• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1#!/usr/bin/env python3
2# -*- coding: utf-8 -*-
3
4# Copyright (c) 2021 Huawei Device Co., Ltd.
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17"""
18The tool for making updater package.
19
20positional arguments:
21  target_package        Target package file path.
22  update_package        Update package file path.
23
24optional arguments:
25  -h, --help            show this help message and exit
26  -s SOURCE_PACKAGE, --source_package SOURCE_PACKAGE
27                        Source package file path.
28  -nz, --no_zip         No zip mode,
29                        which means to output the update package without zip.
30  -pf PARTITION_FILE, --partition_file PARTITION_FILE
31                        Variable partition mode, Partition list file path.
32  -sa {ECC,RSA}, --signing_algorithm {ECC,RSA}
33                        The signing algorithms
34                        supported by the tool include ['ECC', 'RSA'].
35  -ha {sha256,sha384}, --hash_algorithm {sha256,sha384}
36                        The hash algorithms
37                        supported by the tool include ['sha256', 'sha384'].
38  -pk PRIVATE_KEY, --private_key PRIVATE_KEY
39                        Private key file path.
40  -nl2, --not_l2        Not L2 mode, Distinguish between L1 and L2.
41  -sl {256,384}, --signing_length {256,384}
42                        The signing content length
43                        supported by the tool include ['256', '384'].
44  -xp, --xml_path       XML file path.
45  -sc, --sd_card        SD Card mode, Create update package for SD Card.
46"""
47import filecmp
48import os
49import sys
50import argparse
51import subprocess
52import tempfile
53import hashlib
54import xmltodict
55import patch_package_process
56
57from gigraph_process import GigraphProcess
58from image_class import FullUpdateImage
59from image_class import IncUpdateImage
60from transfers_manager import TransfersManager
61from log_exception import UPDATE_LOGGER
62from script_generator import PreludeScript
63from script_generator import VerseScript
64from script_generator import RefrainScript
65from script_generator import EndingScript
66from update_package import build_update_package
67from unpack_updater_package import UnpackPackage
68from utils import OPTIONS_MANAGER
69from utils import UPDATER_CONFIG
70from utils import parse_partition_file_xml
71from utils import unzip_package
72from utils import clear_resource
73from utils import PRODUCT
74from utils import XML_FILE_PATH
75from utils import get_update_info
76from utils import SCRIPT_KEY_LIST
77from utils import PER_BLOCK_SIZE
78from utils import E2FSDROID_PATH
79from utils import MAXIMUM_RECURSION_DEPTH
80from utils import VERSE_SCRIPT_EVENT
81from utils import INC_IMAGE_EVENT
82from utils import DIFF_EXE_PATH
83from utils import PARTITION_CHANGE_EVENT
84from utils import DECOUPLED_EVENT
85from utils import get_update_config_softversion
86from vendor_script import create_vendor_script_class
87
88sys.setrecursionlimit(MAXIMUM_RECURSION_DEPTH)
89
90
91def type_check(arg):
92    """
93    Argument check, which is used to check whether the specified arg is a file.
94    :param arg: the arg to check
95    :return:  Check result, which is False if the arg is invalid.
96    """
97    if arg is not None and not os.path.exists(arg):
98        UPDATE_LOGGER.print_log(
99            "FileNotFoundError, path: %s" % arg, UPDATE_LOGGER.ERROR_LOG)
100        return False
101    return arg
102
103
104def private_key_check(arg):
105    """
106    Argument check, which is used to check whether
107    the specified arg is a private_key.
108    :param arg:  The arg to check.
109    :return: Check result, which is False if the arg is invalid.
110    """
111    if arg != "ON_SERVER" and not os.path.isfile(arg):
112        UPDATE_LOGGER.print_log(
113            "FileNotFoundError, path: %s" % arg, UPDATE_LOGGER.ERROR_LOG)
114        return False
115    return arg
116
117
118def check_update_package(arg):
119    """
120    Argument check, which is used to check whether
121    the update package path exists.
122    :param arg: The arg to check.
123    :return: Check result
124    """
125    make_dir_path = None
126    if os.path.exists(arg):
127        if os.path.isfile(arg):
128            UPDATE_LOGGER.print_log(
129                "Update package must be a dir path, not a file path. "
130                "path: %s" % arg, UPDATE_LOGGER.ERROR_LOG)
131            return False
132    else:
133        try:
134            UPDATE_LOGGER.print_log(
135                "Update package path does  not exist. The dir will be created!"
