blob: d318a629065893fc0dd2717f93c0e670f29a8162 [file] [log] [blame]
Alex Deymoaea4c1c2015-08-19 20:24:43 -07001//
2// Copyright (C) 2010 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
adlr@google.com3defe6a2009-12-04 20:57:17 +000016
Sen Jiangcb131242019-01-22 17:07:58 -080017// Update file format: An update file contains all the operations needed
18// to update a system to a specific version. It can be a full payload which
19// can update from any version, or a delta payload which can only update
20// from a specific version.
21// The update format is represented by this struct pseudocode:
adlr@google.com3defe6a2009-12-04 20:57:17 +000022// struct delta_update_file {
23// char magic[4] = "CrAU";
Sen Jiangcb131242019-01-22 17:07:58 -080024// uint64 file_format_version; // payload major version
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080025// uint64 manifest_size; // Size of protobuf DeltaArchiveManifest
Alex Deymoc1d7f122015-09-10 15:15:42 -070026//
Sen Jiangcb131242019-01-22 17:07:58 -080027// // Only present if format_version >= 2:
Alex Deymoc1d7f122015-09-10 15:15:42 -070028// uint32 metadata_signature_size;
29//
Sen Jiangcb131242019-01-22 17:07:58 -080030// // The DeltaArchiveManifest protobuf serialized, not compressed.
31// char manifest[manifest_size];
adlr@google.com3defe6a2009-12-04 20:57:17 +000032//
Alex Deymoc1d7f122015-09-10 15:15:42 -070033// // The signature of the metadata (from the beginning of the payload up to
34// // this location, not including the signature itself). This is a serialized
35// // Signatures message.
Sen Jiangcb131242019-01-22 17:07:58 -080036// char metadata_signature_message[metadata_signature_size];
Alex Deymoc1d7f122015-09-10 15:15:42 -070037//
adlr@google.com3defe6a2009-12-04 20:57:17 +000038// // Data blobs for files, no specific format. The specific offset
39// // and length of each data blob is recorded in the DeltaArchiveManifest.
40// struct {
41// char data[];
42// } blobs[];
43//
Sen Jiangcb131242019-01-22 17:07:58 -080044// // The signature of the entire payload, everything up to this location,
45// // except that metadata_signature_message is skipped to simplify signing
46// // process. These two are not signed:
Alex Deymoc1d7f122015-09-10 15:15:42 -070047// uint64 payload_signatures_message_size;
Sen Jiangcb131242019-01-22 17:07:58 -080048// // This is a serialized Signatures message.
49// char payload_signatures_message[payload_signatures_message_size];
Andrew de los Reyes94f025d2010-08-16 17:17:27 -070050//
adlr@google.com3defe6a2009-12-04 20:57:17 +000051// };
52
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080053// The DeltaArchiveManifest protobuf is an ordered list of InstallOperation
54// objects. These objects are stored in a linear array in the
55// DeltaArchiveManifest. Each operation is applied in order by the client.
adlr@google.com3defe6a2009-12-04 20:57:17 +000056
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080057// The DeltaArchiveManifest also contains the initial and final
58// checksums for the device.
adlr@google.com3defe6a2009-12-04 20:57:17 +000059
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080060// The client will perform each InstallOperation in order, beginning even
61// before the entire delta file is downloaded (but after at least the
62// protobuf is downloaded). The types of operations are explained:
63// - REPLACE: Replace the dst_extents on the drive with the attached data,
64// zero padding out to block size.
65// - REPLACE_BZ: bzip2-uncompress the attached data and write it into
66// dst_extents on the drive, zero padding to block size.
67// - MOVE: Copy the data in src_extents to dst_extents. Extents may overlap,
68// so it may be desirable to read all src_extents data into memory before
Sen Jiangcb131242019-01-22 17:07:58 -080069// writing it out. (deprecated)
Alex Deymoc1d7f122015-09-10 15:15:42 -070070// - SOURCE_COPY: Copy the data in src_extents in the old partition to
71// dst_extents in the new partition. There's no overlapping of data because
72// the extents are in different partitions.
