blob: 98e17e0e23942b5c0e5acdae97a60bccbac486bd [file] [log] [blame]
Bill Richardsonc09b94f2010-03-15 11:40:30 -07001#!/bin/bash
2
3# Copyright (c) 2009 The Chromium OS Authors. All rights reserved.
4# Use of this source code is governed by a BSD-style license that can be
5# found in the LICENSE file.
6
7# Script to build a bootable keyfob-based chromeos system image from within
8# a chromiumos setup. This assumes that all needed packages have been built into
9# the given target's root with binary packages turned on. This script will
10# build the Chrome OS image using only pre-built binary packages.
11
Greg Spencer798d75f2011-02-01 22:04:49 -080012# Load common CrOS utilities. Inside the chroot this file is installed in
13# /usr/lib/crosutils. Outside the chroot we find it relative to the script's
14# location.
15find_common_sh() {
David James17d44e32011-02-08 14:48:51 -080016 local common_paths=(/usr/lib/crosutils $(dirname "$0"))
Greg Spencer798d75f2011-02-01 22:04:49 -080017 local path
Bill Richardsonc09b94f2010-03-15 11:40:30 -070018
Greg Spencer798d75f2011-02-01 22:04:49 -080019 SCRIPT_ROOT=
20 for path in "${common_paths[@]}"; do
David James17d44e32011-02-08 14:48:51 -080021 local common="${path}/common.sh"
22 if ([ -r "${common}" ] && . "${common}" && [ -d "${SCRIPTS_DIR}" ]); then
Greg Spencer798d75f2011-02-01 22:04:49 -080023 SCRIPT_ROOT=${path}
24 break
25 fi
26 done
27}
28
29find_common_sh
David James17d44e32011-02-08 14:48:51 -080030. "${SCRIPT_ROOT}/common.sh" || ! echo "Unable to load common.sh" || exit 1
Greg Spencer798d75f2011-02-01 22:04:49 -080031
32# Load functions and constants for chromeos-install
33[ -f /usr/lib/installer/chromeos-common.sh ] && \
34 INSTALLER_ROOT=/usr/lib/installer || \
35 INSTALLER_ROOT=$(dirname "$(readlink -f "$0")")
36
37. "${INSTALLER_ROOT}/chromeos-common.sh" || \
38 die "Unable to load chromeos-common.sh"
39
Will Drewry4a675e12010-07-03 13:35:02 -050040locate_gpt
41
Bill Richardsonc09b94f2010-03-15 11:40:30 -070042# Script must be run inside the chroot.
Greg Spencer798d75f2011-02-01 22:04:49 -080043restart_in_chroot_if_needed "$@"
Bill Richardsonc09b94f2010-03-15 11:40:30 -070044
45get_default_board
46
47# Flags.
Don Garrette0020b12010-06-17 15:55:35 -070048DEFINE_string board "${DEFAULT_BOARD}" \
Bill Richardsonc09b94f2010-03-15 11:40:30 -070049 "The board to build an image for."
50DEFINE_string build_root "/build" \
51 "The root location for board sysroots."
52DEFINE_integer build_attempt 1 \
53 "The build attempt for this image build."
54DEFINE_string output_root "${DEFAULT_BUILD_ROOT}/images" \
55 "Directory in which to place image result directories (named by version)"
David Jamesffede3b2010-09-07 14:22:38 -070056DEFINE_boolean eclean ${FLAGS_TRUE} \
57 "Perform eclean-<board> -d as part of this script to remove obsolete packages"
Don Garrette0020b12010-06-17 15:55:35 -070058DEFINE_boolean replace ${FLAGS_FALSE} \
Bill Richardsonc09b94f2010-03-15 11:40:30 -070059 "Overwrite existing output, if any."
Don Garrette0020b12010-06-17 15:55:35 -070060DEFINE_boolean withdev ${FLAGS_TRUE} \
Bill Richardsonc09b94f2010-03-15 11:40:30 -070061 "Include useful developer friendly utilities in the image."
Don Garrette0020b12010-06-17 15:55:35 -070062DEFINE_boolean installmask ${FLAGS_TRUE} \
Bill Richardsonc09b94f2010-03-15 11:40:30 -070063 "Use INSTALL_MASK to shrink the resulting image."
64DEFINE_integer jobs -1 \
65 "How many packages to build in parallel at maximum."
Don Garrette0020b12010-06-17 15:55:35 -070066DEFINE_boolean statefuldev ${FLAGS_TRUE} \
Chris Sosa4bffb8b2010-04-07 17:23:54 -070067 "Install development packages on stateful partition rather than the rootfs"
Antoine Laboure9e585f2010-04-01 15:57:57 -070068DEFINE_string to "" \
69 "The target image file or device"
Don Garrette0020b12010-06-17 15:55:35 -070070DEFINE_boolean factory_install ${FLAGS_FALSE} \
Tom Wai-Hong Tamf87a3672010-05-17 16:06:33 +080071 "Build a smaller image to overlay the factory install shim on; this argument \
72is also required in image_to_usb."
Tan Gao843b70a2010-08-17 09:41:48 -070073DEFINE_boolean dev_install ${FLAGS_FALSE} \
74 "Build a smaller image to overlay the dev recovery install shim on"
Zelidrag Hornung1d12c1a2010-06-02 10:20:29 -070075DEFINE_integer rootfs_partition_size 1024 \
Will Drewryd253bad2010-08-17 14:09:41 -050076 "rootfs partition size in MiBs."
Andrew de los Reyes0eb6d762010-11-01 18:27:53 -070077DEFINE_integer rootfs_size 850 \
Will Drewryd253bad2010-08-17 14:09:41 -050078 "rootfs filesystem size in MiBs."
Will Drewry78992a32010-07-21 14:02:20 -050079# ceil(0.1 * rootfs_size) is a good minimum.
80DEFINE_integer rootfs_hash_pad 8 \
Will Drewryd253bad2010-08-17 14:09:41 -050081 "MiBs reserved at the end of the rootfs image."
Eric Li5cf288f2010-06-28 12:46:26 -070082DEFINE_integer statefulfs_size 1024 \
Will Drewryd253bad2010-08-17 14:09:41 -050083 "stateful filesystem size in MiBs."
David James868d7bb2010-06-24 21:48:14 -070084DEFINE_boolean preserve ${FLAGS_FALSE} \
85 "Attempt to preserve the previous build image if one can be found (unstable, \
86kernel/firmware not updated)"
David James03668642010-07-28 17:08:29 -070087DEFINE_boolean fast ${DEFAULT_FAST} \
88 "Call many emerges in parallel"
Will Drewry32d8c112010-10-11 15:37:17 -050089DEFINE_string boot_args "noinitrd" \
90 "Additional boot arguments to pass to the commandline"
Nick Sandersf2dee6c2010-07-01 00:21:32 -070091
Will Drewry4a675e12010-07-03 13:35:02 -050092DEFINE_string usb_disk /dev/sdb3 \
93 "Path syslinux should use to do a usb boot. Default: /dev/sdb3"
94
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +080095# TODO(clchiou): Remove this flag after arm verified boot is stable
96DEFINE_boolean crosbug12352_arm_kernel_signing ${FLAGS_FALSE} \
97 "Sign kernel partition for ARM images (temporary hack)."
98
Will Drewry12f14ce2010-08-17 17:27:16 -050099DEFINE_boolean enable_rootfs_verification ${FLAGS_TRUE} \
Will Drewry1670d482010-07-09 13:08:38 -0700100 "Default all bootloaders to use kernel-based root fs integrity checking."
