1
0
mirror of https://github.com/mbirth/tcl_ota_check.git synced 2024-09-19 22:33:25 +01:00
tcl_ota_check/tcldown.py
2018-03-01 01:43:26 +01:00

106 lines
3.3 KiB
Python
Executable File

#!/usr/bin/env python3
# -*- coding: utf-8 -*-
# pylint: disable=C0111,C0326,C0103
"""Download a given firmware file."""
import os
import sys
from tcllib import argparser
from tcllib.devices import DesktopDevice
from tcllib.dumpmgr import write_info_if_dumps_found
from tcllib.requests import (DownloadRequest, EncryptHeaderRequest,
RequestRunner, ServerSelector)
dpdesc = """
Downloads the given firmware file.
"""
dp = argparser.DefaultParser(__file__, dpdesc)
dp.add_argument("prd", nargs=1, help="CU Reference #, e.g. PRD-63117-011")
dp.add_argument("targetversion", nargs=1, help="Firmware version to download, e.g. AAN990")
dp.add_argument("fwid", nargs=1, help="Numeric firmware file id, e.g. 268932")
dp.add_argument("-o", "--ota", metavar="FROMVERSION", help="download OTA from specified version (switches mode to OTA)", type=str)
dp.add_argument("-i", "--imei", help="use specified IMEI instead of default", type=str)
dp.add_argument("-t", "--type", help="download device (default to desktop)", default="desktop", type=str, choices=["desktop", "mobile"])
dp.add_argument("--rawmode", help="override --mode with raw value (2=OTA, 4=FULL)", metavar="MODE")
dp.add_argument("--rawcltp", help="override --type with raw value (10=MOBILE, 2010=DESKTOP)", metavar="CLTP")
args = dp.parse_args(sys.argv[1:])
dev = DesktopDevice()
def sel_mode(defaultmode, rawval):
"""Handle custom mode."""
if rawval:
return rawval
return defaultmode
def sel_cltp(txtmode, rawval):
"""Handle custom CLTP."""
if rawval:
return rawval
if txtmode == "mobile":
return dev.CLTP_STATES["MOBILE"]
return dev.CLTP_STATES["DESKTOP"]
if args.imei:
print("Use specified IMEI: {}".format(args.imei))
dev.imei = args.imei
dev.curef = args.prd[0]
if args.ota:
dev.fwver = args.ota[0]
dev.mode = sel_mode(dev.MODE_STATES["OTA"], args.rawmode)
else:
dev.fwver = args.targetversion[0]
dev.mode = sel_mode(dev.MODE_STATES["FULL"], args.rawmode)
dev.cltp = sel_cltp(args.type, args.rawcltp)
print("Mode: {}".format(dev.mode))
print("CLTP: {}".format(dev.cltp))
runner = RequestRunner(ServerSelector())
runner.max_tries = 20
tv = args.targetversion[0]
fw_id = args.fwid[0]
dlr = DownloadRequest(dev, tv, fw_id)
runner.run(dlr)
if not dlr.success:
print("ERROR: {}".format(dlr.error))
sys.exit(3)
dlrres = dlr.get_result()
print(dlrres.pretty_xml())
for s in dlrres.slaves:
print("http://{}{}".format(s, dlrres.fileurl))
for s in dlrres.s3_slaves:
print("http://{}{}".format(s, dlrres.s3_fileurl))
if dev.mode == dev.MODE_STATES["FULL"]:
encrun = RequestRunner(ServerSelector(dlrres.encslaves), https=False)
encrun.max_tries = 20
hdr = EncryptHeaderRequest(dlrres.fileurl)
encrun.run(hdr)
if hdr.success:
hdrres = hdr.get_result()
headname = "header_{}.bin".format(tv)
headdir = "headers"
if not os.path.exists(headdir):
os.makedirs(headdir)
if len(hdrres.rawdata) == 4194320:
print("Header length check passed. Writing to {}.".format(headname))
with open(os.path.join(headdir, headname), "wb") as f:
f.write(hdrres.rawdata)
else:
print("Header length invalid ({}).".format(len(hdrres.rawdata)))
write_info_if_dumps_found()