diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml index 52af918..0814aad 100644 --- a/.github/workflows/build.yml +++ b/.github/workflows/build.yml @@ -18,9 +18,8 @@ on: type: string compressformat: type: string - release_type: - type: string - + wsa_ver: + type: string jobs: build: @@ -69,6 +68,7 @@ jobs: echo ${{ inputs.amazonflag }} echo ${{ inputs.compressformat }} echo ${{ inputs.release_type }} + echo ${{ inputs.wsa_ver }} - name: Build WSA ${{ inputs.arch }} with GApps ${{ inputs.root }} 🏗️ id: wsa @@ -81,7 +81,7 @@ jobs: fi chmod -R 777 ./ mkdir -p download - ./scripts/build.sh --arch ${{ inputs.arch }} --release-type WIF --magisk-branch topjohnwu --magisk-ver ${{ inputs.magiskver }} --gapps-brand ${{ inputs.gapps }} --root-sol ${{ inputs.root }} --custom-model redfin ${{ inputs.amazonflag }} --compress-format zip + ./scripts/build.sh --arch ${{ inputs.arch }} --release-type WIF --magisk-branch topjohnwu --magisk-ver ${{ inputs.magiskver }} ${{ inputs.gapps }} --root-sol ${{ inputs.root }} ${{ inputs.amazonflag }} --compress-format zip - name: Prepare release tag 🏷️ id: releasetag @@ -97,16 +97,14 @@ jobs: - name: Check GitHub ENV variables run: | - echo ${{ steps.wsa.outputs.artifact }} - echo ${{ steps.wsa.outputs.artifact_folder }} - echo ${{ steps.date.outputs.date }} - echo ${{ steps.wsa.outputs.built }} - echo ${{ env.WSA_TAG }} - echo ${{ env.WSA_TAG_WIN10 }} - echo ${{ env.WSA_VER }} - echo ${{ env.DRIVE_FOLDER_PATH }} - echo ${{ env.DRIVE_FOLDER_PATH_WIN10 }} - + echo "${{ steps.wsa.outputs.artifact }}" + echo "${{ steps.wsa.outputs.artifact_folder }}" + echo "${{ steps.date.outputs.date }}" + echo "${{ steps.wsa.outputs.built }}" + echo "${{ env.WSA_TAG }}" + echo "${{ env.WSA_VER }}" + echo "${{ env.DRIVE_FOLDER_PATH }}" + - name: Pass to Windows 💸 uses: actions/upload-artifact@v4 with: @@ -171,10 +169,6 @@ jobs: - name: Compress artifact for Windows 11 x64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -- "${{ needs.build.outputs.zipname }}.7z" .\output\* - - name: File Checksum for Windows 11 x64 Build✔️ - id: run - run: ("hash=" + $(Get-FileHash -Path ${{ needs.build.outputs.zipname }}.7z -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append - # - name: Setup rclone 🎚️ # uses: AnimMouse/setup-rclone@v1.9.0 # with: @@ -226,10 +220,6 @@ jobs: - name: Compress artifact for Windows 10 x64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -sdel -- "${{ needs.build.outputs.zipname }}_Windows_10.7z" .\output\* - - name: File Checksum for Windows 10 x64 Build✔️ - id: run2 - run: ("hash=" + $(Get-FileHash -Path "${{ needs.build.outputs.zipname }}_Windows_10.7z" -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append - # - name: Upload build to OneDrive for Windows 10 x64 Build⏫ # run: | # echo ${{ needs.build.outputs.onedrivepathwin10 }} diff --git a/.github/workflows/build_arm64_old.yml b/.github/workflows/build_arm64_old.yml index 7c8d068..39589ee 100644 --- a/.github/workflows/build_arm64_old.yml +++ b/.github/workflows/build_arm64_old.yml @@ -18,8 +18,8 @@ on: type: string compressformat: type: string - release_type: - type: string + wsa_ver: + type: string jobs: @@ -164,10 +164,7 @@ jobs: - name: Compress artifact for Windows 11 arm64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -- "${{ needs.build.outputs.zipname }}.7z" .\output\* - - name: File Checksum for Windows 11 arm64 Build✔️ - id: run - run: ("hash=" + $(Get-FileHash -Path ${{ needs.build.outputs.zipname }}.7z -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append) - + - name: Upload Windows 11 arm64 build to release 🤌 uses: softprops/action-gh-release@v2 with: diff --git a/.github/workflows/build_old.yml b/.github/workflows/build_old.yml index 074d5b0..7452838 100644 --- a/.github/workflows/build_old.yml +++ b/.github/workflows/build_old.yml @@ -18,9 +18,8 @@ on: type: string compressformat: type: string - release_type: - type: string - + wsa_ver: + type: string jobs: build: @@ -171,9 +170,6 @@ jobs: - name: Compress artifact for Windows 11 x64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -- "${{ needs.build.outputs.zipname }}.7z" .\output\* - - name: File Checksum for Windows 11 x64 Build✔️ - id: run - run: ("hash=" + $(Get-FileHash -Path ${{ needs.build.outputs.zipname }}.7z -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append # - name: Setup rclone 🎚️ # uses: AnimMouse/setup-rclone@v1.9.0 @@ -226,10 +222,6 @@ jobs: - name: Compress artifact for Windows 10 x64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -sdel -- "${{ needs.build.outputs.zipname }}_Windows_10.7z" .\output\* - - name: File Checksum for Windows 10 x64 Build✔️ - id: run2 - run: ("hash=" + $(Get-FileHash -Path "${{ needs.build.outputs.zipname }}_Windows_10.7z" -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append - # - name: Upload build to OneDrive for Windows 10 x64 Build⏫ # run: | # echo ${{ needs.build.outputs.onedrivepathwin10 }} diff --git a/.github/workflows/buildarm64.yml b/.github/workflows/buildarm64.yml index 9d05cf2..4ead31f 100644 --- a/.github/workflows/buildarm64.yml +++ b/.github/workflows/buildarm64.yml @@ -18,8 +18,8 @@ on: type: string compressformat: type: string - release_type: - type: string + wsa_ver: + type: string jobs: @@ -81,8 +81,7 @@ jobs: fi chmod -R 777 ./ mkdir -p download - ./scripts/build.sh --arch ${{ inputs.arch }} --release-type WIF --magisk-branch topjohnwu --magisk-ver ${{ inputs.magiskver }} --gapps-brand ${{ inputs.gapps }} --root-sol ${{ inputs.root }} --custom-model redfin ${{ inputs.amazonflag }} --compress-format zip - + ./scripts/build.sh --arch ${{ inputs.arch }} --release-type WIF --magisk-branch topjohnwu --magisk-ver ${{ inputs.magiskver }} ${{ inputs.gapps }} --root-sol ${{ inputs.root }} ${{ inputs.amazonflag }} --compress-format zip - name: Prepare release tag 🏷️ id: releasetag run: | @@ -94,13 +93,13 @@ jobs: - name: Check GitHub ENV variables run: | - echo ${{ steps.wsa.outputs.artifact }} - echo ${{ steps.wsa.outputs.artifact_folder }} - echo ${{ steps.date.outputs.date }} - echo ${{ steps.wsa.outputs.built }} - echo ${{ env.WSA_TAG }} - echo ${{ env.WSA_VER }} - echo ${{ env.DRIVE_FOLDER_PATH }} + echo "${{ steps.wsa.outputs.artifact }}" + echo "${{ steps.wsa.outputs.artifact_folder }}" + echo "${{ steps.date.outputs.date }}" + echo "${{ steps.wsa.outputs.built }}" + echo "${{ env.WSA_TAG }}" + echo "${{ env.WSA_VER }}" + echo "${{ env.DRIVE_FOLDER_PATH }}" - name: Pass to Windows 💸 uses: actions/upload-artifact@v4 @@ -164,10 +163,7 @@ jobs: - name: Compress artifact for Windows 11 arm64 Build📦 run: 7z a -t7z -mx=6 -m0=LZMA2 -ms=on -mmt=8 -- "${{ needs.build.outputs.zipname }}.7z" .\output\* - - name: File Checksum for Windows 11 arm64 Build✔️ - id: run - run: ("hash=" + $(Get-FileHash -Path ${{ needs.build.outputs.zipname }}.7z -Algorithm SHA256).Hash.ToLower().ToString()) | Out-File -FilePath $env:GITHUB_OUTPUT -Encoding UTF8 -Append) - + - name: Upload Windows 11 arm64 build to release 🤌 uses: softprops/action-gh-release@v2 with: diff --git a/.github/workflows/update.yml b/.github/workflows/update.yml index 8b3d01d..b9de946 100644 --- a/.github/workflows/update.yml +++ b/.github/workflows/update.yml @@ -6,6 +6,10 @@ on: type: string description: WSA Version. required: true + wsa_message: + type: string + description: WSA Update Message. + required: true jobs: check: @@ -114,7 +118,7 @@ jobs: win10x64_link="

\"win10x64down\"

" win11x64_link_retail="

\"win11x64downstable\"

" win11arm64_link_retail="

\"win11arm64downstable\"

" - win10x64_link_retailk="

\"win10x64down\"

" + win10x64_link_retail="

\"win10x64down\"

" echo "LINK_FOR_W11X64=$win11x64_link" >> $GITHUB_ENV echo "LINK_FOR_W11ARM64=$win11arm64_link" >> $GITHUB_ENV echo "LINK_FOR_W10X64=$win10x64_link" >> $GITHUB_ENV @@ -319,7 +323,7 @@ jobs: tag_name: ${{ env.WIN11ARM64_TAG }} token: ${{ secrets.GITHUB_TOKEN }} body_path: ${{github.workspace}}/Windows11arm64.md - name: Windows Subsystem For Android ${{ env.WSA_VER }} for Windows 11 arm64 + name: WSABuilds LTS ${{ inputs.wsa_message }} for Windows 11 arm64 env: GITHUB_WORKSPACE: ${{ github.workspace }} @@ -329,17 +333,17 @@ jobs: tag_name: ${{ env.WIN10X64_TAG }} token: ${{ secrets.GITHUB_TOKEN }} body_path: ${{github.workspace}}/Windows10x64.md - name: Windows Subsystem For Android ${{ env.WSA_VER }} for Windows 10 x64 + name: WSABuilds LTS ${{ inputs.wsa_message }} for Windows 10 x64 env: GITHUB_WORKSPACE: ${{ github.workspace }} - + - name: Create Tag and Release for Windows 11 x64 release ✍🏼 uses: softprops/action-gh-release@v2 with: tag_name: ${{ env.WIN11X64_TAG }} token: ${{ secrets.GITHUB_TOKEN }} body_path: ${{github.workspace}}/Windows11x64.md - name: Windows Subsystem For Android ${{ env.WSA_VER }} for Windows 11 x64 + name: WSABuilds LTS ${{ inputs.wsa_message }} for Windows 11 x64 env: GITHUB_WORKSPACE: ${{ github.workspace }} @@ -348,17 +352,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: none - gapps: MindTheGapps + gapps: --install-gapps amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_no_root_gapps_redfin: @@ -366,17 +368,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: none - gapps: MindTheGapps + gapps: --install-gapps amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_no_root_no_gapps_remove_amazon_redfin: @@ -384,17 +384,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: none - gapps: none + gapps: "" amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_no_root_no_gapps_redfin: @@ -402,25 +400,22 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: none - gapps: none + gapps: "" amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_kernelsu_gapps_remove_amazon_redfin: name: Build for x64 as Redfin with KernelSU, GApps and No Amazon Appstore permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] - uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' + uses: ./.github/workflows/build_old.yml with: arch: x64 root: kernelsu @@ -430,7 +425,6 @@ jobs: devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_magisk_gapps_redfin: @@ -438,17 +432,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: magisk - gapps: MindTheGapps + gapps: --install-gapps amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_magisk_no_gapps_remove_amazon_redfin: @@ -456,17 +448,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: magisk - gapps: none + gapps: "" amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_x64_magisk_canary_gapps_remove_amazon_redfin: @@ -474,17 +464,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/build.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: x64 root: magisk - gapps: MindTheGapps + gapps: --install-gapps amazonflag: --remove-amazon magiskver: canary devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_no_root_gapps_remove_amazon_redfin: @@ -492,17 +480,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: none - gapps: MindTheGapps + gapps: --install-gapps amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_no_root_gapps_redfin: @@ -510,17 +496,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: none - gapps: MindTheGapps + gapps: --install-gapps amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_no_root_no_gapps_remove_amazon_redfin: @@ -528,17 +512,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: none - gapps: none + gapps: "" amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_no_root_no_gapps_redfin: @@ -546,25 +528,22 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: none - gapps: none + gapps: "" amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_kernelsu_gapps_remove_amazon_redfin: name: Build for arm64 as Redfin with KernelSU, GApps and No Amazon Appstore permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] - uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' + uses: ./.github/workflows/build_arm64_old.yml with: arch: arm64 root: kernelsu @@ -574,7 +553,6 @@ jobs: devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_magisk_gapps_redfin: @@ -582,17 +560,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: magisk - gapps: MindTheGapps + gapps: --install-gapps amazonflag: "" magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_magisk_no_gapps_remove_amazon_redfin: @@ -600,17 +576,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: magisk - gapps: none + gapps: "" amazonflag: --remove-amazon magiskver: stable devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit build_arm64_magisk_canary_gapps_remove_amazon_redfin: @@ -618,17 +592,15 @@ jobs: permissions: write-all needs: [check, check-and-create-tag, update-downloadlinks] uses: ./.github/workflows/buildarm64.yml - if: needs.check.outputs.SHOULD_BUILD == 'yes' with: arch: arm64 root: magisk - gapps: MindTheGapps + gapps: --install-gapps amazonflag: --remove-amazon magiskver: canary devicemodel: redfin compressformat: zip wsa_ver: ${{ inputs.wsa_ver }} - release_type: ${{ needs.check.outputs.RELEASE_TYPE }} secrets: inherit diff --git a/MagiskOnWSA/bin/arm64/lspinit b/MagiskOnWSA/bin/arm64/lspinit new file mode 100644 index 0000000..abf4a0f Binary files /dev/null and b/MagiskOnWSA/bin/arm64/lspinit differ diff --git a/MagiskOnWSA/bin/x64/lspinit b/MagiskOnWSA/bin/x64/lspinit new file mode 100644 index 0000000..1775e81 Binary files /dev/null and b/MagiskOnWSA/bin/x64/lspinit differ diff --git a/MagiskOnWSA/scripts/WSAUpdateChecker.py b/MagiskOnWSA/scripts/WSAUpdateChecker.py new file mode 100644 index 0000000..0efa5ed --- /dev/null +++ b/MagiskOnWSA/scripts/WSAUpdateChecker.py @@ -0,0 +1,211 @@ +import base64 +from os import getenv +import html +import json +import re +import requests +import logging +import subprocess + +from typing import Any, OrderedDict +from xml.dom import minidom + +from requests import Session +from packaging import version + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + +logging.captureWarnings(True) +env_file = getenv('GITHUB_ENV') +token = getenv("API_KEY") +authorization = f'Bearer {token}' +reqheaders = { + "Accept": "application/vnd.github.v3+json", + "Authorization" : authorization, +} +#Catagory ID +cat_id = '858014f3-3934-4abe-8078-4aa193e74ca8' + +release_type = "WIF" + +new_version_found = False + +session = Session() +session.verify = False + +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) + +def MagiskandGappsChecker(type): + global new_version_found + # Get current version + currentver = requests.get(f"https://raw.githubusercontent.com/YT-Advanced/WSA-Script/update/" + type + ".appversion").text.replace('\n', '') + # Write for pushing later + file = open('../' + type + '.appversion', 'w') + file.write(currentver) + if new_version_found: + return 0; + + # Get latest version + latestver = "" + msg = "" + if (type == "magisk"): + latestver = json.loads(requests.get(f"https://github.com/topjohnwu/magisk-files/raw/master/stable.json").content)['magisk']['version'].replace('\n', '') + msg="Update Magisk Version from `v" + currentver + "` to `v" + latestver + "`" + elif (type == "gapps"): + latestver = json.loads(requests.get(f"https://api.github.com/repos/YT-Advanced/MindTheGappsBuilder/releases/latest", headers=reqheaders).content)['name'] + msg="Update MindTheGapps Version from `v" + currentver + "` to `v" + latestver + "`" + + # Check if version is the same or not + if (currentver != latestver): + print("New version found: " + latestver) + new_version_found = True + # Write appversion content + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + file.seek(0) + file.truncate() + file.write(latestver) + # Write Github Environment + with open(env_file, "a") as wr: + wr.write("SHOULD_BUILD=yes\nMSG=" + msg) + file.close() + +def WSAChecker(user, release_type): + global new_version_found + currentver = requests.get(f"https://raw.githubusercontent.com/YT-Advanced/WSA-Script/update/" + release_type + ".appversion").text.replace('\n', '') + + # Write for pushing later + file = open('../' + release_type + '.appversion', 'w') + file.write(currentver) + + if new_version_found: + return 0; + # Get information + with open("../xml/GetCookie.xml", "r") as f: + cookie_content = f.read().format(user) + f.close() + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cookie_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + return 1 + doc = minidom.parseString(out.text) + cookie = doc.getElementsByTagName('EncryptedData')[0].firstChild.nodeValue + with open("../xml/WUIDRequest.xml", "r") as f: + cat_id_content = f.read().format(user, cookie, cat_id, release_type) + f.close() + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cat_id_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + return 1 + doc = minidom.parseString(html.unescape(out.text)) + filenames = {} + for node in doc.getElementsByTagName('ExtendedUpdateInfo')[0].getElementsByTagName('Updates')[0].getElementsByTagName('Update'): + node_xml = node.getElementsByTagName('Xml')[0] + node_files = node_xml.getElementsByTagName('Files') + if not node_files: + continue + else: + for node_file in node_files[0].getElementsByTagName('File'): + if node_file.hasAttribute('InstallerSpecificIdentifier') and node_file.hasAttribute('FileName'): + filenames[node.getElementsByTagName('ID')[0].firstChild.nodeValue] = (f"{node_file.attributes['InstallerSpecificIdentifier'].value}_{node_file.attributes['FileName'].value}", + node_xml.getElementsByTagName('ExtendedProperties')[0].attributes['PackageIdentityName'].value) + identities = {} + for node in doc.getElementsByTagName('NewUpdates')[0].getElementsByTagName('UpdateInfo'): + node_xml = node.getElementsByTagName('Xml')[0] + if not node_xml.getElementsByTagName('SecuredFragment'): + continue + else: + id = node.getElementsByTagName('ID')[0].firstChild.nodeValue + update_identity = node_xml.getElementsByTagName('UpdateIdentity')[0] + if id in filenames: + fileinfo = filenames[id] + if fileinfo[0] not in identities: + identities[fileinfo[0]] = ([update_identity.attributes['UpdateID'].value, + update_identity.attributes['RevisionNumber'].value], fileinfo[1]) + wsa_build_ver = 0 + for filename, value in identities.items(): + if re.match(f"MicrosoftCorporationII.WindowsSubsystemForAndroid_.*.msixbundle", filename): + tmp_wsa_build_ver = re.search(r"\d{4}.\d{5}.\d{1,}.\d{1,}", filename).group() + if (wsa_build_ver == 0): + wsa_build_ver = tmp_wsa_build_ver + elif version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): + wsa_build_ver = tmp_wsa_build_ver + + # Check new WSA version + if version.parse(currentver) < version.parse(wsa_build_ver): + print("New version found: " + wsa_build_ver) + new_version_found = True + # Write appversion content + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + file.seek(0) + file.truncate() + file.write(wsa_build_ver) + # Write Github Environment + msg = 'Update WSA Version from `v' + currentver + '` to `v' + wsa_build_ver + '`' + with open(env_file, "a") as wr: + wr.write("SHOULD_BUILD=yes\nRELEASE_TYPE=" + release_type + "\nMSG=" + msg) + file.close() + +# Get user_code (Thanks to @bubbles-wow because of his repository) +users = {""} +try: + response = requests.get("https://api.github.com/repos/bubbles-wow/MS-Account-Token/contents/token.cfg") + if response.status_code == 200: + content = response.json()["content"] + content = content.encode("utf-8") + content = base64.b64decode(content) + text = content.decode("utf-8") + user_code = Prop(text).get("user_code") + updatetime = Prop(text).get("update_time") + print("Successfully get user token from server!") + print(f"Last update time: {updatetime}\n") + else: + user_code = "" + print(f"Failed to get user token from server! Error code: {response.status_code}\n") +except: + user_code = "" + +if user_code == "": + users = {""} +else: + users = {"", user_code} +for user in users: + if user == "": + print("Checking WSA Stable version...\n") + if WSAChecker(user, "retail") == 1: + break + print("Checking Magisk version...\n") + if MagiskandGappsChecker("magisk") == 1: + break + print("Checking MindTheGapps version...\n") + if MagiskandGappsChecker("gapps") == 1: + break + else: + print("Checking WSA Insider version...\n") + if WSAChecker(user, "WIF") == 1: + break diff --git a/MagiskOnWSA/scripts/build.sh b/MagiskOnWSA/scripts/build.sh index 7d46b4c..2b7c3b4 100644 --- a/MagiskOnWSA/scripts/build.sh +++ b/MagiskOnWSA/scripts/build.sh @@ -15,43 +15,24 @@ # You should have received a copy of the GNU Affero General Public License # along with MagiskOnWSALocal. If not, see . # -# Copyright (C) 2023 LSPosed Contributors +# Copyright (C) 2024 LSPosed Contributors # # shellcheck disable=SC2034 cd "$(dirname "$0")" || exit 1 +# export TMPDIR=$HOME/.cache/wsa +if [ "$TMPDIR" ] && [ ! -d "$TMPDIR" ]; then + mkdir -p "$TMPDIR" +fi WORK_DIR=$(mktemp -d -t wsa-build-XXXXXXXXXX_) || exit 1 -# lowerdir -ROOT_MNT_RO="$WORK_DIR/erofs" -VENDOR_MNT_RO="$ROOT_MNT_RO/vendor" -PRODUCT_MNT_RO="$ROOT_MNT_RO/product" -SYSTEM_EXT_MNT_RO="$ROOT_MNT_RO/system_ext" - -# upperdir -ROOT_MNT_RW="$WORK_DIR/upper" -VENDOR_MNT_RW="$ROOT_MNT_RW/vendor" -PRODUCT_MNT_RW="$ROOT_MNT_RW/product" -SYSTEM_EXT_MNT_RW="$ROOT_MNT_RW/system_ext" -SYSTEM_MNT_RW="$ROOT_MNT_RW/system" - -# merged -# shellcheck disable=SC2034 -ROOT_MNT="$WORK_DIR/system_root_merged" -SYSTEM_MNT="$ROOT_MNT/system" -VENDOR_MNT="$ROOT_MNT/vendor" -PRODUCT_MNT="$ROOT_MNT/product" -SYSTEM_EXT_MNT="$ROOT_MNT/system_ext" - -declare -A LOWER_PARTITION=(["zsystem"]="$ROOT_MNT_RO" ["vendor"]="$VENDOR_MNT_RO" ["product"]="$PRODUCT_MNT_RO" ["system_ext"]="$SYSTEM_EXT_MNT_RO") -declare -A UPPER_PARTITION=(["zsystem"]="$SYSTEM_MNT_RW" ["vendor"]="$VENDOR_MNT_RW" ["product"]="$PRODUCT_MNT_RW" ["system_ext"]="$SYSTEM_EXT_MNT_RW") -declare -A MERGED_PARTITION=(["zsystem"]="$ROOT_MNT" ["vendor"]="$VENDOR_MNT" ["product"]="$PRODUCT_MNT" ["system_ext"]="$SYSTEM_EXT_MNT") - DOWNLOAD_DIR=../download +DOWNLOAD_WSA_CONF_NAME=wsa.list DOWNLOAD_CONF_NAME=download.list PYTHON_VENV_DIR="$(dirname "$PWD")/python3-env" OUTPUT_DIR=../output WSA_WORK_ENV="${WORK_DIR:?}/ENV" + touch "$WSA_WORK_ENV" export WSA_WORK_ENV abort() { @@ -63,88 +44,14 @@ trap abort INT TERM default() { ARCH=x64 +# CUSTOM_MODEL=redfin RELEASE_TYPE=retail + MAGISK_BRANCH=topjohnwu MAGISK_VER=stable - GAPPS_BRAND=MindTheGapps - CUSTOM_MODEL=redfin ROOT_SOL=magisk + COMPRESS_FORMAT=none } -vhdx_to_raw_img() { - qemu-img convert -q -f vhdx -O raw "$1" "$2" || return 1 - rm -f "$1" || return 1 -} - -ro_ext4_img_to_rw() { - resize_img "$1" "$(($(du --apparent-size -sB512 "$1" | cut -f1) * 2))"s || return 1 - e2fsck -fp -E unshare_blocks "$1" || return 1 - resize_img "$1" || return 1 - return 0 -} - -resize_img() { - sudo e2fsck -pf "$1" || return 1 - if [ "$2" ]; then - sudo resize2fs "$1" "$2" || return 1 - else - sudo resize2fs -M "$1" || return 1 - fi - return 0 -} - -mk_overlayfs() { - local context own - local workdir="$WORK_DIR/worker/$1" - local lowerdir="$2" - local upperdir="$3" - local merged="$4" - - echo "mk_overlayfs: label $1 - lowerdir=$lowerdir - upperdir=$upperdir - workdir=$workdir - merged=$merged" - case "$1" in - vendor) - context="u:object_r:vendor_file:s0" - own="0:2000" - ;; - system) - context="u:object_r:rootfs:s0" - own="0:0" - ;; - *) - context="u:object_r:system_file:s0" - own="0:0" - ;; - esac - sudo mkdir -p -m 755 "$workdir" "$upperdir" "$merged" || return 1 - sudo chown -R "$own" "$upperdir" "$workdir" "$merged" || return 1 - sudo setfattr -n security.selinux -v "$context" "$upperdir" || return 1 - sudo setfattr -n security.selinux -v "$context" "$workdir" || return 1 - sudo setfattr -n security.selinux -v "$context" "$merged" || return 1 - sudo mount -vt overlay overlay -olowerdir="$lowerdir",upperdir="$upperdir",workdir="$workdir" "$merged" || return 1 -} - -check_image_type() { - local type - type=$(blkid -o value -s TYPE "$1") - echo "$type" -} - -mk_erofs_umount() { - sudo "../bin/EROFS/mkfs.erofs" -zlz4hc -T1230768000 --chunksize=4096 --exclude-regex="lost+found" "$2".erofs "$1" || abort "Failed to make erofs image from $1" - sudo umount -v "$1" - sudo rm -f "$2" - sudo mv "$2".erofs "$2" -} - -# workaround for Debian -# In Debian /usr/sbin is not in PATH and some utilities in there are in use -[ -d /usr/sbin ] && export PATH="/usr/sbin:$PATH" -# In Debian /etc/mtab is not exist -[ -f /etc/mtab ] || sudo ln -s /proc/self/mounts /etc/mtab - ARCH_MAP=( "x64" "arm64" @@ -158,6 +65,12 @@ RELEASE_TYPE_MAP=( "latest" ) +MAGISK_BRANCH_MAP=( + "topjohnwu" + "HuskyDG" + "vvb2060" +) + MAGISK_VER_MAP=( "stable" "beta" @@ -168,26 +81,21 @@ MAGISK_VER_MAP=( "alpha" ) -GAPPS_BRAND_MAP=( - "MindTheGapps" - "none" -) - -CUSTOM_MODEL_MAP=( - "none" - "sunfish" - "bramble" - "redfin" - "barbet" - "raven" - "oriole" - "bluejay" - "panther" - "cheetah" - "lynx" - "tangorpro" - "felix" -) +# CUSTOM_MODEL_MAP=( +# "none" +# "sunfish" +# "bramble" +# "redfin" +# "barbet" +# "raven" +# "oriole" +# "bluejay" +# "panther" +# "cheetah" +# "lynx" +# "tangorpro" +# "felix" +# ) ROOT_SOL_MAP=( "magisk" @@ -198,17 +106,17 @@ ROOT_SOL_MAP=( COMPRESS_FORMAT_MAP=( "7z" "zip" + "none" ) ARGUMENT_LIST=( + "compress-format:" "arch:" "release-type:" - "magisk-ver:" - "gapps-brand:" - "custom-model:" "root-sol:" - "compress-format:" - "after-compress" + "magisk-branch:" + "magisk-ver:" + "install-gapps" "remove-amazon" ) @@ -224,18 +132,44 @@ opts=$( eval set --"$opts" while [[ $# -gt 0 ]]; do - case "$1" in - --arch ) ARCH="$2"; shift 2 ;; - --release-type ) RELEASE_TYPE="$2"; shift 2 ;; - --gapps-brand ) GAPPS_BRAND="$2"; shift 2 ;; - --custom-model ) CUSTOM_MODEL="$2"; shift 2;; - --root-sol ) ROOT_SOL="$2"; shift 2 ;; - --compress-format ) COMPRESS_FORMAT="$2"; shift 2 ;; - --after-compress ) AFTER_COMPRESS="yes"; shift ;; - --remove-amazon ) REMOVE_AMAZON="yes"; shift ;; - --magisk-ver ) MAGISK_VER="$2"; shift 2 ;; - -- ) shift; break;; - esac + case "$1" in + --compress-format) + COMPRESS_FORMAT="$2" + shift 2 + ;; + --arch) + ARCH="$2" + shift 2 + ;; + --release-type) + RELEASE_TYPE="$2" + shift 2 + ;; + --root-sol) + ROOT_SOL="$2" + shift 2 + ;; + --magisk-branch) + MAGISK_BRANCH="$2" + shift 2 + ;; + --magisk-ver) + MAGISK_VER="$2" + shift 2 + ;; + --install-gapps) + HAS_GAPPS=1 + shift + ;; + --remove-amazon) + REMOVE_AMAZON=1 + shift + ;; + --) + shift + break + ;; + esac done check_list() { @@ -260,10 +194,10 @@ check_list() { check_list "$ARCH" "Architecture" "${ARCH_MAP[@]}" check_list "$RELEASE_TYPE" "Release Type" "${RELEASE_TYPE_MAP[@]}" +check_list "$MAGISK_BRANCH" "Magisk Branch" "${MAGISK_BRANCH_MAP[@]}" check_list "$MAGISK_VER" "Magisk Version" "${MAGISK_VER_MAP[@]}" -check_list "$GAPPS_BRAND" "GApps Brand" "${GAPPS_BRAND_MAP[@]}" -check_list "$CUSTOM_MODEL" "Custom Model" "${CUSTOM_MODEL_MAP[@]}" check_list "$ROOT_SOL" "Root Solution" "${ROOT_SOL_MAP[@]}" +# check_list "$CUSTOM_MODEL" "Custom Model" "${CUSTOM_MODEL_MAP[@]}" check_list "$COMPRESS_FORMAT" "Compress Format" "${COMPRESS_FORMAT_MAP[@]}" # shellcheck disable=SC1091 @@ -271,62 +205,92 @@ check_list "$COMPRESS_FORMAT" "Compress Format" "${COMPRESS_FORMAT_MAP[@]}" source "$PYTHON_VENV_DIR/bin/activate" || abort "Failed to activate virtual environment" } declare -A RELEASE_NAME_MAP=(["retail"]="Retail" ["latest"]="Insider Private" ["RP"]="Release Preview" ["WIS"]="Insider Slow" ["WIF"]="Insider Fast") +declare -A ANDROID_API_MAP=(["33"]="13.0" ["34"]="14.0") +declare -A ARCH_NAME_MAP=(["x64"]="x86_64" ["arm64"]="arm64") RELEASE_NAME=${RELEASE_NAME_MAP[$RELEASE_TYPE]} || abort - -echo -e "Build: RELEASE_TYPE=$RELEASE_NAME" - +echo -e "INFO: Release Name: $RELEASE_NAME\n" WSA_ZIP_PATH=$DOWNLOAD_DIR/wsa-$RELEASE_TYPE.zip -VCLibs_PATH="$DOWNLOAD_DIR/Microsoft.VCLibs.140.00_$ARCH.appx" +vclibs_PATH="$DOWNLOAD_DIR/Microsoft.VCLibs.140.00_$ARCH.appx" UWPVCLibs_PATH="$DOWNLOAD_DIR/Microsoft.VCLibs.140.00.UWPDesktop_$ARCH.appx" xaml_PATH="$DOWNLOAD_DIR/Microsoft.UI.Xaml.2.8_$ARCH.appx" MAGISK_ZIP=magisk-$MAGISK_VER.zip MAGISK_PATH=$DOWNLOAD_DIR/$MAGISK_ZIP -GAPPS_ZIP_NAME=MindTheGapps-$ARCH-13.0.zip -GAPPS_PATH=$DOWNLOAD_DIR/$GAPPS_ZIP_NAME +CUST_PATH="$DOWNLOAD_DIR/cust.img" +ANDROID_API=33 +update_gapps_files_name() { + GAPPS_IMAGE_NAME=gapps-${ANDROID_API_MAP[$ANDROID_API]}-${ARCH_NAME_MAP[$ARCH]}.img + GAPPS_RC_NAME=gapps-${ANDROID_API_MAP[$ANDROID_API]}.rc + GAPPS_IMAGE_PATH=$DOWNLOAD_DIR/$GAPPS_IMAGE_NAME + GAPPS_RC_PATH=$DOWNLOAD_DIR/$GAPPS_RC_NAME +} WSA_MAJOR_VER=0 - +getKernelVersion() { + local bintype kernel_string kernel_version + bintype="$(file -b "$1")" + if [[ $bintype == *"version"* ]]; then + readarray -td '' kernel_string < <(awk '{ gsub(/, /,"\0"); print; }' <<<"$bintype, ") + unset 'kernel_string[-1]' + for i in "${kernel_string[@]}"; do + if [[ $i == *"version"* ]]; then + IFS=" " read -r -a kernel_string <<<"$i" + kernel_version="${kernel_string[1]}" + fi + done + else + IFS=" " read -r -a kernel_string <<<"$(strings "$1" | grep 'Linux version')" + kernel_version="${kernel_string[2]}" + fi + IFS=" " read -r -a arr <<<"${kernel_version//-/ }" + printf '%s' "${arr[0]}" +} update_ksu_zip_name() { KERNEL_VER="" - case "$WSA_MAJOR_VER" in - "2308") KERNEL_VER="5.15.104.3";; - "2309"|"2310"|"2311") KERNEL_VER="5.15.104.4";; - *) abort "KernelSU is not supported in this WSA version: $WSA_MAJOR_VER" - esac + if [ -f "$WORK_DIR/wsa/$ARCH/Tools/kernel" ]; then + KERNEL_VER=$(getKernelVersion "$WORK_DIR/wsa/$ARCH/Tools/kernel") + fi KERNELSU_ZIP_NAME=kernelsu-$ARCH-$KERNEL_VER.zip KERNELSU_PATH=$DOWNLOAD_DIR/$KERNELSU_ZIP_NAME KERNELSU_APK_PATH=$DOWNLOAD_DIR/KernelSU.apk KERNELSU_INFO="$KERNELSU_PATH.info" } -update_gapps_zip_name() { - GAPPS_ZIP_NAME=MindTheGapps-$ARCH-13.0.zip - GAPPS_PATH=$DOWNLOAD_DIR/$GAPPS_ZIP_NAME -} -echo "Generate Download Links" -if [ "$RELEASE_TYPE" != "latest" ]; then - python3 generateWSALinks.py "$ARCH" "$RELEASE_TYPE" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" || abort +echo "Generating WSA Download Links" +python3 generateWSALinks.py "$ARCH" "$RELEASE_TYPE" "$DOWNLOAD_DIR" "$DOWNLOAD_WSA_CONF_NAME" || abort + +if [ "$RELEASE_TYPE" == "latest" ]; then + printf "%s\n" "$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.assets[] | .browser_download_url')" >> "$DOWNLOAD_DIR/$DOWNLOAD_WSA_CONF_NAME" || abort + printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_WSA_CONF_NAME" || abort + printf " out=wsa-latest.zip\n" >> "$DOWNLOAD_DIR/$DOWNLOAD_WSA_CONF_NAME" || abort + WSA_VER=$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.tag_name') + WSA_MAJOR_VER=${WSA_VER:0:4} +else + # shellcheck disable=SC1090 + source "$WSA_WORK_ENV" || abort +fi + +if ! aria2c --no-conf --log-level=info --log="$DOWNLOAD_DIR/aria2_download.log" -x16 -s16 -j7 -m0 \ + --async-dns=false --check-integrity=true \ + -d"$DOWNLOAD_DIR" -i"$DOWNLOAD_DIR/$DOWNLOAD_WSA_CONF_NAME"; then + abort "We have encountered an error while downloading files." +fi + +echo "Extracting WSA" +if [ -f "$WSA_ZIP_PATH" ]; then + if ! python3 extractWSA.py "$ARCH" "$WSA_ZIP_PATH" "$WORK_DIR" "$WSA_WORK_ENV"; then + abort "Unzip WSA failed" + fi + echo -e "done\n" # shellcheck disable=SC1090 source "$WSA_WORK_ENV" || abort else - printf "%s\n" "$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.assets[] | .browser_download_url')" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " out=wsa-latest.zip\n" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - mkdir -p "$DOWNLOAD_DIR/xaml" - curl -sO "https://globalcdn.nuget.org/packages/microsoft.ui.xaml.2.8.5.nupkg" --output-dir "$DOWNLOAD_DIR/xaml" - 7z x $DOWNLOAD_DIR/xaml/*.nupkg -o../download/ | tail -4 - mv "$DOWNLOAD_DIR/tools/AppX/$ARCH/Release/Microsoft.UI.Xaml.2.8.appx" "$xaml_PATH" - printf "https://aka.ms/Microsoft.VCLibs.%s.14.00.Desktop.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " out=Microsoft.VCLibs.140.00.UWPDesktop_%s.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf "https://cdn.glitch.global/847a3043-7118-4fd2-8853-fe9756f88702/Microsoft.VCLibs.140.00_14.0.32530.0_%s__8wekyb3d8bbwe.Appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - printf " out=Microsoft.VCLibs.140.00_%s.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort - WSA_VER=$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.tag_name') - WSA_MAJOR_VER=${WSA_VER:0:4} + abort "The WSA zip package does not exist" fi -if [ "$ROOT_SOL" = "magisk" ] || [ "$GAPPS_BRAND" != "none" ]; then - python3 generateMagiskLink.py "$MAGISK_VER" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" || abort + +echo "Generating Download Links" +if [ "$HAS_GAPPS" ] || [ "$ROOT_SOL" = "magisk" ]; then + python3 generateMagiskLink.py "$MAGISK_BRANCH" "$MAGISK_VER" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" || abort fi + if [ "$ROOT_SOL" = "kernelsu" ]; then update_ksu_zip_name python3 generateKernelSULink.py "$ARCH" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" "$KERNEL_VER" "$KERNELSU_ZIP_NAME" || abort @@ -335,627 +299,157 @@ if [ "$ROOT_SOL" = "kernelsu" ]; then # shellcheck disable=SC2153 echo "KERNELSU_VER=$KERNELSU_VER" >"$KERNELSU_INFO" fi -if [ "$GAPPS_BRAND" != "none" ]; then - update_gapps_zip_name - python3 generateGappsLink.py "$ARCH" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" "$GAPPS_ZIP_NAME" || abort +if [ "$HAS_GAPPS" ]; then + update_gapps_files_name + python3 generateGappsLink.py "$ARCH" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" "$ANDROID_API" "$GAPPS_IMAGE_NAME" || abort fi -echo "Download Artifacts" -if ! aria2c --no-conf --log-level=info --log="$DOWNLOAD_DIR/aria2_download.log" -x16 -s16 -j5 -c -R -m0 --async-dns=false --check-integrity=true --continue=true --allow-overwrite=true --conditional-get=true -d"$DOWNLOAD_DIR" -i"$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME"; then - echo "We have encountered an error while downloading files." - exit 1 -fi - -echo "Extract WSA" -if [ -f "$WSA_ZIP_PATH" ]; then - if ! python3 extractWSA.py "$ARCH" "$WSA_ZIP_PATH" "$WORK_DIR" "$WSA_WORK_ENV"; then - abort "Unzip WSA failed, is the download incomplete?" +if [ -f "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" ]; then + echo "Downloading Artifacts" + if ! aria2c --no-conf --log-level=info --log="$DOWNLOAD_DIR/aria2_download.log" -x16 -s16 -j7 -m0 \ + --async-dns=false --check-integrity=true \ + -d"$DOWNLOAD_DIR" -i"$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME"; then + abort "We have encountered an error while downloading files." fi - echo -e "Extract done\n" - # shellcheck disable=SC1090 - source "$WSA_WORK_ENV" || abort -else - echo "The WSA zip package does not exist, is the download incomplete?" - exit 1 fi -if [ "$GAPPS_BRAND" != "none" ] || [ "$ROOT_SOL" = "magisk" ]; then - echo "Extract Magisk" +declare -A FILES_CHECK_LIST=([xaml_PATH]="$xaml_PATH" [vclibs_PATH]="$vclibs_PATH" [UWPVCLibs_PATH]="$UWPVCLibs_PATH") +if [ "$HAS_GAPPS" ] || [ "$ROOT_SOL" = "magisk" ]; then + FILES_CHECK_LIST+=(["MAGISK_PATH"]="$MAGISK_PATH" ["CUST_PATH"]="$CUST_PATH") +fi +if [ "$ROOT_SOL" = "kernelsu" ]; then + update_ksu_zip_name + FILES_CHECK_LIST+=(["KERNELSU_PATH"]="$KERNELSU_PATH") +fi +if [ "$HAS_GAPPS" ]; then + update_gapps_files_name + FILES_CHECK_LIST+=(["GAPPS_IMAGE_PATH"]="$GAPPS_IMAGE_PATH" ["GAPPS_RC_PATH"]="$GAPPS_RC_PATH") +fi +for i in "${FILES_CHECK_LIST[@]}"; do + if [ ! -f "$i" ]; then + echo "Offline mode: missing [$i]" + FILE_MISSING="1" + fi +done +if [ "$FILE_MISSING" ]; then + abort "Some files are missing" +fi +if [ "$HAS_GAPPS" ] || [ "$ROOT_SOL" = "magisk" ]; then + echo "Extracting Magisk" if [ -f "$MAGISK_PATH" ]; then MAGISK_VERSION_NAME="" + MAGISK_VERSION_CODE=0 if ! python3 extractMagisk.py "$ARCH" "$MAGISK_PATH" "$WORK_DIR"; then abort "Unzip Magisk failed, is the download incomplete?" fi # shellcheck disable=SC1090 source "$WSA_WORK_ENV" || abort - sudo patchelf --set-interpreter "../linker/linker64" "$WORK_DIR/magisk/magiskpolicy" || abort - chmod +x "$WORK_DIR/magisk/magiskpolicy" || abort + chmod +x "$WORK_DIR/magisk/magiskboot" || abort else - echo "The Magisk zip package does not exist, rename it to magisk-debug.zip and put it in the download folder." - exit 1 + abort "The Magisk zip package does not exist, rename it to magisk-debug.zip and put it in the download folder." fi echo -e "done\n" fi -if [ "$ROOT_SOL" = "kernelsu" ]; then - update_ksu_zip_name - echo "Extract KernelSU" +if [ "$HAS_GAPPS" ] || [ "$ROOT_SOL" = "magisk" ]; then + echo "Integrating Magisk" + "$WORK_DIR/magisk/magiskboot" compress=xz "$WORK_DIR/magisk/magisk64" "$WORK_DIR/magisk/magisk64.xz" + "$WORK_DIR/magisk/magiskboot" compress=xz "$WORK_DIR/magisk/magisk32" "$WORK_DIR/magisk/magisk32.xz" + "$WORK_DIR/magisk/magiskboot" compress=xz "$MAGISK_PATH" "$WORK_DIR/magisk/stub.xz" + "$WORK_DIR/magisk/magiskboot" cpio "$WORK_DIR/wsa/$ARCH/Tools/initrd.img" \ + "mv /init /wsainit" \ + "add 0750 /lspinit ../bin/$ARCH/lspinit" \ + "ln /lspinit /init" \ + "add 0750 /magiskinit $WORK_DIR/magisk/magiskinit" \ + "mkdir 0750 overlay.d" \ + "mkdir 0750 overlay.d/sbin" \ + "add 0644 overlay.d/sbin/magisk64.xz $WORK_DIR/magisk/magisk64.xz" \ + "add 0644 overlay.d/sbin/magisk32.xz $WORK_DIR/magisk/magisk32.xz" \ + "add 0644 overlay.d/sbin/stub.xz $WORK_DIR/magisk/stub.xz" \ + "mkdir 000 .backup" \ + "add 000 overlay.d/init.lsp.magisk.rc init.lsp.magisk.rc" \ + "add 000 overlay.d/sbin/post-fs-data.sh post-fs-data.sh" \ + "add 000 overlay.d/sbin/lsp_cust.img $CUST_PATH" \ + || abort "Unable to patch initrd" +elif [ "$ROOT_SOL" = "kernelsu" ]; then + echo "Extracting KernelSU" # shellcheck disable=SC1090 source "${KERNELSU_INFO:?