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080073// - BSDIFF: Read src_length bytes from src_extents into memory, perform
74// bspatch with attached data, write new data to dst_extents, zero padding
Sen Jiangcb131242019-01-22 17:07:58 -080075// to block size. (deprecated)
Alex Deymoc1d7f122015-09-10 15:15:42 -070076// - SOURCE_BSDIFF: Read the data in src_extents in the old partition, perform
77// bspatch with the attached data and write the new data to dst_extents in the
78// new partition.
79// - ZERO: Write zeros to the destination dst_extents.
80// - DISCARD: Discard the destination dst_extents blocks on the physical medium.
Andrew Lassalled04ca0c2019-11-18 11:33:57 -080081// the data read from those blocks is undefined.
Alex Deymoc1d7f122015-09-10 15:15:42 -070082// - REPLACE_XZ: Replace the dst_extents with the contents of the attached
83// xz file after decompression. The xz file should only use crc32 or no crc at
84// all to be compatible with xz-embedded.
Amin Hassanicdeb6e62017-10-11 10:15:11 -070085// - PUFFDIFF: Read the data in src_extents in the old partition, perform
86// puffpatch with the attached data and write the new data to dst_extents in
87// the new partition.
Alex Deymoc1d7f122015-09-10 15:15:42 -070088//
89// The operations allowed in the payload (supported by the client) depend on the
Sen Jiang771f6482018-04-04 17:59:10 -070090// major and minor version. See InstallOperation.Type below for details.
adlr@google.com3defe6a2009-12-04 20:57:17 +000091
Amin Hassani489875a2017-08-04 13:20:52 -070092syntax = "proto2";
93
adlr@google.com3defe6a2009-12-04 20:57:17 +000094package chromeos_update_engine;
Alex Deymob8f16a12014-06-10 18:59:22 -070095option optimize_for = LITE_RUNTIME;
adlr@google.com3defe6a2009-12-04 20:57:17 +000096
Andrew de los Reyes1e338b82010-01-22 14:57:27 -080097// Data is packed into blocks on disk, always starting from the beginning
98// of the block. If a file's data is too large for one block, it overflows
99// into another block, which may or may not be the following block on the
100// physical partition. An ordered list of extents is another
101// representation of an ordered list of blocks. For example, a file stored
102// in blocks 9, 10, 11, 2, 18, 12 (in that order) would be stored in
103// extents { {9, 3}, {2, 1}, {18, 1}, {12, 1} } (in that order).
104// In general, files are stored sequentially on disk, so it's more efficient
105// to use extents to encode the block lists (this is effectively
106// run-length encoding).
107// A sentinel value (kuint64max) as the start block denotes a sparse-hole
108// in a file whose block-length is specified by num_blocks.
adlr@google.com3defe6a2009-12-04 20:57:17 +0000109
Sen Jiangcb131242019-01-22 17:07:58 -0800110message Extent {
111 optional uint64 start_block = 1;
112 optional uint64 num_blocks = 2;
113}
114
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700115// Signatures: Updates may be signed by the OS vendor. The client verifies
116// an update's signature by hashing the entire download. The section of the
Jay Srinivasan74475bf2012-09-13 19:26:26 -0700117// download that contains the signature is at the end of the file, so when
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700118// signing a file, only the part up to the signature part is signed.
119// Then, the client looks inside the download's Signatures message for a
120// Signature message that it knows how to handle. Generally, a client will
121// only know how to handle one type of signature, but an update may contain
122// many signatures to support many different types of client. Then client
123// selects a Signature message and uses that, along with a known public key,
124// to verify the download. The public key is expected to be part of the
125// client.
