Skip to main content

A handy Swiss-army-knife-like utility for manipulating Android Backup files (`*.ab`, `*.adb`) produced by `adb backup`, `bmgr`, and similar tools

Project description

What is abarms?

abarms is a handy Swiss-army-knife-like tool/utility/console app for POSIX-compatible systems for manipulating Android Backup files (*.ab, *.adb) produced by adb backup, bmgr, and similar tools. abarms can list contents, convert Android Backup files into TAR files and back (by decrypting, decompressing, and re-compressing said files), and split full-system dumps produced by adb backup into per-app backups that can be given to adb restore.

Basically, this is a simpler pure Python implementation (only requires setuptools and cryptography modules) of android-backup-extractor and the parts of android-backup-toolkit and android-backup-processor that I use myself.

Why does abarms exists?

(TL;DR: read the parts in bold.)

Did you know that your Android OS device already has an awesome built-in full-system phone-to-PC backup and PC-to-phone restore tool that does not require root access? adb utility of Android Platform Tools has adb backup subcommand that, in principle, can do basically everything you could possibly want there.

Internally this is implemented via Android OS setuid root binary named bu --- which you can run manually via adb shell bu help --- that simply backs up every app on the device one by one and streams the resulting .ab file --- which is a wrapped PAX-formatted TAR file (see "EXTENDED DESCRIPTION" section in man 1 pax) --- to stdout. adb backup subcommand is just a simple wrapper around it.

But then Android Platform Tools bundle gives no tools to manipulate those backup files! So, if you make a full-system backup with adb backup, and then want to restore a single app out of 100+ you have installed on your device, you need third-party tools now. This is kind of embarrassing, to be honest. A tool to manipulate backup files should have been a standard utility in Android Platform Tools since Android version 0.1 or something. (Seriously, are you not embarrassed? I'm embarrassed for the state of humanity thinking about how the most popular OS on the planet gives no widely accessible local backup and restore tools on par with what every user of 1970s-era UNIX mainframe had out of the box. I'm not asking for automatic opportunistic incremental quantum-safely encrypted full-system replication to cooperative nearby devices in a local mesh-network here!)

Well, technically speaking, Android OS also has automatic scheduled non-interactive backup service bmgr --- which can be controlled via Android settings menu and adb shell bmgr help, that does per-app backups and restores. Internally, bmgr service also generates .ab files and then either uploads them to Google --- which is the default and the only option available through the settings menu --- or stores them locally under /data/data/com.android.localtransport/files/ --- which requires root to access. On old Android versions you could ask bmgr to do a backup to an SD card directly from the settings menu, but Google removed that functionality to force users to use Cloud-based backups.

So, basically, according to Google (and Samsung, which ship with their own bmgr-like service in parallel with bmgr), to restore to a previous state of an app, or to migrate between phones you now apparently have to upload all your data to their servers in plain-text for their convenient data-mining and selling of your data to interested third parties. Google even went as far as to hide adb backup subcommand from their official Android documentation: compare the old manual for adb with the current one, Control+F for "backup".

This resulted into every Android vendor now making their own vendor-specific phone-to-phone migration utilities, and a whole ecosystem of commercial apps that do what adb backup already does, but worse.

This also resulted in usefulness of adb backup itself being reduced because in Android version 6 Google made automatic daily file-based backups that get uploaded to Google the default when you attach your phone to your Google account. So, most apps started to opt-out of those backups for privacy and security reasons -- which also started opting them out of being included in adb backup output, since bmgr and bu share most of the infrastructure. Some of those apps now implement their own in-app backup buttons hidden away in the settings menu somewhere, but most do not.

Yes, this is stupid, see this discussion on StackOverflow. See also old Android developer docs that explained this fairly clearly here and here.

(You can also force an app to be included in adb backup by rebuilding its APK to enable android:allowBackup attribute in the manifest and installing the result manually, see this for more info. But this will only work for newly installed apps as you will have to re-sign the resulting APK with your own private key and Android forbids app updates that change the signing key.)

But, hopefully, eventually, some alternative firmware developer will fix the above bug and allow adb backup to backup all apps regardless of android:allowBackup manifest setting, as it should.

Still, adb backup works fine for a lot of apps and, hopefully, will eventually get back to working as well as it did before Android version 6 in the future. Meanwhile, android-backup-toolkit allows you to split full-system dumps produced by adb backup into per-app backups that can then be restored with adb restore.

