406050bdb6
We used to check for 'attr >> 16 == 0xa1ff' (i.e. 0o120777) to detect symlinks in the input target_files zip (TF.zip). This becomes broken after we switch to soong_zip, which packs symlinks with 0o120700. This CL fixes the issue by using stat.S_ISLNK() instead. Note that we don't need to stage the files with the exact permission bits as in the input TF.zip. Because this part is covered by mkbootfs by using the canned or the compiled-in fs_config - as long as the files/directories are accessible and the symlinks are created. Bug: 38455129 Test: sign_target_files_apks.py on bullhead TF.zip. Check the checksums in SYSTEM/bin/install-recovery.sh. Change-Id: I51c1fc9a257fb3f18c16c2ed71528abaa6f7d9c9 |
||
---|---|---|
.. | ||
add_img_to_target_files | ||
add_img_to_target_files.py | ||
blockimgdiff.py | ||
build_image.py | ||
check_ota_package_signature.py | ||
check_target_files_signatures | ||
check_target_files_signatures.py | ||
common.py | ||
edify_generator.py | ||
img_from_target_files | ||
img_from_target_files.py | ||
make_recovery_patch | ||
make_recovery_patch.py | ||
ota_from_target_files | ||
ota_from_target_files.py | ||
ota_package_parser.py | ||
pylintrc | ||
rangelib.py | ||
sign_target_files_apks | ||
sign_target_files_apks.py | ||
sparse_img.py | ||
target_files_diff.py | ||
test_blockimgdiff.py | ||
test_common.py | ||
test_rangelib.py | ||
validate_target_files.py |