126
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700127message Signatures {
128 message Signature {
Tianjie Xu7bbe0152019-10-09 18:11:15 -0700129 optional uint32 version = 1 [deprecated = true];
Andrew de los Reyes0c440052010-08-20 11:25:54 -0700130 optional bytes data = 2;
Tianjie Xu7bbe0152019-10-09 18:11:15 -0700131
132 // The DER encoded signature size of EC keys is nondeterministic for
133 // different input of sha256 hash. However, we need the size of the
134 // serialized signatures protobuf string to be fixed before signing;
135 // because this size is part of the content to be signed. Therefore, we
136 // always pad the signature data to the maximum possible signature size of
137 // a given key. And the payload verifier will truncate the signature to
138 // its correct size based on the value of |unpadded_signature_size|.
139 optional fixed32 unpadded_signature_size = 3;
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700140 }
141 repeated Signature signatures = 1;
142}
143
Darin Petkov36a58222010-10-07 22:00:09 -0700144message PartitionInfo {
145 optional uint64 size = 1;
146 optional bytes hash = 2;
147}
148
Don Garrett0dd39852013-04-03 16:55:42 -0700149// Describe an image we are based on in a human friendly way.
150// Examples:
151// dev-channel, x86-alex, 1.2.3, mp-v3
152// nplusone-channel, x86-alex, 1.2.4, mp-v3, dev-channel, 1.2.3
153//
154// All fields will be set, if this message is present.
155message ImageInfo {
Vyshua81598b2020-09-17 21:37:21 +0000156 optional string board = 1 [deprecated = true];
157 optional string key = 2 [deprecated = true];
158 optional string channel = 3 [deprecated = true];
159 optional string version = 4 [deprecated = true];
Don Garrett0dd39852013-04-03 16:55:42 -0700160
161 // If these values aren't present, they should be assumed to match
162 // the equivalent value above. They are normally only different for
163 // special image types such as nplusone images.
Vyshua81598b2020-09-17 21:37:21 +0000164 optional string build_channel = 5 [deprecated = true];
165 optional string build_version = 6 [deprecated = true];
Don Garrett0dd39852013-04-03 16:55:42 -0700166}
167
Alex Deymoa12ee112015-08-12 22:19:32 -0700168message InstallOperation {
169 enum Type {
Amin Hassani0f59a9a2019-09-27 10:24:31 -0700170 REPLACE = 0; // Replace destination extents w/ attached data.
171 REPLACE_BZ = 1; // Replace destination extents w/ attached bzipped data.
172 MOVE = 2 [deprecated = true]; // Move source extents to target extents.
173 BSDIFF = 3 [deprecated = true]; // The data is a bsdiff binary diff.
Alex Deymoac6246a2015-08-13 14:00:22 -0700174
Alex Deymoc1d7f122015-09-10 15:15:42 -0700175 // On minor version 2 or newer, these operations are supported:
Vyshu852f57d2020-10-09 17:35:14 +0000176 SOURCE_COPY = 4; // Copy from source to target partition
177 SOURCE_BSDIFF = 5; // Like BSDIFF, but read from source partition
Alex Deymoac6246a2015-08-13 14:00:22 -0700178
Alex Deymoc1d7f122015-09-10 15:15:42 -0700179 // On minor version 3 or newer and on major version 2 or newer, these
180 // operations are supported:
Vyshu852f57d2020-10-09 17:35:14 +0000181 REPLACE_XZ = 8; // Replace destination extents w/ attached xz data.
Sen Jiang3317b882016-01-08 17:48:57 +0800182
183 // On minor version 4 or newer, these operations are supported:
Vyshu852f57d2020-10-09 17:35:14 +0000184 ZERO = 6; // Write zeros in the destination.
Amin Hassanidf3a8662017-12-07 12:17:45 -0800185 DISCARD = 7; // Discard the destination blocks, reading as undefined.
Amin Hassaniefa62d92017-11-09 13:46:56 -0800186 BROTLI_BSDIFF = 10; // Like SOURCE_BSDIFF, but compressed with brotli.
