getprop("ro.product.device") == "dandelion" || abort("E3004: This package is for \"dandelion\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDMIXM:user/release-keys");
ui_print("Target: Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDMIXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDMIXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDMIXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDMIXM:user/release-keys or Redmi/dandelion_global/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDMIXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:ba6524254f8562a2a864018316a8b5e5bb66175c",
                      "EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:3edd3040e56918543f615590c6fe781a43269888") ||
    abort("E3005: \"EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:ba6524254f8562a2a864018316a8b5e5bb66175c\" or \"EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:3edd3040e56918543f615590c6fe781a43269888\" has unexpected contents.");
apply_patch_space(67108864) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1(map_partition("system"), "22,1,32770,32885,98306,98421,163842,163957,166110,166673,166675,166693,229378,229493,294914,295029,458761,458774,471160,472574,480063,480170,480171") == "edadb95cfe17e649321dda6165bc67399cca1de0" || block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block(map_partition("system"));
ifelse (block_image_recover(map_partition("system"), "22,1,32770,32885,98306,98421,163842,163957,166110,166673,166675,166693,229378,229493,294914,295029,458761,458774,471160,472574,480063,480170,480171") && block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1(map_partition("vendor"), "156,1,72,807,813,831,832,834,835,837,838,1129,1135,1521,1522,3391,3411,3420,3428,3562,3729,3775,4342,4406,4410,4413,4415,6668,6678,11523,11524,12546,12548,12597,12647,12660,12661,12889,12890,13088,13093,13105,13106,18226,18227,18321,18322,18990,19188,19220,19426,19569,19570,21460,21461,21800,21801,22139,22140,22456,22457,22771,22772,23088,23089,23407,23408,23745,23746,24085,24086,24505,25011,25406,25453,26027,26028,26364,26365,26699,26700,27041,27042,27386,27387,27736,27737,28082,28083,28430,28431,28775,28776,29090,29091,29405,29406,29720,29721,30035,30036,30350,30351,30664,30665,32768,32770,32793,32859,40183,40184,49067,49068,49991,50210,52865,52866,55016,55729,55754,55772,55786,55970,55976,56306,57766,57790,64625,65348,65536,65574,66327,66552,66628,66702,68102,68203,70120,70130,70443,70517,71123,71230,71539,71662,71744,71745,73798,74110,74578,74704,78980,97464,97798,99351,99386,99387") == "f74118adb1a7d39f0eb96edb5c34cf26fa29e4d5" || block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block(map_partition("vendor"));
ifelse (block_image_recover(map_partition("vendor"), "156,1,72,807,813,831,832,834,835,837,838,1129,1135,1521,1522,3391,3411,3420,3428,3562,3729,3775,4342,4406,4410,4413,4415,6668,6678,11523,11524,12546,12548,12597,12647,12660,12661,12889,12890,13088,13093,13105,13106,18226,18227,18321,18322,18990,19188,19220,19426,19569,19570,21460,21461,21800,21801,22139,22140,22456,22457,22771,22772,23088,23089,23407,23408,23745,23746,24085,24086,24505,25011,25406,25453,26027,26028,26364,26365,26699,26700,27041,27042,27386,27387,27736,27737,28082,28083,28430,28431,28775,28776,29090,29091,29405,29406,29720,29721,30035,30036,30350,30351,30664,30665,32768,32770,32793,32859,40183,40184,49067,49068,49991,50210,52865,52866,55016,55729,55754,55772,55786,55970,55976,56306,57766,57790,64625,65348,65536,65574,66327,66552,66628,66702,68102,68203,70120,70130,70443,70517,71123,71230,71539,71662,71744,71745,73798,74110,74578,74704,78980,97464,97798,99351,99386,99387") && block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;
if (range_sha1(map_partition("product"), "126,1,73,5363,5364,9696,9700,11841,11842,12386,12392,12409,12410,18592,18593,20972,20973,21337,21341,21848,21849,21861,21865,21869,21870,23710,23714,25151,25152,29166,29170,32768,32770,32826,32833,33436,33437,39629,39630,52100,52101,62818,62819,65536,65543,73409,73410,73416,73417,87968,87969,88048,88052,88058,88059,89067,89068,97284,97285,98304,98306,98362,98369,99485,99486,102596,102597,102600,102601,102610,102611,102612,102613,102628,102629,102630,102631,102636,102637,102676,102680,102684,102686,102691,102692,102704,102707,103156,103157,103528,103529,105635,105637,111777,111779,131072,131103,131104,131105,134053,134055,134481,134483,141810,141812,141859,141861,141990,141992,143247,143249,144327,144329,144338,144407,153039,163842,163898,229378,229434,229439,229441,231118,231817,235494,235555,235556") == "e023187d6051b344e414571b90032b39efb08575" || block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat")) then
ui_print("Verified product image...");
else
ifelse (block_image_recover(map_partition("product"), "126,1,73,5363,5364,9696,9700,11841,11842,12386,12392,12409,12410,18592,18593,20972,20973,21337,21341,21848,21849,21861,21865,21869,21870,23710,23714,25151,25152,29166,29170,32768,32770,32826,32833,33436,33437,39629,39630,52100,52101,62818,62819,65536,65543,73409,73410,73416,73417,87968,87969,88048,88052,88058,88059,89067,89068,97284,97285,98304,98306,98362,98369,99485,99486,102596,102597,102600,102601,102610,102611,102612,102613,102628,102629,102630,102631,102636,102637,102676,102680,102684,102686,102691,102692,102704,102707,103156,103157,103528,103529,105635,105637,111777,111779,131072,131103,131104,131105,134053,134055,134481,134483,141810,141812,141859,141861,141990,141992,143247,143249,144327,144329,144338,144407,153039,163842,163898,229378,229434,229439,229441,231118,231817,235494,235555,235556") && block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat"), ui_print("product recovered successfully."), abort("E2004: product partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:ba6524254f8562a2a864018316a8b5e5bb66175c",
                "EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:3edd3040e56918543f615590c6fe781a43269888",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:3edd3040e56918543f615590c6fe781a43269888");
show_progress(0.600000, 600);