Will Drewryd07f61d2011-01-12 10:39:54 -0600101DEFINE_integer verity_error_behavior 3 \
Will Drewry137eab62010-11-04 22:06:41 -0500102 "Kernel verified boot error behavior (0: I/O errors, 1: panic, 2: nothing, \
Will Drewryd07f61d2011-01-12 10:39:54 -06001033: cros) Default: 3"
Will Drewry1670d482010-07-09 13:08:38 -0700104DEFINE_integer verity_depth 1 \
105 "Kernel verified boot hash tree depth. Default: 1"
Will Drewry52c40f82010-10-06 14:54:38 -0500106DEFINE_integer verity_max_ios -1 \
107 "Number of outstanding I/O operations dm-verity caps at. Default: -1"
Will Drewry1670d482010-07-09 13:08:38 -0700108DEFINE_string verity_algorithm "sha1" \
109 "Cryptographic hash algorithm used for kernel vboot. Default : sha1"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700110
111# Parse command line.
112FLAGS "$@" || exit 1
113eval set -- "${FLAGS_ARGV}"
114
115# Only now can we die on error. shflags functions leak non-zero error codes,
116# so will die prematurely if 'set -e' is specified before now.
117set -e
118
Don Garrette0020b12010-06-17 15:55:35 -0700119if [ -z "${FLAGS_board}" ] ; then
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700120 error "--board is required."
121 exit 1
122fi
123
Chris Sosae38f90f2010-10-20 16:04:23 -0700124check_blacklist() {
125 info "Verifying that the base image does not contain a blacklisted package."
126 info "Generating list of packages for chromeos-base/chromeos."
127 local package_blacklist_file="${SCRIPTS_DIR}/chromeos_blacklist"
128 if [ ! -e "${package_blacklist_file}" ]; then
129 warn "Missing blacklist file."
130 return
131 fi
132 local blacklisted_packages=$(${SCRIPTS_DIR}/get_package_list \
133 --board="${FLAGS_board}" chromeos-base/chromeos \
134 | grep -x -f "${package_blacklist_file}")
135 if [ -n "${blacklisted_packages}" ]; then
136 die "Blacklisted packages found: ${blacklisted_packages}."
137 fi
138 info "No blacklisted packages found."
139}
140
141check_blacklist
142
Darin Petkovab463c02011-02-17 10:42:24 -0800143# TODO(petkov): Remove along with the --move_to_etc flag support once the
144# transition dust settles.
145"${SCRIPTS_DIR}"/set_shared_user_password.sh --move_to_etc
146
Tan Gao843b70a2010-08-17 09:41:48 -0700147# Verify user didn't specify incompatible flags for dev install shim
Nick Sandersc8cb3362010-09-01 21:31:30 -0700148if [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ] &&
149 [ "${FLAGS_dev_install}" -eq "${FLAGS_TRUE}" ] ; then
150 die "Incompatible flags: --factory_install and --dev_install cannot be \
Tan Gao843b70a2010-08-17 09:41:48 -0700151both set to True. Please specify one or none."
Tan Gao843b70a2010-08-17 09:41:48 -0700152fi
153
Nick Sandersae26a5c2010-08-30 21:59:50 -0700154INSTALL_MASK=""
Nick Sandersc8cb3362010-09-01 21:31:30 -0700155if [ "${FLAGS_installmask}" -eq "${FLAGS_TRUE}" ] ; then
Nick Sandersae26a5c2010-08-30 21:59:50 -0700156 INSTALL_MASK="${DEFAULT_INSTALL_MASK}"
157fi
158
159# Reduce the size of factory install shim.
Nick Sandersc8cb3362010-09-01 21:31:30 -0700160if [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ] ||
161 [ "${FLAGS_dev_install}" -eq "${FLAGS_TRUE}" ] ; then
Nick Sandersae26a5c2010-08-30 21:59:50 -0700162 # Disable --withdev flag when --*_install is set to True. Otherwise, the
163 # dev image produced will be based on install shim, rather than a pristine
164 # image
Nick Sandersc8cb3362010-09-01 21:31:30 -0700165 if [ "${FLAGS_withdev}" -eq "${FLAGS_TRUE}" ]; then
Nick Sandersae26a5c2010-08-30 21:59:50 -0700166 info "Incompatible flags: --withdev and --dev_install or --factory_install \
167cannot be both set to True. Reset --withdev to False."
168 FLAGS_withdev=${FLAGS_FALSE}
169 fi
170
171 # TODO: Build a separated ebuild for the install shim to reduce size.
172 INSTALL_MASK="${INSTALL_MASK} ${FACTORY_INSTALL_MASK}"
173
174 info "Fixing the rootfs size at 300 MiB for install shim"
175 FLAGS_rootfs_size=280
176 FLAGS_rootfs_partition_size=300
177 info "Fixing the statefulfs size at 140 MiB for install shim"
178 FLAGS_statefulfs_size=140
179fi
180
181if [ "$((FLAGS_rootfs_size + FLAGS_rootfs_hash_pad))" -gt \
182 "${FLAGS_rootfs_partition_size}" ] ; then
183 die "rootfs ($((FLAGS_rootfs_size + FLAGS_rootfs_hash_pad)) MiB) is \
184bigger than partition (${FLAGS_rootfs_partition_size} MiB)."
Tan Gao843b70a2010-08-17 09:41:48 -0700185fi
186
Nick Sanders8ab729a2010-06-16 03:15:17 -0700187EMERGE_BOARD_CMD="emerge-${FLAGS_board}"
Nick Sandersf2dee6c2010-07-01 00:21:32 -0700188if [ "${FLAGS_fast}" -eq "${FLAGS_TRUE}" ]; then
Nick Sanders8ab729a2010-06-16 03:15:17 -0700189 echo "Using alternate emerge"
David James1ed7fe62011-02-14 14:49:25 -0800190 EMERGE_CMD="${GCLIENT_ROOT}/chromite/bin/parallel_emerge"
191 EMERGE_BOARD_CMD="${EMERGE_CMD} --board=${FLAGS_board}"
Nick Sanders8ab729a2010-06-16 03:15:17 -0700192fi
193
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700194# Determine build version.
David McMahon48db5d22010-12-14 16:19:24 -0800195. ${SRC_ROOT}/third_party/chromiumos-overlay/chromeos/config/chromeos_version.sh
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700196
Nick Sandersc8cb3362010-09-01 21:31:30 -0700197# Configure extra USE or packages for this type of build.
198EXTRA_PACKAGES=""
199EXTRA_USE=""
200if [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ] ; then
201 # Factory install needs to have the kernel initrmafs enabled,
202 # and the factory installer added.
Nick Sandersebce8542010-09-02 14:57:34 -0700203 EXTRA_PACKAGES="${EXTRA_PACKAGES} chromeos-base/chromeos-factoryinstall"
204 EXTRA_USE="${EXTRA_USE} initramfs"
Nick Sandersc8cb3362010-09-01 21:31:30 -0700205fi
206
207# Freshen kernel with correct USE flags. This is a noop if we have
208# the right kernel prebuilt. Factory install uses USE="initramfs".
209# We don't allow building from source with the image as a target,
210# and it's not possible to store prebuilts for the same package
211# with different use flags.
Mandeep Singh Baines4ea330f2010-11-17 18:11:58 -0800212USE="${EXTRA_USE} ${USE}" emerge-${FLAGS_board} \
Anush Elangovanbc2aaf62010-09-09 19:40:30 -0700213 -uNDvg --binpkg-respect-use=y virtual/kernel
Nick Sandersc8cb3362010-09-01 21:31:30 -0700214
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700215# Use canonical path since some tools (e.g. mount) do not like symlinks.
