prefix):]
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700735 fn = partition + "/" + basefilename
Doug Zongkereef39442009-04-02 12:14:19 -0700736 data = z.read(info.filename)
Doug Zongkerea5d7a92010-09-12 15:26:16 -0700737 out[fn] = common.File(fn, data)
Doug Zongker1807e702012-02-28 12:21:08 -0800738 return out
Doug Zongkereef39442009-04-02 12:14:19 -0700739
740
Doug Zongker1eb74dd2012-08-16 16:19:00 -0700741def GetBuildProp(prop, info_dict):
742 """Return the fingerprint of the build of a given target-files info_dict."""
743 try:
744 return info_dict.get("build.prop", {})[prop]
745 except KeyError:
Ying Wangc73e4612014-04-15 15:27:43 -0700746 raise common.ExternalError("couldn't find %s in build.prop" % (prop,))
Doug Zongkereef39442009-04-02 12:14:19 -0700747
Doug Zongkerfc44a512014-08-26 13:10:25 -0700748
Michael Runge4038aa82013-12-13 18:06:28 -0800749def AddToKnownPaths(filename, known_paths):
750 if filename[-1] == "/":
751 return
752 dirs = filename.split("/")[:-1]
753 while len(dirs) > 0:
754 path = "/".join(dirs)
755 if path in known_paths:
Dan Albert8b72aef2015-03-23 19:13:21 -0700756 break
Michael Runge4038aa82013-12-13 18:06:28 -0800757 known_paths.add(path)
758 dirs.pop()
Doug Zongkereef39442009-04-02 12:14:19 -0700759
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700760
Geremy Condra36bd3652014-02-06 19:45:10 -0800761def WriteBlockIncrementalOTAPackage(target_zip, source_zip, output_zip):
Tao Bao3806c232015-07-05 21:08:33 -0700762 # TODO(tbao): We should factor out the common parts between
763 # WriteBlockIncrementalOTAPackage() and WriteIncrementalOTAPackage().
Geremy Condra36bd3652014-02-06 19:45:10 -0800764 source_version = OPTIONS.source_info_dict["recovery_api_version"]
765 target_version = OPTIONS.target_info_dict["recovery_api_version"]
766
767 if source_version == 0:
Tao Bao3e30d972016-03-15 13:20:19 -0700768 print("WARNING: generating edify script for a source that "
769 "can't install it.")
Tao Bao34b47bf2015-06-22 19:17:41 -0700770 script = edify_generator.EdifyGenerator(
771 source_version, OPTIONS.target_info_dict,
772 fstab=OPTIONS.source_info_dict["fstab"])
Geremy Condra36bd3652014-02-06 19:45:10 -0800773
Tao Bao3806c232015-07-05 21:08:33 -0700774 recovery_mount_options = OPTIONS.source_info_dict.get(
775 "recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -0700776 source_oem_props = OPTIONS.source_info_dict.get("oem_fingerprint_properties")
777 target_oem_props = OPTIONS.target_info_dict.get("oem_fingerprint_properties")
Tao Bao3806c232015-07-05 21:08:33 -0700778 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -0700779 if source_oem_props or target_oem_props:
Tao Bao3806c232015-07-05 21:08:33 -0700780 if OPTIONS.oem_source is None:
781 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -0800782 if not OPTIONS.oem_no_mount:
783 script.Mount("/oem", recovery_mount_options)
Tao Bao3806c232015-07-05 21:08:33 -0700784 oem_dict = common.LoadDictionaryFromLines(
785 open(OPTIONS.oem_source).readlines())
786
Dan Albert8b72aef2015-03-23 19:13:21 -0700787 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -0700788 "pre-device": GetOemProperty("ro.product.device", source_oem_props,
789 oem_dict, OPTIONS.source_info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -0800790 "ota-type": "BLOCK",
Dan Albert8b72aef2015-03-23 19:13:21 -0700791 }
Geremy Condra36bd3652014-02-06 19:45:10 -0800792
Tao Bao5d182562016-02-23 11:38:39 -0800793 post_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.target_info_dict)
794 pre_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.source_info_dict)
795 is_downgrade = long(post_timestamp) < long(pre_timestamp)
796
797 if OPTIONS.downgrade:
798 metadata["ota-downgrade"] = "yes"
799 if not is_downgrade:
800 raise RuntimeError("--downgrade specified but no downgrade detected: "
801 "pre: %s, post: %s" % (pre_timestamp, post_timestamp))
802 else:
803 if is_downgrade:
804 # Non-fatal here to allow generating such a package which may require
805 # manual work to adjust the post-timestamp. A legit use case is that we
806 # cut a new build C (after having A and B), but want to enfore the
807 # update path of A -> C -> B. Specifying --downgrade may not help since
808 # that would enforce a data wipe for C -> B update.
809 print("\nWARNING: downgrade detected: pre: %s, post: %s.\n"
810 "The package may not be deployed properly. "
811 "Try --downgrade?\n" % (pre_timestamp, post_timestamp))
812 metadata["post-timestamp"] = post_timestamp
813
Geremy Condra36bd3652014-02-06 19:45:10 -0800814 device_specific = common.DeviceSpecificParams(
815 source_zip=source_zip,
816 source_version=source_version,
817 target_zip=target_zip,
818 target_version=target_version,
819 output_zip=output_zip,
820 script=script,
821 metadata=metadata,
Tao Bao6f0b2192015-10-13 16:37:12 -0700822 info_dict=OPTIONS.source_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800823
Tao Bao3e30d972016-03-15 13:20:19 -0700824 source_fp = CalculateFingerprint(source_oem_props, oem_dict,
Tao Bao3806c232015-07-05 21:08:33 -0700825 OPTIONS.source_info_dict)
Tao Bao3e30d972016-03-15 13:20:19 -0700826 target_fp = CalculateFingerprint(target_oem_props, oem_dict,
Tao Bao3806c232015-07-05 21:08:33 -0700827 OPTIONS.target_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800828 metadata["pre-build"] = source_fp
829 metadata["post-build"] = target_fp
830
831 source_boot = common.GetBootableImage(
832 "/tmp/boot.img", "boot.img", OPTIONS.source_tmp, "BOOT",
833 OPTIONS.source_info_dict)
834 target_boot = common.GetBootableImage(
835 "/tmp/boot.img", "boot.img", OPTIONS.target_tmp, "BOOT")
836 updating_boot = (not OPTIONS.two_step and
837 (source_boot.data != target_boot.data))
838
Geremy Condra36bd3652014-02-06 19:45:10 -0800839 target_recovery = common.GetBootableImage(
840 "/tmp/recovery.img", "recovery.img", OPTIONS.target_tmp, "RECOVERY")
Geremy Condra36bd3652014-02-06 19:45:10 -0800841
Doug Zongkerfc44a512014-08-26 13:10:25 -0700842 system_src = GetImage("system", OPTIONS.source_tmp, OPTIONS.source_info_dict)
843 system_tgt = GetImage("system", OPTIONS.target_tmp, OPTIONS.target_info_dict)
Tao Baodd2a5892015-03-12 12:32:37 -0700844
845 blockimgdiff_version = 1
846 if OPTIONS.info_dict:
847 blockimgdiff_version = max(
848 int(i) for i in
849 OPTIONS.info_dict.get("blockimgdiff_versions", "1").split(","))
850
Tianjie Xufc3422a2015-12-15 11:53:59 -0800851 # Check first block of system partition for remount R/W only if
852 # disk type is ext4
853 system_partition = OPTIONS.source_info_dict["fstab"]["/system"]
Tao Baod8d14be2016-02-04 14:26:02 -0800854 check_first_block = system_partition.fs_type == "ext4"
Doug Zongkerb34fcce2014-09-11 09:34:56 -0700855 system_diff = common.BlockDifference("system", system_tgt, system_src,
Tianjie Xufc3422a2015-12-15 11:53:59 -0800856 check_first_block,
Tao Baodd2a5892015-03-12 12:32:37 -0700857 version=blockimgdiff_version)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700858
Doug Zongkerc8b4e842014-06-16 15:16:31 -0700859 if HasVendorPartition(target_zip):
860 if not HasVendorPartition(source_zip):
861 raise RuntimeError("can't generate incremental that adds /vendor")
Dan Albert8b72aef2015-03-23 19:13:21 -0700862 vendor_src = GetImage("vendor", OPTIONS.source_tmp,
863 OPTIONS.source_info_dict)
864 vendor_tgt = GetImage("vendor", OPTIONS.target_tmp,
865 OPTIONS.target_info_dict)
Tianjie Xufc3422a2015-12-15 11:53:59 -0800866
867 # Check first block of vendor partition for remount R/W only if
868 # disk type is ext4
869 vendor_partition = OPTIONS.source_info_dict["fstab"]["/vendor"]
Tao Baod8d14be2016-02-04 14:26:02 -0800870 check_first_block = vendor_partition.fs_type == "ext4"
Doug Zongkerb34fcce2014-09-11 09:34:56 -0700871 vendor_diff = common.BlockDifference("vendor", vendor_tgt, vendor_src,
Tianjie Xufc3422a2015-12-15 11:53:59 -0800872 check_first_block,
Tao Baodd2a5892015-03-12 12:32:37 -0700873 version=blockimgdiff_version)
Doug Zongkerfc44a512014-08-26 13:10:25 -0700874 else:
875 vendor_diff = None
Geremy Condra36bd3652014-02-06 19:45:10 -0800876
Michael Rungec6e3afd2014-05-05 11:55:47 -0700877 AppendAssertions(script, OPTIONS.target_info_dict, oem_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800878 device_specific.IncrementalOTA_Assertions()
879
880 # Two-step incremental package strategy (in chronological order,
881 # which is *not* the order in which the generated script has
882 # things):
883 #
884 # if stage is not "2/3" or "3/3":
885 # do verification on current system
886 # write recovery image to boot partition
887 # set stage to "2/3"
888 # reboot to boot partition and restart recovery
889 # else if stage is "2/3":
890 # write recovery image to recovery partition
891 # set stage to "3/3"
892 # reboot to recovery partition and restart recovery
893 # else:
894 # (stage must be "3/3")
895 # perform update:
896 # patch system files, etc.
