2018-02-11 23:50:18 -05:00
|
|
|
#!/bin/bash
|
2020-11-17 10:11:40 -05:00
|
|
|
#DivestOS: A privacy focused mobile distribution
|
2022-05-01 01:13:46 -04:00
|
|
|
#Copyright (c) 2017-2022 Divested Computing Group
|
2018-02-11 23:50:18 -05:00
|
|
|
#
|
|
|
|
#This program is free software: you can redistribute it and/or modify
|
|
|
|
#it under the terms of the GNU General Public License as published by
|
|
|
|
#the Free Software Foundation, either version 3 of the License, or
|
|
|
|
#(at your option) any later version.
|
|
|
|
#
|
|
|
|
#This program is distributed in the hope that it will be useful,
|
|
|
|
#but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
#MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
#GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
#You should have received a copy of the GNU General Public License
|
|
|
|
#along with this program. If not, see <https://www.gnu.org/licenses/>.
|
2021-10-16 19:15:19 -04:00
|
|
|
umask 0022;
|
2018-02-11 23:50:18 -05:00
|
|
|
|
2021-10-16 16:28:41 -04:00
|
|
|
#Last verified: 2021-10-16
|
2018-04-27 23:09:52 -04:00
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
patchAllKernels() {
|
Device cleanup
Drop long non-compiling devices:
- 14.1: n7100, jellypro
- 15.1: himaul, oneplus2
- 16.0: zenfone3, fugu
- 17.1: yellowstone, fugu
- 18.1: bonito, sargo
Drop in favor of 19.1:
- 17.1: bonito, sargo
- 18.1: pro1, aura, sunfish, coral, flame, bramble, redfin
(experimental, but these devices don't currently appear to have any users)
Signed-off-by: Tad <tad@spotco.us>
2022-04-26 12:19:11 -04:00
|
|
|
startPatcher "kernel_asus_fugu kernel_asus_msm8916 kernel_google_dragon kernel_google_msm kernel_htc_flounder kernel_huawei_angler kernel_lge_bullhead kernel_lge_hammerhead kernel_lge_msm8996 kernel_moto_shamu kernel_nextbit_msm8992 kernel_zte_msm8996";
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f patchAllKernels;
|
|
|
|
|
2018-05-11 06:15:29 -04:00
|
|
|
scanWorkspaceForMalware() {
|
2019-09-17 00:55:50 -04:00
|
|
|
local scanQueue="$DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/compatibility $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
|
2018-06-29 00:55:21 -04:00
|
|
|
scanQueue=$scanQueue" $DOS_BUILD_BASE/lineage-sdk $DOS_BUILD_BASE/vendor/lineage";
|
2019-03-31 22:46:37 -04:00
|
|
|
scanForMalware true "$scanQueue";
|
2018-05-11 06:15:29 -04:00
|
|
|
}
|
|
|
|
export -f scanWorkspaceForMalware;
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
buildDevice() {
|
2021-01-24 00:44:34 -05:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2023-03-08 16:02:02 -05:00
|
|
|
if [[ -d "$DOS_SIGNING_KEYS/$1" ]]; then
|
|
|
|
export OTA_KEY_OVERRIDE_DIR="$DOS_SIGNING_KEYS/$1";
|
|
|
|
breakfast "lineage_$1-user" && mka target-files-package otatools && processRelease $1 true $2;
|
|
|
|
else
|
|
|
|
echo -e "\e[0;31mNo signing keys available for $1\e[0m";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f buildDevice;
|
|
|
|
|
2018-04-23 08:43:28 -04:00
|
|
|
buildDeviceDebug() {
|
2021-01-24 00:44:34 -05:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2019-09-13 20:26:43 -04:00
|
|
|
unset OTA_KEY_OVERRIDE_DIR;
|
2018-06-23 00:21:48 -04:00
|
|
|
brunch "lineage_$1-eng";
|
2018-04-23 08:43:28 -04:00
|
|
|
}
|
|
|
|
export -f buildDeviceDebug;
|
|
|
|
|
2018-02-11 23:50:18 -05:00
|
|
|
buildAll() {
|
2021-06-27 14:14:34 -04:00
|
|
|
umask 0022;
|
2021-01-24 00:44:34 -05:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-06-29 00:55:21 -04:00
|
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
2021-03-26 20:34:18 -04:00
|
|
|
#SDS4P
|
2022-04-14 11:42:26 -04:00
|
|
|
buildDevice deb;
|
2021-07-13 10:10:56 -04:00
|
|
|
buildDevice flo; #Last version without repartitioning required + 18.1 has random power off issue
|
2021-03-20 14:17:37 -04:00
