Prepare v11

This commit is contained in:
osm0sis
2024-10-06 19:05:38 -03:00
parent 0d05112f38
commit fe57017255
4 changed files with 28 additions and 25 deletions

View File

@@ -1,20 +1,22 @@
## Custom Fork v11
- Improve autopif busybox tests, default api_level 32, pass --advanced arg
- Improve scripts for special configs with Tricky Store
- Fix resetprop fallback Magisk check
- Add Action button support to run autopif in root managers
- Fix root check for Termux/KSU/APatch
- Improve PixelPropsUtils workaround on more setups
- Replace autopif with autopif2 to generate a random print from latest Pixel Beta
## Custom Fork v10
- Work around Shamiko 1.1 bug causing DenyList app hangs
- Keep killgms script in Scripts-only mode for testing use
- Add missing global props and fix all tags and type props
- Use newer resetprop if possible, falling back to custom function
- Add ROM signature spoofing to Advanced Settings, off by default
- Add granular spoofing Advanced Settings for use with Tricky Store
- Improve migrate and autopif scripts to retain Advanced Settings values
- Improve autopif script to catch Magisk Canary busybox wget regression
- Keep killgms in Scripts-only mode for testing
- Add missing global props, fix all tags/type props
- Use newer resetprop, fall back to custom func
- Add ROM sig spoof to Advanced, default off
- Add granular spoof to Advanced for Tricky Store
- Improve scripts to keep Advanced values
- Improve autopif to catch Magisk Canary busybox regression
- Fix bootloop on some Xiaomi devices
## Custom Fork v9
- Improve migrate script formatting edge cases
- Add migrate script manual option to override all values using fingerprint values
- Add opt-in Scripts-only mode for Android <10
- Add autopif script to allow extracting latest Xiaomi.eu custom.pif.json values
- Add killgms script to allow manual DroidGuard process killing
- Work around PixelPropsUtils conflict
_[Previous changelogs](https://github.com/osm0sis/PlayIntegrityFork/releases)_

View File

@@ -26,7 +26,7 @@ You can fill out the included template [example.pif.json](https://raw.githubuser
Note this is just a template with the current suggested defaults, but with this fork you can include as few or as many android.os.Build class fields and Android system properties as needed to pass DEVICE verdict now and in the future if the enforced checks by Play Integrity change.
As a general rule you can't use values from recent devices due to them only being allowed with full hardware backed attestation. A script to extract the latest Xiaomi.eu public fingerprint is included with the module; see the autopif section below for usage and caveats, and see the Resources below for information and scripts to help find a working private fingerprint.
As a general rule you can't use values from recent devices due to them only being allowed with full hardware backed attestation. A script to extract the latest Pixel Beta fingerprint is included with the module; see the autopif section below for usage and caveats, and see the Resources below for information and scripts to help find a working private fingerprint.
Older formatted custom.pif.json files from cross-forks and previous releases will be automatically migrated to the latest format. Simply ensure the filename is custom.pif.json and place it in the module directory before upgrading.
@@ -46,6 +46,7 @@ A migration may also be performed manually with `sh migrate.sh` and custom.pif.j
- Scripts:
- [gen_pif_custom.sh](https://xdaforums.com/t/tools-zips-scripts-osm0sis-odds-and-ends-multiple-devices-platforms.2239421/post-89173470) - Script to generate a custom.pif.json from device dump build.prop files
- [autopif.sh](https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/post-89233630) - Script to extract the latest working Xiaomi.eu public fingerprint (though frequently banned and may be banned for RCS use while otherwise passing) to test an initial setup
- [pif-test-json-file.sh](https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/post-89561228) - Script to automate generating and testing json files to attempt to find working fingerprints
- [install-random-fp.sh](https://xdaforums.com/t/script-for-randomly-installing-custom-device-fingerprints.4647408/) - Script to randomly switch between multiple working fingerprints found by the user
@@ -55,13 +56,13 @@ A migration may also be performed manually with `sh migrate.sh` and custom.pif.j
You can customize the included default [example.app_replace.list](https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/module/example.app_replace.list) from the module directory (/data/adb/modules/playintegrityfix) then rename it to custom.app_replace.list to systemlessly replace any additional conflicting custom ROM spoof injection app paths to disable them.
## About 'autopif.sh' and 'killgms.sh' script files
## About 'autopif2.sh' and 'killgms.sh' script files
There's intentionally no pif.json in the module because the goal remains to be futureproof, and including something that may be banned and obsolete within days would be contrary to that goal. If you don't care to have your own private fingerprint to use or don't have time to look for one currently then simply run the extraction script from a root prompt with `sh autopif.sh` in the module directory (/data/adb/modules/playintegrityfix), or from a file explorer app that supports script execution.
There's intentionally no pif.json in the module because the goal remains to be futureproof, and including something that may be banned and obsolete within days would be contrary to that goal. If you don't care to have your own private fingerprint to use or don't have time to look for one currently then simply run the generation script from a root manager app that supports the module Action button, a root prompt with `sh autopif2.sh` in the module directory (/data/adb/modules/playintegrityfix), or from a file explorer app that supports script execution.
The autopif script extracts the latest working Xiaomi.eu fingerprint (though frequently banned and may be banned for RCS use while otherwise passing Play Integrity and SafetyNet) ideally to test an initial setup.
The autopif2 script generates a random device fingerprint from the latest Pixel Beta, ideally only to test an initial setup, since they expire roughly every 6 weeks from the Pixel Beta release date (dates included in the generated fingerprint), and the public mass-used ones from other modules or ROMs may also get banned or may be banned for RCS use while otherwise passing Play Integrity and SafetyNet in that time.
The killgms script forces the Google Play Services DroidGuard process (com.google.android.gms.unstable) to end, making it restart with the next attestation attempt; useful for testing out different private fingerprints without requiring a reboot in between.
The killgms script forces the Google Play Services DroidGuard process (com.google.android.gms.unstable) to end, making it restart with the next attestation attempt; useful for testing out different fingerprints without requiring a reboot in between.
## Troubleshooting

View File

@@ -1,7 +1,7 @@
id=playintegrityfix
name=Play Integrity Fork
version=v10
versionCode=103001
version=v11
versionCode=110000
author=osm0sis & chiteroman @ xda-developers
description=Fix ctsProfile (SafetyNet) and DEVICE (Play Integrity) verdicts
updateJson=https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/update.json

View File

@@ -1,6 +1,6 @@
{
"version": "v10",
"versionCode": 103000,
"zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v10/PlayIntegrityFork-v10.zip",
"version": "v11",
"versionCode": 110000,
"zipUrl": "https://github.com/osm0sis/PlayIntegrityFork/releases/download/v11/PlayIntegrityFork-v11.zip",
"changelog": "https://raw.githubusercontent.com/osm0sis/PlayIntegrityFork/main/CHANGELOG.md"
}