2022-04-04 21:48:14 -04:00
|
|
|
#!/bin/bash
|
|
|
|
#DivestOS: A privacy focused mobile distribution
|
2022-05-01 01:13:46 -04:00
|
|
|
#Copyright (c) 2017-2022 Divested Computing Group
|
2022-04-04 21:48:14 -04:00
|
|
|
#
|
|
|
|
#This program is free software: you can redistribute it and/or modify
|
|
|
|
#it under the terms of the GNU General Public License as published by
|
|
|
|
#the Free Software Foundation, either version 3 of the License, or
|
|
|
|
#(at your option) any later version.
|
|
|
|
#
|
|
|
|
#This program is distributed in the hope that it will be useful,
|
|
|
|
#but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
#MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
#GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
#You should have received a copy of the GNU General Public License
|
|
|
|
#along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
umask 0022;
|
|
|
|
|
|
|
|
#Last verified: 2022-04-04
|
|
|
|
|
|
|
|
patchAllKernels() {
|
2023-01-10 11:42:17 -05:00
|
|
|
startPatcher "kernel_essential_msm8998 kernel_fairphone_sdm632 kernel_razer_msm8998 kernel_sony_sdm660 kernel_xiaomi_sm8150 kernel_xiaomi_sm8250";
|
2022-04-04 21:48:14 -04:00
|
|
|
}
|
|
|
|
export -f patchAllKernels;
|
|
|
|
|
|
|
|
scanWorkspaceForMalware() {
|
|
|
|
local scanQueue="$DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
|
|
|
|
scanQueue=$scanQueue" $DOS_BUILD_BASE/lineage-sdk $DOS_BUILD_BASE/vendor/lineage";
|
|
|
|
scanForMalware true "$scanQueue";
|
|
|
|
}
|
|
|
|
export -f scanWorkspaceForMalware;
|
|
|
|
|
|
|
|
buildDevice() {
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
export OTA_KEY_OVERRIDE_DIR="$DOS_SIGNING_KEYS/$1";
|
|
|
|
breakfast "lineage_$1-user" && mka target-files-package otatools && processRelease $1 true $2;
|
|
|
|
}
|
|
|
|
export -f buildDevice;
|
|
|
|
|
|
|
|
buildDeviceDebug() {
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
unset OTA_KEY_OVERRIDE_DIR;
|
|
|
|
brunch "lineage_$1-eng";
|
|
|
|
}
|
|
|
|
export -f buildDeviceDebug;
|
|
|
|
|
|
|
|
buildAll() {
|
|
|
|
umask 0022;
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
2022-04-06 16:41:14 -04:00
|
|
|
#SD630
|
|
|
|
buildDevice pioneer;
|
|
|
|
buildDevice voyager;
|
|
|
|
buildDevice discovery;
|
2022-04-05 20:41:01 -04:00
|
|
|
#SD835
|
2022-04-28 19:51:41 -04:00
|
|
|
buildDevice cheryl verity;
|
2023-02-17 17:33:47 -05:00
|
|
|
#buildDevice mata verity; #superseded
|
2022-07-01 14:08:55 -04:00
|
|
|
#SD632
|
|
|
|
buildDevice FP3 avb;
|
2022-04-06 16:41:14 -04:00
|
|
|
#SD855
|
2022-08-08 14:02:58 -04:00
|
|
|
buildDevice vayu avb;
|
2022-05-31 19:45:44 -04:00
|
|
|
#SD865
|
|
|
|
buildDevice lmi avb;
|
|
|
|
#SD870
|
|
|
|
buildDevice alioth avb;
|
2022-04-04 21:48:14 -04:00
|
|
|
}
|
|
|
|
export -f buildAll;
|
|
|
|
|
|
|
|
patchWorkspace() {
|
|
|
|
umask 0022;
|
|
|
|
cd "$DOS_BUILD_BASE$1";
|
|
|
|
touch DOS_PATCHED_FLAG;
|
|
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
2022-08-26 23:02:25 -04:00
|
|
|
verifyAllPlatformTags;
|
|
|
|
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
|
2022-04-04 21:48:14 -04:00
|
|
|
|
2023-02-17 17:33:47 -05:00
|
|
|
#source build/envsetup.sh;
|
2022-12-18 21:46:31 -05:00
|
|
|
#repopick -ift twelve-bt-sbc-hd-dualchannel;
|
2022-10-24 22:53:41 -04:00
|
|
|
#repopick -it twelve-colors;
|
2023-02-01 20:31:12 -05:00
|
|
|
repopick -if 330099; #Updater: Add prop for allowing major updates
|
2022-04-04 21:48:14 -04:00
|
|
|
|
|
|
|
sh "$DOS_SCRIPTS/Patch.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Copy_Keys.sh";
|
2023-02-01 15:53:36 -05:00
|
|
|
sh "$DOS_SCRIPTS_COMMON/Defaults.sh";
|
2022-04-04 21:48:14 -04:00
|
|
|
sh "$DOS_SCRIPTS/Rebrand.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Optimize.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Deblob.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Post.sh";
|
|
|
|
source build/envsetup.sh;
|
|
|
|
|
|
|
|
#Deblobbing fixes
|
|
|
|
##setup-makefiles doesn't execute properly for some devices, running it twice seems to fix whatever is wrong
|
|
|
|
#none yet
|
|
|
|
}
|
|
|
|
export -f patchWorkspace;
|
|
|
|
|
|
|
|
enableDexPreOpt() {
|
|
|
|
cd "$DOS_BUILD_BASE$1";
|
|
|
|
if [ -f BoardConfig.mk ]; then
|
|
|
|
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
|
|
|
|
echo "WITH_DEXPREOPT_DEBUG_INFO := false" >> BoardConfig.mk;
|
|
|
|
if true; then
|
|
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk;
|
|
|
|
echo "Enabled full dexpreopt for $1";
|
|
|
|
else
|
|
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true" >> BoardConfig.mk;
|
|
|
|
echo "Enabled core dexpreopt for $1";
|
|
|
|
fi;
|
|
|
|
fi;
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
}
|
|
|
|
export -f enableDexPreOpt;
|
|
|
|
|
|
|
|
enableLowRam() {
|
|
|
|
cd "$DOS_BUILD_BASE$1";
|
2022-04-11 23:04:42 -04:00
|
|
|
if [ -f lineage_$2.mk ]; then echo -e '\n$(call inherit-product, vendor/divested/build/target/product/lowram.mk)' >> lineage_$2.mk; fi;
|
2022-04-04 21:48:14 -04:00
|
|
|
echo "Enabled lowram for $1";
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
}
|
|
|
|
export -f enableLowRam;
|