#!/bin/bash #DivestOS: A privacy oriented Android distribution #Copyright (c) 2017-2020 Divested Computing Group # #This program is free software: you can redistribute it and/or modify #it under the terms of the GNU General Public License as published by #the Free Software Foundation, either version 3 of the License, or #(at your option) any later version. # #This program is distributed in the hope that it will be useful, #but WITHOUT ANY WARRANTY; without even the implied warranty of #MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #GNU General Public License for more details. # #You should have received a copy of the GNU General Public License #along with this program. If not, see . #Last verified: 2018-07-10 patchAllKernels() { startPatcher "kernel_zte_msm8930"; } export -f patchAllKernels; resetWorkspace() { repo forall -c 'git add -A && git reset --hard' && rm -rf out && repo sync -j20 --force-sync; } export -f resetWorkspace; scanWorkspaceForMalware() { local scanQueue="$DOS_BUILD_BASE/abi $DOS_BUILD_BASE/android $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/ndk $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system"; scanQueue=$scanQueue" $DOS_BUILD_BASE/vendor/cm $DOS_BUILD_BASE/vendor/cmsdk"; scanForMalware true "$scanQueue"; } export -f scanWorkspaceForMalware; buildDevice() { export OTA_PACKAGE_SIGNING_KEY="$DOS_SIGNING_KEYS/$1/releasekey"; brunch "cm_$1-user" && processRelease $1 false; } export -f buildDevice; buildDeviceDebug() { unset OTA_PACKAGE_SIGNING_KEY; brunch "cm_$1-eng"; } export -f buildDeviceDebug; buildAll() { if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi; if [ "$DOS_OPTIMIZE_IMAGES" = true ]; then optimizeImagesRecursive "$DOS_BUILD_BASE"; fi; brunch lineage_nex-user && processRelease nex false; #broken encryption } export -f buildAll; patchWorkspace() { if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/cm"; fi; sed -i "s/'git', 'show', '-q'/'git', 'show'/" build/tools/repopick.py; #fix for old git versions source build/envsetup.sh; repopick -it asb-2018.09-cm11-qcom; repopick -i 230054 230392; #asb disclaimer #repopick -it asb-2019.03-cm11; #repopick -it asb-2019.04-cm11 -e 246293; repopick -it asb-2019.05-cm11; repopick -it asb-2019.06-cm11; repopick -it asb-2019.07-cm11; repopick -it asb-2019.08-cm11; repopick -it asb-2019.09-cm11; repopick -it asb-2019.10-cm11; repopick -it asb-2019.11-cm11; repopick -it asb-2019.12-cm11; repopick -it asb-2020.01-cm11; source "$DOS_SCRIPTS/Patch.sh"; source "$DOS_SCRIPTS/Defaults.sh"; source "$DOS_SCRIPTS/Rebrand.sh"; if [ "$DOS_OVERCLOCKS_ENABLED" = true ]; then source "$DOS_SCRIPTS_COMMON/Overclock.sh"; fi; source "$DOS_SCRIPTS_COMMON/Optimize.sh"; source "$DOS_SCRIPTS_COMMON/Deblob.sh"; source "$DOS_SCRIPTS_COMMON/Patch_CVE.sh"; source build/envsetup.sh; } export -f patchWorkspace;