blob: fb32cce4173e47d24a844da4f0ff46e3063947a8 [file] [log] [blame]
Doug Zongkereef39442009-04-02 12:14:19 -07001#!/usr/bin/env python
2#
3# Copyright (C) 2008 The Android Open Source Project
4#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
Tao Bao30df8b42018-04-23 15:32:53 -070018Given a target-files zipfile, produces an OTA package that installs that build.
19An incremental OTA is produced if -i is given, otherwise a full OTA is produced.
Doug Zongkereef39442009-04-02 12:14:19 -070020
Tao Bao30df8b42018-04-23 15:32:53 -070021Usage: ota_from_target_files [options] input_target_files output_ota_package
Doug Zongkereef39442009-04-02 12:14:19 -070022
Tao Bao30df8b42018-04-23 15:32:53 -070023Common options that apply to both of non-A/B and A/B OTAs
24
25 --downgrade
26 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070027 to an older one (e.g. downgrading from P preview back to O MR1).
28 "ota-downgrade=yes" will be set in the package metadata file. A data wipe
29 will always be enforced when using this flag, so "ota-wipe=yes" will also
30 be included in the metadata file. The update-binary in the source build
31 will be used in the OTA package, unless --binary flag is specified. Please
32 also check the comment for --override_timestamp below.
Tao Bao30df8b42018-04-23 15:32:53 -070033
34 -i (--incremental_from) <file>
35 Generate an incremental OTA using the given target-files zip as the
36 starting build.
37
38 -k (--package_key) <key>
39 Key to use to sign the package (default is the value of
40 default_system_dev_certificate from the input target-files's
Tao Bao59cf0c52019-06-25 10:04:24 -070041 META/misc_info.txt, or "build/make/target/product/security/testkey" if
42 that value is not specified).
Doug Zongkerafb32ea2011-09-22 10:28:04 -070043
44 For incremental OTAs, the default value is based on the source
45 target-file, not the target build.
Doug Zongkereef39442009-04-02 12:14:19 -070046
Tao Bao30df8b42018-04-23 15:32:53 -070047 --override_timestamp
48 Intentionally generate an incremental OTA that updates from a newer build
Tao Baofaa8e0b2018-04-12 14:31:43 -070049 to an older one (based on timestamp comparison), by setting the downgrade
50 flag in the package metadata. This differs from --downgrade flag, as we
51 don't enforce a data wipe with this flag. Because we know for sure this is
52 NOT an actual downgrade case, but two builds happen to be cut in a reverse
53 order (e.g. from two branches). A legit use case is that we cut a new
54 build C (after having A and B), but want to enfore an update path of A ->
55 C -> B. Specifying --downgrade may not help since that would enforce a
56 data wipe for C -> B update.
57
58 We used to set a fake timestamp in the package metadata for this flow. But
59 now we consolidate the two cases (i.e. an actual downgrade, or a downgrade
60 based on timestamp) with the same "ota-downgrade=yes" flag, with the
61 difference being whether "ota-wipe=yes" is set.
Doug Zongkereef39442009-04-02 12:14:19 -070062
Tao Bao30df8b42018-04-23 15:32:53 -070063 --wipe_user_data
64 Generate an OTA package that will wipe the user data partition when
65 installed.
66
Yifan Hong50e79542018-11-08 17:44:12 -080067 --retrofit_dynamic_partitions
68 Generates an OTA package that updates a device to support dynamic
69 partitions (default False). This flag is implied when generating
70 an incremental OTA where the base build does not support dynamic
71 partitions but the target build does. For A/B, when this flag is set,
72 --skip_postinstall is implied.
73
xunchangabfa2652019-02-19 16:27:10 -080074 --skip_compatibility_check
Yifan Hong9276cf02019-08-21 16:37:04 -070075 Skip checking compatibility of the input target files package.
xunchangabfa2652019-02-19 16:27:10 -080076
xunchang1cfe2512019-02-19 14:14:48 -080077 --output_metadata_path
78 Write a copy of the metadata to a separate file. Therefore, users can
79 read the post build fingerprint without extracting the OTA package.
80
Yifan Hong65afc072020-04-17 10:08:10 -070081 --force_non_ab
82 This flag can only be set on an A/B device that also supports non-A/B
83 updates. Implies --two_step.
84 If set, generate that non-A/B update package.
85 If not set, generates A/B package for A/B device and non-A/B package for
86 non-A/B device.
87
Hongguang Chen49ab1b902020-10-19 14:15:43 -070088 -o (--oem_settings) <main_file[,additional_files...]>
89 Comma separated list of files used to specify the expected OEM-specific
90 properties on the OEM partition of the intended device. Multiple expected
91 values can be used by providing multiple files. Only the first dict will
92 be used to compute fingerprint, while the rest will be used to assert
93 OEM-specific properties.
94
Tao Bao30df8b42018-04-23 15:32:53 -070095Non-A/B OTA specific options
96
97 -b (--binary) <file>
98 Use the given binary as the update-binary in the output package, instead
99 of the binary in the build's target_files. Use for development only.
100
101 --block
102 Generate a block-based OTA for non-A/B device. We have deprecated the
103 support for file-based OTA since O. Block-based OTA will be used by
104 default for all non-A/B devices. Keeping this flag here to not break
105 existing callers.
106
107 -e (--extra_script) <file>
108 Insert the contents of file at the end of the update script.
Tao Bao43078aa2015-04-21 14:32:35 -0700109
leozwangaa6c1a12015-08-14 10:57:58 -0700110 --full_bootloader
111 Similar to --full_radio. When generating an incremental OTA, always
112 include a full copy of bootloader image.
113
Tao Bao30df8b42018-04-23 15:32:53 -0700114 --full_radio
115 When generating an incremental OTA, always include a full copy of radio
116 image. This option is only meaningful when -i is specified, because a full
117 radio is always included in a full OTA if applicable.
Michael Runge63f01de2014-10-28 19:24:19 -0700118
Tao Bao30df8b42018-04-23 15:32:53 -0700119 --log_diff <file>
120 Generate a log file that shows the differences in the source and target
121 builds for an incremental package. This option is only meaningful when -i
122 is specified.
123
Tao Bao8608cde2016-02-25 19:49:55 -0800124 --oem_no_mount
Tao Bao30df8b42018-04-23 15:32:53 -0700125 For devices with OEM-specific properties but without an OEM partition, do
126 not mount the OEM partition in the updater-script. This should be very
127 rarely used, since it's expected to have a dedicated OEM partition for
128 OEM-specific properties. Only meaningful when -o is specified.
Tao Bao8608cde2016-02-25 19:49:55 -0800129
Tao Bao30df8b42018-04-23 15:32:53 -0700130 --stash_threshold <float>
131 Specify the threshold that will be used to compute the maximum allowed
132 stash size (defaults to 0.8).
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700133
Tao Bao30df8b42018-04-23 15:32:53 -0700134 -t (--worker_threads) <int>
135 Specify the number of worker-threads that will be used when generating
136 patches for incremental updates (defaults to 3).
Tao Bao3e6161a2017-02-28 11:48:48 -0800137
Tao Bao30df8b42018-04-23 15:32:53 -0700138 --verify
139 Verify the checksums of the updated system and vendor (if any) partitions.
140 Non-A/B incremental OTAs only.
Doug Zongker1c390a22009-05-14 19:06:36 -0700141
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800142 -2 (--two_step)
Tao Bao30df8b42018-04-23 15:32:53 -0700143 Generate a 'two-step' OTA package, where recovery is updated first, so
144 that any changes made to the system partition are done using the new
145 recovery (new kernel, etc.).
146
147A/B OTA specific options
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800148
Tianjie Xu1b079832019-08-28 12:19:23 -0700149 --disable_fec_computation
150 Disable the on device FEC data computation for incremental updates.
151
Tao Baof7140c02018-01-30 17:09:24 -0800152 --include_secondary
153 Additionally include the payload for secondary slot images (default:
154 False). Only meaningful when generating A/B OTAs.
155
156 By default, an A/B OTA package doesn't contain the images for the
157 secondary slot (e.g. system_other.img). Specifying this flag allows
158 generating a separate payload that will install secondary slot images.
159
160 Such a package needs to be applied in a two-stage manner, with a reboot
161 in-between. During the first stage, the updater applies the primary
162 payload only. Upon finishing, it reboots the device into the newly updated
163 slot. It then continues to install the secondary payload to the inactive
164 slot, but without switching the active slot at the end (needs the matching
165 support in update_engine, i.e. SWITCH_SLOT_ON_REBOOT flag).
166
167 Due to the special install procedure, the secondary payload will be always
168 generated as a full payload.
169
Tao Baodea0f8b2016-06-20 17:55:06 -0700170 --payload_signer <signer>
171 Specify the signer when signing the payload and metadata for A/B OTAs.
172 By default (i.e. without this flag), it calls 'openssl pkeyutl' to sign
173 with the package private key. If the private key cannot be accessed
174 directly, a payload signer that knows how to do that should be specified.
175 The signer will be supplied with "-inkey <path_to_key>",
176 "-in <input_file>" and "-out <output_file>" parameters.
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700177
178 --payload_signer_args <args>
179 Specify the arguments needed for payload signer.
Tao Bao15a146a2018-02-21 16:06:59 -0800180
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700181 --payload_signer_maximum_signature_size <signature_size>
182 The maximum signature size (in bytes) that would be generated by the given
183 payload signer. Only meaningful when custom payload signer is specified
184 via '--payload_signer'.
185 If the signer uses a RSA key, this should be the number of bytes to
186 represent the modulus. If it uses an EC key, this is the size of a
187 DER-encoded ECDSA signature.
188
xunchang376cc7c2019-04-08 23:04:58 -0700189 --payload_signer_key_size <key_size>
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700190 Deprecated. Use the '--payload_signer_maximum_signature_size' instead.
xunchang376cc7c2019-04-08 23:04:58 -0700191
Tianjied6867162020-05-10 14:30:13 -0700192 --boot_variable_file <path>
193 A file that contains the possible values of ro.boot.* properties. It's
194 used to calculate the possible runtime fingerprints when some
195 ro.product.* properties are overridden by the 'import' statement.
196 The file expects one property per line, and each line has the following
197 format: 'prop_name=value1,value2'. e.g. 'ro.boot.product.sku=std,pro'
198
Tao Bao15a146a2018-02-21 16:06:59 -0800199 --skip_postinstall
200 Skip the postinstall hooks when generating an A/B OTA package (default:
201 False). Note that this discards ALL the hooks, including non-optional
202 ones. Should only be used if caller knows it's safe to do so (e.g. all the
203 postinstall work is to dexopt apps and a data wipe will happen immediately
204 after). Only meaningful when generating A/B OTAs.
Yifan Hong38ab4d82020-06-18 15:19:56 -0700205
206 --partial "<PARTITION> [<PARTITION>[...]]"
207 Generate partial updates, overriding ab_partitions list with the given
208 list.
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700209
210 --custom_image <custom_partition=custom_image>
211 Use the specified custom_image to update custom_partition when generating
212 an A/B OTA package. e.g. "--custom_image oem=oem.img --custom_image
213 cus=cus_test.img"
David Anderson45b42302021-03-11 12:58:32 -0800214
215 --disable_vabc
216 Disable Virtual A/B Compression, for builds that have compression enabled
217 by default.
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400218
219 --vabc_downgrade
220 Don't disable Virtual A/B Compression for downgrading OTAs.
221 For VABC downgrades, we must finish merging before doing data wipe, and
222 since data wipe is required for downgrading OTA, this might cause long
223 wait time in recovery.