The problem is that, while I'm thankful that android-backup-toolkit exists, I find it really annoying to use: it is a bundle of pre-compiled Java apps, binaries, and shell scripts that manages to work somehow, but modifying anything there is basically impossible as building all of those things from sources is an adventure I failed to complete, and then you need to install the gigantic Java VM and libraries to run it all.

So, as it currently stands, to have per-app backups of your Android device you have to either:

  • root your device;
  • give up your privacy by uploading your backups to other people's computers (aka "the cloud"); or
  • repack all you APKs with android:allowBackup = true and either run older Android firmware that can do backup to an SD card or run adb backup from your PC, and then extract per-app backups from its output (yes, this is not ideal, but it works, and does not need root).

So, one day I was looking at all of this. I couldn't root or change the firmware on a phone I wanted to keep backed up, but I could follow the last option and get most of what I wanted with almost no effort. Except figuring out how to run android-backup-toolkit to do the very last step of this took me quite a while. And so I thought, "Hmm, this seems overly complicated, something as simple as splitting and merging TAR files with some additional headers should be doable with a simple Python program." So I made one.

It turned out to be a bit less simple than I though it would be, mostly because Python's tarfile module was not designed for this, so I had to make my own, and PAX-formatted TAR files are kind of ugly to parse, but it works now, so, eh.

Hopefully, abarms existing will inspire more app and alternative firmware developers to support adb backup properly and so personal computing devices of late 2020s will finally reach feature parity with 1970s-era Tape ARchiving (TAR) backup technology.

Quickstart

Installation

  • Install with:
    pip install abarms
    
    and run as
    abarms --help
    
  • Alternatively, install it via Nix
    nix-env -i -f ./default.nix
    
  • Alternatively, run without installing:
    python3 -m abarms --help
    

Backup all apps from your Android device, then restore a single app, without root

Prepare your PC and phone

Before you make a full backup of your Android phone (or other device) you need to

  • install Android Platform Tools (either from there or from you distribution),

  • enable Developer Mode and USB Debugging (see Android Docs for instructions).

  • then, usually, on your PC you need to run

    sudo adb kill-server
    sudo adb start-server
    

    unless, you added special UDev rules for your phone.

Do a full backup

To do the backup, you need to unlock your phone, connect your it to your PC via a USB cable (in that order, otherwise USB Debugging will be disabled), confirm that the PC is allowed to do USB Debugging in the popup on the phone, then run

adb backup -apk -obb -noshared -all -system -keyvalue

on your PC, then (unlock your phone again and) press "Back up my data" button at the bottom of your screen.

Now you need to wait awhile for adb to finish. The result will be saved in backup.ab file.

If you want to backup to an explicitly named file, e.g. to note the date of the backup, run

adb backup -f backup_20240101.ab -apk -obb -noshared -all -system -keyvalue

instead.

Split it into pieces

You can view contents of the backup via

abarms ls backup_20240101.ab

and split it into per-app backups via

abarms split backup_20240101.ab

which will produce a bunch of files named abarms_split_<filename>_<num>_<appname>.ab (e.g. abarms_split_backup_20240101_020_org.fdroid.fdroid.ab).

Restore a single app

A single per-app file can be fed back to adb restore to restore that singe app, e.g.

adb restore abarms_split_backup_20240101_020_org.fdroid.fdroid.ab

Rebuild full backup from parts

You can also rebuild the original full-backup from parts via

abarms merge abarms_split_backup_20240101_*.ab backup_20240101.rebuilt.ab

to check that it produces exactly the same backup file

# strip encryption and compression from the original
abarms strip backup_20240101.ab backup_20240101.stripped.ab

# compare to the stipped original and the rebuilt file
diff backup_20240101.stripped.ab backup_20240101.rebuilt.ab || echo differ

Alternatives

android-backup-toolkit and friends

If you have root on your device

Assuming you have root on your Android phone, you can do

# check if bmgr is enabled
adb shell bmgr enabled

# list bmgr transports
adb shell bmgr list transports
# localtransport should be there, enable it
adb shell bmgr transport com.android.localtransport/.LocalTransport

# enable bmgr
adb shell bmgr enable true

# do a full backup now
adb shell bmgr fullbackup

and then take per-app backup files from /data/data/com.android.localtransport/files/.