Amin Hassani77d7cbc2018-02-07 16:21:33 -0800187
188 // On minor version 5 or newer, these operations are supported:
189 PUFFDIFF = 9; // The data is in puffdiff format.
Tianjiec7001692021-08-26 16:06:05 -0700190
191 // On minor version 8 or newer, these operations are supported:
192 ZUCCHINI = 11;
Kelvin Zhangf67dc492021-12-08 15:35:31 -0800193
194 // On minor version 9 or newer, these operations are supported:
195 LZ4DIFF_BSDIFF = 12;
196 LZ4DIFF_PUFFDIFF = 13;
Andrew de los Reyes1e338b82010-01-22 14:57:27 -0800197 }
Alex Deymoa12ee112015-08-12 22:19:32 -0700198 required Type type = 1;
Sen Jiang9edcd042018-11-12 16:46:06 -0800199
200 // Only minor version 6 or newer support 64 bits |data_offset| and
201 // |data_length|, older client will read them as uint32.
Alex Deymoa12ee112015-08-12 22:19:32 -0700202 // The offset into the delta file (after the protobuf)
203 // where the data (if any) is stored
Sen Jiang9edcd042018-11-12 16:46:06 -0800204 optional uint64 data_offset = 2;
Alex Deymoa12ee112015-08-12 22:19:32 -0700205 // The length of the data in the delta file
Sen Jiang9edcd042018-11-12 16:46:06 -0800206 optional uint64 data_length = 3;
Alex Deymoa12ee112015-08-12 22:19:32 -0700207
208 // Ordered list of extents that are read from (if any) and written to.
209 repeated Extent src_extents = 4;
210 // Byte length of src, equal to the number of blocks in src_extents *
Amin Hassanif5a06d82017-10-19 15:06:38 -0700211 // block_size. It is used for BSDIFF and SOURCE_BSDIFF, because we need to
212 // pass that external program the number of bytes to read from the blocks we
213 // pass it. This is not used in any other operation.
Alex Deymoa12ee112015-08-12 22:19:32 -0700214 optional uint64 src_length = 5;
215
216 repeated Extent dst_extents = 6;
217 // Byte length of dst, equal to the number of blocks in dst_extents *
Amin Hassanif5a06d82017-10-19 15:06:38 -0700218 // block_size. Used for BSDIFF and SOURCE_BSDIFF, but not in any other
219 // operation.
Alex Deymoa12ee112015-08-12 22:19:32 -0700220 optional uint64 dst_length = 7;
221
222 // Optional SHA 256 hash of the blob associated with this operation.
223 // This is used as a primary validation for http-based downloads and
224 // as a defense-in-depth validation for https-based downloads. If
225 // the operation doesn't refer to any blob, this field will have
226 // zero bytes.
227 optional bytes data_sha256_hash = 8;
Alex Deymoac6246a2015-08-13 14:00:22 -0700228
229 // Indicates the SHA 256 hash of the source data referenced in src_extents at
230 // the time of applying the operation. If present, the update_engine daemon
231 // MUST read and verify the source data before applying the operation.
232 optional bytes src_sha256_hash = 9;
233}
234
Tianjiee9156ec2020-08-11 11:13:54 -0700235// Hints to VAB snapshot to skip writing some blocks if these blocks are
236// identical to the ones on the source image. The src & dst extents for each
237// CowMergeOperation should be contiguous, and they're a subset of an OTA
238// InstallOperation.
239// During merge time, we need to follow the pre-computed sequence to avoid
240// read after write, similar to the inplace update schema.
241message CowMergeOperation {
242 enum Type {
Kelvin Zhang0de22fc2021-06-14 13:24:39 -0400243 COW_COPY = 0; // identical blocks
244 COW_XOR = 1; // used when src/dst blocks are highly similar
245 COW_REPLACE = 2; // Raw replace operation
Tianjiee9156ec2020-08-11 11:13:54 -0700246 }
247 optional Type type = 1;
248
249 optional Extent src_extent = 2;
250 optional Extent dst_extent = 3;
Kelvin Zhang0de22fc2021-06-14 13:24:39 -0400251 // For COW_XOR, source location might be unaligned, so this field is in range
252 // [0, block_size), representing how much should the src_extent shift toward
253 // larger block number. If this field is non-zero, then src_extent will
254 // include 1 extra block in the end, as the merge op actually references the
255 // first |src_offset| bytes of that extra block. For example, if |dst_extent|
256 // is [10, 15], |src_offset| is 500, then src_extent might look like [25, 31].