897 # force full install of new boot image
898 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -0700899 # complete script normally
900 # (allow recovery to mark itself finished and reboot)
Geremy Condra36bd3652014-02-06 19:45:10 -0800901
902 if OPTIONS.two_step:
Tao Baodd24da92015-07-29 14:09:23 -0700903 if not OPTIONS.source_info_dict.get("multistage_support", None):
Geremy Condra36bd3652014-02-06 19:45:10 -0800904 assert False, "two-step packages not supported by this build"
Tao Baodd24da92015-07-29 14:09:23 -0700905 fs = OPTIONS.source_info_dict["fstab"]["/misc"]
Geremy Condra36bd3652014-02-06 19:45:10 -0800906 assert fs.fs_type.upper() == "EMMC", \
907 "two-step packages only supported on devices with EMMC /misc partitions"
908 bcb_dev = {"bcb_dev": fs.device}
909 common.ZipWriteStr(output_zip, "recovery.img", target_recovery.data)
910 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -0700911if get_stage("%(bcb_dev)s") == "2/3" then
Geremy Condra36bd3652014-02-06 19:45:10 -0800912""" % bcb_dev)
Dan Albert8b72aef2015-03-23 19:13:21 -0700913 script.AppendExtra("sleep(20);\n")
Geremy Condra36bd3652014-02-06 19:45:10 -0800914 script.WriteRawImage("/recovery", "recovery.img")
915 script.AppendExtra("""
916set_stage("%(bcb_dev)s", "3/3");
917reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -0700918else if get_stage("%(bcb_dev)s") != "3/3" then
Geremy Condra36bd3652014-02-06 19:45:10 -0800919""" % bcb_dev)
920
Tao Bao6c55a8a2015-04-08 15:30:27 -0700921 # Dump fingerprints
Tao Bao3e30d972016-03-15 13:20:19 -0700922 script.Print(source_fp)
923 script.Print(target_fp)
Tao Bao6c55a8a2015-04-08 15:30:27 -0700924
Geremy Condra36bd3652014-02-06 19:45:10 -0800925 script.Print("Verifying current system...")
926
927 device_specific.IncrementalOTA_VerifyBegin()
928
Tao Bao3e30d972016-03-15 13:20:19 -0700929 # When blockimgdiff version is less than 3 (non-resumable block-based OTA),
930 # patching on a device that's already on the target build will damage the
931 # system. Because operations like move don't check the block state, they
932 # always apply the changes unconditionally.
933 if blockimgdiff_version <= 2:
934 if source_oem_props is None:
Tao Baodd2a5892015-03-12 12:32:37 -0700935 script.AssertSomeFingerprint(source_fp)
936 else:
Tao Baodd2a5892015-03-12 12:32:37 -0700937 script.AssertSomeThumbprint(
938 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -0700939
940 else: # blockimgdiff_version > 2
941 if source_oem_props is None and target_oem_props is None:
942 script.AssertSomeFingerprint(source_fp, target_fp)
943 elif source_oem_props is not None and target_oem_props is not None:
Tao Baodd2a5892015-03-12 12:32:37 -0700944 script.AssertSomeThumbprint(
945 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict),
946 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -0700947 elif source_oem_props is None and target_oem_props is not None:
948 script.AssertFingerprintOrThumbprint(
949 source_fp,
950 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict))
951 else:
952 script.AssertFingerprintOrThumbprint(
953 target_fp,
954 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Geremy Condra36bd3652014-02-06 19:45:10 -0800955
Tao Baod8d14be2016-02-04 14:26:02 -0800956 # Check the required cache size (i.e. stashed blocks).
957 size = []
958 if system_diff:
959 size.append(system_diff.required_cache)
960 if vendor_diff:
961 size.append(vendor_diff.required_cache)
962
Geremy Condra36bd3652014-02-06 19:45:10 -0800963 if updating_boot:
Tao Baodd24da92015-07-29 14:09:23 -0700964 boot_type, boot_device = common.GetTypeAndDevice(
965 "/boot", OPTIONS.source_info_dict)
Geremy Condra36bd3652014-02-06 19:45:10 -0800966 d = common.Difference(target_boot, source_boot)
967 _, _, d = d.ComputePatch()
Doug Zongkerf8340082014-08-05 10:39:37 -0700968 if d is None:
969 include_full_boot = True
970 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
971 else:
972 include_full_boot = False
Geremy Condra36bd3652014-02-06 19:45:10 -0800973
Doug Zongkerf8340082014-08-05 10:39:37 -0700974 print "boot target: %d source: %d diff: %d" % (
975 target_boot.size, source_boot.size, len(d))
Geremy Condra36bd3652014-02-06 19:45:10 -0800976
Doug Zongkerf8340082014-08-05 10:39:37 -0700977 common.ZipWriteStr(output_zip, "patch/boot.img.p", d)
Geremy Condra36bd3652014-02-06 19:45:10 -0800978
Doug Zongkerf8340082014-08-05 10:39:37 -0700979 script.PatchCheck("%s:%s:%d:%s:%d:%s" %
980 (boot_type, boot_device,
981 source_boot.size, source_boot.sha1,
982 target_boot.size, target_boot.sha1))
Tao Baod8d14be2016-02-04 14:26:02 -0800983 size.append(target_boot.size)
984
985 if size:
986 script.CacheFreeSpaceCheck(max(size))
Geremy Condra36bd3652014-02-06 19:45:10 -0800987
988 device_specific.IncrementalOTA_VerifyEnd()
989
990 if OPTIONS.two_step:
991 script.WriteRawImage("/boot", "recovery.img")
992 script.AppendExtra("""
993set_stage("%(bcb_dev)s", "2/3");
994reboot_now("%(bcb_dev)s", "");
995else
996""" % bcb_dev)
997
Jesse Zhao75bcea02015-01-06 10:59:53 -0800998 # Verify the existing partitions.
Tao Baod4caaae2016-04-12 15:53:16 -0700999 system_diff.WriteVerifyScript(script, touched_blocks_only=True)
Jesse Zhao75bcea02015-01-06 10:59:53 -08001000 if vendor_diff:
Tao Baod4caaae2016-04-12 15:53:16 -07001001 vendor_diff.WriteVerifyScript(script, touched_blocks_only=True)
Jesse Zhao75bcea02015-01-06 10:59:53 -08001002
Geremy Condra36bd3652014-02-06 19:45:10 -08001003 script.Comment("---- start making changes here ----")
1004
1005 device_specific.IncrementalOTA_InstallBegin()
1006
Doug Zongkerab7ca1d2014-08-26 10:40:28 -07001007 system_diff.WriteScript(script, output_zip,
1008 progress=0.8 if vendor_diff else 0.9)
Tao Bao68658c02015-06-01 13:40:49 -07001009
Doug Zongkerfc44a512014-08-26 13:10:25 -07001010 if vendor_diff:
Doug Zongkerab7ca1d2014-08-26 10:40:28 -07001011 vendor_diff.WriteScript(script, output_zip, progress=0.1)
Geremy Condra36bd3652014-02-06 19:45:10 -08001012
1013 if OPTIONS.two_step:
1014 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
1015 script.WriteRawImage("/boot", "boot.img")
1016 print "writing full boot image (forced by two-step mode)"
1017
1018 if not OPTIONS.two_step:
1019 if updating_boot:
Doug Zongkerf8340082014-08-05 10:39:37 -07001020 if include_full_boot:
1021 print "boot image changed; including full."
1022 script.Print("Installing boot image...")
1023 script.WriteRawImage("/boot", "boot.img")
1024 else:
1025 # Produce the boot image by applying a patch to the current
1026 # contents of the boot partition, and write it back to the
1027 # partition.
1028 print "boot image changed; including patch."
1029 script.Print("Patching boot image...")
1030 script.ShowProgress(0.1, 10)
1031 script.ApplyPatch("%s:%s:%d:%s:%d:%s"
1032 % (boot_type, boot_device,
1033 source_boot.size, source_boot.sha1,
1034 target_boot.size, target_boot.sha1),
1035 "-",
1036 target_boot.size, target_boot.sha1,
1037 source_boot.sha1, "patch/boot.img.p")
Geremy Condra36bd3652014-02-06 19:45:10 -08001038 else:
1039 print "boot image unchanged; skipping."
1040
1041 # Do device-specific installation (eg, write radio image).
1042 device_specific.IncrementalOTA_InstallEnd()
1043
1044 if OPTIONS.extra_script is not None:
1045 script.AppendExtra(OPTIONS.extra_script)
1046
Doug Zongker922206e2014-03-04 13:16:24 -08001047 if OPTIONS.wipe_user_data:
1048 script.Print("Erasing user data...")
1049 script.FormatPartition("/data")
Tao Bao5d182562016-02-23 11:38:39 -08001050 metadata["ota-wipe"] = "yes"
Doug Zongker922206e2014-03-04 13:16:24 -08001051
Geremy Condra36bd3652014-02-06 19:45:10 -08001052 if OPTIONS.two_step:
1053 script.AppendExtra("""
1054set_stage("%(bcb_dev)s", "");
1055endif;
1056endif;
1057""" % bcb_dev)
1058
1059 script.SetProgress(1)
Tao Bao4996cf02016-03-08 17:53:39 -08001060 # For downgrade OTAs, we prefer to use the update-binary in the source
1061 # build that is actually newer than the one in the target build.