}" || abort + echo "WSA Kernel Version: $KERNEL_VER" + echo "KernelSU Version: $KERNELSU_VER" if ! unzip "$KERNELSU_PATH" -d "$WORK_DIR/kernelsu"; then abort "Unzip KernelSU failed, package is corrupted?" fi if [ "$ARCH" = "x64" ]; then mv "$WORK_DIR/kernelsu/bzImage" "$WORK_DIR/kernelsu/kernel" - else + elif [ "$ARCH" = "arm64" ]; then mv "$WORK_DIR/kernelsu/Image" "$WORK_DIR/kernelsu/kernel" fi - echo -e "done\n" + echo "Integrate KernelSU" + mv "$WORK_DIR/wsa/$ARCH/Tools/kernel" "$WORK_DIR/wsa/$ARCH/Tools/kernel_origin" + cp "$WORK_DIR/kernelsu/kernel" "$WORK_DIR/wsa/$ARCH/Tools/kernel" fi - -if [ "$GAPPS_BRAND" != 'none' ]; then - update_gapps_zip_name - echo "Extract MindTheGapps" - mkdir -p "$WORK_DIR/gapps" || abort - if [ -f "$GAPPS_PATH" ]; then - if ! unzip "$GAPPS_PATH" "system/*" -d "$WORK_DIR/gapps"; then - abort "Unzip MindTheGapps failed, package is corrupted?" - fi - mv "$WORK_DIR/gapps/system/"* "$WORK_DIR/gapps" || abort +echo -e "done\n" +if [ "$HAS_GAPPS" ]; then + update_gapps_files_name + if [ -f "$GAPPS_IMAGE_PATH" ] && [ -f "$GAPPS_RC_PATH" ]; then + echo "Integrating GApps" + "$WORK_DIR/magisk/magiskboot" cpio "$WORK_DIR/wsa/$ARCH/Tools/initrd.img" \ + "add 000 /lspolicy.rule sepolicy.rule" \ + "add 000 overlay.d/gapps.rc $GAPPS_RC_PATH" \ + "add 000 overlay.d/sbin/lsp_gapps.img $GAPPS_IMAGE_PATH" \ + || abort "Unable to patch initrd" + echo -e "done\n" else - abort "The MindTheGapps zip package does not exist." + abort "The GApps package does not exist." fi - echo -e "Extract done\n" -fi - -echo "Convert vhdx to RAW image" -vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/system_ext.vhdx" "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort -vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/product.vhdx" "$WORK_DIR/wsa/$ARCH/product.img" || abort -vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/system.vhdx" "$WORK_DIR/wsa/$ARCH/system.img" || abort -vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/vendor.vhdx" "$WORK_DIR/wsa/$ARCH/vendor.img" || abort -echo -e "Convert vhdx to RAW image done\n" - -SYSTEMIMAGES_FILE_SYSTEM_TYPE=$(check_image_type "$WORK_DIR/wsa/$ARCH/system.img") -if [[ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "erofs" ]]; then - echo "Mount images" - sudo mkdir -p -m 755 "$ROOT_MNT_RO" || abort - sudo chown "0:0" "$ROOT_MNT_RO" || abort - sudo setfattr -n security.selinux -v "u:object_r:rootfs:s0" "$ROOT_MNT_RO" || abort - sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/system.img" "$ROOT_MNT_RO" || abort 1 - sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_MNT_RO" || abort 1 - sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_MNT_RO" || abort 1 - sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_MNT_RO" || abort 1 - echo -e "done\n" - echo "Create overlayfs for EROFS" - mk_overlayfs system "$ROOT_MNT_RO" "$SYSTEM_MNT_RW" "$ROOT_MNT" || abort - mk_overlayfs vendor "$VENDOR_MNT_RO" "$VENDOR_MNT_RW" "$VENDOR_MNT" || abort - mk_overlayfs product "$PRODUCT_MNT_RO" "$PRODUCT_MNT_RW" "$PRODUCT_MNT" || abort - mk_overlayfs system_ext "$SYSTEM_EXT_MNT_RO" "$SYSTEM_EXT_MNT_RW" "$SYSTEM_EXT_MNT" || abort - echo -e "Create overlayfs for EROFS done\n" -elif [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "ext4" ]; then - echo "Remove read-only flag for read-only EXT4 image" - ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort - ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/product.img" || abort - ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/system.img" || abort - ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/vendor.img" || abort - echo -e "Remove read-only flag for read-only EXT4 image done\n" - - echo "Calculate the required space" - EXTRA_SIZE=10240 - - SYSTEM_EXT_NEED_SIZE=$EXTRA_SIZE - if [ -d "$WORK_DIR/gapps/system_ext" ]; then - SYSTEM_EXT_NEED_SIZE=$((SYSTEM_EXT_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps/system_ext" | cut -f1))) - fi - - PRODUCT_NEED_SIZE=$EXTRA_SIZE - if [ -d "$WORK_DIR/gapps/product" ]; then - PRODUCT_NEED_SIZE=$((PRODUCT_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps/product" | cut -f1))) - fi - - SYSTEM_NEED_SIZE=$EXTRA_SIZE - if [ -d "$WORK_DIR/gapps" ]; then - SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps" | cut -f1) - PRODUCT_NEED_SIZE - SYSTEM_EXT_NEED_SIZE)) - fi - if [ "$ROOT_SOL" = "magisk" ]; then - if [ -d "$WORK_DIR/magisk" ]; then - MAGISK_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/magisk/magisk" | cut -f1) - SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + MAGISK_SIZE)) - fi - if [ -f "$MAGISK_PATH" ]; then - MAGISK_APK_SIZE=$(du --apparent-size -sB512 "$MAGISK_PATH" | cut -f1) - SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + MAGISK_APK_SIZE)) - fi - fi - if [ -d "../$ARCH/system" ]; then - SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + $(du --apparent-size -sB512 "../$ARCH/system" | cut -f1))) - fi - VENDOR_NEED_SIZE=$EXTRA_SIZE - echo -e "done\n" - echo "Expand images" - SYSTEM_EXT_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/system_ext.img" | cut -f1) - PRODUCT_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/product.img" | cut -f1) - SYSTEM_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/system.img" | cut -f1) - VENDOR_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/vendor.img" | cut -f1) - SYSTEM_EXT_TARGET_SIZE=$((SYSTEM_EXT_NEED_SIZE * 2 + SYSTEM_EXT_IMG_SIZE)) - PRODUCT_TAGET_SIZE=$((PRODUCT_NEED_SIZE * 2 + PRODUCT_IMG_SIZE)) - SYSTEM_TAGET_SIZE=$((SYSTEM_IMG_SIZE * 2)) - VENDOR_TAGET_SIZE=$((VENDOR_NEED_SIZE * 2 + VENDOR_IMG_SIZE)) - - resize_img "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_TARGET_SIZE"s || abort - resize_img "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_TAGET_SIZE"s || abort - resize_img "$WORK_DIR/wsa/$ARCH/system.img" "$SYSTEM_TAGET_SIZE"s || abort - resize_img "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_TAGET_SIZE"s || abort - - echo -e "Expand images done\n" - - echo "Mount images" - sudo mkdir "$ROOT_MNT" || abort - sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/system.img" "$ROOT_MNT" || abort - sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_MNT" || abort - sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_MNT" || abort - sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_MNT" || abort - echo -e "done\n" -else - abort "Unknown file system type: $SYSTEMIMAGES_FILE_SYSTEM_TYPE" fi if [ "$REMOVE_AMAZON" ]; then - echo "Remove Amazon Appstore" - rm -fv "$WORK_DIR/wsa/$ARCH/apex/mado_release.apex" - # Stub - find "${PRODUCT_MNT:?}"/{apex,etc/*permissions} 2>/dev/null | grep -e mado | sudo xargs rm -rfv - echo -e "done\n" + rm -f "$WORK_DIR/wsa/$ARCH/apex/"mado*.apex || abort fi -echo "Add device administration features" -sudo sed -i -e '/cts/a \ ' -e '/print/i \ ' "$VENDOR_MNT/etc/permissions/windows.permissions.xml" -sudo setfattr -n security.selinux -v "u:object_r:vendor_configs_file:s0" "$VENDOR_MNT/etc/permissions/windows.permissions.xml" || abort -echo -e "done\n" - -if [ "$ROOT_SOL" = 'magisk' ]; then - echo "Integrate Magisk" - sudo cp "$WORK_DIR/magisk/magisk/"* "$ROOT_MNT/debug_ramdisk/" - sudo cp "$MAGISK_PATH" "$ROOT_MNT/debug_ramdisk/stub.apk" || abort - sudo tee -a "$ROOT_MNT/debug_ramdisk/loadpolicy.sh" </dev/null || abort -#!/system/bin/sh -MAGISKTMP=/debug_ramdisk -export MAGISKTMP -mkdir -p /data/adb/magisk -cp \$MAGISKTMP/* /data/adb/magisk/ -sync -chmod -R 755 /data/adb/magisk -restorecon -R /data/adb/magisk -MAKEDEV=1 \$MAGISKTMP/magisk --preinit-device 2>&1 -RULESCMD="" -for r in \$MAGISKTMP/.magisk/preinit/*/sepolicy.rule; do - [ -f "\$r" ] || continue - RULESCMD="\$RULESCMD --apply \$r" -done -\$MAGISKTMP/magiskpolicy --live \$RULESCMD 2>&1 -EOF - sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec chmod 0711 {} \; - sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec chown root:root {} \; - sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec setfattr -n security.selinux -v "u:object_r:magisk_file:s0" {} \; || abort - echo "/debug_ramdisk(/.*)? u:object_r:magisk_file:s0" | sudo tee -a "$VENDOR_MNT/etc/selinux/vendor_file_contexts" - echo '/data/adb/magisk(/.*)? u:object_r:magisk_file:s0' | sudo tee -a "$VENDOR_MNT/etc/selinux/vendor_file_contexts" - sudo LD_LIBRARY_PATH="../linker" "$WORK_DIR/magisk/magiskpolicy" --load "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --save "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --magisk || abort - NEW_INITRC_DIR=$SYSTEM_MNT/etc/init/hw - sudo tee -a "$SYSTEM_MNT/etc/init/hw/init.rc" </dev/null -on post-fs-data - mkdir /dev/debug_ramdisk_mirror - mount none /debug_ramdisk /dev/debug_ramdisk_mirror bind - mount none none /dev/debug_ramdisk_mirror private - mount tmpfs magisk /debug_ramdisk mode=0755 - copy /dev/debug_ramdisk_mirror/magisk64 /debug_ramdisk/magisk64 - chmod 0755 /debug_ramdisk/magisk64 - symlink ./magisk64 /debug_ramdisk/magisk - symlink ./magisk64 /debug_ramdisk/su - symlink ./magisk64 /debug_ramdisk/resetprop - start adbd - copy /dev/debug_ramdisk_mirror/magisk32 /debug_ramdisk/magisk32 - chmod 0755 /debug_ramdisk/magisk32 - copy /dev/debug_ramdisk_mirror/magiskinit /debug_ramdisk/magiskinit - chmod 0755 /debug_ramdisk/magiskinit - copy /dev/debug_ramdisk_mirror/magiskpolicy /debug_ramdisk/magiskpolicy - chmod 0755 /debug_ramdisk/magiskpolicy - mkdir /debug_ramdisk/.magisk - mkdir /debug_ramdisk/.magisk/mirror 0 - mkdir /debug_ramdisk/.magisk/block 0 - mkdir /debug_ramdisk/.magisk/worker 0 - copy /dev/debug_ramdisk_mirror/stub.apk /debug_ramdisk/stub.apk - chmod 0644 /debug_ramdisk/stub.apk - copy /dev/debug_ramdisk_mirror/loadpolicy.sh /debug_ramdisk/loadpolicy.sh - chmod 0755 /debug_ramdisk/loadpolicy.sh - umount /dev/debug_ramdisk_mirror - rmdir /dev/debug_ramdisk_mirror - exec u:r:magisk:s0 0 0 -- /system/bin/sh /debug_ramdisk/loadpolicy.sh - exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --post-fs-data - -on property:vold.decrypt=trigger_restart_framework - exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --service - -on nonencrypted - exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --service - -on property:sys.boot_completed=1 - exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --boot-complete - -on property:init.svc.zygote=stopped - exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --zygote-restart -EOF - - for i in "$NEW_INITRC_DIR"/*; do - if [[ "$i" =~ init.zygote.+\.rc ]]; then - echo "Inject zygote restart $i" - sudo awk -i inplace '{if($0 ~ /service zygote /){print $0;print " exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --zygote-restart";a="";next}} 1' "$i" - sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$i" || abort - fi - done - echo -e "Integrate Magisk done\n" -elif [ "$ROOT_SOL" = "kernelsu" ]; then - echo "Copy KernelSU kernel" - cp "$WORK_DIR/kernelsu/kernel" "$WORK_DIR/wsa/$ARCH/Tools/kernel" - echo -e "Copy KernelSU kernel done\n" - echo "Add auto-install script for KernelSU Manager" - # Copy APK - DAT_APP="$SYSTEM_MNT/data-app" - sudo mkdir "$DAT_APP" - sudo cp -f "$KERNELSU_APK_PATH" "$DAT_APP/" - sudo chmod 0755 "$DAT_APP/" - sudo chmod 0644 "$DAT_APP/KernelSU.apk" - sudo find "$DAT_APP/" -exec chown root:root {} \; - sudo find "$DAT_APP/" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - # Setup script - KSU_PRE="$SYSTEM_MNT/bin/ksuinstall" - sudo tee -a "$KSU_PRE" </dev/null || abort -#!/system/bin/sh -umask 022 -echo "\nKernelSU Install Manager" -if [ ! -e "/storage/emulated/0/.ksu_completed_$KERNELSU_VER" ]; then - echo "\nInstalling KernelSU APK" - pm install -i android -r /system/data-app/KernelSU.apk - touch "/storage/emulated/0/.ksu_completed_$KERNELSU_VER" - echo "\nDone!\n" -else - echo "\nLatest KernelSU Manager is installed.\n" -fi -echo "\nLaunching KernelSU App\n" -am start -n me.weishu.kernelsu/.ui.MainActivity -EOF - # Grant access - sudo chmod 0755 "$KSU_PRE" - sudo chown 0:2000 "$KSU_PRE" - sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$KSU_PRE" || abort - echo -e "Add KernelSU Manager done\n" -fi - -echo "Add extra packages" -sudo cp -r "../$ARCH/system/"* "$SYSTEM_MNT" || abort -find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -type d -exec chmod 0755 {} \; -find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -type f -exec chmod 0644 {} \; -find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -exec chown root:root {} \; -find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort -echo -e "Add extra packages done\n" - -echo "Permissions management Netfree and Netspark security certificates" -sudo cp -r "../cacerts/"* "$SYSTEM_MNT/etc/security/cacerts/" || abort -sudo chmod 0755 "$SYSTEM_MNT/etc/security/cacerts/" -find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -type f -exec chmod 0644 {} \; -find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -exec chown root:root {} \; -find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort -echo -e "Permissions management Netfree and Netspark security certificates done\n" - -if [ "$GAPPS_BRAND" != 'none' ]; then - echo "Integrate MindTheGapps" - find "$WORK_DIR/gapps/" -mindepth 1 -type d -exec sudo chmod 0755 {} \; - find "$WORK_DIR/gapps/" -mindepth 1 -type d -exec sudo chown root:root {} \; - file_list="$(find "$WORK_DIR/gapps/" -mindepth 1 -type f)" - for file in $file_list; do - sudo chown root:root "$file" - sudo chmod 0644 "$file" - done - sudo cp --preserve=all -r "$WORK_DIR/gapps/system_ext/"* "$SYSTEM_EXT_MNT/" || abort - sudo cp --preserve=all -r "$WORK_DIR/gapps/product/"* "$PRODUCT_MNT" || abort - - find "$WORK_DIR/gapps/product/overlay" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/overlay/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/product/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/etc/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/product/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/etc/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - #sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$PRODUCT_MNT/framework" || abort - find "$WORK_DIR/gapps/product/app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/product/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/priv-app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - #find "$WORK_DIR/gapps/product/framework/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/framework/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/product/app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/product/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/priv-app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - #find "$WORK_DIR/gapps/product/framework/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/framework/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/system_ext/etc/permissions/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/etc/permissions/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - #sudo setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" "$PRODUCT_MNT/lib" || abort - #find "$WORK_DIR/gapps/product/lib/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/lib/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" {} \; || abort - #find "$WORK_DIR/gapps/product/lib64/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/lib64/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" {} \; || abort - find "$WORK_DIR/gapps/system_ext/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/priv-app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/system_ext/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/etc/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - find "$WORK_DIR/gapps/system_ext/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/priv-app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort - sudo LD_LIBRARY_PATH="../linker" "$WORK_DIR/magisk/magiskpolicy" --load "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --save "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" "allow gmscore_app gmscore_app vsock_socket { create connect write read }" "allow gmscore_app device_config_runtime_native_boot_prop file read" "allow gmscore_app system_server_tmpfs dir search" "allow gmscore_app system_server_tmpfs file open" "allow gmscore_app system_server_tmpfs filesystem getattr" "allow gmscore_app gpu_device dir search" "allow gmscore_app media_rw_data_file filesystem getattr" || abort - echo -e "Integrate MindTheGapps done\n" -fi - -if [[ "$CUSTOM_MODEL" != "none" ]]; then - echo "Fix system props" - # The first argument is prop path, second is product name (redfin), third is device model (Pixel 5) - declare -A MODEL_NAME_MAP=(["sunfish"]="Pixel 4a" ["bramble"]="Pixel 4a (5G)" ["redfin"]="Pixel 5" ["barbet"]="Pixel 5a" ["raven"]="Pixel 6 Pro" ["oriole"]="Pixel 6" ["bluejay"]="Pixel 6a" ["panther"]="Pixel 7" ["cheetah"]="Pixel 7 Pro" ["lynx"]="Pixel 7a" ["tangorpro"]="Pixel Tablet" ["felix"]="Pixel Fold") - MODEL_NAME="${MODEL_NAME_MAP[$CUSTOM_MODEL]}" - sudo python3 fixGappsProp.py "$ROOT_MNT" "$CUSTOM_MODEL" "$MODEL_NAME" || abort - # shellcheck disable=SC2002 - #BUILD_ID=$(sudo cat "$SYSTEM_MNT/build.prop" | grep -e ro.build.id | cut -c 13-) - #if [[ "${#BUILD_ID}" != "15" ]]; then - # FIXED_BUILD_ID=$(echo "$BUILD_ID" | cut -c -15) - # echo "Fixed Build ID: $FIXED_BUILD_ID" - # # shellcheck disable=SC2086 - # sudo find $ROOT_MNT/{system,system_ext,product,vendor} -name "build.prop" -exec sed -i -e "s/$BUILD_ID/$FIXED_BUILD_ID/g" {} \; - #fi - echo -e "done\n" - MODEL_NAME="${MODEL_NAME// /-}" -else - MODEL_NAME="default" -fi - -sudo find "$ROOT_MNT" -not -type l -exec touch -amt 200901010000.00 {} \; - -if [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "erofs" ]; then - echo "Create EROFS images" - mk_erofs_umount "$VENDOR_MNT" "$WORK_DIR/wsa/$ARCH/vendor.img" || abort - mk_erofs_umount "$PRODUCT_MNT" "$WORK_DIR/wsa/$ARCH/product.img" || abort - mk_erofs_umount "$SYSTEM_EXT_MNT" "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort - mk_erofs_umount "$ROOT_MNT" "$WORK_DIR/wsa/$ARCH/system.img" || abort - echo -e "Create EROFS images done\n" - echo "Umount images" - sudo umount -v "$VENDOR_MNT_RO" - sudo umount -v "$PRODUCT_MNT_RO" - sudo umount -v "$SYSTEM_EXT_MNT_RO" - sudo umount -v "$ROOT_MNT_RO" - echo -e "done\n" -elif [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "ext4" ]; then - echo "Umount images" - sudo find "$ROOT_MNT" -exec touch -hamt 200901010000.00 {} \; - sudo umount -v "$VENDOR_MNT" - sudo umount -v "$PRODUCT_MNT" - sudo umount -v "$SYSTEM_EXT_MNT" - sudo umount -v "$ROOT_MNT" - echo -e "done\n" - echo "Shrink images" - resize_img "$WORK_DIR/wsa/$ARCH/system.img" || abort - resize_img "$WORK_DIR/wsa/$ARCH/vendor.img" || abort - resize_img "$WORK_DIR/wsa/$ARCH/product.img" || abort - resize_img "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort - echo -e "Shrink images done\n" -else - abort "Unknown file system type: $SYSTEMIMAGES_FILE_SYSTEM_TYPE" -fi - -echo "Convert images to vhdx" -qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/system_ext.img" "$WORK_DIR/wsa/$ARCH/system_ext.vhdx" || abort -qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/product.img" "$WORK_DIR/wsa/$ARCH/product.vhdx" || abort -qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/system.img" "$WORK_DIR/wsa/$ARCH/system.vhdx" || abort -qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/vendor.img" "$WORK_DIR/wsa/$ARCH/vendor.vhdx" || abort -rm -f "$WORK_DIR/wsa/$ARCH/"*.img || abort -echo -e "Convert images to vhdx done\n" - -echo "Remove signature and add scripts" -sudo rm -rf "${WORK_DIR:?}"/wsa/"$ARCH"/\[Content_Types\].xml "$WORK_DIR/wsa/$ARCH/AppxBlockMap.xml" "$WORK_DIR/wsa/$ARCH/AppxSignature.p7x" "$WORK_DIR/wsa/$ARCH/AppxMetadata" || abort -if [ "$ARCH" = "x64" ]; then - sudo rm -rf "$WORK_DIR/wsa/$ARCH/arm64/" || abort -else - sudo rm -rf "$WORK_DIR/wsa/$ARCH/amd64/" || abort -fi -mkdir "$WORK_DIR/wsa/$ARCH/uwp" -cp "$VCLibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH/uwp/" || abort -cp "$UWPVCLibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH/uwp/" || abort +echo "Removing signature and add scripts" +rm -rf "${WORK_DIR:?}"/wsa/"$ARCH"/\[Content_Types\].xml "$WORK_DIR/wsa/$ARCH/AppxBlockMap.xml" "$WORK_DIR/wsa/$ARCH/AppxSignature.p7x" "$WORK_DIR/wsa/$ARCH/AppxMetadata" || abort +cp "$vclibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH" || abort +cp "$UWPVCLibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH" || abort cp "../xml/priconfig.xml" "$WORK_DIR/wsa/$ARCH/xml/" || abort -if [[ "$ROOT_SOL" == "none" ]]; then - rootInfo="" - if [ "$GAPPS_BRAND" = "none" ]; then - gappsInfo="-NoGApps" - else - gappsInfo=-MindTheGapps-13.0 - fi - buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} - if [ "$REMOVE_AMAZON" = "yes" ]; then - buildName+="-RemovedAmazon" - fi - sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 -elif [ "$ROOT_SOL" == "magisk" ]; then - rootInfo="-with-magisk-$MAGISK_VERSION_NAME($MAGISK_VERSION_CODE)-$MAGISK_VER" - if [ "$GAPPS_BRAND" = "none" ]; then - gappsInfo="-NoGApps" - else - gappsInfo=-MindTheGapps-13.0 - fi - buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} - if [ "$REMOVE_AMAZON" = "yes" ]; then - buildName+="-RemovedAmazon" - fi - sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 -elif [ "$ROOT_SOL" == "kernelsu" ]; then - rootInfo="-with-kernelsu-$KERNELSU_VER" - if [ "$GAPPS_BRAND" = "none" ]; then - gappsInfo="-NoGApps" - else - gappsInfo=-MindTheGapps-13.0 - fi - buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} - if [ "$REMOVE_AMAZON" = "yes" ]; then - buildName+="-RemovedAmazon" - fi - sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 -fi -if [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - sudo sed -i -e 's@Start-Process\ "wsa://com.topjohnwu.magisk"@@g' ../installer/Install.ps1 - sudo sed -i -e 's@Start-Process\ "wsa://com.android.vending"@@g' ../installer/Install.ps1 - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/No%20Gapps%20and%20Removed%20AMZ/No%20Gapps%20and%20Removed%20Amazon.md" - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/MindTheGapps%20and%20Removed%20AMZ/MindTheGapps%20and%20Removed%20Amazon.md" - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/No%20Gapps%20and%20AMZ/No%20Gapps%20and%20Amazon%20Appstore.md" - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/MindTheGapps%20and%20AMZ/MindTheGapps%20and%20Amazon%20Appstore.md" - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/No%20Gapps%20and%20Removed%20AMZ/No%20Gapps%20and%20Removed%20AMZ.md@g' ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/No%20Gapps%20and%20AMZ/No%20Gapps%20and%20AMZ.md@g' ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/MindTheGapps%20and%20Removed%20AMZ/MindTheGapps%20and%20Removed%20AMZ.md@g' ../installer/Install.ps1 -elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/MindTheGapps%20and%20AMZ/MindTheGapps%20and%20AMZ.md@g' ../installer/Install.ps1 -else - if [[ "$ROOT_SOL" == "none" ]]; then - sed -i -e 's@Start-Process "wsa://com.topjohnwu.magisk"@@g' ../installer/Install.ps1 - elif [[ "$MAGISK_VER" = "delta" ]]; then - sed -i -e 's@com.topjohnwu.magisk@io.github.huskydg.magisk@g' ../installer/Install.ps1 - elif [[ "$MAGISK_VER" = "alpha" ]]; then - sed -i -e 's@com.topjohnwu.magisk@io.github.vvb2060.magisk@g' ../installer/Install.ps1 - fi - if [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - sed -i -e 's@com.android.vending@com.amazon.venezia@g' ../installer/Install.ps1 - elif [[ "$GAPPS_BRAND" = "none" ]]; then - sed -i -e 's@Start-Process\ "wsa://com.android.vending"@@g' ../installer/Install.ps1 - fi - if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - if [ "$MAGISK_VER" = "canary" ]; then - # Open GitHub readme page for Magisk Canary and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Canary.md" - elif [ "$MAGISK_VER" = "stable" ]; then - # Open GitHub readme page for Magisk Stable and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Stable.md" - elif [ "$MAGISK_VER" = "beta" ]; then - # Open GitHub readme page for Magisk Beta and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Beta.md" - elif [ "$MAGISK_VER" = "debug" ]; then - # Open GitHub readme page for Magisk Debug and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Debug.md" - elif [ "$MAGISK_VER" = "alpha" ]; then - # Open GitHub readme page for Magisk Alpha and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Alpha.md" - elif [ "$MAGISK_VER" = "delta" ]; then - # Open GitHub readme page for Magisk Delta and NoGappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Delta.md" - fi - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 - fi - if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - if [ "$MAGISK_VER" = "canary" ]; then - # Open GitHub readme page for Magisk Canary and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Canary.md" - elif [ "$MAGISK_VER" = "stable" ]; then - # Open GitHub readme page for Magisk Stable and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Stable.md" - elif [ "$MAGISK_VER" = "beta" ]; then - # Open GitHub readme page for Magisk Beta and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Beta.md" - elif [ "$MAGISK_VER" = "debug" ]; then - # Open GitHub readme page for Magisk Debug and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Debug.md" - elif [ "$MAGISK_VER" = "alpha" ]; then - # Open GitHub readme page for Magisk Alpha and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Alpha.md" - elif [ "$MAGISK_VER" = "delta" ]; then - # Open GitHub readme page for Magisk Delta and NoGappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Delta.md" - fi - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 - fi - if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then - if [ "$MAGISK_VER" = "canary" ]; then - # Open GitHub readme page for Magisk Canary and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Canary.md" - elif [ "$MAGISK_VER" = "stable" ]; then - # Open GitHub readme page for Magisk Stable and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Stable.md" - elif [ "$MAGISK_VER" = "beta" ]; then - # Open GitHub readme page for Magisk Beta and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Beta.md" - elif [ "$MAGISK_VER" = "debug" ]; then - # Open GitHub readme page for Magisk Debug and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Debug.md" - elif [ "$MAGISK_VER" = "alpha" ]; then - # Open GitHub readme page for Magisk Alpha and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Alpha.md" - elif [ "$MAGISK_VER" = "delta" ]; then - # Open GitHub readme page for Magisk Delta and GappsNoAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Delta.md" - fi - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 - fi - if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then - if [ "$MAGISK_VER" = "canary" ]; then - # Open GitHub readme page for Magisk Canary and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Canary.md" - elif [ "$MAGISK_VER" = "stable" ]; then - # Open GitHub readme page for Magisk Stable and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Stable.md" - elif [ "$MAGISK_VER" = "beta" ]; then - # Open GitHub readme page for Magisk Beta and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Beta.md" - elif [ "$MAGISK_VER" = "debug" ]; then - # Open GitHub readme page for Magisk Debug and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Debug.md" - elif [ "$MAGISK_VER" = "alpha" ]; then - # Open GitHub readme page for Magisk Alpha and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Alpha.md" - elif [ "$MAGISK_VER" = "delta" ]; then - # Open GitHub readme page for Magisk Delta and GappsAMZ - readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Delta.md" - fi - sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 - fi -fi +cp "../installer/$ARCH/MakePri.ps1" "$WORK_DIR/wsa/$ARCH" || abort cp "../installer/$ARCH/Install.ps1" "$WORK_DIR/wsa/$ARCH" || abort -find "$WORK_DIR/wsa/$ARCH" -not -path "*/uwp*" -not -path "*/pri*" -not -path "*/xml*" -printf "%P\n" | sed -e 's@/@\\@g' -e '/^$/d' > "$WORK_DIR/wsa/$ARCH/filelist.txt" || abort +cp "../installer/Run.bat" "$WORK_DIR/wsa/$ARCH" || abort +find "$WORK_DIR/wsa/$ARCH" -maxdepth 1 -mindepth 1 -printf "%P\n" >"$WORK_DIR/wsa/$ARCH/filelist.txt" || abort find "$WORK_DIR/wsa/$ARCH/pri" -printf "%P\n" | sed -e 's/^/pri\\/' -e '/^$/d' > "$WORK_DIR/wsa/$ARCH/filelist-pri.txt" || abort find "$WORK_DIR/wsa/$ARCH/xml" -printf "%P\n" | sed -e 's/^/xml\\/' -e '/^$/d' >> "$WORK_DIR/wsa/$ARCH/filelist-pri.txt" || abort -cp "../installer/$ARCH/MakePri.ps1" "$WORK_DIR/wsa/$ARCH" || abort -cp ../installer/Run.bat "$WORK_DIR/wsa/$ARCH" || abort -echo -e "Remove signature and Add scripts done\n" +echo -e "done\n" -echo "Generate info" if [[ "$ROOT_SOL" = "none" ]]; then name1="" elif [ "$ROOT_SOL" = "magisk" ]; then - name1="-with-Magisk-$MAGISK_VERSION_NAME-$MAGISK_VER" + name1="-with-magisk-$MAGISK_VERSION_NAME($MAGISK_VERSION_CODE)-$MAGISK_VER" elif [ "$ROOT_SOL" = "kernelsu" ]; then - name1="-with-KernelSU-$KERNELSU_VER" + name1="-with-$ROOT_SOL-$KERNELSU_VER" fi -if [ "$GAPPS_BRAND" = "none" ]; then +if [ -z "$HAS_GAPPS" ]; then name2="-NoGApps" else - name2=-MindTheGapps-13.0 + name2=-GApps-${ANDROID_API_MAP[$ANDROID_API]} fi +#if [[ "$MODEL_NAME" != "default" ]]; then +# name3="-as-$MODEL_NAME" +#fi artifact_name=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${name1}${name2} short_artifact_name=WSA_${WSA_VER}_${ARCH} -if [ "$REMOVE_AMAZON" = "yes" ]; then - artifact_name+="-RemovedAmazon" - touch "$WORK_DIR/wsa/$ARCH/apex/.gitkeep" +#${name3} +[ "$REMOVE_AMAZON" ] && artifact_name+=-NoAmazon + +if [ ! -d "$OUTPUT_DIR" ]; then + mkdir -p "$OUTPUT_DIR" fi -echo "$artifact_name" -echo -e "\nFinishing building...." -mkdir -p "$OUTPUT_DIR" OUTPUT_PATH="${OUTPUT_DIR:?}/$short_artifact_name" -mv "$WORK_DIR/wsa/$ARCH" "$WORK_DIR/wsa/$short_artifact_name" +mv "$WORK_DIR/wsa/$ARCH" "$OUTPUT_PATH" { - echo "artifact_folder=${short_artifact_name}" + echo "artifact_folder=${short_artifact_name}" echo "artifact=${artifact_name}" echo "arch=${ARCH}" - echo "file_ext=.${COMPRESS_FORMAT}" echo "built=$(date -u +%Y%m%d%H%M%S)" + echo "file_ext=${COMPRESS_FORMAT}" } >> "$GITHUB_OUTPUT" -if [[ "$COMPRESS_FORMAT" = "7z" && -z $AFTER_COMPRESS ]]; then - echo "Compressing with 7-Zip" - OUTPUT_PATH="$OUTPUT_PATH.7z" - 7z a -mx=7 "${OUTPUT_PATH:?