Quirks

The precise algorithm for how encrypted Android Backup files get their master key salted checksums computed remains a mystery to me even after reading all the related Android sources.

Luckily, those checksums verify that the given passphrase is correct and can be ignored while reading .ab files since the following encrypted Android Backup headers are verbose enough that a wrong passphrase will break parsing anyway. None of my use cases ever need encrypted .ab files and no firmware I know of requires adb restore inputs to be encrypted.

So, after spending two days trying to figure those checksums out I decided that abarms does not support generating encrypted .ab files by design. (You are welcome to try and implement this, see comments in the __main__.py.)

If it isn't clear, abarms does support encrypted .ab files as inputs (because my phone always generates such regardless of my wishes).

License

GPLv3+, small library parts are MIT.

Usage

abarms

A handy Swiss-army-knife-like utility for manipulating Android Backup files (*.ab, *.adb) produced by adb backup, bmgr, and similar tools.

  • options:

    • --version : show program's version number and exit
    • -h, --help : show this help message and exit
    • --markdown : show help messages formatted in Markdown
  • passphrase:

    • -p PASSPHRASE, --passphrase PASSPHRASE : passphrase for an encrypted INPUT_AB_FILE
    • --passfile PASSFILE : a file containing the passphrase for an encrypted INPUT_AB_FILE; similar to -p option but the whole contents of the file will be used verbatim, allowing you to, e.g. use new line symbols or strange character encodings in there; default: guess based on INPUT_AB_FILE trying to replace ".ab" and ".adb" extensions with ".passphrase.txt"
  • subcommands:

    • {ls,list,strip,ab2ab,split,ab2many,merge,many2ab,unwrap,ab2tar,wrap,tar2ab}
      • ls (list) : list contents of an Android Backup file
      • strip (ab2ab) : strip encyption and compression from an Android Backup file
      • split (ab2many) : split a full-system Android Backup file into a bunch of per-app Android Backup files
      • merge (many2ab) : merge a bunch of Android Backup files into one
      • unwrap (ab2tar) : convert an Android Backup file into a TAR file
      • wrap (tar2ab) : convert a TAR file into an Android Backup file

abarms ls

List contents of an Android Backup file similar to how tar -tvf would do, but this will also show Android Backup file version and compression flags.

  • positional arguments:
    • INPUT_AB_FILE : an Android Backup file to be used as input, set to "-" to use standard input

abarms strip

Convert an Android Backup file into another Android Backup file with encryption and (optionally) compression stripped away. I.e. convert an Android Backup file into a simple unencrypted (plain-text) and uncompressed version of the same.

Versioning parameters and the TAR file stored inside the input file are copied into the output file verbatim.

Useful e.g. if your Android firmware forces you to encrypt your backups but you store your backups on an encrypted media anyway and don't want to remember more passphrases than strictly necessary. Or if you want to strip encryption and compression and re-compress using something better than zlib.

  • positional arguments:

    • INPUT_AB_FILE : an Android Backup file to be used as input, set to "-" to use standard input
    • OUTPUT_AB_FILE : file to write the output to, set to "-" to use standard output; default: "-" if INPUT_TAR_FILE is "-", otherwise replace ".ab" and ".adb" extension of INPUT_TAR_FILE with .stripped.ab
  • options:

    • -d, --decompress : produce decompressed output; this is the default
    • -k, --keep-compression : copy compression flag and data from input to output as-is; this will make the output into a compressed Android Backup file if the source is compressed; this is the fastest way to strip, since it just copies bytes around as-is
    • -c, --compress : (re-)compress the output file; this could take awhile

abarms split

Split a full-system Android Backup file into a bunch of per-app Android Backup files.

Resulting per-app files can be given to adb restore to restore selected apps.

Also, if you do backups regularly, then splitting large Android Backup files like this and then deduplicating per-app files between backups could save lots of disk space.

  • positional arguments:

    • INPUT_AB_FILE : an Android Backup file to be used as input, set to "-" to use standard input
  • options:

    • --prefix PREFIX : file name prefix for output files; default: abarms_split_backup if INPUT_AB_FILE is "-", abarms_split_<INPUT_AB_FILE without its ".ab" or ".adb" extension> otherwise
    • -c, --compress : compress per-app output files

abarms merge

Merge many smaller Android Backup files into a single larger one. A reverse operation to split.

