getprop("ro.product.device") == "dandelion" || abort("E3004: This package is for \"dandelion\" devices; this is a \"" + getprop("ro.product.device") + "\".");
ui_print("Source: Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDRUXM:user/release-keys");
ui_print("Target: Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDRUXM:user/release-keys");
ui_print("Verifying current system...");
getprop("ro.build.fingerprint") == "Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDRUXM:user/release-keys" ||
    getprop("ro.build.fingerprint") == "Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDRUXM:user/release-keys" ||
    abort("E3001: Package expects build fingerprint of Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.6.0.QCDRUXM:user/release-keys or Redmi/dandelion_ru/dandelion:10/QP1A.190711.020/V12.0.7.0.QCDRUXM:user/release-keys; this device has " + getprop("ro.build.fingerprint") + ".");
show_progress(0.100000, 10);
patch_partition_check("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:679a80569b8b08280e0fc7aed82283e5a96e35fb",
                      "EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:01a4aa89dd5443a4d2dbf28bccb1057c01bd6abd") ||
    abort("E3005: \"EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:679a80569b8b08280e0fc7aed82283e5a96e35fb\" or \"EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:01a4aa89dd5443a4d2dbf28bccb1057c01bd6abd\" has unexpected contents.");
apply_patch_space(67108864) || abort("E3006: Not enough free space on /cache to apply patches.");
show_progress(0.100000, 70);
if (range_sha1(map_partition("system"), "22,1,32770,32895,43033,43720,43722,43746,98306,98431,163842,163967,229378,229503,294914,295039,491539,491540,514213,515778,523952,524067,524068") == "45fa3b00233101aafa41bdab1c44ad205d0dce79" || block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat")) then
ui_print("Verified system image...");
else
check_first_block(map_partition("system"));
ifelse (block_image_recover(map_partition("system"), "22,1,32770,32895,43033,43720,43722,43746,98306,98431,163842,163967,229378,229503,294914,295039,491539,491540,514213,515778,523952,524067,524068") && block_image_verify(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat"), ui_print("system recovered successfully."), abort("E1004: system partition fails to recover"));
endif;
if (range_sha1(map_partition("vendor"), "42,1,64,799,805,823,824,826,827,829,830,1121,1127,1273,1313,1513,1514,2442,2446,3387,3408,3417,3424,3771,4338,4402,4406,4408,4411,6664,6666,6672,32770,32794,98306,98330,98359,98360,100935,101251,102860,102894,102895") == "a164e120c5e544999040f7605f3d274b163594f9" || block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat")) then
ui_print("Verified vendor image...");
else
check_first_block(map_partition("vendor"));
ifelse (block_image_recover(map_partition("vendor"), "42,1,64,799,805,823,824,826,827,829,830,1121,1127,1273,1313,1513,1514,2442,2446,3387,3408,3417,3424,3771,4338,4402,4406,4408,4411,6664,6666,6672,32770,32794,98306,98330,98359,98360,100935,101251,102860,102894,102895") && block_image_verify(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat"), ui_print("vendor recovered successfully."), abort("E2004: vendor partition fails to recover"));
endif;
if (range_sha1(map_partition("product"), "114,1,71,4403,4407,6548,6549,7093,7099,7116,7117,13299,13300,13939,13943,14713,14714,17093,17094,17458,17462,17969,17970,17982,17986,17990,17991,24183,24184,32768,32770,32823,32831,36717,36718,47435,47436,58505,58506,58512,58513,65536,65544,73072,73073,73152,73156,73162,73163,74171,74172,82388,82389,84524,84525,87635,87636,87638,87640,87649,87650,87651,87652,87667,87668,87669,87670,87672,87674,87675,87676,87715,87719,87723,87725,87730,87731,87743,87746,88195,88196,88567,88568,90674,90676,96932,96934,98304,98306,98359,98387,114950,114951,120118,120120,128370,128372,128419,128421,128562,128564,129820,129822,130900,130902,130911,163842,163895,196611,196616,218618,219278,222756,222813,222814") == "f240bd27b7fe027fdd88572312367248cf2efaa0" || block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat")) then
ui_print("Verified product image...");
else
ifelse (block_image_recover(map_partition("product"), "114,1,71,4403,4407,6548,6549,7093,7099,7116,7117,13299,13300,13939,13943,14713,14714,17093,17094,17458,17462,17969,17970,17982,17986,17990,17991,24183,24184,32768,32770,32823,32831,36717,36718,47435,47436,58505,58506,58512,58513,65536,65544,73072,73073,73152,73156,73162,73163,74171,74172,82388,82389,84524,84525,87635,87636,87638,87640,87649,87650,87651,87652,87667,87668,87669,87670,87672,87674,87675,87676,87715,87719,87723,87725,87730,87731,87743,87746,88195,88196,88567,88568,90674,90676,96932,96934,98304,98306,98359,98387,114950,114951,120118,120120,128370,128372,128419,128421,128562,128564,129820,129822,130900,130902,130911,163842,163895,196611,196616,218618,219278,222756,222813,222814") && block_image_verify(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat"), ui_print("product recovered successfully."), abort("E2004: product partition fails to recover"));
endif;