}" "$WORK_DIR/wsa/$short_artifact_name" || abort -else - echo "Compressing with ZIP later..." - cp -r "$WORK_DIR/wsa/$short_artifact_name" "$OUTPUT_PATH" || abort -fi -echo -e "Done\n" diff --git a/MagiskOnWSA/scripts/extractMagisk.py b/MagiskOnWSA/scripts/extractMagisk.py index 15ded6a..b5a80df 100644 --- a/MagiskOnWSA/scripts/extractMagisk.py +++ b/MagiskOnWSA/scripts/extractMagisk.py @@ -15,7 +15,7 @@ # You should have received a copy of the GNU Affero General Public License # along with MagiskOnWSALocal. If not, see . # -# Copyright (C) 2023 LSPosed Contributors +# Copyright (C) 2024 LSPosed Contributors # import sys @@ -47,9 +47,8 @@ is_x86_64 = platform.machine() in ("AMD64", "x86_64") host_abi = "x64" if is_x86_64 else "arm64" arch = sys.argv[1] magisk_zip = sys.argv[2] -workdir = Path(sys.argv[3]) / "magisk" -if not Path(workdir).is_dir(): - workdir.mkdir() +workdir = Path(sys.argv[3]) +workdir.mkdir(parents=True, exist_ok=True) abi_map = {"x64": ["x86_64", "x86"], "arm64": ["arm64-v8a", "armeabi-v7a"]} @@ -65,40 +64,14 @@ with zipfile.ZipFile(magisk_zip) as zip: versionName = props.get("version") versionCode = props.get("versionCode") print(f"Magisk version: {versionName} ({versionCode})", flush=True) - with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: - env = Prop(environ_file.read()) - env.MAGISK_VERSION_NAME = versionName - env.MAGISK_VERSION_CODE = versionCode - with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: - environ_file.write(str(env)) - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libmagisk64.so", "magisk64", "magisk") - extract_as( - zip, f"lib/{ abi_map[arch][1] }/libmagisk32.so", "magisk32", "magisk") - standalone_policy = False - try: - zip.getinfo(f"lib/{ abi_map[arch][0] }/libmagiskpolicy.so") - standalone_policy = True - except: - pass - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskinit", "magisk") - if standalone_policy: - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libmagiskpolicy.so", "magiskpolicy", "magisk") - else: - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskpolicy", "magisk") - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libmagiskboot.so", "magiskboot", "magisk") - extract_as( - zip, f"lib/{ abi_map[arch][0] }/libbusybox.so", "busybox", "magisk") - if standalone_policy: - extract_as( - zip, f"lib/{ abi_map[host_abi][0] }/libmagiskpolicy.so", "magiskpolicy", ".") - else: - extract_as( - zip, f"lib/{ abi_map[host_abi][0] }/libmagiskinit.so", "magiskpolicy", ".") - extract_as(zip, f"assets/boot_patch.sh", "boot_patch.sh", "magisk") - extract_as(zip, f"assets/util_functions.sh", - "util_functions.sh", "magisk") + if 'WSA_WORK_ENV' in os.environ and Path(os.environ['WSA_WORK_ENV']).is_file(): + with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: + env = Prop(environ_file.read()) + env.MAGISK_VERSION_NAME = versionName + env.MAGISK_VERSION_CODE = versionCode + with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: + environ_file.write(str(env)) + extract_as(zip, f"lib/{ abi_map[arch][0] }/libmagisk64.so", "magisk64", "magisk") + extract_as(zip, f"lib/{ abi_map[arch][1] }/libmagisk32.so", "magisk32", "magisk") + extract_as(zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskinit", "magisk") + extract_as(zip, f"lib/{ abi_map[host_abi][0] }/libmagiskboot.so", "magiskboot", "magisk") diff --git a/MagiskOnWSA/scripts/extractWSA.py b/MagiskOnWSA/scripts/extractWSA.py index 78c1b95..446ca18 100644 --- a/MagiskOnWSA/scripts/extractWSA.py +++ b/MagiskOnWSA/scripts/extractWSA.py @@ -74,11 +74,16 @@ workdir_rw = os.access(workdir, os.W_OK) with zipfile.ZipFile(wsa_zip_path) as zip: for f in zip.filelist: - if arch in f.filename.lower(): + filename_lower = f.filename.lower() + if arch in filename_lower: zip_name = f.filename if not Path(workdir / zip_name).is_file(): print(f"unzipping {zip_name} to {workdir}", flush=True) zip_path = zip.extract(f, workdir) + with zipfile.ZipFile(zip_path) as wsa_zip: + stat = Path(zip_path).stat() + print(f"unzipping from {zip_path}", flush=True) + wsa_zip.extractall(archdir) ver_no = zip_name.split("_") long_ver = ver_no[1] rel = ver_no[3].split(".") @@ -89,7 +94,6 @@ with zipfile.ZipFile(wsa_zip_path) as zip: env.WSA_REL = rel_long with open(env_file, 'w') as environ_file: environ_file.write(str(env)) - filename_lower = f.filename.lower() if 'language' in filename_lower or 'scale' in filename_lower: name = f.filename.split("_")[2].split(".")[0] zip.extract(f, workdir) @@ -103,7 +107,3 @@ with zipfile.ZipFile(wsa_zip_path) as zip: l.extract(g, xmldir) elif re.search(u'Images/.+.png', g.filename): l.extract(g, archdir) -with zipfile.ZipFile(zip_path) as zip: - stat = Path(zip_path).stat() - print(f"unzipping from {zip_path}", flush=True) - zip.extractall(archdir) diff --git a/MagiskOnWSA/scripts/fixGappsProp.py b/MagiskOnWSA/scripts/fixGappsProp.py index 59128ad..afc35b5 100644 --- a/MagiskOnWSA/scripts/fixGappsProp.py +++ b/MagiskOnWSA/scripts/fixGappsProp.py @@ -71,7 +71,7 @@ def fix_prop(sec, prop): with open(prop, 'r') as f: p = Prop(f) - p += "# extra props added by MagiskOnWSA" + p += "# extra props added by MagiskOnWSA and YT-Advanced/WSA-Script" for k, v in new_props.items(): p[f"ro.{k[0]}.{k[1]}"] = v diff --git a/MagiskOnWSA/scripts/generateGappsLink.py b/MagiskOnWSA/scripts/generateGappsLink.py index 65ab7eb..3d791bb 100644 --- a/MagiskOnWSA/scripts/generateGappsLink.py +++ b/MagiskOnWSA/scripts/generateGappsLink.py @@ -15,7 +15,7 @@ # You should have received a copy of the GNU Affero General Public License # along with MagiskOnWSALocal. If not, see . # -# Copyright (C) 2023 LSPosed Contributors +# Copyright (C) 2024 LSPosed Contributors # from datetime import datetime @@ -26,34 +26,54 @@ import json import re from pathlib import Path + +class BearerAuth(requests.auth.AuthBase): + def __init__(self, token): + self.token = token + + def __call__(self, r): + r.headers["authorization"] = "Bearer " + self.token + return r + + +github_auth = None +if Path.cwd().joinpath('token').exists(): + with open(Path.cwd().joinpath('token'), 'r') as token_file: + github_auth = BearerAuth(token_file.read()) + print("Using token file for authentication", flush=True) arch = sys.argv[1] -arg4 = sys.argv[2] -download_dir = Path.cwd().parent / "download" if arg4 == "" else Path(arg4) +arg2 = sys.argv[2] +download_dir = Path.cwd().parent / "download" if arg2 == "" else Path(arg2) tempScript = sys.argv[3] -file_name = sys.argv[4] -print(f"Generating MindTheGapps download link: arch={arch}", flush=True) +android_api = sys.argv[4] +file_name = sys.argv[5] +print(f"Generating GApps download link: arch={arch}", flush=True) abi_map = {"x64": "x86_64", "arm64": "arm64"} -res = requests.get(f"https://api.github.com/repos/MustardChef/MindTheGappsArchived/releases/latest") +android_api_map = {"33": "13.0", "34": "14.0"} +release = android_api_map[android_api] +res = requests.get(f"https://api.github.com/repos/LSPosed/WSA-Addon/releases/latest", auth=github_auth) json_data = json.loads(res.content) headers = res.headers x_ratelimit_remaining = headers["x-ratelimit-remaining"] if res.status_code == 200: + download_files = {} assets = json_data["assets"] for asset in assets: - if re.match(f'.*13\\.0\\.0.{abi_map[arch]}.*.zip$', asset["name"]): - link = asset["browser_download_url"] - break + if re.match(f'gapps.*{release}.*\.rc$', asset["name"]): + download_files[asset["name"]] = asset["browser_download_url"] + elif re.match(f'gapps.*{release}.*{abi_map[arch]}.*\.img$', asset["name"]): + download_files[asset["name"]] = asset["browser_download_url"] + with open(download_dir/tempScript, 'a') as f: + for key, value in download_files.items(): + print(f"download link: {value}\npath: {download_dir / key}\n", flush=True) + f.writelines(value + '\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out={key}\n') elif res.status_code == 403 and x_ratelimit_remaining == '0': message = json_data["message"] print(f"Github API Error: {message}", flush=True) ratelimit_reset = headers["x-ratelimit-reset"] ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) - print(f"The current rate limit window resets in {ratelimit_reset}", flush=True) + print( + f"The current rate limit window resets in {ratelimit_reset}", flush=True) exit(1) - -print(f"download link: {link}", flush=True) - -with open(download_dir/tempScript, 'a') as f: - f.writelines(f'{link}\n') - f.writelines(f' dir={download_dir}\n') - f.writelines(f' out={file_name}\n') diff --git a/MagiskOnWSA/scripts/generateKernelSULink.py b/MagiskOnWSA/scripts/generateKernelSULink.py index 9bcc127..2777642 100644 --- a/MagiskOnWSA/scripts/generateKernelSULink.py +++ b/MagiskOnWSA/scripts/generateKernelSULink.py @@ -15,7 +15,7 @@ # You should have received a copy of the GNU Affero General Public License # along with MagiskOnWSALocal. If not, see . # -# Copyright (C) 2023 LSPosed Contributors +# Copyright (C) 2024 LSPosed Contributors # from datetime import datetime @@ -27,6 +27,7 @@ import requests import json import re from pathlib import Path +from packaging import version class Prop(OrderedDict): @@ -53,28 +54,36 @@ tempScript = sys.argv[3] kernelVersion = sys.argv[4] file_name = sys.argv[5] abi_map = {"x64": "x86_64", "arm64": "arm64"} -print(f"Generating KernelSU download link: arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) -res = requests.get(f"https://api.github.com/repos/tiann/KernelSU/releases/latest") +print( + f"Generating KernelSU download link: arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) +res = requests.get( + f"https://api.github.com/repos/tiann/KernelSU/releases/latest") json_data = json.loads(res.content) headers = res.headers x_ratelimit_remaining = headers["x-ratelimit-remaining"] +kernel_ver = 0 if res.status_code == 200: link = "" - apk = "" assets = json_data["assets"] - release_name = json_data["tag_name"] for asset in assets: - if re.match(f'kernel-WSA-{abi_map[arch]}-{kernelVersion}.*.zip$', asset["name"]) and asset["content_type"] == "application/zip": + asset_name = asset["name"] + if re.match(f'kernel-WSA-{abi_map[arch]}-{kernelVersion}.*\.zip$', asset_name) and asset["content_type"] == "application/zip": + tmp_kernel_ver = re.search( + u'\d{1}.\d{1,}.\d{1,}.\d{1,}', asset_name.split("-")[3]).group() + if (kernel_ver == 0): + kernel_ver = tmp_kernel_ver + elif version.parse(kernel_ver) < version.parse(tmp_kernel_ver): + kernel_ver = tmp_kernel_ver + print(f"Kernel version: {kernel_ver}", flush=True) + for asset in assets: + if re.match(f'kernel-WSA-{abi_map[arch]}-{kernel_ver}.*\.zip$', asset["name"]) and asset["content_type"] == "application/zip": link = asset["browser_download_url"] - if re.match(f'KernelSU_{release_name}_.*-release.*.apk$', asset["name"]) and asset["content_type"] == "application/vnd.android.package-archive": - apk = asset["browser_download_url"] break if link == "": - print(f"Error: No KernelSU release found for arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) - exit(1) - elif apk == "": - print(f"Error: No KernelSU Manager release found", flush=True) + print( + f"Error: No KernelSU release found for arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) exit(1) + release_name = json_data["name"] with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: env = Prop(environ_file.read()) env.KERNELSU_VER = release_name @@ -85,7 +94,8 @@ elif res.status_code == 403 and x_ratelimit_remaining == '0': print(f"Github API Error: {message}", flush=True) ratelimit_reset = headers["x-ratelimit-reset"] ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) - print(f"The current rate limit window resets in {ratelimit_reset}", flush=True) + print( + f"The current rate limit window resets in {ratelimit_reset}", flush=True) exit(1) print(f"download link: {link}", flush=True) @@ -94,6 +104,6 @@ with open(download_dir/tempScript, 'a') as f: f.writelines(f'{link}\n') f.writelines(f' dir={download_dir}\n') f.writelines(f' out={file_name}\n') - f.writelines(f'{apk}\n') - f.writelines(f' dir={download_dir}\n') - f.writelines(f' out=KernelSU.apk\n') +# f.writelines(f'{apk}\n') +# f.writelines(f' dir={download_dir}\n') +# f.writelines(f' out=KernelSU.apk\n') diff --git a/MagiskOnWSA/scripts/generateMagiskLink.py b/MagiskOnWSA/scripts/generateMagiskLink.py index df57c66..046788a 100644 --- a/MagiskOnWSA/scripts/generateMagiskLink.py +++ b/MagiskOnWSA/scripts/generateMagiskLink.py @@ -18,6 +18,8 @@ # Copyright (C) 2023 LSPosed Contributors # +from datetime import datetime +import re import sys import json @@ -29,37 +31,73 @@ headers = { 'User-Agent': 'Mozilla/5.0 (Linux; Android 13; Pixel 5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.163 Mobile Safari/537.36', } -magisk_ver = sys.argv[1] -download_dir = Path.cwd().parent / "download" if sys.argv[2] == "" else Path(sys.argv[2]) -tempScript = sys.argv[3] -print(f"Generating Magisk download link: release type={magisk_ver}", flush=True) +class BearerAuth(requests.auth.AuthBase): + def __init__(self, token): + self.token = token + + def __call__(self, r): + r.headers["authorization"] = "Bearer " + self.token + return r + + +github_auth = None +if Path.cwd().joinpath('token').exists(): + with open(Path.cwd().joinpath('token'), 'r') as token_file: + github_auth = BearerAuth(token_file.read()) + print("Using token file for authentication", flush=True) + +magisk_branch = sys.argv[1] +magisk_ver = sys.argv[2] +download_dir = Path.cwd().parent / \ + "download" if sys.argv[3] == "" else Path(sys.argv[3]) +tempScript = sys.argv[4] +download_files = {} +print( + f"Generating Magisk download link: release type={magisk_ver}", flush=True) if not magisk_ver: magisk_ver = "stable" -if magisk_ver == "stable" or magisk_ver == "beta" or magisk_ver == "canary" or magisk_ver == "debug": - try: - magisk_link = json.loads(requests.get( - f"https://github.com/topjohnwu/magisk-files/raw/master/{magisk_ver}.json", headers=headers).content)['magisk']['link'] - except Exception: - print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") - magisk_link = json.loads(requests.get( - f"https://fastly.jsdelivr.net/gh/topjohnwu/magisk-files@master/{magisk_ver}.json", headers=headers).content)['magisk']['link'] -elif magisk_ver == "delta": - try: - magisk_link = json.loads(requests.get( - f"https://raw.githubusercontent.com/HuskyDG/magisk-files/main/canary.json", headers=headers).content)['magisk']['link'] - except Exception: - print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") - magisk_link = json.loads(requests.get( - f"https://fastly.jsdelivr.net/gh/HuskyDG/magisk-files@main/canary.json", headers=headers).content)['magisk']['link'] -elif magisk_ver == "alpha": + +if magisk_branch == "vvb2060": try: magisk_link = json.loads(requests.get( f"https://install.appcenter.ms/api/v0.1/apps/vvb2060/magisk/distribution_groups/public/releases/latest?is_install_page=true", headers=headers).content)['download_url'] + download_files[f"magisk-{magisk_ver}.zip"] = magisk_link except Exception: print("Failed to fetch from AppCenter API...") -print(f"download link: {magisk_link}", flush=True) +else: + try: + magisk_link = json.loads(requests.get( + f"https://github.com/{magisk_branch}/magisk-files/raw/master/{magisk_ver}.json").content)['magisk']['link'] + download_files[f"magisk-{magisk_ver}.zip"] = magisk_link + except Exception: + print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") + magisk_link = json.loads(requests.get( + f"https://fastly.jsdelivr.net/gh/topjohnwu/magisk-files@master/{magisk_ver}.json").content)['magisk']['link'] + download_files[f"magisk-{magisk_ver}.zip"] = magisk_link +res = requests.get( + f"https://api.github.com/repos/LSPosed/WSA-Addon/releases/latest", auth=github_auth) +json_data = json.loads(res.content) +headers = res.headers +x_ratelimit_remaining = headers["x-ratelimit-remaining"] +if res.status_code == 200: + assets = json_data["assets"] + for asset in assets: + if re.match(f'cust.img$', asset["name"]): + download_files[asset["name"]] = asset["browser_download_url"] + break +elif res.status_code == 403 and x_ratelimit_remaining == '0': + message = json_data["message"] + print(f"Github API Error: {message}", flush=True) + ratelimit_reset = headers["x-ratelimit-reset"] + ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) + print( + f"The current rate limit window resets in {ratelimit_reset}", flush=True) + exit(1) with open(download_dir/tempScript, 'a') as f: - f.writelines(f'{magisk_link}\n') - f.writelines(f' dir={download_dir}\n') - f.writelines(f' out=magisk-{magisk_ver}.zip\n') + for key, value in download_files.items(): + print( + f"download link: {value}\npath: {download_dir / key}\n", flush=True) + f.writelines(value + '\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out={key}\n') diff --git a/MagiskOnWSA/scripts/generateWSALinks.py b/MagiskOnWSA/scripts/generateWSALinks.py index fbc8202..c7ab95f 100644 --- a/MagiskOnWSA/scripts/generateWSALinks.py +++ b/MagiskOnWSA/scripts/generateWSALinks.py @@ -15,12 +15,11 @@ # You should have received a copy of the GNU Affero General Public License # along with MagiskOnWSALocal. If not, see . # -# Copyright (C) 2023 LSPosed Contributors +# Copyright (C) 2024 LSPosed Contributors # import html import logging -import os import re import sys @@ -54,7 +53,7 @@ logging.captureWarnings(True) arch = sys.argv[1] release_name_map = {"retail": "Retail", "RP": "Release Preview", - "WIS": "Insider Slow", "WIF": "Insider Fast"} + "WIS": "Insider Slow", "WIF": "Insider Fast", "latest": "Insider Private"} release_type = sys.argv[2] if sys.argv[2] != "" else "Retail" release_name = release_name_map[release_type] download_dir = Path.cwd().parent / \ @@ -69,7 +68,8 @@ if ms_account_conf.is_file(): with open(ms_account_conf, "r") as f: conf = Prop(f.read()) user = conf.get('user_code') -print(f"Generating WSA download link: arch={arch} release_type={release_name}\n", flush=True) +print( + f"Generating WSA download link: arch={arch} release_type={release_name}\n", flush=True) with open(Path.cwd().parent / ("xml/GetCookie.xml"), "r") as f: cookie_content = f.read().format(user) @@ -143,50 +143,43 @@ def send_req(i, v, out_file_name): threads = [] wsa_build_ver = 0 -latest_wsa_filename = "" for filename, values in identities.items(): - if re.match(f"Microsoft.UI.Xaml..*_{arch}_.*.appx", filename): - out_file_name = f"{values[1]}_{arch}.appx" - out_file = download_dir / out_file_name - elif re.match(f"Microsoft.VCLibs..+.UWPDesktop_.*_{arch}_.*.appx", filename): - out_file_name = f"{values[1]}_{arch}.appx" - out_file = download_dir / out_file_name - elif re.match(f"Microsoft.VCLibs..+_.*_{arch}_.*.appx", filename): - out_file_name = f"{values[1]}_{arch}.appx" - out_file = download_dir / out_file_name - elif re.match(f"MicrosoftCorporationII.WindowsSubsystemForAndroid_.*.msixbundle", filename): - tmp_wsa_filename = filename - tmp_wsa_build_ver = re.search(r"\d{4}.\d{5}.\d{1,}.\d{1,}", filename).group() - if(wsa_build_ver == 0): - latest_wsa_filename = tmp_wsa_filename + if re.match(f"MicrosoftCorporationII\.WindowsSubsystemForAndroid_.*\.msixbundle", filename): + tmp_wsa_build_ver = re.search( + u'\d{4}.\d{5}.\d{1,}.\d{1,}', filename).group() + if (wsa_build_ver == 0): wsa_build_ver = tmp_wsa_build_ver - else: - if version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): - latest_wsa_filename = tmp_wsa_filename - wsa_build_ver = tmp_wsa_build_ver - else: - continue - version_splited = wsa_build_ver.split(".") - major_ver = version_splited[0] - with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: - env = Prop(environ_file.read()) - env.WSA_VER = wsa_build_ver - env.WSA_MAJOR_VER = major_ver - with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: - environ_file.write(str(env)) + elif version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): + wsa_build_ver = tmp_wsa_build_ver +for filename, values in identities.items(): + if re.match(f"Microsoft\.UI\.Xaml\..*_{arch}_.*\.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif re.match(f"Microsoft\.VCLibs\..+\.UWPDesktop_.*_{arch}_.*\.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif re.match(f"Microsoft\.VCLibs\..+_.*_{arch}_.*\.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif not release_name == 'latest' and re.match(f"MicrosoftCorporationII\.WindowsSubsystemForAndroid_.*\.msixbundle", filename): + tmp_wsa_build_ver = re.search( + u'\d{4}.\d{5}.\d{1,}.\d{1,}', filename).group() + if (wsa_build_ver != tmp_wsa_build_ver): + continue + version_splitted = wsa_build_ver.split(".") + major_ver = version_splitted[0] + minor_ver = version_splitted[1] + build_ver = version_splitted[2] + revision_ver = version_splitted[3] out_file_name = f"wsa-{release_type}.zip" out_file = download_dir / out_file_name - continue else: continue - th = Thread(target=send_req, args=(values[0][0], values[0][1], out_file_name)) + th = Thread(target=send_req, args=( + values[0][0], values[0][1], out_file_name)) threads.append(th) th.daemon = True th.start() -th = Thread(target=send_req, args=(identities[latest_wsa_filename][0][0], identities[latest_wsa_filename][0][1], f"wsa-{release_type}.zip")) -threads.append(th) -th.daemon = True -th.start() for th in threads: th.join() print(f'WSA Build Version={wsa_build_ver}\n', flush=True) diff --git a/MagiskOnWSA/scripts/init.lsp.magisk.rc b/MagiskOnWSA/scripts/init.lsp.magisk.rc new file mode 100644 index 0000000..444331e --- /dev/null +++ b/MagiskOnWSA/scripts/init.lsp.magisk.rc @@ -0,0 +1,2 @@ +on post-fs-data + exec u:r:magisk:s0 0 0 -- /system/bin/sh ${MAGISKTMP}/post-fs-data.sh diff --git a/MagiskOnWSA/scripts/post-fs-data.sh b/MagiskOnWSA/scripts/post-fs-data.sh new file mode 100644 index 0000000..6607569 --- /dev/null +++ b/MagiskOnWSA/scripts/post-fs-data.sh @@ -0,0 +1,44 @@ +#!/bin/sh +MAGISKTMP=/sbin +[ -d /sbin ] || MAGISKTMP=/debug_ramdisk +MAGISKBIN=/data/adb/magisk +if [ ! -d /data/adb ]; then + mkdir -m 700 /data/adb + chcon u:object_r:adb_data_file:s0 /data/adb +fi +if [ ! -d $MAGISKBIN ]; then + # shellcheck disable=SC2174 + mkdir -p -m 755 $MAGISKBIN + chcon u:object_r:system_file:s0 $MAGISKBIN +fi +ABI=$(getprop ro.product.cpu.abi) +for file in busybox magiskpolicy magiskboot magiskinit; do + [ -x "$MAGISKBIN/$file" ] || { + unzip -d $MAGISKBIN -oj $MAGISKTMP/stub.apk "lib/$ABI/lib$file.so" + mv $MAGISKBIN/lib$file.so $MAGISKBIN/$file + chmod 755 "$MAGISKBIN/$file" + } +done +for file in util_functions.sh boot_patch.sh; do + [ -x "$MAGISKBIN/$file" ] || { + unzip -d $MAGISKBIN -oj $MAGISKTMP/stub.apk "assets/$file" + chmod 755 "$MAGISKBIN/$file" + } +done +for file in "$MAGISKTMP"/*; do + if echo "$file" | grep -Eq "lsp_.+\.img"; then + foldername=$(basename "$file" .img) + mkdir -p "$MAGISKTMP/$foldername" + mount -t auto -o ro,loop "$file" "$MAGISKTMP/$foldername" + "$MAGISKTMP/$foldername/post-fs-data.sh" & + fi +done +wait +for file in "$MAGISKTMP"/*; do + if echo "$file" | grep -Eq "lsp_.+\.img"; then + foldername=$(basename "$file" .img) + umount "$MAGISKTMP/$foldername" + rm -rf "${MAGISKTMP:?}/${foldername:?}" + rm -f "$file" + fi +done diff --git a/MagiskOnWSA/scripts/sepolicy.rule b/MagiskOnWSA/scripts/sepolicy.rule new file mode 100644 index 0000000..265b4de --- /dev/null +++ b/MagiskOnWSA/scripts/sepolicy.rule @@ -0,0 +1,5 @@ +allow gmscore_app gmscore_app vsock_socket { create connect write read } +allow gmscore_app device_config_runtime_native_boot_prop file read +allow gmscore_app system_server_tmpfs dir search +allow gmscore_app system_server_tmpfs file open +allow gmscore_app { system_server_tmpfs media_rw_data_file } filesystem getattr diff --git a/MagiskOnWSAOld/.gitattributes b/MagiskOnWSAOld/.gitattributes new file mode 100644 index 0000000..19ca178 --- /dev/null +++ b/MagiskOnWSAOld/.gitattributes @@ -0,0 +1,10 @@ +* text eol=lf merge=theirs + +*.bat text eol=crlf +*.ps1 text eol=crlf + +*.exe binary +*.dll binary +*.erofs binary +linker64 binary +*.so binary diff --git a/MagiskOnWSAOld/DLL/README.md b/MagiskOnWSAOld/DLL/README.md new file mode 100644 index 0000000..73f8782 --- /dev/null +++ b/MagiskOnWSAOld/DLL/README.md @@ -0,0 +1,3 @@ +# WSAPatch + + diff --git a/MagiskOnWSAOld/DLL/WsaPatch.dll b/MagiskOnWSAOld/DLL/WsaPatch.dll new file mode 100644 index 0000000..6e0e3a5 Binary files /dev/null and b/MagiskOnWSAOld/DLL/WsaPatch.dll differ diff --git a/MagiskOnWSAOld/DLL/icu.dll b/MagiskOnWSAOld/DLL/icu.dll new file mode 100644 index 0000000..42a05f1 Binary files /dev/null and b/MagiskOnWSAOld/DLL/icu.dll differ diff --git a/MagiskOnWSAOld/LICENSE b/MagiskOnWSAOld/LICENSE new file mode 100644 index 0000000..0ad25db --- /dev/null +++ b/MagiskOnWSAOld/LICENSE @@ -0,0 +1,661 @@ + GNU AFFERO GENERAL PUBLIC LICENSE + Version 3, 19 November 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The GNU Affero General Public License is a free, copyleft license for +software and other kinds of works, specifically designed to ensure +cooperation with the community in the case of network server software. + + The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +our General Public Licenses are intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + + Developers that use our General Public Licenses protect your rights +with two steps: (1) assert copyright on the software, and (2) offer +you this License which gives you legal permission to copy, distribute +and/or modify the software. + + A secondary benefit of defending all users' freedom is that +improvements made in alternate versions of the program, if they +receive widespread use, become available for other developers to +incorporate. Many developers of free software are heartened and +encouraged by the resulting cooperation. However, in the case of +software used on network servers, this result may fail to come about. +The GNU General Public License permits making a modified version and +letting the public access it on a server without ever releasing its +source code to the public. + + The GNU Affero General Public License is designed specifically to +ensure that, in such cases, the modified source code becomes available +to the community. It requires the operator of a network server to +provide the source code of the modified version running there to the +users of that server. Therefore, public use of a modified version, on +a publicly accessible server, gives the public access to the source +code of the modified version. + + An older license, called the Affero General Public License and +published by Affero, was designed to accomplish similar goals. This is +a different license, not a version of the Affero GPL, but Affero has +released a new version of the Affero GPL which permits relicensing under +this license. + + The precise terms and conditions for copying, distribution and +modification follow. + + TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU Affero General Public License. + + "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + + "The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + + To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy. The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + + A "covered work" means either the unmodified Program or a work based +on the Program. + + To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + + To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + + An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + + 1. Source Code. + + The "source code" for a work means the preferred form of the work +for making modifications to it. "Object code" means any non-source +form of a work. + + A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + + The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + + The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + + The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + + The Corresponding Source for a work in source code form is that +same work. + + 2. Basic Permissions. + + All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + + You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force. You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright. Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + + Conveying under any other circumstances is permitted solely under +the conditions stated below. Sublicensing is not allowed; section 10 +makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + + No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + + When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + + 4. Conveying Verbatim Copies. + + You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + + You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + + You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + + a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. + + b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + "keep intact all notices". + + c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. + + d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + + A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + + 6. Conveying Non-Source Forms. + + You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + + a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. + + b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge. + + c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. + + d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. + + e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d. + + A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + + A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling. In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage. For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product. A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + + "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source. The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + + If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + + The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed. Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + + Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + + 7. Additional Terms. + + "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + + When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + + Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + + a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or + + b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or + + c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or + + d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or + + e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or + + f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors. + + All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + + If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + + Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + + 8. Termination. + + You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + + However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + + Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + + Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + + 9. Acceptance Not Required for Having Copies. + + You are not required to accept this License in order to receive or +run a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + + Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + + An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + + You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + + 11. Patents. + + A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + + A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + + Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + + In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + + If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + + If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + + A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License. You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + + Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + + If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all. For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + + 13. Remote Network Interaction; Use with the GNU General Public License. + + Notwithstanding any other provision of this License, if you modify the +Program, your modified version must prominently offer all users +interacting with it remotely through a computer network (if your version +supports such interaction) an opportunity to receive the Corresponding +Source of your version by providing access to the Corresponding Source +from a network server at no charge, through some standard or customary +means of facilitating copying of software. This Corresponding Source +shall include the Corresponding Source for any work covered by version 3 +of the GNU General Public License that is incorporated pursuant to the +following paragraph. + + Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the work with which it is combined will remain governed by version +3 of the GNU General Public License. + + 14. Revised Versions of this License. + + The Free Software Foundation may publish revised and/or new versions of +the GNU Affero General Public License from time to time. Such new versions +will be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + + Each version is given a distinguishing version number. If the +Program specifies that a certain numbered version of the GNU Affero General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU Affero General Public License, you may choose any version ever published +by the Free Software Foundation. + + If the Program specifies that a proxy can decide which future +versions of the GNU Affero General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + + Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + + 15. Disclaimer of Warranty. + + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. Limitation of Liability. + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + + If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +state the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + + Copyright (C) + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU Affero General Public License as published + by the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Affero General Public License for more details. + + You should have received a copy of the GNU Affero General Public License + along with this program. If not, see . + +Also add information on how to contact you by electronic and paper mail. + + If your software can interact with users remotely through a computer +network, you should also make sure that it provides a way for users to +get its source. For example, if your program is a web application, its +interface could display a "Source" link that leads users to an archive +of the code. There are many ways you could offer source, and different +solutions will be better for different programs; see section 13 for the +specific requirements. + + You should also get your employer (if you work as a programmer) or school, +if any, to sign a "copyright disclaimer" for the program, if necessary. +For more information on this, and how to apply and follow the GNU AGPL, see +. diff --git a/MagiskOnWSAOld/Update Check/KernelSUUpdateCheck.py b/MagiskOnWSAOld/Update Check/KernelSUUpdateCheck.py new file mode 100644 index 0000000..80954f0 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/KernelSUUpdateCheck.py @@ -0,0 +1,34 @@ +import os +import json +import requests +import logging +import subprocess +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') +new_version_found = False +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/kernelsu.appversion").text.replace('\n', '') +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) +with open('kernelsu.appversion', 'w') as file: + file.write(currentver) +if not new_version_found: + latestver = "" + kernelsumsg = "" + latestver = json.loads(requests.get(f"https://api.github.com/repos/tiann/kernelsu/releases/latest").content)['tag_name'].replace('v', '').replace('\n', '') + kernelsumsg="Update KernelSU Version from `v" + currentver + "` to `v" + latestver + "`" + if currentver != latestver: + print("New version found: " + latestver) + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + with open('kernelsu.appversion', 'w+') as file: + file.seek(0) + file.truncate() + file.write(latestver) + with open(env_file, "a") as wr: + wr.write(f"KERNEL_SU_MSG={kernelsumsg}\n") + else: + kernelsumsg = "KernelSU