216# Append build attempt to output directory.
217IMAGE_SUBDIR="${CHROMEOS_VERSION_STRING}-a${FLAGS_build_attempt}"
218OUTPUT_DIR="${FLAGS_output_root}/${FLAGS_board}/${IMAGE_SUBDIR}"
Don Garrett3f41e152010-06-21 14:54:34 -0700219
220OUTSIDE_OUTPUT_DIR="../build/images/${FLAGS_board}/${IMAGE_SUBDIR}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700221
222# If we are creating a developer image, also create a pristine image with a
223# different name.
224DEVELOPER_IMAGE_NAME=
225PRISTINE_IMAGE_NAME=chromiumos_image.bin
Don Garrette0020b12010-06-17 15:55:35 -0700226if [ "${FLAGS_withdev}" -eq "${FLAGS_TRUE}" ]; then
Chris Sosa9673f3b2010-05-18 13:24:40 -0700227 PRISTINE_IMAGE_NAME=chromiumos_base_image.bin
228 DEVELOPER_IMAGE_NAME=chromiumos_image.bin
Nick Sandersae26a5c2010-08-30 21:59:50 -0700229elif [ "${FLAGS_dev_install}" -eq "${FLAGS_TRUE}" ]; then
230# Rename pristine images for install shims
Tan Gao843b70a2010-08-17 09:41:48 -0700231 PRISTINE_IMAGE_NAME=dev_install_shim.bin
Nick Sandersae26a5c2010-08-30 21:59:50 -0700232elif [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ]; then
233 PRISTINE_IMAGE_NAME=factory_install_shim.bin
Tan Gao843b70a2010-08-17 09:41:48 -0700234fi
235
David James868d7bb2010-06-24 21:48:14 -0700236PRISTINE_IMG="${OUTPUT_DIR}/${PRISTINE_IMAGE_NAME}"
237DEVELOPER_IMG="${OUTPUT_DIR}/${DEVELOPER_IMAGE_NAME}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700238
239BOARD="${FLAGS_board}"
240BOARD_ROOT="${FLAGS_build_root}/${BOARD}"
241
Don Garrett3f41e152010-06-21 14:54:34 -0700242ROOT_FS_IMG="${OUTPUT_DIR}/rootfs.image"
243ROOT_FS_DIR="${OUTPUT_DIR}/rootfs"
Will Drewry4a675e12010-07-03 13:35:02 -0500244ROOT_FS_HASH="${OUTPUT_DIR}/rootfs.hash"
Don Garrett3f41e152010-06-21 14:54:34 -0700245
246STATEFUL_FS_IMG="${OUTPUT_DIR}/stateful_partition.image"
247STATEFUL_FS_DIR="${OUTPUT_DIR}/stateful_partition"
248
249ESP_FS_IMG=${OUTPUT_DIR}/esp.image
250ESP_FS_DIR=${OUTPUT_DIR}/esp
251
Will Drewry7ab698d2010-08-05 13:57:52 -0500252DEVKEYSDIR="/usr/share/vboot/devkeys"
253
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700254LOOP_DEV=
Chris Sosa4bffb8b2010-04-07 17:23:54 -0700255STATEFUL_LOOP_DEV=
Bill Richardsona81df762010-04-09 08:12:05 -0700256ESP_LOOP_DEV=
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700257
Don Garrett3f41e152010-06-21 14:54:34 -0700258# ${DEV_IMAGE_ROOT} specifies the location of where developer packages will
259# be installed on the stateful dir. On a Chromium OS system, this will
260# translate to /usr/local.
261DEV_IMAGE_ROOT="${STATEFUL_FS_DIR}/dev_image"
262
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700263# What cross-build are we targeting?
264. "${BOARD_ROOT}/etc/make.conf.board_setup"
265LIBC_VERSION=${LIBC_VERSION:-"2.10.1-r1"}
266
Nick Sandersae26a5c2010-08-30 21:59:50 -0700267if [ ${FLAGS_jobs} -ne -1 ]; then
David Jamesfd7403a2010-07-09 12:00:17 -0700268 EMERGE_JOBS="--jobs=${FLAGS_jobs}"
269fi
270
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700271# Figure out ARCH from the given toolchain.
272# TODO: Move to common.sh as a function after scripts are switched over.
Don Garrette0020b12010-06-17 15:55:35 -0700273TC_ARCH=$(echo "${CHOST}" | awk -F'-' '{ print $1 }')
274case "${TC_ARCH}" in
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700275 arm*)
276 ARCH="arm"
277 ;;
278 *86)
279 ARCH="x86"
280 ;;
281 *)
Don Garrette0020b12010-06-17 15:55:35 -0700282 error "Unable to determine ARCH from toolchain: ${CHOST}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700283 exit 1
284esac
285
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +0800286if [[ ${FLAGS_crosbug12352_arm_kernel_signing} -eq ${FLAGS_TRUE} ]]; then
287 crosbug12352_flag="--crosbug12352_arm_kernel_signing"
288else
289 crosbug12352_flag="--nocrosbug12352_arm_kernel_signing"
290fi
Will Drewry12f14ce2010-08-17 17:27:16 -0500291if [[ ${FLAGS_enable_rootfs_verification} -eq ${FLAGS_TRUE} ]]; then
292 enable_rootfs_verification_flag="--enable_rootfs_verification"
Will Drewry12f14ce2010-08-17 17:27:16 -0500293fi
294
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700295# Hack to fix bug where x86_64 CHOST line gets incorrectly added.
296# ToDo(msb): remove this hack.
297PACKAGES_FILE="${BOARD_ROOT}/packages/Packages"
298sudo sed -e "s/CHOST: x86_64-pc-linux-gnu//" -i "${PACKAGES_FILE}"
299
300# Handle existing directory.
Don Garrette0020b12010-06-17 15:55:35 -0700301if [[ -e "${OUTPUT_DIR}" ]]; then
302 if [[ ${FLAGS_replace} -eq ${FLAGS_TRUE} ]]; then
303 sudo rm -rf "${OUTPUT_DIR}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700304 else
Don Garrette0020b12010-06-17 15:55:35 -0700305 echo "Directory ${OUTPUT_DIR} already exists."
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700306 echo "Use --build_attempt option to specify an unused attempt."
307 echo "Or use --replace if you want to overwrite this directory."
308 exit 1
309 fi
310fi
311
David James868d7bb2010-06-24 21:48:14 -0700312# Find previous build, if any...
313PREVIOUS_DIR=$($SCRIPTS_DIR/get_latest_image.sh --board="$BOARD")
314
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700315cleanup_rootfs_loop() {
Don Garrette0020b12010-06-17 15:55:35 -0700316 sudo umount -d "${ROOT_FS_DIR}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700317}
318
319cleanup_stateful_fs_loop() {
Chris Sosa4bffb8b2010-04-07 17:23:54 -0700320 sudo umount "${ROOT_FS_DIR}/usr/local"
321 sudo umount "${ROOT_FS_DIR}/var"
Don Garrett3f41e152010-06-21 14:54:34 -0700322 sudo umount -d "${STATEFUL_FS_DIR}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700323}
324
Bill Richardson8b3bd102010-04-06 15:00:10 -0700325cleanup_esp_loop() {
Don Garrett3f41e152010-06-21 14:54:34 -0700326 sudo umount -d "${ESP_FS_DIR}"
Bill Richardson8b3bd102010-04-06 15:00:10 -0700327}
328
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700329cleanup() {
330 # Disable die on error.