# ---- start making changes here ----

ui_print("Patching boot image...");
show_progress(0.100000, 10);
patch_partition("EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:679a80569b8b08280e0fc7aed82283e5a96e35fb",
                "EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:01a4aa89dd5443a4d2dbf28bccb1057c01bd6abd",
                package_extract_file("boot.img.p")) ||
    abort("E3008: Failed to apply patch to EMMC:/dev/block/platform/bootdevice/by-name/boot:67108864:01a4aa89dd5443a4d2dbf28bccb1057c01bd6abd");
show_progress(0.600000, 600);

# --- Start patching dynamic partitions ---


# Update dynamic partition metadata

assert(update_dynamic_partitions(package_extract_file("dynamic_partitions_op_list")));

# Patch partition product

ui_print("Patching product image after verification.");
block_image_update(map_partition("product"), package_extract_file("product.transfer.list"), "product.new.dat", "product.patch.dat") ||
  abort("E2001: Failed to update product image.");

# Patch partition vendor

ui_print("Patching vendor image after verification.");
block_image_update(map_partition("vendor"), package_extract_file("vendor.transfer.list"), "vendor.new.dat", "vendor.patch.dat") ||
  abort("E2001: Failed to update vendor image.");

# Patch partition system

ui_print("Patching system image after verification.");
block_image_update(map_partition("system"), package_extract_file("system.transfer.list"), "system.new.dat", "system.patch.dat") ||
  abort("E1001: Failed to update system image.");

# --- End patching dynamic partitions ---

show_progress(0.100000, 2);
show_mtupdate_stage("/cache/recovery/last_mtupdate_stage");
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "1") ,
(
ui_print("start to update general image");
package_extract_file("dtbo.img", "/dev/block/platform/bootdevice/by-name/dtbo");
package_extract_file("md1img.img", "/dev/block/platform/bootdevice/by-name/md1img");
package_extract_file("spmfw.img", "/dev/block/platform/bootdevice/by-name/spmfw");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "1");
),
ui_print("general images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "3") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "2") then

ui_print("start to update alt loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_2");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee2");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk2");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp2");
if get_storage_type() then 
 assert(package_extract_file("preloader_ufs.img", "/dev/block/mmcblk0boot1"));
else 
 assert(set_emmc_writable("/sys/block/mmcblk0boot1/force_ro"),
        package_extract_file("preloader_emmc.img", "/dev/block/mmcblk0boot1"));
endif;
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "2");
endif;

switch_active("sspm_1", "sspm_2");
switch_active("tee1", "tee2");
switch_active("lk", "lk2");
switch_active("scp1", "scp2");
switch_active("preloader", "preloader2");
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "3");
),
ui_print("alt loder images are already updated");
);
ifelse (
less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "5") ,
(
if less_than_int(get_mtupdate_stage("/cache/recovery/last_mtupdate_stage"), "4") then

ui_print("start to update main loader image");
package_extract_file("sspm.img", "/dev/block/platform/bootdevice/by-name/sspm_1");
package_extract_file("tee.img", "/dev/block/platform/bootdevice/by-name/tee1");
package_extract_file("lk.img", "/dev/block/platform/bootdevice/by-name/lk");
package_extract_file("scp.img", "/dev/block/platform/bootdevice/by-name/scp1");
if get_storage_type() then 
 assert(package_extract_file("preloader_ufs.img", "/dev/block/mmcblk0boot0"));
else 
 assert(set_emmc_writable("/sys/block/mmcblk0boot0/force_ro"),
        package_extract_file("preloader_emmc.img", "/dev/block/mmcblk0boot0"));
endif;
set_mtupdate_stage("/cache/recovery/last_mtupdate_stage", "4");
endif;

switch_active("sspm_2", "sspm_1");
switch_active("tee2", "tee1");
switch_active("lk2", "lk");
switch_active("scp2", "scp1");
switch_active("preloader2", "preloader");
),
ui_print("main loader images are already updated");
);
delete("/cache/recovery/last_mtupdate_stage");
package_extract_file("vbmeta_vendor.img", "/dev/block/platform/bootdevice/by-name/vbmeta_vendor");
package_extract_file("vbmeta_system.img", "/dev/block/platform/bootdevice/by-name/vbmeta_system");
package_extract_file("vbmeta.img", "/dev/block/platform/bootdevice/by-name/vbmeta");
post_ota_action();