136                "path: %s" % arg, UPDATE_LOGGER.WARNING_LOG)
137            os.makedirs(arg)
138            make_dir_path = arg
139        except OSError:
140            UPDATE_LOGGER.print_log(
141                "Make update package path dir failed! "
142                "path: %s" % arg, UPDATE_LOGGER.ERROR_LOG)
143            return False
144    if make_dir_path is not None:
145        OPTIONS_MANAGER.make_dir_path = make_dir_path
146    OPTIONS_MANAGER.update_package = arg
147    return arg
148
149
150def unpack_check(arg):
151    """
152    Argument check, which is used to check whether
153    the update package path exists.
154    :param arg: The arg to check.
155    :return: Check result
156    """
157    unpack_package = os.path.join(OPTIONS_MANAGER.update_package, arg)
158    if not os.path.isfile(unpack_package):
159        UPDATE_LOGGER.print_log(
160            "FileNotFoundError, path: %s" % unpack_package, UPDATE_LOGGER.ERROR_LOG)
161        OPTIONS_MANAGER.unpack_package_path = None
162        return False
163    OPTIONS_MANAGER.unpack_package_path = unpack_package
164    return arg
165
166
167def create_entrance_args():
168    """
169    Arguments for the tool to create an update package
170    :return source_package : source version package
171            target_package : target version package
172            update_package : update package output path
173            no_zip : whether to enable the update package zip function.
174            partition_file : partition table XML file
175            signing_algorithm : signature algorithm (ECC and RSA (default))
176            private_key : path of the private key file
177    """
178    parser = OPTIONS_MANAGER.parser
179    parser.description = "Tool for creating update package."
180    parser.add_argument("-unpack", "--unpack_package", type=unpack_check,
181                        default=None, help="Unpack updater package.")
182    parser.add_argument("-s", "--source_package", type=type_check,
183                        default=None, help="Source package file path.")
184    parser.add_argument("target_package", type=type_check,
185                        help="Target package file path.")
186    parser.add_argument("update_package", type=check_update_package,
187                        help="Update package file path.")
188    parser.add_argument("-nz", "--no_zip", action='store_true',
189                        help="No zip mode, Output update package without zip.")
190    parser.add_argument("-pf", "--partition_file", default=None,
191                        help="Variable partition mode, "
192                             "Partition list file path.")
193    parser.add_argument("-sa", "--signing_algorithm", default='RSA',
194                        choices=['ECC', 'RSA'],
195                        help="The signing algorithm "
196                             "supported by the tool include ['ECC', 'RSA'].")
197    parser.add_argument("-ha", "--hash_algorithm", default='sha256',
198                        choices=['sha256', 'sha384'],
199                        help="The hash algorithm "
200                             "supported by the tool include "
201                             "['sha256', 'sha384'].")
202    parser.add_argument("-pk", "--private_key", type=private_key_check,
203                        default=None, help="Private key file path.")
204    parser.add_argument("-nl2", "--not_l2", action='store_true',
205                        help="Not L2 mode, Distinguish between L1 and L2.")
206    parser.add_argument("-sl", "--signing_length", default='256',
207                        choices=['256', '384'],
208                        help="The signing content length "
209                             "supported by the tool include "
210                             "['256', '384'].")
211    parser.add_argument("-xp", "--xml_path", type=private_key_check,
212                        default=None, help="XML file path.")
213    parser.add_argument("-sc", "--sd_card", action='store_true',
214                        help="SD Card mode, "
215                             "Create update package for SD Card.")
