blob: 93e7042259a2ac3f61f912e07e28c2929774b540 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700224
225 --enable_vabc_xor
226 Enable the VABC xor feature. Will reduce space requirements for OTA
227
Tianjiee7ab38d2021-09-08 19:09:38 -0700228 --force_minor_version
229 Override the update_engine minor version for delta generation.
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700230
231 --compressor_types
232 A colon ':' separated list of compressors. Allowed values are bz2 and brotli.
Kelvin Zhang410bb382022-01-06 09:15:54 -0800233
234 --enable_zucchini
235 Whether to enable to zucchini feature. Will generate smaller OTA but uses more memory.
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800236
237 --enable_lz4diff
238 Whether to enable lz4diff feature. Will generate smaller OTA for EROFS but
239 uses more memory.
Kelvin Zhange174c322022-03-01 15:51:09 -0800240
241 --spl_downgrade
242 Force generate an SPL downgrade OTA. Only needed if target build has an
243 older SPL.
Doug Zongkereef39442009-04-02 12:14:19 -0700244"""
245
Tao Bao89fbb0f2017-01-10 10:47:58 -0800246from __future__ import print_function
247
Tao Bao32fcdab2018-10-12 10:30:39 -0700248import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700249import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500250import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800251import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500252import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700253import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800254import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800255import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500256import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800257import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700258import zipfile
259
Kelvin Zhang766eea72021-06-03 09:36:08 -0400260import care_map_pb2
Doug Zongkereef39442009-04-02 12:14:19 -0700261import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400262import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500263from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400264 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME, GetZipEntryOffset)
Kelvin Zhang26390482021-11-02 14:31:10 -0700265from common import IsSparseImage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400266import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400267from check_target_files_vintf import CheckVintfIfTrebleEnabled
268from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400269
Tao Bao481bab82017-12-21 11:23:09 -0800270if sys.hexversion < 0x02070000:
271 print("Python 2.7 or newer is required.", file=sys.stderr)
272 sys.exit(1)
273
Tao Bao32fcdab2018-10-12 10:30:39 -0700274logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800275
Kelvin Zhang2e417382020-08-20 11:33:11 -0400276OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700277OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700278OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700279OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700280OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700281OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
282if OPTIONS.worker_threads == 0:
283 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800284OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800285OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800286OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800287OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000288OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700289OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800290OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700291OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700292OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700293# Stash size cannot exceed cache_size * threshold.
294OPTIONS.cache_size = None
295OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800296OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700297OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700298OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700299OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700300OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800301OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800302OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700303OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500304OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700305OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700306OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500307OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500308OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400309OPTIONS.vabc_downgrade = False
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700310OPTIONS.enable_vabc_xor = True
Tianjiee7ab38d2021-09-08 19:09:38 -0700311OPTIONS.force_minor_version = None
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700312OPTIONS.compressor_types = None
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800313OPTIONS.enable_zucchini = True
314OPTIONS.enable_lz4diff = False
Tao Bao8dcf7382015-05-21 14:09:49 -0700315
Tao Bao15a146a2018-02-21 16:06:59 -0800316POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800317DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800318AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400319
Tao Baof0c4aa22018-04-30 20:29:30 -0700320# Files to be unzipped for target diffing purpose.
321TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700322 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Ramji Jiyani13a41372022-01-27 07:05:08 +0000323 'VENDOR_DLKM/*', 'ODM_DLKM/*', 'SYSTEM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800324RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700325
326# Images to be excluded from secondary payload. We essentially only keep
327# 'system_other' and bootloader partitions.
328SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000329 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Ramji Jiyani13a41372022-01-27 07:05:08 +0000330 'system_dlkm', 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor',
331 'vendor', 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800332
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500333
Tao Baofabe0832018-01-17 15:52:28 -0800334class PayloadSigner(object):
335 """A class that wraps the payload signing works.
336
337 When generating a Payload, hashes of the payload and metadata files will be
338 signed with the device key, either by calling an external payload signer or
339 by calling openssl with the package key. This class provides a unified
340 interface, so that callers can just call PayloadSigner.Sign().
341
342 If an external payload signer has been specified (OPTIONS.payload_signer), it
343 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
344 that the signing key should be provided as part of the payload_signer_args.
345 Otherwise without an external signer, it uses the package key
346 (OPTIONS.package_key) and calls openssl for the signing works.
347 """
348
349 def __init__(self):
350 if OPTIONS.payload_signer is None:
351 # Prepare the payload signing key.
352 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
353 pw = OPTIONS.key_passwords[OPTIONS.package_key]
354
355 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
356 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
357 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
358 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700359 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800360
361 self.signer = "openssl"
362 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
363 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700364 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
365 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800366 else:
367 self.signer = OPTIONS.payload_signer
368 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700369 if OPTIONS.payload_signer_maximum_signature_size:
370 self.maximum_signature_size = int(
371 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700372 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700373 # The legacy config uses RSA2048 keys.
374 logger.warning("The maximum signature size for payload signer is not"
375 " set, default to 256 bytes.")
376 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700377
378 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700379 def _GetMaximumSignatureSizeInBytes(signing_key):
380 out_signature_size_file = common.MakeTempFile("signature_size")
381 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
382 out_signature_size_file), "--private_key={}".format(signing_key)]
383 common.RunAndCheckOutput(cmd)
384 with open(out_signature_size_file) as f:
385 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100386 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700387 signature_size)
388 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800389
390 def Sign(self, in_file):
391 """Signs the given input file. Returns the output filename."""
392 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
393 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700394 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800395 return out_file
396
397
Tao Bao40b18822018-01-30 18:19:04 -0800398class Payload(object):
399 """Manages the creation and the signing of an A/B OTA Payload."""
400
401 PAYLOAD_BIN = 'payload.bin'
402 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800403 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
404 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800405
Tao Bao667ff572018-02-10 00:02:40 -0800406 def __init__(self, secondary=False):
407 """Initializes a Payload instance.
408
409 Args:
410 secondary: Whether it's generating a secondary payload (default: False).