|
|
|
#SD801
|
2021-03-25 00:35:53 -04:00
|
|
|
buildDevice hammerhead; #Last version with working Bluetooth
|
2021-03-20 14:17:37 -04:00
|
|
|
#SD805
|
|
|
|
buildDevice shamu verity; #Last version with working IMS
|
|
|
|
#SD808
|
2019-09-02 20:00:39 -04:00
|
|
|
buildDevice angler verity;
|
2021-03-20 14:17:37 -04:00
|
|
|
buildDevice bullhead verity;
|
|
|
|
buildDevice ether; #Last version with working IMS
|
|
|
|
#SD615
|
2021-07-13 10:10:56 -04:00
|
|
|
buildDevice Z00T;
|
2021-03-20 14:17:37 -04:00
|
|
|
#SD820
|
2021-04-14 23:41:31 -04:00
|
|
|
buildDevice axon7;
|
2020-11-29 19:19:43 -05:00
|
|
|
buildDevice h870;
|
2019-08-27 13:13:48 -04:00
|
|
|
buildDevice us997;
|
2021-03-20 14:17:37 -04:00
|
|
|
#Intel
|
|
|
|
buildDevice fugu;
|
|
|
|
#Tegra
|
2020-07-12 19:04:01 -04:00
|
|
|
buildDevice flounder verity;
|
2022-04-14 11:42:26 -04:00
|
|
|
buildDevice flounder_lte verity;
|
2019-09-02 20:00:39 -04:00
|
|
|
buildDevice dragon verity;
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f buildAll;
|
|
|
|
|
|
|
|
patchWorkspace() {
|
2021-06-27 14:14:34 -04:00
|
|
|
umask 0022;
|
2023-03-08 00:22:01 -05:00
|
|
|
cd "$DOS_BUILD_BASE/$1";
|
2021-10-16 15:28:15 -04:00
|
|
|
touch DOS_PATCHED_FLAG;
|
2018-06-29 00:55:21 -04:00
|
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
2022-08-26 23:02:25 -04:00
|
|
|
verifyAllPlatformTags;
|
|
|
|
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
|
2018-05-10 23:45:29 -04:00
|
|
|
|
2022-03-08 21:10:32 -05:00
|
|
|
#source build/envsetup.sh;
|
2019-09-07 09:56:47 -04:00
|
|
|
|
2021-10-16 15:28:15 -04:00
|
|
|
sh "$DOS_SCRIPTS/Patch.sh";
|
2021-11-01 21:35:41 -04:00
|
|
|
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
2021-10-16 15:28:15 -04:00
|
|
|
sh "$DOS_SCRIPTS_COMMON/Copy_Keys.sh";
|
2023-02-01 15:53:36 -05:00
|
|
|
sh "$DOS_SCRIPTS_COMMON/Defaults.sh";
|
2021-10-16 15:28:15 -04:00
|
|
|
sh "$DOS_SCRIPTS/Rebrand.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Optimize.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Deblob.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
|
|
|
sh "$DOS_SCRIPTS_COMMON/Post.sh";
|
2018-02-11 23:50:18 -05:00
|
|
|
source build/envsetup.sh;
|
|
|
|
}
|
|
|
|
export -f patchWorkspace;
|
|
|
|
|
|
|
|
enableDexPreOpt() {
|
2023-03-08 00:22:01 -05:00
|
|
|
cd "$DOS_BUILD_BASE/$1";
|
2021-05-29 17:29:36 -04:00
|
|
|
if [ -f BoardConfig.mk ]; then
|
|
|
|
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
|
|
|
|
echo "WITH_DEXPREOPT_DEBUG_INFO := false" >> BoardConfig.mk;
|
|
|
|
echo "WITH_DEXPREOPT_PIC := true" >> BoardConfig.mk;
|
2021-05-30 01:55:29 -04:00
|
|
|
if true; then
|
|
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk;
|
|
|
|
echo "Enabled full dexpreopt for $1";
|
|
|
|
else
|
|
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true" >> BoardConfig.mk;
|
|
|
|
echo "Enabled core dexpreopt for $1";
|
|
|
|
fi;
|
2018-02-11 23:50:18 -05:00
|
|
|
fi;
|
2018-06-29 00:55:21 -04:00
|
|
|
cd "$DOS_BUILD_BASE";
|
2018-02-11 23:50:18 -05:00
|
|
|
}
|
|
|
|
export -f enableDexPreOpt;
|
|
|
|
|
2018-07-10 21:27:55 -04:00
|
|
|
enableLowRam() {
|
2023-03-08 00:22:01 -05:00
|
|
|
if [ -d "$DOS_BUILD_BASE/$1" ]; then
|
|
|
|
cd "$DOS_BUILD_BASE/$1";
|
2023-03-08 00:02:28 -05:00
|
|
|
if [ -f lineage.mk ]; then echo -e '\n$(call inherit-product, vendor/divested/build/target/product/lowram.mk)' >> lineage.mk; fi;
|
|
|
|
if [ -f BoardConfig.mk ]; then echo 'MALLOC_SVELTE := true' >> BoardConfig.mk; fi;
|
|
|
|
if [ -f BoardConfigCommon.mk ]; then echo 'MALLOC_SVELTE := true' >> BoardConfigCommon.mk; fi;
|
|
|
|
echo "Enabled lowram for $1";
|
|
|
|
cd "$DOS_BUILD_BASE";
|
|
|
|
else
|
|
|
|
echo "Not enabling lowram for $1, not available";
|
|
|
|
fi;
|
2018-07-10 21:27:55 -04:00
|
|
|
}
|
|
|
|
export -f enableLowRam;
|