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700224
225 --enable_vabc_xor
226 Enable the VABC xor feature. Will reduce space requirements for OTA
227
Tianjiee7ab38d2021-09-08 19:09:38 -0700228 --force_minor_version
229 Override the update_engine minor version for delta generation.
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700230
231 --compressor_types
232 A colon ':' separated list of compressors. Allowed values are bz2 and brotli.
Kelvin Zhang410bb382022-01-06 09:15:54 -0800233
234 --enable_zucchini
235 Whether to enable to zucchini feature. Will generate smaller OTA but uses more memory.
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800236
237 --enable_lz4diff
238 Whether to enable lz4diff feature. Will generate smaller OTA for EROFS but
239 uses more memory.
Doug Zongkereef39442009-04-02 12:14:19 -0700240"""
241
Tao Bao89fbb0f2017-01-10 10:47:58 -0800242from __future__ import print_function
243
Tao Bao32fcdab2018-10-12 10:30:39 -0700244import logging
Doug Zongkerfc44a512014-08-26 13:10:25 -0700245import multiprocessing
Kelvin Zhang65029a22020-11-03 10:07:51 -0500246import os
Tao Bao2dd1c482017-02-03 16:49:39 -0800247import os.path
Kelvin Zhang65029a22020-11-03 10:07:51 -0500248import re
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700249import shlex
Tao Bao15a146a2018-02-21 16:06:59 -0800250import shutil
Tao Bao85f16982018-03-08 16:28:33 -0800251import struct
Kelvin Zhang65029a22020-11-03 10:07:51 -0500252import subprocess
Tao Bao481bab82017-12-21 11:23:09 -0800253import sys
Doug Zongkereef39442009-04-02 12:14:19 -0700254import zipfile
255
Kelvin Zhang766eea72021-06-03 09:36:08 -0400256import care_map_pb2
Doug Zongkereef39442009-04-02 12:14:19 -0700257import common
Kelvin Zhang2e417382020-08-20 11:33:11 -0400258import ota_utils
Kelvin Zhang22c687c2021-01-21 10:51:57 -0500259from ota_utils import (UNZIP_PATTERN, FinalizeMetadata, GetPackageMetadata,
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400260 PropertyFiles, SECURITY_PATCH_LEVEL_PROP_NAME, GetZipEntryOffset)
Kelvin Zhang26390482021-11-02 14:31:10 -0700261from common import IsSparseImage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400262import target_files_diff
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400263from check_target_files_vintf import CheckVintfIfTrebleEnabled
264from non_ab_ota import GenerateNonAbOtaPackage
Kelvin Zhang0876c412020-06-23 15:06:58 -0400265
Tao Bao481bab82017-12-21 11:23:09 -0800266if sys.hexversion < 0x02070000:
267 print("Python 2.7 or newer is required.", file=sys.stderr)
268 sys.exit(1)
269
Tao Bao32fcdab2018-10-12 10:30:39 -0700270logger = logging.getLogger(__name__)
Tao Bao481bab82017-12-21 11:23:09 -0800271
Kelvin Zhang2e417382020-08-20 11:33:11 -0400272OPTIONS = ota_utils.OPTIONS
Michael Runge63f01de2014-10-28 19:24:19 -0700273OPTIONS.verify = False
Doug Zongkereef39442009-04-02 12:14:19 -0700274OPTIONS.patch_threshold = 0.95
Doug Zongkerdbfaae52009-04-21 17:12:54 -0700275OPTIONS.wipe_user_data = False
Doug Zongker1c390a22009-05-14 19:06:36 -0700276OPTIONS.extra_script = None
Doug Zongkerfc44a512014-08-26 13:10:25 -0700277OPTIONS.worker_threads = multiprocessing.cpu_count() // 2
278if OPTIONS.worker_threads == 0:
279 OPTIONS.worker_threads = 1
Doug Zongker9b23f2c2013-11-25 14:44:12 -0800280OPTIONS.two_step = False
Tao Baof7140c02018-01-30 17:09:24 -0800281OPTIONS.include_secondary = False
Tao Bao457cbf62017-03-06 09:56:01 -0800282OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -0800283OPTIONS.updater_binary = None
Tianjie Xu9afb2212020-05-10 21:48:15 +0000284OPTIONS.oem_dicts = None
Michael Runge6e836112014-04-15 17:40:21 -0700285OPTIONS.oem_source = None
Tao Bao8608cde2016-02-25 19:49:55 -0800286OPTIONS.oem_no_mount = False
Tao Bao43078aa2015-04-21 14:32:35 -0700287OPTIONS.full_radio = False
leozwangaa6c1a12015-08-14 10:57:58 -0700288OPTIONS.full_bootloader = False
Tao Baod47d8e12015-05-21 14:09:49 -0700289# Stash size cannot exceed cache_size * threshold.
290OPTIONS.cache_size = None
291OPTIONS.stash_threshold = 0.8
Tao Baod62c6032015-11-30 09:40:20 -0800292OPTIONS.log_diff = None
Tao Baodea0f8b2016-06-20 17:55:06 -0700293OPTIONS.payload_signer = None
Baligh Uddin2abbbd02016-06-22 12:14:16 -0700294OPTIONS.payload_signer_args = []
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700295OPTIONS.payload_signer_maximum_signature_size = None
Tao Bao5f8ff932017-03-21 22:35:00 -0700296OPTIONS.extracted_input = None
Tao Bao15a146a2018-02-21 16:06:59 -0800297OPTIONS.skip_postinstall = False
xunchangabfa2652019-02-19 16:27:10 -0800298OPTIONS.skip_compatibility_check = False
Tianjie Xu1b079832019-08-28 12:19:23 -0700299OPTIONS.disable_fec_computation = False
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500300OPTIONS.disable_verity_computation = False
Yifan Hong38ab4d82020-06-18 15:19:56 -0700301OPTIONS.partial = None
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700302OPTIONS.custom_images = {}
Kelvin Zhangbbfa1822021-02-03 17:19:44 -0500303OPTIONS.disable_vabc = False
Kelvin Zhang80ff4662021-02-08 19:57:57 -0500304OPTIONS.spl_downgrade = False
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -0400305OPTIONS.vabc_downgrade = False
Kelvin Zhang1250bca2021-08-27 15:10:27 -0700306OPTIONS.enable_vabc_xor = True
Tianjiee7ab38d2021-09-08 19:09:38 -0700307OPTIONS.force_minor_version = None
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -0700308OPTIONS.compressor_types = None
Kelvin Zhangf2728d62022-01-10 11:42:36 -0800309OPTIONS.enable_zucchini = True
310OPTIONS.enable_lz4diff = False
Tao Bao8dcf7382015-05-21 14:09:49 -0700311
Tao Bao15a146a2018-02-21 16:06:59 -0800312POSTINSTALL_CONFIG = 'META/postinstall_config.txt'
Yifan Hong50e79542018-11-08 17:44:12 -0800313DYNAMIC_PARTITION_INFO = 'META/dynamic_partitions_info.txt'
Yifan Hongb433eba2019-03-06 12:42:53 -0800314AB_PARTITIONS = 'META/ab_partitions.txt'
Kelvin Zhangcff4d762020-07-29 16:37:51 -0400315
Tao Baof0c4aa22018-04-30 20:29:30 -0700316# Files to be unzipped for target diffing purpose.
317TARGET_DIFFING_UNZIP_PATTERN = ['BOOT', 'RECOVERY', 'SYSTEM/*', 'VENDOR/*',
Yifan Hongcfb917a2020-05-07 14:58:20 -0700318 'PRODUCT/*', 'SYSTEM_EXT/*', 'ODM/*',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700319 'VENDOR_DLKM/*', 'ODM_DLKM/*']
Yifan Hongb433eba2019-03-06 12:42:53 -0800320RETROFIT_DAP_UNZIP_PATTERN = ['OTA/super_*.img', AB_PARTITIONS]
Tao Bao3e759462019-09-17 22:43:11 -0700321
322# Images to be excluded from secondary payload. We essentially only keep
323# 'system_other' and bootloader partitions.
324SECONDARY_PAYLOAD_SKIPPED_IMAGES = [
Yifan Hongc08cbf02020-09-15 19:07:39 +0000325 'boot', 'dtbo', 'modem', 'odm', 'odm_dlkm', 'product', 'radio', 'recovery',
Tianjiec3850642020-05-13 14:47:31 -0700326 'system_ext', 'vbmeta', 'vbmeta_system', 'vbmeta_vendor', 'vendor',
Yifan Hongf496f1b2020-07-15 16:52:59 -0700327 'vendor_boot']
Tao Bao6b0b2f92017-03-05 11:38:11 -0800328
Kelvin Zhang05ff7052021-02-10 09:13:26 -0500329
Tao Baofabe0832018-01-17 15:52:28 -0800330class PayloadSigner(object):
331 """A class that wraps the payload signing works.
332
333 When generating a Payload, hashes of the payload and metadata files will be
334 signed with the device key, either by calling an external payload signer or
335 by calling openssl with the package key. This class provides a unified
336 interface, so that callers can just call PayloadSigner.Sign().
337
338 If an external payload signer has been specified (OPTIONS.payload_signer), it
339 calls the signer with the provided args (OPTIONS.payload_signer_args). Note
340 that the signing key should be provided as part of the payload_signer_args.
341 Otherwise without an external signer, it uses the package key
342 (OPTIONS.package_key) and calls openssl for the signing works.
343 """
344
345 def __init__(self):
346 if OPTIONS.payload_signer is None:
347 # Prepare the payload signing key.
348 private_key = OPTIONS.package_key + OPTIONS.private_key_suffix
349 pw = OPTIONS.key_passwords[OPTIONS.package_key]
350
351 cmd = ["openssl", "pkcs8", "-in", private_key, "-inform", "DER"]
352 cmd.extend(["-passin", "pass:" + pw] if pw else ["-nocrypt"])
353 signing_key = common.MakeTempFile(prefix="key-", suffix=".key")
354 cmd.extend(["-out", signing_key])
Tao Baobec89c12018-10-15 11:53:28 -0700355 common.RunAndCheckOutput(cmd, verbose=False)
Tao Baofabe0832018-01-17 15:52:28 -0800356
357 self.signer = "openssl"
358 self.signer_args = ["pkeyutl", "-sign", "-inkey", signing_key,
359 "-pkeyopt", "digest:sha256"]
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700360 self.maximum_signature_size = self._GetMaximumSignatureSizeInBytes(
361 signing_key)
Tao Baofabe0832018-01-17 15:52:28 -0800362 else:
363 self.signer = OPTIONS.payload_signer
364 self.signer_args = OPTIONS.payload_signer_args
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700365 if OPTIONS.payload_signer_maximum_signature_size:
366 self.maximum_signature_size = int(
367 OPTIONS.payload_signer_maximum_signature_size)
xunchang376cc7c2019-04-08 23:04:58 -0700368 else:
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700369 # The legacy config uses RSA2048 keys.
370 logger.warning("The maximum signature size for payload signer is not"
371 " set, default to 256 bytes.")
372 self.maximum_signature_size = 256
xunchang376cc7c2019-04-08 23:04:58 -0700373
374 @staticmethod
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700375 def _GetMaximumSignatureSizeInBytes(signing_key):
376 out_signature_size_file = common.MakeTempFile("signature_size")
377 cmd = ["delta_generator", "--out_maximum_signature_size_file={}".format(
378 out_signature_size_file), "--private_key={}".format(signing_key)]
379 common.RunAndCheckOutput(cmd)
380 with open(out_signature_size_file) as f:
381 signature_size = f.read().rstrip()
Luca Stefani88e1a142020-03-27 14:05:12 +0100382 logger.info("%s outputs the maximum signature size: %s", cmd[0],
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700383 signature_size)
384 return int(signature_size)
Tao Baofabe0832018-01-17 15:52:28 -0800385
386 def Sign(self, in_file):
387 """Signs the given input file. Returns the output filename."""