216
217
218def parse_args():
219    args = OPTIONS_MANAGER.parser.parse_args()
220    OPTIONS_MANAGER.source_package = args.source_package
221    OPTIONS_MANAGER.target_package = args.target_package
222    OPTIONS_MANAGER.update_package = args.update_package
223    OPTIONS_MANAGER.no_zip = args.no_zip
224    OPTIONS_MANAGER.partition_file = args.partition_file
225    OPTIONS_MANAGER.signing_algorithm = args.signing_algorithm
226    OPTIONS_MANAGER.hash_algorithm = args.hash_algorithm
227    OPTIONS_MANAGER.private_key = args.private_key
228    OPTIONS_MANAGER.not_l2 = args.not_l2
229    OPTIONS_MANAGER.signing_length = int(args.signing_length)
230    OPTIONS_MANAGER.xml_path = args.xml_path
231    OPTIONS_MANAGER.sd_card = args.sd_card
232
233
234def get_args():
235    ret_args = \
236        [OPTIONS_MANAGER.source_package,
237        OPTIONS_MANAGER.target_package,
238        OPTIONS_MANAGER.update_package,
239        OPTIONS_MANAGER.no_zip,
240        OPTIONS_MANAGER.not_l2,
241        OPTIONS_MANAGER.partition_file,
242        OPTIONS_MANAGER.signing_algorithm,
243        OPTIONS_MANAGER.hash_algorithm,
244        OPTIONS_MANAGER.private_key]
245    return ret_args
246
247
248def get_script_obj():
249    """
250    Obtain Opera script object
251    :return:
252    """
253    script_obj_list = create_vendor_script_class()
254    if script_obj_list == [None] * len(SCRIPT_KEY_LIST):
255        prelude_script = PreludeScript()
256        verse_script = VerseScript()
257        refrain_script = RefrainScript()
258        ending_script = EndingScript()
259
260        generate_verse_script = \
261            OPTIONS_MANAGER.init.invoke_event(VERSE_SCRIPT_EVENT)
262        if generate_verse_script:
263            verse_script = generate_verse_script()
264    else:
265        UPDATE_LOGGER.print_log(
266            "Get vendor extension object completed!"
267            "The vendor extension script will be generated.")
268        prelude_script = script_obj_list[0]
269        verse_script = script_obj_list[1]
270        refrain_script = script_obj_list[2]
271        ending_script = script_obj_list[3]
272    return prelude_script, verse_script, refrain_script, ending_script
273
274
275def get_source_package_path(source_package):
276    """
277    get_source_package_path.
278    :param source_package: source package path
279    :return:
280    """
281    if os.path.isdir(source_package):
282        OPTIONS_MANAGER.source_package_dir = source_package
283    elif source_package.endswith('.zip'):
284        # Decompress the source package.
285        tmp_dir_obj, unzip_dir = unzip_package(source_package)
286        if tmp_dir_obj is False or unzip_dir is False:
287            clear_resource(err_clear=True)
288            return False
289        OPTIONS_MANAGER.source_package_dir = unzip_dir
290        OPTIONS_MANAGER.source_package_temp_obj = tmp_dir_obj
291    else:
292        UPDATE_LOGGER.print_log("Input Update Package type exception!"
293            "path: %s" % source_package, UPDATE_LOGGER.ERROR_LOG)
294        clear_resource(err_clear=True)
295        return False
296    return True
297
298
299def check_incremental_args(no_zip, partition_file, source_package,
300                           incremental_img_list):
301    """
302    When the incremental list is not empty, incremental processing is required.
303    In this case, check related arguments.
304    :param no_zip: no zip mode
305    :param partition_file:
306    :param source_package:
307    :param incremental_img_list:
308    :return:
309    """
310    if "boot" in incremental_img_list:
311        UPDATE_LOGGER.print_log("boot cannot be incrementally processed!", UPDATE_LOGGER.ERROR_LOG)
312        clear_resource(err_clear=True)
313        return False
314    if source_package is None:
315        UPDATE_LOGGER.print_log("The source package is missing, "
316            "cannot be incrementally processed!", UPDATE_LOGGER.ERROR_LOG)
317        clear_resource(err_clear=True)
318        return False
319    if no_zip:
320        UPDATE_LOGGER.print_log("No ZIP mode, cannot be incrementally processed!", UPDATE_LOGGER.ERROR_LOG)
321        clear_resource(err_clear=True)