331 set +e
332
Don Garrette0020b12010-06-17 15:55:35 -0700333 if [[ -n "${STATEFUL_LOOP_DEV}" ]]; then
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700334 cleanup_stateful_fs_loop
Will Drewry4a675e12010-07-03 13:35:02 -0500335 STATEFUL_LOOP_DEV=
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700336 fi
337
Don Garrette0020b12010-06-17 15:55:35 -0700338 if [[ -n "${LOOP_DEV}" ]]; then
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700339 cleanup_rootfs_loop
Will Drewry4a675e12010-07-03 13:35:02 -0500340 LOOP_DEV=
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700341 fi
342
Don Garrette0020b12010-06-17 15:55:35 -0700343 if [[ -n "${ESP_LOOP_DEV}" ]]; then
Bill Richardson8b3bd102010-04-06 15:00:10 -0700344 cleanup_esp_loop
Will Drewry4a675e12010-07-03 13:35:02 -0500345 ESP_LOOP_DEV=
Bill Richardson8b3bd102010-04-06 15:00:10 -0700346 fi
347
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700348 # Turn die on error back on.
349 set -e
350}
351
Chris Sosabde8c1b2010-04-29 14:02:35 -0700352delete_prompt() {
353 echo "An error occurred in your build so your latest output directory" \
354 "is invalid."
Tan Gao74a07ca2010-09-09 11:41:30 -0700355
356 # Only prompt if both stdin and stdout are a tty. If either is not a tty,
357 # then the user may not be present, so we shouldn't bother prompting.
Zdenek Behan23bc6ca2011-02-10 02:04:58 +0100358 if tty -s && tty -s <&1 && [ "${USER}" != 'chrome-bot' ]; then
Tan Gao74a07ca2010-09-09 11:41:30 -0700359 read -p "Would you like to delete the output directory (y/N)? " SURE
360 SURE="${SURE:0:1}" # Get just the first character.
361 else
362 SURE="y"
363 echo "Running in non-interactive mode so deleting output directory."
364 fi
Chris Sosabde8c1b2010-04-29 14:02:35 -0700365 if [ "${SURE}" == "y" ] ; then
Don Garrette0020b12010-06-17 15:55:35 -0700366 sudo rm -rf "${OUTPUT_DIR}"
367 echo "Deleted ${OUTPUT_DIR}"
Chris Sosabde8c1b2010-04-29 14:02:35 -0700368 else
Tan Gao74a07ca2010-09-09 11:41:30 -0700369 echo "Not deleting ${OUTPUT_DIR}."
Chris Sosabde8c1b2010-04-29 14:02:35 -0700370 fi
371}
372
Chris Sosa9673f3b2010-05-18 13:24:40 -0700373# $1 - Directory where developer rootfs is mounted.
374# $2 - Directory where developer stateful_partition is mounted.
Will Drewry4a675e12010-07-03 13:35:02 -0500375# $3 - Directory where the ESP partition is mounted.
Don Garrett3f41e152010-06-21 14:54:34 -0700376mount_gpt_cleanup() {
Will Drewry4a675e12010-07-03 13:35:02 -0500377 local rootfs="${1-$ROOT_FS_DIR}"
378 local statefs="${2-$STATEFUL_FS_DIR}"
379 local espfs="${3-$ESP_FS_DIR}"
380 "${SCRIPTS_DIR}/mount_gpt_image.sh" \
381 -u -r "${rootfs}" -s "${statefs}" -e "${espfs}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700382 delete_prompt
383}
384
Will Drewry7ab698d2010-08-05 13:57:52 -0500385# Takes no arguments and populates the configuration for
386# cros_make_image_bootable.
387create_boot_desc() {
388 cat <<EOF > ${OUTPUT_DIR}/boot.desc
389 --arch="${ARCH}"
390 --output_dir="${OUTPUT_DIR}"
Will Drewry32d8c112010-10-11 15:37:17 -0500391 --boot_args="${FLAGS_boot_args}"
Will Drewry7ab698d2010-08-05 13:57:52 -0500392 --rootfs_size="${FLAGS_rootfs_size}"
393 --rootfs_hash_pad="${FLAGS_rootfs_hash_pad}"
394 --rootfs_hash="${ROOT_FS_HASH}"
395 --rootfs_mountpoint="${ROOT_FS_DIR}"
396 --statefulfs_mountpoint="${STATEFUL_FS_DIR}"
397 --espfs_mountpoint="${ESP_FS_DIR}"
398 --verity_error_behavior="${FLAGS_verity_error_behavior}"
399 --verity_depth="${FLAGS_verity_depth}"
400 --verity_max_ios="${FLAGS_verity_max_ios}"
401 --verity_algorithm="${FLAGS_verity_algorithm}"
402 --keys_dir="${DEVKEYSDIR}"
403 --usb_disk="${FLAGS_usb_disk}"
404 --nocleanup_dirs
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +0800405 ${crosbug12352_flag}
Will Drewry7ab698d2010-08-05 13:57:52 -0500406 ${enable_rootfs_verification_flag}
407EOF
Will Drewry4a675e12010-07-03 13:35:02 -0500408}
409
Don Garrett3f41e152010-06-21 14:54:34 -0700410# Modifies an existing image to add development packages
411update_dev_packages() {
412 local image_name=$1
Chris Sosa9673f3b2010-05-18 13:24:40 -0700413
Don Garrett3f41e152010-06-21 14:54:34 -0700414 echo "Adding developer packages to ${image_name}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700415
Will Drewry4a675e12010-07-03 13:35:02 -0500416 trap "mount_gpt_cleanup" EXIT
Tan Gaoa40ed442010-06-02 15:45:19 -0700417
Don Garrette0020b12010-06-17 15:55:35 -0700418 ${SCRIPTS_DIR}/mount_gpt_image.sh --from "${OUTPUT_DIR}" \
David James868d7bb2010-06-24 21:48:14 -0700419 --image "${image_name}" -r "${ROOT_FS_DIR}" \
Will Drewry4a675e12010-07-03 13:35:02 -0500420 -s "${STATEFUL_FS_DIR}" -e "${ESP_FS_DIR}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700421
Don Garrett3f41e152010-06-21 14:54:34 -0700422 # Determine the root dir for developer packages.
423 local root_dev_dir="${ROOT_FS_DIR}"
424 [ ${FLAGS_statefuldev} -eq ${FLAGS_TRUE} ] && \
425 root_dev_dir="${ROOT_FS_DIR}/usr/local"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700426
Don Garrett3f41e152010-06-21 14:54:34 -0700427 # Install developer packages described in chromeos-dev.