388 out_file = common.MakeTempFile(prefix="signed-", suffix=".bin")
389 cmd = [self.signer] + self.signer_args + ['-in', in_file, '-out', out_file]
Tao Bao718faed2019-08-02 13:24:19 -0700390 common.RunAndCheckOutput(cmd)
Tao Baofabe0832018-01-17 15:52:28 -0800391 return out_file
392
393
Tao Bao40b18822018-01-30 18:19:04 -0800394class Payload(object):
395 """Manages the creation and the signing of an A/B OTA Payload."""
396
397 PAYLOAD_BIN = 'payload.bin'
398 PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt'
Tao Baof7140c02018-01-30 17:09:24 -0800399 SECONDARY_PAYLOAD_BIN = 'secondary/payload.bin'
400 SECONDARY_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt'
Tao Bao40b18822018-01-30 18:19:04 -0800401
Tao Bao667ff572018-02-10 00:02:40 -0800402 def __init__(self, secondary=False):
403 """Initializes a Payload instance.
404
405 Args:
406 secondary: Whether it's generating a secondary payload (default: False).
407 """
Tao Bao40b18822018-01-30 18:19:04 -0800408 self.payload_file = None
409 self.payload_properties = None
Tao Bao667ff572018-02-10 00:02:40 -0800410 self.secondary = secondary
Tao Bao40b18822018-01-30 18:19:04 -0800411
Tao Baof0c4aa22018-04-30 20:29:30 -0700412 def _Run(self, cmd): # pylint: disable=no-self-use
Tao Bao718faed2019-08-02 13:24:19 -0700413 # Don't pipe (buffer) the output if verbose is set. Let
414 # brillo_update_payload write to stdout/stderr directly, so its progress can
415 # be monitored.
416 if OPTIONS.verbose:
417 common.RunAndCheckOutput(cmd, stdout=None, stderr=None)
418 else:
419 common.RunAndCheckOutput(cmd)
420
Tao Bao40b18822018-01-30 18:19:04 -0800421 def Generate(self, target_file, source_file=None, additional_args=None):
422 """Generates a payload from the given target-files zip(s).
423
424 Args:
425 target_file: The filename of the target build target-files zip.
426 source_file: The filename of the source build target-files zip; or None if
427 generating a full OTA.
428 additional_args: A list of additional args that should be passed to
429 brillo_update_payload script; or None.
430 """
431 if additional_args is None:
432 additional_args = []
433
434 payload_file = common.MakeTempFile(prefix="payload-", suffix=".bin")
435 cmd = ["brillo_update_payload", "generate",
436 "--payload", payload_file,
437 "--target_image", target_file]
438 if source_file is not None:
439 cmd.extend(["--source_image", source_file])
Tianjie Xu1b079832019-08-28 12:19:23 -0700440 if OPTIONS.disable_fec_computation:
441 cmd.extend(["--disable_fec_computation", "true"])
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -0500442 if OPTIONS.disable_verity_computation:
443 cmd.extend(["--disable_verity_computation", "true"])
Tao Bao40b18822018-01-30 18:19:04 -0800444 cmd.extend(additional_args)
Tao Bao718faed2019-08-02 13:24:19 -0700445 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800446
447 self.payload_file = payload_file
448 self.payload_properties = None
449
450 def Sign(self, payload_signer):
451 """Generates and signs the hashes of the payload and metadata.
452
453 Args:
454 payload_signer: A PayloadSigner() instance that serves the signing work.
455
456 Raises:
457 AssertionError: On any failure when calling brillo_update_payload script.
458 """
459 assert isinstance(payload_signer, PayloadSigner)
460
461 # 1. Generate hashes of the payload and metadata files.
462 payload_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
463 metadata_sig_file = common.MakeTempFile(prefix="sig-", suffix=".bin")
464 cmd = ["brillo_update_payload", "hash",
465 "--unsigned_payload", self.payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700466 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800467 "--metadata_hash_file", metadata_sig_file,
468 "--payload_hash_file", payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700469 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800470
471 # 2. Sign the hashes.
472 signed_payload_sig_file = payload_signer.Sign(payload_sig_file)
473 signed_metadata_sig_file = payload_signer.Sign(metadata_sig_file)
474
475 # 3. Insert the signatures back into the payload file.
476 signed_payload_file = common.MakeTempFile(prefix="signed-payload-",
477 suffix=".bin")
478 cmd = ["brillo_update_payload", "sign",
479 "--unsigned_payload", self.payload_file,
480 "--payload", signed_payload_file,
Tianjie Xu21e6deb2019-10-07 18:01:00 -0700481 "--signature_size", str(payload_signer.maximum_signature_size),
Tao Bao40b18822018-01-30 18:19:04 -0800482 "--metadata_signature_file", signed_metadata_sig_file,
483 "--payload_signature_file", signed_payload_sig_file]
Tao Bao718faed2019-08-02 13:24:19 -0700484 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800485
486 # 4. Dump the signed payload properties.
487 properties_file = common.MakeTempFile(prefix="payload-properties-",
488 suffix=".txt")
489 cmd = ["brillo_update_payload", "properties",
490 "--payload", signed_payload_file,
491 "--properties_file", properties_file]
Tao Bao718faed2019-08-02 13:24:19 -0700492 self._Run(cmd)
Tao Bao40b18822018-01-30 18:19:04 -0800493
Tao Bao667ff572018-02-10 00:02:40 -0800494 if self.secondary:
495 with open(properties_file, "a") as f:
496 f.write("SWITCH_SLOT_ON_REBOOT=0\n")
497
Tao Bao40b18822018-01-30 18:19:04 -0800498 if OPTIONS.wipe_user_data:
499 with open(properties_file, "a") as f:
500 f.write("POWERWASH=1\n")
501
502 self.payload_file = signed_payload_file
503 self.payload_properties = properties_file
504
Tao Bao667ff572018-02-10 00:02:40 -0800505 def WriteToZip(self, output_zip):
Tao Bao40b18822018-01-30 18:19:04 -0800506 """Writes the payload to the given zip.
507
508 Args:
509 output_zip: The output ZipFile instance.
510 """
511 assert self.payload_file is not None
512 assert self.payload_properties is not None
513
Tao Bao667ff572018-02-10 00:02:40 -0800514 if self.secondary:
Tao Baof7140c02018-01-30 17:09:24 -0800515 payload_arcname = Payload.SECONDARY_PAYLOAD_BIN
516 payload_properties_arcname = Payload.SECONDARY_PAYLOAD_PROPERTIES_TXT
517 else:
518 payload_arcname = Payload.PAYLOAD_BIN
519 payload_properties_arcname = Payload.PAYLOAD_PROPERTIES_TXT
520
Tao Bao40b18822018-01-30 18:19:04 -0800521 # Add the signed payload file and properties into the zip. In order to
522 # support streaming, we pack them as ZIP_STORED. So these entries can be
523 # read directly with the offset and length pairs.
Tao Baof7140c02018-01-30 17:09:24 -0800524 common.ZipWrite(output_zip, self.payload_file, arcname=payload_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800525 compress_type=zipfile.ZIP_STORED)
526 common.ZipWrite(output_zip, self.payload_properties,
Tao Baof7140c02018-01-30 17:09:24 -0800527 arcname=payload_properties_arcname,
Tao Bao40b18822018-01-30 18:19:04 -0800528 compress_type=zipfile.ZIP_STORED)
529
530
Tao Bao481bab82017-12-21 11:23:09 -0800531def _LoadOemDicts(oem_source):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800532 """Returns the list of loaded OEM properties dict."""
Tao Bao481bab82017-12-21 11:23:09 -0800533 if not oem_source:
534 return None
535
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800536 oem_dicts = []
Tao Bao481bab82017-12-21 11:23:09 -0800537 for oem_file in oem_source:
538 with open(oem_file) as fp:
539 oem_dicts.append(common.LoadDictionaryFromLines(fp.readlines()))
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -0800540 return oem_dicts
Doug Zongkereef39442009-04-02 12:14:19 -0700541
Doug Zongkereef39442009-04-02 12:14:19 -0700542
Tao Baod3fc38a2018-03-08 16:09:01 -0800543class StreamingPropertyFiles(PropertyFiles):
544 """A subclass for computing the property-files for streaming A/B OTAs."""
545
546 def __init__(self):
547 super(StreamingPropertyFiles, self).__init__()
548 self.name = 'ota-streaming-property-files'
549 self.required = (
550 # payload.bin and payload_properties.txt must exist.
551 'payload.bin',
552 'payload_properties.txt',
553 )
554 self.optional = (
Tianjied868c122021-06-07 16:11:47 -0700555 # apex_info.pb isn't directly used in the update flow
556 'apex_info.pb',
Tianjie Xu4c05f4a2018-09-14 16:24:41 -0700557 # care_map is available only if dm-verity is enabled.
558 'care_map.pb',
Tao Baod3fc38a2018-03-08 16:09:01 -0800559 'care_map.txt',
560 # compatibility.zip is available only if target supports Treble.
561 'compatibility.zip',
562 )
563
564
Tao Bao85f16982018-03-08 16:28:33 -0800565class AbOtaPropertyFiles(StreamingPropertyFiles):
566 """The property-files for A/B OTA that includes payload_metadata.bin info.
567
568 Since P, we expose one more token (aka property-file), in addition to the ones
569 for streaming A/B OTA, for a virtual entry of 'payload_metadata.bin'.
570 'payload_metadata.bin' is the header part of a payload ('payload.bin'), which
571 doesn't exist as a separate ZIP entry, but can be used to verify if the
572 payload can be applied on the given device.
573
574 For backward compatibility, we keep both of the 'ota-streaming-property-files'
575 and the newly added 'ota-property-files' in P. The new token will only be
576 available in 'ota-property-files'.
577 """
578
579 def __init__(self):
580 super(AbOtaPropertyFiles, self).__init__()
581 self.name = 'ota-property-files'
582
583 def _GetPrecomputed(self, input_zip):
584 offset, size = self._GetPayloadMetadataOffsetAndSize(input_zip)
585 return ['payload_metadata.bin:{}:{}'.format(offset, size)]
586
587 @staticmethod
588 def _GetPayloadMetadataOffsetAndSize(input_zip):
589 """Computes the offset and size of the payload metadata for a given package.
590
591 (From system/update_engine/update_metadata.proto)
592 A delta update file contains all the deltas needed to update a system from
593 one specific version to another specific version. The update format is
594 represented by this struct pseudocode:
595
596 struct delta_update_file {
597 char magic[4] = "CrAU";
598 uint64 file_format_version;
599 uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
600
601 // Only present if format_version > 1:
602 uint32 metadata_signature_size;
603
604 // The Bzip2 compressed DeltaArchiveManifest
605 char manifest[metadata_signature_size];
606
607 // The signature of the metadata (from the beginning of the payload up to
608 // this location, not including the signature itself). This is a
609 // serialized Signatures message.
610 char medatada_signature_message[metadata_signature_size];
611
612 // Data blobs for files, no specific format. The specific offset
613 // and length of each data blob is recorded in the DeltaArchiveManifest.
614 struct {
615 char data[];
616 } blobs[];
617
618 // These two are not signed:
619 uint64 payload_signatures_message_size;
620 char payload_signatures_message[];
621 };
622
623 'payload-metadata.bin' contains all the bytes from the beginning of the
624 payload, till the end of 'medatada_signature_message'.