257 // Note that |src_extent| contains 1 extra block than the |dst_extent|.
258 optional uint32 src_offset = 4;
Tianjiee9156ec2020-08-11 11:13:54 -0700259}
260
Alex Deymoac6246a2015-08-13 14:00:22 -0700261// Describes the update to apply to a single partition.
262message PartitionUpdate {
263 // A platform-specific name to identify the partition set being updated. For
264 // example, in Chrome OS this could be "ROOT" or "KERNEL".
265 required string partition_name = 1;
266
Alex Deymoeb86e552015-09-21 16:00:38 -0700267 // Whether this partition carries a filesystem with post-install program that
268 // must be run to finalize the update process. See also |postinstall_path| and
269 // |filesystem_type|.
Alex Deymoac6246a2015-08-13 14:00:22 -0700270 optional bool run_postinstall = 2;
271
Alex Deymoeb86e552015-09-21 16:00:38 -0700272 // The path of the executable program to run during the post-install step,
273 // relative to the root of this filesystem. If not set, the default "postinst"
274 // will be used. This setting is only used when |run_postinstall| is set and
275 // true.
276 optional string postinstall_path = 3;
277
278 // The filesystem type as passed to the mount(2) syscall when mounting the new
279 // filesystem to run the post-install program. If not set, a fixed list of
280 // filesystems will be attempted. This setting is only used if
281 // |run_postinstall| is set and true.
282 optional string filesystem_type = 4;
283
Alex Deymoac6246a2015-08-13 14:00:22 -0700284 // If present, a list of signatures of the new_partition_info.hash signed with
285 // different keys. If the update_engine daemon requires vendor-signed images
286 // and has its public key installed, one of the signatures should be valid
287 // for /postinstall to run.
Alex Deymoeb86e552015-09-21 16:00:38 -0700288 repeated Signatures.Signature new_partition_signature = 5;
Alex Deymoac6246a2015-08-13 14:00:22 -0700289
Alex Deymoeb86e552015-09-21 16:00:38 -0700290 optional PartitionInfo old_partition_info = 6;
291 optional PartitionInfo new_partition_info = 7;
Alex Deymoac6246a2015-08-13 14:00:22 -0700292
293 // The list of operations to be performed to apply this PartitionUpdate. The
294 // associated operation blobs (in operations[i].data_offset, data_length)
295 // should be stored contiguously and in the same order.
Alex Deymoeb86e552015-09-21 16:00:38 -0700296 repeated InstallOperation operations = 8;
Alex Deymo5b91c6b2016-08-04 20:33:36 -0700297
298 // Whether a failure in the postinstall step for this partition should be
299 // ignored.
300 optional bool postinstall_optional = 9;
Sen Jiang57f91802017-11-14 17:42:13 -0800301
302 // On minor version 6 or newer, these fields are supported:
303
304 // The extent for data covered by verity hash tree.
305 optional Extent hash_tree_data_extent = 10;
306
307 // The extent to store verity hash tree.
308 optional Extent hash_tree_extent = 11;
309
310 // The hash algorithm used in verity hash tree.
311 optional string hash_tree_algorithm = 12;
312
313 // The salt used for verity hash tree.
314 optional bytes hash_tree_salt = 13;
315
316 // The extent for data covered by FEC.
317 optional Extent fec_data_extent = 14;
318
319 // The extent to store FEC.
320 optional Extent fec_extent = 15;
321
322 // The number of FEC roots.
323 optional uint32 fec_roots = 16 [default = 2];
Kelvin Zhangd7191032020-08-11 10:48:16 -0400324
325 // Per-partition version used for downgrade detection, added
326 // as an effort to support partial updates. For most partitions,
327 // this is the build timestamp.
