| #!/usr/bin/env python3 |
| # |
| # Copyright (C) 2017 The Android Open Source Project |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # |
| |
| """Send an A/B update to an Android device over adb.""" |
| |
| from __future__ import print_function |
| from __future__ import absolute_import |
| |
| import argparse |
| import binascii |
| import hashlib |
| import logging |
| import os |
| import socket |
| import subprocess |
| import sys |
| import struct |
| import tempfile |
| import time |
| import threading |
| import xml.etree.ElementTree |
| import zipfile |
| |
| from six.moves import BaseHTTPServer |
| |
| import update_payload.payload |
| |
| |
| # The path used to store the OTA package when applying the package from a file. |
| OTA_PACKAGE_PATH = '/data/ota_package' |
| |
| # The path to the payload public key on the device. |
| PAYLOAD_KEY_PATH = '/etc/update_engine/update-payload-key.pub.pem' |
| |
| # The port on the device that update_engine should connect to. |
| DEVICE_PORT = 1234 |
| |
| |
| def CopyFileObjLength(fsrc, fdst, buffer_size=128 * 1024, copy_length=None): |
| """Copy from a file object to another. |
| |
| This function is similar to shutil.copyfileobj except that it allows to copy |
| less than the full source file. |
| |
| Args: |
| fsrc: source file object where to read from. |
| fdst: destination file object where to write to. |
| buffer_size: size of the copy buffer in memory. |
| copy_length: maximum number of bytes to copy, or None to copy everything. |
| |
| Returns: |
| the number of bytes copied. |
| """ |
| copied = 0 |
| while True: |
| chunk_size = buffer_size |
| if copy_length is not None: |
| chunk_size = min(chunk_size, copy_length - copied) |
| if not chunk_size: |
| break |
| buf = fsrc.read(chunk_size) |
| if not buf: |
| break |
| fdst.write(buf) |
| copied += len(buf) |
| return copied |
| |
| |
| class AndroidOTAPackage(object): |
| """Android update payload using the .zip format. |
| |
| Android OTA packages traditionally used a .zip file to store the payload. When |
| applying A/B updates over the network, a payload binary is stored RAW inside |
| this .zip file which is used by update_engine to apply the payload. To do |
| this, an offset and size inside the .zip file are provided. |
| """ |
| |
| # Android OTA package file paths. |
| OTA_PAYLOAD_BIN = 'payload.bin' |
| OTA_PAYLOAD_PROPERTIES_TXT = 'payload_properties.txt' |
| SECONDARY_OTA_PAYLOAD_BIN = 'secondary/payload.bin' |
| SECONDARY_OTA_PAYLOAD_PROPERTIES_TXT = 'secondary/payload_properties.txt' |
| PAYLOAD_MAGIC_HEADER = b'CrAU' |
| |
| def __init__(self, otafilename, secondary_payload=False): |
| self.otafilename = otafilename |
| |
| otazip = zipfile.ZipFile(otafilename, 'r') |
| payload_entry = (self.SECONDARY_OTA_PAYLOAD_BIN if secondary_payload else |
| self.OTA_PAYLOAD_BIN) |
| payload_info = otazip.getinfo(payload_entry) |
| |
| if payload_info.compress_type != 0: |
| logging.error( |
| "Expected payload to be uncompressed, got compression method %d", |
| payload_info.compress_type) |
| # Don't use len(payload_info.extra). Because that returns size of extra |
| # fields in central directory. We need to look at local file directory, |
| # as these two might have different sizes. |
| with open(otafilename, "rb") as fp: |
| fp.seek(payload_info.header_offset) |
| data = fp.read(zipfile.sizeFileHeader) |
| fheader = struct.unpack(zipfile.structFileHeader, data) |
| # Last two fields of local file header are filename length and |
| # extra length |
| filename_len = fheader[-2] |
| extra_len = fheader[-1] |
| self.offset = payload_info.header_offset |
| self.offset += zipfile.sizeFileHeader |
| self.offset += filename_len + extra_len |
| self.size = payload_info.file_size |
| fp.seek(self.offset) |
| payload_header = fp.read(4) |
| if payload_header != self.PAYLOAD_MAGIC_HEADER: |
| logging.warning( |
| "Invalid header, expected %s, got %s." |