411 """
Tao Bao40b18822018-01-30 18:19:04 -0800412 self.payload_file = None
413 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800414 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800415
Tao Baof0c4aa22018-04-30 20:29:30 -0700416 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700417 # Don't pipe (buffer) the output if verbose is set. Let
418 # brillo_update_payload write to stdout/stderr directly, so its progress can
419 # be monitored.
420 if OPTIONS.verbose:
421 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
422 else:
423 common.RunAndCheckOutput(cmd)
424
Tao Bao40b18822018-01-30 18:19:04 -0800425 def Generate(self, target_file, source_file=None, additional_args=None):
426 """Generates a payload from the given target-files zip(s).
427
428 Args:
429 target_file: The filename of the target build target-files zip.
430 source_file: The filename of the source build target-files zip; or None if
431 generating a full OTA.
432 additional_args: A list of additional args that should be passed to
433 brillo_update_payload script; or None.
434 """
435 if additional_args is None:
436 additional_args = []
437
438 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
439 cmd = ["brillo_update_payload", "generate",
440 "--payload", payload_file,
441 "--target_image", target_file]
442 if source_file is not None:
443 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700444 if OPTIONS.disable_fec_computation:
445 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500446 if OPTIONS.disable_verity_computation:
447 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800448 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700449 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800450
451 self.payload_file = payload_file
452 self.payload_properties = None
453
454 def Sign(self, payload_signer):
455 """Generates and signs the hashes of the payload and metadata.
456
457 Args:
458 payload_signer: A PayloadSigner() instance that serves the signing work.
459
460 Raises:
461 AssertionError: On any failure when calling brillo_update_payload script.
462 """
463 assert isinstance(payload_signer, PayloadSigner)
464
465 # 1. Generate hashes of the payload and metadata files.
466 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
467 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
468 cmd = ["brillo_update_payload", "hash",
469 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700470 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800471 "--metadata_hash_file", metadata_sig_file,
472 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700473 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800474
475 # 2. Sign the hashes.
476 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
477 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
478
479 # 3. Insert the signatures back into the payload file.
480 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
481 suffix=".bin")
482 cmd = ["brillo_update_payload", "sign",
483 "--unsigned_payload", self.payload_file,
484 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700485 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800486 "--metadata_signature_file", signed_metadata_sig_file,
487 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700488 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800489
490 # 4. Dump the signed payload properties.
491 properties_file = common.MakeTempFile(prefix="payload-properties-",
492 suffix=".txt")
493 cmd = ["brillo_update_payload", "properties",
494 "--payload", signed_payload_file,
495 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700496 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800497
Tao Bao667ff572018-02-10 00:02:40 -0800498 if self.secondary:
499 with open(properties_file, "a") as f:
500 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
501
Tao Bao40b18822018-01-30 18:19:04 -0800502 if OPTIONS.wipe_user_data:
503 with open(properties_file, "a") as f:
504 f.write("POWERWASH=1\n")
505
506 self.payload_file = signed_payload_file
507 self.payload_properties = properties_file
508
Tao Bao667ff572018-02-10 00:02:40 -0800509 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800510 """Writes the payload to the given zip.
511
512 Args:
513 output_zip: The output ZipFile instance.
514 """
515 assert self.payload_file is not None
516 assert self.payload_properties is not None
517
Tao Bao667ff572018-02-10 00:02:40 -0800518 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800519 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
520 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
521 else:
522 payload_arcname = Payload.PAYLOAD_BIN
523 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
524
Tao Bao40b18822018-01-30 18:19:04 -0800525 # Add the signed payload file and properties into the zip. In order to
526 # support streaming, we pack them as ZIP_STORED. So these entries can be
527 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800528 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800529 compress_type=zipfile.ZIP_STORED)
530 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800531 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800532 compress_type=zipfile.ZIP_STORED)
533
534
Tao Bao481bab82017-12-21 11:23:09 -0800535def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800536 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800537 if not oem_source:
538 return None
539
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800540 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800541 for oem_file in oem_source:
542 with open(oem_file) as fp:
543 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800544 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700545
Doug Zongkereef39442009-04-02 12:14:19 -0700546
Tao Baod3fc38a2018-03-08 16:09:01 -0800547class StreamingPropertyFiles(PropertyFiles):
548 """A subclass for computing the property-files for streaming A/B OTAs."""
549
550 def __init__(self):
551 super(StreamingPropertyFiles, self).__init__()
552 self.name = 'ota-streaming-property-files'
553 self.required = (
554 # payload.bin and payload_properties.txt must exist.
555 'payload.bin',
556 'payload_properties.txt',
557 )
558 self.optional = (
Tianjied868c122021-06-07 16:11:47 -0700559 # apex_info.pb isn't directly used in the update flow
560 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700561 # care_map is available only if dm-verity is enabled.
562 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800563 'care_map.txt',
564 # compatibility.zip is available only if target supports Treble.
565 'compatibility.zip',
566 )
567
568
Tao Bao85f16982018-03-08 16:28:33 -0800569class AbOtaPropertyFiles(StreamingPropertyFiles):
570 """The property-files for A/B OTA that includes payload_metadata.bin info.
571
572 Since P, we expose one more token (aka property-file), in addition to the ones
573 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
574 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
575 doesn't exist as a separate ZIP entry, but can be used to verify if the
576 payload can be applied on the given device.
577
578 For backward compatibility, we keep both of the 'ota-streaming-property-files'
579 and the newly added 'ota-property-files' in P. The new token will only be
580 available in 'ota-property-files'.
581 """
582
583 def __init__(self):
584 super(AbOtaPropertyFiles, self).__init__()
585 self.name = 'ota-property-files'
586
587 def _GetPrecomputed(self, input_zip):
588 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
589 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
590
591 @staticmethod
592 def _GetPayloadMetadataOffsetAndSize(input_zip):
593 """Computes the offset and size of the payload metadata for a given package.