Version: `" + latestver + "`" + with open(env_file, "a") as wr: + wr.write(f"KERNEL_SU_MSG={kernelsumsg}\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/MTGUpdateCheck.py b/MagiskOnWSAOld/Update Check/MTGUpdateCheck.py new file mode 100644 index 0000000..5b01065 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/MTGUpdateCheck.py @@ -0,0 +1,34 @@ +import os +import json +import requests +import logging +import subprocess +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') +new_version_found = False +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/gapps.appversion").text.replace('\n', '') +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) +with open('gapps.appversion', 'w') as file: + file.write(currentver) +if not new_version_found: + latestver = "" + mtgmsg = "" + latestver = json.loads(requests.get(f"https://api.github.com/repos/MustardChef/MindTheGappsArchived/releases/latest").content)['name'].replace('\n', '') + mtgmsg="Update MindTheGapps Version from `v" + currentver + "` to `v" + latestver + "`" + if currentver != latestver: + print("New version found: " + latestver) + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + with open('gapps.appversion', 'w+') as file: + file.seek(0) + file.truncate() + file.write(latestver) + with open(env_file, "a") as wr: + wr.write(f"MTG_MSG={mtgmsg}\n") + else: + mtgmsg = "MindTheGapps Package Version: `" + latestver + "`" + with open(env_file, "a") as wr: + wr.write(f"MTG_MSG={mtgmsg}\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/MagiskCanaryUpdateCheck.py b/MagiskOnWSAOld/Update Check/MagiskCanaryUpdateCheck.py new file mode 100644 index 0000000..56a0177 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/MagiskCanaryUpdateCheck.py @@ -0,0 +1,34 @@ +import os +import json +import requests +import logging +import subprocess +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') +new_version_found = False +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/magiskcanary.appversion").text.replace('\n', '') +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) +with open('magiskcanary.appversion', 'w') as file: + file.write(currentver) +if not new_version_found: + latestver = "" + magiskcanarymsg = "" + latestver = json.loads(requests.get(f"https://github.com/topjohnwu/magisk-files/raw/master/canary.json").content)['magisk']['version'].replace('\n', '') + magiskcanarymsg="Update Magisk Canary Version from `v" + currentver + "` to `v" + latestver + "`" + if currentver != latestver: + print("New version found: " + latestver) + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + with open('magiskcanary.appversion', 'w+') as file: + file.seek(0) + file.truncate() + file.write(latestver) + with open(env_file, "a") as wr: + wr.write(f"MAGISK_CANARY_MSG={magiskcanarymsg}\n") + else: + magiskcanarymsg = "Magisk Canary Version: `" + latestver + "`" + with open(env_file, "a") as wr: + wr.write(f"MAGISK_CANARY_MSG={magiskcanarymsg}\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/MagiskStableUpdateCheck.py b/MagiskOnWSAOld/Update Check/MagiskStableUpdateCheck.py new file mode 100644 index 0000000..1c2dd77 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/MagiskStableUpdateCheck.py @@ -0,0 +1,34 @@ +import os +import json +import requests +import logging +import subprocess +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') +new_version_found = False +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/magiskstable.appversion").text.replace('\n', '') +with open('magiskstable.appversion', 'w') as file: + file.write(currentver) +if not new_version_found: + latestver = "" + magiskstablemsg = "" + latestver = json.loads(requests.get(f"https://github.com/topjohnwu/magisk-files/raw/master/stable.json").content)['magisk']['version'].replace('\n', '') + magiskstablemsg="Update Magisk Stable Version from `v" + currentver + "` to `v" + latestver + "`" + if currentver != latestver: + print("New version found: " + latestver) + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + with open('magiskstable.appversion', 'w+') as file: + file.seek(0) + file.truncate() + file.write(latestver) + with open(env_file, "a") as wr: + wr.write(f"MAGISK_STABLE_MSG={magiskstablemsg}\n") + else: + magiskstablemsg = "Magisk Stable Version: `" + latestver + "`" + with open(env_file, "a") as wr: + wr.write(f"MAGISK_STABLE_MSG={magiskstablemsg}\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/WSAInsiderUpdateCheck.py b/MagiskOnWSAOld/Update Check/WSAInsiderUpdateCheck.py new file mode 100644 index 0000000..52b3df6 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/WSAInsiderUpdateCheck.py @@ -0,0 +1,162 @@ +import base64 +import os +import html +import json +import re +import requests +import logging +import subprocess + +from typing import Any, OrderedDict +from xml.dom import minidom + +from requests import Session +from packaging import version + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') + +#Category ID +cat_id = '858014f3-3934-4abe-8078-4aa193e74ca8' + +release_type = "WIF" + +new_version_found = False + +session = Session() +session.verify = False + +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) + +try: + response = requests.get("https://api.github.com/repos/bubbles-wow/MS-Account-Token/contents/token.cfg") + if response.status_code == 200: + content = response.json()["content"] + content = content.encode("utf-8") + content = base64.b64decode(content) + text = content.decode("utf-8") + user_code = Prop(text).get("user_code") + updatetime = Prop(text).get("update_time") + print("Successfully get user token from server!") + print(f"Last update time: {updatetime}\n") + else: + user_code = "" + print(f"Failed to get user token from server! Error code: {response.status_code}\n") +except: + user_code = "" + +users = {"", user_code} + +# The code inside the function WSAInsiderUpdateChecker starts here +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/WIF.appversion").text.replace('\n', '') + +print("Current working directory:", os.getcwd()) +print("Files in '/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal2/xml':", os.listdir('/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal2/xml')) + +# Write for pushing later +try: + # Write for pushing later + file = open('WIF.appversion', 'w') + file.write(currentver) + file.close() + print("WIF.appversion file created successfully.") +except Exception as e: + print(f"Error writing to file: {e}") + +if not new_version_found: + # Get information + with open("/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal2/xml/GetCookie.xml", "r") as f: + cookie_content = f.read().format(user_code) + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cookie_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + exit(1) + doc = minidom.parseString(out.text) + cookie = doc.getElementsByTagName('EncryptedData')[0].firstChild.nodeValue + with open("/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal2/xml/WUIDRequest.xml", "r") as f: + cat_id_content = f.read().format(user_code, cookie, cat_id, release_type) + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cat_id_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + exit(1) + doc = minidom.parseString(html.unescape(out.text)) + filenames = {} + for node in doc.getElementsByTagName('ExtendedUpdateInfo')[0].getElementsByTagName('Updates')[0].getElementsByTagName('Update'): + node_xml = node.getElementsByTagName('Xml')[0] + node_files = node_xml.getElementsByTagName('Files') + if not node_files: + continue + else: + for node_file in node_files[0].getElementsByTagName('File'): + if node_file.hasAttribute('InstallerSpecificIdentifier') and node_file.hasAttribute('FileName'): + filenames[node.getElementsByTagName('ID')[0].firstChild.nodeValue] = (f"{node_file.attributes['InstallerSpecificIdentifier'].value}_{node_file.attributes['FileName'].value}", + node_xml.getElementsByTagName('ExtendedProperties')[0].attributes['PackageIdentityName'].value) + identities = {} + for node in doc.getElementsByTagName('NewUpdates')[0].getElementsByTagName('UpdateInfo'): + node_xml = node.getElementsByTagName('Xml')[0] + if not node_xml.getElementsByTagName('SecuredFragment'): + continue + else: + id = node.getElementsByTagName('ID')[0].firstChild.nodeValue + update_identity = node_xml.getElementsByTagName('UpdateIdentity')[0] + if id in filenames: + fileinfo = filenames[id] + if fileinfo[0] not in identities: + identities[fileinfo[0]] = ([update_identity.attributes['UpdateID'].value, + update_identity.attributes['RevisionNumber'].value], fileinfo[1]) + wsa_build_ver = 0 + for filename, value in identities.items(): + if re.match(f"MicrosoftCorporationII.WindowsSubsystemForAndroid_.*.msixbundle", filename): + tmp_wsa_build_ver = re.search(r"\d{4}.\d{5}.\d{1,}.\d{1,}", filename).group() + if (wsa_build_ver == 0): + wsa_build_ver = tmp_wsa_build_ver + elif version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): + wsa_build_ver = tmp_wsa_build_ver + + if version.parse(currentver) < version.parse(wsa_build_ver): + print(f"New version found: {wsa_build_ver}") + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + try: + with open('WIF.appversion', 'w') as file: + file.write(wsa_build_ver) + file.close() + print("WIF.appversion file created successfully.") + except Exception as e: + print(f"Error writing to file: {e}") + msg = f'Update WSA Version from `v{currentver}` to `v{wsa_build_ver}`' + with open(env_file, "a") as wr: + wr.write(f"SHOULD_BUILD=yes\n") + wr.write(f"RELEASE_TYPE={release_type}\n") + wr.write(f"LATEST_WIF_VER={wsa_build_ver}\n") + wr.write(f"MSG={msg}\n") + wr.write(f"INSIDER_UPDATE=yes\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/WSARetailUpdateCheck.py b/MagiskOnWSAOld/Update Check/WSARetailUpdateCheck.py new file mode 100644 index 0000000..7dce926 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/WSARetailUpdateCheck.py @@ -0,0 +1,145 @@ +import base64 +import os +import html +import json +import re +import requests +import logging +import subprocess + +from typing import Any, OrderedDict +from xml.dom import minidom + +from requests import Session +from packaging import version + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + +logging.captureWarnings(True) +env_file = os.getenv('GITHUB_ENV') + +#Category ID +cat_id = '858014f3-3934-4abe-8078-4aa193e74ca8' + +release_type = "retail" + +new_version_found = False + +session = Session() +session.verify = False + +git = ( + "git checkout -f update || git switch --discard-changes --orphan update" +) + +user_code = "" +users = {""} + +print("Current working directory:", os.getcwd()) +print("Files in '/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal1/xml':", os.listdir('/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal1/xml')) + +currentver = requests.get(f"https://raw.githubusercontent.com/MustardChef/WSABuilds/update/retail.appversion").text.replace('\n', '') + +# Write for pushing later +try: + # Write for pushing later + file = open('retail.appversion', 'w') + file.write(currentver) + file.close() + print("retail.appversion file created successfully.") +except Exception as e: + print(f"Error writing to file: {e}") + +if not new_version_found: + # Get information + with open("/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal1/xml/GetCookie.xml", "r") as f: + cookie_content = f.read().format(user_code) + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cookie_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + exit(1) + doc = minidom.parseString(out.text) + cookie = doc.getElementsByTagName('EncryptedData')[0].firstChild.nodeValue + with open("/home/runner/work/WSABuilds/WSABuilds/MagiskOnWSALocal1/xml/WUIDRequest.xml", "r") as f: + cat_id_content = f.read().format(user_code, cookie, cat_id, release_type) + try: + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cat_id_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + except: + print("Network Error!") + exit(1) + doc = minidom.parseString(html.unescape(out.text)) + filenames = {} + for node in doc.getElementsByTagName('ExtendedUpdateInfo')[0].getElementsByTagName('Updates')[0].getElementsByTagName('Update'): + node_xml = node.getElementsByTagName('Xml')[0] + node_files = node_xml.getElementsByTagName('Files') + if not node_files: + continue + else: + for node_file in node_files[0].getElementsByTagName('File'): + if node_file.hasAttribute('InstallerSpecificIdentifier') and node_file.hasAttribute('FileName'): + filenames[node.getElementsByTagName('ID')[0].firstChild.nodeValue] = (f"{node_file.attributes['InstallerSpecificIdentifier'].value}_{node_file.attributes['FileName'].value}", + node_xml.getElementsByTagName('ExtendedProperties')[0].attributes['PackageIdentityName'].value) + identities = {} + for node in doc.getElementsByTagName('NewUpdates')[0].getElementsByTagName('UpdateInfo'): + node_xml = node.getElementsByTagName('Xml')[0] + if not node_xml.getElementsByTagName('SecuredFragment'): + continue + else: + id = node.getElementsByTagName('ID')[0].firstChild.nodeValue + update_identity = node_xml.getElementsByTagName('UpdateIdentity')[0] + if id in filenames: + fileinfo = filenames[id] + if fileinfo[0] not in identities: + identities[fileinfo[0]] = ([update_identity.attributes['UpdateID'].value, + update_identity.attributes['RevisionNumber'].value], fileinfo[1]) + wsa_build_ver = 0 + for filename, value in identities.items(): + if re.match(f"MicrosoftCorporationII.WindowsSubsystemForAndroid_.*.msixbundle", filename): + tmp_wsa_build_ver = re.search(r"\d{4}.\d{5}.\d{1,}.\d{1,}", filename).group() + if (wsa_build_ver == 0): + wsa_build_ver = tmp_wsa_build_ver + elif version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): + wsa_build_ver = tmp_wsa_build_ver + + if version.parse(currentver) < version.parse(wsa_build_ver): + print(f"New version found: {wsa_build_ver}") + new_version_found = True + subprocess.Popen(git, shell=True, stdout=None, stderr=None, executable='/bin/bash').wait() + try: + with open('retail.appversion', 'w') as file: + file.write(wsa_build_ver) + file.close() + print("retail.appversion file created successfully.") + except Exception as e: + print(f"Error writing to file: {e}") + msg = f'Update WSA Version from `v{currentver}` to `v{wsa_build_ver}`' + with open(env_file, "a") as wr: + wr.write(f"SHOULD_BUILD=yes\n") + wr.write(f"RELEASE_TYPE={release_type}\n") + wr.write(f"LATEST_RETAIL_VER={wsa_build_ver}\n") + wr.write(f"MSG={msg}\n") + wr.write(f"RETAIL_UPDATE=yes\n") + file.close() diff --git a/MagiskOnWSAOld/Update Check/update-downloadlinks.py b/MagiskOnWSAOld/Update Check/update-downloadlinks.py new file mode 100644 index 0000000..7e6d2da --- /dev/null +++ b/MagiskOnWSAOld/Update Check/update-downloadlinks.py @@ -0,0 +1,92 @@ +import os +from bs4 import BeautifulSoup, Tag + +# Load the README.md file +with open('README.md', 'r') as file: + readme_content = file.read() + +# Parse the content with BeautifulSoup +soup = BeautifulSoup(readme_content, 'html.parser') + +# Define the headers to locate the table +headers = ['Operating System', 'Download Page', 'Download Mirror'] + +# Initialize target_table +target_table = None + +# Find the table with the specified headers +for table in soup.find_all('table'): + ths = table.find_all('th') + if len(ths) == 3: + th_texts = [th.get_text(strip=True) if th.img is None else (th.img['alt'] if 'alt' in th.img.attrs else '') for th in ths] + if all(header_text == header for header_text, header in zip(th_texts, headers)): + target_table = table + break + +# Check if a matching table was found +if target_table is None: + print("No table with the specified headers found in README.md") + exit(1) + +# Get the GitHub ENV variables +release_type = os.getenv('RELEASE_TYPE') + +# Define the cell coordinates and corresponding ENV variables for each release type +release_types = { + 'WIF': [ + ((1, 1), 'LINK_FOR_W11X64'), + ((2, 1), 'LINK_FOR_W11ARM64'), + ((5, 1), 'LINK_FOR_W10X64') + ], + 'retail': [ + ((3, 1), 'LINK_FOR_W11X64'), + ((4, 1), 'LINK_FOR_W11ARM64'), + ((6, 1), 'LINK_FOR_W10X64') + ] +} + +# Check if the release type is valid +if release_type not in release_types: + print(f"Invalid RELEASE_TYPE: {release_type}") + exit(1) + +# Create a 2D list (matrix) to represent the table +table_matrix = [] +for _ in range(100): # Assuming the table will not have more than 100 rows + table_matrix.append([None] * 100) # Assuming the table will not have more than 100 columns + +# Fill the table matrix with the cells from the table +for row_num, row in enumerate(target_table.find_all('tr')): + col_num = 0 + for cell in row.find_all(['td', 'th']): + while table_matrix[row_num][col_num] is not None: # Skip columns that are already filled due to rowspan + col_num += 1 + rowspan = int(cell.get('rowspan', 1)) + colspan = int(cell.get('colspan', 1)) + for i in range(row_num, row_num + rowspan): + for j in range(col_num, col_num + colspan): + table_matrix[i][j] = cell + +# Replace the content of the specified cells +for (row_num, col_num), env_var in release_types[release_type]: + # Check if the cell coordinates are within the range of the table matrix + if row_num < len(table_matrix) and col_num < len(table_matrix[row_num]): + github_env_var = os.getenv(env_var) + if github_env_var is None: + print(f"The {env_var} environment variable is not set") + exit(1) + + # Parse the GitHub ENV variable with BeautifulSoup + github_env_var_soup = BeautifulSoup(github_env_var, 'html.parser') + + # Replace the cell content with the GitHub ENV variable + target_cell = table_matrix[row_num][col_num] + target_cell.clear() + target_cell.append(github_env_var_soup) + else: + print(f"Cell coordinates ({row_num}, {col_num}) are out of range") + exit(1) + +# Write the updated content back to the README.md file +with open('README.md', 'w') as file: + file.write(str(soup)) \ No newline at end of file diff --git a/MagiskOnWSAOld/Update Check/update-downloadvar.py b/MagiskOnWSAOld/Update Check/update-downloadvar.py new file mode 100644 index 0000000..fb8847f --- /dev/null +++ b/MagiskOnWSAOld/Update Check/update-downloadvar.py @@ -0,0 +1,41 @@ +import os +from bs4 import BeautifulSoup + +# Load the README.md file +with open('README.md', 'r') as file: + readme_content = file.read() + +# Parse the content with BeautifulSoup +soup = BeautifulSoup(readme_content, 'html.parser') + +# Define the headers to locate the table +headers = ['Download Variant', 'Image', 'Image'] + +# Initialize target_table +target_table = None + +# Find the table with the specified headers +for table in soup.find_all('table'): + ths = table.find_all('th') + if len(ths) == 3: + th_texts = [th.get_text(strip=True) if th.img is None else (th.img['alt'] if 'alt' in th.img.attrs else '') for th in ths] + if all(header_text == header for header_text, header in zip(th_texts, headers)): + target_table = table + break + +# Check if a matching table was found +if target_table is None: + print("No table with the specified headers found in README.md") + exit(1) + +# Get the GitHub ENV variables +github_env_var = os.getenv('TEXT_TO_REPLACE_WITH') +row_num = int(os.getenv('ROW_NUM')) +col_num = int(os.getenv('COLUMN_NUM')) + +# Replace the cell content with the GitHub ENV variable +target_table.find_all('tr')[row_num].find_all('td')[col_num].string = github_env_var + +# Write the updated content back to the README.md file +with open('README.md', 'w') as file: + file.write(str(soup)) \ No newline at end of file diff --git a/MagiskOnWSAOld/Update Check/windows10patch.ps1 b/MagiskOnWSAOld/Update Check/windows10patch.ps1 new file mode 100644 index 0000000..6612847 --- /dev/null +++ b/MagiskOnWSAOld/Update Check/windows10patch.ps1 @@ -0,0 +1,18 @@ +Clear-Host +Write-Output "`r`nPatching Windows 10 AppxManifest file..." +$xml = [xml](Get-Content '.\AppxManifest.xml') +$nsm = New-Object Xml.XmlNamespaceManager($xml.NameTable) +$nsm.AddNamespace('rescap', "http://schemas.microsoft.com/appx/manifest/foundation/windows10/restrictedcapabilities") +$nsm.AddNamespace('desktop6', "http://schemas.microsoft.com/appx/manifest/desktop/windows10/6") +$node = $xml.Package.Capabilities.SelectSingleNode("rescap:Capability[@Name='customInstallActions']", $nsm) +$xml.Package.Capabilities.RemoveChild($node) | Out-Null +$node = $xml.Package.Extensions.SelectSingleNode("desktop6:Extension[@Category='windows.customInstall']", $nsm) +$xml.Package.Extensions.RemoveChild($node) | Out-Null +$xml.Package.Dependencies.TargetDeviceFamily.MinVersion = "10.0.19041.264" +$xml.Save(".\AppxManifest.xml") +Clear-Host +Write-Output "`r`nDownloading modifided DLL file..." +$ProgressPreference = 'SilentlyContinue' +Invoke-WebRequest -Uri "https://github.com/MustardChef/WSAPatch/raw/main/DLLs%20for%20WSABuilds/winhttp.dll" -OutFile "$outputDir\WSAClient\winhttp.dll" +Invoke-WebRequest -Uri "https://github.com/MustardChef/WSAPatch/raw/main/DLLs%20for%20WSABuilds/WsaPatch.dll" -OutFile "$outputDir\WSAClient\WsaPatch.dll" +Invoke-WebRequest -Uri "https://github.com/MustardChef/WSAPatch/raw/main/DLLs%20for%20WSABuilds/icu.dll" -OutFile "$outputDir\WSAClient\icu.dll" diff --git a/MagiskOnWSAOld/arm64/system/priv-app/VpnDialogs/VpnDialogs.apk b/MagiskOnWSAOld/arm64/system/priv-app/VpnDialogs/VpnDialogs.apk new file mode 100644 index 0000000..c345c99 Binary files /dev/null and b/MagiskOnWSAOld/arm64/system/priv-app/VpnDialogs/VpnDialogs.apk differ diff --git a/MagiskOnWSAOld/bin/EROFS/fuse.erofs b/MagiskOnWSAOld/bin/EROFS/fuse.erofs new file mode 100644 index 0000000..b06cecd Binary files /dev/null and b/MagiskOnWSAOld/bin/EROFS/fuse.erofs differ diff --git a/MagiskOnWSAOld/bin/EROFS/mkfs.erofs b/MagiskOnWSAOld/bin/EROFS/mkfs.erofs new file mode 100644 index 0000000..5770c0e Binary files /dev/null and b/MagiskOnWSAOld/bin/EROFS/mkfs.erofs differ diff --git a/MagiskOnWSAOld/cacerts/01ee3bf3.0 b/MagiskOnWSAOld/cacerts/01ee3bf3.0 new file mode 100644 index 0000000..d1c55f4 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/01ee3bf3.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIIDzzCCAregAwIBAgIJAPJgZpghday9MA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMSEwHwYDVQQDDBhO +ZXRGcmVlIFNpZ24gLCBIYWRyYW5WcG4wHhcNMTcwMzMwMDEwNDAwWhcNMjcwMjA2 +MDEwNDAwWjB+MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQH +DAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUu +bGluazEhMB8GA1UEAwwYTmV0RnJlZSBTaWduICwgSGFkcmFuVnBuMIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApRXoigVenMeP9PGM9zt/TDo60AwOrjAS +a2zSgR21Hy9IoJGdR57eZKMKvGirzsgTrzjZl/G92FPppx1hKyZjP1IHES0kzG74 +yK4JtRGC1T4GYutAHM1ZDv7ZoUnGxsEo5or6CFhR+D/zJ5fiiACFypIICb6qUynk +aaSamw1JTKLNUCrs6eArJnThBJP+Czi45uM/mdrB5jnajLvRnFgeqcPp6913zKUy +4FsHPm5U26kincnRV/04UB4Xx/f3LHv9L9Ao1aViDbZlHverU0ETCEALHWqnfjX/ +uSk/zRXZRzDRPCGIdVXuxiYINjCzA4+ZRrdc+qhlpuzn9ct7phi3ewIDAQABo1Aw +TjAdBgNVHQ4EFgQU3C1v4yi0aNBn4CzFWEnQl2Lcl94wHwYDVR0jBBgwFoAU3C1v +4yi0aNBn4CzFWEnQl2Lcl94wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AQEAeHISptZ4rtfTGej48OV5o5q/Z5XmU8G4qnkWX4AfqIl3SOfPc6UzHBE+gYyw +zhBfvhW+MMHJaBh0LfswRfbuP3nkOQNvzVSIRyvmYqklZTTSQ1J5AsgB39C1LYWB +c79cyYZH3EUU+bdXgBlIxTixpOm+eqoxQlIoAMjmOjQMvOKFsZJcj0XUdULfxC2C +PbMkCJ6JB5Dr19NZxsQyEE+GhLiPJDtGcjzfHMZwUDMe1qWKAnPR5P9xZegm50HI +ogmnZGL6nfpts5yqeHaQunCKQarUbvY7Sp89wI1J+ntVHVnO9VxubHqWj+1nwlna +SBAWwK8ruKyu6mDloyilV6c4+g== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + f2:60:66:98:21:75:ac:bd + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , HadranVpn" + Validity + Not Before: Mar 30 01:04:00 2017 GMT + Not After : Feb 6 01:04:00 2027 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , HadranVpn" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:a5:15:e8:8a:05:5e:9c:c7:8f:f4:f1:8c:f7:3b: + 7f:4c:3a:3a:d0:0c:0e:ae:30:12:6b:6c:d2:81:1d: + b5:1f:2f:48:a0:91:9d:47:9e:de:64:a3:0a:bc:68: + ab:ce:c8:13:af:38:d9:97:f1:bd:d8:53:e9:a7:1d: + 61:2b:26:63:3f:52:07:11:2d:24:cc:6e:f8:c8:ae: + 09:b5:11:82:d5:3e:06:62:eb:40:1c:cd:59:0e:fe: + d9:a1:49:c6:c6:c1:28:e6:8a:fa:08:58:51:f8:3f: + f3:27:97:e2:88:00:85:ca:92:08:09:be:aa:53:29: + e4:69:a4:9a:9b:0d:49:4c:a2:cd:50:2a:ec:e9:e0: + 2b:26:74:e1:04:93:fe:0b:38:b8:e6:e3:3f:99:da: + c1:e6:39:da:8c:bb:d1:9c:58:1e:a9:c3:e9:eb:dd: + 77:cc:a5:32:e0:5b:07:3e:6e:54:db:a9:22:9d:c9: + d1:57:fd:38:50:1e:17:c7:f7:f7:2c:7b:fd:2f:d0: + 28:d5:a5:62:0d:b6:65:1e:f7:ab:53:41:13:08:40: + 0b:1d:6a:a7:7e:35:ff:b9:29:3f:cd:15:d9:47:30: + d1:3c:21:88:75:55:ee:c6:26:08:36:30:b3:03:8f: + 99:46:b7:5c:fa:a8:65:a6:ec:e7:f5:cb:7b:a6:18: + b7:7b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + DC:2D:6F:E3:28:B4:68:D0:67:E0:2C:C5:58:49:D0:97:62:DC:97:DE + X509v3 Authority Key Identifier: + keyid:DC:2D:6F:E3:28:B4:68:D0:67:E0:2C:C5:58:49:D0:97:62:DC:97:DE + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 78:72:12:a6:d6:78:ae:d7:d3:19:e8:f8:f0:e5:79:a3:9a:bf: + 67:95:e6:53:c1:b8:aa:79:16:5f:80:1f:a8:89:77:48:e7:cf: + 73:a5:33:1c:11:3e:81:8c:b0:ce:10:5f:be:15:be:30:c1:c9: + 68:18:74:2d:fb:30:45:f6:ee:3f:79:e4:39:03:6f:cd:54:88: + 47:2b:e6:62:a9:25:65:34:d2:43:52:79:02:c8:01:df:d0:b5: + 2d:85:81:73:bf:5c:c9:86:47:dc:45:14:f9:b7:57:80:19:48: + c5:38:b1:a4:e9:be:7a:aa:31:42:52:28:00:c8:e6:3a:34:0c: + bc:e2:85:b1:92:5c:8f:45:d4:75:42:df:c4:2d:82:3d:b3:24: + 08:9e:89:07:90:eb:d7:d3:59:c6:c4:32:10:4f:86:84:b8:8f: + 24:3b:46:72:3c:df:1c:c6:70:50:33:1e:d6:a5:8a:02:73:d1: + e4:ff:71:65:e8:26:e7:41:c8:a2:09:a7:64:62:fa:9d:fa:6d: + b3:9c:aa:78:76:90:ba:70:8a:41:aa:d4:6e:f6:3b:4a:9f:3d: + c0:8d:49:fa:7b:55:1d:59:ce:f5:5c:6e:6c:7a:96:8f:ed:67: + c2:59:da:48:10:16:c0:af:2b:b8:ac:ae:ea:60:e5:a3:28:a5: + 57:a7:38:fa diff --git a/MagiskOnWSAOld/cacerts/024c10e0.0 b/MagiskOnWSAOld/cacerts/024c10e0.0 new file mode 100644 index 0000000..8cb5c2a --- /dev/null +++ b/MagiskOnWSAOld/cacerts/024c10e0.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIID1zCCAr+gAwIBAgIJAIdzf+9gLmi5MA0GCSqGSIb3DQEBCwUAMIGBMQswCQYD +VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO +BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEkMCIGA1UEAwwb +TmV0RnJlZSBTaWduLCBLb3NoZXJTSU0gSVRDMB4XDTE4MDQyMjE2MzMxMloXDTI4 +MDIyOTE2MzMxMlowgYExCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQ +BgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0 +ZnJlZS5saW5rMSQwIgYDVQQDDBtOZXRGcmVlIFNpZ24sIEtvc2hlclNJTSBJVEMw +ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDP4S4XapIOvQv5wWbfBzg2 +2fY1pWs030zMEOCVvnxMr9Fp1tgs/AVMY+UzkmawwbVDxZQL3goR7RqHPKkvsWXo +TEM1DOBajU9l3JRd8djnIMMG0u8wDXzFcVmno/Mh5fCXvhAr9Dd11KokYQKcn5wT +uDhJEhyEqB8Ho8BNvTyRts/HrkdJiSFEaSpr2J9BM/v9dIzINfBg/hxy7Em9B0pd +wgnKr6Bz0esC10hCYphjzaKpd/23jvfZHZKq4oFSaFzhzC5pbg4cSPCxRUN7kzxs +ezRhSoHhzMBXn4ay+VKhBKlKUOxT3STyxPFMYx6s40qlhlmaZ1tN4hLQrwD1jLw7 +AgMBAAGjUDBOMB0GA1UdDgQWBBSPs38ZeH74K6wWVOIaW6P5ePY71zAfBgNVHSME +GDAWgBSPs38ZeH74K6wWVOIaW6P5ePY71zAMBgNVHRMEBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQAcreRYyYYW+7gfAyxfv+AXV2NDlHMuQ6/gS13JgsObnoDcxhT1 +cSbnAwbhvWXq7uAlD8Kbxp5uNZIt8N5ykqi4qjUXXuBMAZS75Rc9XDmmryBTfC+i +fql/2G6Itcj0VaoQK9gbnMumHqdK4wiIJHy4Wx2+b+3CeznwwWz5TWxBJmAqVPCN +hiu72Bh+W9wA2xuP65/FcKLpOpROQqUUT0vJd8UT46HMy7X2CXjB/ZWskGYn1V8Z +0aEvSW9FQDJllAXnTOLbXqHmY8/bdLraAL7Z7bJYLUxBcVOUe8+B+QN919kJOfk+ +AYoB1o77qk3kH7jKxxPAH5G7SP2aYtylqb45 +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 87:73:7f:ef:60:2e:68:b9 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KosherSIM ITC" + Validity + Not Before: Apr 22 16:33:12 2018 GMT + Not After : Feb 29 16:33:12 2028 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KosherSIM ITC" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:cf:e1:2e:17:6a:92:0e:bd:0b:f9:c1:66:df:07: + 38:36:d9:f6:35:a5:6b:34:df:4c:cc:10:e0:95:be: + 7c:4c:af:d1:69:d6:d8:2c:fc:05:4c:63:e5:33:92: + 66:b0:c1:b5:43:c5:94:0b:de:0a:11:ed:1a:87:3c: + a9:2f:b1:65:e8:4c:43:35:0c:e0:5a:8d:4f:65:dc: + 94:5d:f1:d8:e7:20:c3:06:d2:ef:30:0d:7c:c5:71: + 59:a7:a3:f3:21:e5:f0:97:be:10:2b:f4:37:75:d4: + aa:24:61:02:9c:9f:9c:13:b8:38:49:12:1c:84:a8: + 1f:07:a3:c0:4d:bd:3c:91:b6:cf:c7:ae:47:49:89: + 21:44:69:2a:6b:d8:9f:41:33:fb:fd:74:8c:c8:35: + f0:60:fe:1c:72:ec:49:bd:07:4a:5d:c2:09:ca:af: + a0:73:d1:eb:02:d7:48:42:62:98:63:cd:a2:a9:77: + fd:b7:8e:f7:d9:1d:92:aa:e2:81:52:68:5c:e1:cc: + 2e:69:6e:0e:1c:48:f0:b1:45:43:7b:93:3c:6c:7b: + 34:61:4a:81:e1:cc:c0:57:9f:86:b2:f9:52:a1:04: + a9:4a:50:ec:53:dd:24:f2:c4:f1:4c:63:1e:ac:e3: + 4a:a5:86:59:9a:67:5b:4d:e2:12:d0:af:00:f5:8c: + bc:3b + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 8F:B3:7F:19:78:7E:F8:2B:AC:16:54:E2:1A:5B:A3:F9:78:F6:3B:D7 + X509v3 Authority Key Identifier: + keyid:8F:B3:7F:19:78:7E:F8:2B:AC:16:54:E2:1A:5B:A3:F9:78:F6:3B:D7 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 1c:ad:e4:58:c9:86:16:fb:b8:1f:03:2c:5f:bf:e0:17:57:63: + 43:94:73:2e:43:af:e0:4b:5d:c9:82:c3:9b:9e:80:dc:c6:14: + f5:71:26:e7:03:06:e1:bd:65:ea:ee:e0:25:0f:c2:9b:c6:9e: + 6e:35:92:2d:f0:de:72:92:a8:b8:aa:35:17:5e:e0:4c:01:94: + bb:e5:17:3d:5c:39:a6:af:20:53:7c:2f:a2:7e:a9:7f:d8:6e: + 88:b5:c8:f4:55:aa:10:2b:d8:1b:9c:cb:a6:1e:a7:4a:e3:08: + 88:24:7c:b8:5b:1d:be:6f:ed:c2:7b:39:f0:c1:6c:f9:4d:6c: + 41:26:60:2a:54:f0:8d:86:2b:bb:d8:18:7e:5b:dc:00:db:1b: + 8f:eb:9f:c5:70:a2:e9:3a:94:4e:42:a5:14:4f:4b:c9:77:c5: + 13:e3:a1:cc:cb:b5:f6:09:78:c1:fd:95:ac:90:66:27:d5:5f: + 19:d1:a1:2f:49:6f:45:40:32:65:94:05:e7:4c:e2:db:5e:a1: + e6:63:cf:db:74:ba:da:00:be:d9:ed:b2:58:2d:4c:41:71:53: + 94:7b:cf:81:f9:03:7d:d7:d9:09:39:f9:3e:01:8a:01:d6:8e: + fb:aa:4d:e4:1f:b8:ca:c7:13:c0:1f:91:bb:48:fd:9a:62:dc: + a5:a9:be:39 diff --git a/MagiskOnWSAOld/cacerts/0888e817.0 b/MagiskOnWSAOld/cacerts/0888e817.0 new file mode 100644 index 0000000..d9d51e4 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/0888e817.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIF0zCCA7ugAwIBAgIUC+b3kBsjJ33F8+V3PFpQU+h6H0EwDQYJKoZIhvcNAQEL +BQAweTELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +HDAaBgNVBAMME05ldEZyZWUgU2lnbiAsWW9zc2kwHhcNMTkwODEyMTkwNDE5WhcN +MjkwNjIwMTkwNDE5WjB5MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw +EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l +dGZyZWUubGluazEcMBoGA1UEAwwTTmV0RnJlZSBTaWduICxZb3NzaTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAN93Sx7QkE3PZVE1NylelP86p1oA2zv9 +LQBQUiwKkT4Q4gWX8TkyJL/t9AXMxdyxBF31RdNY8DF32ujfowWQdjARB7UhY8Wq +A0YlSbD1RwknRrgt+g5Jq6LpeesKQ2PTp9qGDWVqLIZF8/xBlcJKD/pnNesUdGQ+ +zLx6sro/Tme6LvaFNw4vHmfLGPnsBveqA27Vkz6j2Aay3STMWS7DMb/+aYBGUKvy +rZGd4WOXuCY8GkB1apguEFIBRKwWl40bKXgmKqbQSbrfP1Ze5i8kibPUW6cnGkQZ +d5o0GJ+1Vjis6rVULNZTFaoPiWTtZDf3atXtTsVI2MkiUPVJ7yh59OiIFENhPM5Q +zSjaix4cScMMhCagKMIcU4XfqcimZY4EnMqTq+FCPvmBPdUwbZnbkJOFe8lcueiP +k9Wc3xrvskbDILtfq8e0+AGDPa1ZNv+BkXeQG0bEYsvZTSolBXgXwgXJmtlrM0jR +3VzBAJTpzXmYel9o2HWpJcpBwPRjtNPXPrj9bXD6hlFdzMIdt8gx1KRZDXQB0ZJM +LHlIEg89BgByriuhLMZ6/nUKcK5Adjo7hyI+WvQrSsD8dM9bt3jqXTjjhNspnB14 +LvpQeJF9AYhXo1YXYnQ3ipveiUt/ib9Y7BbD2zETOnWZZc7+EhUWBN4Q2Ajv5ddn +03zJE08oSiPHAgMBAAGjUzBRMB0GA1UdDgQWBBSZDKHvARiHteEbzaAccd8ZpZUL +mDAfBgNVHSMEGDAWgBSZDKHvARiHteEbzaAccd8ZpZULmDAPBgNVHRMBAf8EBTAD +AQH/MA0GCSqGSIb3DQEBCwUAA4ICAQBiSiaEOJQRzEm8Sa9ig5k8UEuicZRIt0jR +h/rlREa9En559XyxwXGXloFbmiUdlXV26BUtbWYn6J178xZ7B0x9istJq20ZeiZF +ABvv9DjuATbOLao65mowPL68C8R6ynRplVV7HE+zB3CUt4fyGEs/ud9n8DaqQysc +/im40yPqTobBKWJ1RWOrAddyHpQEqdXVxH2EkHTlyvcr9StTN4/pF5iVYeaniXnZ +PXqaEnYoqT9c2q8VAWc2a00dSrmHqw2TGKYJ2cSV8olkcdS6nknBsroQMd6Z8eZs +lGnwC1L4Nu1WJg8ZIy+Umcf0xAwSU3Zs7AhWIph+sO1Tc8iNFSLLotOKEO0xjBrZ +9ierDYZLAVx6XCIiArzgIM0XOwzPKTkwRZ7ip5n4mWx7GxmFJREAvwjRXuWNLZtj +s+IfCshjUfBUymYXn544mhou6uv9TeFQcxJ2RUzNr3xrxCuuriaUOGGBAaqrPpec +r2wWl/hlpjcw606NHbDlLzRUDO4Rwy1wZ5F6Pr7VXBqZy43tbB9VNbQErXdth0kH +UkjRGtv8zTO3MfG8FO1yv+QsWkHAAx73j8jGeSlLrma/KJAaJPpy0b1ud/12yCY4 +GkFFhltXuc5f9tx+YvBUprWmZ9pd/tcFC+s/7XtpFU3STdfjlhZ6mzcC0IkxuNO9 +HamDmBP6+A== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 0b:e6:f7:90:1b:23:27:7d:c5:f3:e5:77:3c:5a:50:53:e8:7a:1f:41 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,Yossi" + Validity + Not Before: Aug 12 19:04:19 2019 GMT + Not After : Jun 20 19:04:19 2029 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,Yossi" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:df:77:4b:1e:d0:90:4d:cf:65:51:35:37:29:5e: + 94:ff:3a:a7:5a:00:db:3b:fd:2d:00:50:52:2c:0a: + 91:3e:10:e2:05:97:f1:39:32:24:bf:ed:f4:05:cc: + c5:dc:b1:04:5d:f5:45:d3:58:f0:31:77:da:e8:df: + a3:05:90:76:30:11:07:b5:21:63:c5:aa:03:46:25: + 49:b0:f5:47:09:27:46:b8:2d:fa:0e:49:ab:a2:e9: + 79:eb:0a:43:63:d3:a7:da:86:0d:65:6a:2c:86:45: + f3:fc:41:95:c2:4a:0f:fa:67:35:eb:14:74:64:3e: + cc:bc:7a:b2:ba:3f:4e:67:ba:2e:f6:85:37:0e:2f: + 1e:67:cb:18:f9:ec:06:f7:aa:03:6e:d5:93:3e:a3: + d8:06:b2:dd:24:cc:59:2e:c3:31:bf:fe:69:80:46: + 50:ab:f2:ad:91:9d:e1:63:97:b8:26:3c:1a:40:75: + 6a:98:2e:10:52:01:44:ac:16:97:8d:1b:29:78:26: + 2a:a6:d0:49:ba:df:3f:56:5e:e6:2f:24:89:b3:d4: + 5b:a7:27:1a:44:19:77:9a:34:18:9f:b5:56:38:ac: + ea:b5:54:2c:d6:53:15:aa:0f:89:64:ed:64:37:f7: + 6a:d5:ed:4e:c5:48:d8:c9:22:50:f5:49:ef:28:79: + f4:e8:88:14:43:61:3c:ce:50:cd:28:da:8b:1e:1c: + 49:c3:0c:84:26:a0:28:c2:1c:53:85:df:a9:c8:a6: + 65:8e:04:9c:ca:93:ab:e1:42:3e:f9:81:3d:d5:30: + 6d:99:db:90:93:85:7b:c9:5c:b9:e8:8f:93:d5:9c: + df:1a:ef:b2:46:c3:20:bb:5f:ab:c7:b4:f8:01:83: + 3d:ad:59:36:ff:81:91:77:90:1b:46:c4:62:cb:d9: + 4d:2a:25:05:78:17:c2:05:c9:9a:d9:6b:33:48:d1: + dd:5c:c1:00:94:e9:cd:79:98:7a:5f:68:d8:75:a9: + 25:ca:41:c0:f4:63:b4:d3:d7:3e:b8:fd:6d:70:fa: + 86:51:5d:cc:c2:1d:b7:c8:31:d4:a4:59:0d:74:01: + d1:92:4c:2c:79:48:12:0f:3d:06:00:72:ae:2b:a1: + 2c:c6:7a:fe:75:0a:70:ae:40:76:3a:3b:87:22:3e: + 5a:f4:2b:4a:c0:fc:74:cf:5b:b7:78:ea:5d:38:e3: + 84:db:29:9c:1d:78:2e:fa:50:78:91:7d:01:88:57: + a3:56:17:62:74:37:8a:9b:de:89:4b:7f:89:bf:58: + ec:16:c3:db:31:13:3a:75:99:65:ce:fe:12:15:16: + 04:de:10:d8:08:ef:e5:d7:67:d3:7c:c9:13:4f:28: + 4a:23:c7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 99:0C:A1:EF:01:18:87:B5:E1:1B:CD:A0:1C:71:DF:19:A5:95:0B:98 + X509v3 Authority Key Identifier: + keyid:99:0C:A1:EF:01:18:87:B5:E1:1B:CD:A0:1C:71:DF:19:A5:95:0B:98 + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 62:4a:26:84:38:94:11:cc:49:bc:49:af:62:83:99:3c:50:4b: + a2:71:94:48:b7:48:d1:87:fa:e5:44:46:bd:12:7e:79:f5:7c: + b1:c1:71:97:96:81:5b:9a:25:1d:95:75:76:e8:15:2d:6d:66: + 27:e8:9d:7b:f3:16:7b:07:4c:7d:8a:cb:49:ab:6d:19:7a:26: + 45:00:1b:ef:f4:38:ee:01:36:ce:2d:aa:3a:e6:6a:30:3c:be: + bc:0b:c4:7a:ca:74:69:95:55:7b:1c:4f:b3:07:70:94:b7:87: + f2:18:4b:3f:b9:df:67:f0:36:aa:43:2b:1c:fe:29:b8:d3:23: + ea:4e:86:c1:29:62:75:45:63:ab:01:d7:72:1e:94:04:a9:d5: + d5:c4:7d:84:90:74:e5:ca:f7:2b:f5:2b:53:37:8f:e9:17:98: + 95:61:e6:a7:89:79:d9:3d:7a:9a:12:76:28:a9:3f:5c:da:af: + 15:01:67:36:6b:4d:1d:4a:b9:87:ab:0d:93:18:a6:09:d9:c4: + 95:f2:89:64:71:d4:ba:9e:49:c1:b2:ba:10:31:de:99:f1:e6: + 6c:94:69:f0:0b:52:f8:36:ed:56:26:0f:19:23:2f:94:99:c7: + f4:c4:0c:12:53:76:6c:ec:08:56:22:98:7e:b0:ed:53:73:c8: + 8d:15:22:cb:a2:d3:8a:10:ed:31:8c:1a:d9:f6:27:ab:0d:86: + 4b:01:5c:7a:5c:22:22:02:bc:e0:20:cd:17:3b:0c:cf:29:39: + 30:45:9e:e2:a7:99:f8:99:6c:7b:1b:19:85:25:11:00:bf:08: + d1:5e:e5:8d:2d:9b:63:b3:e2:1f:0a:c8:63:51:f0:54:ca:66: + 17:9f:9e:38:9a:1a:2e:ea:eb:fd:4d:e1:50:73:12:76:45:4c: + cd:af:7c:6b:c4:2b:ae:ae:26:94:38:61:81:01:aa:ab:3e:97: + 9c:af:6c:16:97:f8:65:a6:37:30:eb:4e:8d:1d:b0:e5:2f:34: + 54:0c:ee:11:c3:2d:70:67:91:7a:3e:be:d5:5c:1a:99:cb:8d: + ed:6c:1f:55:35:b4:04:ad:77:6d:87:49:07:52:48:d1:1a:db: + fc:cd:33:b7:31:f1:bc:14:ed:72:bf:e4:2c:5a:41:c0:03:1e: + f7:8f:c8:c6:79:29:4b:ae:66:bf:28:90:1a:24:fa:72:d1:bd: + 6e:77:fd:76:c8:26:38:1a:41:45:86:5b:57:b9:ce:5f:f6:dc: + 7e:62:f0:54:a6:b5:a6:67:da:5d:fe:d7:05:0b:eb:3f:ed:7b: + 69:15:4d:d2:4d:d7:e3:96:16:7a:9b:37:02:d0:89:31:b8:d3: + bd:1d:a9:83:98:13:fa:f8 diff --git a/MagiskOnWSAOld/cacerts/0b4055f7.0 b/MagiskOnWSAOld/cacerts/0b4055f7.0 new file mode 100644 index 0000000..887ec81 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/0b4055f7.