428 sudo INSTALL_MASK="${INSTALL_MASK}" ${EMERGE_BOARD_CMD} \
429 --root="${root_dev_dir}" --root-deps=rdeps \
David Jamesffede3b2010-09-07 14:22:38 -0700430 --usepkgonly -uDNv chromeos-dev ${EMERGE_JOBS}
David James868d7bb2010-06-24 21:48:14 -0700431
432 if [[ $FLAGS_preserve -eq ${FLAGS_TRUE} ]] ; then
433 # Clean out unused packages
434 sudo INSTALL_MASK="${INSTALL_MASK}" ${EMERGE_BOARD_CMD} \
435 --root="${ROOT_FS_DIR}" --root-deps=rdeps \
David Jamesffede3b2010-09-07 14:22:38 -0700436 --usepkgonly --depclean ${EMERGE_JOBS}
David James868d7bb2010-06-24 21:48:14 -0700437 fi
Chris Sosa9673f3b2010-05-18 13:24:40 -0700438
Paul Stewart12973e52010-09-09 20:04:11 -0700439 # Install the bare necessary files so that the "emerge" command works
David James49523432011-02-17 15:19:16 -0800440 if [ ${FLAGS_statefuldev} -eq ${FLAGS_TRUE} ]; then
David Jamese8875482011-02-23 15:24:14 -0800441 sudo cp -a ${root_dev_dir}/share/portage ${ROOT_FS_DIR}/usr/share
David James49523432011-02-17 15:19:16 -0800442 sudo sed -i s,/usr/bin/wget,wget, \
David Jamese8875482011-02-23 15:24:14 -0800443 ${ROOT_FS_DIR}/usr/share/portage/config/make.globals
David James49523432011-02-17 15:19:16 -0800444 fi
Paul Stewart12973e52010-09-09 20:04:11 -0700445 sudo mkdir -p ${ROOT_FS_DIR}/etc/make.profile
446
Chris Sosa9673f3b2010-05-18 13:24:40 -0700447 # Re-run ldconfig to fix /etc/ldconfig.so.cache.
Don Garrett3f41e152010-06-21 14:54:34 -0700448 sudo /sbin/ldconfig -r "${ROOT_FS_DIR}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700449
450 # Mark the image as a developer image (input to chromeos_startup).
Don Garrett3f41e152010-06-21 14:54:34 -0700451 sudo mkdir -p "${ROOT_FS_DIR}/root"
452 sudo touch "${ROOT_FS_DIR}/root/.dev_mode"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700453
Don Garrett3f41e152010-06-21 14:54:34 -0700454 # Additional changes to developer image.
Chris Sosa9673f3b2010-05-18 13:24:40 -0700455
Ken Mixter13347882010-08-12 16:51:52 -0700456 # Leave core files for developers to inspect.
Ken Mixter0d115632010-08-13 15:51:07 -0700457 sudo touch "${ROOT_FS_DIR}/root/.leave_core"
Ken Mixter13347882010-08-12 16:51:52 -0700458
Don Garrett3f41e152010-06-21 14:54:34 -0700459 # The ldd tool is a useful shell script but lives in glibc; just copy it.
460 sudo cp -a "$(which ldd)" "${root_dev_dir}/usr/bin"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700461
Don Garrett3f41e152010-06-21 14:54:34 -0700462 # If vim is installed, then a vi symlink would probably help.
463 if [[ -x "${ROOT_FS_DIR}/usr/local/bin/vim" ]]; then
464 sudo ln -sf vim "${ROOT_FS_DIR}/usr/local/bin/vi"
Girts Folkmanis7a8a8382010-05-18 22:52:25 -0700465 fi
Chris Sosa9673f3b2010-05-18 13:24:40 -0700466
Tammo Spalinkcfc0c642010-07-07 10:51:21 +0800467 # If pygtk is installed in stateful-dev, then install a path.
468 if [[ -d \
469 "${ROOT_FS_DIR}/usr/local/lib/python2.6/site-packages/gtk-2.0" ]]; then
470 sudo bash -c "\
471 echo gtk-2.0 > \
472 ${ROOT_FS_DIR}/usr/local/lib/python2.6/site-packages/pygtk.pth"
473 fi
474
Chris Sosa6304adc2010-10-20 13:40:33 -0700475 # If python is installed on stateful-dev, fix python symlinks.
476 local python_path="/usr/local/bin/python2.6"
477 if [ -e "${ROOT_FS_DIR}${python_path}" ]; then
478 info "Fixing python symlinks for developer and test images."
479 local python_paths="/usr/bin/python /usr/local/bin/python \
480 /usr/bin/python2 /usr/local/bin/python2"
481 for path in ${python_paths}; do
482 sudo rm -f "${ROOT_FS_DIR}${path}"
483 sudo ln -s ${python_path} "${ROOT_FS_DIR}${path}"
484 done
485 fi
486
Don Garrett3f41e152010-06-21 14:54:34 -0700487 # Check that the image has been correctly created. Only do it if not
Tan Gao843b70a2010-08-17 09:41:48 -0700488 # building a factory install image and not a dev install shim, as the
489 # INSTALL_MASK for it will make test_image fail.
490 if [ ${FLAGS_factory_install} -eq ${FLAGS_FALSE} ] &&
491 [ ${FLAGS_dev_install} -eq ${FLAGS_FALSE} ] ; then
Don Garrett3f41e152010-06-21 14:54:34 -0700492 "${SCRIPTS_DIR}/test_image" \
493 --root="${ROOT_FS_DIR}" \
494 --target="${ARCH}"
495 fi
496 echo "Developer image built and stored at ${image_name}"
497
Chris Sosa9673f3b2010-05-18 13:24:40 -0700498 trap - EXIT
David James868d7bb2010-06-24 21:48:14 -0700499 ${SCRIPTS_DIR}/mount_gpt_image.sh -u -r "${ROOT_FS_DIR}" \
Will Drewry4a675e12010-07-03 13:35:02 -0500500 -s "${STATEFUL_FS_DIR}" -e "${ESP_FS_DIR}"
David James868d7bb2010-06-24 21:48:14 -0700501}
502
503# Update the base package on an existing image.
504update_base_packages() {
505 local image_name=$1
506
507 echo "Updating base packages on ${image_name}"
508
509 # Create stateful partition of the same size as the rootfs.
Will Drewry4a675e12010-07-03 13:35:02 -0500510 trap "mount_gpt_cleanup" EXIT
David James868d7bb2010-06-24 21:48:14 -0700511
512 ${SCRIPTS_DIR}/mount_gpt_image.sh --from "${OUTPUT_DIR}" \
513 --image "${image_name}" -r "${ROOT_FS_DIR}" \
Will Drewry4a675e12010-07-03 13:35:02 -0500514 -s "${STATEFUL_FS_DIR}" -e "${ESP_FS_DIR}"
David James868d7bb2010-06-24 21:48:14 -0700515
516 # Emerge updated packages, exactly like when creating base image
Nick Sandersc8cb3362010-09-01 21:31:30 -0700517 sudo USE="${EXTRA_USE}" INSTALL_MASK="${INSTALL_MASK}" ${EMERGE_BOARD_CMD} \
David James868d7bb2010-06-24 21:48:14 -0700518 --root="${ROOT_FS_DIR}" --root-deps=rdeps \
David Jamesffede3b2010-09-07 14:22:38 -0700519 --usepkgonly -uDNv chromeos ${EXTRA_PACKAGES} ${EMERGE_JOBS}
David James868d7bb2010-06-24 21:48:14 -0700520
521 # Clean out unused packages
522 sudo INSTALL_MASK="${INSTALL_MASK}" ${EMERGE_BOARD_CMD} \
523 --root="${ROOT_FS_DIR}" --root-deps=rdeps \
David Jamesffede3b2010-09-07 14:22:38 -0700524 --usepkgonly --depclean ${EMERGE_JOBS}
David James868d7bb2010-06-24 21:48:14 -0700525
526 trap - EXIT
527 ${SCRIPTS_DIR}/mount_gpt_image.sh -u -r "${ROOT_FS_DIR}" \
Will Drewry4a675e12010-07-03 13:35:02 -0500528 -s "${STATEFUL_FS_DIR}" -e "${ESP_FS_DIR}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700529}
530
Thieu Le171321f2010-12-13 11:37:42 -0800531zero_free_space() {
532 local fs_mount_point=$1
533 info "Zeroing freespace in ${fs_mount_point}"
534 sudo dd if=/dev/zero of="${fs_mount_point}/filler" oflag=sync bs=4096 || true
535 sudo rm -f "${fs_mount_point}/filler"
536 sudo sync
537}
538
Don Garrett3f41e152010-06-21 14:54:34 -0700539create_base_image() {
David James868d7bb2010-06-24 21:48:14 -0700540 local image_name=$1
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700541
Don Garrett3f41e152010-06-21 14:54:34 -0700542 trap "cleanup && delete_prompt" EXIT
Chris Sosa4bffb8b2010-04-07 17:23:54 -0700543
Don Garrett3f41e152010-06-21 14:54:34 -0700544 # Create and format the root file system.