| "Either the offset is not correct, or payload is corrupted", |
| binascii.hexlify(self.PAYLOAD_MAGIC_HEADER), |
| binascii.hexlify(payload_header)) |
| |
| property_entry = (self.SECONDARY_OTA_PAYLOAD_PROPERTIES_TXT if |
| secondary_payload else self.OTA_PAYLOAD_PROPERTIES_TXT) |
| self.properties = otazip.read(property_entry) |
| |
| |
| class UpdateHandler(BaseHTTPServer.BaseHTTPRequestHandler): |
| """A HTTPServer that supports single-range requests. |
| |
| Attributes: |
| serving_payload: path to the only payload file we are serving. |
| serving_range: the start offset and size tuple of the payload. |
| """ |
| |
| @staticmethod |
| def _parse_range(range_str, file_size): |
| """Parse an HTTP range string. |
| |
| Args: |
| range_str: HTTP Range header in the request, not including "Header:". |
| file_size: total size of the serving file. |
| |
| Returns: |
| A tuple (start_range, end_range) with the range of bytes requested. |
| """ |
| start_range = 0 |
| end_range = file_size |
| |
| if range_str: |
| range_str = range_str.split('=', 1)[1] |
| s, e = range_str.split('-', 1) |
| if s: |
| start_range = int(s) |
| if e: |
| end_range = int(e) + 1 |
| elif e: |
| if int(e) < file_size: |
| start_range = file_size - int(e) |
| return start_range, end_range |
| |
| def do_GET(self): # pylint: disable=invalid-name |
| """Reply with the requested payload file.""" |
| if self.path != '/payload': |
| self.send_error(404, 'Unknown request') |
| return |
| |
| if not self.serving_payload: |
| self.send_error(500, 'No serving payload set') |
| return |
| |
| try: |
| f = open(self.serving_payload, 'rb') |
| except IOError: |
| self.send_error(404, 'File not found') |
| return |
| # Handle the range request. |
| if 'Range' in self.headers: |
| self.send_response(206) |
| else: |
| self.send_response(200) |
| |
| serving_start, serving_size = self.serving_range |
| start_range, end_range = self._parse_range(self.headers.get('range'), |
| serving_size) |
| logging.info('Serving request for %s from %s [%d, %d) length: %d', |
| self.path, self.serving_payload, serving_start + start_range, |
| serving_start + end_range, end_range - start_range) |
| |
| self.send_header('Accept-Ranges', 'bytes') |
| self.send_header('Content-Range', |
| 'bytes ' + str(start_range) + '-' + str(end_range - 1) + |
| '/' + str(end_range - start_range)) |
| self.send_header('Content-Length', end_range - start_range) |
| |
| stat = os.fstat(f.fileno()) |
| self.send_header('Last-Modified', self.date_time_string(stat.st_mtime)) |
| self.send_header('Content-type', 'application/octet-stream') |
| self.end_headers() |
| |
| f.seek(serving_start + start_range) |
| CopyFileObjLength(f, self.wfile, copy_length=end_range - start_range) |
| |
| def do_POST(self): # pylint: disable=invalid-name |
| """Reply with the omaha response xml.""" |
| if self.path != '/update': |
| self.send_error(404, 'Unknown request') |
| return |
| |
| if not self.serving_payload: |
| self.send_error(500, 'No serving payload set') |
| return |
| |
| try: |
| f = open(self.serving_payload, 'rb') |
| except IOError: |
| self.send_error(404, 'File not found') |
| return |
| |
| content_length = int(self.headers.getheader('Content-Length')) |
| request_xml = self.rfile.read(content_length) |
| xml_root = xml.etree.ElementTree.fromstring(request_xml) |
| appid = None |
| for app in xml_root.iter('app'): |
| if 'appid' in app.attrib: |
| appid = app.attrib['appid'] |
| break |
| if not appid: |
| self.send_error(400, 'No appid in Omaha request') |
| return |
| |
| self.send_response(200) |
| self.send_header("Content-type", "text/xml") |
| self.end_headers() |
| |
| serving_start, serving_size = self.serving_range |
| sha256 = hashlib.sha256() |
| f.seek(serving_start) |
| bytes_to_hash = serving_size |
| while bytes_to_hash: |
| buf = f.read(min(bytes_to_hash, 1024 * 1024)) |
| if not buf: |
| self.send_error(500, 'Payload too small') |
| return |