# --- Start patching dynamic partitions ---


# Patch partition vendor

ui_print("Patching vendor image after verification.");
block_image_update(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# Update dynamic partition metadata

assert(update_dynamic_partitions(package_extract_file("dynamic_partitions_op_list")));

# Patch partition product

ui_print("Patching product image after verification.");
block_image_update(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat") ||
  abort("E2001: Failed to update product image.");

# Patch partition system

ui_print("Patching system image after verification.");
block_image_update(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");

# --- End patching dynamic partitions ---

show_progress(0.100000, 2);
show_mtupdate_stage("/cache/recovery/last_mtupdate_stage");
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "1") ,
(
ui_print("start to update general image");
package_extract_file("dtbo.img", "/dev/block/platform/bootdevice/by-name/dtbo");
package_extract_file("md1img.img", "/dev/block/platform/bootdevice/by-name/md1img");
package_extract_file("spmfw.img", "/dev/block/platform/bootdevice/by-name/spmfw");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "1");
),
ui_print("general images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "3") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "2") then

ui_print("start to update alt loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_2");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee2");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk2");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp2");
if get_storage_type() then 
 assert(package_extract_file("preloader_ufs.img", "/dev/block/mmcblk0boot1"));
else 
 assert(set_emmc_writable("/sys/block/mmcblk0boot1/force_ro"),
        package_extract_file("preloader_emmc.img", "/dev/block/mmcblk0boot1"));
endif;
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "2");
endif;

switch_active("sspm_1", "sspm_2");
switch_active("tee1", "tee2");
switch_active("lk", "lk2");
switch_active("scp1", "scp2");
switch_active("preloader", "preloader2");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "3");
),
ui_print("alt loder images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "5") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "4") then

ui_print("start to update main loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_1");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee1");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp1");
if get_storage_type() then 
 assert(package_extract_file("preloader_ufs.img", "/dev/block/mmcblk0boot0"));
else 
 assert(set_emmc_writable("/sys/block/mmcblk0boot0/force_ro"),
        package_extract_file("preloader_emmc.img", "/dev/block/mmcblk0boot0"));
endif;
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "4");
endif;

switch_active("sspm_2", "sspm_1");
switch_active("tee2", "tee1");
switch_active("lk2", "lk");
switch_active("scp2", "scp1");
switch_active("preloader2", "preloader");
),
ui_print("main loader images are already updated");
);
delete("/cache/recovery/last_mtupdate_stage");
package_extract_file("vbmeta_vendor.img", "/dev/block/platform/bootdevice/by-name/vbmeta_vendor");
package_extract_file("vbmeta_system.img", "/dev/block/platform/bootdevice/by-name/vbmeta_system");
package_extract_file("vbmeta.img", "/dev/block/platform/bootdevice/by-name/vbmeta");
post_ota_action();
