diff --git a/Scripts/Common/Functions.sh b/Scripts/Common/Functions.sh index 170cf10f..03941109 100644 --- a/Scripts/Common/Functions.sh +++ b/Scripts/Common/Functions.sh @@ -16,9 +16,9 @@ #along with this program. If not, see . if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then - echo -e "\e[0;33mWARNING: YOU HAVE ENABLED PATCHES THAT WHILE OPEN SOURCE ARE ENCUMBERED BY RESTRICTIVE LICENSES\e[0m"; + echo -e "\e[0;33mWARNING: YOU HAVE ENABLED PATCHES THAT WHILE ARE OPEN SOURCE ARE ALSO ENCUMBERED BY RESTRICTIVE LICENSES\e[0m"; echo -e "\e[0;33mPLEASE SEE THE 'LICENSES' FILE AT THE ROOT OF THIS REPOSITORY FOR MORE INFORMATION\e[0m"; - echo -e "\e[0;33mDISABLE THEM BY SETTING 'NON_COMMERCIAL_USE_PATCHES' TO 'false' IN 'Scripts/*/00init.sh'\e[0m"; + echo -e "\e[0;33mDISABLE THEM BY SETTING 'NON_COMMERCIAL_USE_PATCHES' TO 'false' IN 'Scripts/init.sh'\e[0m"; sleep 15; fi; @@ -108,9 +108,11 @@ export -f compressRamdisks; enhanceLocation() { cd $base$1; #Enable GLONASS - #sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT/A_GLONASS_POS_PROTOCOL_SELECT/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; - #sed -i 's/A_GLONASS_POS_PROTOCOL_SELECT = 0.*/A_GLONASS_POS_PROTOCOL_SELECT = 15/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; - #sed -i 's|A_GLONASS_POS_PROTOCOL_SELECT=0.*|A_GLONASS_POS_PROTOCOL_SELECT=15|' overlay/frameworks/base/core/res/res/values-*/*.xml &>/dev/null || true; + if [ "$GLONASS_FORCED_ENABLE" = false ]; then + sed -i 's/#A_GLONASS_POS_PROTOCOL_SELECT/A_GLONASS_POS_PROTOCOL_SELECT/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; + sed -i 's/A_GLONASS_POS_PROTOCOL_SELECT = 0.*/A_GLONASS_POS_PROTOCOL_SELECT = 15/' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; + sed -i 's|A_GLONASS_POS_PROTOCOL_SELECT=0.*|A_GLONASS_POS_PROTOCOL_SELECT=15|' overlay/frameworks/base/core/res/res/values-*/*.xml &>/dev/null || true; + fi; #Recommended reading: https://wwws.nightwatchcybersecurity.com/2016/12/05/cve-2016-5341/ #XTRA: Only use specified URLs sed -i 's|XTRA_SERVER_QUERY=1|XTRA_SERVER_QUERY=0|' gps.conf gps/gps.conf configs/gps.conf &>/dev/null || true; diff --git a/Scripts/LineageOS-14.1/Patch.sh b/Scripts/LineageOS-14.1/Patch.sh index 0ed706df..500916f1 100755 --- a/Scripts/LineageOS-14.1/Patch.sh +++ b/Scripts/LineageOS-14.1/Patch.sh @@ -197,6 +197,7 @@ cp $patches"android_vendor_cm/config.xml" overlay/common/vendor/cmsdk/cm/res/res cp -r $patches"android_vendor_cm/firmware_deblobber" .; cp $patches"android_vendor_cm/firmware_deblobber.mk" build/tasks/firmware_deblobber.mk; sed -i 's/CM_BUILDTYPE := UNOFFICIAL/CM_BUILDTYPE := dos/' config/common.mk; #Change buildtype +if [ "$NON_COMMERCIAL_USE_PATCHES" = true ]; then sed -i 's/CM_BUILDTYPE := dos/CM_BUILDTYPE := dosNC/' config/common.mk; fi; sed -i 's/messaging/Silence/' config/telephony.mk; #Replace AOSP Messaging app with Silence #if [ "$HOSTS_BLOCKING" = false ]; then echo "PRODUCT_PACKAGES += DNS66" >> config/sce.mk; fi; #Include DNS66 as an alternative if [ "$HOSTS_BLOCKING" = false ]; then cp $patches"android_vendor_cm/dns66.json" prebuilt/common/etc/dns66.json; fi; diff --git a/Scripts/init.sh b/Scripts/init.sh index 95d7025c..d2df70d9 100644 --- a/Scripts/init.sh +++ b/Scripts/init.sh @@ -21,6 +21,7 @@ export androidWorkspace="/mnt/Drive-3/"; #XXX: THIS MUST BE CORRECT TO BUILD! export DEFAULT_DNS="OpenNIC"; #Sets default DNS, choices: Cloudflare, OpenNIC +export GLONASS_FORCED_ENABLE=false; #Enables GLONASS on all devices export MALWARE_SCAN_ENABLED=true; #Set true to perform a fast scan on patchWorkspace() and a through scan on buildAll() export MALWARE_SCAN_SETTING="quick"; #buildAll() scan speed. Options are quick, extra, slow, full export MICROG_INCLUDED=true; #Switch to false to prevent inclusion of microG @@ -38,9 +39,6 @@ else return 1; fi; -export SIGNING_KEY_DIR=$androidWorkspace"Signing_Keys"; -export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey"; - export base=$androidWorkspace"Build/$BUILD_WORKING_DIR/"; if [ ! -d $base ]; then echo "Path mismatch! Please update init.sh!"; @@ -61,6 +59,9 @@ if [ ! -d $scripts ]; then fi; export cveScripts=$scripts"CVE_Patchers/"; +export SIGNING_KEY_DIR=$androidWorkspace"Signing_Keys"; +export OTA_PACKAGE_SIGNING_KEY=$SIGNING_KEY_DIR"/releasekey"; + export ANDROID_HOME="/home/$USER/Android/Sdk"; export KBUILD_BUILD_USER="emy";