594
595 (From system/update_engine/update_metadata.proto)
596 A delta update file contains all the deltas needed to update a system from
597 one specific version to another specific version. The update format is
598 represented by this struct pseudocode:
599
600 struct delta_update_file {
601 char magic[4] = "CrAU";
602 uint64 file_format_version;
603 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
604
605 // Only present if format_version > 1:
606 uint32 metadata_signature_size;
607
608 // The Bzip2 compressed DeltaArchiveManifest
609 char manifest[metadata_signature_size];
610
611 // The signature of the metadata (from the beginning of the payload up to
612 // this location, not including the signature itself). This is a
613 // serialized Signatures message.
614 char medatada_signature_message[metadata_signature_size];
615
616 // Data blobs for files, no specific format. The specific offset
617 // and length of each data blob is recorded in the DeltaArchiveManifest.
618 struct {
619 char data[];
620 } blobs[];
621
622 // These two are not signed:
623 uint64 payload_signatures_message_size;
624 char payload_signatures_message[];
625 };
626
627 'payload-metadata.bin' contains all the bytes from the beginning of the
628 payload, till the end of 'medatada_signature_message'.
629 """
630 payload_info = input_zip.getinfo('payload.bin')
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400631 (payload_offset, payload_size) = GetZipEntryOffset(input_zip, payload_info)
Tao Bao85f16982018-03-08 16:28:33 -0800632
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400633 # Read the underlying raw zipfile at specified offset
634 payload_fp = input_zip.fp
635 payload_fp.seek(payload_offset)
636 header_bin = payload_fp.read(24)
Tao Bao85f16982018-03-08 16:28:33 -0800637
638 # network byte order (big-endian)
639 header = struct.unpack("!IQQL", header_bin)
640
641 # 'CrAU'
642 magic = header[0]
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400643 assert magic == 0x43724155, "Invalid magic: {:x}, computed offset {}" \
644 .format(magic, payload_offset)
Tao Bao85f16982018-03-08 16:28:33 -0800645
646 manifest_size = header[2]
647 metadata_signature_size = header[3]
648 metadata_total = 24 + manifest_size + metadata_signature_size
649 assert metadata_total < payload_size
650
651 return (payload_offset, metadata_total)
652
653
Yifan Hong38ab4d82020-06-18 15:19:56 -0700654def UpdatesInfoForSpecialUpdates(content, partitions_filter,
655 delete_keys=None):
656 """ Updates info file for secondary payload generation, partial update, etc.
657
658 Scan each line in the info file, and remove the unwanted partitions from
659 the dynamic partition list in the related properties. e.g.
660 "super_google_dynamic_partitions_partition_list=system vendor product"
661 will become "super_google_dynamic_partitions_partition_list=system".
662
663 Args:
664 content: The content of the input info file. e.g. misc_info.txt.
665 partitions_filter: A function to filter the desired partitions from a given
666 list
667 delete_keys: A list of keys to delete in the info file
668
669 Returns:
670 A string of the updated info content.
671 """
672
673 output_list = []
674 # The suffix in partition_list variables that follows the name of the
675 # partition group.
676 list_suffix = 'partition_list'
677 for line in content.splitlines():
678 if line.startswith('#') or '=' not in line:
679 output_list.append(line)
680 continue
681 key, value = line.strip().split('=', 1)
682
683 if delete_keys and key in delete_keys:
684 pass
685 elif key.endswith(list_suffix):
686 partitions = value.split()
687 # TODO for partial update, partitions in the same group must be all
688 # updated or all omitted
689 partitions = filter(partitions_filter, partitions)
690 output_list.append('{}={}'.format(key, ' '.join(partitions)))
691 else:
692 output_list.append(line)
693 return '\n'.join(output_list)
694
695
Tao Bao15a146a2018-02-21 16:06:59 -0800696def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800697 """Returns a target-files.zip file for generating secondary payload.
698
699 Although the original target-files.zip already contains secondary slot
700 images (i.e. IMAGES/system_other.img), we need to rename the files to the
701 ones without _other suffix. Note that we cannot instead modify the names in
702 META/ab_partitions.txt, because there are no matching partitions on device.
703
704 For the partitions that don't have secondary images, the ones for primary
705 slot will be used. This is to ensure that we always have valid boot, vbmeta,
706 bootloader images in the inactive slot.
707
708 Args:
709 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800710 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800711
712 Returns:
713 The filename of the target-files.zip for generating secondary payload.
714 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700715
716 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700717 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700718 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700719 content = f.read()
720 # Remove virtual_ab flag from secondary payload so that OTA client
721 # don't use snapshots for secondary update
722 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
723 return UpdatesInfoForSpecialUpdates(
724 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
725 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700726
Tao Baof7140c02018-01-30 17:09:24 -0800727 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
728 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
729
Kelvin Zhang928c2342020-09-22 16:15:57 -0400730 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800731 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700732
Tao Bao0ff15de2019-03-20 11:26:06 -0700733 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800734 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800735 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
736 if info.filename == 'IMAGES/system_other.img':
737 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
738
739 # Primary images and friends need to be skipped explicitly.
740 elif info.filename in ('IMAGES/system.img',
741 'IMAGES/system.map'):
742 pass
Tao Bao3e759462019-09-17 22:43:11 -0700743
744 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
745 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
746 image_name = os.path.basename(info.filename)
747 if image_name not in ['{}.img'.format(partition) for partition in
748 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
749 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800750
Tao Bao15a146a2018-02-21 16:06:59 -0800751 # Skip copying the postinstall config if requested.
752 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
753 pass
754
Tianjie Xu1c808002019-09-11 00:29:26 -0700755 elif info.filename.startswith('META/'):
756 # Remove the unnecessary partitions for secondary images from the
757 # ab_partitions file.
758 if info.filename == AB_PARTITIONS:
759 with open(unzipped_file) as f:
760 partition_list = f.read().splitlines()
761 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700762 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400763 common.ZipWriteStr(target_zip, info.filename,
764 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700765 # Remove the unnecessary partitions from the dynamic partitions list.
