#!/bin/sh # # Copyright (C) 2016 Wolfgang Wiedmeyer # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see . # # resigns your images with your keys and also generates keys for you # puts everything in out/dist # most information taken from here: # https://source.android.com/devices/tech/ota/sign_builds.html # final check if recovery has the right key: # java -jar out/host/linux-x86/framework/dumpkey.jar vendor/replicant-security/releasekey.x509.pem # in recovery: adb shell cat /res/keys # both outputs should match # also /system/etc/security/otacerts.zip should only contain your release key set -e DEVICE=$1 BASEDIR=$(pwd) KEY_DIR=$BASEDIR/vendor/replicant-security if [ -z ${OUT_DIR_COMMON_BASE+x} ] then OUT_DIR=$BASEDIR/"out" else OUT_DIR=$OUT_DIR_COMMON_BASE/${PWD##*/} fi TARGET_DIR=$OUT_DIR/target/product/$DEVICE TARGET_FILES=$TARGET_DIR/obj/PACKAGING/target_files_intermediates/*-target_files-*.zip DIST_OUT_DIR=$OUT_DIR/"dist"/$DEVICE RELEASE=replicant-6.0 read_var() { local prompt="$1" local var="$2" # Store current value of variable as default. eval "local default=\"\$$var\"" read -p "$prompt: [$default] " "$var" # Set default value if empty. eval "test -n \"\$$var\"" || eval "$var='$default'" } generate_keys () { local KEY_C="NA" local KEY_ST="unknown" local KEY_L="unknown" local KEY_O="unknown" local KEY_OU="unknown" local KEY_CN="unknown" local KEY_EA="unknown" local SUBJECT echo "No keys present. Generating them now." echo echo "You are about to be asked to enter information that will be incorporated" echo "into your certificate requests." echo "What you are about to enter is what is called a Distinguished Name or a DN." echo "There are quite a few fields but you can leave some blank." echo "For some fields there will be a default value." read_var "Country Name (2 letter code)" KEY_C read_var "State or Province Name (full name)" KEY_ST read_var "Locality Name (e.g. city)" KEY_L read_var "Organization Name (e.g. company)" KEY_O read_var "Organizational Unit Name (e.g. section)" KEY_OU read_var "Common Name (e.g. your name)" KEY_CN read_var "Email Address" KEY_EA SUBJECT="/C=$KEY_C/ST=$KEY_ST/L=$KEY_L/O=$KEY_O/OU=$KEY_OU/CN=$KEY_CN/emailAddress=$KEY_EA" mkdir $KEY_DIR for x in releasekey platform shared media; do \ ./development/tools/make_key $KEY_DIR/$x "$SUBJECT" || true; \ done } if [ "$DEVICE" = "" ] then echo "Usage: $0 [DEVICE]" exit 1 fi if ! [ -d "$TARGET_DIR" ] then echo "The build directory for $DEVICE does not exist." exit 1 fi if ! [ -f $TARGET_FILES ] then echo "No files to sign. Make sure the build for $DEVICE completed successfully." exit 1 fi if ! [ -d "$KEY_DIR" ] then generate_keys fi mkdir -p $DIST_OUT_DIR # -o option replaces the test keys with the created ones # -p makes sure the script finds signapk.jar if [ "$DEVICE" = "i9100" ] || [ "$DEVICE" = "n7000" ] then echo "Signing target APKs files ..." python $BASEDIR/device/samsung/galaxys2-common/releasetools/galaxys2_sign_target_files_apks \ -s device/samsung/galaxys2-common/releasetools/extensions/releasetools.py \ -o \ -p $OUT_DIR/host/linux-x86 \ -d $KEY_DIR \ $TARGET_FILES \ $DIST_OUT_DIR/signed-target_files-$DEVICE.zip echo "Signing target OTAs files ..." python $BASEDIR/build/tools/releasetools/ota_from_target_files \ -s device/samsung/galaxys2-common/releasetools/extensions/releasetools.py \ -k $KEY_DIR/releasekey \ -p $OUT_DIR/host/linux-x86 \ $DIST_OUT_DIR/signed-target_files-$DEVICE.zip \ $DIST_OUT_DIR/$RELEASE-$DEVICE.zip else echo "Signing target APKs files ..." python $BASEDIR/build/tools/releasetools/sign_target_files_apks \ -o \ -p $OUT_DIR/host/linux-x86 \ -d $KEY_DIR \ $TARGET_FILES \ $DIST_OUT_DIR/signed-target_files-$DEVICE.zip echo "Signing target OTAs files ..." python $BASEDIR/build/tools/releasetools/ota_from_target_files \ -k $KEY_DIR/releasekey \ -p $OUT_DIR/host/linux-x86 \ $DIST_OUT_DIR/signed-target_files-$DEVICE.zip \ $DIST_OUT_DIR/$RELEASE-$DEVICE.zip fi echo "Signing target image files ..." python $BASEDIR/build/tools/releasetools/img_from_target_files \ -z \ $DIST_OUT_DIR/signed-target_files-$DEVICE.zip \ $DIST_OUT_DIR/signed-img-$DEVICE.zip # get the recovery from the signed-img.zip unzip -o -j $DIST_OUT_DIR/signed-img-$DEVICE.zip recovery.img -d $DIST_OUT_DIR mv $DIST_OUT_DIR/recovery.img $DIST_OUT_DIR/recovery-$DEVICE.img echo echo "Finished successfully. Install zip and recovery:" echo "$DIST_OUT_DIR/$RELEASE-$DEVICE.zip" echo "$DIST_OUT_DIR/recovery-$DEVICE.img"