1062 if OPTIONS.downgrade:
1063 script.AddToZip(source_zip, output_zip, input_path=OPTIONS.updater_binary)
1064 else:
1065 script.AddToZip(target_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -08001066 metadata["ota-required-cache"] = str(script.required_cache)
Geremy Condra36bd3652014-02-06 19:45:10 -08001067 WriteMetadata(metadata, output_zip)
1068
Doug Zongker32b527d2014-03-04 10:03:02 -08001069
Tao Bao9bc6bb22015-11-09 16:58:28 -08001070def WriteVerifyPackage(input_zip, output_zip):
1071 script = edify_generator.EdifyGenerator(3, OPTIONS.info_dict)
1072
1073 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties")
1074 recovery_mount_options = OPTIONS.info_dict.get(
1075 "recovery_mount_options")
1076 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -07001077 if oem_props:
Tao Bao9bc6bb22015-11-09 16:58:28 -08001078 if OPTIONS.oem_source is None:
1079 raise common.ExternalError("OEM source required for this build")
Tao Bao8608cde2016-02-25 19:49:55 -08001080 if not OPTIONS.oem_no_mount:
1081 script.Mount("/oem", recovery_mount_options)
Tao Bao9bc6bb22015-11-09 16:58:28 -08001082 oem_dict = common.LoadDictionaryFromLines(
1083 open(OPTIONS.oem_source).readlines())
1084
1085 target_fp = CalculateFingerprint(oem_props, oem_dict, OPTIONS.info_dict)
1086 metadata = {
1087 "post-build": target_fp,
1088 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
1089 OPTIONS.info_dict),
1090 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
1091 }
1092
1093 device_specific = common.DeviceSpecificParams(
1094 input_zip=input_zip,
1095 input_version=OPTIONS.info_dict["recovery_api_version"],
1096 output_zip=output_zip,
1097 script=script,
1098 input_tmp=OPTIONS.input_tmp,
1099 metadata=metadata,
1100 info_dict=OPTIONS.info_dict)
1101
1102 AppendAssertions(script, OPTIONS.info_dict, oem_dict)
1103
1104 script.Print("Verifying device images against %s..." % target_fp)
1105 script.AppendExtra("")
1106
1107 script.Print("Verifying boot...")
1108 boot_img = common.GetBootableImage(
1109 "boot.img", "boot.img", OPTIONS.input_tmp, "BOOT")
1110 boot_type, boot_device = common.GetTypeAndDevice(
1111 "/boot", OPTIONS.info_dict)
1112 script.Verify("%s:%s:%d:%s" % (
1113 boot_type, boot_device, boot_img.size, boot_img.sha1))
1114 script.AppendExtra("")
1115
1116 script.Print("Verifying recovery...")
1117 recovery_img = common.GetBootableImage(
1118 "recovery.img", "recovery.img", OPTIONS.input_tmp, "RECOVERY")
1119 recovery_type, recovery_device = common.GetTypeAndDevice(
1120 "/recovery", OPTIONS.info_dict)
1121 script.Verify("%s:%s:%d:%s" % (
1122 recovery_type, recovery_device, recovery_img.size, recovery_img.sha1))
1123 script.AppendExtra("")
1124
1125 system_tgt = GetImage("system", OPTIONS.input_tmp, OPTIONS.info_dict)
1126 system_tgt.ResetFileMap()
1127 system_diff = common.BlockDifference("system", system_tgt, src=None)
1128 system_diff.WriteStrictVerifyScript(script)
1129
1130 if HasVendorPartition(input_zip):
1131 vendor_tgt = GetImage("vendor", OPTIONS.input_tmp, OPTIONS.info_dict)
1132 vendor_tgt.ResetFileMap()
1133 vendor_diff = common.BlockDifference("vendor", vendor_tgt, src=None)
1134 vendor_diff.WriteStrictVerifyScript(script)
1135
1136 # Device specific partitions, such as radio, bootloader and etc.
1137 device_specific.VerifyOTA_Assertions()
1138
1139 script.SetProgress(1.0)
1140 script.AddToZip(input_zip, output_zip, input_path=OPTIONS.updater_binary)
Tao Baod8d14be2016-02-04 14:26:02 -08001141 metadata["ota-required-cache"] = str(script.required_cache)
Tao Bao9bc6bb22015-11-09 16:58:28 -08001142 WriteMetadata(metadata, output_zip)
1143
1144
Tao Baoc098e9e2016-01-07 13:03:56 -08001145def WriteABOTAPackageWithBrilloScript(target_file, output_file,
1146 source_file=None):
1147 """Generate an Android OTA package that has A/B update payload."""
1148
Alex Deymod8d96ec2016-06-10 16:38:31 -07001149 # The place where the output from the subprocess should go.
1150 log_file = sys.stdout if OPTIONS.verbose else subprocess.PIPE
1151
Tao Baoc098e9e2016-01-07 13:03:56 -08001152 # Setup signing keys.
1153 if OPTIONS.package_key is None:
1154 OPTIONS.package_key = OPTIONS.info_dict.get(
1155 "default_system_dev_certificate",
1156 "build/target/product/security/testkey")
1157
1158 # A/B updater expects key in RSA format.
1159 cmd = ["openssl", "pkcs8",
1160 "-in", OPTIONS.package_key + OPTIONS.private_key_suffix,
1161 "-inform", "DER", "-nocrypt"]
1162 rsa_key = common.MakeTempFile(prefix="key-", suffix=".key")
1163 cmd.extend(["-out", rsa_key])
Alex Deymod8d96ec2016-06-10 16:38:31 -07001164 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1165 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001166 assert p1.returncode == 0, "openssl pkcs8 failed"
1167
1168 # Stage the output zip package for signing.
1169 temp_zip_file = tempfile.NamedTemporaryFile()
1170 output_zip = zipfile.ZipFile(temp_zip_file, "w",
1171 compression=zipfile.ZIP_DEFLATED)
1172
1173 # Metadata to comply with Android OTA package format.
1174 oem_props = OPTIONS.info_dict.get("oem_fingerprint_properties", None)
1175 oem_dict = None
1176 if oem_props:
1177 if OPTIONS.oem_source is None:
1178 raise common.ExternalError("OEM source required for this build")
1179 oem_dict = common.LoadDictionaryFromLines(
1180 open(OPTIONS.oem_source).readlines())
1181
1182 metadata = {
1183 "post-build": CalculateFingerprint(oem_props, oem_dict,
1184 OPTIONS.info_dict),
1185 "pre-device": GetOemProperty("ro.product.device", oem_props, oem_dict,
1186 OPTIONS.info_dict),
1187 "post-timestamp": GetBuildProp("ro.build.date.utc", OPTIONS.info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -08001188 "ota-required-cache": "0",
1189 "ota-type": "AB",
Tao Baoc098e9e2016-01-07 13:03:56 -08001190 }
1191
1192 if source_file is not None:
1193 metadata["pre-build"] = CalculateFingerprint(oem_props, oem_dict,
1194 OPTIONS.source_info_dict)
1195
1196 # 1. Generate payload.
1197 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
1198 cmd = ["brillo_update_payload", "generate",
1199 "--payload", payload_file,
1200 "--target_image", target_file]
1201 if source_file is not None:
1202 cmd.extend(["--source_image", source_file])
Alex Deymod8d96ec2016-06-10 16:38:31 -07001203 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1204 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001205 assert p1.returncode == 0, "brillo_update_payload generate failed"
1206
1207 # 2. Generate hashes of the payload and metadata files.
1208 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1209 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
1210 cmd = ["brillo_update_payload", "hash",
1211 "--unsigned_payload", payload_file,
1212 "--signature_size", "256",
1213 "--metadata_hash_file", metadata_sig_file,
1214 "--payload_hash_file", payload_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001215 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1216 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001217 assert p1.returncode == 0, "brillo_update_payload hash failed"
1218
1219 # 3. Sign the hashes and insert them back into the payload file.
1220 signed_payload_sig_file = common.MakeTempFile(prefix="signed-sig-",
1221 suffix=".bin")
1222 signed_metadata_sig_file = common.MakeTempFile(prefix="signed-sig-",
1223 suffix=".bin")
1224 # 3a. Sign the payload hash.
1225 cmd = ["openssl", "pkeyutl", "-sign",
1226 "-inkey", rsa_key,
1227 "-pkeyopt", "digest:sha256",
1228 "-in", payload_sig_file,
1229 "-out", signed_payload_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001230 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1231 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001232 assert p1.returncode == 0, "openssl sign payload failed"
1233
1234 # 3b. Sign the metadata hash.
1235 cmd = ["openssl", "pkeyutl", "-sign",
1236 "-inkey", rsa_key,
1237 "-pkeyopt", "digest:sha256",
1238 "-in", metadata_sig_file,
1239 "-out", signed_metadata_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001240 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1241 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001242 assert p1.returncode == 0, "openssl sign metadata failed"
1243
1244 # 3c. Insert the signatures back into the payload file.
1245 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
1246 suffix=".bin")
1247 cmd = ["brillo_update_payload", "sign",
1248 "--unsigned_payload", payload_file,
1249 "--payload", signed_payload_file,
1250 "--signature_size", "256",
1251 "--metadata_signature_file", signed_metadata_sig_file,
1252 "--payload_signature_file", signed_payload_sig_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001253 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1254 p1.communicate()
Tao Baoc098e9e2016-01-07 13:03:56 -08001255 assert p1.returncode == 0, "brillo_update_payload sign failed"
1256
Alex Deymo19241c12016-02-04 22:29:29 -08001257 # 4. Dump the signed payload properties.
1258 properties_file = common.MakeTempFile(prefix="payload-properties-",
1259 suffix=".txt")
1260 cmd = ["brillo_update_payload", "properties",
1261 "--payload", signed_payload_file,
1262 "--properties_file", properties_file]
Alex Deymod8d96ec2016-06-10 16:38:31 -07001263 p1 = common.Run(cmd, stdout=log_file, stderr=subprocess.STDOUT)
1264 p1.communicate()
Alex Deymo19241c12016-02-04 22:29:29 -08001265 assert p1.returncode == 0, "brillo_update_payload properties failed"
1266
Tao Bao7c5dc572016-06-14 17:48:11 -07001267 if OPTIONS.wipe_user_data:
1268 with open(properties_file, "a") as f:
1269 f.write("POWERWASH=1\n")
1270 metadata["ota-wipe"] = "yes"
1271
Alex Deymo19241c12016-02-04 22:29:29 -08001272 # Add the signed payload file and properties into the zip.