766 elif (info.filename == 'META/misc_info.txt' or
767 info.filename == DYNAMIC_PARTITION_INFO):
768 modified_info = GetInfoForSecondaryImages(unzipped_file)
769 common.ZipWriteStr(target_zip, info.filename, modified_info)
770 else:
771 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800772
Tao Baof7140c02018-01-30 17:09:24 -0800773 common.ZipClose(target_zip)
774
775 return target_file
776
777
Tao Bao15a146a2018-02-21 16:06:59 -0800778def GetTargetFilesZipWithoutPostinstallConfig(input_file):
779 """Returns a target-files.zip that's not containing postinstall_config.txt.
780
781 This allows brillo_update_payload script to skip writing all the postinstall
782 hooks in the generated payload. The input target-files.zip file will be
783 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
784 contain the postinstall_config.txt entry, the input file will be returned.
785
786 Args:
787 input_file: The input target-files.zip filename.
788
789 Returns:
790 The filename of target-files.zip that doesn't contain postinstall config.
791 """
792 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400793 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800794 if POSTINSTALL_CONFIG not in input_zip.namelist():
795 return input_file
796
797 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
798 shutil.copyfile(input_file, target_file)
799 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
800 return target_file
801
Kelvin Zhang06400172021-03-05 15:42:03 -0500802
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400803def ParseInfoDict(target_file_path):
804 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
805 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800806
Kelvin Zhang06400172021-03-05 15:42:03 -0500807
Yifan Hong38ab4d82020-06-18 15:19:56 -0700808def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
809 """Returns a target-files.zip for partial ota update package generation.
810
811 This function modifies ab_partitions list with the desired partitions before
812 calling the brillo_update_payload script. It also cleans up the reference to
813 the excluded partitions in the info file, e.g misc_info.txt.
814
815 Args:
816 input_file: The input target-files.zip filename.
817 ab_partitions: A list of partitions to include in the partial update
818
819 Returns:
820 The filename of target-files.zip used for partial ota update.
821 """
822
823 def AddImageForPartition(partition_name):
824 """Add the archive name for a given partition to the copy list."""
825 for prefix in ['IMAGES', 'RADIO']:
826 image_path = '{}/{}.img'.format(prefix, partition_name)
827 if image_path in namelist:
828 copy_entries.append(image_path)
829 map_path = '{}/{}.map'.format(prefix, partition_name)
830 if map_path in namelist:
831 copy_entries.append(map_path)
832 return
833
834 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
835
836 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400837 original_ab_partitions = input_zip.read(
838 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700839 namelist = input_zip.namelist()
840
841 unrecognized_partitions = [partition for partition in ab_partitions if
842 partition not in original_ab_partitions]
843 if unrecognized_partitions:
844 raise ValueError("Unrecognized partitions when generating partial updates",
845 unrecognized_partitions)
846
847 logger.info("Generating partial updates for %s", ab_partitions)
848
849 copy_entries = ['META/update_engine_config.txt']
850 for partition_name in ab_partitions:
851 AddImageForPartition(partition_name)
852
853 # Use zip2zip to avoid extracting the zipfile.
854 partial_target_file = common.MakeTempFile(suffix='.zip')
855 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
856 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
857 common.RunAndCheckOutput(cmd)
858
859 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
860 allowZip64=True)
861 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
862 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
863 '\n'.join(ab_partitions))
Kelvin Zhang766eea72021-06-03 09:36:08 -0400864 CARE_MAP_ENTRY = "META/care_map.pb"
865 if CARE_MAP_ENTRY in input_zip.namelist():
866 caremap = care_map_pb2.CareMap()
867 caremap.ParseFromString(input_zip.read(CARE_MAP_ENTRY))
868 filtered = [
869 part for part in caremap.partitions if part.name in ab_partitions]
870 del caremap.partitions[:]
871 caremap.partitions.extend(filtered)
872 common.ZipWriteStr(partial_target_zip, CARE_MAP_ENTRY,
873 caremap.SerializeToString())
874
Yifan Hong38ab4d82020-06-18 15:19:56 -0700875 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
876 if info_file not in input_zip.namelist():
877 logger.warning('Cannot find %s in input zipfile', info_file)
878 continue
879 content = input_zip.read(info_file).decode()
880 modified_info = UpdatesInfoForSpecialUpdates(
881 content, lambda p: p in ab_partitions)
882 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
883
Kelvin Zhang766eea72021-06-03 09:36:08 -0400884 # TODO(xunchang) handle META/postinstall_config.txt'
885
Yifan Hong38ab4d82020-06-18 15:19:56 -0700886 common.ZipClose(partial_target_zip)
887
888 return partial_target_file
889
890
Yifan Hong50e79542018-11-08 17:44:12 -0800891def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800892 super_block_devices,
893 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800894 """Returns a target-files.zip for retrofitting dynamic partitions.
895
896 This allows brillo_update_payload to generate an OTA based on the exact
897 bits on the block devices. Postinstall is disabled.
898
899 Args:
900 input_file: The input target-files.zip filename.
901 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800902 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800903
904 Returns:
905 The filename of target-files.zip with *.img replaced with super_*.img for
906 each block device in super_block_devices.
907 """
908 assert super_block_devices, "No super_block_devices are specified."
909
910 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800911 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800912
913 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
914 shutil.copyfile(input_file, target_file)
915
Kelvin Zhang928c2342020-09-22 16:15:57 -0400916 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800917 namelist = input_zip.namelist()
918
Yifan Hongb433eba2019-03-06 12:42:53 -0800919 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
920
921 # Remove partitions from META/ab_partitions.txt that is in
922 # dynamic_partition_list but not in super_block_devices so that
923 # brillo_update_payload won't generate update for those logical partitions.
924 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
925 with open(ab_partitions_file) as f:
926 ab_partitions_lines = f.readlines()
927 ab_partitions = [line.strip() for line in ab_partitions_lines]
928 # Assert that all super_block_devices are in ab_partitions
929 super_device_not_updated = [partition for partition in super_block_devices
930 if partition not in ab_partitions]
931 assert not super_device_not_updated, \
932 "{} is in super_block_devices but not in {}".format(
933 super_device_not_updated, AB_PARTITIONS)
934 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400935 new_ab_partitions = common.MakeTempFile(
936 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800937 with open(new_ab_partitions, 'w') as f:
938 for partition in ab_partitions:
939 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500940 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700941 logger.info("Dropping %s from ab_partitions.txt", partition)
942 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800943 f.write(partition + "\n")
944 to_delete = [AB_PARTITIONS]
945
Yifan Hong50e79542018-11-08 17:44:12 -0800946 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800947 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800948
949 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
950 # is a regular update on devices without dynamic partitions support.
