releasetools: Accept PRESIGNED keys in apexkeys.txt.
For an PRESIGNED APEX, it has the following format, which should be considered as a valid input. name="foo.apex" public_key="PRESIGNED" private_key="PRESIGNED" container_certificate="PRESIGNED" container_private_key="PRESIGNED" Bug: 131153746 Test: Run sign_target_files_apks.py on a target_files.zip with PRESIGNED APEXes. Test: python -m unittest sign_target_files_apks Change-Id: I51076b0c6eddfb75637d37659a08009f0a88e931
This commit is contained in:
@@ -1097,13 +1097,16 @@ def ReadApexKeysInfo(tf_zip):
|
||||
# full names only.
|
||||
container_cert = matches.group("CONTAINER_CERT")
|
||||
container_private_key = matches.group("CONTAINER_PRIVATE_KEY")
|
||||
if not CompareKeys(
|
||||
if container_cert == 'PRESIGNED' and container_private_key == 'PRESIGNED':
|
||||
container_key = 'PRESIGNED'
|
||||
elif CompareKeys(
|
||||
container_cert, OPTIONS.public_key_suffix,
|
||||
container_private_key, OPTIONS.private_key_suffix):
|
||||
container_key = container_cert[:-len(OPTIONS.public_key_suffix)]
|
||||
else:
|
||||
raise ValueError("Failed to parse container keys: \n{}".format(line))
|
||||
|
||||
keys[name] = (payload_private_key,
|
||||
container_cert[:-len(OPTIONS.public_key_suffix)])
|
||||
keys[name] = (payload_private_key, container_key)
|
||||
|
||||
return keys
|
||||
|
||||
|
Reference in New Issue
Block a user