This exists mostly for checking that split is not buggy.

  • positional arguments:

    • INPUT_AB_FILE : Android Backup files to be used as inputs
    • OUTPUT_AB_FILE : file to write the output to
  • options:

    • -c, --compress : compress the output file

abarms unwrap

Convert Android Backup header into a TAR file by stripping Android Backup header, decrypting and decompressing as necessary.

The TAR file stored inside the input file gets copied into the output file verbatim.

  • positional arguments:
    • INPUT_AB_FILE : an Android Backup file to be used as input, set to "-" to use standard input
    • OUTPUT_TAR_FILE : file to write output to, set to "-" to use standard output; default: guess based on INPUT_AB_FILE while setting extension to .tar

abarms wrap --output-version

Convert a TAR file into an Android Backup file by prepending Android Backup header and (optionally) compressing TAR data with zlib (the only compressing Android Backup file format supports).

The input TAR file gets copied into the output file verbatim.

Note that the above means that unwrapping a .ab file, unpacking the resulting .tar, editing the resulting files, packing them back with GNU tar utility, running abarms wrap, and then running adb restore on the resulting file will probably crash your Android device (phone or whatever) because the Android-side code restoring from the backup expects the data in the packed TAR to be in a certain order and have certain PAX headers, which GNU tar will not produce.

So you should only use this on files previously produced by abarms unwrap or if you know what it is you are doing.

Production of encrypted Android Backup files is not supported at this time.

  • positional arguments:

    • INPUT_TAR_FILE : a TAR file to be used as input, set to "-" to use standard input
    • OUTPUT_AB_FILE : file to write the output to, set to "-" to use standard output; default: "-" if INPUT_TAR_FILE is "-", otherwise replace ".ab" and ".adb" extension of INPUT_TAR_FILE with .ab
  • options:

    • --output-version OUTPUT_VERSION : Android Backup file version to use (required)
    • -c, --compress : compress the output file

Usage notes

Giving an encrypted INPUT_AB_FILE as input, not specifying --passphrase or --passfile, and not having a file named {INPUT_AB_FILE with ".ab" or ".adb" extension replaced with ".passphrase.txt"} in the same directory will case the passphrase to be read interactively from the tty.

Examples

  • List contents of an Android Backup file:

    abarms ls backup.ab
    
  • Use tar util to list contents of an Android Backup file instead of running abarms ls:

    abarms unwrap backup.ab - | tar -tvf -
    
  • Extract contents of an Android Backup file:

    abarms unwrap backup.ab - | tar -xvf -
    
  • Strip encryption and compression from an Android Backup file:

    # equivalent
    abarms strip backup.ab backup.stripped.ab
    abarms strip backup.ab
    
    # equivalent
    abarms strip --passphrase secret backup.ab
    abarms strip -p secret backup.ab
    
    # with passphrase taken from a file
    echo -n secret > backup.passphrase.txt
    # equivalent
    abarms strip backup.ab
    abarms strip --passfile backup.passphrase.txt backup.ab
    
    # with a weird passphrase taken from a file
    echo -ne "secret\r\n\x00another line" > backup.passphrase.txt
    abarms strip backup.ab
    
  • Strip encryption but keep compression, if any:

    # equivalent
    abarms strip --keep-compression backup.ab backup.stripped.ab
    abarms strip -k backup.ab
    
  • Strip encryption and compression from an Android Backup file and then re-compress using xz:

    abarms strip backup.ab - | xz --compress -9 - > backup.ab.xz
    # ... and then convert to tar and list contents:
    xzcat backup.ab.xz | abarms unwrap - | tar -tvf -
    
  • Convert an Android Backup file into a TAR archive:

    # equivalent
    abarms unwrap backup.ab backup.tar
    abarms unwrap backup.ab
    
  • Convert a TAR archive into an Android Backup file:

    # equivalent
    abarms wrap --output-version=5 backup.tar backup.ab
    abarms wrap --output-version=5 backup.tar
    

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

abarms-1.0.0.tar.gz (29.2 kB view hashes)

Uploaded Source

Built Distribution

abarms-1.0.0-py3-none-any.whl (24.5 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page