mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
5be2789897
Signed-off-by: Tavi <tavi@divested.dev>
142 lines
4.9 KiB
Bash
142 lines
4.9 KiB
Bash
#!/bin/bash
|
|
#DivestOS: A mobile operating system divested from the norm.
|
|
#Copyright (c) 2017-2024 Divested Computing Group
|
|
#
|
|
#This program is free software: you can redistribute it and/or modify
|
|
#it under the terms of the GNU General Public License as published by
|
|
#the Free Software Foundation, either version 3 of the License, or
|
|
#(at your option) any later version.
|
|
#
|
|
#This program is distributed in the hope that it will be useful,
|
|
#but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
#MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
#GNU General Public License for more details.
|
|
#
|
|
#You should have received a copy of the GNU General Public License
|
|
#along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
umask 0022;
|
|
|
|
#Last verified: 2021-10-16
|
|
|
|
patchAllKernels() {
|
|
startPatcher "kernel_cyanogen_msm8916 kernel_motorola_msm8916 kernel_motorola_msm8992 kernel_oneplus_msm8994 kernel_xiaomi_sm6150 kernel_yandex_sdm660";
|
|
}
|
|
export -f patchAllKernels;
|
|
|
|
scanWorkspaceForMalware() {
|
|
local scanQueue="$DOS_BUILD_BASE/android $DOS_BUILD_BASE/art $DOS_BUILD_BASE/bionic $DOS_BUILD_BASE/bootable $DOS_BUILD_BASE/build $DOS_BUILD_BASE/dalvik $DOS_BUILD_BASE/device $DOS_BUILD_BASE/hardware $DOS_BUILD_BASE/libcore $DOS_BUILD_BASE/libnativehelper $DOS_BUILD_BASE/packages $DOS_BUILD_BASE/pdk $DOS_BUILD_BASE/platform_testing $DOS_BUILD_BASE/sdk $DOS_BUILD_BASE/system";
|
|
scanQueue=$scanQueue" $DOS_BUILD_BASE/lineage-sdk $DOS_BUILD_BASE/vendor/lineage";
|
|
scanForMalware true "$scanQueue";
|
|
}
|
|
export -f scanWorkspaceForMalware;
|
|
|
|
buildDevice() {
|
|
cd "$DOS_BUILD_BASE";
|
|
if [[ -d "$DOS_SIGNING_KEYS/$1" ]]; then
|
|
export OTA_KEY_OVERRIDE_DIR="$DOS_SIGNING_KEYS/$1";
|
|
breakfast "lineage_$1-user" && mka target-files-package otatools && processRelease $1 true $2;
|
|
else
|
|
echo -e "\e[0;31mNo signing keys available for $1\e[0m";
|
|
fi;
|
|
}
|
|
export -f buildDevice;
|
|
|
|
buildDeviceDebug() {
|
|
cd "$DOS_BUILD_BASE";
|
|
unset OTA_KEY_OVERRIDE_DIR;
|
|
brunch "lineage_$1-eng";
|
|
}
|
|
export -f buildDeviceDebug;
|
|
|
|
buildAll() {
|
|
umask 0022;
|
|
cd "$DOS_BUILD_BASE";
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanWorkspaceForMalware; fi;
|
|
#SD410
|
|
buildDevice crackling;
|
|
buildDevice harpia;
|
|
buildDevice merlin;
|
|
buildDevice osprey;
|
|
buildDevice surnia;
|
|
#SD808
|
|
buildDevice clark;
|
|
#SD810
|
|
buildDevice oneplus2;
|
|
#SD730
|
|
buildDevice davinci avb;
|
|
#SD660
|
|
buildDevice Amber verity;
|
|
}
|
|
export -f buildAll;
|
|
|
|
patchWorkspaceReal() {
|
|
umask 0022;
|
|
cd "$DOS_BUILD_BASE/$1";
|
|
touch DOS_PATCHED_FLAG;