951 to_delete += [DYNAMIC_PARTITION_INFO]
952
Tao Bao03fecb62018-11-28 10:59:23 -0800953 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700954 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800955 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800956
957 common.ZipDelete(target_file, to_delete)
958
Yifan Hong50e79542018-11-08 17:44:12 -0800959 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
960
961 # Write super_{foo}.img as {foo}.img.
962 for src, dst in replace.items():
963 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700964 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800965 unzipped_file = os.path.join(input_tmp, *src.split('/'))
966 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
967
Yifan Hongb433eba2019-03-06 12:42:53 -0800968 # Write new ab_partitions.txt file
969 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
970
Yifan Hong50e79542018-11-08 17:44:12 -0800971 common.ZipClose(target_zip)
972
973 return target_file
974
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400975
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700976def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
977 """Returns a target-files.zip for custom partitions update.
978
979 This function modifies ab_partitions list with the desired custom partitions
980 and puts the custom images into the target target-files.zip.
981
982 Args:
983 input_file: The input target-files.zip filename.
984 custom_images: A map of custom partitions and custom images.
985
986 Returns:
987 The filename of a target-files.zip which has renamed the custom images in
988 the IMAGS/ to their partition names.
989 """
990 # Use zip2zip to avoid extracting the zipfile.
991 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
992 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
993
994 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
995 namelist = input_zip.namelist()
996
997 # Write {custom_image}.img as {custom_partition}.img.
998 for custom_partition, custom_image in custom_images.items():
999 default_custom_image = '{}.img'.format(custom_partition)
1000 if default_custom_image != custom_image:
1001 logger.info("Update custom partition '%s' with '%s'",
1002 custom_partition, custom_image)
1003 # Default custom image need to be deleted first.
1004 namelist.remove('IMAGES/{}'.format(default_custom_image))
1005 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
1006 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
1007 default_custom_image)])
1008
1009 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
1010 common.RunAndCheckOutput(cmd)
1011
1012 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -08001013
Kelvin Zhang06400172021-03-05 15:42:03 -05001014
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001015def GeneratePartitionTimestampFlags(partition_state):
1016 partition_timestamps = [
1017 part.partition_name + ":" + part.version
1018 for part in partition_state]
1019 return ["--partition_timestamps", ",".join(partition_timestamps)]
1020
Kelvin Zhang06400172021-03-05 15:42:03 -05001021
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001022def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -05001023 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -05001024 assert pre_partition_state is not None
1025 partition_timestamps = {}
1026 for part in pre_partition_state:
1027 partition_timestamps[part.partition_name] = part.version
1028 for part in post_partition_state:
1029 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001030 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -05001031 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001032 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -05001033 ",".join([key + ":" + val for (key, val)
1034 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001035 ]
Kelvin Zhang80195722020-11-04 14:38:34 -05001036
Kelvin Zhang06400172021-03-05 15:42:03 -05001037
Kelvin Zhang65029a22020-11-03 10:07:51 -05001038def SupportsMainlineGkiUpdates(target_file):
1039 """Return True if the build supports MainlineGKIUpdates.
1040
1041 This function scans the product.img file in IMAGES/ directory for
1042 pattern |*/apex/com.android.gki.*.apex|. If there are files
1043 matching this pattern, conclude that build supports mainline
1044 GKI and return True
1045
1046 Args:
1047 target_file: Path to a target_file.zip, or an extracted directory
1048 Return:
1049 True if thisb uild supports Mainline GKI Updates.
1050 """
1051 if target_file is None:
1052 return False
1053 if os.path.isfile(target_file):
1054 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1055 if not os.path.isdir(target_file):
1056 assert os.path.isdir(target_file), \
1057 "{} must be a path to zip archive or dir containing extracted"\
1058 " target_files".format(target_file)
1059 image_file = os.path.join(target_file, "IMAGES", "product.img")
1060
1061 if not os.path.isfile(image_file):
1062 return False
1063
1064 if IsSparseImage(image_file):
1065 # Unsparse the image
1066 tmp_img = common.MakeTempFile(suffix=".img")
1067 subprocess.check_output(["simg2img", image_file, tmp_img])
1068 image_file = tmp_img
1069
1070 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1071 output = subprocess.check_output(cmd).decode()
1072
1073 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1074 return pattern.search(output) is not None
1075
Kelvin Zhang06400172021-03-05 15:42:03 -05001076
Tao Baof0c4aa22018-04-30 20:29:30 -07001077def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001078 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001079 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001080 if not OPTIONS.no_signing:
1081 staging_file = common.MakeTempFile(suffix='.zip')
1082 else:
1083 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001084 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001085 compression=zipfile.ZIP_DEFLATED,
1086 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001087
Tao Bao481bab82017-12-21 11:23:09 -08001088 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001089 assert "ab_partitions" in OPTIONS.source_info_dict, \
1090 "META/ab_partitions.txt is required for ab_update."
1091 assert "ab_partitions" in OPTIONS.target_info_dict, \
1092 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001093 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1094 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001095 # If source supports VABC, delta_generator/update_engine will attempt to
1096 # use VABC. This dangerous, as the target build won't have snapuserd to
1097 # serve I/O request when device boots. Therefore, disable VABC if source
1098 # build doesn't supports it.
1099 if not source_info.is_vabc or not target_info.is_vabc:
Kelvin Zhang10eac082021-06-10 14:32:19 -04001100 logger.info("Either source or target does not support VABC, disabling.")