322        return False
323    if partition_file is not None:
324        UPDATE_LOGGER.print_log("Partition file is not None, "
325            "cannot be incrementally processed!", UPDATE_LOGGER.ERROR_LOG)
326        clear_resource(err_clear=True)
327        return False
328
329    if not get_source_package_path(source_package):
330        return False
331    partition_change = OPTIONS_MANAGER.init.invoke_event(PARTITION_CHANGE_EVENT)
332    if callable(partition_change) and partition_change() is False:
333        return False
334    UPDATE_LOGGER.print_log("Partition interception check finish.", UPDATE_LOGGER.INFO_LOG)
335    xml_path = ''
336    if OPTIONS_MANAGER.source_package_dir is not False:
337        xml_path = os.path.join(OPTIONS_MANAGER.source_package_dir, UPDATER_CONFIG, XML_FILE_PATH)
338    if OPTIONS_MANAGER.source_package_dir is False:
339        OPTIONS_MANAGER.source_package_temp_obj = None
340        OPTIONS_MANAGER.source_package_dir = None
341    if os.path.exists(xml_path):
342        with open(xml_path, 'r') as xml_file:
343            xml_str = xml_file.read()
344    else:
345        UPDATE_LOGGER.print_log("XML file does not exist! xml path: %s" %
346                                xml_path, UPDATE_LOGGER.ERROR_LOG)
347        return False
348
349    xml_content_dict = xmltodict.parse(xml_str, encoding='utf-8')
350    package_dict = xml_content_dict.get('package', {})
351    get_update_config_softversion(OPTIONS_MANAGER.source_package_dir, package_dict.get('head', {}))
352    head_dict = package_dict.get('head', {}).get('info')
353    OPTIONS_MANAGER.source_package_version = head_dict.get("@softVersion")
354    no_need_version_check_res = OPTIONS_MANAGER.init.invoke_event(DECOUPLED_EVENT)
355    if no_need_version_check_res is False:
356        if check_package_version(OPTIONS_MANAGER.target_package_version,
357                                OPTIONS_MANAGER.source_package_version) is False:
358            clear_resource(err_clear=True)
359            return False
360    return True
361
362
363def check_userdata_image():
364    """
365    Check the userdata image. Updating this image is prohibited.
366    :return:
367    """
368    if 'userdata' in OPTIONS_MANAGER.full_img_list or \
369            'userdata' in OPTIONS_MANAGER.incremental_img_list:
370        UPDATE_LOGGER.print_log(
371            "userdata image does not participate in update!"
372            "Please check xml config, path: %s!" %
373            os.path.join(OPTIONS_MANAGER.target_package_config_dir,
374                         XML_FILE_PATH),
375            UPDATE_LOGGER.ERROR_LOG)
376        clear_resource(err_clear=True)
377        return False
378    return True
379
380
381def check_images_list():
382    """
383    Check full_img_list and incremental_img_list.
384    If their lengths are 0, an error will be logged.
385    :return:
386    """
387    if len(OPTIONS_MANAGER.full_img_list) == 0 and \
388            len(OPTIONS_MANAGER.incremental_img_list) == 0:
389        UPDATE_LOGGER.print_log(
390            "The image list is empty!"
391            "Please check xml config, path: %s!" %
392            os.path.join(OPTIONS_MANAGER.target_package_config_dir,
393                         XML_FILE_PATH),
394            UPDATE_LOGGER.ERROR_LOG)
395        clear_resource(err_clear=True)
396        return False
397    return True
398
399
400def check_target_package_path(target_package):
401    """
402    Check the target_package path.
403    :param target_package: target package path
404    :return:
405    """
406    if os.path.isdir(target_package):
407        OPTIONS_MANAGER.target_package_dir = target_package
408        temp_dir_list = os.listdir(target_package)
409        if UPDATER_CONFIG in temp_dir_list:
410            OPTIONS_MANAGER.target_package_config_dir = \
411                os.path.join(target_package, UPDATER_CONFIG)
412        else:
413            UPDATE_LOGGER.print_log(
414                "Exception's target package path! path: %s" %
415                target_package, UPDATE_LOGGER.ERROR_LOG)
416            return False
417    elif target_package.endswith('.zip'):
418        # Decompress the target package.