545
546 # Check for loop device before creating image.
547 LOOP_DEV=$(sudo losetup -f)
548 if [ -z "${LOOP_DEV}" ] ; then
549 echo "No free loop device. Free up a loop device or reboot. exiting. "
550 exit 1
551 fi
552
Will Drewryd253bad2010-08-17 14:09:41 -0500553 # Create root file system disk image.
554 ROOT_SIZE_BYTES=$((1024 * 1024 * ${FLAGS_rootfs_size}))
Don Garrett3f41e152010-06-21 14:54:34 -0700555
Will Drewry9926ee22010-07-21 15:11:10 -0500556 # Pad out for the hash tree.
Will Drewry78992a32010-07-21 14:02:20 -0500557 ROOT_HASH_PAD=$((FLAGS_rootfs_hash_pad * 1024 * 1024))
558 info "Padding the rootfs image by ${ROOT_HASH_PAD} bytes for hash data"
Will Drewry9926ee22010-07-21 15:11:10 -0500559
Will Drewry78992a32010-07-21 14:02:20 -0500560 dd if=/dev/zero of="${ROOT_FS_IMG}" bs=1 count=1 \
561 seek=$((ROOT_SIZE_BYTES + ROOT_HASH_PAD - 1))
Will Drewry9926ee22010-07-21 15:11:10 -0500562 sudo losetup "${LOOP_DEV}" "${ROOT_FS_IMG}"
563 # Specify a block size and block count to avoid using the hash pad.
Will Drewry55b42c92010-10-20 15:44:11 -0500564 sudo mkfs.ext2 -b 4096 "${LOOP_DEV}" "$((ROOT_SIZE_BYTES / 4096))"
Will Drewry78992a32010-07-21 14:02:20 -0500565
Don Garrett3f41e152010-06-21 14:54:34 -0700566 # Tune and mount rootfs.
Will Drewry55b42c92010-10-20 15:44:11 -0500567 DISK_LABEL="C-ROOT"
568 # Disable checking and minimize metadata differences across builds
569 # and wasted reserved space.
570 sudo tune2fs -L "${DISK_LABEL}" \
571 -U clear \
572 -T 20091119110000 \
573 -c 0 \
574 -i 0 \
575 -m 0 \
576 -r 0 \
577 -e remount-ro \
578 "${LOOP_DEV}"
579 # TODO(wad) call tune2fs prior to finalization to set the mount count to 0.
Don Garrett3f41e152010-06-21 14:54:34 -0700580 sudo mount "${LOOP_DEV}" "${ROOT_FS_DIR}"
581
582 # Create stateful partition of the same size as the rootfs.
583 STATEFUL_LOOP_DEV=$(sudo losetup -f)
584 if [ -z "${STATEFUL_LOOP_DEV}" ] ; then
585 echo "No free loop device. Free up a loop device or reboot. exiting. "
586 exit 1
587 fi
Eric Li5cf288f2010-06-28 12:46:26 -0700588 STATEFUL_SIZE_BYTES=$((1024 * 1024 * ${FLAGS_statefulfs_size}))
589 dd if=/dev/zero of="${STATEFUL_FS_IMG}" bs=1 count=1 \
590 seek=$((STATEFUL_SIZE_BYTES - 1))
Denis Romanov11061542010-06-29 04:23:53 +0400591
592 # Tune and mount the stateful partition.
593 UUID=$(uuidgen)
594 DISK_LABEL="C-STATE"
Don Garrett3f41e152010-06-21 14:54:34 -0700595 sudo losetup "${STATEFUL_LOOP_DEV}" "${STATEFUL_FS_IMG}"
596 sudo mkfs.ext3 "${STATEFUL_LOOP_DEV}"
Denis Romanov11061542010-06-29 04:23:53 +0400597 sudo tune2fs -L "${DISK_LABEL}" -U "${UUID}" -c 0 -i 0 "${STATEFUL_LOOP_DEV}"
Don Garrett3f41e152010-06-21 14:54:34 -0700598 sudo mount "${STATEFUL_LOOP_DEV}" "${STATEFUL_FS_DIR}"
599
Don Garrett3f41e152010-06-21 14:54:34 -0700600 # -- Install packages into the root file system --
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700601
Don Garrett3f41e152010-06-21 14:54:34 -0700602 # We need to install libc manually from the cross toolchain.
603 # TODO: Improve this? We only want libc and not the whole toolchain.
604 PKGDIR="/var/lib/portage/pkgs/cross/"
605 sudo tar jxvpf \
606 "${PKGDIR}/${CHOST}/cross-${CHOST}"/glibc-${LIBC_VERSION}.tbz2 \
607 -C "${ROOT_FS_DIR}" --strip-components=3 \
608 --exclude=usr/include --exclude=sys-include --exclude=*.a --exclude=*.o
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700609
Don Garrett3f41e152010-06-21 14:54:34 -0700610 # We need to install libstdc++ manually from the cross toolchain.
611 # TODO: Figure out a better way of doing this?
612 sudo cp -a "${BOARD_ROOT}"/lib/libgcc_s.so* "${ROOT_FS_DIR}/lib"
613 sudo cp -a "${BOARD_ROOT}"/usr/lib/libstdc++.so* "${ROOT_FS_DIR}/usr/lib"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700614
Don Garrett3f41e152010-06-21 14:54:34 -0700615 # Prepare stateful partition with some pre-created directories.
616 sudo mkdir -p "${DEV_IMAGE_ROOT}"
617 sudo mkdir -p "${STATEFUL_FS_DIR}/var"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700618
Don Garrett3f41e152010-06-21 14:54:34 -0700619 # Create symlinks so that /usr/local/usr based directories are symlinked to
620 # /usr/local/ directories e.g. /usr/local/usr/bin -> /usr/local/bin, etc.
621 setup_symlinks_on_root "${DEV_IMAGE_ROOT}" "${STATEFUL_FS_DIR}/var" \
622 "${STATEFUL_FS_DIR}"
Tom Wai-Hong Tamf87a3672010-05-17 16:06:33 +0800623
Don Garrett3f41e152010-06-21 14:54:34 -0700624 # Perform binding rather than symlinking because directories must exist
625 # on rootfs so that we can bind at run-time since rootfs is read-only.
626 echo "Binding directories from stateful partition onto the rootfs"
627 sudo mkdir -p "${ROOT_FS_DIR}/usr/local"
628 sudo mount --bind "${DEV_IMAGE_ROOT}" "${ROOT_FS_DIR}/usr/local"
629 sudo mkdir -p "${ROOT_FS_DIR}/var"
630 sudo mount --bind "${STATEFUL_FS_DIR}/var" "${ROOT_FS_DIR}/var"
631 sudo mkdir -p "${ROOT_FS_DIR}/dev"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700632
David Jamesffede3b2010-09-07 14:22:38 -0700633 # We "emerge --root=${ROOT_FS_DIR} --root-deps=rdeps --usepkgonly" all of the
Don Garrett3f41e152010-06-21 14:54:34 -0700634 # runtime packages for chrome os. This builds up a chrome os image from
635 # binary packages with runtime dependencies only. We use INSTALL_MASK to
636 # trim the image size as much as possible.