1273 common.ZipWrite(output_zip, properties_file, arcname="payload_properties.txt")
Tao Baoc098e9e2016-01-07 13:03:56 -08001274 common.ZipWrite(output_zip, signed_payload_file, arcname="payload.bin",
1275 compress_type=zipfile.ZIP_STORED)
1276 WriteMetadata(metadata, output_zip)
1277
1278 # Sign the whole package to comply with the Android OTA package format.
1279 common.ZipClose(output_zip)
1280 SignOutput(temp_zip_file.name, output_file)
1281 temp_zip_file.close()
1282
1283
Dan Albert8b72aef2015-03-23 19:13:21 -07001284class FileDifference(object):
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001285 def __init__(self, partition, source_zip, target_zip, output_zip):
Dan Albert8b72aef2015-03-23 19:13:21 -07001286 self.deferred_patch_list = None
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001287 print "Loading target..."
1288 self.target_data = target_data = LoadPartitionFiles(target_zip, partition)
1289 print "Loading source..."
1290 self.source_data = source_data = LoadPartitionFiles(source_zip, partition)
1291
1292 self.verbatim_targets = verbatim_targets = []
1293 self.patch_list = patch_list = []
1294 diffs = []
1295 self.renames = renames = {}
1296 known_paths = set()
1297 largest_source_size = 0
1298
1299 matching_file_cache = {}
1300 for fn, sf in source_data.items():
1301 assert fn == sf.name
1302 matching_file_cache["path:" + fn] = sf
1303 if fn in target_data.keys():
1304 AddToKnownPaths(fn, known_paths)
1305 # Only allow eligibility for filename/sha matching
1306 # if there isn't a perfect path match.
1307 if target_data.get(sf.name) is None:
1308 matching_file_cache["file:" + fn.split("/")[-1]] = sf
1309 matching_file_cache["sha:" + sf.sha1] = sf
1310
1311 for fn in sorted(target_data.keys()):
1312 tf = target_data[fn]
1313 assert fn == tf.name
1314 sf = ClosestFileMatch(tf, matching_file_cache, renames)
1315 if sf is not None and sf.name != tf.name:
1316 print "File has moved from " + sf.name + " to " + tf.name
1317 renames[sf.name] = tf
1318
1319 if sf is None or fn in OPTIONS.require_verbatim:
1320 # This file should be included verbatim
1321 if fn in OPTIONS.prohibit_verbatim:
1322 raise common.ExternalError("\"%s\" must be sent verbatim" % (fn,))
1323 print "send", fn, "verbatim"
1324 tf.AddToZip(output_zip)
Michael Runge63f01de2014-10-28 19:24:19 -07001325 verbatim_targets.append((fn, tf.size, tf.sha1))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001326 if fn in target_data.keys():
1327 AddToKnownPaths(fn, known_paths)
1328 elif tf.sha1 != sf.sha1:
1329 # File is different; consider sending as a patch
1330 diffs.append(common.Difference(tf, sf))
1331 else:
1332 # Target file data identical to source (may still be renamed)
1333 pass
1334
1335 common.ComputeDifferences(diffs)
1336
1337 for diff in diffs:
1338 tf, sf, d = diff.GetPatch()
1339 path = "/".join(tf.name.split("/")[:-1])
1340 if d is None or len(d) > tf.size * OPTIONS.patch_threshold or \
1341 path not in known_paths:
1342 # patch is almost as big as the file; don't bother patching
1343 # or a patch + rename cannot take place due to the target
1344 # directory not existing
1345 tf.AddToZip(output_zip)
Michael Runge63f01de2014-10-28 19:24:19 -07001346 verbatim_targets.append((tf.name, tf.size, tf.sha1))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001347 if sf.name in renames:
1348 del renames[sf.name]
1349 AddToKnownPaths(tf.name, known_paths)
1350 else:
1351 common.ZipWriteStr(output_zip, "patch/" + sf.name + ".p", d)
1352 patch_list.append((tf, sf, tf.size, common.sha1(d).hexdigest()))
1353 largest_source_size = max(largest_source_size, sf.size)
1354
1355 self.largest_source_size = largest_source_size
1356
1357 def EmitVerification(self, script):
1358 so_far = 0
Dan Albert8b72aef2015-03-23 19:13:21 -07001359 for tf, sf, _, _ in self.patch_list:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001360 if tf.name != sf.name:
1361 script.SkipNextActionIfTargetExists(tf.name, tf.sha1)
1362 script.PatchCheck("/"+sf.name, tf.sha1, sf.sha1)
1363 so_far += sf.size
1364 return so_far
1365
Michael Runge63f01de2014-10-28 19:24:19 -07001366 def EmitExplicitTargetVerification(self, script):
Dan Albert8b72aef2015-03-23 19:13:21 -07001367 for fn, _, sha1 in self.verbatim_targets:
1368 if fn[-1] != "/":
Michael Runge63f01de2014-10-28 19:24:19 -07001369 script.FileCheck("/"+fn, sha1)
1370 for tf, _, _, _ in self.patch_list:
1371 script.FileCheck(tf.name, tf.sha1)
1372
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001373 def RemoveUnneededFiles(self, script, extras=()):
Tao Baoa77d41e2015-09-03 21:17:37 -07001374 file_list = ["/" + i[0] for i in self.verbatim_targets]
1375 file_list += ["/" + i for i in self.source_data
1376 if i not in self.target_data and i not in self.renames]
1377 file_list += list(extras)
1378 # Sort the list in descending order, which removes all the files first
1379 # before attempting to remove the folder. (Bug: 22960996)
1380 script.DeleteFiles(sorted(file_list, reverse=True))
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001381
1382 def TotalPatchSize(self):
1383 return sum(i[1].size for i in self.patch_list)
1384
1385 def EmitPatches(self, script, total_patch_size, so_far):
1386 self.deferred_patch_list = deferred_patch_list = []
1387 for item in self.patch_list:
Dan Albert8b72aef2015-03-23 19:13:21 -07001388 tf, sf, _, _ = item
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001389 if tf.name == "system/build.prop":
1390 deferred_patch_list.append(item)
1391 continue
Dan Albert8b72aef2015-03-23 19:13:21 -07001392 if sf.name != tf.name:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001393 script.SkipNextActionIfTargetExists(tf.name, tf.sha1)
Dan Albert8b72aef2015-03-23 19:13:21 -07001394 script.ApplyPatch("/" + sf.name, "-", tf.size, tf.sha1, sf.sha1,
1395 "patch/" + sf.name + ".p")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001396 so_far += tf.size
1397 script.SetProgress(so_far / total_patch_size)
1398 return so_far
1399
1400 def EmitDeferredPatches(self, script):
1401 for item in self.deferred_patch_list:
Dan Albert8b72aef2015-03-23 19:13:21 -07001402 tf, sf, _, _ = item
1403 script.ApplyPatch("/"+sf.name, "-", tf.size, tf.sha1, sf.sha1,
1404 "patch/" + sf.name + ".p")
1405 script.SetPermissions("/system/build.prop", 0, 0, 0o644, None, None)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001406
1407 def EmitRenames(self, script):
1408 if len(self.renames) > 0:
1409 script.Print("Renaming files...")
1410 for src, tgt in self.renames.iteritems():
1411 print "Renaming " + src + " to " + tgt.name
1412 script.RenameFile(src, tgt.name)
1413
1414
Doug Zongkerc77a9ad2010-09-16 11:28:43 -07001415def WriteIncrementalOTAPackage(target_zip, source_zip, output_zip):
Geremy Condra36bd3652014-02-06 19:45:10 -08001416 target_has_recovery_patch = HasRecoveryPatch(target_zip)
1417 source_has_recovery_patch = HasRecoveryPatch(source_zip)
1418
Doug Zongker26e66192014-02-20 13:22:07 -08001419 if (OPTIONS.block_based and
1420 target_has_recovery_patch and
1421 source_has_recovery_patch):
Geremy Condra36bd3652014-02-06 19:45:10 -08001422 return WriteBlockIncrementalOTAPackage(target_zip, source_zip, output_zip)
1423
Doug Zongker37974732010-09-16 17:44:38 -07001424 source_version = OPTIONS.source_info_dict["recovery_api_version"]
1425 target_version = OPTIONS.target_info_dict["recovery_api_version"]
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001426
Doug Zongker9ce2ebf2010-04-21 14:08:44 -07001427 if source_version == 0:
Tao Bao3e30d972016-03-15 13:20:19 -07001428 print("WARNING: generating edify script for a source that "
1429 "can't install it.")