419        tmp_dir_obj, unzip_dir = unzip_package(target_package)
420        if tmp_dir_obj is False or unzip_dir is False:
421            clear_resource(err_clear=True)
422            return False
423        OPTIONS_MANAGER.target_package_dir = unzip_dir
424        OPTIONS_MANAGER.target_package_temp_obj = tmp_dir_obj
425        OPTIONS_MANAGER.target_package_config_dir = \
426            os.path.join(unzip_dir, UPDATER_CONFIG)
427    else:
428        UPDATE_LOGGER.print_log(
429            "Input Update Package type exception! path: %s" %
430            target_package, UPDATE_LOGGER.ERROR_LOG)
431        clear_resource(err_clear=True)
432        return False
433    return True
434
435
436def check_miss_private_key(private_key):
437    """
438    Check private key.
439    :param private_key:
440    :return:
441    """
442    if private_key is None:
443        UPDATE_LOGGER.print_log(
444            "Private key is None, update package cannot be signed! "
445            "Please specify the signature private key by -pk.",
446            UPDATE_LOGGER.ERROR_LOG)
447        clear_resource(err_clear=True)
448        return False
449    return True
450
451
452def check_package_version(target_ver, source_ver):
453    """
454    target_ver: target version
455    source_ver: source version
456    return:
457    """
458    try:
459        target_num = ''.join(target_ver.split(' ')[-1].replace('.', ''))
460        source_num = ''.join(source_ver.split(' ')[-1].replace('.', ''))
461        if int(target_num) <= int(source_num):
462            UPDATE_LOGGER.print_log(
463                'Target package version %s <= Source package version!'
464                'Unable to make updater package!',
465                UPDATE_LOGGER.ERROR_LOG)
466            return False
467    except ValueError:
468        UPDATE_LOGGER.print_log('your package version number is not compliant.'
469                                'Please check your package version number!',
470                                UPDATE_LOGGER.ERROR_LOG)
471        return False
472    return True
473
474
475def generate_image_map_file(image_path, map_path, image_name):
476    """
477    :param image_path: image path
478    :param map_path: image map file path
479    :param image_name: image name
480    :return:
481    """
482    if not os.path.exists(image_path):
483        UPDATE_LOGGER.print_log("The source %s.img file is missing from the"
484            "source package, cannot be incrementally processed. ",
485            image_name, UPDATE_LOGGER.ERROR_LOG)
486        return False
487
488    cmd = \
489        [E2FSDROID_PATH, "-B", map_path, "-a", "/%s" % image_name, image_path, "-e"]
490
491    sub_p = subprocess.Popen(
492            cmd, shell=False, stdout=subprocess.PIPE,
493            stderr=subprocess.STDOUT)
494    sub_p.wait()
495
496    if not os.path.exists(map_path):
497        UPDATE_LOGGER.print_log("%s generate image map file failed."
498                                % image_path)
499        return False
500    return True
501
502
503def get_file_sha256(update_package):
504    sha256obj = hashlib.sha256()
505    maxbuf = 8192
506    with open(update_package, 'rb') as package_file:
507        while True:
508            buf = package_file.read(maxbuf)
509            if not buf:
510                break
511            sha256obj.update(buf)
512    hash_value = sha256obj.hexdigest()
513    return str(hash_value).upper()
514
515
516def write_image_patch_script(partition, src_image_path, tgt_image_path,
517                             script_check_cmd_list, script_write_cmd_list, verse_script):
518    """
519    Add command content to the script.
520    :param partition: image name
521    :param script_check_cmd_list: incremental check command list
522    :param script_write_cmd_list: incremental write command list
523    :param verse_script: verse script object
524    :return:
525    """
526    src_sha = get_file_sha256(src_image_path)
527    src_size = os.path.getsize(src_image_path)
528    tgt_sha = get_file_sha256(tgt_image_path)
529    tgt_size = os.path.getsize(tgt_image_path)
530
531    sha_check_cmd = verse_script.image_sha_check(partition,
532        src_size, src_sha, tgt_size, tgt_sha)
533
534    first_block_check_cmd = verse_script.first_block_check(partition)
535
536    abort_cmd = verse_script.abort(partition)
537
538    cmd = 'if ({sha_check_cmd} != 0)' \
539            '{{\n    {abort_cmd}}}\n'.format(
540            sha_check_cmd=sha_check_cmd,
541            abort_cmd=abort_cmd)
542
543    script_check_cmd_list.append(cmd)
544