328 optional string version = 17;
Tianjiee9156ec2020-08-11 11:13:54 -0700329
330 // A sorted list of CowMergeOperation. When writing cow, we can choose to
331 // skip writing the raw bytes for these extents. During snapshot merge, the
332 // bytes will read from the source partitions instead.
333 repeated CowMergeOperation merge_operations = 18;
Kelvin Zhang7d64e282020-09-02 15:27:34 -0400334
335 // Estimated size for COW image. This is used by libsnapshot
336 // as a hint. If set to 0, libsnapshot should use alternative
337 // methods for estimating size.
338 optional uint64 estimate_cow_size = 19;
Alex Deymoa12ee112015-08-12 22:19:32 -0700339}
340
Yifan Hong398cb542018-10-18 11:29:40 -0700341message DynamicPartitionGroup {
342 // Name of the group.
343 required string name = 1;
344
345 // Maximum size of the group. The sum of sizes of all partitions in the group
346 // must not exceed the maximum size of the group.
347 optional uint64 size = 2;
348
349 // A list of partitions that belong to the group.
350 repeated string partition_names = 3;
351}
352
353// Metadata related to all dynamic partitions.
354message DynamicPartitionMetadata {
Sen Jiangcb131242019-01-22 17:07:58 -0800355 // All updatable groups present in |partitions| of this DeltaArchiveManifest.
Yifan Hong398cb542018-10-18 11:29:40 -0700356 // - If an updatable group is on the device but not in the manifest, it is
357 // not updated. Hence, the group will not be resized, and partitions cannot
358 // be added to or removed from the group.
359 // - If an updatable group is in the manifest but not on the device, the group
360 // is added to the device.
361 repeated DynamicPartitionGroup groups = 1;
Yifan Hong05b3b962019-09-26 17:19:21 -0700362
363 // Whether dynamic partitions have snapshots during the update. If this is
364 // set to true, the update_engine daemon creates snapshots for all dynamic
365 // partitions if possible. If this is unset, the update_engine daemon MUST
366 // NOT create snapshots for dynamic partitions.
367 optional bool snapshot_enabled = 2;
Kelvin Zhangad8ea102021-01-14 10:14:44 -0500368
369 // If this is set to false, update_engine should not use VABC regardless. If
370 // this is set to true, update_engine may choose to use VABC if device
371 // supports it, but not guaranteed.
372 // VABC stands for Virtual AB Compression
373 optional bool vabc_enabled = 3;
Kelvin Zhang4ca06c12021-02-04 17:16:40 -0500374
375 // The compression algorithm used by VABC. Available ones are "gz", "brotli".
376 // See system/core/fs_mgr/libsnapshot/cow_writer.cpp for available options,
377 // as this parameter is ultimated forwarded to libsnapshot's CowWriter
378 optional string vabc_compression_param = 4;
Akilesh Kailash3632df92021-04-13 22:30:15 +0000379
380 // COW version used by VABC. The represents the major version in the COW
381 // header
382 optional uint32 cow_version = 5;
Yifan Hong398cb542018-10-18 11:29:40 -0700383}
384
Mohammad Samiul Islam9dd2d4f2021-01-20 21:33:54 +0000385// Definition has been duplicated from
386// $ANDROID_BUILD_TOP/build/tools/releasetools/ota_metadata.proto. Keep in sync.
387message ApexInfo {
388 optional string package_name = 1;
389 optional int64 version = 2;
390 optional bool is_compressed = 3;
391 optional int64 decompressed_size = 4;
392}
393
Kelvin Zhangdeb34452021-01-21 11:54:36 -0500394// Definition has been duplicated from
395// $ANDROID_BUILD_TOP/build/tools/releasetools/ota_metadata.proto. Keep in sync.
396message ApexMetadata {
397 repeated ApexInfo apex_info = 1;
398}
399
Alex Deymoa12ee112015-08-12 22:19:32 -0700400message DeltaArchiveManifest {
Alex Deymoc1d7f122015-09-10 15:15:42 -0700401 // Only present in major version = 1. List of install operations for the
402 // kernel and rootfs partitions. For major version = 2 see the |partitions|
403 // field.