Tao Bao34b47bf2015-06-22 19:17:41 -07001430 script = edify_generator.EdifyGenerator(
1431 source_version, OPTIONS.target_info_dict,
1432 fstab=OPTIONS.source_info_dict["fstab"])
Doug Zongkereef39442009-04-02 12:14:19 -07001433
Tao Bao34b47bf2015-06-22 19:17:41 -07001434 recovery_mount_options = OPTIONS.source_info_dict.get(
1435 "recovery_mount_options")
Tao Bao3e30d972016-03-15 13:20:19 -07001436 source_oem_props = OPTIONS.source_info_dict.get("oem_fingerprint_properties")
1437 target_oem_props = OPTIONS.target_info_dict.get("oem_fingerprint_properties")
Michael Runge6e836112014-04-15 17:40:21 -07001438 oem_dict = None
Tao Bao3e30d972016-03-15 13:20:19 -07001439 if source_oem_props or target_oem_props:
Michael Runge6e836112014-04-15 17:40:21 -07001440 if OPTIONS.oem_source is None:
1441 raise common.ExternalError("OEM source required for this build")
Tao Bao1bb5a182016-03-04 09:45:03 -08001442 if not OPTIONS.oem_no_mount:
1443 script.Mount("/oem", recovery_mount_options)
Dan Albert8b72aef2015-03-23 19:13:21 -07001444 oem_dict = common.LoadDictionaryFromLines(
1445 open(OPTIONS.oem_source).readlines())
Michael Runge6e836112014-04-15 17:40:21 -07001446
Dan Albert8b72aef2015-03-23 19:13:21 -07001447 metadata = {
Tao Bao3e30d972016-03-15 13:20:19 -07001448 "pre-device": GetOemProperty("ro.product.device", source_oem_props,
1449 oem_dict, OPTIONS.source_info_dict),
Tao Baod8d14be2016-02-04 14:26:02 -08001450 "ota-type": "FILE",
Dan Albert8b72aef2015-03-23 19:13:21 -07001451 }
Doug Zongker2ea21062010-04-28 16:05:21 -07001452
Tao Bao5d182562016-02-23 11:38:39 -08001453 post_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.target_info_dict)
1454 pre_timestamp = GetBuildProp("ro.build.date.utc", OPTIONS.source_info_dict)
1455 is_downgrade = long(post_timestamp) < long(pre_timestamp)
1456
1457 if OPTIONS.downgrade:
1458 metadata["ota-downgrade"] = "yes"
1459 if not is_downgrade:
1460 raise RuntimeError("--downgrade specified but no downgrade detected: "
1461 "pre: %s, post: %s" % (pre_timestamp, post_timestamp))
1462 else:
1463 if is_downgrade:
1464 # Non-fatal here to allow generating such a package which may require
1465 # manual work to adjust the post-timestamp. A legit use case is that we
1466 # cut a new build C (after having A and B), but want to enfore the
1467 # update path of A -> C -> B. Specifying --downgrade may not help since
1468 # that would enforce a data wipe for C -> B update.
1469 print("\nWARNING: downgrade detected: pre: %s, post: %s.\n"
1470 "The package may not be deployed properly. "
1471 "Try --downgrade?\n" % (pre_timestamp, post_timestamp))
1472 metadata["post-timestamp"] = post_timestamp
1473
Doug Zongker05d3dea2009-06-22 11:32:31 -07001474 device_specific = common.DeviceSpecificParams(
1475 source_zip=source_zip,
Doug Zongker14833602010-02-02 13:12:04 -08001476 source_version=source_version,
Doug Zongker05d3dea2009-06-22 11:32:31 -07001477 target_zip=target_zip,
Doug Zongker14833602010-02-02 13:12:04 -08001478 target_version=target_version,
Doug Zongker05d3dea2009-06-22 11:32:31 -07001479 output_zip=output_zip,
Doug Zongker2ea21062010-04-28 16:05:21 -07001480 script=script,
Doug Zongker96a57e72010-09-26 14:57:41 -07001481 metadata=metadata,
Tao Bao6f0b2192015-10-13 16:37:12 -07001482 info_dict=OPTIONS.source_info_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -07001483
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001484 system_diff = FileDifference("system", source_zip, target_zip, output_zip)
Michael Runge7cd99ba2014-10-22 17:21:48 -07001485 script.Mount("/system", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001486 if HasVendorPartition(target_zip):
1487 vendor_diff = FileDifference("vendor", source_zip, target_zip, output_zip)
Michael Runge7cd99ba2014-10-22 17:21:48 -07001488 script.Mount("/vendor", recovery_mount_options)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001489 else:
1490 vendor_diff = None
Michael Runge6e836112014-04-15 17:40:21 -07001491
Tao Bao3e30d972016-03-15 13:20:19 -07001492 target_fp = CalculateFingerprint(target_oem_props, oem_dict,
Dan Albert8b72aef2015-03-23 19:13:21 -07001493 OPTIONS.target_info_dict)
Tao Bao3e30d972016-03-15 13:20:19 -07001494 source_fp = CalculateFingerprint(source_oem_props, oem_dict,
Dan Albert8b72aef2015-03-23 19:13:21 -07001495 OPTIONS.source_info_dict)
Michael Runge6e836112014-04-15 17:40:21 -07001496
Tao Bao3e30d972016-03-15 13:20:19 -07001497 if source_oem_props is None and target_oem_props is None:
Michael Runge6e836112014-04-15 17:40:21 -07001498 script.AssertSomeFingerprint(source_fp, target_fp)
Tao Bao3e30d972016-03-15 13:20:19 -07001499 elif source_oem_props is not None and target_oem_props is not None:
Michael Runge6e836112014-04-15 17:40:21 -07001500 script.AssertSomeThumbprint(
1501 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict),
1502 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Tao Bao3e30d972016-03-15 13:20:19 -07001503 elif source_oem_props is None and target_oem_props is not None:
1504 script.AssertFingerprintOrThumbprint(
1505 source_fp,
1506 GetBuildProp("ro.build.thumbprint", OPTIONS.target_info_dict))
1507 else:
1508 script.AssertFingerprintOrThumbprint(
1509 target_fp,
1510 GetBuildProp("ro.build.thumbprint", OPTIONS.source_info_dict))
Michael Runge6e836112014-04-15 17:40:21 -07001511
Doug Zongker2ea21062010-04-28 16:05:21 -07001512 metadata["pre-build"] = source_fp
1513 metadata["post-build"] = target_fp
Doug Zongkereef39442009-04-02 12:14:19 -07001514
Doug Zongker55d93282011-01-25 17:03:34 -08001515 source_boot = common.GetBootableImage(
Doug Zongkerd5131602012-08-02 14:46:42 -07001516 "/tmp/boot.img", "boot.img", OPTIONS.source_tmp, "BOOT",
1517 OPTIONS.source_info_dict)
Doug Zongker55d93282011-01-25 17:03:34 -08001518 target_boot = common.GetBootableImage(
1519 "/tmp/boot.img", "boot.img", OPTIONS.target_tmp, "BOOT")
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001520 updating_boot = (not OPTIONS.two_step and
1521 (source_boot.data != target_boot.data))
Doug Zongkereef39442009-04-02 12:14:19 -07001522
Doug Zongker55d93282011-01-25 17:03:34 -08001523 source_recovery = common.GetBootableImage(
Doug Zongkerd5131602012-08-02 14:46:42 -07001524 "/tmp/recovery.img", "recovery.img", OPTIONS.source_tmp, "RECOVERY",
1525 OPTIONS.source_info_dict)
Doug Zongker55d93282011-01-25 17:03:34 -08001526 target_recovery = common.GetBootableImage(
1527 "/tmp/recovery.img", "recovery.img", OPTIONS.target_tmp, "RECOVERY")
Doug Zongkerf6a8bad2009-05-29 11:41:21 -07001528 updating_recovery = (source_recovery.data != target_recovery.data)
Doug Zongkereef39442009-04-02 12:14:19 -07001529
Doug Zongker881dd402009-09-20 14:03:55 -07001530 # Here's how we divide up the progress bar:
1531 # 0.1 for verifying the start state (PatchCheck calls)
1532 # 0.8 for applying patches (ApplyPatch calls)
1533 # 0.1 for unpacking verbatim files, symlinking, and doing the
1534 # device-specific commands.
Doug Zongkereef39442009-04-02 12:14:19 -07001535
Michael Runge6e836112014-04-15 17:40:21 -07001536 AppendAssertions(script, OPTIONS.target_info_dict, oem_dict)
Doug Zongker05d3dea2009-06-22 11:32:31 -07001537 device_specific.IncrementalOTA_Assertions()
Doug Zongkereef39442009-04-02 12:14:19 -07001538
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001539 # Two-step incremental package strategy (in chronological order,
1540 # which is *not* the order in which the generated script has
1541 # things):
1542 #
1543 # if stage is not "2/3" or "3/3":
1544 # do verification on current system
1545 # write recovery image to boot partition
1546 # set stage to "2/3"
1547 # reboot to boot partition and restart recovery
1548 # else if stage is "2/3":
1549 # write recovery image to recovery partition
1550 # set stage to "3/3"
1551 # reboot to recovery partition and restart recovery
1552 # else:
1553 # (stage must be "3/3")
1554 # perform update:
1555 # patch system files, etc.
1556 # force full install of new boot image
1557 # set up system to update recovery partition on first boot
Dan Albert8b72aef2015-03-23 19:13:21 -07001558 # complete script normally
1559 # (allow recovery to mark itself finished and reboot)
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001560
1561 if OPTIONS.two_step:
Tao Baodd24da92015-07-29 14:09:23 -07001562 if not OPTIONS.source_info_dict.get("multistage_support", None):
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001563 assert False, "two-step packages not supported by this build"
Tao Baodd24da92015-07-29 14:09:23 -07001564 fs = OPTIONS.source_info_dict["fstab"]["/misc"]
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001565 assert fs.fs_type.upper() == "EMMC", \
1566 "two-step packages only supported on devices with EMMC /misc partitions"
1567 bcb_dev = {"bcb_dev": fs.device}
1568 common.ZipWriteStr(output_zip, "recovery.img", target_recovery.data)
1569 script.AppendExtra("""
Michael Rungefb8886d2014-10-23 13:51:04 -07001570if get_stage("%(bcb_dev)s") == "2/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001571""" % bcb_dev)
Dan Albert8b72aef2015-03-23 19:13:21 -07001572 script.AppendExtra("sleep(20);\n")
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001573 script.WriteRawImage("/recovery", "recovery.img")
1574 script.AppendExtra("""
1575set_stage("%(bcb_dev)s", "3/3");
1576reboot_now("%(bcb_dev)s", "recovery");
Michael Rungefb8886d2014-10-23 13:51:04 -07001577else if get_stage("%(bcb_dev)s") != "3/3" then
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001578""" % bcb_dev)
1579
Tao Bao6c55a8a2015-04-08 15:30:27 -07001580 # Dump fingerprints
1581 script.Print("Source: %s" % (source_fp,))
1582 script.Print("Target: %s" % (target_fp,))
1583
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001584 script.Print("Verifying current system...")