Kelvin Zhang563750f2021-04-28 12:46:17 -04001101 OPTIONS.disable_vabc = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001102
Tao Bao481bab82017-12-21 11:23:09 -08001103 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001104 assert "ab_partitions" in OPTIONS.info_dict, \
1105 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001106 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001107 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001108
Kelvin Zhang10eac082021-06-10 14:32:19 -04001109 if target_info.vendor_suppressed_vabc:
1110 logger.info("Vendor suppressed VABC. Disabling")
1111 OPTIONS.disable_vabc = True
Kelvin Zhangf1758012022-01-26 10:18:18 -08001112
1113 # Both source and target build need to support VABC XOR for us to use it.
1114 # Source build's update_engine must be able to write XOR ops, and target
1115 # build's snapuserd must be able to interpret XOR ops.
1116 if not target_info.is_vabc_xor or OPTIONS.disable_vabc or \
1117 (source_info is not None and not source_info.is_vabc_xor):
Kelvin Zhangad427382021-08-12 16:19:09 -07001118 logger.info("VABC XOR Not supported, disabling")
1119 OPTIONS.enable_vabc_xor = False
Yifan Hong38ab4d82020-06-18 15:19:56 -07001120 additional_args = []
1121
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001122 # Prepare custom images.
1123 if OPTIONS.custom_images:
1124 target_file = GetTargetFilesZipForCustomImagesUpdates(
1125 target_file, OPTIONS.custom_images)
1126
Yifan Hong50e79542018-11-08 17:44:12 -08001127 if OPTIONS.retrofit_dynamic_partitions:
1128 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001129 target_file, target_info.get("super_block_devices").strip().split(),
1130 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001131 elif OPTIONS.partial:
1132 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1133 OPTIONS.partial)
1134 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001135 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001136 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001137 # Target_file may have been modified, reparse ab_partitions
1138 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1139 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001140 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001141
Kelvin Zhang414ca422021-08-27 15:12:08 -07001142 CheckVintfIfTrebleEnabled(target_file, target_info)
1143
Kelvin Zhang39aea442020-08-17 11:04:25 -04001144 # Metadata to comply with Android OTA package format.
1145 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001146 # Generate payload.
1147 payload = Payload()
1148
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001149 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001150 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001151 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001152 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001153 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001154 metadata.precondition.partition_state,
1155 metadata.postcondition.partition_state
1156 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001157 else:
Tianjiea2076132020-08-19 17:25:32 -07001158 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001159 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1160 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001161
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001162 if not ota_utils.IsZucchiniCompatible(source_file, target_file):
1163 OPTIONS.enable_zucchini = False
1164
1165 additional_args += ["--enable_zucchini",
1166 str(OPTIONS.enable_zucchini).lower()]
1167
1168 if not ota_utils.IsLz4diffCompatible(source_file, target_file):
Kelvin Zhang6fe2fc02022-01-13 12:38:49 -08001169 logger.warn(
1170 "Source build doesn't support lz4diff, or source/target don't have compatible lz4diff versions. Disabling lz4diff.")
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001171 OPTIONS.enable_lz4diff = False
1172
1173 additional_args += ["--enable_lz4diff",
1174 str(OPTIONS.enable_lz4diff).lower()]
1175
1176 if source_file and OPTIONS.enable_lz4diff:
1177 input_tmp = common.UnzipTemp(source_file, ["META/liblz4.so"])
1178 liblz4_path = os.path.join(input_tmp, "META", "liblz4.so")
1179 assert os.path.exists(
1180 liblz4_path), "liblz4.so not found in META/ dir of target file {}".format(liblz4_path)
1181 logger.info("Enabling lz4diff %s", liblz4_path)
1182 additional_args += ["--liblz4_path", liblz4_path]
Kelvin Zhang6fe2fc02022-01-13 12:38:49 -08001183 erofs_compression_param = OPTIONS.target_info_dict.get(
1184 "erofs_default_compressor")
1185 assert erofs_compression_param is not None, "'erofs_default_compressor' not found in META/misc_info.txt of target build. This is required to enable lz4diff."
1186 additional_args += ["--erofs_compression_param", erofs_compression_param]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001187
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001188 if OPTIONS.disable_vabc:
1189 additional_args += ["--disable_vabc", "true"]
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001190 if OPTIONS.enable_vabc_xor:
1191 additional_args += ["--enable_vabc_xor", "true"]
Tianjiee7ab38d2021-09-08 19:09:38 -07001192 if OPTIONS.force_minor_version:
1193 additional_args += ["--force_minor_version", OPTIONS.force_minor_version]
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001194 if OPTIONS.compressor_types:
1195 additional_args += ["--compressor_types", OPTIONS.compressor_types]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001196 additional_args += ["--max_timestamp", max_timestamp]
1197
Kelvin Zhang65029a22020-11-03 10:07:51 -05001198 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001199 logger.warning(
1200 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001201 additional_args.extend(["--full_boot", "true"])
1202
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001203 payload.Generate(
1204 target_file,
1205 source_file,
1206 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001207 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001208
Tao Bao40b18822018-01-30 18:19:04 -08001209 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001210 payload_signer = PayloadSigner()
1211 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001212
Tao Bao40b18822018-01-30 18:19:04 -08001213 # Write the payload into output zip.
1214 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001215
Tao Baof7140c02018-01-30 17:09:24 -08001216 # Generate and include the secondary payload that installs secondary images
1217 # (e.g. system_other.img).
1218 if OPTIONS.include_secondary:
1219 # We always include a full payload for the secondary slot, even when
1220 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001221 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1222 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001223 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001224 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001225 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001226 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001227 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001228 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001229
Tianjie Xucfa86222016-03-07 16:31:19 -08001230 # If dm-verity is supported for the device, copy contents of care_map
1231 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001232 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001233 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001234 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001235 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1236 "META/" + x in target_zip.namelist()]
1237
1238 # Adds care_map if either the protobuf format or the plain text one exists.
1239 if care_map_list:
1240 care_map_name = care_map_list[0]
1241 care_map_data = target_zip.read("META/" + care_map_name)
1242 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001243 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001244 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001245 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001246 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001247 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001248
Tianjiea5fca032021-06-01 22:06:28 -07001249 # Add the source apex version for incremental ota updates, and write the
1250 # result apex info to the ota package.
