Magisk/scripts/addon.d.sh

144 lines
2.8 KiB
Bash
Raw Permalink Normal View History

2017-06-19 00:15:44 +08:00
##########################################################################################
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
# Magisk Survival Script for ROMs with addon.d support
# by topjohnwu
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
# Inspired by 99-flashafterupdate.sh of osm0sis @ xda-developers
2017-07-31 03:03:52 +08:00
#
2017-06-19 00:15:44 +08:00
##########################################################################################
2018-08-03 22:40:49 +08:00
V1_FUNCS=/tmp/backuptool.functions
V2_FUNCS=/postinstall/system/bin/backuptool_ab.functions
if [ -f $V1_FUNCS ]; then
. $V1_FUNCS
backuptool_ab=false
elif [ -f $V2_FUNCS ]; then
. $V2_FUNCS
else
return 1
fi
2017-06-19 00:15:44 +08:00
initialize() {
# This path should work in any cases
TMPDIR=/dev/tmp
2017-06-19 00:15:44 +08:00
2017-09-26 20:21:43 +08:00
mount /data 2>/dev/null
MAGISKBIN=/data/adb/magisk
2017-07-02 21:36:09 +08:00
if [ ! -d $MAGISKBIN ]; then
echo "! Cannot find Magisk binaries!"
exit 1
fi
2017-07-10 00:17:34 +08:00
# Load utility functions
2017-06-19 00:15:44 +08:00
. $MAGISKBIN/util_functions.sh
if $BOOTMODE; then
# Override ui_print when booted
ui_print() { log -t Magisk -- "$1"; }
else
OUTFD=
setup_flashable
fi
}
show_logo() {
2017-06-19 00:15:44 +08:00
ui_print "************************"
2017-07-31 03:03:52 +08:00
ui_print "* Magisk v$MAGISK_VER addon.d"
2017-06-19 00:15:44 +08:00
ui_print "************************"
}
2017-06-19 00:15:44 +08:00
2018-08-03 22:40:49 +08:00
installation() {
2019-02-24 02:11:11 -05:00
find_manager_apk
2019-04-06 13:04:17 -04:00
get_flags
find_boot_image
find_dtbo_image
2018-07-04 23:46:16 +08:00
[ -z $BOOTIMAGE ] && abort "! Unable to detect target image"
ui_print "- Target image: $BOOTIMAGE"
[ -z $DTBOIMAGE ] || ui_print "- DTBO image: $DTBOIMAGE"
2017-06-19 00:15:44 +08:00
remove_system_su
[ -f $APK ] && eval $BOOTSIGNER -verify < $BOOTIMAGE && BOOTSIGNED=true
$BOOTSIGNED && ui_print "- Boot image is signed with AVB 1.0"
2017-06-19 00:15:44 +08:00
SOURCEDMODE=true
cd $MAGISKBIN
# Source the boot patcher
. ./boot_patch.sh "$BOOTIMAGE"
2017-06-19 00:15:44 +08:00
2018-08-10 18:59:14 +08:00
ui_print "- Flashing new boot image"
flash_image new-boot.img "$BOOTIMAGE" || abort "! Insufficient partition size"
2017-11-11 01:33:50 +08:00
rm -f new-boot.img
2017-09-26 20:21:43 +08:00
if [ -f stock_boot* ]; then
rm -f /data/stock_boot* 2>/dev/null
$DATA && mv stock_boot* /data
fi
$KEEPVERITY || patch_dtbo_image
if [ -f stock_dtbo* ]; then
rm -f /data/stock_dtbo* 2>/dev/null
$DATA && mv stock_dtbo* /data
2017-06-19 00:15:44 +08:00
fi
2017-09-26 20:21:43 +08:00
2017-06-19 00:15:44 +08:00
cd /
}
2017-06-19 00:15:44 +08:00
finalize() {
2017-06-19 00:15:44 +08:00
ui_print "- Done"
exit 0
}
main() {
if ! $backuptool_ab; then
# Wait for post addon.d-v1 processes to finish
sleep 5
fi
$BOOTMODE || recovery_actions
show_logo
mount_partitions
if $backuptool_ab; then
# Swap the slot for addon.d-v2
if [ ! -z $SLOT ]; then [ $SLOT = _a ] && SLOT=_b || SLOT=_a; fi
fi
installation
$BOOTMODE || recovery_cleanup
finalize
}
2017-06-19 00:15:44 +08:00
case "$1" in
backup)
# Stub
;;
restore)
# Stub
;;
pre-backup)
# Stub
;;
post-backup)
# Stub
;;
pre-restore)
# Stub
;;
post-restore)
initialize
if $backuptool_ab; then
$BOOTMODE && su=su || su=sh
exec $su -c "sh $0 addond-v2"
else
# Run in background, hack for addon.d-v1
(main) &
fi
2017-06-19 00:15:44 +08:00
;;
2018-08-03 22:40:49 +08:00
addond-v2)
initialize
main
2018-08-03 22:40:49 +08:00
;;
2017-06-19 00:15:44 +08:00
esac