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIID5TCCAs2gAwIBAgIJALnD1+pTBr26MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYD +VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO +BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazErMCkGA1UEAwwi +TmV0RnJlZSBTaWduICwgU2ltS2FzaGVyIC0gVHJpcGxlQzAeFw0xNzA2MjYxNzUx +MDlaFw0yNzA1MDUxNzUxMDlaMIGIMQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNy +YWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNV +BAsMDG5ldGZyZWUubGluazErMCkGA1UEAwwiTmV0RnJlZSBTaWduICwgU2ltS2Fz +aGVyIC0gVHJpcGxlQzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMM5 +FtnDwNn6ErV5rZhc9VV1ujRRSDfK6n9TjK0zaHKhwrTgzj6YxzopfspqwoZM6QqS +ivNtDLKfQyVFUYGAFQiQgShQNYS8GheXqTI/U7SdWgKFUkdcOPmzNusYwa+G0cLz +NiRkKS+yRm+sGf+QLu18KACoc5FbL1+rM8OR0aCG2md/K8Z6xnYm371BGEiZjjhX +4tGL7SonHPs35Ga4LI6pJfUUItcliWBW6HnwcRk7Ilq/9q5gUjR5sbIvt0+9hdhj +1UQjE4gcsPzN5Fc+RvwDXBqozIk8cPVSNycwY2VZ4FofEAjtanS9R5LrshKK6Oi2 +n61xzE/vHMVUJKYXqcUCAwEAAaNQME4wHQYDVR0OBBYEFFr8sgox5u0dhxiDDE7A +n11wTtBNMB8GA1UdIwQYMBaAFFr8sgox5u0dhxiDDE7An11wTtBNMAwGA1UdEwQF +MAMBAf8wDQYJKoZIhvcNAQELBQADggEBAJSPrJ3a3M0m+dHuGevOMKOjP5NexEiT +hWUX86/b7u0rKfphqGsl4y+wXRCiMydOwZCMg7MQjYvmT8XoN0rlVu73BxpcxYJg +I6Il4erTBSitCiXF39RQ3XW/akAqgAsaPSD4TdSImCVHW3UgJxHtRcM4SodIo+Zh +7WuNXCC5ET/C4y2EeMOtkWIcuncjPrL7pJwwiHPYjhK+SiievAzDGhrXbJxAmgy2 +wsV6qU03j0I3fH1jC23SJRA8GudrZqUoTcfQmERPnyTiTp1Hn271crZ8ai9MPZQm +c+wKYHlblPbaj0EA06Dh6uCexhyTxa0wRtTODIfCxoHJMWWWPKb9H3k= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + b9:c3:d7:ea:53:06:bd:ba + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , SimKasher - TripleC" + Validity + Not Before: Jun 26 17:51:09 2017 GMT + Not After : May 5 17:51:09 2027 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , SimKasher - TripleC" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:c3:39:16:d9:c3:c0:d9:fa:12:b5:79:ad:98:5c: + f5:55:75:ba:34:51:48:37:ca:ea:7f:53:8c:ad:33: + 68:72:a1:c2:b4:e0:ce:3e:98:c7:3a:29:7e:ca:6a: + c2:86:4c:e9:0a:92:8a:f3:6d:0c:b2:9f:43:25:45: + 51:81:80:15:08:90:81:28:50:35:84:bc:1a:17:97: + a9:32:3f:53:b4:9d:5a:02:85:52:47:5c:38:f9:b3: + 36:eb:18:c1:af:86:d1:c2:f3:36:24:64:29:2f:b2: + 46:6f:ac:19:ff:90:2e:ed:7c:28:00:a8:73:91:5b: + 2f:5f:ab:33:c3:91:d1:a0:86:da:67:7f:2b:c6:7a: + c6:76:26:df:bd:41:18:48:99:8e:38:57:e2:d1:8b: + ed:2a:27:1c:fb:37:e4:66:b8:2c:8e:a9:25:f5:14: + 22:d7:25:89:60:56:e8:79:f0:71:19:3b:22:5a:bf: + f6:ae:60:52:34:79:b1:b2:2f:b7:4f:bd:85:d8:63: + d5:44:23:13:88:1c:b0:fc:cd:e4:57:3e:46:fc:03: + 5c:1a:a8:cc:89:3c:70:f5:52:37:27:30:63:65:59: + e0:5a:1f:10:08:ed:6a:74:bd:47:92:eb:b2:12:8a: + e8:e8:b6:9f:ad:71:cc:4f:ef:1c:c5:54:24:a6:17: + a9:c5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 5A:FC:B2:0A:31:E6:ED:1D:87:18:83:0C:4E:C0:9F:5D:70:4E:D0:4D + X509v3 Authority Key Identifier: + keyid:5A:FC:B2:0A:31:E6:ED:1D:87:18:83:0C:4E:C0:9F:5D:70:4E:D0:4D + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 94:8f:ac:9d:da:dc:cd:26:f9:d1:ee:19:eb:ce:30:a3:a3:3f: + 93:5e:c4:48:93:85:65:17:f3:af:db:ee:ed:2b:29:fa:61:a8: + 6b:25:e3:2f:b0:5d:10:a2:33:27:4e:c1:90:8c:83:b3:10:8d: + 8b:e6:4f:c5:e8:37:4a:e5:56:ee:f7:07:1a:5c:c5:82:60:23: + a2:25:e1:ea:d3:05:28:ad:0a:25:c5:df:d4:50:dd:75:bf:6a: + 40:2a:80:0b:1a:3d:20:f8:4d:d4:88:98:25:47:5b:75:20:27: + 11:ed:45:c3:38:4a:87:48:a3:e6:61:ed:6b:8d:5c:20:b9:11: + 3f:c2:e3:2d:84:78:c3:ad:91:62:1c:ba:77:23:3e:b2:fb:a4: + 9c:30:88:73:d8:8e:12:be:4a:28:9e:bc:0c:c3:1a:1a:d7:6c: + 9c:40:9a:0c:b6:c2:c5:7a:a9:4d:37:8f:42:37:7c:7d:63:0b: + 6d:d2:25:10:3c:1a:e7:6b:66:a5:28:4d:c7:d0:98:44:4f:9f: + 24:e2:4e:9d:47:9f:6e:f5:72:b6:7c:6a:2f:4c:3d:94:26:73: + ec:0a:60:79:5b:94:f6:da:8f:41:00:d3:a0:e1:ea:e0:9e:c6: + 1c:93:c5:ad:30:46:d4:ce:0c:87:c2:c6:81:c9:31:65:96:3c: + a6:fd:1f:79 diff --git a/MagiskOnWSAOld/cacerts/281f8e47.0 b/MagiskOnWSAOld/cacerts/281f8e47.0 new file mode 100644 index 0000000..408156c --- /dev/null +++ b/MagiskOnWSAOld/cacerts/281f8e47.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIF1zCCA7+gAwIBAgIUVRcB1uWuaruggL9hYC31+1eO8wEwDQYJKoZIhvcNAQEL +BQAwezELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +HjAcBgNVBAMMFU5ldEZyZWUgU2lnbiwgQW1pdE5ldDAeFw0yMDEyMTUxMjQ1MTJa +Fw0zMDEyMTMxMjQ1MTJaMHsxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwx +EjAQBgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwM +bmV0ZnJlZS5saW5rMR4wHAYDVQQDDBVOZXRGcmVlIFNpZ24sIEFtaXROZXQwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDNCFBv23NbP80PnYb1j8EQFbUB +IUG7ZaR/7acSU5+zFpagTX1HASboUZ6sTVSKYIM/cJ8J6B97PkVb4J1I6+pVa7x3 +LNJqReP9fCSknshNsc0NlxB4xcCnheov4HYrgW37hznEbiSrR+hDHR0W2A96IEHx +x71A3/mQ5Rl2jXv+negYa/xNK8uh+6xGN/zrowPNc8c4EC94hCpuwAzYqoXR+Iph +hcdK8WKIge3isEtpYYcswk8U7YIXe6sSAUrVcXaZURTAX00LPptXM92l4C+pBQ4j +xgOxXSVJWig7QLJuCPw0BjlLAVwvc4zWib/6tBUcHUZYcZ9+jm7D9sUkD3/Q2WDm +BlFMGhGuIGW4FeiX+kSGGYlskds4RYsf6iHVLBAUc3MhtXRPSt3RgTLw823b4dwj +OG/0RWjhynRHWmBvW+mWZgGPDZ/VxDR2dltWXGcWyz9hfQNBNhUberBhtLpydHfK +4qpYNr7yWBJbXDsXTM6Y5rYVHiWYz/Mf47SEMUhGnqHDlENWNHVAz8LD4xmeywLl +1HkcMygyQMKtfTQ8V2Y/7cftfSrTGfG4uTKvewGbsET+ZS0G2aInFijQfnKrhWc+ +foAVimtJY0KssNDzHpcMMjJAqoIulP4/Mj4ny7XLEIba8o3VI8g20lfZPpo3jl1H +KpXNpVOTOR+h/PNUiQIDAQABo1MwUTAdBgNVHQ4EFgQUNtscwInvEKf/FZdrLO1r +3yBoFi8wHwYDVR0jBBgwFoAUNtscwInvEKf/FZdrLO1r3yBoFi8wDwYDVR0TAQH/ +BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAidKPUdFTIOeiE4CemLVrns6EkNd5 +zbfi3jeYCvTSzf/ij0Xu7dzZ8valIylgaKQaT3DizHbhtWbmeMbz/0uE08fYIzsY +JJBMTf9IoB6bjWcGqWuszM0rVO/wWKhxTG4w+VSScFLT2PHS/8PHpmcQEo8j2QWf ++4pAfruFIkoCfApYQE3GaJRZ/vrPGFBfnWEo5K57DivHN/raVu26x83twI6rnYlO +htI+p3gV5LZFn66txZAmicA7LFp7wbwTDJwWX+XvOhuHlE11mMkWY3oFei/EZiub +n+2Brmt7p9cX2Wkrw5eZdFenGyM8vmzEEExOnuraojfHS/p5G3r4j92Kt/yBZVfK +RWqooVQ4J30YL6Z90Rz++wExvsBaYtY+ZjYvso6Mi7N42iemz7fR2h+VBv9BcUKs +HET94gNwVsYi7++uqjLyB1NxzpFcPQmfGEJZeQiDeyfY1W2KKiUEsTpi6xu9Bkki +dAOiEmiwk2IAv+a0Sd+FalvURx6ldrqCy3ki8offnrPcjedY8kjnyijdOTuj6dTh +ybzqxcXItfxrpA+s0bWFh4DK3kP8uUsPBz4q5aHLxtTHMFULXRt4gBifV6InysNx +UuqP4yTPCR3QoES4Aba7PR18RnTZXnYWXnsWSspEf1Cf3jTkI9OpB8MHrWh+7v5O +AiH5GAGaSCVrseI= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 55:17:01:d6:e5:ae:6a:bb:a0:80:bf:61:60:2d:f5:fb:57:8e:f3:01 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, AmitNet" + Validity + Not Before: Dec 15 12:45:12 2020 GMT + Not After : Dec 13 12:45:12 2030 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, AmitNet" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:cd:08:50:6f:db:73:5b:3f:cd:0f:9d:86:f5:8f: + c1:10:15:b5:01:21:41:bb:65:a4:7f:ed:a7:12:53: + 9f:b3:16:96:a0:4d:7d:47:01:26:e8:51:9e:ac:4d: + 54:8a:60:83:3f:70:9f:09:e8:1f:7b:3e:45:5b:e0: + 9d:48:eb:ea:55:6b:bc:77:2c:d2:6a:45:e3:fd:7c: + 24:a4:9e:c8:4d:b1:cd:0d:97:10:78:c5:c0:a7:85: + ea:2f:e0:76:2b:81:6d:fb:87:39:c4:6e:24:ab:47: + e8:43:1d:1d:16:d8:0f:7a:20:41:f1:c7:bd:40:df: + f9:90:e5:19:76:8d:7b:fe:9d:e8:18:6b:fc:4d:2b: + cb:a1:fb:ac:46:37:fc:eb:a3:03:cd:73:c7:38:10: + 2f:78:84:2a:6e:c0:0c:d8:aa:85:d1:f8:8a:61:85: + c7:4a:f1:62:88:81:ed:e2:b0:4b:69:61:87:2c:c2: + 4f:14:ed:82:17:7b:ab:12:01:4a:d5:71:76:99:51: + 14:c0:5f:4d:0b:3e:9b:57:33:dd:a5:e0:2f:a9:05: + 0e:23:c6:03:b1:5d:25:49:5a:28:3b:40:b2:6e:08: + fc:34:06:39:4b:01:5c:2f:73:8c:d6:89:bf:fa:b4: + 15:1c:1d:46:58:71:9f:7e:8e:6e:c3:f6:c5:24:0f: + 7f:d0:d9:60:e6:06:51:4c:1a:11:ae:20:65:b8:15: + e8:97:fa:44:86:19:89:6c:91:db:38:45:8b:1f:ea: + 21:d5:2c:10:14:73:73:21:b5:74:4f:4a:dd:d1:81: + 32:f0:f3:6d:db:e1:dc:23:38:6f:f4:45:68:e1:ca: + 74:47:5a:60:6f:5b:e9:96:66:01:8f:0d:9f:d5:c4: + 34:76:76:5b:56:5c:67:16:cb:3f:61:7d:03:41:36: + 15:1b:7a:b0:61:b4:ba:72:74:77:ca:e2:aa:58:36: + be:f2:58:12:5b:5c:3b:17:4c:ce:98:e6:b6:15:1e: + 25:98:cf:f3:1f:e3:b4:84:31:48:46:9e:a1:c3:94: + 43:56:34:75:40:cf:c2:c3:e3:19:9e:cb:02:e5:d4: + 79:1c:33:28:32:40:c2:ad:7d:34:3c:57:66:3f:ed: + c7:ed:7d:2a:d3:19:f1:b8:b9:32:af:7b:01:9b:b0: + 44:fe:65:2d:06:d9:a2:27:16:28:d0:7e:72:ab:85: + 67:3e:7e:80:15:8a:6b:49:63:42:ac:b0:d0:f3:1e: + 97:0c:32:32:40:aa:82:2e:94:fe:3f:32:3e:27:cb: + b5:cb:10:86:da:f2:8d:d5:23:c8:36:d2:57:d9:3e: + 9a:37:8e:5d:47:2a:95:cd:a5:53:93:39:1f:a1:fc: + f3:54:89 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 36:DB:1C:C0:89:EF:10:A7:FF:15:97:6B:2C:ED:6B:DF:20:68:16:2F + X509v3 Authority Key Identifier: + keyid:36:DB:1C:C0:89:EF:10:A7:FF:15:97:6B:2C:ED:6B:DF:20:68:16:2F + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 89:d2:8f:51:d1:53:20:e7:a2:13:80:9e:98:b5:6b:9e:ce:84: + 90:d7:79:cd:b7:e2:de:37:98:0a:f4:d2:cd:ff:e2:8f:45:ee: + ed:dc:d9:f2:f6:a5:23:29:60:68:a4:1a:4f:70:e2:cc:76:e1: + b5:66:e6:78:c6:f3:ff:4b:84:d3:c7:d8:23:3b:18:24:90:4c: + 4d:ff:48:a0:1e:9b:8d:67:06:a9:6b:ac:cc:cd:2b:54:ef:f0: + 58:a8:71:4c:6e:30:f9:54:92:70:52:d3:d8:f1:d2:ff:c3:c7: + a6:67:10:12:8f:23:d9:05:9f:fb:8a:40:7e:bb:85:22:4a:02: + 7c:0a:58:40:4d:c6:68:94:59:fe:fa:cf:18:50:5f:9d:61:28: + e4:ae:7b:0e:2b:c7:37:fa:da:56:ed:ba:c7:cd:ed:c0:8e:ab: + 9d:89:4e:86:d2:3e:a7:78:15:e4:b6:45:9f:ae:ad:c5:90:26: + 89:c0:3b:2c:5a:7b:c1:bc:13:0c:9c:16:5f:e5:ef:3a:1b:87: + 94:4d:75:98:c9:16:63:7a:05:7a:2f:c4:66:2b:9b:9f:ed:81: + ae:6b:7b:a7:d7:17:d9:69:2b:c3:97:99:74:57:a7:1b:23:3c: + be:6c:c4:10:4c:4e:9e:ea:da:a2:37:c7:4b:fa:79:1b:7a:f8: + 8f:dd:8a:b7:fc:81:65:57:ca:45:6a:a8:a1:54:38:27:7d:18: + 2f:a6:7d:d1:1c:fe:fb:01:31:be:c0:5a:62:d6:3e:66:36:2f: + b2:8e:8c:8b:b3:78:da:27:a6:cf:b7:d1:da:1f:95:06:ff:41: + 71:42:ac:1c:44:fd:e2:03:70:56:c6:22:ef:ef:ae:aa:32:f2: + 07:53:71:ce:91:5c:3d:09:9f:18:42:59:79:08:83:7b:27:d8: + d5:6d:8a:2a:25:04:b1:3a:62:eb:1b:bd:06:49:22:74:03:a2: + 12:68:b0:93:62:00:bf:e6:b4:49:df:85:6a:5b:d4:47:1e:a5: + 76:ba:82:cb:79:22:f2:87:df:9e:b3:dc:8d:e7:58:f2:48:e7: + ca:28:dd:39:3b:a3:e9:d4:e1:c9:bc:ea:c5:c5:c8:b5:fc:6b: + a4:0f:ac:d1:b5:85:87:80:ca:de:43:fc:b9:4b:0f:07:3e:2a: + e5:a1:cb:c6:d4:c7:30:55:0b:5d:1b:78:80:18:9f:57:a2:27: + ca:c3:71:52:ea:8f:e3:24:cf:09:1d:d0:a0:44:b8:01:b6:bb: + 3d:1d:7c:46:74:d9:5e:76:16:5e:7b:16:4a:ca:44:7f:50:9f: + de:34:e4:23:d3:a9:07:c3:07:ad:68:7e:ee:fe:4e:02:21:f9: + 18:01:9a:48:25:6b:b1:e2 diff --git a/MagiskOnWSAOld/cacerts/2ef957f0.0 b/MagiskOnWSAOld/cacerts/2ef957f0.0 new file mode 100644 index 0000000..f04849b --- /dev/null +++ b/MagiskOnWSAOld/cacerts/2ef957f0.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIF4zCCA8ugAwIBAgIUAkc9yNk/4jz9hPra/7vONeYwrtIwDQYJKoZIhvcNAQEL +BQAwgYAxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUpl +cnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5r +MSMwIQYDVQQDDBpOZXRGcmVlIFNpZ24sIElCIC0gc3BvdG5ldDAeFw0yMDA1MTMw +ODIzMjJaFw0zMDA1MTEwODIzMjJaMIGAMQswCQYDVQQGEwJJTDEPMA0GA1UECAwG +aXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTAT +BgNVBAsMDG5ldGZyZWUubGluazEjMCEGA1UEAwwaTmV0RnJlZSBTaWduLCBJQiAt +IHNwb3RuZXQwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDNgVcx94Ap +985mKOzFx4/lExkRuI8f9hdAUY9XqE94X7fT8hmCP6pxy/7+JzMjfn/YMmECea51 +cuV4ZH+xUZ5WxoQajx/ICJtfaOSV/YIkB40o6JcN95EhKuickdiWnGFjsOZwc1Wj +sqHzjNZJWvV3KnoUGJQfc0F7/Th7HvQoNRqAkUBcXS521m7GqndlmE5zAo7WCD/N +7ggWeO2g8xPOW5YldHZ9mMSZXVYLRn95wrEtBX4SVXqSWdlPAE+m1jbHU2Gu2eM5 +LxichbN1FQRL63aeZJjSgOEDaWnASLlqq+rnIWiecoYOGe7qoNl+jGaNAQmg3bq0 +nOYouRu7nUGQbOn/eX3BwHEVx9WKiUPHop24NPW70wXXfEU0UNM3FjuU/V/uFA89 +RQZRcg28O3SrzLybBGwCo+Kp5Sp54a59/Uw5FvX9OSsHX/QqdMxtFWlXvwqeuV8p +DOlYrAU8WrttR4ruZ3OJ5Rd5w8eu0U2s+dQLrMVgJo2ji2Ji9tBoHId50KVSBDgq +TGs40TB3cnWeO0kf3luz8CgH/+ls08ruDSXpA88FL6adFLfMhfDgBjq9OM0twL31 +dVeZvxplqSvLQqiO7uc6s2qzGN/KaMP41eZaWuuiwZtwnFbArg8H2zQDpcLM72Ha +yeqQUAHHIjDx4pmww9yeSk8a1a0Pt71SLwIDAQABo1MwUTAdBgNVHQ4EFgQUU0dF +eW32zoZaL/BW2H++Jj5tyK8wHwYDVR0jBBgwFoAUU0dFeW32zoZaL/BW2H++Jj5t +yK8wDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAlwsfMiO4Bg0E +ciN+dAs0+i9grg0CzD2qUpVl6rDN6Vq12DoLgIL/qAH9wiKDPfl9LniwLQfkK/HE +U868x90OOaopBhrO+SPfQX0grz2xYDxnMJXuBKDGr8jHy+QeRq2JN4Sq9BW8Ayfo +9Z3xFpGAf0pohvT5ipeR45u9BZsGBH49iur+snf+t4PL7we7Q4rZ5Z1ZFO0ctlGh +hkS6cGpsmkrH/ysQpD07JmN/Iwklz8xKyiRdRc1qL5BBbLOedawpPNA6PuVBNDg2 +jLDZyiirC9zBUTIUohruHQ6lWyHxvx5+BcwmU2LEZMfIVFddQ/KOZ5FcsscDUxvg +YvFdB7iIZNOMBASowXcp7qq6gySkA0qoD+O55nvDocKkqsImuacmOAHmgXfd6zAV +QPo/l/qaMDldpYoKL3WI3GlViTKhBFBKqgb9iR8oKgzMdi+A95XzbHaFFrvG0NaU +Qdiuvp7e09Ja44RAbz2Q4JyDhoo1xxgvfCluUMWWT0AdE9UdV88lpaaD3iPHPOao +E1QFv5hb04gCSU5V+F8a/SULWUitu7NdiBZQRwYbk8xS7Ta8Qcn1/ICJHsx3FKbJ +Z2vhVxCoT22IAdbcd4AL2pJS3EqNZlydfcUg42vCDovKheTWNYQzBW5c0IKPKAq9 +Z52Mpo8iek5gwCa8k8r1ZTiyODgDO7Y= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 02:47:3d:c8:d9:3f:e2:3c:fd:84:fa:da:ff:bb:ce:35:e6:30:ae:d2 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, IB - spotnet" + Validity + Not Before: May 13 08:23:22 2020 GMT + Not After : May 11 08:23:22 2030 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, IB - spotnet" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:cd:81:57:31:f7:80:29:f7:ce:66:28:ec:c5:c7: + 8f:e5:13:19:11:b8:8f:1f:f6:17:40:51:8f:57:a8: + 4f:78:5f:b7:d3:f2:19:82:3f:aa:71:cb:fe:fe:27: + 33:23:7e:7f:d8:32:61:02:79:ae:75:72:e5:78:64: + 7f:b1:51:9e:56:c6:84:1a:8f:1f:c8:08:9b:5f:68: + e4:95:fd:82:24:07:8d:28:e8:97:0d:f7:91:21:2a: + e8:9c:91:d8:96:9c:61:63:b0:e6:70:73:55:a3:b2: + a1:f3:8c:d6:49:5a:f5:77:2a:7a:14:18:94:1f:73: + 41:7b:fd:38:7b:1e:f4:28:35:1a:80:91:40:5c:5d: + 2e:76:d6:6e:c6:aa:77:65:98:4e:73:02:8e:d6:08: + 3f:cd:ee:08:16:78:ed:a0:f3:13:ce:5b:96:25:74: + 76:7d:98:c4:99:5d:56:0b:46:7f:79:c2:b1:2d:05: + 7e:12:55:7a:92:59:d9:4f:00:4f:a6:d6:36:c7:53: + 61:ae:d9:e3:39:2f:18:9c:85:b3:75:15:04:4b:eb: + 76:9e:64:98:d2:80:e1:03:69:69:c0:48:b9:6a:ab: + ea:e7:21:68:9e:72:86:0e:19:ee:ea:a0:d9:7e:8c: + 66:8d:01:09:a0:dd:ba:b4:9c:e6:28:b9:1b:bb:9d: + 41:90:6c:e9:ff:79:7d:c1:c0:71:15:c7:d5:8a:89: + 43:c7:a2:9d:b8:34:f5:bb:d3:05:d7:7c:45:34:50: + d3:37:16:3b:94:fd:5f:ee:14:0f:3d:45:06:51:72: + 0d:bc:3b:74:ab:cc:bc:9b:04:6c:02:a3:e2:a9:e5: + 2a:79:e1:ae:7d:fd:4c:39:16:f5:fd:39:2b:07:5f: + f4:2a:74:cc:6d:15:69:57:bf:0a:9e:b9:5f:29:0c: + e9:58:ac:05:3c:5a:bb:6d:47:8a:ee:67:73:89:e5: + 17:79:c3:c7:ae:d1:4d:ac:f9:d4:0b:ac:c5:60:26: + 8d:a3:8b:62:62:f6:d0:68:1c:87:79:d0:a5:52:04: + 38:2a:4c:6b:38:d1:30:77:72:75:9e:3b:49:1f:de: + 5b:b3:f0:28:07:ff:e9:6c:d3:ca:ee:0d:25:e9:03: + cf:05:2f:a6:9d:14:b7:cc:85:f0:e0:06:3a:bd:38: + cd:2d:c0:bd:f5:75:57:99:bf:1a:65:a9:2b:cb:42: + a8:8e:ee:e7:3a:b3:6a:b3:18:df:ca:68:c3:f8:d5: + e6:5a:5a:eb:a2:c1:9b:70:9c:56:c0:ae:0f:07:db: + 34:03:a5:c2:cc:ef:61:da:c9:ea:90:50:01:c7:22: + 30:f1:e2:99:b0:c3:dc:9e:4a:4f:1a:d5:ad:0f:b7: + bd:52:2f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 53:47:45:79:6D:F6:CE:86:5A:2F:F0:56:D8:7F:BE:26:3E:6D:C8:AF + X509v3 Authority Key Identifier: + keyid:53:47:45:79:6D:F6:CE:86:5A:2F:F0:56:D8:7F:BE:26:3E:6D:C8:AF + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 97:0b:1f:32:23:b8:06:0d:04:72:23:7e:74:0b:34:fa:2f:60: + ae:0d:02:cc:3d:aa:52:95:65:ea:b0:cd:e9:5a:b5:d8:3a:0b: + 80:82:ff:a8:01:fd:c2:22:83:3d:f9:7d:2e:78:b0:2d:07:e4: + 2b:f1:c4:53:ce:bc:c7:dd:0e:39:aa:29:06:1a:ce:f9:23:df: + 41:7d:20:af:3d:b1:60:3c:67:30:95:ee:04:a0:c6:af:c8:c7: + cb:e4:1e:46:ad:89:37:84:aa:f4:15:bc:03:27:e8:f5:9d:f1: + 16:91:80:7f:4a:68:86:f4:f9:8a:97:91:e3:9b:bd:05:9b:06: + 04:7e:3d:8a:ea:fe:b2:77:fe:b7:83:cb:ef:07:bb:43:8a:d9: + e5:9d:59:14:ed:1c:b6:51:a1:86:44:ba:70:6a:6c:9a:4a:c7: + ff:2b:10:a4:3d:3b:26:63:7f:23:09:25:cf:cc:4a:ca:24:5d: + 45:cd:6a:2f:90:41:6c:b3:9e:75:ac:29:3c:d0:3a:3e:e5:41: + 34:38:36:8c:b0:d9:ca:28:ab:0b:dc:c1:51:32:14:a2:1a:ee: + 1d:0e:a5:5b:21:f1:bf:1e:7e:05:cc:26:53:62:c4:64:c7:c8: + 54:57:5d:43:f2:8e:67:91:5c:b2:c7:03:53:1b:e0:62:f1:5d: + 07:b8:88:64:d3:8c:04:04:a8:c1:77:29:ee:aa:ba:83:24:a4: + 03:4a:a8:0f:e3:b9:e6:7b:c3:a1:c2:a4:aa:c2:26:b9:a7:26: + 38:01:e6:81:77:dd:eb:30:15:40:fa:3f:97:fa:9a:30:39:5d: + a5:8a:0a:2f:75:88:dc:69:55:89:32:a1:04:50:4a:aa:06:fd: + 89:1f:28:2a:0c:cc:76:2f:80:f7:95:f3:6c:76:85:16:bb:c6: + d0:d6:94:41:d8:ae:be:9e:de:d3:d2:5a:e3:84:40:6f:3d:90: + e0:9c:83:86:8a:35:c7:18:2f:7c:29:6e:50:c5:96:4f:40:1d: + 13:d5:1d:57:cf:25:a5:a6:83:de:23:c7:3c:e6:a8:13:54:05: + bf:98:5b:d3:88:02:49:4e:55:f8:5f:1a:fd:25:0b:59:48:ad: + bb:b3:5d:88:16:50:47:06:1b:93:cc:52:ed:36:bc:41:c9:f5: + fc:80:89:1e:cc:77:14:a6:c9:67:6b:e1:57:10:a8:4f:6d:88: + 01:d6:dc:77:80:0b:da:92:52:dc:4a:8d:66:5c:9d:7d:c5:20: + e3:6b:c2:0e:8b:ca:85:e4:d6:35:84:33:05:6e:5c:d0:82:8f: + 28:0a:bd:67:9d:8c:a6:8f:22:7a:4e:60:c0:26:bc:93:ca:f5: + 65:38:b2:38:38:03:3b:b6 diff --git a/MagiskOnWSAOld/cacerts/39698488.0 b/MagiskOnWSAOld/cacerts/39698488.0 new file mode 100644 index 0000000..c06b879 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/39698488.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIID2TCCAsGgAwIBAgIJANyOw2Zo67cgMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO +BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazElMCMGA1UEAwwc +TmV0RnJlZSBTaWduLCBLU0lNIC0gUGFydG5lcjAeFw0xODA0MjYwODIwNTlaFw0y +ODAzMDQwODIwNTlaMIGCMQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw +EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l +dGZyZWUubGluazElMCMGA1UEAwwcTmV0RnJlZSBTaWduLCBLU0lNIC0gUGFydG5l +cjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPHMntK9YDmWRrtYegwY +K4wXPFegP0yyh+ULK2E2aDQkm3Qf8esdYLB032f6BtjSP9OkBALCYa2hgBhxLN/B +ozQeSSaZrol8Jw9eB/D8H0j4uGxvqQWCo1jqczIzWcIMOYz7DVbtWcf9Bnh6nAm4 +fumR6rkR9lgJb6PRcEzgcAp7T/dMm5C70X8jmS42Q1LNBtah2LDx4tPP/PLNDJMA +usTJMvub9ttTdSUViHFtryoPpi9Xf8v0UXnHCLN1SouWQfuzwARwcMxMtKlewOiB +rHTlFGEDtgMk4iXs3gw47J5HYI0s7GrKA0OQ8i3/kozFdvdl1Fb5pqA+GOGHw0JH +x7UCAwEAAaNQME4wHQYDVR0OBBYEFEWCRa1+fLj2mN6Z1YDbIscBUIWrMB8GA1Ud +IwQYMBaAFEWCRa1+fLj2mN6Z1YDbIscBUIWrMAwGA1UdEwQFMAMBAf8wDQYJKoZI +hvcNAQELBQADggEBALLit1Nn8DsZhzVvp3LaWkM6B/cwj/J4PRieAnlXOieblANa +Zk2IHgICyVhau6m9OJVPzja83EthGUkB2Mu0hPYQSbL29n8vMYpz5UmoqYpn78Cb +lH0RLGSNTcMiz/5vDyRllbFZQM1FIikO9Pyjp4WjAGeHzgpZqNY1YDjBlQnGcJiC +pdMCO/KJCXNHDSpZMI0oFNpanURQdNIB30QmWwOdCodAiXK8NBZ6HXrvxo8VkOKg +7P9T6IHq3vpRZ9wpDXYCqDvfdQRurfeTSFl/7U3NB8IxkcTCncQvV+Ry8PY23rZ9 +wpypjLV/3V23/aanygRRmeyGVHbSh9eSfiMBIHc= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + dc:8e:c3:66:68:eb:b7:20 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KSIM - Partner" + Validity + Not Before: Apr 26 08:20:59 2018 GMT + Not After : Mar 4 08:20:59 2028 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, KSIM - Partner" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:f1:cc:9e:d2:bd:60:39:96:46:bb:58:7a:0c:18: + 2b:8c:17:3c:57:a0:3f:4c:b2:87:e5:0b:2b:61:36: + 68:34:24:9b:74:1f:f1:eb:1d:60:b0:74:df:67:fa: + 06:d8:d2:3f:d3:a4:04:02:c2:61:ad:a1:80:18:71: + 2c:df:c1:a3:34:1e:49:26:99:ae:89:7c:27:0f:5e: + 07:f0:fc:1f:48:f8:b8:6c:6f:a9:05:82:a3:58:ea: + 73:32:33:59:c2:0c:39:8c:fb:0d:56:ed:59:c7:fd: + 06:78:7a:9c:09:b8:7e:e9:91:ea:b9:11:f6:58:09: + 6f:a3:d1:70:4c:e0:70:0a:7b:4f:f7:4c:9b:90:bb: + d1:7f:23:99:2e:36:43:52:cd:06:d6:a1:d8:b0:f1: + e2:d3:cf:fc:f2:cd:0c:93:00:ba:c4:c9:32:fb:9b: + f6:db:53:75:25:15:88:71:6d:af:2a:0f:a6:2f:57: + 7f:cb:f4:51:79:c7:08:b3:75:4a:8b:96:41:fb:b3: + c0:04:70:70:cc:4c:b4:a9:5e:c0:e8:81:ac:74:e5: + 14:61:03:b6:03:24:e2:25:ec:de:0c:38:ec:9e:47: + 60:8d:2c:ec:6a:ca:03:43:90:f2:2d:ff:92:8c:c5: + 76:f7:65:d4:56:f9:a6:a0:3e:18:e1:87:c3:42:47: + c7:b5 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 45:82:45:AD:7E:7C:B8:F6:98:DE:99:D5:80:DB:22:C7:01:50:85:AB + X509v3 Authority Key Identifier: + keyid:45:82:45:AD:7E:7C:B8:F6:98:DE:99:D5:80:DB:22:C7:01:50:85:AB + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + b2:e2:b7:53:67:f0:3b:19:87:35:6f:a7:72:da:5a:43:3a:07: + f7:30:8f:f2:78:3d:18:9e:02:79:57:3a:27:9b:94:03:5a:66: + 4d:88:1e:02:02:c9:58:5a:bb:a9:bd:38:95:4f:ce:36:bc:dc: + 4b:61:19:49:01:d8:cb:b4:84:f6:10:49:b2:f6:f6:7f:2f:31: + 8a:73:e5:49:a8:a9:8a:67:ef:c0:9b:94:7d:11:2c:64:8d:4d: + c3:22:cf:fe:6f:0f:24:65:95:b1:59:40:cd:45:22:29:0e:f4: + fc:a3:a7:85:a3:00:67:87:ce:0a:59:a8:d6:35:60:38:c1:95: + 09:c6:70:98:82:a5:d3:02:3b:f2:89:09:73:47:0d:2a:59:30: + 8d:28:14:da:5a:9d:44:50:74:d2:01:df:44:26:5b:03:9d:0a: + 87:40:89:72:bc:34:16:7a:1d:7a:ef:c6:8f:15:90:e2:a0:ec: + ff:53:e8:81:ea:de:fa:51:67:dc:29:0d:76:02:a8:3b:df:75: + 04:6e:ad:f7:93:48:59:7f:ed:4d:cd:07:c2:31:91:c4:c2:9d: + c4:2f:57:e4:72:f0:f6:36:de:b6:7d:c2:9c:a9:8c:b5:7f:dd: + 5d:b7:fd:a6:a7:ca:04:51:99:ec:86:54:76:d2:87:d7:92:7e: + 23:01:20:77 diff --git a/MagiskOnWSAOld/cacerts/3f66ddee.0 b/MagiskOnWSAOld/cacerts/3f66ddee.0 new file mode 100644 index 0000000..edef5b2 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/3f66ddee.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUEwVOrPcQ9DVIGMi4qkZrs70iQnowDQYJKoZIhvcNAQEL +BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSVRDMB4XDTIxMDQxNDE3NTE1M1oXDTMx +MDQxMjE3NTE1M1owdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG +A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm +cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSVRDMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAwncsxkaH7L3LnDC3P6gVbqwWc5ieLHnKtgk8 +AHsHQVuzFbKJikfA5FFdZQoCslPBR83pwzTi2wrnFKzApDdLBrB8NgbAzhimQ0gd +miRe4GdC8/W5WDu97+JnI+AGFGrbJxCzBfxc7hYC/0gTp9y8jWO9241OxuhYjlUf +7fXHqIlXKlz+h/0PPhop82yv5AeMolyGaQ5LnyuDCGZsS1VG+KiMhxQO9rB5pUAr +qHwAJ3UzGqXoMphSyoBYpvNG4R6MGOTvDgSVOZ8CJRbI4Y4/2XRpmXKC4EsKObR5 +OVqm+iCSxX23DCWg/RBEClB6CAadkEFWXtOATtiCP/pPEGywOxFU82ENV/2MEm/w +/HMTLoBiKA8lnq8z1KcPzZ1w8oZk/N+Y/wibuPz+qQJPIW5OiXvNcq2QiVck843v +nZjEEd5GEx5FHAiPe71QBKq55Teb4G2/PeO5v26tUc9z1Nl7AQS7equ/XW3Xe5IT ++HP+VIq/x0hN9fpAbOwL7vnIZO4oMWR5wVXqo8B2vCd+XtHQXeYldzaggTtc026Q +cm/YHaIrexShAWKmfU5MfrGTOrfEgi11aJQTNDZzlR3eodMCkRJmV1wm8LjuJSyz +CVas2kLCAQ0LoT4c1Vp8SC2/5FGZNQ9SHhiqzDESNt9efqr4CF7/1MgTGXASunoH +UBp3KccCAwEAAaNTMFEwHQYDVR0OBBYEFN7AZUcFTTIew+Sve7rVPacztLA/MB8G +A1UdIwQYMBaAFN7AZUcFTTIew+Sve7rVPacztLA/MA8GA1UdEwEB/wQFMAMBAf8w +DQYJKoZIhvcNAQELBQADggIBAKf+3/4Adi0mslhs8N/JONbRaord4GBpqRtQ9OXV +pgyF7f7S/rBFnTcBbyqCSu0EitrDIAZ81rmJ8Cx0ae827v0fkRKwmtIl/G0QgUzd +4uVPe3UuALBjqedhVrfnNGZQvb1jbeTJ9R1u7V95au32fZk+1gHc69eA2NZgQ2kk +sazKnC8Urca3CgmVuuE8EeYcChRCWQ8qiCVKicm9g0tfwdLGIJMsQJPi7lXBmdlI +Gex5ADiNk3G5dIKVt3BqG9KYXBN9mw6RK7LIMGPJR20ydRy5vxPazKQXHaVWnvfU +4Gg7xgjNygMFYuflt6kPfek3HdIo5CASLwzz86dhwqdp0Wun8KMx3wfXu9IArL2p +AkT7z1d3zZWiaaXZ+JSUNcmC8560PVUE3Ygdkpi5AKBkLizmKt7ZuSU4LZvlcl7x +kvu2ZoAFyXh6LOL+UduLCzXVpCKh9rz1cnRkcqbkfdk3pSs+Z6HXT4aZriRqRNR4 +0zaIjLLR93s7rlohRmXUu7uxG0wk6K88H4f8n6IHgZHZCeizY2s7rW6ZMsjuHM4T +8PrEdYR68VKJ4kSpBRyTxlUT4CZzfRaaViEhN52JSSxXUcfpOphO1tDavyeUAR8r +1+Prire6Y6/A0U5mr9gssB2HtBw69FUC6O//foeoc9JLO08dCuDznHs+UtH06hws +NA54 +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 13:05:4e:ac:f7:10:f4:35:48:18:c8:b8:aa:46:6b:b3:bd:22:42:7a + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, ITC" + Validity + Not Before: Apr 14 17:51:53 2021 GMT + Not After : Apr 12 17:51:53 2031 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, ITC" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:c2:77:2c:c6:46:87:ec:bd:cb:9c:30:b7:3f:a8: + 15:6e:ac:16:73:98:9e:2c:79:ca:b6:09:3c:00:7b: + 07:41:5b:b3:15:b2:89:8a:47:c0:e4:51:5d:65:0a: + 02:b2:53:c1:47:cd:e9:c3:34:e2:db:0a:e7:14:ac: + c0:a4:37:4b:06:b0:7c:36:06:c0:ce:18:a6:43:48: + 1d:9a:24:5e:e0:67:42:f3:f5:b9:58:3b:bd:ef:e2: + 67:23:e0:06:14:6a:db:27:10:b3:05:fc:5c:ee:16: + 02:ff:48:13:a7:dc:bc:8d:63:bd:db:8d:4e:c6:e8: + 58:8e:55:1f:ed:f5:c7:a8:89:57:2a:5c:fe:87:fd: + 0f:3e:1a:29:f3:6c:af:e4:07:8c:a2:5c:86:69:0e: + 4b:9f:2b:83:08:66:6c:4b:55:46:f8:a8:8c:87:14: + 0e:f6:b0:79:a5:40:2b:a8:7c:00:27:75:33:1a:a5: + e8:32:98:52:ca:80:58:a6:f3:46:e1:1e:8c:18:e4: + ef:0e:04:95:39:9f:02:25:16:c8:e1:8e:3f:d9:74: + 69:99:72:82:e0:4b:0a:39:b4:79:39:5a:a6:fa:20: + 92:c5:7d:b7:0c:25:a0:fd:10:44:0a:50:7a:08:06: + 9d:90:41:56:5e:d3:80:4e:d8:82:3f:fa:4f:10:6c: + b0:3b:11:54:f3:61:0d:57:fd:8c:12:6f:f0:fc:73: + 13:2e:80:62:28:0f:25:9e:af:33:d4:a7:0f:cd:9d: + 70:f2:86:64:fc:df:98:ff:08:9b:b8:fc:fe:a9:02: + 4f:21:6e:4e:89:7b:cd:72:ad:90:89:57:24:f3:8d: + ef:9d:98:c4:11:de:46:13:1e:45:1c:08:8f:7b:bd: + 50:04:aa:b9:e5:37:9b:e0:6d:bf:3d:e3:b9:bf:6e: + ad:51:cf:73:d4:d9:7b:01:04:bb:7a:ab:bf:5d:6d: + d7:7b:92:13:f8:73:fe:54:8a:bf:c7:48:4d:f5:fa: + 40:6c:ec:0b:ee:f9:c8:64:ee:28:31:64:79:c1:55: + ea:a3:c0:76:bc:27:7e:5e:d1:d0:5d:e6:25:77:36: + a0:81:3b:5c:d3:6e:90:72:6f:d8:1d:a2:2b:7b:14: + a1:01:62:a6:7d:4e:4c:7e:b1:93:3a:b7:c4:82:2d: + 75:68:94:13:34:36:73:95:1d:de:a1:d3:02:91:12: + 66:57:5c:26:f0:b8:ee:25:2c:b3:09:56:ac:da:42: + c2:01:0d:0b:a1:3e:1c:d5:5a:7c:48:2d:bf:e4:51: + 99:35:0f:52:1e:18:aa:cc:31:12:36:df:5e:7e:aa: + f8:08:5e:ff:d4:c8:13:19:70:12:ba:7a:07:50:1a: + 77:29:c7 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + DE:C0:65:47:05:4D:32:1E:C3:E4:AF:7B:BA:D5:3D:A7:33:B4:B0:3F + X509v3 Authority Key Identifier: + keyid:DE:C0:65:47:05:4D:32:1E:C3:E4:AF:7B:BA:D5:3D:A7:33:B4:B0:3F + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + a7:fe:df:fe:00:76:2d:26:b2:58:6c:f0:df:c9:38:d6:d1:6a: + 8a:dd:e0:60:69:a9:1b:50:f4:e5:d5:a6:0c:85:ed:fe:d2:fe: + b0:45:9d:37:01:6f:2a:82:4a:ed:04:8a:da:c3:20:06:7c:d6: + b9:89:f0:2c:74:69:ef:36:ee:fd:1f:91:12:b0:9a:d2:25:fc: + 6d:10:81:4c:dd:e2:e5:4f:7b:75:2e:00:b0:63:a9:e7:61:56: + b7:e7:34:66:50:bd:bd:63:6d:e4:c9:f5:1d:6e:ed:5f:79:6a: + ed:f6:7d:99:3e:d6:01:dc:eb:d7:80:d8:d6:60:43:69:24:b1: + ac:ca:9c:2f:14:ad:c6:b7:0a:09:95:ba:e1:3c:11:e6:1c:0a: + 14:42:59:0f:2a:88:25:4a:89:c9:bd:83:4b:5f:c1:d2:c6:20: + 93:2c:40:93:e2:ee:55:c1:99:d9:48:19:ec:79:00:38:8d:93: + 71:b9:74:82:95:b7:70:6a:1b:d2:98:5c:13:7d:9b:0e:91:2b: + b2:c8:30:63:c9:47:6d:32:75:1c:b9:bf:13:da:cc:a4:17:1d: + a5:56:9e:f7:d4:e0:68:3b:c6:08:cd:ca:03:05:62:e7:e5:b7: + a9:0f:7d:e9:37:1d:d2:28:e4:20:12:2f:0c:f3:f3:a7:61:c2: + a7:69:d1:6b:a7:f0:a3:31:df:07:d7:bb:d2:00:ac:bd:a9:02: + 44:fb:cf:57:77:cd:95:a2:69:a5:d9:f8:94:94:35:c9:82:f3: + 9e:b4:3d:55:04:dd:88:1d:92:98:b9:00:a0:64:2e:2c:e6:2a: + de:d9:b9:25:38:2d:9b:e5:72:5e:f1:92:fb:b6:66:80:05:c9: + 78:7a:2c:e2:fe:51:db:8b:0b:35:d5:a4:22:a1:f6:bc:f5:72: + 74:64:72:a6:e4:7d:d9:37:a5:2b:3e:67:a1:d7:4f:86:99:ae: + 24:6a:44:d4:78:d3:36:88:8c:b2:d1:f7:7b:3b:ae:5a:21:46: + 65:d4:bb:bb:b1:1b:4c:24:e8:af:3c:1f:87:fc:9f:a2:07:81: + 91:d9:09:e8:b3:63:6b:3b:ad:6e:99:32:c8:ee:1c:ce:13:f0: + fa:c4:75:84:7a:f1:52:89:e2:44:a9:05:1c:93:c6:55:13:e0: + 26:73:7d:16:9a:56:21:21:37:9d:89:49:2c:57:51:c7:e9:3a: + 98:4e:d6:d0:da:bf:27:94:01:1f:2b:d7:e3:eb:8a:b7:ba:63: + af:c0:d1:4e:66:af:d8:2c:b0:1d:87:b4:1c:3a:f4:55:02:e8: + ef:ff:7e:87:a8:73:d2:4b:3b:4f:1d:0a:e0:f3:9c:7b:3e:52: + d1:f4:ea:1c:2c:34:0e:78 diff --git a/MagiskOnWSAOld/cacerts/42afec87.0 b/MagiskOnWSAOld/cacerts/42afec87.0 new file mode 100644 index 0000000..77a4e7d --- /dev/null +++ b/MagiskOnWSAOld/cacerts/42afec87.0 @@ -0,0 +1,122 @@ +-----BEGIN CERTIFICATE----- +MIIFxzCCA6+gAwIBAgIJAMOfeHNsvnuxMA0GCSqGSIb3DQEBCwUAMHoxCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMR0wGwYDVQQDDBRO +ZXRGcmVlIFNpZ24gLElCLUlUQzAeFw0xOTEwMjYxOTEwMjNaFw0yOTA5MDMxOTEw +MjNaMHoxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUpl +cnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5r +MR0wGwYDVQQDDBROZXRGcmVlIFNpZ24gLElCLUlUQzCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAPistDj0oOuF1Mtu2VyYOK+O/fhMHQIYg3ZG7HMxIPBp +dSpCeH+3Z6Qi1YSlDkd0sW7C3KqUt1gsJyf2HZLBrCEBBlFtCN/zCdIjo/pelR7q ++qXYr67y980GzZqnlYgGbS3PbthsXfayAQi1LsSR1UXdUg91WgJLFdMgIVsnSq5K +w8re1D+V9KfX1SnmH/WDfzb/ickxryyiieMQV+lNegDhsTqSaHuOowsFNgZkwsoo +c+DAuHfBFn+jWwZMFPDsiWSROsh4rcft172+I4ReR1Cr2JdHzueJQNx8mTcr5COM +e6Hl72K4Kot4G6ohL74GATs6fSP3kcy8UafDSnODAffixZt7S59K9hSqsMVJvTzS +T/pmhrQFS7xACj4TJa/f1t+5LYRe6FdwEcXeHNcfSVVRfPgLdiKFAD5ok3TFBXfO +fsAkpdhdfSSUOBWLuE/l+Ko56enic59JeewwbC322Ihvn+1PaloVINHQTlXJhCFD +CkoizPrm9AFlM2IK+qPN0GSckj2X6Eo/bxFmt6GXsZW8kzoDc4TlclLxoMJB+jJn +H1EH9+h1wWNR9kybBnrnKSGdlapD0OK42H/Ul44uLtNLKN3zpMvYWabSdThYTUqZ +pCg8tXyQj1z/3l12Ka7QIEqkqTHF35MTe0YrDLbKo4N8s1vlkfevcwHeerSI5ts1 +AgMBAAGjUDBOMB0GA1UdDgQWBBSnCGbym3/xoGKcYFbwvP2yTjBbADAfBgNVHSME +GDAWgBSnCGbym3/xoGKcYFbwvP2yTjBbADAMBgNVHRMEBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4ICAQCspY/ayI3Mwvp6nAWpBaLSw/YDWChYAG99prvgCSRYVgwRQGw5 +oZnhYFSZM+Suh0cHKh3tU1nZDpgn/vvqOmf1IPHCI+ZOEY73YZmPlYD3JE2ZJDzO +QdJPwW/07W7XAjCIoLw27C/xJDRpBRCXpqfAfmw8qTrNEsozhX9pzJkCVr6UtYX5 +X5LWY0oX9Y/OY8dGQeGqQNeAMwVyW0pmUs5lmVTzPP4mhWLmqF8MCPf8ULswBfr+ +uWHNGG1u7RAwm8MP4hi1IgT8bVLQJjaLFRV/dUVHDs5dnF0ZnpNnvfoJxCbyMjcR +JWb4yR+31ZNrC+SZobtTcEOnzuaaL5AHGb6gZt0qGOVoykPM4dtlFH3jVrCdvOAA +0QCzjfu6o8Eb2HzdWKKm4Kxl9mlwznQrOCa3jmj6L9g/Y1tetYAnJwrgzZVvrNMV +5bLW1beBvb/Y99z3TNhjqgjv5gBeeN0cJ63k8P/ZuikuNuhCub2Lo8diYhaw2C6o +5hMg+q5U9FML//mXWsD6bHN68XPQEUf43O8BCOeIOyW1fDIX3y9RcwJf2lP4frkH +Eo9RaDUsLWdPVxPvgdVSZUiOxkKJ3CxSJaffrsccNTMcFx/ACzQqn6gxRHPuqK0Y +0Ka6pV5b03zWCT+G6qzidxHjKnwOhKV5r+5nYFzcvPpZijK/RmnSDjWuTQ== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + c3:9f:78:73:6c:be:7b:b1 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,IB-ITC" + Validity + Not Before: Oct 26 19:10:23 2019 GMT + Not After : Sep 3 19:10:23 2029 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign ,IB-ITC" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:f8:ac:b4:38:f4:a0:eb:85:d4:cb:6e:d9:5c:98: + 38:af:8e:fd:f8:4c:1d:02:18:83:76:46:ec:73:31: + 20:f0:69:75:2a:42:78:7f:b7:67:a4:22:d5:84:a5: + 0e:47:74:b1:6e:c2:dc:aa:94:b7:58:2c:27:27:f6: + 1d:92:c1:ac:21:01:06:51:6d:08:df:f3:09:d2:23: + a3:fa:5e:95:1e:ea:fa:a5:d8:af:ae:f2:f7:cd:06: + cd:9a:a7:95:88:06:6d:2d:cf:6e:d8:6c:5d:f6:b2: + 01:08:b5:2e:c4:91:d5:45:dd:52:0f:75:5a:02:4b: + 15:d3:20:21:5b:27:4a:ae:4a:c3:ca:de:d4:3f:95: + f4:a7:d7:d5:29:e6:1f:f5:83:7f:36:ff:89:c9:31: + af:2c:a2:89:e3:10:57:e9:4d:7a:00:e1:b1:3a:92: + 68:7b:8e:a3:0b:05:36:06:64:c2:ca:28:73:e0:c0: + b8:77:c1:16:7f:a3:5b:06:4c:14:f0:ec:89:64:91: + 3a:c8:78:ad:c7:ed:d7:bd:be:23:84:5e:47:50:ab: + d8:97:47:ce:e7:89:40:dc:7c:99:37:2b:e4:23:8c: + 7b:a1:e5:ef:62:b8:2a:8b:78:1b:aa:21:2f:be:06: + 01:3b:3a:7d:23:f7:91:cc:bc:51:a7:c3:4a:73:83: + 01:f7:e2:c5:9b:7b:4b:9f:4a:f6:14:aa:b0:c5:49: + bd:3c:d2:4f:fa:66:86:b4:05:4b:bc:40:0a:3e:13: + 25:af:df:d6:df:b9:2d:84:5e:e8:57:70:11:c5:de: + 1c:d7:1f:49:55:51:7c:f8:0b:76:22:85:00:3e:68: + 93:74:c5:05:77:ce:7e:c0:24:a5:d8:5d:7d:24:94: + 38:15:8b:b8:4f:e5:f8:aa:39:e9:e9:e2:73:9f:49: + 79:ec:30:6c:2d:f6:d8:88:6f:9f:ed:4f:6a:5a:15: + 20:d1:d0:4e:55:c9:84:21:43:0a:4a:22:cc:fa:e6: + f4:01:65:33:62:0a:fa:a3:cd:d0:64:9c:92:3d:97: + e8:4a:3f:6f:11:66:b7:a1:97:b1:95:bc:93:3a:03: + 73:84:e5:72:52:f1:a0:c2:41:fa:32:67:1f:51:07: + f7:e8:75:c1:63:51:f6:4c:9b:06:7a:e7:29:21:9d: + 95:aa:43:d0:e2:b8:d8:7f:d4:97:8e:2e:2e:d3:4b: + 28:dd:f3:a4:cb:d8:59:a6:d2:75:38:58:4d:4a:99: + a4:28:3c:b5:7c:90:8f:5c:ff:de:5d:76:29:ae:d0: + 20:4a:a4:a9:31:c5:df:93:13:7b:46:2b:0c:b6:ca: + a3:83:7c:b3:5b:e5:91:f7:af:73:01:de:7a:b4:88: + e6:db:35 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + A7:08:66:F2:9B:7F:F1:A0:62:9C:60:56:F0:BC:FD:B2:4E:30:5B:00 + X509v3 Authority Key Identifier: + keyid:A7:08:66:F2:9B:7F:F1:A0:62:9C:60:56:F0:BC:FD:B2:4E:30:5B:00 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + ac:a5:8f:da:c8:8d:cc:c2:fa:7a:9c:05:a9:05:a2:d2:c3:f6: + 03:58:28:58:00:6f:7d:a6:bb:e0:09:24:58:56:0c:11:40:6c: + 39:a1:99:e1:60:54:99:33:e4:ae:87:47:07:2a:1d:ed:53:59: + d9:0e:98:27:fe:fb:ea:3a:67:f5:20:f1:c2:23:e6:4e:11:8e: + f7:61:99:8f:95:80:f7:24:4d:99:24:3c:ce:41:d2:4f:c1:6f: + f4:ed:6e:d7:02:30:88:a0:bc:36:ec:2f:f1:24:34:69:05:10: + 97:a6:a7:c0:7e:6c:3c:a9:3a:cd:12:ca:33:85:7f:69:cc:99: + 02:56:be:94:b5:85:f9:5f:92:d6:63:4a:17:f5:8f:ce:63:c7: + 46:41:e1:aa:40:d7:80:33:05:72:5b:4a:66:52:ce:65:99:54: + f3:3c:fe:26:85:62:e6:a8:5f:0c:08:f7:fc:50:bb:30:05:fa: + fe:b9:61:cd:18:6d:6e:ed:10:30:9b:c3:0f:e2:18:b5:22:04: + fc:6d:52:d0:26:36:8b:15:15:7f:75:45:47:0e:ce:5d:9c:5d: + 19:9e:93:67:bd:fa:09:c4:26:f2:32:37:11:25:66:f8:c9:1f: + b7:d5:93:6b:0b:e4:99:a1:bb:53:70:43:a7:ce:e6:9a:2f:90: + 07:19:be:a0:66:dd:2a:18:e5:68:ca:43:cc:e1:db:65:14:7d: + e3:56:b0:9d:bc:e0:00:d1:00:b3:8d:fb:ba:a3:c1:1b:d8:7c: + dd:58:a2:a6:e0:ac:65:f6:69:70:ce:74:2b:38:26:b7:8e:68: + fa:2f:d8:3f:63:5b:5e:b5:80:27:27:0a:e0:cd:95:6f:ac:d3: + 15:e5:b2:d6:d5:b7:81:bd:bf:d8:f7:dc:f7:4c:d8:63:aa:08: + ef:e6:00:5e:78:dd:1c:27:ad:e4:f0:ff:d9:ba:29:2e:36:e8: + 42:b9:bd:8b:a3:c7:62:62:16:b0:d8:2e:a8:e6:13:20:fa:ae: + 54:f4:53:0b:ff:f9:97:5a:c0:fa:6c:73:7a:f1:73:d0:11:47: + f8:dc:ef:01:08:e7:88:3b:25:b5:7c:32:17:df:2f:51:73:02: + 5f:da:53:f8:7e:b9:07:12:8f:51:68:35:2c:2d:67:4f:57:13: + ef:81:d5:52:65:48:8e:c6:42:89:dc:2c:52:25:a7:df:ae:c7: + 1c:35:33:1c:17:1f:c0:0b:34:2a:9f:a8:31:44:73:ee:a8:ad: + 18:d0:a6:ba:a5:5e:5b:d3:7c:d6:09:3f:86:ea:ac:e2:77:11: + e3:2a:7c:0e:84:a5:79:af:ee:67:60:5c:dc:bc:fa:59:8a:32: + bf:46:69:d2:0e:35:ae:4d diff --git a/MagiskOnWSAOld/cacerts/482e0622.0 b/MagiskOnWSAOld/cacerts/482e0622.0 new file mode 100644 index 0000000..7a0616d --- /dev/null +++ b/MagiskOnWSAOld/cacerts/482e0622.