Magisk/scripts/addon.d.sh

148 lines
2.7 KiB
Bash
Raw Normal View History

2017-06-19 00:15:44 +08:00
##########################################################################################
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
# Magisk Survival Script for ROMs with addon.d support
# by topjohnwu
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
# Inspired by 99-flashafterupdate.sh of osm0sis @ xda-developers
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
##########################################################################################
2018-08-03 22:40:49 +08:00
V1_FUNCS=/tmp/backuptool.functions
V2_FUNCS=/postinstall/system/bin/backuptool_ab.functions
if [ -f $V1_FUNCS ]; then
. $V1_FUNCS
backuptool_ab=false
elif [ -f $V2_FUNCS ]; then
. $V2_FUNCS
else
return 1
fi
2017-06-19 00:15:44 +08:00
initialize() {
# This path should work in any cases
TMPDIR=/dev/tmp
2017-06-19 00:15:44 +08:00
2017-09-26 20:21:43 +08:00
mount /data 2>/dev/null
MAGISKBIN=/data/adb/magisk
2017-07-02 21:36:09 +08:00
if [ ! -d $MAGISKBIN ]; then
echo "! Cannot find Magisk binaries!"
exit 1
fi
2017-07-10 00:17:34 +08:00
# Load utility functions
2017-06-19 00:15:44 +08:00
. $MAGISKBIN/util_functions.sh
APK=/data/adb/magisk.apk
2018-08-03 03:43:02 +08:00
[ -f $APK ] || APK=/data/magisk/magisk.apk
[ -f $APK ] || APK=/data/app/com.topjohnwu.magisk*/*.apk
}
show_logo() {
2017-06-19 00:15:44 +08:00
ui_print "************************"
2017-07-31 03:03:52 +08:00
ui_print "* Magisk v$MAGISK_VER addon.d"
2017-06-19 00:15:44 +08:00
ui_print "************************"
}
2017-06-19 00:15:44 +08:00
2018-08-03 22:40:49 +08:00
installation() {
find_boot_image
find_dtbo_image
2018-07-04 23:46:16 +08:00
[ -z $BOOTIMAGE ] && abort "! Unable to detect target image"
ui_print "- Target image: $BOOTIMAGE"
[ -z $DTBOIMAGE ] || ui_print "- DTBO image: $DTBOIMAGE"
get_flags
2017-06-19 00:15:44 +08:00
remove_system_su
[ -f $APK ] && eval $BOOTSIGNER -verify < $BOOTIMAGE && BOOTSIGNED=true
$BOOTSIGNED && ui_print "- Boot image is signed with AVB 1.0"
2017-06-19 00:15:44 +08:00
SOURCEDMODE=true
cd $MAGISKBIN
# Source the boot patcher
. ./boot_patch.sh "$BOOTIMAGE"
2017-06-19 00:15:44 +08:00
2017-11-11 01:33:50 +08:00
flash_boot_image new-boot.img "$BOOTIMAGE"
rm -f new-boot.img
2017-09-26 20:21:43 +08:00
if [ -f stock_boot* ]; then
rm -f /data/stock_boot* 2>/dev/null
$DATA && mv stock_boot* /data
fi
$KEEPVERITY || patch_dtbo_image
if [ -f stock_dtbo* ]; then
rm -f /data/stock_dtbo* 2>/dev/null
$DATA && mv stock_dtbo* /data
2017-06-19 00:15:44 +08:00
fi
2017-09-26 20:21:43 +08:00
2017-06-19 00:15:44 +08:00
cd /
}
2017-06-19 00:15:44 +08:00
finalize() {
2017-06-19 00:15:44 +08:00
ui_print "- Done"
exit 0
}
main_v1() {
# Wait for post addon.d processes to finish
sleep 5
recovery_actions
show_logo
mount_partitions
installation
recovery_cleanup
finalize
}
main_v2() {
boot_actions
show_logo
mount_partitions
# Swap the slot
if [ ! -z $SLOT ]; then [ $SLOT = _a ] && SLOT=_b || SLOT=_a; fi
installation
finalize
}
2017-06-19 00:15:44 +08:00
case "$1" in
backup)
# Stub
;;
restore)
# Stub
;;
pre-backup)
# Stub
;;
post-backup)
# Stub
;;
pre-restore)
# Stub
;;
post-restore)
if $backuptool_ab; then
2018-08-03 22:40:49 +08:00
exec su -c "sh $0 addond-v2"
else
2018-08-03 22:40:49 +08:00
initialize
2018-07-05 17:29:13 +08:00
OUTFD=
get_outfd
# Run in background, hack for addon.d-v1
(main_v1) &
fi
2017-06-19 00:15:44 +08:00
;;
2018-08-03 22:40:49 +08:00
addond-v2)
initialize
# Override ui_print
ui_print() {
log -t Magisk -- "$1"
}
# addon.d-v2
main_v2
;;
2017-06-19 00:15:44 +08:00
esac