|
|
if [ "$DOS_MALWARE_SCAN_ENABLED" = true ]; then scanForMalware false "$DOS_PREBUILT_APPS $DOS_BUILD_BASE/build $DOS_BUILD_BASE/device $DOS_BUILD_BASE/vendor/lineage"; fi;
|
|
verifyAllPlatformTags;
|
|
gpgVerifyGitHead "$DOS_BUILD_BASE/external/chromium-webview";
|
|
|
|
source build/envsetup.sh;
|
|
repopick 378493; #repopick: Add `--list` option
|
|
repopick 378494; #repopick: Require --force for closed changes found via --query
|
|
repopick 378458; #repopick: Fix apply order of dependent commits
|
|
#repopick -it ten-firewall;
|
|
repopick 353117; #bonus for Q_asb_2023-01
|
|
repopick -t Q_asb_2023-03 -e 352333,352570;
|
|
repopick -t Q_asb_2023-04;
|
|
repopick -t Q_asb_2023-05;
|
|
repopick -t Q_asb_2023-06;
|
|
repopick -t Q_asb_2023-07 -e 362202,376559;
|
|
repopick -t Q_asb_2023-08 -e 365443,376560,376561,376562;
|
|
repopick -t Q_asb_2023-09;
|
|
repopick -t Q_asb_2023-10 -e 376554;
|
|
repopick -t Q_asb_2023-11 -e 376555,376595,376596,376563,376568;
|
|
repopick -t Q_asb_2023-12 -e 377251,378083,378084,378085,378086,378087,378088,378314,378315;
|
|
repopick -t Q_asb_2024-01;
|
|
repopick -t Q_asb_2024-02;
|
|
|
|
sh "$DOS_SCRIPTS/Patch.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Enable_Verity.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Copy_Keys.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Defaults.sh";
|
|
sh "$DOS_SCRIPTS/Rebrand.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Optimize.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Deblob.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Patch_CVE.sh";
|
|
sh "$DOS_SCRIPTS_COMMON/Post.sh";
|
|
source build/envsetup.sh;
|
|
}
|
|
export -f patchWorkspaceReal;
|
|
|
|
enableDexPreOpt() {
|
|
cd "$DOS_BUILD_BASE/$1";
|
|
if [ -f BoardConfig.mk ]; then
|
|
echo "WITH_DEXPREOPT := true" >> BoardConfig.mk;
|
|
echo "WITH_DEXPREOPT_DEBUG_INFO := false" >> BoardConfig.mk;
|
|
if true; then
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := false" >> BoardConfig.mk;
|
|
echo "Enabled full dexpreopt for $1";
|
|
else
|
|
echo "WITH_DEXPREOPT_BOOT_IMG_AND_SYSTEM_SERVER_ONLY := true" >> BoardConfig.mk;
|
|
echo "Enabled core dexpreopt for $1";
|
|
fi;
|
|
fi;
|
|
cd "$DOS_BUILD_BASE";
|
|
}
|
|
export -f enableDexPreOpt;
|
|
|
|
enableLowRam() {
|
|
if [ -d "$DOS_BUILD_BASE/$1" ]; then
|
|
cd "$DOS_BUILD_BASE/$1";
|
|
if [ -f lineage_$2.mk ]; then echo -e '\n$(call inherit-product, vendor/divested/build/target/product/lowram.mk)' >> lineage_$2.mk; fi;
|
|
if [ -f BoardConfig.mk ]; then echo 'MALLOC_SVELTE := true' >> BoardConfig.mk; fi;
|
|
if [ -f BoardConfigCommon.mk ]; then echo 'MALLOC_SVELTE := true' >> BoardConfigCommon.mk; fi;
|
|
echo "Enabled lowram for $1";
|
|
cd "$DOS_BUILD_BASE";
|
|
else
|
|
echo "Not enabling lowram for $1, not available";
|
|
fi;
|
|
}
|
|
export -f enableLowRam;
|