1251 ota_apex_info = ota_utils.ConstructOtaApexInfo(target_zip, source_file)
1252 if ota_apex_info is not None:
1253 common.ZipWriteStr(output_zip, "apex_info.pb", ota_apex_info,
1254 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001255
Tao Bao21803d32017-04-19 10:16:09 -07001256 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001257
Tao Baofe5b69a2018-03-02 09:47:43 -08001258 # We haven't written the metadata entry yet, which will be handled in
1259 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001260 common.ZipClose(output_zip)
1261
Tao Bao85f16982018-03-08 16:28:33 -08001262 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1263 # all the info of the latter. However, system updaters and OTA servers need to
1264 # take time to switch to the new flag. We keep both of the flags for
1265 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001266 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001267 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001268 StreamingPropertyFiles(),
1269 )
1270 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001271
Tao Baoc098e9e2016-01-07 13:03:56 -08001272
Doug Zongkereef39442009-04-02 12:14:19 -07001273def main(argv):
1274
1275 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001276 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001277 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001278 elif o in ("-i", "--incremental_from"):
1279 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001280 elif o == "--full_radio":
1281 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001282 elif o == "--full_bootloader":
1283 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001284 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001285 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001286 elif o == "--downgrade":
1287 OPTIONS.downgrade = True
1288 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001289 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001290 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001291 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001292 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001293 elif o == "--oem_no_mount":
1294 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001295 elif o in ("-e", "--extra_script"):
1296 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001297 elif o in ("-t", "--worker_threads"):
1298 if a.isdigit():
1299 OPTIONS.worker_threads = int(a)
1300 else:
1301 raise ValueError("Cannot parse value %r for option %r - only "
1302 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001303 elif o in ("-2", "--two_step"):
1304 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001305 elif o == "--include_secondary":
1306 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001307 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001308 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001309 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001310 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001311 elif o == "--block":
1312 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001313 elif o in ("-b", "--binary"):
1314 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001315 elif o == "--stash_threshold":
1316 try:
1317 OPTIONS.stash_threshold = float(a)
1318 except ValueError:
1319 raise ValueError("Cannot parse value %r for option %r - expecting "
1320 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001321 elif o == "--log_diff":
1322 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001323 elif o == "--payload_signer":
1324 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001325 elif o == "--payload_signer_args":
1326 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001327 elif o == "--payload_signer_maximum_signature_size":
1328 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001329 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001330 # TODO(Xunchang) remove this option after cleaning up the callers.
1331 logger.warning("The option '--payload_signer_key_size' is deprecated."
1332 " Use '--payload_signer_maximum_signature_size' instead.")
1333 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001334 elif o == "--extracted_input_target_files":
1335 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001336 elif o == "--skip_postinstall":
1337 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001338 elif o == "--retrofit_dynamic_partitions":
1339 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001340 elif o == "--skip_compatibility_check":
1341 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001342 elif o == "--output_metadata_path":
1343 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001344 elif o == "--disable_fec_computation":
1345 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001346 elif o == "--disable_verity_computation":
1347 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001348 elif o == "--force_non_ab":
1349 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001350 elif o == "--boot_variable_file":
1351 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001352 elif o == "--partial":
1353 partitions = a.split()
1354 if not partitions:
1355 raise ValueError("Cannot parse partitions in {}".format(a))
1356 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001357 elif o == "--custom_image":
1358 custom_partition, custom_image = a.split("=")
1359 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001360 elif o == "--disable_vabc":
1361 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001362 elif o == "--spl_downgrade":
1363 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001364 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001365 elif o == "--vabc_downgrade":
1366 OPTIONS.vabc_downgrade = True
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001367 elif o == "--enable_vabc_xor":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001368 assert a.lower() in ["true", "false"]
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001369 OPTIONS.enable_vabc_xor = a.lower() != "false"
Tianjiee7ab38d2021-09-08 19:09:38 -07001370 elif o == "--force_minor_version":
1371 OPTIONS.force_minor_version = a
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001372 elif o == "--compressor_types":
1373 OPTIONS.compressor_types = a
Kelvin Zhang410bb382022-01-06 09:15:54 -08001374 elif o == "--enable_zucchini":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001375 assert a.lower() in ["true", "false"]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001376 OPTIONS.enable_zucchini = a.lower() != "false"
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001377 elif o == "--enable_lz4diff":
1378 assert a.lower() in ["true", "false"]
1379 OPTIONS.enable_lz4diff = a.lower() != "false"
Doug Zongkereef39442009-04-02 12:14:19 -07001380 else:
1381 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001382 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001383
1384 args = common.ParseOptions(argv, __doc__,
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001385 extra_opts="b:k:i:d:e:t:2o:",
1386 extra_long_opts=[
1387 "package_key=",
1388 "incremental_from=",
1389 "full_radio",
1390 "full_bootloader",
1391 "wipe_user_data",
1392 "downgrade",
1393 "override_timestamp",
1394 "extra_script=",
1395 "worker_threads=",
1396 "two_step",
1397 "include_secondary",
1398 "no_signing",
1399 "block",
1400 "binary=",
1401 "oem_settings=",
1402 "oem_no_mount",
1403 "verify",
1404 "stash_threshold=",
1405 "log_diff=",
1406 "payload_signer=",
1407 "payload_signer_args=",
1408 "payload_signer_maximum_signature_size=",
1409 "payload_signer_key_size=",
1410 "extracted_input_target_files=",
1411 "skip_postinstall",
1412 "retrofit_dynamic_partitions",
1413 "skip_compatibility_check",
1414 "output_metadata_path=",
1415 "disable_fec_computation",
1416 "disable_verity_computation",
1417 "force_non_ab",
1418 "boot_variable_file=",
1419 "partial=",
1420 "custom_image=",
1421 "disable_vabc",
1422 "spl_downgrade",
1423 "vabc_downgrade",
1424 "enable_vabc_xor=",
1425 "force_minor_version=",
1426 "compressor_types=",
Kelvin Zhang410bb382022-01-06 09:15:54 -08001427 "enable_zucchin=",
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001428 "enable_lz4diff=",
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001429 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001430
1431 if len(args) != 2:
1432 common.Usage(__doc__)
1433 sys.exit(1)
1434
Tao Bao32fcdab2018-10-12 10:30:39 -07001435 common.InitLogging()
1436
Tao Bao2db13852018-01-08 22:28:57 -08001437 # Load the build info dicts from the zip directly or the extracted input
1438 # directory. We don't need to unzip the entire target-files zips, because they
1439 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1440 # When loading the info dicts, we don't need to provide the second parameter
1441 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1442 # some properties with their actual paths, such as 'selinux_fc',
1443 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001444 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001445 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001446 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001447 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001448
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001449 if OPTIONS.wipe_user_data:
1450 if not OPTIONS.vabc_downgrade:
1451 logger.info("Detected downgrade/datawipe OTA."