Nick Sandersc8cb3362010-09-01 21:31:30 -0700637 sudo USE="${EXTRA_USE}" INSTALL_MASK="${INSTALL_MASK}" ${EMERGE_BOARD_CMD} \
Don Garrett3f41e152010-06-21 14:54:34 -0700638 --root="${ROOT_FS_DIR}" --root-deps=rdeps \
David Jamesffede3b2010-09-07 14:22:38 -0700639 --usepkgonly chromeos ${EXTRA_PACKAGES} ${EMERGE_JOBS}
Bill Richardson8b3bd102010-04-06 15:00:10 -0700640
Will Drewry4a675e12010-07-03 13:35:02 -0500641 # Perform any customizations on the root file system that are needed.
642 "${SCRIPTS_DIR}/customize_rootfs" \
643 --root="${ROOT_FS_DIR}" \
644 --target="${ARCH}" \
645 --board="${BOARD}"
Bill Richardson8b3bd102010-04-06 15:00:10 -0700646
Will Drewry1ee156f2010-07-03 13:27:19 -0500647 # Populates the root filesystem with legacy bootloader templates
648 # appropriate for the platform. The autoupdater and installer will
649 # use those templates to update the legacy boot partition (12/ESP)
650 # on update.
651 # (This script does not populate vmlinuz.A and .B needed by syslinux.)
Will Drewry1670d482010-07-09 13:08:38 -0700652 enable_rootfs_verification=
653 if [[ ${FLAGS_enable_rootfs_verification} -eq ${FLAGS_TRUE} ]]; then
654 enable_rootfs_verification="--enable_rootfs_verification"
655 fi
656
Will Drewry1ee156f2010-07-03 13:27:19 -0500657 ${SCRIPTS_DIR}/create_legacy_bootloader_templates.sh \
658 --arch=${ARCH} \
659 --to="${ROOT_FS_DIR}"/boot \
Will Drewry32d8c112010-10-11 15:37:17 -0500660 --boot_args="${FLAGS_boot_args}" \
Will Drewry1ee156f2010-07-03 13:27:19 -0500661 --install \
Will Drewry1670d482010-07-09 13:08:38 -0700662 ${enable_rootfs_verification}
Bill Richardson9c5e5ec2010-05-14 17:00:21 -0700663
Tan Gao843b70a2010-08-17 09:41:48 -0700664 # Don't test the factory install shim or the dev install shim
665 if [ ${FLAGS_factory_install} -eq ${FLAGS_FALSE} ] &&
666 [ ${FLAGS_dev_install} -eq ${FLAGS_FALSE} ]; then
Don Garrett3f41e152010-06-21 14:54:34 -0700667 # Check that the image has been correctly created.
668 "${SCRIPTS_DIR}/test_image" \
669 --root="${ROOT_FS_DIR}" \
670 --target="${ARCH}"
671 fi
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700672
Don Garrett3f41e152010-06-21 14:54:34 -0700673 # Clean up symlinks so they work on a running target rooted at "/".
674 # Here development packages are rooted at /usr/local. However, do not
675 # create /usr/local or /var on host (already exist on target).
676 setup_symlinks_on_root "/usr/local" "/var" "${STATEFUL_FS_DIR}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700677
Will Drewry7ab698d2010-08-05 13:57:52 -0500678 # cros_make_image_bootable will clobber vmlinuz.image for x86.
Will Drewry4a675e12010-07-03 13:35:02 -0500679 # Until then, just copy the kernel to vmlinuz.image. It is
Kenneth Waterse3049de2010-09-30 14:20:34 -0700680 # expected in build_gpt.sh.
Will Drewry4a675e12010-07-03 13:35:02 -0500681 cp "${ROOT_FS_DIR}/boot/vmlinuz" "${OUTPUT_DIR}/vmlinuz.image"
682
683 # Create an empty esp image to be updated in by update_bootloaders.sh.
684 ${SCRIPTS_DIR}/create_esp.sh --to="${ESP_FS_IMG}"
685
Thieu Le171321f2010-12-13 11:37:42 -0800686 # Zero rootfs free space to make it more compressible so auto-update
687 # payloads become smaller
688 zero_free_space "${ROOT_FS_DIR}"
689
Don Garrett3f41e152010-06-21 14:54:34 -0700690 cleanup
Chris Sosabde8c1b2010-04-29 14:02:35 -0700691
Don Garrett3f41e152010-06-21 14:54:34 -0700692 trap delete_prompt EXIT
Tan Gao6df5aee2010-05-19 14:19:55 -0700693
Don Garrett3f41e152010-06-21 14:54:34 -0700694 # Create the GPT-formatted image.
695 ${SCRIPTS_DIR}/build_gpt.sh \
696 --arch=${ARCH} \
697 --board=${FLAGS_board} \
Don Garrett3f41e152010-06-21 14:54:34 -0700698 --rootfs_partition_size=${FLAGS_rootfs_partition_size} \
Don Garrett3f41e152010-06-21 14:54:34 -0700699 "${OUTPUT_DIR}" \
David James868d7bb2010-06-24 21:48:14 -0700700 "${OUTPUT_DIR}/${image_name}"
701
Nick Sanders446c2112010-09-03 18:15:35 -0700702 # Pre-set "sucessful" bit in gpt, so we will never mark-for-death
703 # a partition on an SDCard/USB stick.
704 ${GPT} add -i 2 -S 1 "${OUTPUT_DIR}/${image_name}"
705
David James868d7bb2010-06-24 21:48:14 -0700706 trap - EXIT
Don Garrett3f41e152010-06-21 14:54:34 -0700707}
708
Raja Aluriaeb10482010-12-10 13:03:09 -0800709generate_au_zip () {
710 local lgenerateauzip="${SCRIPTS_DIR}/generate_au_zip.py"
711 local largs="-o ${OUTPUT_DIR}"
Raja Aluri888e07c2010-12-14 10:36:34 -0800712 test ! -d "${OUTPUT_DIR}" && mkdir -p "${OUTPUT_DIR}"
Raja Aluriaeb10482010-12-10 13:03:09 -0800713 info "Running ${lgenerateauzip} ${largs} for generating AU updater zip file"
714 $lgenerateauzip $largs
715}
716
Don Garrett3f41e152010-06-21 14:54:34 -0700717# Create the output directory.
718mkdir -p "${OUTPUT_DIR}"
719mkdir -p "${ROOT_FS_DIR}"
720mkdir -p "${STATEFUL_FS_DIR}"
721mkdir -p "${ESP_FS_DIR}"
722
David James868d7bb2010-06-24 21:48:14 -0700723# Preserve old images by copying them forward for --preserve.
724if [[ $FLAGS_preserve -eq ${FLAGS_TRUE} ]] ; then
725 if [[ -f ${PREVIOUS_DIR}/${PRISTINE_IMAGE_NAME} ]] ; then
726 # Copy forward pristine image, and associated files
727 cp ${PREVIOUS_DIR}/*.sh ${PREVIOUS_DIR}/config.txt ${OUTPUT_DIR}
728 cp ${PREVIOUS_DIR}/${PRISTINE_IMAGE_NAME} ${OUTPUT_DIR}
729
730 # Copy forward the developer image, if we already copied forward the base.