Amin Hassani55c75412019-10-07 11:20:39 -0700404 repeated InstallOperation install_operations = 1 [deprecated = true];
405 repeated InstallOperation kernel_install_operations = 2 [deprecated = true];
Andrew de los Reyes1e338b82010-01-22 14:57:27 -0800406
407 // (At time of writing) usually 4096
Andrew de los Reyesf4c7ef12010-04-30 10:37:00 -0700408 optional uint32 block_size = 3 [default = 4096];
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700409
410 // If signatures are present, the offset into the blobs, generally
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700411 // tacked onto the end of the file, and the length. We use an offset
412 // rather than a bool to allow for more flexibility in future file formats.
413 // If either is absent, it means signatures aren't supported in this
Andrew de los Reyes94f025d2010-08-16 17:17:27 -0700414 // file.
415 optional uint64 signatures_offset = 4;
Andrew de los Reyes932bc4c2010-08-23 18:14:09 -0700416 optional uint64 signatures_size = 5;
Darin Petkov36a58222010-10-07 22:00:09 -0700417
Alex Deymoc1d7f122015-09-10 15:15:42 -0700418 // Only present in major version = 1. Partition metadata used to validate the
419 // update. For major version = 2 see the |partitions| field.
Amin Hassani55c75412019-10-07 11:20:39 -0700420 optional PartitionInfo old_kernel_info = 6 [deprecated = true];
421 optional PartitionInfo new_kernel_info = 7 [deprecated = true];
422 optional PartitionInfo old_rootfs_info = 8 [deprecated = true];
423 optional PartitionInfo new_rootfs_info = 9 [deprecated = true];
Don Garrett0dd39852013-04-03 16:55:42 -0700424
425 // old_image_info will only be present for delta images.
Vyshua81598b2020-09-17 21:37:21 +0000426 optional ImageInfo old_image_info = 10 [deprecated = true];
Don Garrett0dd39852013-04-03 16:55:42 -0700427
Vyshua81598b2020-09-17 21:37:21 +0000428 optional ImageInfo new_image_info = 11 [deprecated = true];
Don Garrettb8dd1d92013-11-22 17:40:02 -0800429
Alex Deymoc1d7f122015-09-10 15:15:42 -0700430 // The minor version, also referred as "delta version", of the payload.
Sen Jiangcb131242019-01-22 17:07:58 -0800431 // Minor version 0 is full payload, everything else is delta payload.
Don Garrettb8dd1d92013-11-22 17:40:02 -0800432 optional uint32 minor_version = 12 [default = 0];
Alex Deymoac6246a2015-08-13 14:00:22 -0700433
Alex Deymoc1d7f122015-09-10 15:15:42 -0700434 // Only present in major version >= 2. List of partitions that will be
435 // updated, in the order they will be updated. This field replaces the
436 // |install_operations|, |kernel_install_operations| and the
437 // |{old,new}_{kernel,rootfs}_info| fields used in major version = 1. This
438 // array can have more than two partitions if needed, and they are identified
439 // by the partition name.
Alex Deymoac6246a2015-08-13 14:00:22 -0700440 repeated PartitionUpdate partitions = 13;
Sen Jiang5011df62017-06-28 17:13:19 -0700441
442 // The maximum timestamp of the OS allowed to apply this payload.
443 // Can be used to prevent downgrading the OS.
444 optional int64 max_timestamp = 14;
Yifan Hong398cb542018-10-18 11:29:40 -0700445
446 // Metadata related to all dynamic partitions.
447 optional DynamicPartitionMetadata dynamic_partition_metadata = 15;
Tianjied3865d12020-06-03 15:25:17 -0700448
449 // If the payload only updates a subset of partitions on the device.
450 optional bool partial_update = 16;
Mohammad Samiul Islam9dd2d4f2021-01-20 21:33:54 +0000451
452 // Information on compressed APEX to figure out how much space is required for
453 // their decompression
454 repeated ApexInfo apex_info = 17;
Andrew de los Reyes1e338b82010-01-22 14:57:27 -0800455}