625 """
626 payload_info = input_zip.getinfo('payload.bin')
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400627 (payload_offset, payload_size) = GetZipEntryOffset(input_zip, payload_info)
Tao Bao85f16982018-03-08 16:28:33 -0800628
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400629 # Read the underlying raw zipfile at specified offset
630 payload_fp = input_zip.fp
631 payload_fp.seek(payload_offset)
632 header_bin = payload_fp.read(24)
Tao Bao85f16982018-03-08 16:28:33 -0800633
634 # network byte order (big-endian)
635 header = struct.unpack("!IQQL", header_bin)
636
637 # 'CrAU'
638 magic = header[0]
Kelvin Zhang25ab9982021-06-22 09:51:34 -0400639 assert magic == 0x43724155, "Invalid magic: {:x}, computed offset {}" \
640 .format(magic, payload_offset)
Tao Bao85f16982018-03-08 16:28:33 -0800641
642 manifest_size = header[2]
643 metadata_signature_size = header[3]
644 metadata_total = 24 + manifest_size + metadata_signature_size
645 assert metadata_total < payload_size
646
647 return (payload_offset, metadata_total)
648
649
Yifan Hong38ab4d82020-06-18 15:19:56 -0700650def UpdatesInfoForSpecialUpdates(content, partitions_filter,
651 delete_keys=None):
652 """ Updates info file for secondary payload generation, partial update, etc.
653
654 Scan each line in the info file, and remove the unwanted partitions from
655 the dynamic partition list in the related properties. e.g.
656 "super_google_dynamic_partitions_partition_list=system vendor product"
657 will become "super_google_dynamic_partitions_partition_list=system".
658
659 Args:
660 content: The content of the input info file. e.g. misc_info.txt.
661 partitions_filter: A function to filter the desired partitions from a given
662 list
663 delete_keys: A list of keys to delete in the info file
664
665 Returns:
666 A string of the updated info content.
667 """
668
669 output_list = []
670 # The suffix in partition_list variables that follows the name of the
671 # partition group.
672 list_suffix = 'partition_list'
673 for line in content.splitlines():
674 if line.startswith('#') or '=' not in line:
675 output_list.append(line)
676 continue
677 key, value = line.strip().split('=', 1)
678
679 if delete_keys and key in delete_keys:
680 pass
681 elif key.endswith(list_suffix):
682 partitions = value.split()
683 # TODO for partial update, partitions in the same group must be all
684 # updated or all omitted
685 partitions = filter(partitions_filter, partitions)
686 output_list.append('{}={}'.format(key, ' '.join(partitions)))
687 else:
688 output_list.append(line)
689 return '\n'.join(output_list)
690
691
Tao Bao15a146a2018-02-21 16:06:59 -0800692def GetTargetFilesZipForSecondaryImages(input_file, skip_postinstall=False):
Tao Baof7140c02018-01-30 17:09:24 -0800693 """Returns a target-files.zip file for generating secondary payload.
694
695 Although the original target-files.zip already contains secondary slot
696 images (i.e. IMAGES/system_other.img), we need to rename the files to the
697 ones without _other suffix. Note that we cannot instead modify the names in
698 META/ab_partitions.txt, because there are no matching partitions on device.
699
700 For the partitions that don't have secondary images, the ones for primary
701 slot will be used. This is to ensure that we always have valid boot, vbmeta,
702 bootloader images in the inactive slot.
703
704 Args:
705 input_file: The input target-files.zip file.
Tao Bao15a146a2018-02-21 16:06:59 -0800706 skip_postinstall: Whether to skip copying the postinstall config file.
Tao Baof7140c02018-01-30 17:09:24 -0800707
708 Returns:
709 The filename of the target-files.zip for generating secondary payload.
710 """
Tianjie Xu1c808002019-09-11 00:29:26 -0700711
712 def GetInfoForSecondaryImages(info_file):
Yifan Hong38ab4d82020-06-18 15:19:56 -0700713 """Updates info file for secondary payload generation."""
Tianjie Xu1c808002019-09-11 00:29:26 -0700714 with open(info_file) as f:
Yifan Hong38ab4d82020-06-18 15:19:56 -0700715 content = f.read()
716 # Remove virtual_ab flag from secondary payload so that OTA client
717 # don't use snapshots for secondary update
718 delete_keys = ['virtual_ab', "virtual_ab_retrofit"]
719 return UpdatesInfoForSpecialUpdates(
720 content, lambda p: p not in SECONDARY_PAYLOAD_SKIPPED_IMAGES,
721 delete_keys)
Tianjie Xu1c808002019-09-11 00:29:26 -0700722
Tao Baof7140c02018-01-30 17:09:24 -0800723 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
724 target_zip = zipfile.ZipFile(target_file, 'w', allowZip64=True)
725
Kelvin Zhang928c2342020-09-22 16:15:57 -0400726 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Baodba59ee2018-01-09 13:21:02 -0800727 infolist = input_zip.infolist()
Tao Bao12489802018-07-12 14:47:38 -0700728
Tao Bao0ff15de2019-03-20 11:26:06 -0700729 input_tmp = common.UnzipTemp(input_file, UNZIP_PATTERN)
Tao Baodba59ee2018-01-09 13:21:02 -0800730 for info in infolist:
Tao Baof7140c02018-01-30 17:09:24 -0800731 unzipped_file = os.path.join(input_tmp, *info.filename.split('/'))
732 if info.filename == 'IMAGES/system_other.img':
733 common.ZipWrite(target_zip, unzipped_file, arcname='IMAGES/system.img')
734
735 # Primary images and friends need to be skipped explicitly.
736 elif info.filename in ('IMAGES/system.img',
737 'IMAGES/system.map'):
738 pass
Tao Bao3e759462019-09-17 22:43:11 -0700739
740 # Copy images that are not in SECONDARY_PAYLOAD_SKIPPED_IMAGES.
741 elif info.filename.startswith(('IMAGES/', 'RADIO/')):
742 image_name = os.path.basename(info.filename)
743 if image_name not in ['{}.img'.format(partition) for partition in
744 SECONDARY_PAYLOAD_SKIPPED_IMAGES]:
745 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800746
Tao Bao15a146a2018-02-21 16:06:59 -0800747 # Skip copying the postinstall config if requested.
748 elif skip_postinstall and info.filename == POSTINSTALL_CONFIG:
749 pass
750
Tianjie Xu1c808002019-09-11 00:29:26 -0700751 elif info.filename.startswith('META/'):
752 # Remove the unnecessary partitions for secondary images from the
753 # ab_partitions file.
754 if info.filename == AB_PARTITIONS:
755 with open(unzipped_file) as f:
756 partition_list = f.read().splitlines()
757 partition_list = [partition for partition in partition_list if partition
Tao Bao3e759462019-09-17 22:43:11 -0700758 and partition not in SECONDARY_PAYLOAD_SKIPPED_IMAGES]
Kelvin Zhang0876c412020-06-23 15:06:58 -0400759 common.ZipWriteStr(target_zip, info.filename,
760 '\n'.join(partition_list))
Tianjie Xu1c808002019-09-11 00:29:26 -0700761 # Remove the unnecessary partitions from the dynamic partitions list.
762 elif (info.filename == 'META/misc_info.txt' or
763 info.filename == DYNAMIC_PARTITION_INFO):
764 modified_info = GetInfoForSecondaryImages(unzipped_file)
765 common.ZipWriteStr(target_zip, info.filename, modified_info)
766 else:
767 common.ZipWrite(target_zip, unzipped_file, arcname=info.filename)
Tao Baof7140c02018-01-30 17:09:24 -0800768
Tao Baof7140c02018-01-30 17:09:24 -0800769 common.ZipClose(target_zip)
770
771 return target_file
772
773
Tao Bao15a146a2018-02-21 16:06:59 -0800774def GetTargetFilesZipWithoutPostinstallConfig(input_file):
775 """Returns a target-files.zip that's not containing postinstall_config.txt.
776
777 This allows brillo_update_payload script to skip writing all the postinstall
778 hooks in the generated payload. The input target-files.zip file will be
779 duplicated, with 'META/postinstall_config.txt' skipped. If input_file doesn't
780 contain the postinstall_config.txt entry, the input file will be returned.
781
782 Args:
783 input_file: The input target-files.zip filename.
784
785 Returns:
786 The filename of target-files.zip that doesn't contain postinstall config.
787 """
788 # We should only make a copy if postinstall_config entry exists.
Kelvin Zhang928c2342020-09-22 16:15:57 -0400789 with zipfile.ZipFile(input_file, 'r', allowZip64=True) as input_zip:
Tao Bao15a146a2018-02-21 16:06:59 -0800790 if POSTINSTALL_CONFIG not in input_zip.namelist():
791 return input_file
792
793 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
794 shutil.copyfile(input_file, target_file)
795 common.ZipDelete(target_file, POSTINSTALL_CONFIG)
796 return target_file
797
Kelvin Zhang06400172021-03-05 15:42:03 -0500798
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400799def ParseInfoDict(target_file_path):
800 with zipfile.ZipFile(target_file_path, 'r', allowZip64=True) as zfp:
801 return common.LoadInfoDict(zfp)
Tao Bao15a146a2018-02-21 16:06:59 -0800802
Kelvin Zhang06400172021-03-05 15:42:03 -0500803
Yifan Hong38ab4d82020-06-18 15:19:56 -0700804def GetTargetFilesZipForPartialUpdates(input_file, ab_partitions):
805 """Returns a target-files.zip for partial ota update package generation.
806
807 This function modifies ab_partitions list with the desired partitions before
808 calling the brillo_update_payload script. It also cleans up the reference to
809 the excluded partitions in the info file, e.g misc_info.txt.
810
811 Args:
812 input_file: The input target-files.zip filename.
813 ab_partitions: A list of partitions to include in the partial update
814
815 Returns:
816 The filename of target-files.zip used for partial ota update.
817 """
818
819 def AddImageForPartition(partition_name):
820 """Add the archive name for a given partition to the copy list."""
821 for prefix in ['IMAGES', 'RADIO']:
822 image_path = '{}/{}.img'.format(prefix, partition_name)
823 if image_path in namelist:
824 copy_entries.append(image_path)
825 map_path = '{}/{}.map'.format(prefix, partition_name)
826 if map_path in namelist:
827 copy_entries.append(map_path)
828 return
829
830 raise ValueError("Cannot find {} in input zipfile".format(partition_name))
831
832 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400833 original_ab_partitions = input_zip.read(
834 AB_PARTITIONS).decode().splitlines()
Yifan Hong38ab4d82020-06-18 15:19:56 -0700835 namelist = input_zip.namelist()
836
837 unrecognized_partitions = [partition for partition in ab_partitions if
838 partition not in original_ab_partitions]
839 if unrecognized_partitions:
840 raise ValueError("Unrecognized partitions when generating partial updates",
841 unrecognized_partitions)
842
843 logger.info("Generating partial updates for %s", ab_partitions)
844
845 copy_entries = ['META/update_engine_config.txt']
846 for partition_name in ab_partitions:
847 AddImageForPartition(partition_name)
848
849 # Use zip2zip to avoid extracting the zipfile.