545    image_patch_cmd = verse_script.image_patch(partition, os.path.getsize(src_image_path),
546        get_file_sha256(src_image_path), os.path.getsize(tgt_image_path),
547        get_file_sha256(tgt_image_path))
548
549    cmd = '%s_WRITE_FLAG%s' % (partition, image_patch_cmd)
550    script_write_cmd_list.append(cmd)
551    return True
552
553
554def increment_image_diff_processing(
555        partition, src_image_path, tgt_image_path,
556        script_check_cmd_list, script_write_cmd_list, verse_script):
557    """
558    Incremental image processing
559    :param verse_script: verse script
560    :param incremental_img_list: incremental image list
561    :param source_package_dir: source package path
562    :param target_package_dir: target package path
563    :return:
564    """
565    patch_file_obj = tempfile.NamedTemporaryFile(
566            prefix="%s_patch.dat-" % partition, mode='wb')
567    OPTIONS_MANAGER.incremental_image_file_obj_dict[partition] = patch_file_obj
568    cmd = [DIFF_EXE_PATH]
569
570    cmd.extend(['-s', src_image_path, '-d', tgt_image_path,
571                '-p', patch_file_obj.name, '-l', '4096'])
572    sub_p = subprocess.Popen(cmd, stdout=subprocess.PIPE,
573                                stderr=subprocess.STDOUT)
574    try:
575        output, _ = sub_p.communicate(timeout=1800)
576    except subprocess.TimeoutExpired:
577        sub_p.kill()
578
579    sub_p.wait()
580    if sub_p.returncode != 0:
581        raise ValueError(output)
582    return write_image_patch_script(partition, src_image_path, tgt_image_path,
583        script_check_cmd_list, script_write_cmd_list, verse_script)
584
585
586def add_incremental_command(verse_script, script_check_cmd_list, script_write_cmd_list):
587    """
588    add command for increment_image_progressing to verse_script
589    :param verse_script: verse script
590    :param script_check_cmd_list: verse_script check command list
591    :param script_write_cmd_list: verse_script write command list
592    :return:
593    """
594    verse_script.add_command("\n# ---- start incremental check here ----\n")
595    for each_check_cmd in script_check_cmd_list:
596        verse_script.add_command(each_check_cmd)
597    verse_script.add_command("\n# ---- start incremental write here ----\n")
598    for each_write_cmd in script_write_cmd_list:
599        verse_script.add_command(each_write_cmd)
600
601
602def increment_image_processing(
603        verse_script, incremental_img_list, source_package_dir,
604        target_package_dir):
605    """
606    Incremental image processing
607    :param verse_script: verse script
608    :param incremental_img_list: incremental image list
609    :param source_package_dir: source package path
610    :param target_package_dir: target package path
611    :return:
612    """
613    script_check_cmd_list = []
614    script_write_cmd_list = []
615    patch_process = None
616    for each_img_name in OPTIONS_MANAGER.incremental_img_name_list:
617        each_img = each_img_name[:-4]
618        each_src_image_path = os.path.join(source_package_dir, '%s.img' % each_img)
619        each_src_map_path = os.path.join(source_package_dir, '%s.map' % each_img)
620        each_tgt_image_path = os.path.join(target_package_dir, '%s.img' % each_img)
621        each_tgt_map_path = os.path.join(target_package_dir, '%s.map' % each_img)
622
623        check_make_map_path(each_img)
624
625        if filecmp.cmp(each_src_image_path, each_tgt_image_path):
626            UPDATE_LOGGER.print_log("Source Image is the same as Target Image! src image path: %s, tgt image path: %s"
627                % (each_src_image_path, each_tgt_image_path), UPDATE_LOGGER.INFO_LOG)
628            OPTIONS_MANAGER.incremental_img_list.remove(each_img)
629            continue
630
631        src_generate_map = True
632        tgt_generate_map = True
633        if not os.path.exists(each_src_map_path):
634            src_generate_map = generate_image_map_file(each_src_image_path, each_src_map_path, each_img)
635
636        if not os.path.exists(each_tgt_map_path):
637            tgt_generate_map = generate_image_map_file(each_tgt_image_path, each_tgt_map_path, each_img)
638
639        if not src_generate_map or not tgt_generate_map:
640            if increment_image_diff_processing(each_img, each_src_image_path, each_tgt_image_path,
641                script_check_cmd_list, script_write_cmd_list, verse_script) is True:
642                continue
643            UPDATE_LOGGER.print_log("increment_image_diff_processing %s failed" % each_img)
644            clear_resource(err_clear=True)
645            return False
646