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIJAJvSq+oh8F6+MA0GCSqGSIb3DQEBCwUAMHgxCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMRswGQYDVQQDDBJO +ZXRGcmVlIFNpZ24gLCAwMTkwHhcNMTYwNDIxMTAyNzA1WhcNMjYwMjI4MTAyNzA1 +WjB4MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1 +c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEb +MBkGA1UEAwwSTmV0RnJlZSBTaWduICwgMDE5MIIBIjANBgkqhkiG9w0BAQEFAAOC +AQ8AMIIBCgKCAQEA5Wq8zAqW7KGANXfbg9Ck8rx4nPjSkerlSPS/yNEVa/L8HulD +q/GVMRaPaL+RqI4GQt6LeQAmj1FZS01rQQITNRsg6MhNrPhENhg48rjFNIxuEnMv +IfydKGGU2mFXcMtQ9IoRSe4OYE3CKDG0pYzfXhh+TW0H4KKqjO6mjPmMcNjbstpK +vOPFg6Xu5em6hvtQCKC0V551WKWmNQiHOpwRdVIdbWBv3S5xiO5tZVigGpEJ1gLe +8W+Zn2ozcpvh+m38QSZ0A1DVP5Te/7q9L3+BPub8kz3C6GnNK547ucM5HBmOzNwN +luZHVUsehCLc0I965Wd4ZRUXXeeo7BibjRI6mQIDAQABo1AwTjAdBgNVHQ4EFgQU +tLpJD3JS6YPg7VQl2gKrPJByEycwHwYDVR0jBBgwFoAUtLpJD3JS6YPg7VQl2gKr +PJByEycwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAQEAThhIvkN/HsFG +7jaHl8yyH3IyvHX+LrItJyhRaQ4xALzGllGCLWvN15e2SWITdXncd4nMU7VRVG1k +CiX6H55Jh1U/DmZHmUI2HBhf/2liFNKXKDOeHg4u+FIzgzuIc0z+RvwPpw9IVLio +Pe6lbaIc5+80kO/mwJwQZoEaqTyL1Ujn69cosiZpiYF3xtxkfBWEWe7XkLunLqqV +DoMEGMq+MUxO+Jngv0j/7dSi1/1eovNnrV4YeF2Flvq2xY1aCKO/cocv5v7w5wEm +8fMFQwKcT7QcCx+/nkx3r0tDHxO7og7xr8petCK+ULqwL28ha4U0l+kLF0ZRiG5H +Ni6Hj6Oi9A== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 9b:d2:ab:ea:21:f0:5e:be + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , 019" + Validity + Not Before: Apr 21 10:27:05 2016 GMT + Not After : Feb 28 10:27:05 2026 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , 019" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:e5:6a:bc:cc:0a:96:ec:a1:80:35:77:db:83:d0: + a4:f2:bc:78:9c:f8:d2:91:ea:e5:48:f4:bf:c8:d1: + 15:6b:f2:fc:1e:e9:43:ab:f1:95:31:16:8f:68:bf: + 91:a8:8e:06:42:de:8b:79:00:26:8f:51:59:4b:4d: + 6b:41:02:13:35:1b:20:e8:c8:4d:ac:f8:44:36:18: + 38:f2:b8:c5:34:8c:6e:12:73:2f:21:fc:9d:28:61: + 94:da:61:57:70:cb:50:f4:8a:11:49:ee:0e:60:4d: + c2:28:31:b4:a5:8c:df:5e:18:7e:4d:6d:07:e0:a2: + aa:8c:ee:a6:8c:f9:8c:70:d8:db:b2:da:4a:bc:e3: + c5:83:a5:ee:e5:e9:ba:86:fb:50:08:a0:b4:57:9e: + 75:58:a5:a6:35:08:87:3a:9c:11:75:52:1d:6d:60: + 6f:dd:2e:71:88:ee:6d:65:58:a0:1a:91:09:d6:02: + de:f1:6f:99:9f:6a:33:72:9b:e1:fa:6d:fc:41:26: + 74:03:50:d5:3f:94:de:ff:ba:bd:2f:7f:81:3e:e6: + fc:93:3d:c2:e8:69:cd:2b:9e:3b:b9:c3:39:1c:19: + 8e:cc:dc:0d:96:e6:47:55:4b:1e:84:22:dc:d0:8f: + 7a:e5:67:78:65:15:17:5d:e7:a8:ec:18:9b:8d:12: + 3a:99 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + B4:BA:49:0F:72:52:E9:83:E0:ED:54:25:DA:02:AB:3C:90:72:13:27 + X509v3 Authority Key Identifier: + keyid:B4:BA:49:0F:72:52:E9:83:E0:ED:54:25:DA:02:AB:3C:90:72:13:27 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 4e:18:48:be:43:7f:1e:c1:46:ee:36:87:97:cc:b2:1f:72:32: + bc:75:fe:2e:b2:2d:27:28:51:69:0e:31:00:bc:c6:96:51:82: + 2d:6b:cd:d7:97:b6:49:62:13:75:79:dc:77:89:cc:53:b5:51: + 54:6d:64:0a:25:fa:1f:9e:49:87:55:3f:0e:66:47:99:42:36: + 1c:18:5f:ff:69:62:14:d2:97:28:33:9e:1e:0e:2e:f8:52:33: + 83:3b:88:73:4c:fe:46:fc:0f:a7:0f:48:54:b8:a8:3d:ee:a5: + 6d:a2:1c:e7:ef:34:90:ef:e6:c0:9c:10:66:81:1a:a9:3c:8b: + d5:48:e7:eb:d7:28:b2:26:69:89:81:77:c6:dc:64:7c:15:84: + 59:ee:d7:90:bb:a7:2e:aa:95:0e:83:04:18:ca:be:31:4c:4e: + f8:99:e0:bf:48:ff:ed:d4:a2:d7:fd:5e:a2:f3:67:ad:5e:18: + 78:5d:85:96:fa:b6:c5:8d:5a:08:a3:bf:72:87:2f:e6:fe:f0: + e7:01:26:f1:f3:05:43:02:9c:4f:b4:1c:0b:1f:bf:9e:4c:77: + af:4b:43:1f:13:bb:a2:0e:f1:af:ca:5e:b4:22:be:50:ba:b0: + 2f:6f:21:6b:85:34:97:e9:0b:17:46:51:88:6e:47:36:2e:87: + 8f:a3:a2:f4 diff --git a/MagiskOnWSAOld/cacerts/4a3b190e.0 b/MagiskOnWSAOld/cacerts/4a3b190e.0 new file mode 100644 index 0000000..f06fdef --- /dev/null +++ b/MagiskOnWSAOld/cacerts/4a3b190e.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUWVzvad617aEkkFZ5UDDiq93NTVkwDQYJKoZIhvcNAQEL +BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDk5MB4XDTIxMDQwNzIyMTQ0NFoXDTMx +MDQwNTIyMTQ0NFowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG +A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm +cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDk5MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAsnHF+C8rBiEzeZJ88nKVAZEh6SwSrNwoRNLV +gr69fj9mU7Tpgu8dRP+1q4MaZDTdXw+pqbvo/R9Jzc/YCN1BvrvL5ULCfNOwoCFa +MyLhNQ/zXMwfWiCeWr5qJ0rdpyWrGvXrurYIcbwzgAxpQA5krBUyZI/QJIjWi6PG +FZya7YrvzcvEG3Mbzl+E/G12FDuT5NVuNQIBE+mR9ZOFPrZsEDJb7SoZoIic7p1k +mrHwPMv3w07QIHOwFq9e8t/c7cFMEqOUC2/+Uw73J2MdYLX5vyTDtChAM0h5M00F +14tO7t46ofZ+GHj8w0kNoFk5Z1eNIXMasbs77fCN6LYHN1seuKvDh0p4ZdDLdObo +Y2XT8n+I7O2tY5PIaNoWDuQpKwUplY0WQFca7iKyy8ajojJPOMt40SaR7NtBvwl3 +fYRPHvX57tQB55vpcTq7uVdaeEq3/G19wRVgDLs/MIFaPTV31RyOsrUzIc944aN8 +YDBG4Mw6uUyVG3wxq9/QgZliW+wNj77gSMFZsj7aA0FqaDpQ4hdoGoehKP+B6y10 +ZVOqe/sgPnZBW/KW+3uwOP/Bq809Q+G/JUQR23bhqCYht7zbi+f5pOmKXijAjnMh +Bs7fnxzc0YMNHYQ3RF9VNiteC8/+8rMgXIjq94cF8vAkm/kHT4qyNIzLVu/oUkrp +UYFd0YMCAwEAAaNTMFEwHQYDVR0OBBYEFHpftzbYdX1vM6czqDzA2ABKkMMzMB8G +A1UdIwQYMBaAFHpftzbYdX1vM6czqDzA2ABKkMMzMA8GA1UdEwEB/wQFMAMBAf8w +DQYJKoZIhvcNAQELBQADggIBACntHyKEjJaGqezp/SYdmvC6Gw0HVEahudZJTlM8 +uWDCINdJFSSRMnAHC57qeKU+4AuN2ZO0BnRyVSK1XY0rlS0ZeNidRg2g1PgplJ3I +4KPKiq0LxllnPtSJiuNp81LazUj5iyqsHCPDE0pZVu1729kTfL2a2Ah3yaB5LxiX +6xMuZurI3LscOcfrN3oUH0lvlvt4hjmpi90UJ/Wtd+fllyw1sqInQfv87MOkoFzy +u9Rif2ZiBwMw32K9X7q/w7/iw77G1F9u/gbogP7CgDkKCxeyl5rLwkJKgV0g93xg +bonHdOmKlHYLMBuEx1CYdvAZcEwPdeiNuKbj1l8iJ4+PeYD2hRo+NmL/8Kjj3XTr +Xymah0bNsJFYda7W4plL6DzjvrMjwkLq1IeLDZLvL0iNk0wfe3GY7ojvqcY55XEo +TdEHiKqck8uTxzH/U5AGh26nbOxAe6AYNmbgmiJxWZXqYeqEmTx9B6Zk61RdFTem +gml5hqvUjM97JmSi/ORF31uP6+Jv35oQEo4YjeDD6ACDiDBjfyjPVMGVAxf6IRSt +s9O6OoYKZO09gaRuHXLSY9kfXSGsrV5mqbFr0r2C8n+u8kGjkILaCabil7cMBUfz +x95VUUI9AUunwF2ERMuTgfR1CE4gDJcUTU7Wf1o3xEpvCgQ6ffYzBXkHjeOTaZkI +zlA/ +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 59:5c:ef:69:de:b5:ed:a1:24:90:56:79:50:30:e2:ab:dd:cd:4d:59 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 099" + Validity + Not Before: Apr 7 22:14:44 2021 GMT + Not After : Apr 5 22:14:44 2031 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 099" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:b2:71:c5:f8:2f:2b:06:21:33:79:92:7c:f2:72: + 95:01:91:21:e9:2c:12:ac:dc:28:44:d2:d5:82:be: + bd:7e:3f:66:53:b4:e9:82:ef:1d:44:ff:b5:ab:83: + 1a:64:34:dd:5f:0f:a9:a9:bb:e8:fd:1f:49:cd:cf: + d8:08:dd:41:be:bb:cb:e5:42:c2:7c:d3:b0:a0:21: + 5a:33:22:e1:35:0f:f3:5c:cc:1f:5a:20:9e:5a:be: + 6a:27:4a:dd:a7:25:ab:1a:f5:eb:ba:b6:08:71:bc: + 33:80:0c:69:40:0e:64:ac:15:32:64:8f:d0:24:88: + d6:8b:a3:c6:15:9c:9a:ed:8a:ef:cd:cb:c4:1b:73: + 1b:ce:5f:84:fc:6d:76:14:3b:93:e4:d5:6e:35:02: + 01:13:e9:91:f5:93:85:3e:b6:6c:10:32:5b:ed:2a: + 19:a0:88:9c:ee:9d:64:9a:b1:f0:3c:cb:f7:c3:4e: + d0:20:73:b0:16:af:5e:f2:df:dc:ed:c1:4c:12:a3: + 94:0b:6f:fe:53:0e:f7:27:63:1d:60:b5:f9:bf:24: + c3:b4:28:40:33:48:79:33:4d:05:d7:8b:4e:ee:de: + 3a:a1:f6:7e:18:78:fc:c3:49:0d:a0:59:39:67:57: + 8d:21:73:1a:b1:bb:3b:ed:f0:8d:e8:b6:07:37:5b: + 1e:b8:ab:c3:87:4a:78:65:d0:cb:74:e6:e8:63:65: + d3:f2:7f:88:ec:ed:ad:63:93:c8:68:da:16:0e:e4: + 29:2b:05:29:95:8d:16:40:57:1a:ee:22:b2:cb:c6: + a3:a2:32:4f:38:cb:78:d1:26:91:ec:db:41:bf:09: + 77:7d:84:4f:1e:f5:f9:ee:d4:01:e7:9b:e9:71:3a: + bb:b9:57:5a:78:4a:b7:fc:6d:7d:c1:15:60:0c:bb: + 3f:30:81:5a:3d:35:77:d5:1c:8e:b2:b5:33:21:cf: + 78:e1:a3:7c:60:30:46:e0:cc:3a:b9:4c:95:1b:7c: + 31:ab:df:d0:81:99:62:5b:ec:0d:8f:be:e0:48:c1: + 59:b2:3e:da:03:41:6a:68:3a:50:e2:17:68:1a:87: + a1:28:ff:81:eb:2d:74:65:53:aa:7b:fb:20:3e:76: + 41:5b:f2:96:fb:7b:b0:38:ff:c1:ab:cd:3d:43:e1: + bf:25:44:11:db:76:e1:a8:26:21:b7:bc:db:8b:e7: + f9:a4:e9:8a:5e:28:c0:8e:73:21:06:ce:df:9f:1c: + dc:d1:83:0d:1d:84:37:44:5f:55:36:2b:5e:0b:cf: + fe:f2:b3:20:5c:88:ea:f7:87:05:f2:f0:24:9b:f9: + 07:4f:8a:b2:34:8c:cb:56:ef:e8:52:4a:e9:51:81: + 5d:d1:83 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 7A:5F:B7:36:D8:75:7D:6F:33:A7:33:A8:3C:C0:D8:00:4A:90:C3:33 + X509v3 Authority Key Identifier: + keyid:7A:5F:B7:36:D8:75:7D:6F:33:A7:33:A8:3C:C0:D8:00:4A:90:C3:33 + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 29:ed:1f:22:84:8c:96:86:a9:ec:e9:fd:26:1d:9a:f0:ba:1b: + 0d:07:54:46:a1:b9:d6:49:4e:53:3c:b9:60:c2:20:d7:49:15: + 24:91:32:70:07:0b:9e:ea:78:a5:3e:e0:0b:8d:d9:93:b4:06: + 74:72:55:22:b5:5d:8d:2b:95:2d:19:78:d8:9d:46:0d:a0:d4: + f8:29:94:9d:c8:e0:a3:ca:8a:ad:0b:c6:59:67:3e:d4:89:8a: + e3:69:f3:52:da:cd:48:f9:8b:2a:ac:1c:23:c3:13:4a:59:56: + ed:7b:db:d9:13:7c:bd:9a:d8:08:77:c9:a0:79:2f:18:97:eb: + 13:2e:66:ea:c8:dc:bb:1c:39:c7:eb:37:7a:14:1f:49:6f:96: + fb:78:86:39:a9:8b:dd:14:27:f5:ad:77:e7:e5:97:2c:35:b2: + a2:27:41:fb:fc:ec:c3:a4:a0:5c:f2:bb:d4:62:7f:66:62:07: + 03:30:df:62:bd:5f:ba:bf:c3:bf:e2:c3:be:c6:d4:5f:6e:fe: + 06:e8:80:fe:c2:80:39:0a:0b:17:b2:97:9a:cb:c2:42:4a:81: + 5d:20:f7:7c:60:6e:89:c7:74:e9:8a:94:76:0b:30:1b:84:c7: + 50:98:76:f0:19:70:4c:0f:75:e8:8d:b8:a6:e3:d6:5f:22:27: + 8f:8f:79:80:f6:85:1a:3e:36:62:ff:f0:a8:e3:dd:74:eb:5f: + 29:9a:87:46:cd:b0:91:58:75:ae:d6:e2:99:4b:e8:3c:e3:be: + b3:23:c2:42:ea:d4:87:8b:0d:92:ef:2f:48:8d:93:4c:1f:7b: + 71:98:ee:88:ef:a9:c6:39:e5:71:28:4d:d1:07:88:aa:9c:93: + cb:93:c7:31:ff:53:90:06:87:6e:a7:6c:ec:40:7b:a0:18:36: + 66:e0:9a:22:71:59:95:ea:61:ea:84:99:3c:7d:07:a6:64:eb: + 54:5d:15:37:a6:82:69:79:86:ab:d4:8c:cf:7b:26:64:a2:fc: + e4:45:df:5b:8f:eb:e2:6f:df:9a:10:12:8e:18:8d:e0:c3:e8: + 00:83:88:30:63:7f:28:cf:54:c1:95:03:17:fa:21:14:ad:b3: + d3:ba:3a:86:0a:64:ed:3d:81:a4:6e:1d:72:d2:63:d9:1f:5d: + 21:ac:ad:5e:66:a9:b1:6b:d2:bd:82:f2:7f:ae:f2:41:a3:90: + 82:da:09:a6:e2:97:b7:0c:05:47:f3:c7:de:55:51:42:3d:01: + 4b:a7:c0:5d:84:44:cb:93:81:f4:75:08:4e:20:0c:97:14:4d: + 4e:d6:7f:5a:37:c4:4a:6f:0a:04:3a:7d:f6:33:05:79:07:8d: + e3:93:69:99:08:ce:50:3f diff --git a/MagiskOnWSAOld/cacerts/4eba579e.0 b/MagiskOnWSAOld/cacerts/4eba579e.0 new file mode 100644 index 0000000..4696206 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/4eba579e.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUERKcb5NZIK+7kIzZeeqoTynDxo8wDQYJKoZIhvcNAQEL +BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSE9UMB4XDTIyMDkxNDE1MjE0MVoXDTMy +MDkxMTE1MjE0MVowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG +A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm +cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgSE9UMIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEAtAAmmLun08jzoWMLyC/fzCu9aES7fLWCU2Ur +u3sntuHLDJabIvU0p16hCMC3MVOTKFAKOJ9A+REyOyewQLJ+0Oi0rOPA6jk/+Srj +l69AwzkJYFli7ORClC/N1E2aKWj9evZHHdXeRMs2pklM9eRR+wYQUTQ5bkd0/Lsj +81QDUSzmgX/qkq3Dc4AiSt0gR+rd+c70y8IjVnBSwmHspyGv8Ve9DdRR3U01H8pM +gYpQVrN8BVfRNVpQgpjlKQZKQM1CcLFqUq++fG/QnhgcVuygGnqWAjNCkfbWi7Hq +IMYK5cyA3oLYiBH8gE0Js4ypf/jtFNBTeE7aiNbF6YgD6kPvlBIQ3nWHcvYz83mc +/yI8kDPHPBmNnCTxa46AYRBt3ungIKchSoIP2pfUDcwPI8C2o79ninvYxtwg2FH6 +Mbc/hJqaGrTsFgw9rGitniZ4GHVPftW89O3xBENP9QAHimwbG8BCiwuweDu2xPsR +AJJ+a9bFRucDIaacOzrCjuzbXFJIy3KOgghe8V5mYypLHq8/pcDWczL59iWZit+l +2gt+wYIU3HxzC2AqzlBFadI10IlLFolaGyH9hJd5U0kYEXVp2IQV/6PGVhvmJI9y +9n+MqReibwUQVfuEg+l0gblqC2eTGnab5AVoCK/4cK+zxE0+wBpK70X4NtYLf0BO +WItUFK8CAwEAAaNTMFEwHQYDVR0OBBYEFG+/JFFhEinGuN7gWnOZxSMerGmZMB8G +A1UdIwQYMBaAFG+/JFFhEinGuN7gWnOZxSMerGmZMA8GA1UdEwEB/wQFMAMBAf8w +DQYJKoZIhvcNAQELBQADggIBAEVxrI5JmqQi5DhRAVIet41hFWrEIiJwYMbRYhRK +NpW1U4X7OiOm+/8v68oMkh3KHwbpIo48/egUDgv+F7Dzz5NhRgjXQbIW7ixO5+i+ +7rW+177oJVvKtpD2NAp4o0Nty826AntDzyulSs7KvoE+Ifwq7iUTNwPmeOBpd7N2 +WCZzpjOhhbuG4yYE+K76nZ34C8+7w3488iL8e5RwJQeuvXnEy4NiFzZmsoYqPUBd +HaZIQePxXI3jYi1YdckED3GZwo9VBZkarA5GekBvF9B2z/eKoHfnRrHDuQmBSAY3 ++GBfqG6WNpDisKSj4YgeNXkTOZjOCyl/a3nwpLUawxAJyPjtgzc2vRDg3eVHUJNN +HIp60XVRQwwCTH6dHJiHsDCb2/6DgZzcUW20a4u8+zgDN+M+V8DYGjeTN/2X18br +kGN67L+n2krGQmVM4vu+42uOx0SJR/x10D8io7Vl9khWG3pB3GBoQSHivenzNPAW +BfJJG4keyG3EAVPHmyHpjP36NXe8rmimOgVVGDujEz+je+w9L4YQgQg5VfVp3+Pu +Wd7BbSsig+Vqgw1EDksMScLh34ZwniR1w2QL86XT5ExYNXQdo18fVYV0/OyzXKZx +8qnaParnjvguOl0YG4aXh0+72lEeIHXpPMmy6TDDqAOgNlrVbjviBw/J4Nzlty9s +bXLk +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 11:12:9c:6f:93:59:20:af:bb:90:8c:d9:79:ea:a8:4f:29:c3:c6:8f + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HOT" + Validity + Not Before: Sep 14 15:21:41 2022 GMT + Not After : Sep 11 15:21:41 2032 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HOT" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:b4:00:26:98:bb:a7:d3:c8:f3:a1:63:0b:c8:2f: + df:cc:2b:bd:68:44:bb:7c:b5:82:53:65:2b:bb:7b: + 27:b6:e1:cb:0c:96:9b:22:f5:34:a7:5e:a1:08:c0: + b7:31:53:93:28:50:0a:38:9f:40:f9:11:32:3b:27: + b0:40:b2:7e:d0:e8:b4:ac:e3:c0:ea:39:3f:f9:2a: + e3:97:af:40:c3:39:09:60:59:62:ec:e4:42:94:2f: + cd:d4:4d:9a:29:68:fd:7a:f6:47:1d:d5:de:44:cb: + 36:a6:49:4c:f5:e4:51:fb:06:10:51:34:39:6e:47: + 74:fc:bb:23:f3:54:03:51:2c:e6:81:7f:ea:92:ad: + c3:73:80:22:4a:dd:20:47:ea:dd:f9:ce:f4:cb:c2: + 23:56:70:52:c2:61:ec:a7:21:af:f1:57:bd:0d:d4: + 51:dd:4d:35:1f:ca:4c:81:8a:50:56:b3:7c:05:57: + d1:35:5a:50:82:98:e5:29:06:4a:40:cd:42:70:b1: + 6a:52:af:be:7c:6f:d0:9e:18:1c:56:ec:a0:1a:7a: + 96:02:33:42:91:f6:d6:8b:b1:ea:20:c6:0a:e5:cc: + 80:de:82:d8:88:11:fc:80:4d:09:b3:8c:a9:7f:f8: + ed:14:d0:53:78:4e:da:88:d6:c5:e9:88:03:ea:43: + ef:94:12:10:de:75:87:72:f6:33:f3:79:9c:ff:22: + 3c:90:33:c7:3c:19:8d:9c:24:f1:6b:8e:80:61:10: + 6d:de:e9:e0:20:a7:21:4a:82:0f:da:97:d4:0d:cc: + 0f:23:c0:b6:a3:bf:67:8a:7b:d8:c6:dc:20:d8:51: + fa:31:b7:3f:84:9a:9a:1a:b4:ec:16:0c:3d:ac:68: + ad:9e:26:78:18:75:4f:7e:d5:bc:f4:ed:f1:04:43: + 4f:f5:00:07:8a:6c:1b:1b:c0:42:8b:0b:b0:78:3b: + b6:c4:fb:11:00:92:7e:6b:d6:c5:46:e7:03:21:a6: + 9c:3b:3a:c2:8e:ec:db:5c:52:48:cb:72:8e:82:08: + 5e:f1:5e:66:63:2a:4b:1e:af:3f:a5:c0:d6:73:32: + f9:f6:25:99:8a:df:a5:da:0b:7e:c1:82:14:dc:7c: + 73:0b:60:2a:ce:50:45:69:d2:35:d0:89:4b:16:89: + 5a:1b:21:fd:84:97:79:53:49:18:11:75:69:d8:84: + 15:ff:a3:c6:56:1b:e6:24:8f:72:f6:7f:8c:a9:17: + a2:6f:05:10:55:fb:84:83:e9:74:81:b9:6a:0b:67: + 93:1a:76:9b:e4:05:68:08:af:f8:70:af:b3:c4:4d: + 3e:c0:1a:4a:ef:45:f8:36:d6:0b:7f:40:4e:58:8b: + 54:14:af + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 6F:BF:24:51:61:12:29:C6:B8:DE:E0:5A:73:99:C5:23:1E:AC:69:99 + X509v3 Authority Key Identifier: + keyid:6F:BF:24:51:61:12:29:C6:B8:DE:E0:5A:73:99:C5:23:1E:AC:69:99 + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 45:71:ac:8e:49:9a:a4:22:e4:38:51:01:52:1e:b7:8d:61:15: + 6a:c4:22:22:70:60:c6:d1:62:14:4a:36:95:b5:53:85:fb:3a: + 23:a6:fb:ff:2f:eb:ca:0c:92:1d:ca:1f:06:e9:22:8e:3c:fd: + e8:14:0e:0b:fe:17:b0:f3:cf:93:61:46:08:d7:41:b2:16:ee: + 2c:4e:e7:e8:be:ee:b5:be:d7:be:e8:25:5b:ca:b6:90:f6:34: + 0a:78:a3:43:6d:cb:cd:ba:02:7b:43:cf:2b:a5:4a:ce:ca:be: + 81:3e:21:fc:2a:ee:25:13:37:03:e6:78:e0:69:77:b3:76:58: + 26:73:a6:33:a1:85:bb:86:e3:26:04:f8:ae:fa:9d:9d:f8:0b: + cf:bb:c3:7e:3c:f2:22:fc:7b:94:70:25:07:ae:bd:79:c4:cb: + 83:62:17:36:66:b2:86:2a:3d:40:5d:1d:a6:48:41:e3:f1:5c: + 8d:e3:62:2d:58:75:c9:04:0f:71:99:c2:8f:55:05:99:1a:ac: + 0e:46:7a:40:6f:17:d0:76:cf:f7:8a:a0:77:e7:46:b1:c3:b9: + 09:81:48:06:37:f8:60:5f:a8:6e:96:36:90:e2:b0:a4:a3:e1: + 88:1e:35:79:13:39:98:ce:0b:29:7f:6b:79:f0:a4:b5:1a:c3: + 10:09:c8:f8:ed:83:37:36:bd:10:e0:dd:e5:47:50:93:4d:1c: + 8a:7a:d1:75:51:43:0c:02:4c:7e:9d:1c:98:87:b0:30:9b:db: + fe:83:81:9c:dc:51:6d:b4:6b:8b:bc:fb:38:03:37:e3:3e:57: + c0:d8:1a:37:93:37:fd:97:d7:c6:eb:90:63:7a:ec:bf:a7:da: + 4a:c6:42:65:4c:e2:fb:be:e3:6b:8e:c7:44:89:47:fc:75:d0: + 3f:22:a3:b5:65:f6:48:56:1b:7a:41:dc:60:68:41:21:e2:bd: + e9:f3:34:f0:16:05:f2:49:1b:89:1e:c8:6d:c4:01:53:c7:9b: + 21:e9:8c:fd:fa:35:77:bc:ae:68:a6:3a:05:55:18:3b:a3:13: + 3f:a3:7b:ec:3d:2f:86:10:81:08:39:55:f5:69:df:e3:ee:59: + de:c1:6d:2b:22:83:e5:6a:83:0d:44:0e:4b:0c:49:c2:e1:df: + 86:70:9e:24:75:c3:64:0b:f3:a5:d3:e4:4c:58:35:74:1d:a3: + 5f:1f:55:85:74:fc:ec:b3:5c:a6:71:f2:a9:da:3d:aa:e7:8e: + f8:2e:3a:5d:18:1b:86:97:87:4f:bb:da:51:1e:20:75:e9:3c: + c9:b2:e9:30:c3:a8:03:a0:36:5a:d5:6e:3b:e2:07:0f:c9:e0: + dc:e5:b7:2f:6c:6d:72:e4 diff --git a/MagiskOnWSAOld/cacerts/6207c6f5.0 b/MagiskOnWSAOld/cacerts/6207c6f5.0 new file mode 100644 index 0000000..9a2b8c6 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/6207c6f5.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIF0zCCA7ugAwIBAgIUaH5U+ogY8MmdlevWZGKqnge9GKQwDQYJKoZIhvcNAQEL +BQAweTELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +HDAaBgNVBAMME05ldEZyZWUgU2lnbiwgQmV6ZXEwHhcNMjIwNjAxMTk1NTIxWhcN +MzIwNTI5MTk1NTIxWjB5MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIw +EAYDVQQHDAlKZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5l +dGZyZWUubGluazEcMBoGA1UEAwwTTmV0RnJlZSBTaWduLCBCZXplcTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBANipYPeTK3GJ9BpwEpEGE/hzB8MlD+Rs +hw4tTWWRtZC0ok9kY/jmWJSzRMP4jKbOPtKkiUNNd3l2SvgvrHPuMz/R9B728wK2 +ZYS295KTRDSgM51e+gCfziUXR36mCCvjuLmRdVbsXrAJjAtlPN1SD9eFDtMx6Pm8 +LfSK6HyVF4Igafq8el6x9lSdfGqWWxWjuBaO6ooNUoIORYOLOQezMHRG1vfabx58 +aEKZSN+bvEPmf4m1RXu4ynevE8aEQBHsr/4X7sU7hRXXrxLkS5qJSeqbfS+tp36a +HaVA8APRradFLvZa9ejAli8WAwwdw2r6AATQ3mmuIcaZUeC954HPgUwaz97wE2zo +GMbsX7bE9oEyLRT8sDV+dvN8MEXvt2XWx4icHLuycqxOGzZKkjmP73qMdeZw+mxW +xBk8H7pCWBQsJ5z0xxtir5kBVUqPSdmAOsz3FLhRyW8JB09JurZc3czxaCrVT7oS +MGIj+koFIYlbQqudwBTPF3hUBlgvS3PA339YHD6H8Fncj20tb2MxQ6jb5IDnFvY/ +dc36sSauiUCzwPJM1FHDmaJDQcj7r2EArWDxZrWL1Zt99xf3yQQFUWh8+BMOba9M +x1E6XWfhVGlhS9yks0DwOKktO+rZwO3fVTVprWvnzFOWmpHAzvLxfiS5blseebAM +3+S4PGQiCHJBAgMBAAGjUzBRMB0GA1UdDgQWBBSFbv9UhQwCMY5hdYElGT2uCS2g +PTAfBgNVHSMEGDAWgBSFbv9UhQwCMY5hdYElGT2uCS2gPTAPBgNVHRMBAf8EBTAD +AQH/MA0GCSqGSIb3DQEBCwUAA4ICAQB5FmjWgu11dysbxacJO5uLYQ/UVipSFAsl +s/x04NRHona1UpOLGt6y70Q4XjkLnabeYc+x5g1UUr6BzDjXb4CG/FLjGhNP4zPE +xL9bUXpVThFHyO1LrsnbSLfIJZZ4CRvPmx0vbK0G9p23PTNCv7RFqDfqfA1P0z/g +X1n8SatOauOefsM94AihODwoOWLFsl14YnYp99V1f7ChrqZ4GKzgb0M+COJLOAIV +Ur6qaa5eqKf8jIw08xbZy19K4jgOEGIDifmoAtYEpCwIzH9VPeDqdcaBGuc+uZUp +9mxgIbJk0qgaPmu25TM12x66YeZZvPgeOycl2dzMTIwPvw3TfNzrio7tPRk5GEcT +3KzngfFpvQyros/kYQMKMPYL5hssRae4aDGr9sS1D4LR31hhopQ0+w4y/+kQJDbB +JCkUP87ae6mtNW4sCXaStWaZZzomonEAxNkh4sfBMT5wVsglU236k/yN5n7Ib/mL +yGUBs6lzMdcScG+Ath4cwtxNnC3m2g8w8/MYAf/+wBL/A8r2GAPTqLvfjtEzH621 +b1Yw4//rSJg5ZpO1IGBFIVBFImBHOpHrjigPEJECiUS3y0jKUNyymo66QqRHwl1Y +71gRskGUK6tyfO45ZiLH8r8m7NR1wXBmAAmtOtdzi5H2ahVRNrW/zrfS7ttASJB5 +20p8M55zUw== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 68:7e:54:fa:88:18:f0:c9:9d:95:eb:d6:64:62:aa:9e:07:bd:18:a4 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, Bezeq" + Validity + Not Before: Jun 1 19:55:21 2022 GMT + Not After : May 29 19:55:21 2032 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, Bezeq" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:d8:a9:60:f7:93:2b:71:89:f4:1a:70:12:91:06: + 13:f8:73:07:c3:25:0f:e4:6c:87:0e:2d:4d:65:91: + b5:90:b4:a2:4f:64:63:f8:e6:58:94:b3:44:c3:f8: + 8c:a6:ce:3e:d2:a4:89:43:4d:77:79:76:4a:f8:2f: + ac:73:ee:33:3f:d1:f4:1e:f6:f3:02:b6:65:84:b6: + f7:92:93:44:34:a0:33:9d:5e:fa:00:9f:ce:25:17: + 47:7e:a6:08:2b:e3:b8:b9:91:75:56:ec:5e:b0:09: + 8c:0b:65:3c:dd:52:0f:d7:85:0e:d3:31:e8:f9:bc: + 2d:f4:8a:e8:7c:95:17:82:20:69:fa:bc:7a:5e:b1: + f6:54:9d:7c:6a:96:5b:15:a3:b8:16:8e:ea:8a:0d: + 52:82:0e:45:83:8b:39:07:b3:30:74:46:d6:f7:da: + 6f:1e:7c:68:42:99:48:df:9b:bc:43:e6:7f:89:b5: + 45:7b:b8:ca:77:af:13:c6:84:40:11:ec:af:fe:17: + ee:c5:3b:85:15:d7:af:12:e4:4b:9a:89:49:ea:9b: + 7d:2f:ad:a7:7e:9a:1d:a5:40:f0:03:d1:ad:a7:45: + 2e:f6:5a:f5:e8:c0:96:2f:16:03:0c:1d:c3:6a:fa: + 00:04:d0:de:69:ae:21:c6:99:51:e0:bd:e7:81:cf: + 81:4c:1a:cf:de:f0:13:6c:e8:18:c6:ec:5f:b6:c4: + f6:81:32:2d:14:fc:b0:35:7e:76:f3:7c:30:45:ef: + b7:65:d6:c7:88:9c:1c:bb:b2:72:ac:4e:1b:36:4a: + 92:39:8f:ef:7a:8c:75:e6:70:fa:6c:56:c4:19:3c: + 1f:ba:42:58:14:2c:27:9c:f4:c7:1b:62:af:99:01: + 55:4a:8f:49:d9:80:3a:cc:f7:14:b8:51:c9:6f:09: + 07:4f:49:ba:b6:5c:dd:cc:f1:68:2a:d5:4f:ba:12: + 30:62:23:fa:4a:05:21:89:5b:42:ab:9d:c0:14:cf: + 17:78:54:06:58:2f:4b:73:c0:df:7f:58:1c:3e:87: + f0:59:dc:8f:6d:2d:6f:63:31:43:a8:db:e4:80:e7: + 16:f6:3f:75:cd:fa:b1:26:ae:89:40:b3:c0:f2:4c: + d4:51:c3:99:a2:43:41:c8:fb:af:61:00:ad:60:f1: + 66:b5:8b:d5:9b:7d:f7:17:f7:c9:04:05:51:68:7c: + f8:13:0e:6d:af:4c:c7:51:3a:5d:67:e1:54:69:61: + 4b:dc:a4:b3:40:f0:38:a9:2d:3b:ea:d9:c0:ed:df: + 55:35:69:ad:6b:e7:cc:53:96:9a:91:c0:ce:f2:f1: + 7e:24:b9:6e:5b:1e:79:b0:0c:df:e4:b8:3c:64:22: + 08:72:41 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 85:6E:FF:54:85:0C:02:31:8E:61:75:81:25:19:3D:AE:09:2D:A0:3D + X509v3 Authority Key Identifier: + keyid:85:6E:FF:54:85:0C:02:31:8E:61:75:81:25:19:3D:AE:09:2D:A0:3D + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 79:16:68:d6:82:ed:75:77:2b:1b:c5:a7:09:3b:9b:8b:61:0f: + d4:56:2a:52:14:0b:25:b3:fc:74:e0:d4:47:a2:76:b5:52:93: + 8b:1a:de:b2:ef:44:38:5e:39:0b:9d:a6:de:61:cf:b1:e6:0d: + 54:52:be:81:cc:38:d7:6f:80:86:fc:52:e3:1a:13:4f:e3:33: + c4:c4:bf:5b:51:7a:55:4e:11:47:c8:ed:4b:ae:c9:db:48:b7: + c8:25:96:78:09:1b:cf:9b:1d:2f:6c:ad:06:f6:9d:b7:3d:33: + 42:bf:b4:45:a8:37:ea:7c:0d:4f:d3:3f:e0:5f:59:fc:49:ab: + 4e:6a:e3:9e:7e:c3:3d:e0:08:a1:38:3c:28:39:62:c5:b2:5d: + 78:62:76:29:f7:d5:75:7f:b0:a1:ae:a6:78:18:ac:e0:6f:43: + 3e:08:e2:4b:38:02:15:52:be:aa:69:ae:5e:a8:a7:fc:8c:8c: + 34:f3:16:d9:cb:5f:4a:e2:38:0e:10:62:03:89:f9:a8:02:d6: + 04:a4:2c:08:cc:7f:55:3d:e0:ea:75:c6:81:1a:e7:3e:b9:95: + 29:f6:6c:60:21:b2:64:d2:a8:1a:3e:6b:b6:e5:33:35:db:1e: + ba:61:e6:59:bc:f8:1e:3b:27:25:d9:dc:cc:4c:8c:0f:bf:0d: + d3:7c:dc:eb:8a:8e:ed:3d:19:39:18:47:13:dc:ac:e7:81:f1: + 69:bd:0c:ab:a2:cf:e4:61:03:0a:30:f6:0b:e6:1b:2c:45:a7: + b8:68:31:ab:f6:c4:b5:0f:82:d1:df:58:61:a2:94:34:fb:0e: + 32:ff:e9:10:24:36:c1:24:29:14:3f:ce:da:7b:a9:ad:35:6e: + 2c:09:76:92:b5:66:99:67:3a:26:a2:71:00:c4:d9:21:e2:c7: + c1:31:3e:70:56:c8:25:53:6d:fa:93:fc:8d:e6:7e:c8:6f:f9: + 8b:c8:65:01:b3:a9:73:31:d7:12:70:6f:80:b6:1e:1c:c2:dc: + 4d:9c:2d:e6:da:0f:30:f3:f3:18:01:ff:fe:c0:12:ff:03:ca: + f6:18:03:d3:a8:bb:df:8e:d1:33:1f:ad:b5:6f:56:30:e3:ff: + eb:48:98:39:66:93:b5:20:60:45:21:50:45:22:60:47:3a:91: + eb:8e:28:0f:10:91:02:89:44:b7:cb:48:ca:50:dc:b2:9a:8e: + ba:42:a4:47:c2:5d:58:ef:58:11:b2:41:94:2b:ab:72:7c:ee: + 39:66:22:c7:f2:bf:26:ec:d4:75:c1:70:66:00:09:ad:3a:d7: + 73:8b:91:f6:6a:15:51:36:b5:bf:ce:b7:d2:ee:db:40:48:90: + 79:db:4a:7c:33:9e:73:53 diff --git a/MagiskOnWSAOld/cacerts/66bbb532.0 b/MagiskOnWSAOld/cacerts/66bbb532.0 new file mode 100644 index 0000000..94182aa --- /dev/null +++ b/MagiskOnWSAOld/cacerts/66bbb532.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIID4TCCAsmgAwIBAgIJAIsaro78xwDlMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYD +VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO +BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEpMCcGA1UEAwwg +TmV0RnJlZSBTaWduICwgS29zaGVyU2ltIENlbGxjb20wHhcNMTcwMjA5MTYzNzIz +WhcNMjYxMjE5MTYzNzIzWjCBhjELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFl +bDESMBAGA1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQL +DAxuZXRmcmVlLmxpbmsxKTAnBgNVBAMMIE5ldEZyZWUgU2lnbiAsIEtvc2hlclNp +bSBDZWxsY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsGzn8/an +SokAGXPd8XvBEyNCEby+4MQNa/osraC7ORKNk3C42b0cfPhf8pUpj66L69EcgmhS +veZyrZYlDGnUh7/2faF0EwtxffN1UK5qzEFfd2YICHXl81pVvifbmZgB3/c64KFm ++2CsyWZ2XTGPzD9zIrJdHFGgHdVu/UDDj0oLU2G0v0npse7au/gKNSxx1StzP3N6 +uOo6Ih3KB74FCF0hc2aiJpfE9ECinSeHHF39TMzEJNvC4+fuTOb1odYsNP83otp7 +KbLjCQsCMomxQlQTy3vfTvCA8f2BSILo4U6j/BHyhZriyjvhnPTlonWBrLHU5bd+ +HNeiIeucPgRz+QIDAQABo1AwTjAdBgNVHQ4EFgQUf3PgrlRBo19oBK4M47swRdXg +pAQwHwYDVR0jBBgwFoAUf3PgrlRBo19oBK4M47swRdXgpAQwDAYDVR0TBAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAQEAUIdlD+x9CFJXvKgmW6FAuAV3w6JG8zz4MwQO +5aXbs3g8ioIJ6KUBmtzcQhM/NLVr/oXIXPZxXWI7tP3f5N3iLVwrh6krKOU+jSna +HXK0BYXPivp8rRJX56gUQqLUlS94l3iAHX8N+qY2D0hSj4H044R5mWsuYxrtdAr2 +glaz6luXOo+NMH2uRnWYX/uAAEpbQLPlztVsoV4LsZ2C54dK7neQ+A6qRL/IZwJE +bYeRwWYoK7OY/BNLj/Vx25IzZYlU/lP8qa6UcUWmPeyIPJqPvjdO95zEodX2iuWE +cuc5pUqSu5/xxosDx3vWpFhPaU5gq9WEN5uPgFd96yHoFKWvtg== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 8b:1a:ae:8e:fc:c7:00:e5 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , KosherSim Cellcom" + Validity + Not Before: Feb 9 16:37:23 2017 GMT + Not After : Dec 19 16:37:23 2026 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , KosherSim Cellcom" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:b0:6c:e7:f3:f6:a7:4a:89:00:19:73:dd:f1:7b: + c1:13:23:42:11:bc:be:e0:c4:0d:6b:fa:2c:ad:a0: + bb:39:12:8d:93:70:b8:d9:bd:1c:7c:f8:5f:f2:95: + 29:8f:ae:8b:eb:d1:1c:82:68:52:bd:e6:72:ad:96: + 25:0c:69:d4:87:bf:f6:7d:a1:74:13:0b:71:7d:f3: + 75:50:ae:6a:cc:41:5f:77:66:08:08:75:e5:f3:5a: + 55:be:27:db:99:98:01:df:f7:3a:e0:a1:66:fb:60: + ac:c9:66:76:5d:31:8f:cc:3f:73:22:b2:5d:1c:51: + a0:1d:d5:6e:fd:40:c3:8f:4a:0b:53:61:b4:bf:49: + e9:b1:ee:da:bb:f8:0a:35:2c:71:d5:2b:73:3f:73: + 7a:b8:ea:3a:22:1d:ca:07:be:05:08:5d:21:73:66: + a2:26:97:c4:f4:40:a2:9d:27:87:1c:5d:fd:4c:cc: + c4:24:db:c2:e3:e7:ee:4c:e6:f5:a1:d6:2c:34:ff: + 37:a2:da:7b:29:b2:e3:09:0b:02:32:89:b1:42:54: + 13:cb:7b:df:4e:f0:80:f1:fd:81:48:82:e8:e1:4e: + a3:fc:11:f2:85:9a:e2:ca:3b:e1:9c:f4:e5:a2:75: + 81:ac:b1:d4:e5:b7:7e:1c:d7:a2:21:eb:9c:3e:04: + 73:f9 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 7F:73:E0:AE:54:41:A3:5F:68:04:AE:0C:E3:BB:30:45:D5:E0:A4:04 + X509v3 Authority Key Identifier: + keyid:7F:73:E0:AE:54:41:A3:5F:68:04:AE:0C:E3:BB:30:45:D5:E0:A4:04 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 50:87:65:0f:ec:7d:08:52:57:bc:a8:26:5b:a1:40:b8:05:77: + c3:a2:46:f3:3c:f8:33:04:0e:e5:a5:db:b3:78:3c:8a:82:09: + e8:a5:01:9a:dc:dc:42:13:3f:34:b5:6b:fe:85:c8:5c:f6:71: + 5d:62:3b:b4:fd:df:e4:dd:e2:2d:5c:2b:87:a9:2b:28:e5:3e: + 8d:29:da:1d:72:b4:05:85:cf:8a:fa:7c:ad:12:57:e7:a8:14: + 42:a2:d4:95:2f:78:97:78:80:1d:7f:0d:fa:a6:36:0f:48:52: + 8f:81:f4:e3:84:79:99:6b:2e:63:1a:ed:74:0a:f6:82:56:b3: + ea:5b:97:3a:8f:8d:30:7d:ae:46:75:98:5f:fb:80:00:4a:5b: + 40:b3:e5:ce:d5:6c:a1:5e:0b:b1:9d:82:e7:87:4a:ee:77:90: + f8:0e:aa:44:bf:c8:67:02:44:6d:87:91:c1:66:28:2b:b3:98: + fc:13:4b:8f:f5:71:db:92:33:65:89:54:fe:53:fc:a9:ae:94: + 71:45:a6:3d:ec:88:3c:9a:8f:be:37:4e:f7:9c:c4:a1:d5:f6: + 8a:e5:84:72:e7:39:a5:4a:92:bb:9f:f1:c6:8b:03:c7:7b:d6: + a4:58:4f:69:4e:60:ab:d5:84:37:9b:8f:80:57:7d:eb:21:e8: + 14:a5:af:b6 diff --git a/MagiskOnWSAOld/cacerts/820d5f23.0 b/MagiskOnWSAOld/cacerts/820d5f23.0 new file mode 100644 index 0000000..d46e09c --- /dev/null +++ b/MagiskOnWSAOld/cacerts/820d5f23.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIIDzTCCArWgAwIBAgIJAM/zhl8GVAzYMA0GCSqGSIb3DQEBCwUAMH0xCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMSAwHgYDVQQDDBdO +ZXRGcmVlIFNpZ24sIEhvdE1vYmlsZTAeFw0xNjA3MTMxMTM5MzZaFw0yNjA1MjIx +MTM5MzZaMH0xCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcM +CUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5s +aW5rMSAwHgYDVQQDDBdOZXRGcmVlIFNpZ24sIEhvdE1vYmlsZTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAK36bGJixwgMX5twmmteI3j+8JfR5XdOSN6N +MLLsQuR7/LUXMbCBB5WNDGoF823rDbiIZwuqoH4JVN3I4BNitl0QzB2wlTLzEkMr +Db9sA6owahQwhh+m1yNovM3luSlt7eJS8yWUMNgp8gPxWV1j3RBGASHRKuzU2btg +I7WZoD5vNX2VrdrN+TxbRsrRHbMZhmv2Q8v4vNf1bwma64VyT+VDALx0V6HSjSnP +XMBvY0qtsqQILt53nTrtbTyat1oJaAcaeF/oSi+ibcRqRD0RQjPokD7ZBEIzx7b4 +5YD4bsdr9WbSMjaa6DMDC0Zr/1MavLJu5DqO9hMljKfxb5HMcB8CAwEAAaNQME4w +HQYDVR0OBBYEFLRpqEWnXat8cUzbZ2r+LdeBMj+mMB8GA1UdIwQYMBaAFLRpqEWn +Xat8cUzbZ2r+LdeBMj+mMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEB +ADXTOVrk1BbXQiCbPUX0eWOskyu+Nq4uJONFhrhBiKwG/leMd+fKjtbj5avVh81B +1NmHojzlls/kWcI4bjfqkKpv1eXKlrRA334BoLxGj7u4dbzgNfCNhE96lA6qIW+6 +m6BkpYESXc06RX41RVWzYyOJX6foSv8aqdo1aICy+LvBtXewKQixDbGFNqSmSLB5 +UHcrwjgOK8aWXvaJe2mJAV91HKhfgSFkFsokrVveaP985ej3s59si4htKbI9Qqx0 +ZBMJdfklpqI1fDdL4cDNssX6kNus+gnJzP0tQW00DMH6V6OIqYrL/CJRJx4634yT +ddo6lzNM9hZhrtlM/czjLn8= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + cf:f3:86:5f:06:54:0c:d8 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HotMobile" + Validity + Not Before: Jul 13 11:39:36 2016 GMT + Not After : May 22 11:39:36 2026 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, HotMobile" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:ad:fa:6c:62:62:c7:08:0c:5f:9b:70:9a:6b:5e: + 23:78:fe:f0:97:d1:e5:77:4e:48:de:8d:30:b2:ec: + 42:e4:7b:fc:b5:17:31:b0:81:07:95:8d:0c:6a:05: + f3:6d:eb:0d:b8:88:67:0b:aa:a0:7e:09:54:dd:c8: + e0:13:62:b6:5d:10:cc:1d:b0:95:32:f3:12:43:2b: + 0d:bf:6c:03:aa:30:6a:14:30:86:1f:a6:d7:23:68: + bc:cd:e5:b9:29:6d:ed:e2:52:f3:25:94:30:d8:29: + f2:03:f1:59:5d:63:dd:10:46:01:21:d1:2a:ec:d4: + d9:bb:60:23:b5:99:a0:3e:6f:35:7d:95:ad:da:cd: + f9:3c:5b:46:ca:d1:1d:b3:19:86:6b:f6:43:cb:f8: + bc:d7:f5:6f:09:9a:eb:85:72:4f:e5:43:00:bc:74: + 57:a1:d2:8d:29:cf:5c:c0:6f:63:4a:ad:b2:a4:08: + 2e:de:77:9d:3a:ed:6d:3c:9a:b7:5a:09:68:07:1a: + 78:5f:e8:4a:2f:a2:6d:c4:6a:44:3d:11:42:33:e8: + 90:3e:d9:04:42:33:c7:b6:f8:e5:80:f8:6e:c7:6b: + f5:66:d2:32:36:9a:e8:33:03:0b:46:6b:ff:53:1a: + bc:b2:6e:e4:3a:8e:f6:13:25:8c:a7:f1:6f:91:cc: + 70:1f + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + B4:69:A8:45:A7:5D:AB:7C:71:4C:DB:67:6A:FE:2D:D7:81:32:3F:A6 + X509v3 Authority Key Identifier: + keyid:B4:69:A8:45:A7:5D:AB:7C:71:4C:DB:67:6A:FE:2D:D7:81:32:3F:A6 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 35:d3:39:5a:e4:d4:16:d7:42:20:9b:3d:45:f4:79:63:ac:93: + 2b:be:36:ae:2e:24:e3:45:86:b8:41:88:ac:06:fe:57:8c:77: + e7:ca:8e:d6:e3:e5:ab:d5:87:cd:41:d4:d9:87:a2:3c:e5:96: + cf:e4:59:c2:38:6e:37:ea:90:aa:6f:d5:e5:ca:96:b4:40:df: + 7e:01:a0:bc:46:8f:bb:b8:75:bc:e0:35:f0:8d:84:4f:7a:94: + 0e:aa:21:6f:ba:9b:a0:64:a5:81:12:5d:cd:3a:45:7e:35:45: + 55:b3:63:23:89:5f:a7:e8:4a:ff:1a:a9:da:35:68:80:b2:f8: + bb:c1:b5:77:b0:29:08:b1:0d:b1:85:36:a4:a6:48:b0:79:50: + 77:2b:c2:38:0e:2b:c6:96:5e:f6:89:7b:69:89:01:5f:75:1c: + a8:5f:81:21:64:16:ca:24:ad:5b:de:68:ff:7c:e5:e8:f7:b3: + 9f:6c:8b:88:6d:29:b2:3d:42:ac:74:64:13:09:75:f9:25:a6: + a2:35:7c:37:4b:e1:c0:cd:b2:c5:fa:90:db:ac:fa:09:c9:cc: + fd:2d:41:6d:34:0c:c1:fa:57:a3:88:a9:8a:cb:fc:22:51:27: + 1e:3a:df:8c:93:75:da:3a:97:33:4c:f6:16:61:ae:d9:4c:fd: + cc:e3:2e:7f diff --git a/MagiskOnWSAOld/cacerts/85c0c4be.0 b/MagiskOnWSAOld/cacerts/85c0c4be.0 new file mode 100644 index 0000000..af799a1 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/85c0c4be.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIUGSL6iZ8Kz/CT3Q1kiYoKK75gxfwwDQYJKoZIhvcNAQEL +BQAwfjELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +ITAfBgNVBAMMGE5ldEZyZWUgU2lnbiwgSUIgUGFydG5lcjAeFw0yMDA0MjYxNDAz +MzlaFw0zMDA0MjQxNDAzMzlaMH4xCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3Jh +ZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UE +CwwMbmV0ZnJlZS5saW5rMSEwHwYDVQQDDBhOZXRGcmVlIFNpZ24sIElCIFBhcnRu +ZXIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCtj4vt55TGvmidDKVj +ktTyTHDKIJShq72REaYGfQhweEEBzMRJzprw8spOtL7LsayfyV7On/9NY7X6p79a +QFJUM/lGMwj5E5gWWDJt5yEe/LEJTHpeZUXIBu78cJR9pZsUP+iWvqj2TgJ2GwoD +WDdSmDWTxY93AP+4BL2421hA/NPjY8xkP+hofupC02WgKIODrC/72FrScQnxnMkD +1Hu9Yw4W4kX8FAhWR3YeXRE0gWV93JTWdBOEzM+7DKn9pdpNZdYXBu2UysNTwrsH +2c31R86et7o2NRhRup5GDBIgaVAi+RjmnTi7GIj5Js3IhIe9hOW5hoSwhNTZiCT+ +Ks4zVvdvebA/1XMiQI2HQMQTtLrysYIYjM28YsEWob2JqYQ4eACcmEq2ZZJNMDj4 +yGSdJVqZBwnwbK6PmmzQc9n7y+hSUHgg/6x7lPGRfG2XsIhrDrK8nuEU4mRSRlGG +OEL0dC7GY8ywAI30E5nLPtk6vcToaWAz12rC1waI5xyYKgcP8SdOg70SwQj/2/lO +QC5Bzl7581/XKbbLdrsQBXiJ7CN83z046Bs4TqBEqlTzKV257CwLXIW2Kd4nydx+ +UuGEqeoNDIIxZCapRQ83mKGJmtGraLN73TLAfZJ2xq3xhMlXejR5JB4JGFmAhGBt +/Qr3MBAM9Lrn2vD0buihAn5D/QIDAQABo1MwUTAdBgNVHQ4EFgQUxgogJN2fOSCA ++Q1tBXEiLQz1clcwHwYDVR0jBBgwFoAUxgogJN2fOSCA+Q1tBXEiLQz1clcwDwYD +VR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAFslaPHqfvOxKDjLHgbNB +Vu+m9/uLfMCMAxo85z8hayEIt7/HEzf03CQji/U3OMJPeah7POKlFkDE9tHxgPmD +Xmw7/gKPolJaPHS9hv484Fd7yu47lKuskYxW3FP9b1s7woO5YmCE8hVSWMLHRz1h +Sr7Mx8zj9/4nT1TF+ZI85TySCjhq+toQCFVmS/1gv2fqz2UoTJVebdJOwNgyiyjB ++y3ekjcXWIVZEsVqNDjM/6C+Uz1LJm+qzAoNOdVc7EIgheUTsNr3te/Zgv0Cg8Eo +d4V+EyaQkElbXKqcafZngxjQqyvEVoHocGDTvf+B3DLaqCIldEyWyusGsC1tyoJR +vQrkwco1VDWl89o3cPOgalI8M7W1nCougNt7PCNO/RjsdOncJE9UUphLHXO1nIgn +mGTVq3ZurDFaIodUNVV4YB+mmJ87ZjIbs8uQUvzEcQnoCmDBg4ABk+e4CJJhzLNP +XW+0L8W37ZyHl5Fx2JPWnZuGhZ214ODQJZ1T164G9dfkULHmd3xxc1hGEfvdybHd +sDIISA+7z1CJXtZYLJ5noOQG7VbrG0KUvO7U897/miXmF6C1rYwpTVlKhEQ8cChU +JnZrCImXL32d8iOzSU4EbLy8Nq89T3fcnWKstGbKpzJdzJ8bJUnveoEEGbo3rP72 +86H7Aq+q7qWFjZT/vp9J2Is= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 19:22:fa:89:9f:0a:cf:f0:93:dd:0d:64:89:8a:0a:2b:be:60:c5:fc + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, IB Partner" + Validity + Not Before: Apr 26 14:03:39 2020 GMT + Not After : Apr 24 14:03:39 2030 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, IB Partner" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:ad:8f:8b:ed:e7:94:c6:be:68:9d:0c:a5:63:92: + d4:f2:4c:70:ca:20:94:a1:ab:bd:91:11:a6:06:7d: + 08:70:78:41:01:cc:c4:49:ce:9a:f0:f2:ca:4e:b4: + be:cb:b1:ac:9f:c9:5e:ce:9f:ff:4d:63:b5:fa:a7: + bf:5a:40:52:54:33:f9:46:33:08:f9:13:98:16:58: + 32:6d:e7:21:1e:fc:b1:09:4c:7a:5e:65:45:c8:06: + ee:fc:70:94:7d:a5:9b:14:3f:e8:96:be:a8:f6:4e: + 02:76:1b:0a:03:58:37:52:98:35:93:c5:8f:77:00: + ff:b8:04:bd:b8:db:58:40:fc:d3:e3:63:cc:64:3f: + e8:68:7e:ea:42:d3:65:a0:28:83:83:ac:2f:fb:d8: + 5a:d2:71:09:f1:9c:c9:03:d4:7b:bd:63:0e:16:e2: + 45:fc:14:08:56:47:76:1e:5d:11:34:81:65:7d:dc: + 94:d6:74:13:84:cc:cf:bb:0c:a9:fd:a5:da:4d:65: + d6:17:06:ed:94:ca:c3:53:c2:bb:07:d9:cd:f5:47: + ce:9e:b7:ba:36:35:18:51:ba:9e:46:0c:12:20:69: + 50:22:f9:18:e6:9d:38:bb:18:88:f9:26:cd:c8:84: + 87:bd:84:e5:b9:86:84:b0:84:d4:d9:88:24:fe:2a: + ce:33:56:f7:6f:79:b0:3f:d5:73:22:40:8d:87:40: + c4:13:b4:ba:f2:b1:82:18:8c:cd:bc:62:c1:16:a1: + bd:89:a9:84:38:78:00:9c:98:4a:b6:65:92:4d:30: + 38:f8:c8:64:9d:25:5a:99:07:09:f0:6c:ae:8f:9a: + 6c:d0:73:d9:fb:cb:e8:52:50:78:20:ff:ac:7b:94: + f1:91:7c:6d:97:b0:88:6b:0e:b2:bc:9e:e1:14:e2: + 64:52:46:51:86:38:42:f4:74:2e:c6:63:cc:b0:00: + 8d:f4:13:99:cb:3e:d9:3a:bd:c4:e8:69:60:33:d7: + 6a:c2:d7:06:88:e7:1c:98:2a:07:0f:f1:27:4e:83: + bd:12:c1:08:ff:db:f9:4e:40:2e:41:ce:5e:f9:f3: + 5f:d7:29:b6:cb:76:bb:10:05:78:89:ec:23:7c:df: + 3d:38:e8:1b:38:4e:a0:44:aa:54:f3:29:5d:b9:ec: + 2c:0b:5c:85:b6:29:de:27:c9:dc:7e:52:e1:84:a9: + ea:0d:0c:82:31:64:26:a9:45:0f:37:98:a1:89:9a: + d1:ab:68:b3:7b:dd:32:c0:7d:92:76:c6:ad:f1:84: + c9:57:7a:34:79:24:1e:09:18:59:80:84:60:6d:fd: + 0a:f7:30:10:0c:f4:ba:e7:da:f0:f4:6e:e8:a1:02: + 7e:43:fd + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + C6:0A:20:24:DD:9F:39:20:80:F9:0D:6D:05:71:22:2D:0C:F5:72:57 + X509v3 Authority Key Identifier: + keyid:C6:0A:20:24:DD:9F:39:20:80:F9:0D:6D:05:71:22:2D:0C:F5:72:57 + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 16:c9:5a:3c:7a:9f:bc:ec:4a:0e:32:c7:81:b3:41:56:ef:a6: + f7:fb:8b:7c:c0:8c:03:1a:3c:e7:3f:21:6b:21:08:b7:bf:c7: + 13:37:f4:dc:24:23:8b:f5:37:38:c2:4f:79:a8:7b:3c:e2:a5: + 16:40:c4:f6:d1:f1:80:f9:83:5e:6c:3b:fe:02:8f:a2:52:5a: + 3c:74:bd:86:fe:3c:e0:57:7b:ca:ee:3b:94:ab:ac:91:8c:56: + dc:53:fd:6f:5b:3b:c2:83:b9:62:60:84:f2:15:52:58:c2:c7: + 47:3d:61:4a:be:cc:c7:cc:e3:f7:fe:27:4f:54:c5:f9:92:3c: + e5:3c:92:0a:38:6a:fa:da:10:08:55:66:4b:fd:60:bf:67:ea: + cf:65:28:4c:95:5e:6d:d2:4e:c0:d8:32:8b:28:c1:fb:2d:de: + 92:37:17:58:85:59:12:c5:6a:34:38:cc:ff:a0:be:53:3d:4b: + 26:6f:aa:cc:0a:0d:39:d5:5c:ec:42:20:85:e5:13:b0:da:f7: + b5:ef:d9:82:fd:02:83:c1:28:77:85:7e:13:26:90:90:49:5b: + 5c:aa:9c:69:f6:67:83:18:d0:ab:2b:c4:56:81:e8:70:60:d3: + bd:ff:81:dc:32:da:a8:22:25:74:4c:96:ca:eb:06:b0:2d:6d: + ca:82:51:bd:0a:e4:c1:ca:35:54:35:a5:f3:da:37:70:f3:a0: + 6a:52:3c:33:b5:b5:9c:2a:2e:80:db:7b:3c:23:4e:fd:18:ec: + 74:e9:dc:24:4f:54:52:98:4b:1d:73:b5:9c:88:27:98:64:d5: + ab:76:6e:ac:31:5a:22:87:54:35:55:78:60:1f:a6:98:9f:3b: + 66:32:1b:b3:cb:90:52:fc:c4:71:09:e8:0a:60:c1:83:80:01: + 93:e7:b8:08:92:61:cc:b3:4f:5d:6f:b4:2f:c5:b7:ed:9c:87: + 97:91:71:d8:93:d6:9d:9b:86:85:9d:b5:e0:e0:d0:25:9d:53: + d7:ae:06:f5:d7:e4:50:b1:e6:77:7c:71:73:58:46:11:fb:dd: + c9:b1:dd:b0:32:08:48:0f:bb:cf:50:89:5e:d6:58:2c:9e:67: + a0:e4:06:ed:56:eb:1b:42:94:bc:ee:d4:f3:de:ff:9a:25:e6: + 17:a0:b5:ad:8c:29:4d:59:4a:84:44:3c:70:28:54:26:76:6b: + 08:89:97:2f:7d:9d:f2:23:b3:49:4e:04:6c:bc:bc:36:af:3d: + 4f:77:dc:9d:62:ac:b4:66:ca:a7:32:5d:cc:9f:1b:25:49:ef: + 7a:81:04:19:ba:37:ac:fe:f6:f3:a1:fb:02:af:aa:ee:a5:85: + 8d:94:ff:be:9f:49:d8:8b diff --git a/MagiskOnWSAOld/cacerts/a4f6f3c0.0 b/MagiskOnWSAOld/cacerts/a4f6f3c0.0 new file mode 100644 index 0000000..2fd1a40 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/a4f6f3c0.0 @@ -0,0 +1,123 @@ +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUJd8EwuvF4INK2P9FOVcNOxdqsSgwDQYJKoZIhvcNAQEL +BQAwdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAGA1UEBwwJSmVy +dXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRmcmVlLmxpbmsx +GjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDE4MB4XDTIxMDUwNDIwNTMxMFoXDTMx +MDUwMjIwNTMxMFowdzELMAkGA1UEBhMCSUwxDzANBgNVBAgMBmlzcmFlbDESMBAG +A1UEBwwJSmVydXNhbGVtMRAwDgYDVQQKDAdOZXRGcmVlMRUwEwYDVQQLDAxuZXRm +cmVlLmxpbmsxGjAYBgNVBAMMEU5ldEZyZWUgU2lnbiwgMDE4MIICIjANBgkqhkiG +9w0BAQEFAAOCAg8AMIICCgKCAgEA1kkqmmuy9XZw0PVC6wwg0BJFs0zWn3IgUYmd +8UXeqfT5Uii/PM4as/Wf3EG7ByRE03njCVTFussYEE3lbHEsjzvcCiDxOkG2HoYf +G69Bt+jxKPPNFIjom3SB3l6S57UyiSHk5TaS/x7NpjUhVeMde/McBqW7FU/eEYgx +PBaqkQNNG0Wqtl6XybwSdsh0vGJ92wzlTwrKhVpAbesu4L9OYVleZtdW7/xtoB1J +aMygZmSEV7v6mW7dMzJdRk8zHCssLJJOgGno/5R/i6/ezGeKu31/FtcpGOw6o8Jc +yBvAOV4oV/S992Y+Uxll33dYNTg7ABYNtYYd864K51T03HJi/pedNd2ALu0Oqb/I +04dYt8ZRVK1I+K1b7LsYzVIM/5YWRS3uCNAfQMsfy/4ECD/IgbXVGI+Z0kHrElgV +uYrOglYrAuFrtG1kV4hoPaGsFjzxM/wrdXaJii0EvbLASeX6TDWOP+5xTZhBesTs +6/gAR/DzOQpdqEIn5v/+foKgaCtBHdFPbayFoywg/Dq9rjbq+7pOiS9XzywHgOZU +Ussq+F0TB0nJ7NkN2Jx5DiAaehOZJpZNWADVheoUehfLGQDA3ffhwi+tdANkgOMc +w6igzwbo1PIrZNcoXDpG+3Dpo8J1+X+nXe4HOKh8K5TbdR9xmUAag3sKZZ5wPjyt +bAq/II0CAwEAAaNTMFEwHQYDVR0OBBYEFK0REcJzkVprhzsKvxjI9w+vlYTiMB8G +A1UdIwQYMBaAFK0REcJzkVprhzsKvxjI9w+vlYTiMA8GA1UdEwEB/wQFMAMBAf8w +DQYJKoZIhvcNAQELBQADggIBALe8h93x+yAkpIeVRcOoNpSnpNiDc7/bY2fJxxWy +Yo4TaT9J+dhlbdedvzgbm0NUcWCKKA0vmR+/PsKYwdJcko1e3kdKTmWGwEBPDRJC +kCGn2ZuXeJokRzyAVKceU7DPHAq7n/C5IJ9ivTMEKYc5SS6WxdxBYePf+tXmPGGi +vYrL1hEgZ+oUx1rXRz7Spr8lUFc7PPvjfPLD9uRoO5K6rdkeHiChuY45Sky/A012 +FRhyKR7liZZPtl6QzuLiIDVNcAoJL3SYeaQMmNt6kupQmMcey1RnOwzq56UGOxMr +RSUwgiz56PtQwx6q8R6wqpfJgFipoOzRME6+WgoHPyvIZV9AzNnH4Pv+vfVun8TC +AEvbcyjPyJUL89TqJIgpmlyLRmNETurrGWVgOS4/0rJy5q35I4rDMdrbM8S0AJZy +rSfwwRZXfmxoxYSkx+W6pyIJoj9dtidp1PsKcDoT7CrapmhOKqJzxKdCX3yNQBd0 +wWoemiLvBRsCJ1dTZePe470aGmpkL8eLSx68neujrbK9lvDC/GIm97Wx103izZw0 +TkkSyB/JtXcqERWYVfAnmhaxIPS1Gwvk+ytBs9kYbNx1cHvPR+JUbax8jmmamKHN +k20mVi+ExBJcyBCs+1gCkKXSlMUpvOSc+tG+nS390JD5pyui1dPp1dlogIX95ad0 +H5kG +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 25:df:04:c2:eb:c5:e0:83:4a:d8:ff:45:39:57:0d:3b:17:6a:b1:28 + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 018" + Validity + Not Before: May 4 20:53:10 2021 GMT + Not After : May 2 20:53:10 2031 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign, 018" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (4096 bit) + Modulus: + 00:d6:49:2a:9a:6b:b2:f5:76:70:d0:f5:42:eb:0c: + 20:d0:12:45:b3:4c:d6:9f:72:20:51:89:9d:f1:45: + de:a9:f4:f9:52:28:bf:3c:ce:1a:b3:f5:9f:dc:41: + bb:07:24:44:d3:79:e3:09:54:c5:ba:cb:18:10:4d: + e5:6c:71:2c:8f:3b:dc:0a:20:f1:3a:41:b6:1e:86: + 1f:1b:af:41:b7:e8:f1:28:f3:cd:14:88:e8:9b:74: + 81:de:5e:92:e7:b5:32:89:21:e4:e5:36:92:ff:1e: + cd:a6:35:21:55:e3:1d:7b:f3:1c:06:a5:bb:15:4f: + de:11:88:31:3c:16:aa:91:03:4d:1b:45:aa:b6:5e: + 97:c9:bc:12:76:c8:74:bc:62:7d:db:0c:e5:4f:0a: + ca:85:5a:40:6d:eb:2e:e0:bf:4e:61:59:5e:66:d7: + 56:ef:fc:6d:a0:1d:49:68:cc:a0:66:64:84:57:bb: + fa:99:6e:dd:33:32:5d:46:4f:33:1c:2b:2c:2c:92: + 4e:80:69:e8:ff:94:7f:8b:af:de:cc:67:8a:bb:7d: + 7f:16:d7:29:18:ec:3a:a3:c2:5c:c8:1b:c0:39:5e: + 28:57:f4:bd:f7:66:3e:53:19:65:df:77:58:35:38: + 3b:00:16:0d:b5:86:1d:f3:ae:0a:e7:54:f4:dc:72: + 62:fe:97:9d:35:dd:80:2e:ed:0e:a9:bf:c8:d3:87: + 58:b7:c6:51:54:ad:48:f8:ad:5b:ec:bb:18:cd:52: + 0c:ff:96:16:45:2d:ee:08:d0:1f:40:cb:1f:cb:fe: + 04:08:3f:c8:81:b5:d5:18:8f:99:d2:41:eb:12:58: + 15:b9:8a:ce:82:56:2b:02:e1:6b:b4:6d:64:57:88: + 68:3d:a1:ac:16:3c:f1:33:fc:2b:75:76:89:8a:2d: + 04:bd:b2:c0:49:e5:fa:4c:35:8e:3f:ee:71:4d:98: + 41:7a:c4:ec:eb:f8:00:47:f0:f3:39:0a:5d:a8:42: + 27:e6:ff:fe:7e:82:a0:68:2b:41:1d:d1:4f:6d:ac: + 85:a3:2c:20:fc:3a:bd:ae:36:ea:fb:ba:4e:89:2f: + 57:cf:2c:07:80:e6:54:52:cb:2a:f8:5d:13:07:49: + c9:ec:d9:0d:d8:9c:79:0e:20:1a:7a:13:99:26:96: + 4d:58:00:d5:85:ea:14:7a:17:cb:19:00:c0:dd:f7: + e1:c2:2f:ad:74:03:64:80:e3:1c:c3:a8:a0:cf:06: + e8:d4:f2:2b:64:d7:28:5c:3a:46:fb:70:e9:a3:c2: + 75:f9:7f:a7:5d:ee:07:38:a8:7c:2b:94:db:75:1f: + 71:99:40:1a:83:7b:0a:65:9e:70:3e:3c:ad:6c:0a: + bf:20:8d + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + AD:11:11:C2:73:91:5A:6B:87:3B:0A:BF:18:C8:F7:0F:AF:95:84:E2 + X509v3 Authority Key Identifier: + keyid:AD:11:11:C2:73:91:5A:6B:87:3B:0A:BF:18:C8:F7:0F:AF:95:84:E2 + + X509v3 Basic Constraints: critical + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + b7:bc:87:dd:f1:fb:20:24:a4:87:95:45:c3:a8:36:94:a7:a4: + d8:83:73:bf:db:63:67:c9:c7:15:b2:62:8e:13:69:3f:49:f9: + d8:65:6d:d7:9d:bf:38:1b:9b:43:54:71:60:8a:28:0d:2f:99: + 1f:bf:3e:c2:98:c1:d2:5c:92:8d:5e:de:47:4a:4e:65:86:c0: + 40:4f:0d:12:42:90:21:a7:d9:9b:97:78:9a:24:47:3c:80:54: + a7:1e:53:b0:cf:1c:0a:bb:9f:f0:b9:20:9f:62:bd:33:04:29: + 87:39:49:2e:96:c5:dc:41:61:e3:df:fa:d5:e6:3c:61:a2:bd: + 8a:cb:d6:11:20:67:ea:14:c7:5a:d7:47:3e:d2:a6:bf:25:50: + 57:3b:3c:fb:e3:7c:f2:c3:f6:e4:68:3b:92:ba:ad:d9:1e:1e: + 20:a1:b9:8e:39:4a:4c:bf:03:4d:76:15:18:72:29:1e:e5:89: + 96:4f:b6:5e:90:ce:e2:e2:20:35:4d:70:0a:09:2f:74:98:79: + a4:0c:98:db:7a:92:ea:50:98:c7:1e:cb:54:67:3b:0c:ea:e7: + a5:06:3b:13:2b:45:25:30:82:2c:f9:e8:fb:50:c3:1e:aa:f1: + 1e:b0:aa:97:c9:80:58:a9:a0:ec:d1:30:4e:be:5a:0a:07:3f: + 2b:c8:65:5f:40:cc:d9:c7:e0:fb:fe:bd:f5:6e:9f:c4:c2:00: + 4b:db:73:28:cf:c8:95:0b:f3:d4:ea:24:88:29:9a:5c:8b:46: + 63:44:4e:ea:eb:19:65:60:39:2e:3f:d2:b2:72:e6:ad:f9:23: + 8a:c3:31:da:db:33:c4:b4:00:96:72:ad:27:f0:c1:16:57:7e: + 6c:68:c5:84:a4:c7:e5:ba:a7:22:09:a2:3f:5d:b6:27:69:d4: + fb:0a:70:3a:13:ec:2a:da:a6:68:4e:2a:a2:73:c4:a7:42:5f: + 7c:8d:40:17:74:c1:6a:1e:9a:22:ef:05:1b:02:27:57:53:65: + e3:de:e3:bd:1a:1a:6a:64:2f:c7:8b:4b:1e:bc:9d:eb:a3:ad: + b2:bd:96:f0:c2:fc:62:26:f7:b5:b1:d7:4d:e2:cd:9c:34:4e: + 49:12:c8:1f:c9:b5:77:2a:11:15:98:55:f0:27:9a:16:b1:20: + f4:b5:1b:0b:e4:fb:2b:41:b3:d9:18:6c:dc:75:70:7b:cf:47: + e2:54:6d:ac:7c:8e:69:9a:98:a1:cd:93:6d:26:56:2f:84:c4: + 12:5c:c8:10:ac:fb:58:02:90:a5:d2:94:c5:29:bc:e4:9c:fa: + d1:be:9d:2d:fd:d0:90:f9:a7:2b:a2:d5:d3:e9:d5:d9:68:80: + 85:fd:e5:a7:74:1f:99:06 diff --git a/MagiskOnWSAOld/cacerts/b0396035.0 b/MagiskOnWSAOld/cacerts/b0396035.0 new file mode 100644 index 0000000..ffa851d Binary files /dev/null and b/MagiskOnWSAOld/cacerts/b0396035.0 differ diff --git a/MagiskOnWSAOld/cacerts/ea335731.0 b/MagiskOnWSAOld/cacerts/ea335731.0 new file mode 100644 index 0000000..e037843 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/ea335731.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIIDzzCCAregAwIBAgIJANJjV3HuLlVqMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCWplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEZMBcGA1UECwwQbmV0ZnJlZS42MTNtLm9yZzEdMBsGA1UE +AwwUTmV0RnJlZSBTaWduICxSTCBJU1AwHhcNMTQxMTE1MjMxNjU0WhcNMjQwOTIz +MjMxNjU0WjB+MQswCQYDVQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQH +DAlqZXJ1c2FsZW0xEDAOBgNVBAoMB05ldEZyZWUxGTAXBgNVBAsMEG5ldGZyZWUu +NjEzbS5vcmcxHTAbBgNVBAMMFE5ldEZyZWUgU2lnbiAsUkwgSVNQMIIBIjANBgkq +hkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2gEv5S0YJFYrWSNJJNhtBRN9IfyFhh/l +NCo2K8DKkq3CFCthHADZu1v9gRAa9NxC7wrsmK/wBTwoVwcHKrxrmxt/vs6bwZZ7 +9/TwKDA9Ar3SY6bvsDvij0/53frRoAhUJwdFkwlkIN0DNJWv8n3xAoIRBI3pOxcE +890Q2RDw+ydc4OIgETIel3vDqe7aTXTjb7BJjqIYTf9Wad3gmTGpRToNhC0kyQuk +MN2XxYHhK/+jjoL/O9vcd3ZLaYlYbQbT/Ud63CfIyvB+ASkqnRGFBIQttkzVrPHP +fRkhM+C6BlRfv0njt9Hl5jJjreWXSryd5iSwVVU6VtHo6TZFtUwA/wIDAQABo1Aw +TjAdBgNVHQ4EFgQUG9R/R+XGIIaXGs74B2+JNqoka7kwHwYDVR0jBBgwFoAUG9R/ +R+XGIIaXGs74B2+JNqoka7kwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AQEAQh9Id5A0LvTu4yCqM8rrP1mpEBKv4XjMWihR9gZ6fBY8NkyWBfyQkylc6Jlm +vrtFH4etuQkElN7tL1ZAyXAmOVnXB19asft/swA+UGEpdqmdIJiz+Q9KSP4c64Xw +L9svsOqBouiBYPWpURO0AJVk42lmXVGopGcet8hzMmmBejlCbDWi7mu+RJEMIMkp +g6cITc6m/Hrawt3oRxfyERKdoXUpTtTV5Cu4oHLwgcdMbp7IvHJO1SS5fP8OhObN +9aVsHN+TzDsXZqkvYn/Tn4fO4YtUdokCSzc39caq9ZiwqUpD0dSOYDotlIIXmzxE +OmymXu+SCGzKmR72vZouU0NuTw== +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + d2:63:57:71:ee:2e:55:6a + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = jerusalem, O = NetFree, OU = netfree.613m.org, CN = "NetFree Sign ,RL ISP" + Validity + Not Before: Nov 15 23:16:54 2014 GMT + Not After : Sep 23 23:16:54 2024 GMT + Subject: C = IL, ST = israel, L = jerusalem, O = NetFree, OU = netfree.613m.org, CN = "NetFree Sign ,RL ISP" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:da:01:2f:e5:2d:18:24:56:2b:59:23:49:24:d8: + 6d:05:13:7d:21:fc:85:86:1f:e5:34:2a:36:2b:c0: + ca:92:ad:c2:14:2b:61:1c:00:d9:bb:5b:fd:81:10: + 1a:f4:dc:42:ef:0a:ec:98:af:f0:05:3c:28:57:07: + 07:2a:bc:6b:9b:1b:7f:be:ce:9b:c1:96:7b:f7:f4: + f0:28:30:3d:02:bd:d2:63:a6:ef:b0:3b:e2:8f:4f: + f9:dd:fa:d1:a0:08:54:27:07:45:93:09:64:20:dd: + 03:34:95:af:f2:7d:f1:02:82:11:04:8d:e9:3b:17: + 04:f3:dd:10:d9:10:f0:fb:27:5c:e0:e2:20:11:32: + 1e:97:7b:c3:a9:ee:da:4d:74:e3:6f:b0:49:8e:a2: + 18:4d:ff:56:69:dd:e0:99:31:a9:45:3a:0d:84:2d: + 24:c9:0b:a4:30:dd:97:c5:81:e1:2b:ff:a3:8e:82: + ff:3b:db:dc:77:76:4b:69:89:58:6d:06:d3:fd:47: + 7a:dc:27:c8:ca:f0:7e:01:29:2a:9d:11:85:04:84: + 2d:b6:4c:d5:ac:f1:cf:7d:19:21:33:e0:ba:06:54: + 5f:bf:49:e3:b7:d1:e5:e6:32:63:ad:e5:97:4a:bc: + 9d:e6:24:b0:55:55:3a:56:d1:e8:e9:36:45:b5:4c: + 00:ff + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 1B:D4:7F:47:E5:C6:20:86:97:1A:CE:F8:07:6F:89:36:AA:24:6B:B9 + X509v3 Authority Key Identifier: + keyid:1B:D4:7F:47:E5:C6:20:86:97:1A:CE:F8:07:6F:89:36:AA:24:6B:B9 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 42:1f:48:77:90:34:2e:f4:ee:e3:20:aa:33:ca:eb:3f:59:a9: + 10:12:af:e1:78:cc:5a:28:51:f6:06:7a:7c:16:3c:36:4c:96: + 05:fc:90:93:29:5c:e8:99:66:be:bb:45:1f:87:ad:b9:09:04: + 94:de:ed:2f:56:40:c9:70:26:39:59:d7:07:5f:5a:b1:fb:7f: + b3:00:3e:50:61:29:76:a9:9d:20:98:b3:f9:0f:4a:48:fe:1c: + eb:85:f0:2f:db:2f:b0:ea:81:a2:e8:81:60:f5:a9:51:13:b4: + 00:95:64:e3:69:66:5d:51:a8:a4:67:1e:b7:c8:73:32:69:81: + 7a:39:42:6c:35:a2:ee:6b:be:44:91:0c:20:c9:29:83:a7:08: + 4d:ce:a6:fc:7a:da:c2:dd:e8:47:17:f2:11:12:9d:a1:75:29: + 4e:d4:d5:e4:2b:b8:a0:72:f0:81:c7:4c:6e:9e:c8:bc:72:4e: + d5:24:b9:7c:ff:0e:84:e6:cd:f5:a5:6c:1c:df:93:cc:3b:17: + 66:a9:2f:62:7f:d3:9f:87:ce:e1:8b:54:76:89:02:4b:37:37: + f5:c6:aa:f5:98:b0:a9:4a:43:d1:d4:8e:60:3a:2d:94:82:17: + 9b:3c:44:3a:6c:a6:5e:ef:92:08:6c:ca:99:1e:f6:bd:9a:2e: + 53:43:6e:4f diff --git a/MagiskOnWSAOld/cacerts/f9b4d31c.0 b/MagiskOnWSAOld/cacerts/f9b4d31c.0 new file mode 100644 index 0000000..eca2a87 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/f9b4d31c.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIID3TCCAsWgAwIBAgIJALT9ZoUCwnlMMA0GCSqGSIb3DQEBCwUAMIGEMQswCQYD +VQQGEwJJTDEPMA0GA1UECAwGaXNyYWVsMRIwEAYDVQQHDAlKZXJ1c2FsZW0xEDAO +BgNVBAoMB05ldEZyZWUxFTATBgNVBAsMDG5ldGZyZWUubGluazEnMCUGA1UEAwwe +TmV0RnJlZSBTaWduICwgTmV0RnJlZUFueXdoZXJlMB4XDTE2MDQwNTE1MTc0MVoX +DTI2MDIxMjE1MTc0MVowgYQxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwx +EjAQBgNVBAcMCUplcnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwM +bmV0ZnJlZS5saW5rMScwJQYDVQQDDB5OZXRGcmVlIFNpZ24gLCBOZXRGcmVlQW55 +d2hlcmUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC19KPegpnTrYAJ +m3ZWQ/vEL3rAXBE89jFcDU7xYmRgeEI+CKD+U5exLTmD7w0pQVM45HghlufWL0uy +pPYBR0YL6PbvFzskTnlaQuZBbwBsqf7hrAh7gA3nWintID50L8xtHKiRiLfK+NnM +//iQ03uwkwLT2xaUMvw7IbZcrHlwTfN6fxvvfhnCIE/Tnjz2p3aQI6ZmrD6rwZLm +oX2TGXQGCteOpM0gpn3gi/q30qzMsgCQ6YfeATzjGFe2rMM6Gy66HjNEzO5w6i7W +mG57upSNCTIgKjjwtGlZMg53jVqlfuMuZbZO7OwyatpcuV3KgtER5H8HuQboaZ4v +IYAA+0IZAgMBAAGjUDBOMB0GA1UdDgQWBBQR8hgc1nsIVVnUyF3uhivwht7AzDAf +BgNVHSMEGDAWgBQR8hgc1nsIVVnUyF3uhivwht7AzDAMBgNVHRMEBTADAQH/MA0G +CSqGSIb3DQEBCwUAA4IBAQCOBLgAhZGzGCKvXLbITDrZIC4Oh4sBD4geGnlcO8Rt +10JLn9lgW0SnYfMoX2ZOayiwlEltF7PB2dYiGk9+7vDjzpChp5HBDLSTJpCdJ5lc +AWEyTjGw9z7cfUUnGJtCaNDPvaLjcvi4KELyAyn3HejwPMcG+F1wyCjwWKoo0MX7 +ac+/qnp50nUcPYGnPS2hKoMp8tVkC56q9h7KU9AfY001b11lnVfeJynDuMKWivgw +6KOH0YSvWt8/d6DM6MtxMyAxdS5sP7htj8pdBTMcHHfw44663xdsd+9nvlaSXDNR +aq71pK24e7eEg0zZQEJ8L6finDIQAx8jt6kse1uVZW50 +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + b4:fd:66:85:02:c2:79:4c + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , NetFreeAnywhere" + Validity + Not Before: Apr 5 15:17:41 2016 GMT + Not After : Feb 12 15:17:41 2026 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , NetFreeAnywhere" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:b5:f4:a3:de:82:99:d3:ad:80:09:9b:76:56:43: + fb:c4:2f:7a:c0:5c:11:3c:f6:31:5c:0d:4e:f1:62: + 64:60:78:42:3e:08:a0:fe:53:97:b1:2d:39:83:ef: + 0d:29:41:53:38:e4:78:21:96:e7:d6:2f:4b:b2:a4: + f6:01:47:46:0b:e8:f6:ef:17:3b:24:4e:79:5a:42: + e6:41:6f:00:6c:a9:fe:e1:ac:08:7b:80:0d:e7:5a: + 29:ed:20:3e:74:2f:cc:6d:1c:a8:91:88:b7:ca:f8: + d9:cc:ff:f8:90:d3:7b:b0:93:02:d3:db:16:94:32: + fc:3b:21:b6:5c:ac:79:70:4d:f3:7a:7f:1b:ef:7e: + 19:c2:20:4f:d3:9e:3c:f6:a7:76:90:23:a6:66:ac: + 3e:ab:c1:92:e6:a1:7d:93:19:74:06:0a:d7:8e:a4: + cd:20:a6:7d:e0:8b:fa:b7:d2:ac:cc:b2:00:90:e9: + 87:de:01:3c:e3:18:57:b6:ac:c3:3a:1b:2e:ba:1e: + 33:44:cc:ee:70:ea:2e:d6:98:6e:7b:ba:94:8d:09: + 32:20:2a:38:f0:b4:69:59:32:0e:77:8d:5a:a5:7e: + e3:2e:65:b6:4e:ec:ec:32:6a:da:5c:b9:5d:ca:82: + d1:11:e4:7f:07:b9:06:e8:69:9e:2f:21:80:00:fb: + 42:19 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 11:F2:18:1C:D6:7B:08:55:59:D4:C8:5D:EE:86:2B:F0:86:DE:C0:CC + X509v3 Authority Key Identifier: + keyid:11:F2:18:1C:D6:7B:08:55:59:D4:C8:5D:EE:86:2B:F0:86:DE:C0:CC + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + 8e:04:b8:00:85:91:b3:18:22:af:5c:b6:c8:4c:3a:d9:20:2e: + 0e:87:8b:01:0f:88:1e:1a:79:5c:3b:c4:6d:d7:42:4b:9f:d9: + 60:5b:44:a7:61:f3:28:5f:66:4e:6b:28:b0:94:49:6d:17:b3: + c1:d9:d6:22:1a:4f:7e:ee:f0:e3:ce:90:a1:a7:91:c1:0c:b4: + 93:26:90:9d:27:99:5c:01:61:32:4e:31:b0:f7:3e:dc:7d:45: + 27:18:9b:42:68:d0:cf:bd:a2:e3:72:f8:b8:28:42:f2:03:29: + f7:1d:e8:f0:3c:c7:06:f8:5d:70:c8:28:f0:58:aa:28:d0:c5: + fb:69:cf:bf:aa:7a:79:d2:75:1c:3d:81:a7:3d:2d:a1:2a:83: + 29:f2:d5:64:0b:9e:aa:f6:1e:ca:53:d0:1f:63:4d:35:6f:5d: + 65:9d:57:de:27:29:c3:b8:c2:96:8a:f8:30:e8:a3:87:d1:84: + af:5a:df:3f:77:a0:cc:e8:cb:71:33:20:31:75:2e:6c:3f:b8: + 6d:8f:ca:5d:05:33:1c:1c:77:f0:e3:8e:ba:df:17:6c:77:ef: + 67:be:56:92:5c:33:51:6a:ae:f5:a4:ad:b8:7b:b7:84:83:4c: + d9:40:42:7c:2f:a7:e2:9c:32:10:03:1f:23:b7:a9:2c:7b:5b: + 95:65:6e:74 diff --git a/MagiskOnWSAOld/cacerts/fbb5e364.0 b/MagiskOnWSAOld/cacerts/fbb5e364.0 new file mode 100644 index 0000000..8b77f61 --- /dev/null +++ b/MagiskOnWSAOld/cacerts/fbb5e364.0 @@ -0,0 +1,81 @@ +-----BEGIN CERTIFICATE----- +MIIDxzCCAq+gAwIBAgIJAI2ViHiNxvW8MA0GCSqGSIb3DQEBCwUAMHoxCzAJBgNV +BAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUplcnVzYWxlbTEQMA4G +A1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5rMR0wGwYDVQQDDBRO +ZXRGcmVlIFNpZ24gLCB4Mm9uZTAeFw0xNjAzMTMxNjM1MjFaFw0yNjAxMjAxNjM1 +MjFaMHoxCzAJBgNVBAYTAklMMQ8wDQYDVQQIDAZpc3JhZWwxEjAQBgNVBAcMCUpl +cnVzYWxlbTEQMA4GA1UECgwHTmV0RnJlZTEVMBMGA1UECwwMbmV0ZnJlZS5saW5r +MR0wGwYDVQQDDBROZXRGcmVlIFNpZ24gLCB4Mm9uZTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBALCFuiEa8k1KjSdvAUUXywlvxFUKP4hD2BrY0dvWK0xe +WnKO7jHpDK88Dv3+2aa15c09ULKLqw6NDg3zPo1Tzb6hJs2nuI5dXbmoKA8QRQr1 +ny6JNi4LxAle6LTNqcAw+jsONmyx62vDXpRAHTNsguBdqbKZZp/8jLm9aNg0uvbn +g/E6gvUrwCylidcL3fQ3GiZsjj2RgzUITtLG2gCtHdAv87c5OJOw1tONv4Yfayxk +uG1n+4Z3eKzsDIbO7wbnWypcI/lod9xGub0st3YWjdxp10N2x5EYLgfwThG03RBk +vdWY1kfrzaL1e1jn0x5yqbdOEwzgZeQQZDmNNpybhlECAwEAAaNQME4wHQYDVR0O +BBYEFCimmwvFnAJ3VrIam6IzW70HpeNHMB8GA1UdIwQYMBaAFCimmwvFnAJ3VrIa +m6IzW70HpeNHMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAKhoWpR6 +G4atxcAdzQhA3e9LcyRNBdLvtNeZSSPHBPuxRqXDxRT6QhwdYR/mK9WjcOxdA6mj +m/wwLvOy3sbDFQySUs0Yu+aWn9GsFBBgdJoTwSgnwjY60wQ+/yyWCXIFabVHz7Nw +wepexJVQfz2yfnwfGHo3FCI4526NMwxEzy1Xt17wY4fxFmEusVEKqYKnYsHg2s8K +/4GKabaBpcv7iy3vIsks7mGe5NrgNS4MLACC8+5d3XVoqJeXsbX8usaRFDZrseE4 +O3d27X+0kjPAKx8Ztn70VWDbS7Cuic6kKrBXjjEN5OTD60GJ1CCiZp6miyjkTHBq +mRkn51xTIRBX6S0= +-----END CERTIFICATE----- +Certificate: + Data: + Version: 3 (0x2) + Serial Number: + 8d:95:88:78:8d:c6:f5:bc + Signature Algorithm: sha256WithRSAEncryption + Issuer: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , x2one" + Validity + Not Before: Mar 13 16:35:21 2016 GMT + Not After : Jan 20 16:35:21 2026 GMT + Subject: C = IL, ST = israel, L = Jerusalem, O = NetFree, OU = netfree.link, CN = "NetFree Sign , x2one" + Subject Public Key Info: + Public Key Algorithm: rsaEncryption + RSA Public-Key: (2048 bit) + Modulus: + 00:b0:85:ba:21:1a:f2:4d:4a:8d:27:6f:01:45:17: + cb:09:6f:c4:55:0a:3f:88:43:d8:1a:d8:d1:db:d6: + 2b:4c:5e:5a:72:8e:ee:31:e9:0c:af:3c:0e:fd:fe: + d9:a6:b5:e5:cd:3d:50:b2:8b:ab:0e:8d:0e:0d:f3: + 3e:8d:53:cd:be:a1:26:cd:a7:b8:8e:5d:5d:b9:a8: + 28:0f:10:45:0a:f5:9f:2e:89:36:2e:0b:c4:09:5e: + e8:b4:cd:a9:c0:30:fa:3b:0e:36:6c:b1:eb:6b:c3: + 5e:94:40:1d:33:6c:82:e0:5d:a9:b2:99:66:9f:fc: + 8c:b9:bd:68:d8:34:ba:f6:e7:83:f1:3a:82:f5:2b: + c0:2c:a5:89:d7:0b:dd:f4:37:1a:26:6c:8e:3d:91: + 83:35:08:4e:d2:c6:da:00:ad:1d:d0:2f:f3:b7:39: + 38:93:b0:d6:d3:8d:bf:86:1f:6b:2c:64:b8:6d:67: + fb:86:77:78:ac:ec:0c:86:ce:ef:06:e7:5b:2a:5c: + 23:f9:68:77:dc:46:b9:bd:2c:b7:76:16:8d:dc:69: + d7:43:76:c7:91:18:2e:07:f0:4e:11:b4:dd:10:64: + bd:d5:98:d6:47:eb:cd:a2:f5:7b:58:e7:d3:1e:72: + a9:b7:4e:13:0c:e0:65:e4:10:64:39:8d:36:9c:9b: + 86:51 + Exponent: 65537 (0x10001) + X509v3 extensions: + X509v3 Subject Key Identifier: + 28:A6:9B:0B:C5:9C:02:77:56:B2:1A:9B:A2:33:5B:BD:07:A5:E3:47 + X509v3 Authority Key Identifier: + keyid:28:A6:9B:0B:C5:9C:02:77:56:B2:1A:9B:A2:33:5B:BD:07:A5:E3:47 + + X509v3 Basic Constraints: + CA:TRUE + Signature Algorithm: sha256WithRSAEncryption + a8:68:5a:94:7a:1b:86:ad:c5:c0:1d:cd:08:40:dd:ef:4b:73: + 24:4d:05:d2:ef:b4:d7:99:49:23:c7:04:fb:b1:46:a5:c3:c5: + 14:fa:42:1c:1d:61:1f:e6:2b:d5:a3:70:ec:5d:03:a9:a3:9b: + fc:30:2e:f3:b2:de:c6:c3:15:0c:92:52:cd:18:bb:e6:96:9f: + d1:ac:14:10:60:74:9a:13:c1:28:27:c2:36:3a:d3:04:3e:ff: + 2c:96:09:72:05:69:b5:47:cf:b3:70:c1:ea:5e:c4:95:50:7f: + 3d:b2:7e:7c:1f:18:7a:37:14:22:38:e7:6e:8d:33:0c:44:cf: + 2d:57:b7:5e:f0:63:87:f1:16:61:2e:b1:51:0a:a9:82:a7:62: + c1:e0:da:cf:0a:ff:81:8a:69:b6:81:a5:cb:fb:8b:2d:ef:22: + c9:2c:ee:61:9e:e4:da:e0:35:2e:0c:2c:00:82:f3:ee:5d:dd: + 75:68:a8:97:97:b1:b5:fc:ba:c6:91:14:36:6b:b1:e1:38:3b: + 77:76:ed:7f:b4:92:33:c0:2b:1f:19:b6:7e:f4:55:60:db:4b: + b0:ae:89:ce:a4:2a:b0:57:8e:31:0d:e4:e4:c3:eb:41:89:d4: + 20:a2:66:9e:a6:8b:28:e4:4c:70:6a:99:19:27:e7:5c:53:21: + 10:57:e9:2d diff --git a/MagiskOnWSAOld/installer/Run.bat b/MagiskOnWSAOld/installer/Run.bat new file mode 100644 index 0000000..e07a753 --- /dev/null +++ b/MagiskOnWSAOld/installer/Run.bat @@ -0,0 +1,10 @@ +@echo off +cd "%~dp0" +if not exist Install.ps1 ( + echo "Install.ps1" is not found. + echo Press any key to exit + pause>nul + exit 1 +) +start powershell.exe -ExecutionPolicy Bypass -File .\Install.ps1 +exit diff --git a/MagiskOnWSAOld/installer/arm64/Install.ps1 b/MagiskOnWSAOld/installer/arm64/Install.ps1 new file mode 100644 index 0000000..9c0ee65 --- /dev/null +++ b/MagiskOnWSAOld/installer/arm64/Install.ps1 @@ -0,0 +1,142 @@ +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +$Host.UI.RawUI.WindowTitle = "Installing MagiskOnWSA..." + +function Finish { + Clear-Host + Start-Process "shell:AppsFolder\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp" + Start-Process "wsa://com.topjohnwu.magisk" + Start-Process "wsa://com.android.vending" + Start-Process "wsa://com.android.settings" + + Write-Output "All Done!`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + exit 0 +} + +$pwsh = "powershell.exe" + +if ((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -ne $true) { + Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Bypass -Force + $Proc = Start-Process -PassThru -Verb RunAs $pwsh -Args "-ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath' EVAL" + if ($null -ne $Proc) { + $Proc.WaitForExit() + } + if ($null -eq $Proc -or $Proc.ExitCode -ne 0) { + Write-Warning "`r`nFailed to launch start as Administrator`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown'); + } + exit +} elseif (($args.Count -eq 1) -and ($args[0] -eq "EVAL")) { + Start-Process $pwsh -NoNewWindow -Args "-ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath'" + exit +} + +$FileList = Get-Content -Path .\filelist.txt +if (((Test-Path -Path $FileList) -eq $false).Count) { + Write-Error "`r`nSome files are missing in the folder.`r`nPlease try to build again.`r`n`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + exit 1 +} + +reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" + +if ($(Get-WindowsOptionalFeature -Online -FeatureName 'VirtualMachinePlatform').State -ne "Enabled") { + Enable-WindowsOptionalFeature -Online -NoRestart -FeatureName 'VirtualMachinePlatform' + Write-Warning "`r`nNeed restart to enable virtual machine platform`r`nPress y to restart or press any key to exit" + $Key = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + if ("y" -eq $Key.Character) { + Restart-Computer -Confirm + } else { + exit 1 + } +} + +if (((Test-Path -Path "MakePri.ps1") -and (Test-Path -Path "makepri.exe")) -eq $true) { + $ProcMakePri = Start-Process $pwsh -PassThru -NoNewWindow -Args "-ExecutionPolicy Bypass -File MakePri.ps1" -WorkingDirectory $PSScriptRoot + $null = $ProcMakePri.Handle + $ProcMakePri.WaitForExit() + if ($ProcMakePri.ExitCode -ne 0) { + Write-Warning "`r`nFailed to merge resources, WSA Seetings will always be in English`r`nPress any key to continue" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + } + $Host.UI.RawUI.WindowTitle = "Installing MagiskOnWSA...." +} + +if ((Test-Path -Path 'uwp') -eq $true) { + [xml]$Xml = Get-Content ".\AppxManifest.xml"; + $Name = $Xml.Package.Identity.Name; + Write-Output "Installing $Name version: $($Xml.Package.Identity.Version)" + $ProcessorArchitecture = $Xml.Package.Identity.ProcessorArchitecture; + $Dependencies = $Xml.Package.Dependencies.PackageDependency; + $Dependencies | ForEach-Object { + $InstalledVersion = Get-AppxPackage -Name $_.Name | ForEach-Object { if ($_.Architecture -eq $ProcessorArchitecture) { $_ } } | Sort-Object -Property Version | Select-Object -ExpandProperty Version -Last 1 + if ( $InstalledVersion -lt $_.MinVersion ) { + if ($env:WT_SESSION) { + $env:WT_SESSION = $null + Write-Output "`r`nDependency should be installed but Windows Terminal is in use. Restarting to conhost.exe" + Start-Process conhost.exe -Args "powershell.exe -ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath'" + exit 1 + } + Write-Output "Dependency package $($_.Name) $ProcessorArchitecture required minimum version: $($_.MinVersion). Installing..." + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Path "uwp\$($_.Name)_$ProcessorArchitecture.appx" + } else { + Write-Output "Dependency package $($_.Name) $ProcessorArchitecture current version: $InstalledVersion.`r`nNothing to do." + } + } +} else { + Write-Warning "`r`nIgnored install WSA dependencies." +} + +$Installed = $null +$Installed = Get-AppxPackage -Name $Name + +if (($null -ne $Installed) -and (-not ($Installed.IsDevelopmentMode))) { + Write-Warning "`r`nThere is already one installed WSA.`r`nPlease uninstall it first.`r`n`r`nPress y to uninstall existing WSA or press any key to exit" + $key = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + if ("y" -eq $key.Character) { + Clear-Host + Remove-AppxPackage -Package $Installed.PackageFullName + } else { + exit 1 + } +} + +if ($Installed) { + Write-Output "`r`nShutting down WSA..." + Start-Process WsaClient -Wait -Args "/shutdown" +} +Stop-Process -Name "WsaClient" -ErrorAction SilentlyContinue + +Write-Output "`r`nInstalling MagiskOnWSA..." + +Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Register .\AppxManifest.xml +if ($?) { + Finish +} elseif ($null -ne $Installed) { + Write-Error "`r`nFailed to update.`r`nPress any key to uninstall existing installation while preserving user data.`r`nTake in mind that this will remove the Android apps' icon from the start menu.`r`nIf you want to cancel, close this window now." + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + Clear-Host + Remove-AppxPackage -PreserveApplicationData -Package $Installed.PackageFullName + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Register .\AppxManifest.xml + if ($?) { + Finish + } +} diff --git a/MagiskOnWSAOld/installer/arm64/MakePri.ps1 b/MagiskOnWSAOld/installer/arm64/MakePri.ps1 new file mode 100644 index 0000000..670e4c7 --- /dev/null +++ b/MagiskOnWSAOld/installer/arm64/MakePri.ps1 @@ -0,0 +1,65 @@ +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +$Host.UI.RawUI.WindowTitle = "Merging resources...." +if (((Test-Path -Path $(Get-Content -Path .\filelist-pri.txt)) -eq $false).Count) { + Write-Error "Some files are missing in the folder. Please try to build again. Press any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + exit 1 +} else { + New-Item -Path "." -Name "priinfo" -ItemType "directory" | Out-Null + Copy-Item .\resources.pri -Destination ".\pri\resources.pri" | Out-Null + Clear-Host + $AppxManifestFile = ".\AppxManifest.xml" + $PriItem = Get-Item ".\pri\*" -Include "*.pri" + Write-Output "Dumping resources...." + $i = 0 + $Processes = foreach ($Item in $PriItem) { + Start-Process -PassThru -WindowStyle Hidden makepri.exe -Args "dump /if $($Item | Resolve-Path -Relative) /o /es .\pri\resources.pri /of .\priinfo\$($Item.Name).xml /dt detailed" + ++$i + $Completed = ($i / $PriItem.count) * 100 + Write-Progress -Activity "Dumping resources" -Status "Dumping $($Item.Name):" -PercentComplete $Completed + } + $Processes | Wait-Process + Write-Progress -Activity "Dumping resources" -Status "Ready" -Completed + Clear-Host + Write-Output "Creating pri from dumps...." + $ProcNewFromDump = Start-Process -PassThru -NoNewWindow makepri.exe -Args "new /pr .\priinfo /cf .\xml\priconfig.xml /of .\resources.pri /mn $AppxManifestFile /o" + $null = $ProcNewFromDump.Handle + $ProcNewFromDump.WaitForExit() + Remove-Item 'priinfo' -Recurse + if ($ProcNewFromDump.ExitCode -Ne 0) { + Write-Error "Failed to create resources from priinfos" + exit 1 + } + + $ProjectXml = [xml](Get-Content $AppxManifestFile) + $ProjectResources = $ProjectXml.Package.Resources; + $(Get-Item .\xml\* -Exclude "priconfig.xml" -Include "*.xml") | ForEach-Object { + $($([xml](Get-Content $_)).Package.Resources.Resource) | ForEach-Object { + $ProjectResources.AppendChild($($ProjectXml.ImportNode($_, $true))) + } + } + $ProjectXml.Save($AppxManifestFile) + Remove-Item 'pri' -Recurse -Force + Remove-Item 'xml' -Recurse -Force + Remove-Item 'makepri.exe' -Force + Remove-Item 'filelist-pri.txt' -Force + Remove-Item $PSCommandPath -Force + exit 0 +} \ No newline at end of file diff --git a/MagiskOnWSAOld/installer/x64/Install.ps1 b/MagiskOnWSAOld/installer/x64/Install.ps1 new file mode 100644 index 0000000..cc174b8 --- /dev/null +++ b/MagiskOnWSAOld/installer/x64/Install.ps1 @@ -0,0 +1,131 @@ +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +$Host.UI.RawUI.WindowTitle = "Installing MagiskOnWSA..." + +function Finish { + Clear-Host + Start-Process "shell:AppsFolder\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp" + Start-Process "wsa://com.topjohnwu.magisk" + Start-Process "wsa://com.android.vending" + Start-Process "wsa://com.android.settings" + + Write-Output "All Done!`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + exit 0 +} + +$pwsh = "powershell.exe" + +if ((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator) -ne $true) { + Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy Bypass -Force + $Proc = Start-Process -PassThru -Verb RunAs $pwsh -Args "-ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath' EVAL" + if ($null -ne $Proc) { + $Proc.WaitForExit() + } + if ($null -eq $Proc -or $Proc.ExitCode -ne 0) { + Write-Warning "`r`nFailed to launch start as Administrator`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown'); + } + exit +} elseif (($args.Count -eq 1) -and ($args[0] -eq "EVAL")) { + Start-Process $pwsh -NoNewWindow -Args "-ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath'" + exit +} + +$FileList = Get-Content -Path .\filelist.txt +if (((Test-Path -Path $FileList) -eq $false).Count) { + Write-Error "`r`nSome files are missing in the folder.`r`nPlease try to build again.`r`n`r`nPress any key to exit" + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + exit 1 +} + +reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\AppModelUnlock" /t REG_DWORD /f /v "AllowDevelopmentWithoutDevLicense" /d "1" + +if ($(Get-WindowsOptionalFeature -Online -FeatureName 'VirtualMachinePlatform').State -ne "Enabled") { + Enable-WindowsOptionalFeature -Online -NoRestart -FeatureName 'VirtualMachinePlatform' + Write-Warning "`r`nNeed restart to enable virtual machine platform`r`nPress y to restart or press any key to exit" + $Key = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + if ("y" -eq $Key.Character) { + Restart-Computer -Confirm + } else { + exit 1 + } +} + +if ((Test-Path -Path 'uwp') -eq $true) { + [xml]$Xml = Get-Content ".\AppxManifest.xml"; + $Name = $Xml.Package.Identity.Name; + Write-Output "Installing $Name version: $($Xml.Package.Identity.Version)" + $ProcessorArchitecture = $Xml.Package.Identity.ProcessorArchitecture; + $Dependencies = $Xml.Package.Dependencies.PackageDependency; + $Dependencies | ForEach-Object { + $InstalledVersion = Get-AppxPackage -Name $_.Name | ForEach-Object { if ($_.Architecture -eq $ProcessorArchitecture) { $_ } } | Sort-Object -Property Version | Select-Object -ExpandProperty Version -Last 1 + if ( $InstalledVersion -lt $_.MinVersion ) { + if ($env:WT_SESSION) { + $env:WT_SESSION = $null + Write-Output "`r`nDependency should be installed but Windows Terminal is in use. Restarting to conhost.exe" + Start-Process conhost.exe -Args "powershell.exe -ExecutionPolicy Bypass -Command Set-Location '$PSScriptRoot'; &'$PSCommandPath'" + exit 1 + } + Write-Output "Dependency package $($_.Name) $ProcessorArchitecture required minimum version: $($_.MinVersion). Installing..." + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Path "uwp\$($_.Name)_$ProcessorArchitecture.appx" + } else { + Write-Output "Dependency package $($_.Name) $ProcessorArchitecture current version: $InstalledVersion.`r`nNothing to do." + } + } +} else { + Write-Warning "`r`nIgnored install WSA dependencies." +} + +$Installed = $null +$Installed = Get-AppxPackage -Name $Name + +if (($null -ne $Installed) -and (-not ($Installed.IsDevelopmentMode))) { + Write-Warning "`r`nThere is already one installed WSA.`r`nPlease uninstall it first.`r`n`r`nPress y to uninstall existing WSA or press any key to exit" + $key = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + if ("y" -eq $key.Character) { + Clear-Host + Remove-AppxPackage -Package $Installed.PackageFullName + } else { + exit 1 + } +} + +if ($Installed) { + Write-Output "`r`nShutting down WSA..." + Start-Process WsaClient -Wait -Args "/shutdown" +} +Stop-Process -Name "WsaClient" -ErrorAction SilentlyContinue + +Write-Output "`r`nInstalling MagiskOnWSA..." + +Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Register .\AppxManifest.xml +if ($?) { + Finish +} elseif ($null -ne $Installed) { + Write-Error "`r`nFailed to update.`r`nPress any key to uninstall existing installation while preserving user data.`r`nTake in mind that this will remove the Android apps' icon from the start menu.`r`nIf you want to cancel, close this window now." + $null = $Host.UI.RawUI.ReadKey('NoEcho,IncludeKeyDown') + Clear-Host + Remove-AppxPackage -PreserveApplicationData -Package $Installed.PackageFullName + Add-AppxPackage -ForceApplicationShutdown -ForceUpdateFromAnyVersion -Register .\AppxManifest.xml + if ($?) { + Finish + } +} diff --git a/MagiskOnWSAOld/installer/x64/MakePri.ps1 b/MagiskOnWSAOld/installer/x64/MakePri.ps1 new file mode 100644 index 0000000..938a7ed --- /dev/null +++ b/MagiskOnWSAOld/installer/x64/MakePri.ps1 @@ -0,0 +1,53 @@ +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +$MakePri = "C:\Program Files (x86)\Windows Kits\10\bin\10.0.22621.0\x64\makepri.exe" + +New-Item -Path "." -Name "priinfo" -ItemType "directory" | Out-Null +Copy-Item .\resources.pri -Destination ".\pri\resources.pri" | Out-Null +$AppxManifestFile = ".\AppxManifest.xml" +$PriItem = Get-Item ".\pri\*" -Include "*.pri" +Write-Output "Dumping resources..." +foreach ($Item in $PriItem) { + Start-Process -PassThru $MakePri -Args "dump /if $($Item | Resolve-Path -Relative) /o /es .\pri\resources.pri /of .\priinfo\$($Item.Name).xml /dt detailed" +} + +Write-Output "Creating pri from dumps...." +$ProcNewFromDump = Start-Process -PassThru $MakePri -Args "new /pr .\priinfo /cf .\xml\priconfig.xml /of .\resources.pri /mn $AppxManifestFile /o" +$null = $ProcNewFromDump.Handle +$ProcNewFromDump.WaitForExit() +Remove-Item 'priinfo' -Recurse -Force +if ($ProcNewFromDump.ExitCode -ne 0) { + Write-Error "Failed to create resources from priinfos" + exit 1 +} + +$ProjectXml = [xml](Get-Content $AppxManifestFile) +$ProjectResources = $ProjectXml.Package.Resources; +$(Get-Item .\xml\* -Exclude "priconfig.xml" -Include "*.xml") | ForEach-Object { + $($([xml](Get-Content $_)).Package.Resources.Resource) | ForEach-Object { + $ProjectResources.AppendChild($($ProjectXml.ImportNode($_, $true))) + } +} +$ProjectXml.Save($AppxManifestFile) + +Remove-Item 'pri' -Recurse -Force +Remove-Item 'xml' -Recurse -Force +Remove-Item 'filelist-pri.txt' -Force +Remove-Item $PSCommandPath -Force +exit 0 diff --git a/MagiskOnWSAOld/linker/libc.so b/MagiskOnWSAOld/linker/libc.so new file mode 100644 index 0000000..748c48c Binary files /dev/null and b/MagiskOnWSAOld/linker/libc.so differ diff --git a/MagiskOnWSAOld/linker/libdl.so b/MagiskOnWSAOld/linker/libdl.so new file mode 100644 index 0000000..8b24897 Binary files /dev/null and b/MagiskOnWSAOld/linker/libdl.so differ diff --git a/MagiskOnWSAOld/linker/libm.so b/MagiskOnWSAOld/linker/libm.so new file mode 100644 index 0000000..7bf99e8 Binary files /dev/null and b/MagiskOnWSAOld/linker/libm.so differ diff --git a/MagiskOnWSAOld/linker/linker64 b/MagiskOnWSAOld/linker/linker64 new file mode 100644 index 0000000..894beae Binary files /dev/null and b/MagiskOnWSAOld/linker/linker64 differ diff --git a/MagiskOnWSAOld/scripts/build.sh b/MagiskOnWSAOld/scripts/build.sh new file mode 100644 index 0000000..7d46b4c --- /dev/null +++ b/MagiskOnWSAOld/scripts/build.sh @@ -0,0 +1,961 @@ +#!/bin/bash +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +# shellcheck disable=SC2034 +cd "$(dirname "$0")" || exit 1 +WORK_DIR=$(mktemp -d -t wsa-build-XXXXXXXXXX_) || exit 1 + +# lowerdir +ROOT_MNT_RO="$WORK_DIR/erofs" +VENDOR_MNT_RO="$ROOT_MNT_RO/vendor" +PRODUCT_MNT_RO="$ROOT_MNT_RO/product" +SYSTEM_EXT_MNT_RO="$ROOT_MNT_RO/system_ext" + +# upperdir +ROOT_MNT_RW="$WORK_DIR/upper" +VENDOR_MNT_RW="$ROOT_MNT_RW/vendor" +PRODUCT_MNT_RW="$ROOT_MNT_RW/product" +SYSTEM_EXT_MNT_RW="$ROOT_MNT_RW/system_ext" +SYSTEM_MNT_RW="$ROOT_MNT_RW/system" + +# merged +# shellcheck disable=SC2034 +ROOT_MNT="$WORK_DIR/system_root_merged" +SYSTEM_MNT="$ROOT_MNT/system" +VENDOR_MNT="$ROOT_MNT/vendor" +PRODUCT_MNT="$ROOT_MNT/product" +SYSTEM_EXT_MNT="$ROOT_MNT/system_ext" + +declare -A LOWER_PARTITION=(["zsystem"]="$ROOT_MNT_RO" ["vendor"]="$VENDOR_MNT_RO" ["product"]="$PRODUCT_MNT_RO" ["system_ext"]="$SYSTEM_EXT_MNT_RO") +declare -A UPPER_PARTITION=(["zsystem"]="$SYSTEM_MNT_RW" ["vendor"]="$VENDOR_MNT_RW" ["product"]="$PRODUCT_MNT_RW" ["system_ext"]="$SYSTEM_EXT_MNT_RW") +declare -A MERGED_PARTITION=(["zsystem"]="$ROOT_MNT" ["vendor"]="$VENDOR_MNT" ["product"]="$PRODUCT_MNT" ["system_ext"]="$SYSTEM_EXT_MNT") + +DOWNLOAD_DIR=../download +DOWNLOAD_CONF_NAME=download.list +PYTHON_VENV_DIR="$(dirname "$PWD")/python3-env" +OUTPUT_DIR=../output +WSA_WORK_ENV="${WORK_DIR:?