850 partial_target_file = common.MakeTempFile(suffix='.zip')
851 cmd = ['zip2zip', '-i', input_file, '-o', partial_target_file]
852 cmd.extend(['{}:{}'.format(name, name) for name in copy_entries])
853 common.RunAndCheckOutput(cmd)
854
855 partial_target_zip = zipfile.ZipFile(partial_target_file, 'a',
856 allowZip64=True)
857 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
858 common.ZipWriteStr(partial_target_zip, 'META/ab_partitions.txt',
859 '\n'.join(ab_partitions))
Kelvin Zhang766eea72021-06-03 09:36:08 -0400860 CARE_MAP_ENTRY = "META/care_map.pb"
861 if CARE_MAP_ENTRY in input_zip.namelist():
862 caremap = care_map_pb2.CareMap()
863 caremap.ParseFromString(input_zip.read(CARE_MAP_ENTRY))
864 filtered = [
865 part for part in caremap.partitions if part.name in ab_partitions]
866 del caremap.partitions[:]
867 caremap.partitions.extend(filtered)
868 common.ZipWriteStr(partial_target_zip, CARE_MAP_ENTRY,
869 caremap.SerializeToString())
870
Yifan Hong38ab4d82020-06-18 15:19:56 -0700871 for info_file in ['META/misc_info.txt', DYNAMIC_PARTITION_INFO]:
872 if info_file not in input_zip.namelist():
873 logger.warning('Cannot find %s in input zipfile', info_file)
874 continue
875 content = input_zip.read(info_file).decode()
876 modified_info = UpdatesInfoForSpecialUpdates(
877 content, lambda p: p in ab_partitions)
878 common.ZipWriteStr(partial_target_zip, info_file, modified_info)
879
Kelvin Zhang766eea72021-06-03 09:36:08 -0400880 # TODO(xunchang) handle META/postinstall_config.txt'
881
Yifan Hong38ab4d82020-06-18 15:19:56 -0700882 common.ZipClose(partial_target_zip)
883
884 return partial_target_file
885
886
Yifan Hong50e79542018-11-08 17:44:12 -0800887def GetTargetFilesZipForRetrofitDynamicPartitions(input_file,
Yifan Hongb433eba2019-03-06 12:42:53 -0800888 super_block_devices,
889 dynamic_partition_list):
Yifan Hong50e79542018-11-08 17:44:12 -0800890 """Returns a target-files.zip for retrofitting dynamic partitions.
891
892 This allows brillo_update_payload to generate an OTA based on the exact
893 bits on the block devices. Postinstall is disabled.
894
895 Args:
896 input_file: The input target-files.zip filename.
897 super_block_devices: The list of super block devices
Yifan Hongb433eba2019-03-06 12:42:53 -0800898 dynamic_partition_list: The list of dynamic partitions
Yifan Hong50e79542018-11-08 17:44:12 -0800899
900 Returns:
901 The filename of target-files.zip with *.img replaced with super_*.img for
902 each block device in super_block_devices.
903 """
904 assert super_block_devices, "No super_block_devices are specified."
905
906 replace = {'OTA/super_{}.img'.format(dev): 'IMAGES/{}.img'.format(dev)
Tao Bao03fecb62018-11-28 10:59:23 -0800907 for dev in super_block_devices}
Yifan Hong50e79542018-11-08 17:44:12 -0800908
909 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
910 shutil.copyfile(input_file, target_file)
911
Kelvin Zhang928c2342020-09-22 16:15:57 -0400912 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
Yifan Hong50e79542018-11-08 17:44:12 -0800913 namelist = input_zip.namelist()
914
Yifan Hongb433eba2019-03-06 12:42:53 -0800915 input_tmp = common.UnzipTemp(input_file, RETROFIT_DAP_UNZIP_PATTERN)
916
917 # Remove partitions from META/ab_partitions.txt that is in
918 # dynamic_partition_list but not in super_block_devices so that
919 # brillo_update_payload won't generate update for those logical partitions.
920 ab_partitions_file = os.path.join(input_tmp, *AB_PARTITIONS.split('/'))
921 with open(ab_partitions_file) as f:
922 ab_partitions_lines = f.readlines()
923 ab_partitions = [line.strip() for line in ab_partitions_lines]
924 # Assert that all super_block_devices are in ab_partitions
925 super_device_not_updated = [partition for partition in super_block_devices
926 if partition not in ab_partitions]
927 assert not super_device_not_updated, \
928 "{} is in super_block_devices but not in {}".format(
929 super_device_not_updated, AB_PARTITIONS)
930 # ab_partitions -= (dynamic_partition_list - super_block_devices)
Kelvin Zhang0876c412020-06-23 15:06:58 -0400931 new_ab_partitions = common.MakeTempFile(
932 prefix="ab_partitions", suffix=".txt")
Yifan Hongb433eba2019-03-06 12:42:53 -0800933 with open(new_ab_partitions, 'w') as f:
934 for partition in ab_partitions:
935 if (partition in dynamic_partition_list and
Kelvin Zhang06400172021-03-05 15:42:03 -0500936 partition not in super_block_devices):
Tao Bao59cf0c52019-06-25 10:04:24 -0700937 logger.info("Dropping %s from ab_partitions.txt", partition)
938 continue
Yifan Hongb433eba2019-03-06 12:42:53 -0800939 f.write(partition + "\n")
940 to_delete = [AB_PARTITIONS]
941
Yifan Hong50e79542018-11-08 17:44:12 -0800942 # Always skip postinstall for a retrofit update.
Yifan Hongb433eba2019-03-06 12:42:53 -0800943 to_delete += [POSTINSTALL_CONFIG]
Yifan Hong50e79542018-11-08 17:44:12 -0800944
945 # Delete dynamic_partitions_info.txt so that brillo_update_payload thinks this
946 # is a regular update on devices without dynamic partitions support.
947 to_delete += [DYNAMIC_PARTITION_INFO]
948
Tao Bao03fecb62018-11-28 10:59:23 -0800949 # Remove the existing partition images as well as the map files.
Tao Bao59cf0c52019-06-25 10:04:24 -0700950 to_delete += list(replace.values())
Tao Bao03fecb62018-11-28 10:59:23 -0800951 to_delete += ['IMAGES/{}.map'.format(dev) for dev in super_block_devices]
Yifan Hong50e79542018-11-08 17:44:12 -0800952
953 common.ZipDelete(target_file, to_delete)
954
Yifan Hong50e79542018-11-08 17:44:12 -0800955 target_zip = zipfile.ZipFile(target_file, 'a', allowZip64=True)
956
957 # Write super_{foo}.img as {foo}.img.
958 for src, dst in replace.items():
959 assert src in namelist, \
Tao Bao59cf0c52019-06-25 10:04:24 -0700960 'Missing {} in {}; {} cannot be written'.format(src, input_file, dst)
Yifan Hong50e79542018-11-08 17:44:12 -0800961 unzipped_file = os.path.join(input_tmp, *src.split('/'))
962 common.ZipWrite(target_zip, unzipped_file, arcname=dst)
963
Yifan Hongb433eba2019-03-06 12:42:53 -0800964 # Write new ab_partitions.txt file
965 common.ZipWrite(target_zip, new_ab_partitions, arcname=AB_PARTITIONS)
966
Yifan Hong50e79542018-11-08 17:44:12 -0800967 common.ZipClose(target_zip)
968
969 return target_file
970
Kelvin Zhanga59bb272020-10-30 12:52:25 -0400971
Hongguang Chen49ab1b902020-10-19 14:15:43 -0700972def GetTargetFilesZipForCustomImagesUpdates(input_file, custom_images):
973 """Returns a target-files.zip for custom partitions update.
974
975 This function modifies ab_partitions list with the desired custom partitions
976 and puts the custom images into the target target-files.zip.
977
978 Args:
979 input_file: The input target-files.zip filename.
980 custom_images: A map of custom partitions and custom images.
981
982 Returns:
983 The filename of a target-files.zip which has renamed the custom images in
984 the IMAGS/ to their partition names.
985 """
986 # Use zip2zip to avoid extracting the zipfile.
987 target_file = common.MakeTempFile(prefix="targetfiles-", suffix=".zip")
988 cmd = ['zip2zip', '-i', input_file, '-o', target_file]
989
990 with zipfile.ZipFile(input_file, allowZip64=True) as input_zip:
991 namelist = input_zip.namelist()
992
993 # Write {custom_image}.img as {custom_partition}.img.
994 for custom_partition, custom_image in custom_images.items():
995 default_custom_image = '{}.img'.format(custom_partition)
996 if default_custom_image != custom_image:
997 logger.info("Update custom partition '%s' with '%s'",
998 custom_partition, custom_image)
999 # Default custom image need to be deleted first.
1000 namelist.remove('IMAGES/{}'.format(default_custom_image))
1001 # IMAGES/{custom_image}.img:IMAGES/{custom_partition}.img.
1002 cmd.extend(['IMAGES/{}:IMAGES/{}'.format(custom_image,
1003 default_custom_image)])
1004
1005 cmd.extend(['{}:{}'.format(name, name) for name in namelist])
1006 common.RunAndCheckOutput(cmd)
1007
1008 return target_file
Yifan Hong50e79542018-11-08 17:44:12 -08001009
Kelvin Zhang06400172021-03-05 15:42:03 -05001010
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001011def GeneratePartitionTimestampFlags(partition_state):
1012 partition_timestamps = [
1013 part.partition_name + ":" + part.version
1014 for part in partition_state]
1015 return ["--partition_timestamps", ",".join(partition_timestamps)]
1016
Kelvin Zhang06400172021-03-05 15:42:03 -05001017
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001018def GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang06400172021-03-05 15:42:03 -05001019 pre_partition_state, post_partition_state):
Kelvin Zhang80195722020-11-04 14:38:34 -05001020 assert pre_partition_state is not None
1021 partition_timestamps = {}
1022 for part in pre_partition_state:
1023 partition_timestamps[part.partition_name] = part.version
1024 for part in post_partition_state:
1025 partition_timestamps[part.partition_name] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001026 max(part.version, partition_timestamps[part.partition_name])
Kelvin Zhang80195722020-11-04 14:38:34 -05001027 return [
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001028 "--partition_timestamps",
Kelvin Zhang06400172021-03-05 15:42:03 -05001029 ",".join([key + ":" + val for (key, val)
1030 in partition_timestamps.items()])
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001031 ]
Kelvin Zhang80195722020-11-04 14:38:34 -05001032
Kelvin Zhang06400172021-03-05 15:42:03 -05001033
Kelvin Zhang65029a22020-11-03 10:07:51 -05001034def SupportsMainlineGkiUpdates(target_file):
1035 """Return True if the build supports MainlineGKIUpdates.
1036
1037 This function scans the product.img file in IMAGES/ directory for
1038 pattern |*/apex/com.android.gki.*.apex|. If there are files
1039 matching this pattern, conclude that build supports mainline
1040 GKI and return True
1041
1042 Args:
1043 target_file: Path to a target_file.zip, or an extracted directory
1044 Return:
1045 True if thisb uild supports Mainline GKI Updates.
1046 """
1047 if target_file is None:
1048 return False
1049 if os.path.isfile(target_file):
1050 target_file = common.UnzipTemp(target_file, ["IMAGES/product.img"])
1051 if not os.path.isdir(target_file):
1052 assert os.path.isdir(target_file), \
1053 "{} must be a path to zip archive or dir containing extracted"\
1054 " target_files".format(target_file)
1055 image_file = os.path.join(target_file, "IMAGES", "product.img")
1056
1057 if not os.path.isfile(image_file):
1058 return False
1059
1060 if IsSparseImage(image_file):
1061 # Unsparse the image
1062 tmp_img = common.MakeTempFile(suffix=".img")
1063 subprocess.check_output(["simg2img", image_file, tmp_img])
1064 image_file = tmp_img
1065
1066 cmd = ["debugfs_static", "-R", "ls -p /apex", image_file]
1067 output = subprocess.check_output(cmd).decode()
1068
1069 pattern = re.compile(r"com\.android\.gki\..*\.apex")
1070 return pattern.search(output) is not None
1071
Kelvin Zhang06400172021-03-05 15:42:03 -05001072
Tao Baof0c4aa22018-04-30 20:29:30 -07001073def GenerateAbOtaPackage(target_file, output_file, source_file=None):
Tao Baofe5b69a2018-03-02 09:47:43 -08001074 """Generates an Android OTA package that has A/B update payload."""
Tao Baodea0f8b2016-06-20 17:55:06 -07001075 # Stage the output zip package for package signing.