1452 "When wiping userdata, VABC OTA makes the user "
1453 "wait in recovery mode for merge to finish. Disable VABC by "
1454 "default. If you really want to do VABC downgrade, pass "
1455 "--vabc_downgrade")
1456 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001457 # We should only allow downgrading incrementals (as opposed to full).
1458 # Otherwise the device may go back from arbitrary build with this full
1459 # OTA package.
Kelvin Zhang81641af2021-10-26 16:03:25 -07001460 if OPTIONS.incremental_source is None and OPTIONS.downgrade:
1461 raise ValueError("Cannot generate downgradable full OTAs")
Kelvin Zhang80195722020-11-04 14:38:34 -05001462
Yifan Hong38ab4d82020-06-18 15:19:56 -07001463 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1464 # target-file and reload the info_dict. So the info will be consistent with
1465 # the modified target-file.
1466
Tao Bao32fcdab2018-10-12 10:30:39 -07001467 logger.info("--- target info ---")
1468 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001469
1470 # Load the source build dict if applicable.
1471 if OPTIONS.incremental_source is not None:
1472 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001473 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001474
Tao Bao32fcdab2018-10-12 10:30:39 -07001475 logger.info("--- source info ---")
1476 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001477
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001478 if OPTIONS.partial:
1479 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001480 list(
1481 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1482 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001483 if OPTIONS.source_info_dict:
1484 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001485 list(
1486 set(OPTIONS.source_info_dict['ab_partitions']) &
1487 set(OPTIONS.partial)
1488 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001489
Tao Bao2db13852018-01-08 22:28:57 -08001490 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001491 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1492
Yifan Hong50e79542018-11-08 17:44:12 -08001493 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001494 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001495 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001496 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001497 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001498 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1499 raise common.ExternalError(
1500 "Expect to generate incremental OTA for retrofitting dynamic "
1501 "partitions, but dynamic_partition_retrofit is not set in target "
1502 "build.")
1503 logger.info("Implicitly generating retrofit incremental OTA.")
1504 OPTIONS.retrofit_dynamic_partitions = True
1505
1506 # Skip postinstall for retrofitting dynamic partitions.
1507 if OPTIONS.retrofit_dynamic_partitions:
1508 OPTIONS.skip_postinstall = True
1509
Tao Baoc098e9e2016-01-07 13:03:56 -08001510 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001511 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1512 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001513 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001514 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001515 assert ab_update, "--force_non_ab only allowed on A/B devices"
1516
1517 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001518
Christian Oderf63e2cd2017-05-01 22:30:15 +02001519 # Use the default key to sign the package if not specified with package_key.
1520 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001521 # A/B update is getting created.
1522 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001523 if OPTIONS.package_key is None:
1524 OPTIONS.package_key = OPTIONS.info_dict.get(
1525 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001526 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001527 # Get signing keys
1528 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001529
1530 # Only check for existence of key file if using the default signer.
1531 # Because the custom signer might not need the key file AT all.
1532 # b/191704641
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001533 if not OPTIONS.payload_signer:
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001534 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1535 if not os.path.exists(private_key_path):
1536 raise common.ExternalError(
1537 "Private key {} doesn't exist. Make sure you passed the"
1538 " correct key path through -k option".format(
1539 private_key_path)
1540 )
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001541 signapk_abs_path = os.path.join(
1542 OPTIONS.search_path, OPTIONS.signapk_path)
1543 if not os.path.exists(signapk_abs_path):
1544 raise common.ExternalError(
1545 "Failed to find sign apk binary {} in search path {}. Make sure the correct search path is passed via -p".format(OPTIONS.signapk_path, OPTIONS.search_path))
Christian Oderf63e2cd2017-05-01 22:30:15 +02001546
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001547 if OPTIONS.source_info_dict:
1548 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1549 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1550 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1551 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001552 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001553 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001554 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001555 "Target security patch level {} is older than source SPL {} applying "
1556 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1557 "to override this check. This script expects security patch level to "
1558 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1559 "separators other than -, so as long as it's used consistenly across "
1560 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001561 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1562 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1563 " detected. Please only pass in this flag if you want a"
1564 " SPL downgrade. Target SPL: {} Source SPL: {}"
1565 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001566 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001567 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001568 target_file=args[0],
1569 output_file=args[1],
1570 source_file=OPTIONS.incremental_source)
1571
Dan Willemsencea5cd22017-03-21 14:44:27 -07001572 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001573 GenerateNonAbOtaPackage(
1574 target_file=args[0],
1575 output_file=args[1],
1576 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001577
Tao Baof0c4aa22018-04-30 20:29:30 -07001578 # Post OTA generation works.
1579 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1580 logger.info("Generating diff logs...")
1581 logger.info("Unzipping target-files for diffing...")
1582 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1583 source_dir = common.UnzipTemp(
1584 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001585
Tao Baof0c4aa22018-04-30 20:29:30 -07001586 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001587 target_files_diff.recursiveDiff(
1588 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001589
Tao Bao32fcdab2018-10-12 10:30:39 -07001590 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001591
1592
1593if __name__ == '__main__':
1594 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001595 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001596 main(sys.argv[1:])
Doug Zongkerfc44a512014-08-26 13:10:25 -07001597 finally:
1598 common.Cleanup()