| sha256.update(buf) |
| bytes_to_hash -= len(buf) |
| |
| payload = update_payload.Payload(f, payload_file_offset=serving_start) |
| payload.Init() |
| |
| response_xml = ''' |
| <?xml version="1.0" encoding="UTF-8"?> |
| <response protocol="3.0"> |
| <app appid="{appid}"> |
| <updatecheck status="ok"> |
| <urls> |
| <url codebase="http://127.0.0.1:{port}/"/> |
| </urls> |
| <manifest version="0.0.0.1"> |
| <actions> |
| <action event="install" run="payload"/> |
| <action event="postinstall" MetadataSize="{metadata_size}"/> |
| </actions> |
| <packages> |
| <package hash_sha256="{payload_hash}" name="payload" size="{payload_size}"/> |
| </packages> |
| </manifest> |
| </updatecheck> |
| </app> |
| </response> |
| '''.format(appid=appid, port=DEVICE_PORT, |
| metadata_size=payload.metadata_size, |
| payload_hash=sha256.hexdigest(), |
| payload_size=serving_size) |
| self.wfile.write(response_xml.strip()) |
| return |
| |
| |
| class ServerThread(threading.Thread): |
| """A thread for serving HTTP requests.""" |
| |
| def __init__(self, ota_filename, serving_range): |
| threading.Thread.__init__(self) |
| # serving_payload and serving_range are class attributes and the |
| # UpdateHandler class is instantiated with every request. |
| UpdateHandler.serving_payload = ota_filename |
| UpdateHandler.serving_range = serving_range |
| self._httpd = BaseHTTPServer.HTTPServer(('127.0.0.1', 0), UpdateHandler) |
| self.port = self._httpd.server_port |
| |
| def run(self): |
| try: |
| self._httpd.serve_forever() |
| except (KeyboardInterrupt, socket.error): |
| pass |
| logging.info('Server Terminated') |
| |
| def StopServer(self): |
| self._httpd.shutdown() |
| self._httpd.socket.close() |
| |
| |
| def StartServer(ota_filename, serving_range): |
| t = ServerThread(ota_filename, serving_range) |
| t.start() |
| return t |
| |
| |
| def AndroidUpdateCommand(ota_filename, secondary, payload_url, extra_headers): |
| """Return the command to run to start the update in the Android device.""" |
| ota = AndroidOTAPackage(ota_filename, secondary) |
| headers = ota.properties |
| headers += b'USER_AGENT=Dalvik (something, something)\n' |
| headers += b'NETWORK_ID=0\n' |
| headers += extra_headers.encode() |
| |
| return ['update_engine_client', '--update', '--follow', |
| '--payload=%s' % payload_url, '--offset=%d' % ota.offset, |
| '--size=%d' % ota.size, '--headers="%s"' % headers.decode()] |
| |
| |
| def OmahaUpdateCommand(omaha_url): |
| """Return the command to run to start the update in a device using Omaha.""" |
| return ['update_engine_client', '--update', '--follow', |
| '--omaha_url=%s' % omaha_url] |
| |
| |
| class AdbHost(object): |
| """Represents a device connected via ADB.""" |
| |
| def __init__(self, device_serial=None): |
| """Construct an instance. |
| |
| Args: |
| device_serial: options string serial number of attached device. |
| """ |
| self._device_serial = device_serial |
| self._command_prefix = ['adb'] |
| if self._device_serial: |
| self._command_prefix += ['-s', self._device_serial] |
| |
| def adb(self, command, timeout_seconds: float = None): |
| """Run an ADB command like "adb push". |
| |
| Args: |
| command: list of strings containing command and arguments to run |
| |
| Returns: |
| the program's return code. |
| |
| Raises: |
| subprocess.CalledProcessError on command exit != 0. |
| """ |
| command = self._command_prefix + command |
| logging.info('Running: %s', ' '.join(str(x) for x in command)) |
| p = subprocess.Popen(command, universal_newlines=True) |
| p.wait(timeout_seconds) |
| return p.returncode |
| |
| def adb_output(self, command): |
| """Run an ADB command like "adb push" and return the output. |
| |
| Args: |
| command: list of strings containing command and arguments to run |
| |
| Returns: |
| the program's output as a string. |
| |
| Raises: |
| subprocess.CalledProcessError on command exit != 0. |
| """ |
| command = self._command_prefix + command |