1585
Doug Zongkere5ff5902012-01-17 10:55:37 -08001586 device_specific.IncrementalOTA_VerifyBegin()
1587
Doug Zongker881dd402009-09-20 14:03:55 -07001588 script.ShowProgress(0.1, 0)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001589 so_far = system_diff.EmitVerification(script)
1590 if vendor_diff:
1591 so_far += vendor_diff.EmitVerification(script)
Doug Zongkereef39442009-04-02 12:14:19 -07001592
Tao Baod8d14be2016-02-04 14:26:02 -08001593 size = []
1594 if system_diff.patch_list:
1595 size.append(system_diff.largest_source_size)
1596 if vendor_diff:
1597 if vendor_diff.patch_list:
1598 size.append(vendor_diff.largest_source_size)
1599
Doug Zongker5da317e2009-06-02 13:38:17 -07001600 if updating_boot:
Doug Zongkerea5d7a92010-09-12 15:26:16 -07001601 d = common.Difference(target_boot, source_boot)
Doug Zongker761e6422009-09-25 10:45:39 -07001602 _, _, d = d.ComputePatch()
Doug Zongker5da317e2009-06-02 13:38:17 -07001603 print "boot target: %d source: %d diff: %d" % (
1604 target_boot.size, source_boot.size, len(d))
1605
Doug Zongker048e7ca2009-06-15 14:31:53 -07001606 common.ZipWriteStr(output_zip, "patch/boot.img.p", d)
Doug Zongker5da317e2009-06-02 13:38:17 -07001607
Tao Baodd24da92015-07-29 14:09:23 -07001608 boot_type, boot_device = common.GetTypeAndDevice(
1609 "/boot", OPTIONS.source_info_dict)
Doug Zongkerf2ab2902010-09-22 10:12:54 -07001610
1611 script.PatchCheck("%s:%s:%d:%s:%d:%s" %
1612 (boot_type, boot_device,
Doug Zongker67369982010-07-07 13:53:32 -07001613 source_boot.size, source_boot.sha1,
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001614 target_boot.size, target_boot.sha1))
Doug Zongker881dd402009-09-20 14:03:55 -07001615 so_far += source_boot.size
Tao Baod8d14be2016-02-04 14:26:02 -08001616 size.append(target_boot.size)
Doug Zongker5da317e2009-06-02 13:38:17 -07001617
Tao Baod8d14be2016-02-04 14:26:02 -08001618 if size:
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001619 script.CacheFreeSpaceCheck(max(size))
Doug Zongker5a482092010-02-17 16:09:18 -08001620
Doug Zongker05d3dea2009-06-22 11:32:31 -07001621 device_specific.IncrementalOTA_VerifyEnd()
1622
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001623 if OPTIONS.two_step:
1624 script.WriteRawImage("/boot", "recovery.img")
1625 script.AppendExtra("""
1626set_stage("%(bcb_dev)s", "2/3");
1627reboot_now("%(bcb_dev)s", "");
1628else
1629""" % bcb_dev)
1630
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001631 script.Comment("---- start making changes here ----")
Doug Zongkereef39442009-04-02 12:14:19 -07001632
Doug Zongkere5ff5902012-01-17 10:55:37 -08001633 device_specific.IncrementalOTA_InstallBegin()
1634
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001635 if OPTIONS.two_step:
1636 common.ZipWriteStr(output_zip, "boot.img", target_boot.data)
1637 script.WriteRawImage("/boot", "boot.img")
1638 print "writing full boot image (forced by two-step mode)"
1639
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001640 script.Print("Removing unneeded files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001641 system_diff.RemoveUnneededFiles(script, ("/system/recovery.img",))
1642 if vendor_diff:
1643 vendor_diff.RemoveUnneededFiles(script)
Doug Zongkereef39442009-04-02 12:14:19 -07001644
Doug Zongker881dd402009-09-20 14:03:55 -07001645 script.ShowProgress(0.8, 0)
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001646 total_patch_size = 1.0 + system_diff.TotalPatchSize()
1647 if vendor_diff:
1648 total_patch_size += vendor_diff.TotalPatchSize()
Doug Zongker881dd402009-09-20 14:03:55 -07001649 if updating_boot:
1650 total_patch_size += target_boot.size
Doug Zongker881dd402009-09-20 14:03:55 -07001651
1652 script.Print("Patching system files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001653 so_far = system_diff.EmitPatches(script, total_patch_size, 0)
1654 if vendor_diff:
1655 script.Print("Patching vendor files...")
1656 so_far = vendor_diff.EmitPatches(script, total_patch_size, so_far)
Doug Zongker881dd402009-09-20 14:03:55 -07001657
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001658 if not OPTIONS.two_step:
1659 if updating_boot:
1660 # Produce the boot image by applying a patch to the current
1661 # contents of the boot partition, and write it back to the
1662 # partition.
1663 script.Print("Patching boot image...")
1664 script.ApplyPatch("%s:%s:%d:%s:%d:%s"
1665 % (boot_type, boot_device,
1666 source_boot.size, source_boot.sha1,
1667 target_boot.size, target_boot.sha1),
1668 "-",
1669 target_boot.size, target_boot.sha1,
1670 source_boot.sha1, "patch/boot.img.p")
1671 so_far += target_boot.size
1672 script.SetProgress(so_far / total_patch_size)
1673 print "boot image changed; including."
1674 else:
1675 print "boot image unchanged; skipping."
Doug Zongkereef39442009-04-02 12:14:19 -07001676
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001677 system_items = ItemSet("system", "META/filesystem_config.txt")
1678 if vendor_diff:
1679 vendor_items = ItemSet("vendor", "META/vendor_filesystem_config.txt")
1680
Doug Zongkereef39442009-04-02 12:14:19 -07001681 if updating_recovery:
Doug Zongkerb32161a2012-08-21 10:33:44 -07001682 # Recovery is generated as a patch using both the boot image
1683 # (which contains the same linux kernel as recovery) and the file
1684 # /system/etc/recovery-resource.dat (which contains all the images
1685 # used in the recovery UI) as sources. This lets us minimize the
1686 # size of the patch, which must be included in every OTA package.
Doug Zongker73ef8252009-07-23 15:12:53 -07001687 #
Doug Zongkerb32161a2012-08-21 10:33:44 -07001688 # For older builds where recovery-resource.dat is not present, we
1689 # use only the boot image as the source.
1690
Doug Zongkerc9253822014-02-04 12:17:58 -08001691 if not target_has_recovery_patch:
1692 def output_sink(fn, data):
1693 common.ZipWriteStr(output_zip, "recovery/" + fn, data)
Dan Albert8b72aef2015-03-23 19:13:21 -07001694 system_items.Get("system/" + fn)
Doug Zongkerc9253822014-02-04 12:17:58 -08001695
1696 common.MakeRecoveryPatch(OPTIONS.target_tmp, output_sink,
1697 target_recovery, target_boot)
1698 script.DeleteFiles(["/system/recovery-from-boot.p",
Tao Baof2cffbd2015-07-22 12:33:18 -07001699 "/system/etc/recovery.img",
Doug Zongkerc9253822014-02-04 12:17:58 -08001700 "/system/etc/install-recovery.sh"])
Doug Zongker73ef8252009-07-23 15:12:53 -07001701 print "recovery image changed; including as patch from boot."
Doug Zongkereef39442009-04-02 12:14:19 -07001702 else:
1703 print "recovery image unchanged; skipping."
1704
Doug Zongker881dd402009-09-20 14:03:55 -07001705 script.ShowProgress(0.1, 10)
Doug Zongkereef39442009-04-02 12:14:19 -07001706
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001707 target_symlinks = CopyPartitionFiles(system_items, target_zip, None)
1708 if vendor_diff:
1709 target_symlinks.extend(CopyPartitionFiles(vendor_items, target_zip, None))
1710
1711 temp_script = script.MakeTemporary()
1712 system_items.GetMetadata(target_zip)
1713 system_items.Get("system").SetPermissions(temp_script)
1714 if vendor_diff:
1715 vendor_items.GetMetadata(target_zip)
1716 vendor_items.Get("vendor").SetPermissions(temp_script)
1717
1718 # Note that this call will mess up the trees of Items, so make sure
1719 # we're done with them.
1720 source_symlinks = CopyPartitionFiles(system_items, source_zip, None)
1721 if vendor_diff:
1722 source_symlinks.extend(CopyPartitionFiles(vendor_items, source_zip, None))
Doug Zongkereef39442009-04-02 12:14:19 -07001723
1724 target_symlinks_d = dict([(i[1], i[0]) for i in target_symlinks])
Doug Zongkereef39442009-04-02 12:14:19 -07001725 source_symlinks_d = dict([(i[1], i[0]) for i in source_symlinks])
1726
1727 # Delete all the symlinks in source that aren't in target. This
1728 # needs to happen before verbatim files are unpacked, in case a
1729 # symlink in the source is replaced by a real file in the target.
Tao Bao84006ea2015-09-02 10:28:08 -07001730
1731 # If a symlink in the source will be replaced by a regular file, we cannot
1732 # delete the symlink/file in case the package gets applied again. For such
1733 # a symlink, we prepend a sha1_check() to detect if it has been updated.