731 if [[ ${FLAGS_withdev} -eq ${FLAGS_TRUE} ]] && \
732 [[ -f ${PREVIOUS_DIR}/${DEVELOPER_IMAGE_NAME} ]] ; then
733 cp ${PREVIOUS_DIR}/${DEVELOPER_IMAGE_NAME} ${OUTPUT_DIR}
734 fi
735 fi
736fi
737
David Jamesffede3b2010-09-07 14:22:38 -0700738# Perform an eclean to remove packages which are not installed
739if [[ "${FLAGS_eclean}" -eq "${FLAGS_TRUE}" ]]; then
740 eclean-${FLAGS_board} -d packages
741fi
742
Will Drewry7ab698d2010-08-05 13:57:52 -0500743# Create the boot.desc file which stores the build-time configuration
744# information needed for making the image bootable after creation with
745# cros_make_image_bootable.
746create_boot_desc
747
David James868d7bb2010-06-24 21:48:14 -0700748if [[ -f ${PRISTINE_IMG} ]] ; then
749 update_base_packages ${PRISTINE_IMAGE_NAME}
750else
751 create_base_image ${PRISTINE_IMAGE_NAME}
752fi
Tan Gao843b70a2010-08-17 09:41:48 -0700753
754USE_DEV_KEYS=
Nick Sandersae26a5c2010-08-30 21:59:50 -0700755if [ "${FLAGS_dev_install}" -eq "${FLAGS_TRUE}" ] || \
756 [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ]; then
Tan Gao843b70a2010-08-17 09:41:48 -0700757 USE_DEV_KEYS="--use_dev_keys"
758fi
759
760# Place flags before positional args
Will Drewry7ab698d2010-08-05 13:57:52 -0500761${SCRIPTS_DIR}/bin/cros_make_image_bootable "${OUTPUT_DIR}" \
Tan Gao843b70a2010-08-17 09:41:48 -0700762 "${PRISTINE_IMAGE_NAME}" \
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +0800763 ${USE_DEV_KEYS} \
764 ${crosbug12352_flag}
Will Drewry4a675e12010-07-03 13:35:02 -0500765
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +0800766# FIXME Test x86 image, and test arm image if enabled;
767# should unconditionally test an image after crosbug12352 is fixed
768if [[ "${ARCH}" = "x86" ]] ||
769 [[ "${ARCH}" = "arm" &&
770 "${FLAGS_crosbug12352_arm_kernel_signing}" -eq "${FLAGS_TRUE}" ]]; then
Tan Gao843b70a2010-08-17 09:41:48 -0700771 BOOT_FLAG=
Nick Sandersae26a5c2010-08-30 21:59:50 -0700772 if [ "${FLAGS_dev_install}" -eq "${FLAGS_TRUE}" ] ||
773 [ "${FLAGS_factory_install}" -eq "${FLAGS_TRUE}" ]; then
Tan Gao843b70a2010-08-17 09:41:48 -0700774 BOOT_FLAG="-b 1" # BOOT_FLAG_DEVELOPER value defined in load_kernel_fw.h
775 info "--dev_install set, pass BOOT_FLAG_DEVELOPER flag to load_kernel_test"
776 fi
777
Will Drewry4a675e12010-07-03 13:35:02 -0500778 # Verify the final image.
779 load_kernel_test "${OUTPUT_DIR}/${PRISTINE_IMAGE_NAME}" \
Tan Gao843b70a2010-08-17 09:41:48 -0700780 "${DEVKEYSDIR}/recovery_key.vbpubk" ${BOOT_FLAG}
Will Drewry4a675e12010-07-03 13:35:02 -0500781fi
Bill Richardson4364a2e2010-03-30 14:17:34 -0700782
Don Garrette0020b12010-06-17 15:55:35 -0700783# Create a developer image based on the chromium os base image.
Don Garrett3f41e152010-06-21 14:54:34 -0700784if [ "${FLAGS_withdev}" -eq "${FLAGS_TRUE}" ] ; then
David James868d7bb2010-06-24 21:48:14 -0700785 if [[ ! -f ${DEVELOPER_IMG} ]] ; then
786 echo "Creating developer image from base image ${PRISTINE_IMAGE_NAME}"
787 cp ${PRISTINE_IMG} ${DEVELOPER_IMG}
788 fi
Don Garrett3f41e152010-06-21 14:54:34 -0700789
David James868d7bb2010-06-24 21:48:14 -0700790 update_dev_packages ${DEVELOPER_IMAGE_NAME}
Will Drewry7ab698d2010-08-05 13:57:52 -0500791 ${SCRIPTS_DIR}/bin/cros_make_image_bootable "${OUTPUT_DIR}" \
Che-Liang Chiou75ac2be2011-02-24 12:00:16 +0800792 "${DEVELOPER_IMAGE_NAME}" \
793 ${crosbug12352_flag}
Bill Richardson6ed13582010-06-16 21:38:15 -0700794fi
795
796# Clean up temporary files.
Don Garrett3f41e152010-06-21 14:54:34 -0700797rm -f "${ROOT_FS_IMG}" "${STATEFUL_FS_IMG}" "${OUTPUT_DIR}/vmlinuz.image" \
Dmitry Polukhin0a649b52011-02-24 13:02:52 +0300798 "${ESP_FS_IMG}" "${OUTPUT_DIR}/vmlinuz_hd.vblock"
799rmdir "${ROOT_FS_DIR}" "${STATEFUL_FS_DIR}" "${ESP_FS_DIR}"
Bill Richardson67956222010-05-28 15:38:56 -0700800
Raja Aluriaeb10482010-12-10 13:03:09 -0800801# Generating AU generator zip file to run outside chroot
802generate_au_zip || echo "Failed generating AU zip file - ignoring Error..."
Olof Johansson58f25cc2010-08-04 21:18:49 -0700803# Create a 'latest' link
804rm -f ${FLAGS_output_root}/${FLAGS_board}/latest
805ln -s $(basename ${OUTPUT_DIR}) ${FLAGS_output_root}/${FLAGS_board}/latest
806
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700807echo "Done. Image created in ${OUTPUT_DIR}"
Don Garrette0020b12010-06-17 15:55:35 -0700808echo "Chromium OS image created as ${PRISTINE_IMAGE_NAME}"
Don Garrette0020b12010-06-17 15:55:35 -0700809if [ "${FLAGS_withdev}" -eq "${FLAGS_TRUE}" ]; then
810 echo "Developer image created as ${DEVELOPER_IMAGE_NAME}"
Chris Sosa9673f3b2010-05-18 13:24:40 -0700811fi
Nick Sanders8ab729a2010-06-16 03:15:17 -0700812
Nick Sandersd2509272010-06-16 03:50:04 -0700813print_time_elapsed
814
Hung-Te Lin2ffe2be2010-10-05 08:15:40 +0800815echo "To copy to USB keyfob, do something like:"
Daniel Eratdd9818a2010-04-26 09:16:44 -0700816echo " ./image_to_usb.sh --from=${OUTSIDE_OUTPUT_DIR} --to=/dev/sdX"
Will Drewryefce6682010-07-23 19:43:27 -0500817echo "To convert to VMWare image, INSIDE the chroot, do something like:"
Olof Johansson1f5e84d2010-08-24 20:26:49 -0500818echo " ./image_to_vm.sh --from=${OUTSIDE_OUTPUT_DIR} --board=${BOARD}"
Bill Richardsonc09b94f2010-03-15 11:40:30 -0700819echo "from the scripts directory where you entered the chroot."