Tao Bao491d7e22018-02-21 13:17:22 -08001076 if not OPTIONS.no_signing:
1077 staging_file = common.MakeTempFile(suffix='.zip')
1078 else:
1079 staging_file = output_file
Tao Baoa652c002018-03-01 19:31:38 -08001080 output_zip = zipfile.ZipFile(staging_file, "w",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001081 compression=zipfile.ZIP_DEFLATED,
1082 allowZip64=True)
Tao Baoc098e9e2016-01-07 13:03:56 -08001083
Tao Bao481bab82017-12-21 11:23:09 -08001084 if source_file is not None:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001085 assert "ab_partitions" in OPTIONS.source_info_dict, \
1086 "META/ab_partitions.txt is required for ab_update."
1087 assert "ab_partitions" in OPTIONS.target_info_dict, \
1088 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001089 target_info = common.BuildInfo(OPTIONS.target_info_dict, OPTIONS.oem_dicts)
1090 source_info = common.BuildInfo(OPTIONS.source_info_dict, OPTIONS.oem_dicts)
Kelvin Zhang563750f2021-04-28 12:46:17 -04001091 # If source supports VABC, delta_generator/update_engine will attempt to
1092 # use VABC. This dangerous, as the target build won't have snapuserd to
1093 # serve I/O request when device boots. Therefore, disable VABC if source
1094 # build doesn't supports it.
1095 if not source_info.is_vabc or not target_info.is_vabc:
Kelvin Zhang10eac082021-06-10 14:32:19 -04001096 logger.info("Either source or target does not support VABC, disabling.")
Kelvin Zhang563750f2021-04-28 12:46:17 -04001097 OPTIONS.disable_vabc = True
Kelvin Zhang563750f2021-04-28 12:46:17 -04001098
Tao Bao481bab82017-12-21 11:23:09 -08001099 else:
Kelvin Zhang39aea442020-08-17 11:04:25 -04001100 assert "ab_partitions" in OPTIONS.info_dict, \
1101 "META/ab_partitions.txt is required for ab_update."
Tao Bao1c320f82019-10-04 23:25:12 -07001102 target_info = common.BuildInfo(OPTIONS.info_dict, OPTIONS.oem_dicts)
Tao Bao481bab82017-12-21 11:23:09 -08001103 source_info = None
Tao Baoc098e9e2016-01-07 13:03:56 -08001104
Kelvin Zhang10eac082021-06-10 14:32:19 -04001105 if target_info.vendor_suppressed_vabc:
1106 logger.info("Vendor suppressed VABC. Disabling")
1107 OPTIONS.disable_vabc = True
Kelvin Zhangad427382021-08-12 16:19:09 -07001108 if not target_info.is_vabc_xor or OPTIONS.disable_vabc:
1109 logger.info("VABC XOR Not supported, disabling")
1110 OPTIONS.enable_vabc_xor = False
Yifan Hong38ab4d82020-06-18 15:19:56 -07001111 additional_args = []
1112
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001113 # Prepare custom images.
1114 if OPTIONS.custom_images:
1115 target_file = GetTargetFilesZipForCustomImagesUpdates(
1116 target_file, OPTIONS.custom_images)
1117
Yifan Hong50e79542018-11-08 17:44:12 -08001118 if OPTIONS.retrofit_dynamic_partitions:
1119 target_file = GetTargetFilesZipForRetrofitDynamicPartitions(
Yifan Hongb433eba2019-03-06 12:42:53 -08001120 target_file, target_info.get("super_block_devices").strip().split(),
1121 target_info.get("dynamic_partition_list").strip().split())
Yifan Hong38ab4d82020-06-18 15:19:56 -07001122 elif OPTIONS.partial:
1123 target_file = GetTargetFilesZipForPartialUpdates(target_file,
1124 OPTIONS.partial)
1125 additional_args += ["--is_partial_update", "true"]
Yifan Hong50e79542018-11-08 17:44:12 -08001126 elif OPTIONS.skip_postinstall:
Tao Bao15a146a2018-02-21 16:06:59 -08001127 target_file = GetTargetFilesZipWithoutPostinstallConfig(target_file)
Kelvin Zhang39aea442020-08-17 11:04:25 -04001128 # Target_file may have been modified, reparse ab_partitions
1129 with zipfile.ZipFile(target_file, allowZip64=True) as zfp:
1130 target_info.info_dict['ab_partitions'] = zfp.read(
Kelvin Zhang31233e52020-11-03 13:42:46 -05001131 AB_PARTITIONS).decode().strip().split("\n")
Tao Bao15a146a2018-02-21 16:06:59 -08001132
Kelvin Zhang414ca422021-08-27 15:12:08 -07001133 CheckVintfIfTrebleEnabled(target_file, target_info)
1134
Kelvin Zhang39aea442020-08-17 11:04:25 -04001135 # Metadata to comply with Android OTA package format.
1136 metadata = GetPackageMetadata(target_info, source_info)
Tao Bao40b18822018-01-30 18:19:04 -08001137 # Generate payload.
1138 payload = Payload()
1139
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001140 partition_timestamps_flags = []
Tao Bao40b18822018-01-30 18:19:04 -08001141 # Enforce a max timestamp this payload can be applied on top of.
Tao Baoff1b86e2017-10-03 14:17:57 -07001142 if OPTIONS.downgrade:
Tao Bao2a12ed72018-01-22 11:35:00 -08001143 max_timestamp = source_info.GetBuildProp("ro.build.date.utc")
Kelvin Zhang80195722020-11-04 14:38:34 -05001144 partition_timestamps_flags = GeneratePartitionTimestampFlagsDowngrade(
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001145 metadata.precondition.partition_state,
1146 metadata.postcondition.partition_state
1147 )
Tao Baoff1b86e2017-10-03 14:17:57 -07001148 else:
Tianjiea2076132020-08-19 17:25:32 -07001149 max_timestamp = str(metadata.postcondition.timestamp)
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001150 partition_timestamps_flags = GeneratePartitionTimestampFlags(
1151 metadata.postcondition.partition_state)
Tao Baoc098e9e2016-01-07 13:03:56 -08001152
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001153 if not ota_utils.IsZucchiniCompatible(source_file, target_file):
1154 OPTIONS.enable_zucchini = False
1155
1156 additional_args += ["--enable_zucchini",
1157 str(OPTIONS.enable_zucchini).lower()]
1158
1159 if not ota_utils.IsLz4diffCompatible(source_file, target_file):
1160 OPTIONS.enable_lz4diff = False
1161
1162 additional_args += ["--enable_lz4diff",
1163 str(OPTIONS.enable_lz4diff).lower()]
1164
1165 if source_file and OPTIONS.enable_lz4diff:
1166 input_tmp = common.UnzipTemp(source_file, ["META/liblz4.so"])
1167 liblz4_path = os.path.join(input_tmp, "META", "liblz4.so")
1168 assert os.path.exists(
1169 liblz4_path), "liblz4.so not found in META/ dir of target file {}".format(liblz4_path)
1170 logger.info("Enabling lz4diff %s", liblz4_path)
1171 additional_args += ["--liblz4_path", liblz4_path]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001172
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001173 if OPTIONS.disable_vabc:
1174 additional_args += ["--disable_vabc", "true"]
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001175 if OPTIONS.enable_vabc_xor:
1176 additional_args += ["--enable_vabc_xor", "true"]
Tianjiee7ab38d2021-09-08 19:09:38 -07001177 if OPTIONS.force_minor_version:
1178 additional_args += ["--force_minor_version", OPTIONS.force_minor_version]
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001179 if OPTIONS.compressor_types:
1180 additional_args += ["--compressor_types", OPTIONS.compressor_types]
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001181 additional_args += ["--max_timestamp", max_timestamp]
1182
Kelvin Zhang65029a22020-11-03 10:07:51 -05001183 if SupportsMainlineGkiUpdates(source_file):
Kelvin Zhang06400172021-03-05 15:42:03 -05001184 logger.warning(
1185 "Detected build with mainline GKI, include full boot image.")
Kelvin Zhang65029a22020-11-03 10:07:51 -05001186 additional_args.extend(["--full_boot", "true"])
1187
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001188 payload.Generate(
1189 target_file,
1190 source_file,
1191 additional_args + partition_timestamps_flags
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001192 )
Tao Baoc098e9e2016-01-07 13:03:56 -08001193
Tao Bao40b18822018-01-30 18:19:04 -08001194 # Sign the payload.
Tao Baof7140c02018-01-30 17:09:24 -08001195 payload_signer = PayloadSigner()
1196 payload.Sign(payload_signer)
Tao Baoc098e9e2016-01-07 13:03:56 -08001197
Tao Bao40b18822018-01-30 18:19:04 -08001198 # Write the payload into output zip.
1199 payload.WriteToZip(output_zip)
Tao Baoc098e9e2016-01-07 13:03:56 -08001200
Tao Baof7140c02018-01-30 17:09:24 -08001201 # Generate and include the secondary payload that installs secondary images
1202 # (e.g. system_other.img).
1203 if OPTIONS.include_secondary:
1204 # We always include a full payload for the secondary slot, even when
1205 # building an incremental OTA. See the comments for "--include_secondary".
Tao Bao15a146a2018-02-21 16:06:59 -08001206 secondary_target_file = GetTargetFilesZipForSecondaryImages(
1207 target_file, OPTIONS.skip_postinstall)
Tao Bao667ff572018-02-10 00:02:40 -08001208 secondary_payload = Payload(secondary=True)
Tao Baodb1fe412018-02-09 23:15:05 -08001209 secondary_payload.Generate(secondary_target_file,
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001210 additional_args=["--max_timestamp",
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001211 max_timestamp])
Tao Baof7140c02018-01-30 17:09:24 -08001212 secondary_payload.Sign(payload_signer)
Tao Bao667ff572018-02-10 00:02:40 -08001213 secondary_payload.WriteToZip(output_zip)
Tao Baof7140c02018-01-30 17:09:24 -08001214
Tianjie Xucfa86222016-03-07 16:31:19 -08001215 # If dm-verity is supported for the device, copy contents of care_map
1216 # into A/B OTA package.
Kelvin Zhang928c2342020-09-22 16:15:57 -04001217 target_zip = zipfile.ZipFile(target_file, "r", allowZip64=True)
Tao Bao481bab82017-12-21 11:23:09 -08001218 if (target_info.get("verity") == "true" or
Kelvin Zhang06400172021-03-05 15:42:03 -05001219 target_info.get("avb_enable") == "true"):
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001220 care_map_list = [x for x in ["care_map.pb", "care_map.txt"] if
1221 "META/" + x in target_zip.namelist()]
1222
1223 # Adds care_map if either the protobuf format or the plain text one exists.
1224 if care_map_list:
1225 care_map_name = care_map_list[0]
1226 care_map_data = target_zip.read("META/" + care_map_name)
1227 # In order to support streaming, care_map needs to be packed as
Tao Bao40b18822018-01-30 18:19:04 -08001228 # ZIP_STORED.
Tianjie Xu4c05f4a2018-09-14 16:24:41 -07001229 common.ZipWriteStr(output_zip, care_map_name, care_map_data,
Tao Bao481bab82017-12-21 11:23:09 -08001230 compress_type=zipfile.ZIP_STORED)
Tianjie Xucfa86222016-03-07 16:31:19 -08001231 else:
Tao Bao32fcdab2018-10-12 10:30:39 -07001232 logger.warning("Cannot find care map file in target_file package")
Tao Bao21803d32017-04-19 10:16:09 -07001233
Tianjiea5fca032021-06-01 22:06:28 -07001234 # Add the source apex version for incremental ota updates, and write the
1235 # result apex info to the ota package.
1236 ota_apex_info = ota_utils.ConstructOtaApexInfo(target_zip, source_file)
1237 if ota_apex_info is not None:
1238 common.ZipWriteStr(output_zip, "apex_info.pb", ota_apex_info,
1239 compress_type=zipfile.ZIP_STORED)
Kelvin Zhang7bd09912021-01-21 10:33:13 -05001240
Tao Bao21803d32017-04-19 10:16:09 -07001241 common.ZipClose(target_zip)
Tianjie Xucfa86222016-03-07 16:31:19 -08001242
Tao Baofe5b69a2018-03-02 09:47:43 -08001243 # We haven't written the metadata entry yet, which will be handled in
1244 # FinalizeMetadata().