| logging.info('Running: %s', ' '.join(str(x) for x in command)) |
| return subprocess.check_output(command, universal_newlines=True) |
| |
| |
| def PushMetadata(dut, otafile, metadata_path): |
| payload = update_payload.Payload(otafile) |
| payload.Init() |
| with tempfile.TemporaryDirectory() as tmpdir: |
| with zipfile.ZipFile(otafile, "r") as zfp: |
| extracted_path = os.path.join(tmpdir, "payload.bin") |
| with zfp.open("payload.bin") as payload_fp, \ |
| open(extracted_path, "wb") as output_fp: |
| # Only extract the first |data_offset| bytes from the payload. |
| # This is because allocateSpaceForPayload only needs to see |
| # the manifest, not the entire payload. |
| # Extracting the entire payload works, but is slow for full |
| # OTA. |
| output_fp.write(payload_fp.read(payload.data_offset)) |
| |
| return dut.adb([ |
| "push", |
| extracted_path, |
| metadata_path |
| ]) == 0 |
| |
| |
| def main(): |
| parser = argparse.ArgumentParser(description='Android A/B OTA helper.') |
| parser.add_argument('otafile', metavar='PAYLOAD', type=str, |
| help='the OTA package file (a .zip file) or raw payload \ |
| if device uses Omaha.') |
| parser.add_argument('--file', action='store_true', |
| help='Push the file to the device before updating.') |
| parser.add_argument('--no-push', action='store_true', |
| help='Skip the "push" command when using --file') |
| parser.add_argument('-s', type=str, default='', metavar='DEVICE', |
| help='The specific device to use.') |
| parser.add_argument('--no-verbose', action='store_true', |
| help='Less verbose output') |
| parser.add_argument('--public-key', type=str, default='', |
| help='Override the public key used to verify payload.') |
| parser.add_argument('--extra-headers', type=str, default='', |
| help='Extra headers to pass to the device.') |
| parser.add_argument('--secondary', action='store_true', |
| help='Update with the secondary payload in the package.') |
| parser.add_argument('--no-slot-switch', action='store_true', |
| help='Do not perform slot switch after the update.') |
| parser.add_argument('--no-postinstall', action='store_true', |
| help='Do not execute postinstall scripts after the update.') |
| parser.add_argument('--allocate-only', action='store_true', |
| help='Allocate space for this OTA, instead of actually \ |
| applying the OTA.') |
| parser.add_argument('--verify-only', action='store_true', |
| help='Verify metadata then exit, instead of applying the OTA.') |
| parser.add_argument('--no-care-map', action='store_true', |
| help='Do not push care_map.pb to device.') |
| parser.add_argument('--perform-slot-switch', action='store_true', |
| help='Perform slot switch for this OTA package') |
| parser.add_argument('--perform-reset-slot-switch', action='store_true', |
| help='Perform reset slot switch for this OTA package') |
| parser.add_argument('--wipe-user-data', action='store_true', |
| help='Wipe userdata after installing OTA') |
| args = parser.parse_args() |
| logging.basicConfig( |
| level=logging.WARNING if args.no_verbose else logging.INFO) |
| |
| start_time = time.perf_counter() |
| |
| dut = AdbHost(args.s) |
| |
| server_thread = None |
| # List of commands to execute on exit. |
| finalize_cmds = [] |
| # Commands to execute when canceling an update. |
| cancel_cmd = ['shell', 'su', '0', 'update_engine_client', '--cancel'] |
| # List of commands to perform the update. |
| cmds = [] |
| |
| help_cmd = ['shell', 'su', '0', 'update_engine_client', '--help'] |
| use_omaha = 'omaha' in dut.adb_output(help_cmd) |
| |
| metadata_path = "/data/ota_package/metadata" |
| if args.allocate_only: |
| if PushMetadata(dut, args.otafile, metadata_path): |
| dut.adb([ |
| "shell", "update_engine_client", "--allocate", |
| "--metadata={}".format(metadata_path)]) |
| # Return 0, as we are executing ADB commands here, no work needed after |
| # this point |
| return 0 |
| if args.verify_only: |