1734 # (Bug: 23646151)
1735 replaced_symlinks = dict()
1736 if system_diff:
1737 for i in system_diff.verbatim_targets:
1738 replaced_symlinks["/%s" % (i[0],)] = i[2]
1739 if vendor_diff:
1740 for i in vendor_diff.verbatim_targets:
1741 replaced_symlinks["/%s" % (i[0],)] = i[2]
1742
1743 if system_diff:
1744 for tf in system_diff.renames.values():
1745 replaced_symlinks["/%s" % (tf.name,)] = tf.sha1
1746 if vendor_diff:
1747 for tf in vendor_diff.renames.values():
1748 replaced_symlinks["/%s" % (tf.name,)] = tf.sha1
1749
1750 always_delete = []
1751 may_delete = []
Doug Zongkereef39442009-04-02 12:14:19 -07001752 for dest, link in source_symlinks:
1753 if link not in target_symlinks_d:
Tao Bao84006ea2015-09-02 10:28:08 -07001754 if link in replaced_symlinks:
1755 may_delete.append((link, replaced_symlinks[link]))
1756 else:
1757 always_delete.append(link)
1758 script.DeleteFiles(always_delete)
1759 script.DeleteFilesIfNotMatching(may_delete)
Doug Zongkereef39442009-04-02 12:14:19 -07001760
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001761 if system_diff.verbatim_targets:
1762 script.Print("Unpacking new system files...")
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001763 script.UnpackPackageDir("system", "/system")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001764 if vendor_diff and vendor_diff.verbatim_targets:
1765 script.Print("Unpacking new vendor files...")
1766 script.UnpackPackageDir("vendor", "/vendor")
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001767
Doug Zongkerc9253822014-02-04 12:17:58 -08001768 if updating_recovery and not target_has_recovery_patch:
Doug Zongker42265392010-02-12 10:21:00 -08001769 script.Print("Unpacking new recovery...")
1770 script.UnpackPackageDir("recovery", "/system")
1771
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001772 system_diff.EmitRenames(script)
1773 if vendor_diff:
1774 vendor_diff.EmitRenames(script)
Michael Runge4038aa82013-12-13 18:06:28 -08001775
Doug Zongker05d3dea2009-06-22 11:32:31 -07001776 script.Print("Symlinks and permissions...")
Doug Zongkereef39442009-04-02 12:14:19 -07001777
1778 # Create all the symlinks that don't already exist, or point to
1779 # somewhere different than what we want. Delete each symlink before
1780 # creating it, since the 'symlink' command won't overwrite.
1781 to_create = []
1782 for dest, link in target_symlinks:
1783 if link in source_symlinks_d:
1784 if dest != source_symlinks_d[link]:
1785 to_create.append((dest, link))
1786 else:
1787 to_create.append((dest, link))
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001788 script.DeleteFiles([i[1] for i in to_create])
1789 script.MakeSymlinks(to_create)
Doug Zongkereef39442009-04-02 12:14:19 -07001790
1791 # Now that the symlinks are created, we can set all the
1792 # permissions.
Doug Zongkerc494d7c2009-06-18 08:43:44 -07001793 script.AppendScript(temp_script)
Doug Zongkereef39442009-04-02 12:14:19 -07001794
Doug Zongker881dd402009-09-20 14:03:55 -07001795 # Do device-specific installation (eg, write radio image).
Doug Zongker05d3dea2009-06-22 11:32:31 -07001796 device_specific.IncrementalOTA_InstallEnd()
1797
Doug Zongker1c390a22009-05-14 19:06:36 -07001798 if OPTIONS.extra_script is not None:
Doug Zongker67369982010-07-07 13:53:32 -07001799 script.AppendExtra(OPTIONS.extra_script)
Doug Zongker1c390a22009-05-14 19:06:36 -07001800
Doug Zongkere92f15a2011-08-26 13:46:40 -07001801 # Patch the build.prop file last, so if something fails but the
1802 # device can still come up, it appears to be the old build and will
1803 # get set the OTA package again to retry.
1804 script.Print("Patching remaining system files...")
Doug Zongkerc8b4e842014-06-16 15:16:31 -07001805 system_diff.EmitDeferredPatches(script)
Doug Zongkere92f15a2011-08-26 13:46:40 -07001806
Doug Zongker922206e2014-03-04 13:16:24 -08001807 if OPTIONS.wipe_user_data:
1808 script.Print("Erasing user data...")
1809 script.FormatPartition("/data")
Tao Bao5d182562016-02-23 11:38:39 -08001810 metadata["ota-wipe"] = "yes"
Doug Zongker922206e2014-03-04 13:16:24 -08001811
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001812 if OPTIONS.two_step:
1813 script.AppendExtra("""
1814set_stage("%(bcb_dev)s", "");
1815endif;
1816endif;
1817""" % bcb_dev)
1818
Michael Runge63f01de2014-10-28 19:24:19 -07001819 if OPTIONS.verify and system_diff:
1820 script.Print("Remounting and verifying system partition files...")
1821 script.Unmount("/system")
Tao Bao269d7852015-12-02 15:49:13 -08001822 script.Mount("/system", recovery_mount_options)
Michael Runge63f01de2014-10-28 19:24:19 -07001823 system_diff.EmitExplicitTargetVerification(script)
1824
1825 if OPTIONS.verify and vendor_diff:
1826 script.Print("Remounting and verifying vendor partition files...")
1827 script.Unmount("/vendor")
Tao Bao269d7852015-12-02 15:49:13 -08001828 script.Mount("/vendor", recovery_mount_options)
Michael Runge63f01de2014-10-28 19:24:19 -07001829 vendor_diff.EmitExplicitTargetVerification(script)
Tao Bao4996cf02016-03-08 17:53:39 -08001830
1831 # For downgrade OTAs, we prefer to use the update-binary in the source
1832 # build that is actually newer than the one in the target build.
1833 if OPTIONS.downgrade:
1834 script.AddToZip(source_zip, output_zip, input_path=OPTIONS.updater_binary)
1835 else:
1836 script.AddToZip(target_zip, output_zip, input_path=OPTIONS.updater_binary)
Michael Runge63f01de2014-10-28 19:24:19 -07001837
Tao Baod8d14be2016-02-04 14:26:02 -08001838 metadata["ota-required-cache"] = str(script.required_cache)
Doug Zongker2ea21062010-04-28 16:05:21 -07001839 WriteMetadata(metadata, output_zip)
Doug Zongkereef39442009-04-02 12:14:19 -07001840
1841
1842def main(argv):
1843
1844 def option_handler(o, a):
Doug Zongker25568482014-03-03 10:21:27 -08001845 if o == "--board_config":
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001846 pass # deprecated
Doug Zongkereef39442009-04-02 12:14:19 -07001847 elif o in ("-k", "--package_key"):
1848 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001849 elif o in ("-i", "--incremental_from"):
1850 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001851 elif o == "--full_radio":
1852 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001853 elif o == "--full_bootloader":
1854 OPTIONS.full_bootloader = True
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001855 elif o in ("-w", "--wipe_user_data"):
1856 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001857 elif o == "--downgrade":
1858 OPTIONS.downgrade = True
1859 OPTIONS.wipe_user_data = True
Michael Runge6e836112014-04-15 17:40:21 -07001860 elif o in ("-o", "--oem_settings"):
1861 OPTIONS.oem_source = a
Tao Bao8608cde2016-02-25 19:49:55 -08001862 elif o == "--oem_no_mount":
1863 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001864 elif o in ("-e", "--extra_script"):
1865 OPTIONS.extra_script = a
Hristo Bojinovdafb0422010-08-26 14:35:16 -07001866 elif o in ("-a", "--aslr_mode"):
1867 if a in ("on", "On", "true", "True", "yes", "Yes"):
1868 OPTIONS.aslr_mode = True
1869 else:
1870 OPTIONS.aslr_mode = False
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001871 elif o in ("-t", "--worker_threads"):
1872 if a.isdigit():
1873 OPTIONS.worker_threads = int(a)
1874 else:
1875 raise ValueError("Cannot parse value %r for option %r - only "
1876 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001877 elif o in ("-2", "--two_step"):
1878 OPTIONS.two_step = True
Doug Zongker26e66192014-02-20 13:22:07 -08001879 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001880 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001881 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001882 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001883 elif o == "--block":
1884 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001885 elif o in ("-b", "--binary"):
1886 OPTIONS.updater_binary = a
Doug Zongker62d4f182014-08-04 16:06:43 -07001887 elif o in ("--no_fallback_to_full",):
1888 OPTIONS.fallback_to_full = False
Tao Bao8dcf7382015-05-21 14:09:49 -07001889 elif o == "--stash_threshold":
1890 try:
1891 OPTIONS.stash_threshold = float(a)
1892 except ValueError:
1893 raise ValueError("Cannot parse value %r for option %r - expecting "
1894 "a float" % (a, o))
Tao Bao9bc6bb22015-11-09 16:58:28 -08001895 elif o == "--gen_verify":
1896 OPTIONS.gen_verify = True
Tao Baod62c6032015-11-30 09:40:20 -08001897 elif o == "--log_diff":
1898 OPTIONS.log_diff = a
Doug Zongkereef39442009-04-02 12:14:19 -07001899 else:
1900 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001901 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001902
1903 args = common.ParseOptions(argv, __doc__,
Elliott Hughesd8a52f92016-06-20 14:35:47 -07001904 extra_opts="b:k:i:d:we:t:a:2o:",
Dan Albert8b72aef2015-03-23 19:13:21 -07001905 extra_long_opts=[
1906 "board_config=",
1907 "package_key=",
1908 "incremental_from=",
Tao Bao43078aa2015-04-21 14:32:35 -07001909 "full_radio",
leozwangaa6c1a12015-08-14 10:57:58 -07001910 "full_bootloader",
Dan Albert8b72aef2015-03-23 19:13:21 -07001911 "wipe_user_data",
Tao Bao5d182562016-02-23 11:38:39 -08001912 "downgrade",
Dan Albert8b72aef2015-03-23 19:13:21 -07001913 "extra_script=",
1914 "worker_threads=",
1915 "aslr_mode=",
1916 "two_step",
1917 "no_signing",
1918 "block",
1919 "binary=",
1920 "oem_settings=",
Tao Bao8608cde2016-02-25 19:49:55 -08001921 "oem_no_mount",
Dan Albert8b72aef2015-03-23 19:13:21 -07001922 "verify",
1923 "no_fallback_to_full",
Tao Bao8dcf7382015-05-21 14:09:49 -07001924 "stash_threshold=",
Tao Baod62c6032015-11-30 09:40:20 -08001925 "gen_verify",
1926 "log_diff=",
Dan Albert8b72aef2015-03-23 19:13:21 -07001927 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001928
1929 if len(args) != 2:
1930 common.Usage(__doc__)
1931 sys.exit(1)
1932
Tao Bao5d182562016-02-23 11:38:39 -08001933 if OPTIONS.downgrade:
1934 # Sanity check to enforce a data wipe.