Tao Baoc96316c2017-01-24 22:10:49 -08001245 common.ZipClose(output_zip)
1246
Tao Bao85f16982018-03-08 16:28:33 -08001247 # AbOtaPropertyFiles intends to replace StreamingPropertyFiles, as it covers
1248 # all the info of the latter. However, system updaters and OTA servers need to
1249 # take time to switch to the new flag. We keep both of the flags for
1250 # P-timeframe, and will remove StreamingPropertyFiles in later release.
Tao Baod3fc38a2018-03-08 16:09:01 -08001251 needed_property_files = (
Tao Bao85f16982018-03-08 16:28:33 -08001252 AbOtaPropertyFiles(),
Tao Baod3fc38a2018-03-08 16:09:01 -08001253 StreamingPropertyFiles(),
1254 )
1255 FinalizeMetadata(metadata, staging_file, output_file, needed_property_files)
Tao Baoc96316c2017-01-24 22:10:49 -08001256
Tao Baoc098e9e2016-01-07 13:03:56 -08001257
Doug Zongkereef39442009-04-02 12:14:19 -07001258def main(argv):
1259
1260 def option_handler(o, a):
Tao Bao4b76a0e2017-10-31 12:13:33 -07001261 if o in ("-k", "--package_key"):
Doug Zongkereef39442009-04-02 12:14:19 -07001262 OPTIONS.package_key = a
Doug Zongkereef39442009-04-02 12:14:19 -07001263 elif o in ("-i", "--incremental_from"):
1264 OPTIONS.incremental_source = a
Tao Bao43078aa2015-04-21 14:32:35 -07001265 elif o == "--full_radio":
1266 OPTIONS.full_radio = True
leozwangaa6c1a12015-08-14 10:57:58 -07001267 elif o == "--full_bootloader":
1268 OPTIONS.full_bootloader = True
Tao Bao337633f2017-12-06 15:20:19 -08001269 elif o == "--wipe_user_data":
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001270 OPTIONS.wipe_user_data = True
Tao Bao5d182562016-02-23 11:38:39 -08001271 elif o == "--downgrade":
1272 OPTIONS.downgrade = True
1273 OPTIONS.wipe_user_data = True
Tao Bao3e6161a2017-02-28 11:48:48 -08001274 elif o == "--override_timestamp":
Tao Baofaa8e0b2018-04-12 14:31:43 -07001275 OPTIONS.downgrade = True
Michael Runge6e836112014-04-15 17:40:21 -07001276 elif o in ("-o", "--oem_settings"):
Alain Vongsouvanh7f804ba2017-02-16 13:06:55 -08001277 OPTIONS.oem_source = a.split(',')
Tao Bao8608cde2016-02-25 19:49:55 -08001278 elif o == "--oem_no_mount":
1279 OPTIONS.oem_no_mount = True
Doug Zongker1c390a22009-05-14 19:06:36 -07001280 elif o in ("-e", "--extra_script"):
1281 OPTIONS.extra_script = a
Martin Blumenstingl374e1142014-05-31 20:42:55 +02001282 elif o in ("-t", "--worker_threads"):
1283 if a.isdigit():
1284 OPTIONS.worker_threads = int(a)
1285 else:
1286 raise ValueError("Cannot parse value %r for option %r - only "
1287 "integers are allowed." % (a, o))
Doug Zongker9b23f2c2013-11-25 14:44:12 -08001288 elif o in ("-2", "--two_step"):
1289 OPTIONS.two_step = True
Tao Baof7140c02018-01-30 17:09:24 -08001290 elif o == "--include_secondary":
1291 OPTIONS.include_secondary = True
Doug Zongker26e66192014-02-20 13:22:07 -08001292 elif o == "--no_signing":
Takeshi Kanemotoe153b342013-11-14 17:20:50 +09001293 OPTIONS.no_signing = True
Dan Albert8b72aef2015-03-23 19:13:21 -07001294 elif o == "--verify":
Michael Runge63f01de2014-10-28 19:24:19 -07001295 OPTIONS.verify = True
Doug Zongker26e66192014-02-20 13:22:07 -08001296 elif o == "--block":
1297 OPTIONS.block_based = True
Doug Zongker25568482014-03-03 10:21:27 -08001298 elif o in ("-b", "--binary"):
1299 OPTIONS.updater_binary = a
Tao Bao8dcf7382015-05-21 14:09:49 -07001300 elif o == "--stash_threshold":
1301 try:
1302 OPTIONS.stash_threshold = float(a)
1303 except ValueError:
1304 raise ValueError("Cannot parse value %r for option %r - expecting "
1305 "a float" % (a, o))
Tao Baod62c6032015-11-30 09:40:20 -08001306 elif o == "--log_diff":
1307 OPTIONS.log_diff = a
Tao Baodea0f8b2016-06-20 17:55:06 -07001308 elif o == "--payload_signer":
1309 OPTIONS.payload_signer = a
Baligh Uddin2abbbd02016-06-22 12:14:16 -07001310 elif o == "--payload_signer_args":
1311 OPTIONS.payload_signer_args = shlex.split(a)
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001312 elif o == "--payload_signer_maximum_signature_size":
1313 OPTIONS.payload_signer_maximum_signature_size = a
xunchang376cc7c2019-04-08 23:04:58 -07001314 elif o == "--payload_signer_key_size":
Tianjie Xu21e6deb2019-10-07 18:01:00 -07001315 # TODO(Xunchang) remove this option after cleaning up the callers.
1316 logger.warning("The option '--payload_signer_key_size' is deprecated."
1317 " Use '--payload_signer_maximum_signature_size' instead.")
1318 OPTIONS.payload_signer_maximum_signature_size = a
Dan Willemsencea5cd22017-03-21 14:44:27 -07001319 elif o == "--extracted_input_target_files":
1320 OPTIONS.extracted_input = a
Tao Bao15a146a2018-02-21 16:06:59 -08001321 elif o == "--skip_postinstall":
1322 OPTIONS.skip_postinstall = True
Yifan Hong50e79542018-11-08 17:44:12 -08001323 elif o == "--retrofit_dynamic_partitions":
1324 OPTIONS.retrofit_dynamic_partitions = True
xunchangabfa2652019-02-19 16:27:10 -08001325 elif o == "--skip_compatibility_check":
1326 OPTIONS.skip_compatibility_check = True
xunchang1cfe2512019-02-19 14:14:48 -08001327 elif o == "--output_metadata_path":
1328 OPTIONS.output_metadata_path = a
Tianjie Xu1b079832019-08-28 12:19:23 -07001329 elif o == "--disable_fec_computation":
1330 OPTIONS.disable_fec_computation = True
Kelvin Zhangcaf7bbc2020-11-20 14:09:42 -05001331 elif o == "--disable_verity_computation":
1332 OPTIONS.disable_verity_computation = True
Yifan Hong65afc072020-04-17 10:08:10 -07001333 elif o == "--force_non_ab":
1334 OPTIONS.force_non_ab = True
Tianjied6867162020-05-10 14:30:13 -07001335 elif o == "--boot_variable_file":
1336 OPTIONS.boot_variable_file = a
Yifan Hong38ab4d82020-06-18 15:19:56 -07001337 elif o == "--partial":
1338 partitions = a.split()
1339 if not partitions:
1340 raise ValueError("Cannot parse partitions in {}".format(a))
1341 OPTIONS.partial = partitions
Hongguang Chen49ab1b902020-10-19 14:15:43 -07001342 elif o == "--custom_image":
1343 custom_partition, custom_image = a.split("=")
1344 OPTIONS.custom_images[custom_partition] = custom_image
Kelvin Zhangbbfa1822021-02-03 17:19:44 -05001345 elif o == "--disable_vabc":
1346 OPTIONS.disable_vabc = True
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001347 elif o == "--spl_downgrade":
1348 OPTIONS.spl_downgrade = True
Kelvin Zhang06400172021-03-05 15:42:03 -05001349 OPTIONS.wipe_user_data = True
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001350 elif o == "--vabc_downgrade":
1351 OPTIONS.vabc_downgrade = True
Kelvin Zhangf66caee2021-07-12 09:44:20 -04001352 elif o == "--enable_vabc_xor":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001353 assert a.lower() in ["true", "false"]
Kelvin Zhang1250bca2021-08-27 15:10:27 -07001354 OPTIONS.enable_vabc_xor = a.lower() != "false"
Tianjiee7ab38d2021-09-08 19:09:38 -07001355 elif o == "--force_minor_version":
1356 OPTIONS.force_minor_version = a
Kelvin Zhang9b6d4ec2021-10-28 09:34:31 -07001357 elif o == "--compressor_types":
1358 OPTIONS.compressor_types = a
Kelvin Zhang410bb382022-01-06 09:15:54 -08001359 elif o == "--enable_zucchini":
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001360 assert a.lower() in ["true", "false"]
Kelvin Zhang410bb382022-01-06 09:15:54 -08001361 OPTIONS.enable_zucchini = a.lower() != "false"
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001362 elif o == "--enable_lz4diff":
1363 assert a.lower() in ["true", "false"]
1364 OPTIONS.enable_lz4diff = a.lower() != "false"
Doug Zongkereef39442009-04-02 12:14:19 -07001365 else:
1366 return False
Doug Zongkerdbfaae52009-04-21 17:12:54 -07001367 return True
Doug Zongkereef39442009-04-02 12:14:19 -07001368
1369 args = common.ParseOptions(argv, __doc__,
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001370 extra_opts="b:k:i:d:e:t:2o:",
1371 extra_long_opts=[
1372 "package_key=",
1373 "incremental_from=",
1374 "full_radio",
1375 "full_bootloader",
1376 "wipe_user_data",
1377 "downgrade",
1378 "override_timestamp",
1379 "extra_script=",
1380 "worker_threads=",
1381 "two_step",
1382 "include_secondary",
1383 "no_signing",
1384 "block",
1385 "binary=",
1386 "oem_settings=",
1387 "oem_no_mount",
1388 "verify",
1389 "stash_threshold=",
1390 "log_diff=",
1391 "payload_signer=",
1392 "payload_signer_args=",
1393 "payload_signer_maximum_signature_size=",
1394 "payload_signer_key_size=",
1395 "extracted_input_target_files=",
1396 "skip_postinstall",
1397 "retrofit_dynamic_partitions",
1398 "skip_compatibility_check",
1399 "output_metadata_path=",
1400 "disable_fec_computation",
1401 "disable_verity_computation",
1402 "force_non_ab",
1403 "boot_variable_file=",
1404 "partial=",
1405 "custom_image=",
1406 "disable_vabc",
1407 "spl_downgrade",
1408 "vabc_downgrade",
1409 "enable_vabc_xor=",
1410 "force_minor_version=",
1411 "compressor_types=",
Kelvin Zhang410bb382022-01-06 09:15:54 -08001412 "enable_zucchin=",
Kelvin Zhangf2728d62022-01-10 11:42:36 -08001413 "enable_lz4diff=",
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001414 ], extra_option_handler=option_handler)
Doug Zongkereef39442009-04-02 12:14:19 -07001415
1416 if len(args) != 2:
1417 common.Usage(__doc__)
1418 sys.exit(1)
1419
Tao Bao32fcdab2018-10-12 10:30:39 -07001420 common.InitLogging()
1421
Tao Bao2db13852018-01-08 22:28:57 -08001422 # Load the build info dicts from the zip directly or the extracted input
1423 # directory. We don't need to unzip the entire target-files zips, because they
1424 # won't be needed for A/B OTAs (brillo_update_payload does that on its own).