| if PushMetadata(dut, args.otafile, metadata_path): |
| dut.adb([ |
| "shell", "update_engine_client", "--verify", |
| "--metadata={}".format(metadata_path)]) |
| # Return 0, as we are executing ADB commands here, no work needed after |
| # this point |
| return 0 |
| if args.perform_slot_switch: |
| assert PushMetadata(dut, args.otafile, metadata_path) |
| dut.adb(["shell", "update_engine_client", |
| "--switch_slot=true", "--metadata={}".format(metadata_path), "--follow"]) |
| return 0 |
| if args.perform_reset_slot_switch: |
| assert PushMetadata(dut, args.otafile, metadata_path) |
| dut.adb(["shell", "update_engine_client", |
| "--switch_slot=false", "--metadata={}".format(metadata_path)]) |
| return 0 |
| |
| if args.no_slot_switch: |
| args.extra_headers += "\nSWITCH_SLOT_ON_REBOOT=0" |
| if args.no_postinstall: |
| args.extra_headers += "\nRUN_POST_INSTALL=0" |
| if args.wipe_user_data: |
| args.extra_headers += "\nPOWERWASH=1" |
| |
| with zipfile.ZipFile(args.otafile) as zfp: |
| CARE_MAP_ENTRY_NAME = "care_map.pb" |
| if CARE_MAP_ENTRY_NAME in zfp.namelist() and not args.no_care_map: |
| # Need root permission to push to /data |
| dut.adb(["root"]) |
| with tempfile.NamedTemporaryFile() as care_map_fp: |
| care_map_fp.write(zfp.read(CARE_MAP_ENTRY_NAME)) |
| care_map_fp.flush() |
| dut.adb(["push", care_map_fp.name, |
| "/data/ota_package/" + CARE_MAP_ENTRY_NAME]) |
| |
| if args.file: |
| # Update via pushing a file to /data. |
| device_ota_file = os.path.join(OTA_PACKAGE_PATH, 'debug.zip') |
| payload_url = 'file://' + device_ota_file |
| if not args.no_push: |
| data_local_tmp_file = '/data/local/tmp/debug.zip' |
| cmds.append(['push', args.otafile, data_local_tmp_file]) |
| cmds.append(['shell', 'su', '0', 'mv', data_local_tmp_file, |
| device_ota_file]) |
| cmds.append(['shell', 'su', '0', 'chcon', |
| 'u:object_r:ota_package_file:s0', device_ota_file]) |
| cmds.append(['shell', 'su', '0', 'chown', 'system:cache', device_ota_file]) |
| cmds.append(['shell', 'su', '0', 'chmod', '0660', device_ota_file]) |
| else: |
| # Update via sending the payload over the network with an "adb reverse" |
| # command. |
| payload_url = 'http://127.0.0.1:%d/payload' % DEVICE_PORT |
| if use_omaha and zipfile.is_zipfile(args.otafile): |
| ota = AndroidOTAPackage(args.otafile, args.secondary) |
| serving_range = (ota.offset, ota.size) |
| else: |
| serving_range = (0, os.stat(args.otafile).st_size) |
| server_thread = StartServer(args.otafile, serving_range) |
| cmds.append( |
| ['reverse', 'tcp:%d' % DEVICE_PORT, 'tcp:%d' % server_thread.port]) |
| finalize_cmds.append(['reverse', '--remove', 'tcp:%d' % DEVICE_PORT]) |
| |
| if args.public_key: |
| payload_key_dir = os.path.dirname(PAYLOAD_KEY_PATH) |
| cmds.append( |
| ['shell', 'su', '0', 'mount', '-t', 'tmpfs', 'tmpfs', payload_key_dir]) |
| # Allow adb push to payload_key_dir |
| cmds.append(['shell', 'su', '0', 'chcon', 'u:object_r:shell_data_file:s0', |
| payload_key_dir]) |
| cmds.append(['push', args.public_key, PAYLOAD_KEY_PATH]) |
| # Allow update_engine to read it. |
| cmds.append(['shell', 'su', '0', 'chcon', '-R', 'u:object_r:system_file:s0', |
| payload_key_dir]) |
| finalize_cmds.append(['shell', 'su', '0', 'umount', payload_key_dir]) |
| |
| try: |
| # The main update command using the configured payload_url. |
| if use_omaha: |
| update_cmd = \ |
| OmahaUpdateCommand('http://127.0.0.1:%d/update' % DEVICE_PORT) |
| else: |
| update_cmd = AndroidUpdateCommand(args.otafile, args.secondary, |
| payload_url, args.extra_headers) |
| cmds.append(['shell', 'su', '0'] + update_cmd) |
| |
| for cmd in cmds: |
| dut.adb(cmd) |
| except KeyboardInterrupt: |
| dut.adb(cancel_cmd) |
| finally: |
| if server_thread: |
| server_thread.StopServer() |
| for cmd in finalize_cmds: |
| dut.adb(cmd, 5) |
| |
| logging.info('Update took %.3f seconds', (time.perf_counter() - start_time)) |
| return 0 |
| |
| |
| if __name__ == '__main__': |
| sys.exit(main()) |