#!/bin/sh # This file is the backend of JavaScript MODPATH=${0%/*} SKIPLIST="$MODPATH/tmp/skiplist" XPOSED="$MODPATH/tmp/xposed" if [ "$MODPATH" = "/data/adb/modules/.TA_utl/common" ]; then MODDIR="/data/adb/modules/.TA_utl" MAGISK="true" else MODDIR="/data/adb/modules/TA_utl" fi aapt() { "$MODPATH/aapt" "$@"; } # probe for downloaders # wget = low pref, no ssl. # curl, has ssl on android, we use it if found download() { if command -v curl >/dev/null 2>&1; then curl --connect-timeout 10 -Ls "$1" else busybox wget -T 10 --no-check-certificate -qO- "$1" fi } get_xposed() { touch "$XPOSED" pm list packages -3 | cut -d':' -f2 | grep -vxF -f "$SKIPLIST" | grep -vxF -f "$XPOSED" | while read -r PACKAGE; do APK_PATH=$(pm path "$PACKAGE" | grep "base.apk" | cut -d':' -f2 | tr -d '\r') if [ -n "$APK_PATH" ]; then if aapt dump xmltree "$APK_PATH" AndroidManifest.xml 2>/dev/null | grep -qE "xposed.category|xposeddescription"; then echo "$PACKAGE" >> "$XPOSED" fi fi done cat "$XPOSED" } get_applist() { pm list packages -3 | awk -F: '{print $2}' [ -s "/data/adb/tricky_store/system_app" ] && SYSTEM_APP=$(cat "/data/adb/tricky_store/system_app" | tr '\n' '|' | sed 's/|*$//') || SYSTEM_APP="" [ -z "$SYSTEM_APP" ] || pm list packages -s | awk -F: '{print $2}' | grep -Ex "$SYSTEM_APP" || true } get_appname() { base_apk=$(pm path $package_name | head -n1 | awk -F: '{print $2}') app_name=$(aapt dump badging $base_apk 2>/dev/null | grep "application-label:" | sed "s/application-label://; s/'//g") [ -z "$app_name" ] && app_name="$package_name" echo "$app_name" } check_update() { [ -f "$MODDIR/disable" ] && rm -f "$MODDIR/disable" LOCAL_VERSION=$(grep '^versionCode=' "$MODPATH/update/module.prop" | awk -F= '{print $2}') if [ "$REMOTE_VERSION" -gt "$LOCAL_VERSION" ] && [ ! -f "/data/adb/modules/TA_utl/update" ]; then if [ "$CANARY" = "true" ]; then exit 1 elif [ "$MAGISK" = "true" ]; then [ -d "/data/adb/modules/TA_utl" ] && rm -rf "/data/adb/modules/TA_utl" cp -rf "$MODPATH/update" "/data/adb/modules/TA_utl" else cp -f "$MODPATH/update/module.prop" "/data/adb/modules/TA_utl/module.prop" fi echo "update" fi } uninstall() { if [ "$MAGISK" = "true" ]; then cp -rf "$MODPATH/update" "/data/adb/modules/TA_utl" else cp -f "$MODPATH/update/module.prop" "/data/adb/modules/TA_utl/module.prop" fi touch "/data/adb/modules/TA_utl/remove" } get_update() { download "$ZIP_URL" > "$MODPATH/tmp/module.zip" [ -s "$MODPATH/tmp/module.zip" ] || exit 1 } install_update() { zip_file="$MODPATH/tmp/module.zip" . "$MODPATH/manager.sh" case $MANAGER in APATCH) apd module install "$zip_file" || exit 1 ;; KSU) ksud module install "$zip_file" || exit 1 ;; MAGISK) magisk --install-module "$zip_file" || exit 1 ;; *) rm -f "$zip_file" "$MODPATH/tmp/changelog.md" "$MODPATH/tmp/version" || true exit 1 ;; esac rm -f "$zip_file" "$MODPATH/tmp/changelog.md" "$MODPATH/tmp/version" || true } release_note() { awk -v header="### $VERSION" ' $0 == header { print; found = 1; next } found && /^###/ { exit } found { print } ' "$MODPATH/tmp/changelog.md" } set_security_patch() { # Find pif.json [ -f "/data/adb/modules/playintegrityfix/pif.json" ] && PIF="/data/adb/modules/playintegrityfix/pif.json" [ -f "/data/adb/pif.json" ] && PIF="/data/adb/pif.json" [ -f "/data/adb/modules/playintegrityfix/custom.pif.json" ] && PIF="/data/adb/modules/playintegrityfix/custom.pif.json" security_patch=$(grep '"SECURITY_PATCH"' "$PIF" | sed 's/.*: "//; s/".*//') [ -z "$security_patch" ] && security_patch=$(getprop ro.build.version.security_patch) # Fallback formatted_security_patch=$(echo "$security_patch" | sed 's/-//g') security_patch_after_1y=$(echo "$formatted_security_patch + 10000" | bc) TODAY=$(date +%Y%m%d) if [ -n "$formatted_security_patch" ] && [ "$TODAY" -lt "$security_patch_after_1y" ]; then TS_version=$(grep "versionCode=" "/data/adb/modules/tricky_store/module.prop" | cut -d'=' -f2) # Official TrickyStore which supports custom security patch if [ "$TS_version" -ge 158 ]; then SECURITY_PATCH_FILE="/data/adb/tricky_store/security_patch.txt" printf "system=prop\nboot=%s\nvendor=%s\n" "$security_patch" "$security_patch" > "$SECURITY_PATCH_FILE" chmod 644 "$SECURITY_PATCH_FILE" # Other else resetprop ro.vendor.build.security_patch "$security_patch" resetprop ro.build.version.security_patch "$security_patch" fi else echo "not set" fi } get_latest_security_patch() { security_patch=$(download "https://source.android.com/docs/security/bulletin/pixel" | sed -n 's/.*