summaryrefslogtreecommitdiff
path: root/util
diff options
context:
space:
mode:
authorVadim Bendebury <vbendeb@chromium.org>2017-08-21 11:05:16 -0700
committerchrome-bot <chrome-bot@chromium.org>2017-08-22 16:43:59 -0700
commit4ec14d890e0bd1b32b3c069c2451b2c2a39216c6 (patch)
treed39dfab7f8bc474f49cbc93f46ea591468e3c24d /util
parent844b03dd0e66c871f288f18237404d6e173571c8 (diff)
downloadchrome-ec-4ec14d890e0bd1b32b3c069c2451b2c2a39216c6.tar.gz
signer: no need to sign dev images any more.
The chromeos-cr50 ebuild does not install dev images any more, and chromeos-cr50-scripts do not try updating dev versions of H1 any more. Let's stop releasing dev Cr50 images. BRANCH=Cr50 BUG=none TEST=tried creating a release image in the release branch, got a tarball of the desired contents: $ tar tf cr50.r0.0.10.w0.0.22_ZZAF_ffffffff_00007f80.tbz2 cr50.r0.0.10.w0.0.22_ZZAF_ffffffff_00007f80/ cr50.r0.0.10.w0.0.22_ZZAF_ffffffff_00007f80/cr50.bin.prod Change-Id: Ib2acaf5f31f7067a98c35c0ec83e730736398a7d Signed-off-by: Vadim Bendebury <vbendeb@chromium.org> Reviewed-on: https://chromium-review.googlesource.com/624193 Reviewed-by: Mary Ruthven <mruthven@chromium.org>
Diffstat (limited to 'util')
-rwxr-xr-xutil/signer/create_released_image.sh25
1 files changed, 11 insertions, 14 deletions
diff --git a/util/signer/create_released_image.sh b/util/signer/create_released_image.sh
index 9e0397916f..da6f992d26 100755
--- a/util/signer/create_released_image.sh
+++ b/util/signer/create_released_image.sh
@@ -5,11 +5,11 @@
# Use of this source code is governed by a BSD-style license that can be
# found in the LICENSE file.
#
-# This script is a utility which allows to sign dev and prod CR50 images for
-# release and place them in a tarball suitable for uploading to the BCS.
+# This script is a utility which allows to sign prod CR50 images for release
+# and place them in a tarball suitable for uploading to the BCS.
#
-# Manifests present in the EC directory at the time of signing are used for
-# both prod and dev images.
+# The util/signer/ec_RW-manifest-prod.json manifest present in the EC
+# directory is used for signing.
#
set -u
@@ -52,8 +52,9 @@ verify_ro() {
# binaries and sign them.
#
# The signed image is placed in the directory named as concatenation of RO and
-# RW version numbers, which is where eventually the ebuild downloading the
-# tarball from the BCS expects the dev and prod images be.
+# RW version numbers and board ID fields, if set to non-default. The ebuild
+# downloading the tarball from the BCS expects the image to be in that
+# directory.
prepare_image() {
local awk_prog
local count=0
@@ -182,14 +183,13 @@ set -e
FLAGS_HELP="usage: ${ME} [flags] <blobs>
blobs are:
- <prod RO A>.hex <prod RO B>.hex <dev RO A>.hex <dev RO B>.hex \
- <RW.elf> <RW_B.elf>"
+ <prod RO A>.hex <prod RO B>.hex <RW.elf> <RW_B.elf>"
# Parse command line.
FLAGS "$@" || exit 1
eval set -- "${FLAGS_ARGV}"
-if [ "${#*}" != "6" ]; then
+if [ "${#*}" != "4" ]; then
flags_help
exit 1
fi
@@ -203,15 +203,12 @@ fi
prod_ro_a="${1}"
prod_ro_b="${2}"
-dev_ro_a="${3}"
-dev_ro_b="${4}"
-rw_a="${5}"
-rw_b="${6}"
+rw_a="${3}"
+rw_b="${4}"
# Used by the bs script.
export CR50_BOARD_ID="${FLAGS_cr50_board_id}"
-prepare_image 'dev' "${dev_ro_a}" "${dev_ro_b}" "${rw_a}" "${rw_b}"
prepare_image 'prod' "${prod_ro_a}" "${prod_ro_b}" "${rw_a}" "${rw_b}"
tarball="${dest_dir}.tbz2"
tar jcf "${tarball}" "${dest_dir}"