1935 if not OPTIONS.wipe_user_data:
1936 raise ValueError("Cannot downgrade without a data wipe")
1937
1938 # We should only allow downgrading incrementals (as opposed to full).
1939 # Otherwise the device may go back from arbitrary build with this full
1940 # OTA package.
1941 if OPTIONS.incremental_source is None:
Elliott Hughesd8a52f92016-06-20 14:35:47 -07001942 raise ValueError("Cannot generate downgradable full OTAs")
Tao Bao5d182562016-02-23 11:38:39 -08001943
Tao Baoc098e9e2016-01-07 13:03:56 -08001944 # Load the dict file from the zip directly to have a peek at the OTA type.
1945 # For packages using A/B update, unzipping is not needed.
1946 input_zip = zipfile.ZipFile(args[0], "r")
1947 OPTIONS.info_dict = common.LoadInfoDict(input_zip)
1948 common.ZipClose(input_zip)
1949
1950 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
1951
1952 if ab_update:
1953 if OPTIONS.incremental_source is not None:
1954 OPTIONS.target_info_dict = OPTIONS.info_dict
1955 source_zip = zipfile.ZipFile(OPTIONS.incremental_source, "r")
1956 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip)
1957 common.ZipClose(source_zip)
1958
1959 if OPTIONS.verbose:
1960 print "--- target info ---"
1961 common.DumpInfoDict(OPTIONS.info_dict)
1962
1963 if OPTIONS.incremental_source is not None:
1964 print "--- source info ---"
1965 common.DumpInfoDict(OPTIONS.source_info_dict)
1966
1967 WriteABOTAPackageWithBrilloScript(
1968 target_file=args[0],
1969 output_file=args[1],
1970 source_file=OPTIONS.incremental_source)
1971
1972 print "done."
1973 return
1974
Doug Zongker1c390a22009-05-14 19:06:36 -07001975 if OPTIONS.extra_script is not None:
1976 OPTIONS.extra_script = open(OPTIONS.extra_script).read()
1977
Doug Zongkereef39442009-04-02 12:14:19 -07001978 print "unzipping target target-files..."
Doug Zongker55d93282011-01-25 17:03:34 -08001979 OPTIONS.input_tmp, input_zip = common.UnzipTemp(args[0])
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001980
Doug Zongkereef39442009-04-02 12:14:19 -07001981 OPTIONS.target_tmp = OPTIONS.input_tmp
Tao Bao2c15d9e2015-07-09 11:51:16 -07001982 OPTIONS.info_dict = common.LoadInfoDict(input_zip, OPTIONS.target_tmp)
Kenny Roote2e9f612013-05-29 12:59:35 -07001983
Doug Zongker37974732010-09-16 17:44:38 -07001984 if OPTIONS.verbose:
1985 print "--- target info ---"
1986 common.DumpInfoDict(OPTIONS.info_dict)
1987
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001988 # If the caller explicitly specified the device-specific extensions
1989 # path via -s/--device_specific, use that. Otherwise, use
1990 # META/releasetools.py if it is present in the target target_files.
1991 # Otherwise, take the path of the file from 'tool_extensions' in the
1992 # info dict and look for that in the local filesystem, relative to
1993 # the current directory.
1994
Doug Zongker37974732010-09-16 17:44:38 -07001995 if OPTIONS.device_specific is None:
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001996 from_input = os.path.join(OPTIONS.input_tmp, "META", "releasetools.py")
1997 if os.path.exists(from_input):
1998 print "(using device-specific extensions from target_files)"
1999 OPTIONS.device_specific = from_input
2000 else:
2001 OPTIONS.device_specific = OPTIONS.info_dict.get("tool_extensions", None)
2002
Doug Zongker37974732010-09-16 17:44:38 -07002003 if OPTIONS.device_specific is not None:
Doug Zongkereb0a78a2014-01-27 10:01:06 -08002004 OPTIONS.device_specific = os.path.abspath(OPTIONS.device_specific)
Doug Zongker37974732010-09-16 17:44:38 -07002005
Tao Baoc098e9e2016-01-07 13:03:56 -08002006 if OPTIONS.info_dict.get("no_recovery") == "true":
Tao Baodb45efa2015-10-27 19:25:18 -07002007 raise common.ExternalError(
2008 "--- target build has specified no recovery ---")
2009
Tao Bao767e3ac2015-11-10 12:19:19 -08002010 # Use the default key to sign the package if not specified with package_key.
2011 if not OPTIONS.no_signing:
2012 if OPTIONS.package_key is None:
2013 OPTIONS.package_key = OPTIONS.info_dict.get(
2014 "default_system_dev_certificate",
2015 "build/target/product/security/testkey")
Doug Zongkereef39442009-04-02 12:14:19 -07002016
Tao Bao767e3ac2015-11-10 12:19:19 -08002017 # Set up the output zip. Create a temporary zip file if signing is needed.
2018 if OPTIONS.no_signing:
2019 if os.path.exists(args[1]):
2020 os.unlink(args[1])
2021 output_zip = zipfile.ZipFile(args[1], "w",
2022 compression=zipfile.ZIP_DEFLATED)
2023 else:
2024 temp_zip_file = tempfile.NamedTemporaryFile()
2025 output_zip = zipfile.ZipFile(temp_zip_file, "w",
2026 compression=zipfile.ZIP_DEFLATED)
Doug Zongker62d4f182014-08-04 16:06:43 -07002027
Daniel Rosenberg40ef35b2015-11-10 19:21:34 -08002028 # Non A/B OTAs rely on /cache partition to store temporary files.
Tao Bao767e3ac2015-11-10 12:19:19 -08002029 cache_size = OPTIONS.info_dict.get("cache_size", None)
Tao Baoc098e9e2016-01-07 13:03:56 -08002030 if cache_size is None:
Tao Bao767e3ac2015-11-10 12:19:19 -08002031 print "--- can't determine the cache partition size ---"
2032 OPTIONS.cache_size = cache_size
Tao Bao8dcf7382015-05-21 14:09:49 -07002033
Tao Bao9bc6bb22015-11-09 16:58:28 -08002034 # Generate a verify package.
2035 if OPTIONS.gen_verify:
2036 WriteVerifyPackage(input_zip, output_zip)
2037
Tao Bao767e3ac2015-11-10 12:19:19 -08002038 # Generate a full OTA.
Tao Bao9bc6bb22015-11-09 16:58:28 -08002039 elif OPTIONS.incremental_source is None:
Tao Baoc098e9e2016-01-07 13:03:56 -08002040 WriteFullOTAPackage(input_zip, output_zip)
Tao Bao767e3ac2015-11-10 12:19:19 -08002041
2042 # Generate an incremental OTA. It will fall back to generate a full OTA on
2043 # failure unless no_fallback_to_full is specified.
2044 else:
2045 print "unzipping source target-files..."
2046 OPTIONS.source_tmp, source_zip = common.UnzipTemp(
2047 OPTIONS.incremental_source)
2048 OPTIONS.target_info_dict = OPTIONS.info_dict
2049 OPTIONS.source_info_dict = common.LoadInfoDict(source_zip,
2050 OPTIONS.source_tmp)
2051 if OPTIONS.verbose:
2052 print "--- source info ---"
2053 common.DumpInfoDict(OPTIONS.source_info_dict)
2054 try:
2055 WriteIncrementalOTAPackage(input_zip, source_zip, output_zip)
Tao Baod62c6032015-11-30 09:40:20 -08002056 if OPTIONS.log_diff:
2057 out_file = open(OPTIONS.log_diff, 'w')
2058 import target_files_diff
2059 target_files_diff.recursiveDiff('',
2060 OPTIONS.source_tmp,
2061 OPTIONS.input_tmp,
2062 out_file)
2063 out_file.close()
Tao Bao767e3ac2015-11-10 12:19:19 -08002064 except ValueError:
2065 if not OPTIONS.fallback_to_full:
2066 raise
2067 print "--- failed to build incremental; falling back to full ---"
2068 OPTIONS.incremental_source = None
Doug Zongker62d4f182014-08-04 16:06:43 -07002069 WriteFullOTAPackage(input_zip, output_zip)
Doug Zongker62d4f182014-08-04 16:06:43 -07002070
Tao Bao767e3ac2015-11-10 12:19:19 -08002071 common.ZipClose(output_zip)
Doug Zongkerafb32ea2011-09-22 10:28:04 -07002072
Tao Bao767e3ac2015-11-10 12:19:19 -08002073 # Sign the generated zip package unless no_signing is specified.
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09002074 if not OPTIONS.no_signing:
2075 SignOutput(temp_zip_file.name, args[1])
2076 temp_zip_file.close()
Doug Zongkereef39442009-04-02 12:14:19 -07002077
Doug Zongkereef39442009-04-02 12:14:19 -07002078 print "done."
2079
2080
2081if __name__ == '__main__':
2082 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08002083 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07002084 main(sys.argv[1:])
Dan Albert8b72aef2015-03-23 19:13:21 -07002085 except common.ExternalError as e:
Doug Zongkereef39442009-04-02 12:14:19 -07002086 print
2087 print " ERROR: %s" % (e,)
2088 print
2089 sys.exit(1)
Doug Zongkerfc44a512014-08-26 13:10:25 -07002090 finally:
2091 common.Cleanup()