1425 # When loading the info dicts, we don't need to provide the second parameter
1426 # to common.LoadInfoDict(). Specifying the second parameter allows replacing
1427 # some properties with their actual paths, such as 'selinux_fc',
1428 # 'ramdisk_dir', which won't be used during OTA generation.
Dan Willemsencea5cd22017-03-21 14:44:27 -07001429 if OPTIONS.extracted_input is not None:
Tao Bao2db13852018-01-08 22:28:57 -08001430 OPTIONS.info_dict = common.LoadInfoDict(OPTIONS.extracted_input)
Dan Willemsencea5cd22017-03-21 14:44:27 -07001431 else:
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001432 OPTIONS.info_dict = ParseInfoDict(args[0])
Kelvin Zhang80195722020-11-04 14:38:34 -05001433
Kelvin Zhang2a3e5b12021-05-04 18:20:34 -04001434 if OPTIONS.wipe_user_data:
1435 if not OPTIONS.vabc_downgrade:
1436 logger.info("Detected downgrade/datawipe OTA."
1437 "When wiping userdata, VABC OTA makes the user "
1438 "wait in recovery mode for merge to finish. Disable VABC by "
1439 "default. If you really want to do VABC downgrade, pass "
1440 "--vabc_downgrade")
1441 OPTIONS.disable_vabc = True
Kelvin Zhang80195722020-11-04 14:38:34 -05001442 # We should only allow downgrading incrementals (as opposed to full).
1443 # Otherwise the device may go back from arbitrary build with this full
1444 # OTA package.
Kelvin Zhang81641af2021-10-26 16:03:25 -07001445 if OPTIONS.incremental_source is None and OPTIONS.downgrade:
1446 raise ValueError("Cannot generate downgradable full OTAs")
Kelvin Zhang80195722020-11-04 14:38:34 -05001447
Yifan Hong38ab4d82020-06-18 15:19:56 -07001448 # TODO(xunchang) for retrofit and partial updates, maybe we should rebuild the
1449 # target-file and reload the info_dict. So the info will be consistent with
1450 # the modified target-file.
1451
Tao Bao32fcdab2018-10-12 10:30:39 -07001452 logger.info("--- target info ---")
1453 common.DumpInfoDict(OPTIONS.info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001454
1455 # Load the source build dict if applicable.
1456 if OPTIONS.incremental_source is not None:
1457 OPTIONS.target_info_dict = OPTIONS.info_dict
Kelvin Zhanga59bb272020-10-30 12:52:25 -04001458 OPTIONS.source_info_dict = ParseInfoDict(OPTIONS.incremental_source)
Tao Bao2db13852018-01-08 22:28:57 -08001459
Tao Bao32fcdab2018-10-12 10:30:39 -07001460 logger.info("--- source info ---")
1461 common.DumpInfoDict(OPTIONS.source_info_dict)
Tao Bao2db13852018-01-08 22:28:57 -08001462
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001463 if OPTIONS.partial:
1464 OPTIONS.info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001465 list(
1466 set(OPTIONS.info_dict['ab_partitions']) & set(OPTIONS.partial)
1467 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001468 if OPTIONS.source_info_dict:
1469 OPTIONS.source_info_dict['ab_partitions'] = \
Kelvin Zhang06400172021-03-05 15:42:03 -05001470 list(
1471 set(OPTIONS.source_info_dict['ab_partitions']) &
1472 set(OPTIONS.partial)
1473 )
Kelvin Zhang83ea7832020-11-11 13:07:10 -05001474
Tao Bao2db13852018-01-08 22:28:57 -08001475 # Load OEM dicts if provided.
Tao Bao481bab82017-12-21 11:23:09 -08001476 OPTIONS.oem_dicts = _LoadOemDicts(OPTIONS.oem_source)
1477
Yifan Hong50e79542018-11-08 17:44:12 -08001478 # Assume retrofitting dynamic partitions when base build does not set
Yifan Hong50611032018-11-20 14:27:38 -08001479 # use_dynamic_partitions but target build does.
Yifan Hong50e79542018-11-08 17:44:12 -08001480 if (OPTIONS.source_info_dict and
Yifan Hong50611032018-11-20 14:27:38 -08001481 OPTIONS.source_info_dict.get("use_dynamic_partitions") != "true" and
Kelvin Zhang06400172021-03-05 15:42:03 -05001482 OPTIONS.target_info_dict.get("use_dynamic_partitions") == "true"):
Yifan Hong50e79542018-11-08 17:44:12 -08001483 if OPTIONS.target_info_dict.get("dynamic_partition_retrofit") != "true":
1484 raise common.ExternalError(
1485 "Expect to generate incremental OTA for retrofitting dynamic "
1486 "partitions, but dynamic_partition_retrofit is not set in target "
1487 "build.")
1488 logger.info("Implicitly generating retrofit incremental OTA.")
1489 OPTIONS.retrofit_dynamic_partitions = True
1490
1491 # Skip postinstall for retrofitting dynamic partitions.
1492 if OPTIONS.retrofit_dynamic_partitions:
1493 OPTIONS.skip_postinstall = True
1494
Tao Baoc098e9e2016-01-07 13:03:56 -08001495 ab_update = OPTIONS.info_dict.get("ab_update") == "true"
Yifan Hong65afc072020-04-17 10:08:10 -07001496 allow_non_ab = OPTIONS.info_dict.get("allow_non_ab") == "true"
1497 if OPTIONS.force_non_ab:
Kelvin Zhang22c687c2021-01-21 10:51:57 -05001498 assert allow_non_ab,\
Kelvin Zhang06400172021-03-05 15:42:03 -05001499 "--force_non_ab only allowed on devices that supports non-A/B"
Yifan Hong65afc072020-04-17 10:08:10 -07001500 assert ab_update, "--force_non_ab only allowed on A/B devices"
1501
1502 generate_ab = not OPTIONS.force_non_ab and ab_update
Tao Baoc098e9e2016-01-07 13:03:56 -08001503
Christian Oderf63e2cd2017-05-01 22:30:15 +02001504 # Use the default key to sign the package if not specified with package_key.
1505 # package_keys are needed on ab_updates, so always define them if an
Yifan Hong65afc072020-04-17 10:08:10 -07001506 # A/B update is getting created.
1507 if not OPTIONS.no_signing or generate_ab:
Christian Oderf63e2cd2017-05-01 22:30:15 +02001508 if OPTIONS.package_key is None:
1509 OPTIONS.package_key = OPTIONS.info_dict.get(
1510 "default_system_dev_certificate",
Dan Willemsen0ab1be62019-04-09 21:35:37 -07001511 "build/make/target/product/security/testkey")
Christian Oderf63e2cd2017-05-01 22:30:15 +02001512 # Get signing keys
1513 OPTIONS.key_passwords = common.GetKeyPasswords([OPTIONS.package_key])
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001514
1515 # Only check for existence of key file if using the default signer.
1516 # Because the custom signer might not need the key file AT all.
1517 # b/191704641
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001518 if not OPTIONS.payload_signer:
Kelvin Zhang4b588cf2021-11-09 08:42:11 -08001519 private_key_path = OPTIONS.package_key + OPTIONS.private_key_suffix
1520 if not os.path.exists(private_key_path):
1521 raise common.ExternalError(
1522 "Private key {} doesn't exist. Make sure you passed the"
1523 " correct key path through -k option".format(
1524 private_key_path)
1525 )
Kelvin Zhang4fc3aa02021-11-16 18:58:58 -08001526 signapk_abs_path = os.path.join(
1527 OPTIONS.search_path, OPTIONS.signapk_path)
1528 if not os.path.exists(signapk_abs_path):
1529 raise common.ExternalError(
1530 "Failed to find sign apk binary {} in search path {}. Make sure the correct search path is passed via -p".format(OPTIONS.signapk_path, OPTIONS.search_path))
Christian Oderf63e2cd2017-05-01 22:30:15 +02001531
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001532 if OPTIONS.source_info_dict:
1533 source_build_prop = OPTIONS.source_info_dict["build.prop"]
1534 target_build_prop = OPTIONS.target_info_dict["build.prop"]
1535 source_spl = source_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
1536 target_spl = target_build_prop.GetProp(SECURITY_PATCH_LEVEL_PROP_NAME)
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001537 is_spl_downgrade = target_spl < source_spl
Kelvin Zhang06400172021-03-05 15:42:03 -05001538 if is_spl_downgrade and not OPTIONS.spl_downgrade and not OPTIONS.downgrade:
Kelvin Zhang80ff4662021-02-08 19:57:57 -05001539 raise common.ExternalError(
Kelvin Zhang06400172021-03-05 15:42:03 -05001540 "Target security patch level {} is older than source SPL {} applying "
1541 "such OTA will likely cause device fail to boot. Pass --spl_downgrade "
1542 "to override this check. This script expects security patch level to "
1543 "be in format yyyy-mm-dd (e.x. 2021-02-05). It's possible to use "
1544 "separators other than -, so as long as it's used consistenly across "
1545 "all SPL dates".format(target_spl, source_spl))
Kelvin Zhang05ff7052021-02-10 09:13:26 -05001546 elif not is_spl_downgrade and OPTIONS.spl_downgrade:
1547 raise ValueError("--spl_downgrade specified but no actual SPL downgrade"
1548 " detected. Please only pass in this flag if you want a"
1549 " SPL downgrade. Target SPL: {} Source SPL: {}"
1550 .format(target_spl, source_spl))
Yifan Hong65afc072020-04-17 10:08:10 -07001551 if generate_ab:
Tao Baof0c4aa22018-04-30 20:29:30 -07001552 GenerateAbOtaPackage(
Tao Baoc098e9e2016-01-07 13:03:56 -08001553 target_file=args[0],
1554 output_file=args[1],
1555 source_file=OPTIONS.incremental_source)
1556
Dan Willemsencea5cd22017-03-21 14:44:27 -07001557 else:
Tao Baof0c4aa22018-04-30 20:29:30 -07001558 GenerateNonAbOtaPackage(
1559 target_file=args[0],
1560 output_file=args[1],
1561 source_file=OPTIONS.incremental_source)
Doug Zongkerfdd8e692009-08-03 17:27:48 -07001562
Tao Baof0c4aa22018-04-30 20:29:30 -07001563 # Post OTA generation works.
1564 if OPTIONS.incremental_source is not None and OPTIONS.log_diff:
1565 logger.info("Generating diff logs...")
1566 logger.info("Unzipping target-files for diffing...")
1567 target_dir = common.UnzipTemp(args[0], TARGET_DIFFING_UNZIP_PATTERN)
1568 source_dir = common.UnzipTemp(
1569 OPTIONS.incremental_source, TARGET_DIFFING_UNZIP_PATTERN)
Doug Zongkereb0a78a2014-01-27 10:01:06 -08001570
Tao Baof0c4aa22018-04-30 20:29:30 -07001571 with open(OPTIONS.log_diff, 'w') as out_file:
Tao Baof0c4aa22018-04-30 20:29:30 -07001572 target_files_diff.recursiveDiff(
1573 '', source_dir, target_dir, out_file)
Doug Zongker62d4f182014-08-04 16:06:43 -07001574
Tao Bao32fcdab2018-10-12 10:30:39 -07001575 logger.info("done.")
Doug Zongkereef39442009-04-02 12:14:19 -07001576
1577
1578if __name__ == '__main__':
1579 try:
Ying Wang7e6d4e42010-12-13 16:25:36 -08001580 common.CloseInheritedPipes()
Doug Zongkereef39442009-04-02 12:14:19 -07001581 main(sys.argv[1:])
Doug Zongkerfc44a512014-08-26 13:10:25 -07001582 finally:
1583 common.Cleanup()