Anyway, so Eu1 if one of is gets said update, what do we have to do to get it the devs that may want it? I can throw it in dropbox before it updates if I see the new one roll out.
Actually, it is sort of tricky to "grab" the OTA - the reason is that immediately after it downloads, the phone reboots into the recovery boot to start the installation.
If you have the Amon_RA recovery on your phone, the installation will fail immediately - unfortunately, though, the next thing that happens is the recovery boot then erases both the OTA .zip file and the command file that launches the update, too.
There are two or three ways around this, in order of difficulty:
(1) Method One - Get the File Name Only
The easiest way is to "sniff the log". Not the one in the toilet, no; The output of the "logcat" command. It requires that you have the USB drivers installed correctly on your PC and also have the "adb" program. All we are going to do here is figure out what the
name of the downloaded zip file is.
- Turn on USB debugging (Menu -> Settings -> Applications -> Development -> USB debugging) before the update arrives.
- First, you get the notice that there is an update available.
- If you can get to your PC right away, do nothing for a moment; otherwise, press the "Later" button. (I think the 3 choices you get are "Continue", "Cancel", and "Do this Later", or something like that)
- Attach the phone to the computer, and using the "adb" program in a command window, first type the command
If everything is working OK, you will see your device ID number printed on the screen; then
Code:
adb logcat -v time > captured_logcat.txt
The 2nd command will appear to "hang"; that is because it is continuously recording output from the logcat program to the file "captured_logcat.txt", and will do so until the phone reboots.
- Accept the update. (If you did a "Later" earlier in the day, go to Settings -> Phone Status -> System updates. That should get the ball rolling again.)
- Go through the update and let the phone reboot.
Now open up the "logcat.txt file" using notepad or wordpad. Towards the very end of the file, there will be a line that reads something like
Rebooting to install update
BlahBlahBlah....blahblah.zip <- That's the file name right there.
Based on past experience, we can then reconstruct the full URL (there are one or two alternative path names).
(2) Method Two - Capture the File With a Custom Recovery
I actually made a modified version of Amon_RA's recovery boot which fiddles around with the recovery booting sequence in a way that it copies and then deletes the OTA file(s) out of the /cache area before anything else starts running on the phone. This allows the complete file to be captured to the SD card - so even if the /cache partition gets wiped/cleaned up, we'll get the full file as well as discover it's name. It is supposed to be engineered in a way that it behaves essentially identically to a normal Amon_RA recovery in all other respects.
That custom recovery can be found in
this XDA post. It's really meant only for people that are very comfortable replacing their custom recovery (either by flashing it with fastboot because they have the S-OFF bootloader, or using the "flash_image" program, either with Amon_RA running, or a rooted ROM running - kind of like the original "Grdlock/Acidbath" rooting instructions.
(3) Method 3: WiFi Sniffing.
(An incredible amount of work.)
In this method you set up your Eris on WiFi only, and flood the packets to/from the WiFi router to a network flight recorder (e.g. tcpdump or Wireshark running on a promiscuous I/F). This requires either a dual-port linux box or a switch with a monitor port. This allows you to see the DNS resolver requests to figure out what hostname is being used when the OTA download begins. If the transfer is done with HTTP, rather than HTTPS, the full URL can also be sniffed out of the traffic.
cheers
eu1