647        src_image_class = IncUpdateImage(each_src_image_path, each_src_map_path)
648        tgt_image_class = IncUpdateImage(each_tgt_image_path, each_tgt_map_path)
649        OPTIONS_MANAGER.src_image = src_image_class
650        OPTIONS_MANAGER.tgt_image = tgt_image_class
651
652        inc_image = OPTIONS_MANAGER.init.invoke_event(INC_IMAGE_EVENT)
653        if inc_image:
654            src_image_class, tgt_image_class = inc_image()
655
656        transfers_manager = TransfersManager(each_img, tgt_image_class, src_image_class)
657        transfers_manager.find_process_needs()
658        actions_list = transfers_manager.get_action_list()
659
660        graph_process = GigraphProcess(actions_list, src_image_class, tgt_image_class)
661        actions_list = graph_process.actions_list
662        patch_process = patch_package_process.PatchProcess(each_img, tgt_image_class, src_image_class, actions_list)
663        patch_process.patch_process()
664        patch_process.write_script(each_img, script_check_cmd_list, script_write_cmd_list, verse_script)
665        OPTIONS_MANAGER.incremental_block_file_obj_dict[each_img] = patch_process.package_patch_zip
666
667        if not check_patch_file(patch_process):
668            UPDATE_LOGGER.print_log('Verify the incremental result failed!', UPDATE_LOGGER.ERROR_LOG)
669            raise RuntimeError
670
671    add_incremental_command(verse_script, script_check_cmd_list, script_write_cmd_list)
672    return True
673
674
675def check_patch_file(patch_process):
676    new_dat_file_obj, patch_dat_file_obj, transfer_list_file_obj = \
677        patch_process.package_patch_zip.get_file_obj()
678    with open(transfer_list_file_obj.name) as f_t:
679        num = 0
680        diff_str = None
681        diff_num = 0
682        for line in f_t:
683            if line.startswith('new '):
684                each_line_list = \
685                    line.strip().replace("new ", "").split(",")[1:]
686                for idx in range(0, len(each_line_list), 2):
687                    num += \
688                        int(each_line_list[idx + 1]) - int(each_line_list[idx])
689                continue
690            if line.startswith('bsdiff ') or line.startswith('pkgdiff '):
691                diff_str = line
692        if diff_str:
693            diff_list = diff_str.split('\n')[0].split(' ')
694            diff_num = int(diff_list[1]) + int(diff_list[2])
695    check_flag = \
696        (os.path.getsize(new_dat_file_obj.name) == num * PER_BLOCK_SIZE) and \
697        (os.path.getsize(patch_dat_file_obj.name) == diff_num)
698    return check_flag
699
700
701def check_make_map_path(each_img):
702    """
703    If env does not exist, the command for map generation does not exist
704    in the environment variable, and False will be returned.
705    """
706    try:
707        cmd = [E2FSDROID_PATH, " -h"]
708        subprocess.Popen(cmd, shell=False, stdout=subprocess.PIPE,
709                         stderr=subprocess.STDOUT)
710    except FileNotFoundError:
711        UPDATE_LOGGER.print_log(
712            "Command not found, need check the env! "
713            "Make %s.map failed!" % each_img,
714            UPDATE_LOGGER.ERROR_LOG)
715        clear_resource(err_clear=True)
716        raise RuntimeError
717    return True
718
719
720def incremental_processing(no_zip, partition_file, source_package,
721                           verse_script):
722    """
723    Incremental processing.
724    :param no_zip: no zip mode
725    :param partition_file: partition xml file path
726    :param source_package: source package path
727    :param verse_script: verse script obj
728    :return : processing result
729    """
730    if len(OPTIONS_MANAGER.incremental_img_list) != 0:
731        if check_incremental_args(no_zip, partition_file, source_package,
732                                  OPTIONS_MANAGER.incremental_img_list) \
733                is False:
734            return False
735        if increment_image_processing(
736                verse_script, OPTIONS_MANAGER.incremental_img_list,
737                OPTIONS_MANAGER.source_package_dir,
738                OPTIONS_MANAGER.target_package_dir) is False:
739            return False
740    else:
741        if source_package is not None:
742            UPDATE_LOGGER.print_log(
743                "There is no incremental image, "
744                "the - S parameter is not required!",
745                UPDATE_LOGGER.ERROR_LOG)
746            raise RuntimeError
747
748
749def check_args(private_key, source_package, target_package, update_package):
750    """
751    Input args check.
752    :param private_key: private key path
753    :param source_package: source package path
754    :param target_package: target package path
755    :param update_package: output package path
756    :return : Judgment result
757    """
758    if source_package is False or private_key is False or \
759            target_package is False or update_package is False:
760        return False
761    if check_miss_private_key(private_key) is False:
762        return False
763    if check_target_package_path(target_package) is False:
764        return False
765    if get_update_info() is False:
766        return False
767    if check_images_list() is False:
768        return False
769    return True
770
771
772def unpack_package_processing():
773    if OPTIONS_MANAGER.unpack_package_path:
774        package = UnpackPackage()
775        if not package.unpack_package():
776            UPDATE_LOGGER.print_log("Unpack update package.bin failed!", UPDATE_LOGGER.ERROR_LOG)
777            clear_resource(err_clear=True)
778            sys.exit(1)
779        UPDATE_LOGGER.print_log("Unpack update package.bin success!")
780        clear_resource()
781        sys.exit(0)
782
783
784create_entrance_args()
785
786
787def main():
788    """
789    Entry function.
790    """
791    parse_args()
792
793    OPTIONS_MANAGER.product = PRODUCT
794
795    source_package, target_package, update_package, no_zip, not_l2, \
796        partition_file, signing_algorithm, hash_algorithm, private_key = get_args()
797    if not_l2:
798        no_zip = True
799
800    # Unpack updater package
801    unpack_package_processing()
802
803    if OPTIONS_MANAGER.sd_card:
804        if source_package is not None or OPTIONS_MANAGER.xml_path is not None or partition_file is not None:
805            UPDATE_LOGGER.print_log("SDCard updater:-S/-xp/-pf parameter is not required!", UPDATE_LOGGER.ERROR_LOG)
806            raise RuntimeError
807    if check_args(private_key, source_package, target_package, update_package) is False:
808        clear_resource(err_clear=True)
809        return
810
811    if not OPTIONS_MANAGER.sd_card:
812        if check_userdata_image() is False:
813            clear_resource(err_clear=True)
814            return
815
816    # Create a Script object.
817    prelude_script, verse_script, refrain_script, ending_script = get_script_obj()
818
819    # Create partition.
820    if partition_file is not None:
821        verse_script.add_command("\n# ---- do updater partitions ----\n")
822        updater_partitions_cmd = verse_script.updater_partitions()
823        verse_script.add_command(updater_partitions_cmd)
824
825        partition_file_obj, partitions_list, partitions_file_path_list = parse_partition_file_xml(partition_file)
826        if partition_file_obj is False:
827            clear_resource(err_clear=True)
828            return False
829        OPTIONS_MANAGER.partition_file_obj = partition_file_obj
830        OPTIONS_MANAGER.full_img_list = partitions_list
831        OPTIONS_MANAGER.full_image_path_list = partitions_file_path_list
832
833    if incremental_processing(no_zip, partition_file, source_package, verse_script) is False:
834        clear_resource(err_clear=True)
835        return
836
837    # Full processing
838    if len(OPTIONS_MANAGER.full_img_list) != 0:
839        verse_script.add_command("\n# ---- full image ----\n")
840        full_update_image = FullUpdateImage(OPTIONS_MANAGER.target_package_dir,
841                            OPTIONS_MANAGER.full_img_list, OPTIONS_MANAGER.full_img_name_list, verse_script,
842                            OPTIONS_MANAGER.full_image_path_list, no_zip=OPTIONS_MANAGER.no_zip)
843        full_image_content_len_list, full_image_file_obj_list = full_update_image.update_full_image()
844        if full_image_content_len_list is False or full_image_file_obj_list is False:
845            clear_resource(err_clear=True)
846            return
847        OPTIONS_MANAGER.full_image_content_len_list, OPTIONS_MANAGER.full_image_file_obj_list = \
848            full_image_content_len_list, full_image_file_obj_list
849
850    # Generate the update package.
851    if build_update_package(
852        no_zip, update_package, prelude_script, verse_script, refrain_script, ending_script) is False:
853        clear_resource(err_clear=True)
854        return
855    # Clear resources.
856    clear_resource()
857
858
859if __name__ == '__main__':
860    main()
861