}/ENV" +touch "$WSA_WORK_ENV" +export WSA_WORK_ENV +abort() { + [ "$1" ] && echo -e "ERROR: $1" + echo "Build: an error has occurred, exit" + exit 1 +} +trap abort INT TERM + +default() { + ARCH=x64 + RELEASE_TYPE=retail + MAGISK_VER=stable + GAPPS_BRAND=MindTheGapps + CUSTOM_MODEL=redfin + ROOT_SOL=magisk +} + +vhdx_to_raw_img() { + qemu-img convert -q -f vhdx -O raw "$1" "$2" || return 1 + rm -f "$1" || return 1 +} + +ro_ext4_img_to_rw() { + resize_img "$1" "$(($(du --apparent-size -sB512 "$1" | cut -f1) * 2))"s || return 1 + e2fsck -fp -E unshare_blocks "$1" || return 1 + resize_img "$1" || return 1 + return 0 +} + +resize_img() { + sudo e2fsck -pf "$1" || return 1 + if [ "$2" ]; then + sudo resize2fs "$1" "$2" || return 1 + else + sudo resize2fs -M "$1" || return 1 + fi + return 0 +} + +mk_overlayfs() { + local context own + local workdir="$WORK_DIR/worker/$1" + local lowerdir="$2" + local upperdir="$3" + local merged="$4" + + echo "mk_overlayfs: label $1 + lowerdir=$lowerdir + upperdir=$upperdir + workdir=$workdir + merged=$merged" + case "$1" in + vendor) + context="u:object_r:vendor_file:s0" + own="0:2000" + ;; + system) + context="u:object_r:rootfs:s0" + own="0:0" + ;; + *) + context="u:object_r:system_file:s0" + own="0:0" + ;; + esac + sudo mkdir -p -m 755 "$workdir" "$upperdir" "$merged" || return 1 + sudo chown -R "$own" "$upperdir" "$workdir" "$merged" || return 1 + sudo setfattr -n security.selinux -v "$context" "$upperdir" || return 1 + sudo setfattr -n security.selinux -v "$context" "$workdir" || return 1 + sudo setfattr -n security.selinux -v "$context" "$merged" || return 1 + sudo mount -vt overlay overlay -olowerdir="$lowerdir",upperdir="$upperdir",workdir="$workdir" "$merged" || return 1 +} + +check_image_type() { + local type + type=$(blkid -o value -s TYPE "$1") + echo "$type" +} + +mk_erofs_umount() { + sudo "../bin/EROFS/mkfs.erofs" -zlz4hc -T1230768000 --chunksize=4096 --exclude-regex="lost+found" "$2".erofs "$1" || abort "Failed to make erofs image from $1" + sudo umount -v "$1" + sudo rm -f "$2" + sudo mv "$2".erofs "$2" +} + +# workaround for Debian +# In Debian /usr/sbin is not in PATH and some utilities in there are in use +[ -d /usr/sbin ] && export PATH="/usr/sbin:$PATH" +# In Debian /etc/mtab is not exist +[ -f /etc/mtab ] || sudo ln -s /proc/self/mounts /etc/mtab + +ARCH_MAP=( + "x64" + "arm64" +) + +RELEASE_TYPE_MAP=( + "retail" + "RP" + "WIS" + "WIF" + "latest" +) + +MAGISK_VER_MAP=( + "stable" + "beta" + "canary" + "debug" + "release" + "delta" + "alpha" +) + +GAPPS_BRAND_MAP=( + "MindTheGapps" + "none" +) + +CUSTOM_MODEL_MAP=( + "none" + "sunfish" + "bramble" + "redfin" + "barbet" + "raven" + "oriole" + "bluejay" + "panther" + "cheetah" + "lynx" + "tangorpro" + "felix" +) + +ROOT_SOL_MAP=( + "magisk" + "kernelsu" + "none" +) + +COMPRESS_FORMAT_MAP=( + "7z" + "zip" +) + +ARGUMENT_LIST=( + "arch:" + "release-type:" + "magisk-ver:" + "gapps-brand:" + "custom-model:" + "root-sol:" + "compress-format:" + "after-compress" + "remove-amazon" +) + +default + +opts=$( + getopt \ + --longoptions "$(printf "%s," "${ARGUMENT_LIST[@]}")" \ + --name "$(basename "$0")" \ + --options "" \ + -- "$@" +) || abort "Failed to parse options, please check your input" + +eval set --"$opts" +while [[ $# -gt 0 ]]; do + case "$1" in + --arch ) ARCH="$2"; shift 2 ;; + --release-type ) RELEASE_TYPE="$2"; shift 2 ;; + --gapps-brand ) GAPPS_BRAND="$2"; shift 2 ;; + --custom-model ) CUSTOM_MODEL="$2"; shift 2;; + --root-sol ) ROOT_SOL="$2"; shift 2 ;; + --compress-format ) COMPRESS_FORMAT="$2"; shift 2 ;; + --after-compress ) AFTER_COMPRESS="yes"; shift ;; + --remove-amazon ) REMOVE_AMAZON="yes"; shift ;; + --magisk-ver ) MAGISK_VER="$2"; shift 2 ;; + -- ) shift; break;; + esac +done + +check_list() { + local input=$1 + if [ -n "$input" ]; then + local name=$2 + shift + local arr=("$@") + local list_count=${#arr[@]} + for i in "${arr[@]}"; do + if [ "$input" == "$i" ]; then + echo "INFO: $name: $input" + break + fi + ((list_count--)) + if (("$list_count" <= 0)); then + abort "Invalid $name: $input" + fi + done + fi +} + +check_list "$ARCH" "Architecture" "${ARCH_MAP[@]}" +check_list "$RELEASE_TYPE" "Release Type" "${RELEASE_TYPE_MAP[@]}" +check_list "$MAGISK_VER" "Magisk Version" "${MAGISK_VER_MAP[@]}" +check_list "$GAPPS_BRAND" "GApps Brand" "${GAPPS_BRAND_MAP[@]}" +check_list "$CUSTOM_MODEL" "Custom Model" "${CUSTOM_MODEL_MAP[@]}" +check_list "$ROOT_SOL" "Root Solution" "${ROOT_SOL_MAP[@]}" +check_list "$COMPRESS_FORMAT" "Compress Format" "${COMPRESS_FORMAT_MAP[@]}" + +# shellcheck disable=SC1091 +[ -f "$PYTHON_VENV_DIR/bin/activate" ] && { + source "$PYTHON_VENV_DIR/bin/activate" || abort "Failed to activate virtual environment" +} +declare -A RELEASE_NAME_MAP=(["retail"]="Retail" ["latest"]="Insider Private" ["RP"]="Release Preview" ["WIS"]="Insider Slow" ["WIF"]="Insider Fast") +RELEASE_NAME=${RELEASE_NAME_MAP[$RELEASE_TYPE]} || abort + +echo -e "Build: RELEASE_TYPE=$RELEASE_NAME" + +WSA_ZIP_PATH=$DOWNLOAD_DIR/wsa-$RELEASE_TYPE.zip +VCLibs_PATH="$DOWNLOAD_DIR/Microsoft.VCLibs.140.00_$ARCH.appx" +UWPVCLibs_PATH="$DOWNLOAD_DIR/Microsoft.VCLibs.140.00.UWPDesktop_$ARCH.appx" +xaml_PATH="$DOWNLOAD_DIR/Microsoft.UI.Xaml.2.8_$ARCH.appx" +MAGISK_ZIP=magisk-$MAGISK_VER.zip +MAGISK_PATH=$DOWNLOAD_DIR/$MAGISK_ZIP +GAPPS_ZIP_NAME=MindTheGapps-$ARCH-13.0.zip +GAPPS_PATH=$DOWNLOAD_DIR/$GAPPS_ZIP_NAME +WSA_MAJOR_VER=0 + +update_ksu_zip_name() { + KERNEL_VER="" + case "$WSA_MAJOR_VER" in + "2308") KERNEL_VER="5.15.104.3";; + "2309"|"2310"|"2311") KERNEL_VER="5.15.104.4";; + *) abort "KernelSU is not supported in this WSA version: $WSA_MAJOR_VER" + esac + KERNELSU_ZIP_NAME=kernelsu-$ARCH-$KERNEL_VER.zip + KERNELSU_PATH=$DOWNLOAD_DIR/$KERNELSU_ZIP_NAME + KERNELSU_APK_PATH=$DOWNLOAD_DIR/KernelSU.apk + KERNELSU_INFO="$KERNELSU_PATH.info" +} +update_gapps_zip_name() { + GAPPS_ZIP_NAME=MindTheGapps-$ARCH-13.0.zip + GAPPS_PATH=$DOWNLOAD_DIR/$GAPPS_ZIP_NAME +} + +echo "Generate Download Links" +if [ "$RELEASE_TYPE" != "latest" ]; then + python3 generateWSALinks.py "$ARCH" "$RELEASE_TYPE" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" || abort + # shellcheck disable=SC1090 + source "$WSA_WORK_ENV" || abort +else + printf "%s\n" "$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.assets[] | .browser_download_url')" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " out=wsa-latest.zip\n" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + mkdir -p "$DOWNLOAD_DIR/xaml" + curl -sO "https://globalcdn.nuget.org/packages/microsoft.ui.xaml.2.8.5.nupkg" --output-dir "$DOWNLOAD_DIR/xaml" + 7z x $DOWNLOAD_DIR/xaml/*.nupkg -o../download/ | tail -4 + mv "$DOWNLOAD_DIR/tools/AppX/$ARCH/Release/Microsoft.UI.Xaml.2.8.appx" "$xaml_PATH" + printf "https://aka.ms/Microsoft.VCLibs.%s.14.00.Desktop.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " out=Microsoft.VCLibs.140.00.UWPDesktop_%s.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf "https://cdn.glitch.global/847a3043-7118-4fd2-8853-fe9756f88702/Microsoft.VCLibs.140.00_14.0.32530.0_%s__8wekyb3d8bbwe.Appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " dir=%s\n" "$DOWNLOAD_DIR" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + printf " out=Microsoft.VCLibs.140.00_%s.appx\n" "$ARCH" >> "$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME" || abort + WSA_VER=$(curl -sL https://api.github.com/repos/bubbles-wow/WSA-Archive/releases/latest | jq -r '.tag_name') + WSA_MAJOR_VER=${WSA_VER:0:4} +fi +if [ "$ROOT_SOL" = "magisk" ] || [ "$GAPPS_BRAND" != "none" ]; then + python3 generateMagiskLink.py "$MAGISK_VER" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" || abort +fi +if [ "$ROOT_SOL" = "kernelsu" ]; then + update_ksu_zip_name + python3 generateKernelSULink.py "$ARCH" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" "$KERNEL_VER" "$KERNELSU_ZIP_NAME" || abort + # shellcheck disable=SC1090 + source "$WSA_WORK_ENV" || abort + # shellcheck disable=SC2153 + echo "KERNELSU_VER=$KERNELSU_VER" >"$KERNELSU_INFO" +fi +if [ "$GAPPS_BRAND" != "none" ]; then + update_gapps_zip_name + python3 generateGappsLink.py "$ARCH" "$DOWNLOAD_DIR" "$DOWNLOAD_CONF_NAME" "$GAPPS_ZIP_NAME" || abort +fi +echo "Download Artifacts" +if ! aria2c --no-conf --log-level=info --log="$DOWNLOAD_DIR/aria2_download.log" -x16 -s16 -j5 -c -R -m0 --async-dns=false --check-integrity=true --continue=true --allow-overwrite=true --conditional-get=true -d"$DOWNLOAD_DIR" -i"$DOWNLOAD_DIR/$DOWNLOAD_CONF_NAME"; then + echo "We have encountered an error while downloading files." + exit 1 +fi + +echo "Extract WSA" +if [ -f "$WSA_ZIP_PATH" ]; then + if ! python3 extractWSA.py "$ARCH" "$WSA_ZIP_PATH" "$WORK_DIR" "$WSA_WORK_ENV"; then + abort "Unzip WSA failed, is the download incomplete?" + fi + echo -e "Extract done\n" + # shellcheck disable=SC1090 + source "$WSA_WORK_ENV" || abort +else + echo "The WSA zip package does not exist, is the download incomplete?" + exit 1 +fi + +if [ "$GAPPS_BRAND" != "none" ] || [ "$ROOT_SOL" = "magisk" ]; then + echo "Extract Magisk" + if [ -f "$MAGISK_PATH" ]; then + MAGISK_VERSION_NAME="" + if ! python3 extractMagisk.py "$ARCH" "$MAGISK_PATH" "$WORK_DIR"; then + abort "Unzip Magisk failed, is the download incomplete?" + fi + # shellcheck disable=SC1090 + source "$WSA_WORK_ENV" || abort + sudo patchelf --set-interpreter "../linker/linker64" "$WORK_DIR/magisk/magiskpolicy" || abort + chmod +x "$WORK_DIR/magisk/magiskpolicy" || abort + else + echo "The Magisk zip package does not exist, rename it to magisk-debug.zip and put it in the download folder." + exit 1 + fi + echo -e "done\n" +fi + +if [ "$ROOT_SOL" = "kernelsu" ]; then + update_ksu_zip_name + echo "Extract KernelSU" + # shellcheck disable=SC1090 + source "${KERNELSU_INFO:?}" || abort + if ! unzip "$KERNELSU_PATH" -d "$WORK_DIR/kernelsu"; then + abort "Unzip KernelSU failed, package is corrupted?" + fi + if [ "$ARCH" = "x64" ]; then + mv "$WORK_DIR/kernelsu/bzImage" "$WORK_DIR/kernelsu/kernel" + else + mv "$WORK_DIR/kernelsu/Image" "$WORK_DIR/kernelsu/kernel" + fi + echo -e "done\n" +fi + +if [ "$GAPPS_BRAND" != 'none' ]; then + update_gapps_zip_name + echo "Extract MindTheGapps" + mkdir -p "$WORK_DIR/gapps" || abort + if [ -f "$GAPPS_PATH" ]; then + if ! unzip "$GAPPS_PATH" "system/*" -d "$WORK_DIR/gapps"; then + abort "Unzip MindTheGapps failed, package is corrupted?" + fi + mv "$WORK_DIR/gapps/system/"* "$WORK_DIR/gapps" || abort + else + abort "The MindTheGapps zip package does not exist." + fi + echo -e "Extract done\n" +fi + +echo "Convert vhdx to RAW image" +vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/system_ext.vhdx" "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort +vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/product.vhdx" "$WORK_DIR/wsa/$ARCH/product.img" || abort +vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/system.vhdx" "$WORK_DIR/wsa/$ARCH/system.img" || abort +vhdx_to_raw_img "$WORK_DIR/wsa/$ARCH/vendor.vhdx" "$WORK_DIR/wsa/$ARCH/vendor.img" || abort +echo -e "Convert vhdx to RAW image done\n" + +SYSTEMIMAGES_FILE_SYSTEM_TYPE=$(check_image_type "$WORK_DIR/wsa/$ARCH/system.img") +if [[ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "erofs" ]]; then + echo "Mount images" + sudo mkdir -p -m 755 "$ROOT_MNT_RO" || abort + sudo chown "0:0" "$ROOT_MNT_RO" || abort + sudo setfattr -n security.selinux -v "u:object_r:rootfs:s0" "$ROOT_MNT_RO" || abort + sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/system.img" "$ROOT_MNT_RO" || abort 1 + sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_MNT_RO" || abort 1 + sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_MNT_RO" || abort 1 + sudo "../bin/EROFS/fuse.erofs" "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_MNT_RO" || abort 1 + echo -e "done\n" + echo "Create overlayfs for EROFS" + mk_overlayfs system "$ROOT_MNT_RO" "$SYSTEM_MNT_RW" "$ROOT_MNT" || abort + mk_overlayfs vendor "$VENDOR_MNT_RO" "$VENDOR_MNT_RW" "$VENDOR_MNT" || abort + mk_overlayfs product "$PRODUCT_MNT_RO" "$PRODUCT_MNT_RW" "$PRODUCT_MNT" || abort + mk_overlayfs system_ext "$SYSTEM_EXT_MNT_RO" "$SYSTEM_EXT_MNT_RW" "$SYSTEM_EXT_MNT" || abort + echo -e "Create overlayfs for EROFS done\n" +elif [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "ext4" ]; then + echo "Remove read-only flag for read-only EXT4 image" + ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort + ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/product.img" || abort + ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/system.img" || abort + ro_ext4_img_to_rw "$WORK_DIR/wsa/$ARCH/vendor.img" || abort + echo -e "Remove read-only flag for read-only EXT4 image done\n" + + echo "Calculate the required space" + EXTRA_SIZE=10240 + + SYSTEM_EXT_NEED_SIZE=$EXTRA_SIZE + if [ -d "$WORK_DIR/gapps/system_ext" ]; then + SYSTEM_EXT_NEED_SIZE=$((SYSTEM_EXT_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps/system_ext" | cut -f1))) + fi + + PRODUCT_NEED_SIZE=$EXTRA_SIZE + if [ -d "$WORK_DIR/gapps/product" ]; then + PRODUCT_NEED_SIZE=$((PRODUCT_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps/product" | cut -f1))) + fi + + SYSTEM_NEED_SIZE=$EXTRA_SIZE + if [ -d "$WORK_DIR/gapps" ]; then + SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + $(du --apparent-size -sB512 "$WORK_DIR/gapps" | cut -f1) - PRODUCT_NEED_SIZE - SYSTEM_EXT_NEED_SIZE)) + fi + if [ "$ROOT_SOL" = "magisk" ]; then + if [ -d "$WORK_DIR/magisk" ]; then + MAGISK_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/magisk/magisk" | cut -f1) + SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + MAGISK_SIZE)) + fi + if [ -f "$MAGISK_PATH" ]; then + MAGISK_APK_SIZE=$(du --apparent-size -sB512 "$MAGISK_PATH" | cut -f1) + SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + MAGISK_APK_SIZE)) + fi + fi + if [ -d "../$ARCH/system" ]; then + SYSTEM_NEED_SIZE=$((SYSTEM_NEED_SIZE + $(du --apparent-size -sB512 "../$ARCH/system" | cut -f1))) + fi + VENDOR_NEED_SIZE=$EXTRA_SIZE + echo -e "done\n" + echo "Expand images" + SYSTEM_EXT_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/system_ext.img" | cut -f1) + PRODUCT_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/product.img" | cut -f1) + SYSTEM_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/system.img" | cut -f1) + VENDOR_IMG_SIZE=$(du --apparent-size -sB512 "$WORK_DIR/wsa/$ARCH/vendor.img" | cut -f1) + SYSTEM_EXT_TARGET_SIZE=$((SYSTEM_EXT_NEED_SIZE * 2 + SYSTEM_EXT_IMG_SIZE)) + PRODUCT_TAGET_SIZE=$((PRODUCT_NEED_SIZE * 2 + PRODUCT_IMG_SIZE)) + SYSTEM_TAGET_SIZE=$((SYSTEM_IMG_SIZE * 2)) + VENDOR_TAGET_SIZE=$((VENDOR_NEED_SIZE * 2 + VENDOR_IMG_SIZE)) + + resize_img "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_TARGET_SIZE"s || abort + resize_img "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_TAGET_SIZE"s || abort + resize_img "$WORK_DIR/wsa/$ARCH/system.img" "$SYSTEM_TAGET_SIZE"s || abort + resize_img "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_TAGET_SIZE"s || abort + + echo -e "Expand images done\n" + + echo "Mount images" + sudo mkdir "$ROOT_MNT" || abort + sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/system.img" "$ROOT_MNT" || abort + sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/vendor.img" "$VENDOR_MNT" || abort + sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/product.img" "$PRODUCT_MNT" || abort + sudo mount -vo loop "$WORK_DIR/wsa/$ARCH/system_ext.img" "$SYSTEM_EXT_MNT" || abort + echo -e "done\n" +else + abort "Unknown file system type: $SYSTEMIMAGES_FILE_SYSTEM_TYPE" +fi + +if [ "$REMOVE_AMAZON" ]; then + echo "Remove Amazon Appstore" + rm -fv "$WORK_DIR/wsa/$ARCH/apex/mado_release.apex" + # Stub + find "${PRODUCT_MNT:?}"/{apex,etc/*permissions} 2>/dev/null | grep -e mado | sudo xargs rm -rfv + echo -e "done\n" +fi + +echo "Add device administration features" +sudo sed -i -e '/cts/a \ ' -e '/print/i \ ' "$VENDOR_MNT/etc/permissions/windows.permissions.xml" +sudo setfattr -n security.selinux -v "u:object_r:vendor_configs_file:s0" "$VENDOR_MNT/etc/permissions/windows.permissions.xml" || abort +echo -e "done\n" + +if [ "$ROOT_SOL" = 'magisk' ]; then + echo "Integrate Magisk" + sudo cp "$WORK_DIR/magisk/magisk/"* "$ROOT_MNT/debug_ramdisk/" + sudo cp "$MAGISK_PATH" "$ROOT_MNT/debug_ramdisk/stub.apk" || abort + sudo tee -a "$ROOT_MNT/debug_ramdisk/loadpolicy.sh" </dev/null || abort +#!/system/bin/sh +MAGISKTMP=/debug_ramdisk +export MAGISKTMP +mkdir -p /data/adb/magisk +cp \$MAGISKTMP/* /data/adb/magisk/ +sync +chmod -R 755 /data/adb/magisk +restorecon -R /data/adb/magisk +MAKEDEV=1 \$MAGISKTMP/magisk --preinit-device 2>&1 +RULESCMD="" +for r in \$MAGISKTMP/.magisk/preinit/*/sepolicy.rule; do + [ -f "\$r" ] || continue + RULESCMD="\$RULESCMD --apply \$r" +done +\$MAGISKTMP/magiskpolicy --live \$RULESCMD 2>&1 +EOF + sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec chmod 0711 {} \; + sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec chown root:root {} \; + sudo find "$ROOT_MNT/debug_ramdisk" -type f -exec setfattr -n security.selinux -v "u:object_r:magisk_file:s0" {} \; || abort + echo "/debug_ramdisk(/.*)? u:object_r:magisk_file:s0" | sudo tee -a "$VENDOR_MNT/etc/selinux/vendor_file_contexts" + echo '/data/adb/magisk(/.*)? u:object_r:magisk_file:s0' | sudo tee -a "$VENDOR_MNT/etc/selinux/vendor_file_contexts" + sudo LD_LIBRARY_PATH="../linker" "$WORK_DIR/magisk/magiskpolicy" --load "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --save "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --magisk || abort + NEW_INITRC_DIR=$SYSTEM_MNT/etc/init/hw + sudo tee -a "$SYSTEM_MNT/etc/init/hw/init.rc" </dev/null +on post-fs-data + mkdir /dev/debug_ramdisk_mirror + mount none /debug_ramdisk /dev/debug_ramdisk_mirror bind + mount none none /dev/debug_ramdisk_mirror private + mount tmpfs magisk /debug_ramdisk mode=0755 + copy /dev/debug_ramdisk_mirror/magisk64 /debug_ramdisk/magisk64 + chmod 0755 /debug_ramdisk/magisk64 + symlink ./magisk64 /debug_ramdisk/magisk + symlink ./magisk64 /debug_ramdisk/su + symlink ./magisk64 /debug_ramdisk/resetprop + start adbd + copy /dev/debug_ramdisk_mirror/magisk32 /debug_ramdisk/magisk32 + chmod 0755 /debug_ramdisk/magisk32 + copy /dev/debug_ramdisk_mirror/magiskinit /debug_ramdisk/magiskinit + chmod 0755 /debug_ramdisk/magiskinit + copy /dev/debug_ramdisk_mirror/magiskpolicy /debug_ramdisk/magiskpolicy + chmod 0755 /debug_ramdisk/magiskpolicy + mkdir /debug_ramdisk/.magisk + mkdir /debug_ramdisk/.magisk/mirror 0 + mkdir /debug_ramdisk/.magisk/block 0 + mkdir /debug_ramdisk/.magisk/worker 0 + copy /dev/debug_ramdisk_mirror/stub.apk /debug_ramdisk/stub.apk + chmod 0644 /debug_ramdisk/stub.apk + copy /dev/debug_ramdisk_mirror/loadpolicy.sh /debug_ramdisk/loadpolicy.sh + chmod 0755 /debug_ramdisk/loadpolicy.sh + umount /dev/debug_ramdisk_mirror + rmdir /dev/debug_ramdisk_mirror + exec u:r:magisk:s0 0 0 -- /system/bin/sh /debug_ramdisk/loadpolicy.sh + exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --post-fs-data + +on property:vold.decrypt=trigger_restart_framework + exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --service + +on nonencrypted + exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --service + +on property:sys.boot_completed=1 + exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --boot-complete + +on property:init.svc.zygote=stopped + exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --zygote-restart +EOF + + for i in "$NEW_INITRC_DIR"/*; do + if [[ "$i" =~ init.zygote.+\.rc ]]; then + echo "Inject zygote restart $i" + sudo awk -i inplace '{if($0 ~ /service zygote /){print $0;print " exec u:r:magisk:s0 0 0 -- /debug_ramdisk/magisk --zygote-restart";a="";next}} 1' "$i" + sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$i" || abort + fi + done + echo -e "Integrate Magisk done\n" +elif [ "$ROOT_SOL" = "kernelsu" ]; then + echo "Copy KernelSU kernel" + cp "$WORK_DIR/kernelsu/kernel" "$WORK_DIR/wsa/$ARCH/Tools/kernel" + echo -e "Copy KernelSU kernel done\n" + echo "Add auto-install script for KernelSU Manager" + # Copy APK + DAT_APP="$SYSTEM_MNT/data-app" + sudo mkdir "$DAT_APP" + sudo cp -f "$KERNELSU_APK_PATH" "$DAT_APP/" + sudo chmod 0755 "$DAT_APP/" + sudo chmod 0644 "$DAT_APP/KernelSU.apk" + sudo find "$DAT_APP/" -exec chown root:root {} \; + sudo find "$DAT_APP/" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + # Setup script + KSU_PRE="$SYSTEM_MNT/bin/ksuinstall" + sudo tee -a "$KSU_PRE" </dev/null || abort +#!/system/bin/sh +umask 022 +echo "\nKernelSU Install Manager" +if [ ! -e "/storage/emulated/0/.ksu_completed_$KERNELSU_VER" ]; then + echo "\nInstalling KernelSU APK" + pm install -i android -r /system/data-app/KernelSU.apk + touch "/storage/emulated/0/.ksu_completed_$KERNELSU_VER" + echo "\nDone!\n" +else + echo "\nLatest KernelSU Manager is installed.\n" +fi +echo "\nLaunching KernelSU App\n" +am start -n me.weishu.kernelsu/.ui.MainActivity +EOF + # Grant access + sudo chmod 0755 "$KSU_PRE" + sudo chown 0:2000 "$KSU_PRE" + sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$KSU_PRE" || abort + echo -e "Add KernelSU Manager done\n" +fi + +echo "Add extra packages" +sudo cp -r "../$ARCH/system/"* "$SYSTEM_MNT" || abort +find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -type d -exec chmod 0755 {} \; +find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -type f -exec chmod 0644 {} \; +find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -exec chown root:root {} \; +find "../$ARCH/system/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/priv-app/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort +echo -e "Add extra packages done\n" + +echo "Permissions management Netfree and Netspark security certificates" +sudo cp -r "../cacerts/"* "$SYSTEM_MNT/etc/security/cacerts/" || abort +sudo chmod 0755 "$SYSTEM_MNT/etc/security/cacerts/" +find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -type f -exec chmod 0644 {} \; +find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -exec chown root:root {} \; +find "../cacerts/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_MNT/etc/security/cacerts/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort +echo -e "Permissions management Netfree and Netspark security certificates done\n" + +if [ "$GAPPS_BRAND" != 'none' ]; then + echo "Integrate MindTheGapps" + find "$WORK_DIR/gapps/" -mindepth 1 -type d -exec sudo chmod 0755 {} \; + find "$WORK_DIR/gapps/" -mindepth 1 -type d -exec sudo chown root:root {} \; + file_list="$(find "$WORK_DIR/gapps/" -mindepth 1 -type f)" + for file in $file_list; do + sudo chown root:root "$file" + sudo chmod 0644 "$file" + done + sudo cp --preserve=all -r "$WORK_DIR/gapps/system_ext/"* "$SYSTEM_EXT_MNT/" || abort + sudo cp --preserve=all -r "$WORK_DIR/gapps/product/"* "$PRODUCT_MNT" || abort + + find "$WORK_DIR/gapps/product/overlay" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/overlay/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/product/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/etc/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/product/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/etc/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + #sudo setfattr -n security.selinux -v "u:object_r:system_file:s0" "$PRODUCT_MNT/framework" || abort + find "$WORK_DIR/gapps/product/app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/product/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/priv-app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + #find "$WORK_DIR/gapps/product/framework/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/framework/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/product/app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/product/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/priv-app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + #find "$WORK_DIR/gapps/product/framework/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/framework/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/system_ext/etc/permissions/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/etc/permissions/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + #sudo setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" "$PRODUCT_MNT/lib" || abort + #find "$WORK_DIR/gapps/product/lib/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/lib/placeholder" -exec setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" {} \; || abort + #find "$WORK_DIR/gapps/product/lib64/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$PRODUCT_MNT/lib64/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_lib_file:s0" {} \; || abort + find "$WORK_DIR/gapps/system_ext/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/priv-app/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/system_ext/etc/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/etc/placeholder" -type d -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + find "$WORK_DIR/gapps/system_ext/priv-app/" -maxdepth 1 -mindepth 1 -printf '%P\n' | xargs -I placeholder sudo find "$SYSTEM_EXT_MNT/priv-app/placeholder" -type f -exec setfattr -n security.selinux -v "u:object_r:system_file:s0" {} \; || abort + sudo LD_LIBRARY_PATH="../linker" "$WORK_DIR/magisk/magiskpolicy" --load "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" --save "$VENDOR_MNT/etc/selinux/precompiled_sepolicy" "allow gmscore_app gmscore_app vsock_socket { create connect write read }" "allow gmscore_app device_config_runtime_native_boot_prop file read" "allow gmscore_app system_server_tmpfs dir search" "allow gmscore_app system_server_tmpfs file open" "allow gmscore_app system_server_tmpfs filesystem getattr" "allow gmscore_app gpu_device dir search" "allow gmscore_app media_rw_data_file filesystem getattr" || abort + echo -e "Integrate MindTheGapps done\n" +fi + +if [[ "$CUSTOM_MODEL" != "none" ]]; then + echo "Fix system props" + # The first argument is prop path, second is product name (redfin), third is device model (Pixel 5) + declare -A MODEL_NAME_MAP=(["sunfish"]="Pixel 4a" ["bramble"]="Pixel 4a (5G)" ["redfin"]="Pixel 5" ["barbet"]="Pixel 5a" ["raven"]="Pixel 6 Pro" ["oriole"]="Pixel 6" ["bluejay"]="Pixel 6a" ["panther"]="Pixel 7" ["cheetah"]="Pixel 7 Pro" ["lynx"]="Pixel 7a" ["tangorpro"]="Pixel Tablet" ["felix"]="Pixel Fold") + MODEL_NAME="${MODEL_NAME_MAP[$CUSTOM_MODEL]}" + sudo python3 fixGappsProp.py "$ROOT_MNT" "$CUSTOM_MODEL" "$MODEL_NAME" || abort + # shellcheck disable=SC2002 + #BUILD_ID=$(sudo cat "$SYSTEM_MNT/build.prop" | grep -e ro.build.id | cut -c 13-) + #if [[ "${#BUILD_ID}" != "15" ]]; then + # FIXED_BUILD_ID=$(echo "$BUILD_ID" | cut -c -15) + # echo "Fixed Build ID: $FIXED_BUILD_ID" + # # shellcheck disable=SC2086 + # sudo find $ROOT_MNT/{system,system_ext,product,vendor} -name "build.prop" -exec sed -i -e "s/$BUILD_ID/$FIXED_BUILD_ID/g" {} \; + #fi + echo -e "done\n" + MODEL_NAME="${MODEL_NAME// /-}" +else + MODEL_NAME="default" +fi + +sudo find "$ROOT_MNT" -not -type l -exec touch -amt 200901010000.00 {} \; + +if [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "erofs" ]; then + echo "Create EROFS images" + mk_erofs_umount "$VENDOR_MNT" "$WORK_DIR/wsa/$ARCH/vendor.img" || abort + mk_erofs_umount "$PRODUCT_MNT" "$WORK_DIR/wsa/$ARCH/product.img" || abort + mk_erofs_umount "$SYSTEM_EXT_MNT" "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort + mk_erofs_umount "$ROOT_MNT" "$WORK_DIR/wsa/$ARCH/system.img" || abort + echo -e "Create EROFS images done\n" + echo "Umount images" + sudo umount -v "$VENDOR_MNT_RO" + sudo umount -v "$PRODUCT_MNT_RO" + sudo umount -v "$SYSTEM_EXT_MNT_RO" + sudo umount -v "$ROOT_MNT_RO" + echo -e "done\n" +elif [ "$SYSTEMIMAGES_FILE_SYSTEM_TYPE" = "ext4" ]; then + echo "Umount images" + sudo find "$ROOT_MNT" -exec touch -hamt 200901010000.00 {} \; + sudo umount -v "$VENDOR_MNT" + sudo umount -v "$PRODUCT_MNT" + sudo umount -v "$SYSTEM_EXT_MNT" + sudo umount -v "$ROOT_MNT" + echo -e "done\n" + echo "Shrink images" + resize_img "$WORK_DIR/wsa/$ARCH/system.img" || abort + resize_img "$WORK_DIR/wsa/$ARCH/vendor.img" || abort + resize_img "$WORK_DIR/wsa/$ARCH/product.img" || abort + resize_img "$WORK_DIR/wsa/$ARCH/system_ext.img" || abort + echo -e "Shrink images done\n" +else + abort "Unknown file system type: $SYSTEMIMAGES_FILE_SYSTEM_TYPE" +fi + +echo "Convert images to vhdx" +qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/system_ext.img" "$WORK_DIR/wsa/$ARCH/system_ext.vhdx" || abort +qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/product.img" "$WORK_DIR/wsa/$ARCH/product.vhdx" || abort +qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/system.img" "$WORK_DIR/wsa/$ARCH/system.vhdx" || abort +qemu-img convert -q -f raw -o subformat=fixed -O vhdx "$WORK_DIR/wsa/$ARCH/vendor.img" "$WORK_DIR/wsa/$ARCH/vendor.vhdx" || abort +rm -f "$WORK_DIR/wsa/$ARCH/"*.img || abort +echo -e "Convert images to vhdx done\n" + +echo "Remove signature and add scripts" +sudo rm -rf "${WORK_DIR:?}"/wsa/"$ARCH"/\[Content_Types\].xml "$WORK_DIR/wsa/$ARCH/AppxBlockMap.xml" "$WORK_DIR/wsa/$ARCH/AppxSignature.p7x" "$WORK_DIR/wsa/$ARCH/AppxMetadata" || abort +if [ "$ARCH" = "x64" ]; then + sudo rm -rf "$WORK_DIR/wsa/$ARCH/arm64/" || abort +else + sudo rm -rf "$WORK_DIR/wsa/$ARCH/amd64/" || abort +fi +mkdir "$WORK_DIR/wsa/$ARCH/uwp" +cp "$VCLibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH/uwp/" || abort +cp "$UWPVCLibs_PATH" "$xaml_PATH" "$WORK_DIR/wsa/$ARCH/uwp/" || abort +cp "../xml/priconfig.xml" "$WORK_DIR/wsa/$ARCH/xml/" || abort +if [[ "$ROOT_SOL" == "none" ]]; then + rootInfo="" + if [ "$GAPPS_BRAND" = "none" ]; then + gappsInfo="-NoGApps" + else + gappsInfo=-MindTheGapps-13.0 + fi + buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} + if [ "$REMOVE_AMAZON" = "yes" ]; then + buildName+="-RemovedAmazon" + fi + sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 +elif [ "$ROOT_SOL" == "magisk" ]; then + rootInfo="-with-magisk-$MAGISK_VERSION_NAME($MAGISK_VERSION_CODE)-$MAGISK_VER" + if [ "$GAPPS_BRAND" = "none" ]; then + gappsInfo="-NoGApps" + else + gappsInfo=-MindTheGapps-13.0 + fi + buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} + if [ "$REMOVE_AMAZON" = "yes" ]; then + buildName+="-RemovedAmazon" + fi + sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 +elif [ "$ROOT_SOL" == "kernelsu" ]; then + rootInfo="-with-kernelsu-$KERNELSU_VER" + if [ "$GAPPS_BRAND" = "none" ]; then + gappsInfo="-NoGApps" + else + gappsInfo=-MindTheGapps-13.0 + fi + buildName=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${rootInfo}${gappsInfo} + if [ "$REMOVE_AMAZON" = "yes" ]; then + buildName+="-RemovedAmazon" + fi + sudo sed -i "/Start-Process \"wsa:\/\/com.android.settings\"/a\ \ \ \ # $buildName" ../installer/Install.ps1 +fi +if [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + sudo sed -i -e 's@Start-Process\ "wsa://com.topjohnwu.magisk"@@g' ../installer/Install.ps1 + sudo sed -i -e 's@Start-Process\ "wsa://com.android.vending"@@g' ../installer/Install.ps1 + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/No%20Gapps%20and%20Removed%20AMZ/No%20Gapps%20and%20Removed%20Amazon.md" + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/MindTheGapps%20and%20Removed%20AMZ/MindTheGapps%20and%20Removed%20Amazon.md" + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/No%20Gapps%20and%20AMZ/No%20Gapps%20and%20Amazon%20Appstore.md" + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "none" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/No%20Root/MindTheGapps%20and%20AMZ/MindTheGapps%20and%20Amazon%20Appstore.md" + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/No%20Gapps%20and%20Removed%20AMZ/No%20Gapps%20and%20Removed%20AMZ.md@g' ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/No%20Gapps%20and%20AMZ/No%20Gapps%20and%20AMZ.md@g' ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/MindTheGapps%20and%20Removed%20AMZ/MindTheGapps%20and%20Removed%20AMZ.md@g' ../installer/Install.ps1 +elif [[ "$ROOT_SOL" = "kernelsu" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + sudo sed -i -e 's@wsa://com.topjohnwu.magisk@https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/KernelSU/MindTheGapps%20and%20AMZ/MindTheGapps%20and%20AMZ.md@g' ../installer/Install.ps1 +else + if [[ "$ROOT_SOL" == "none" ]]; then + sed -i -e 's@Start-Process "wsa://com.topjohnwu.magisk"@@g' ../installer/Install.ps1 + elif [[ "$MAGISK_VER" = "delta" ]]; then + sed -i -e 's@com.topjohnwu.magisk@io.github.huskydg.magisk@g' ../installer/Install.ps1 + elif [[ "$MAGISK_VER" = "alpha" ]]; then + sed -i -e 's@com.topjohnwu.magisk@io.github.vvb2060.magisk@g' ../installer/Install.ps1 + fi + if [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + sed -i -e 's@com.android.vending@com.amazon.venezia@g' ../installer/Install.ps1 + elif [[ "$GAPPS_BRAND" = "none" ]]; then + sed -i -e 's@Start-Process\ "wsa://com.android.vending"@@g' ../installer/Install.ps1 + fi + if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + if [ "$MAGISK_VER" = "canary" ]; then + # Open GitHub readme page for Magisk Canary and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Canary.md" + elif [ "$MAGISK_VER" = "stable" ]; then + # Open GitHub readme page for Magisk Stable and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Stable.md" + elif [ "$MAGISK_VER" = "beta" ]; then + # Open GitHub readme page for Magisk Beta and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Beta.md" + elif [ "$MAGISK_VER" = "debug" ]; then + # Open GitHub readme page for Magisk Debug and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Debug.md" + elif [ "$MAGISK_VER" = "alpha" ]; then + # Open GitHub readme page for Magisk Alpha and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Alpha.md" + elif [ "$MAGISK_VER" = "delta" ]; then + # Open GitHub readme page for Magisk Delta and NoGappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20Removed%20AMZ/Delta.md" + fi + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 + fi + if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "none" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + if [ "$MAGISK_VER" = "canary" ]; then + # Open GitHub readme page for Magisk Canary and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Canary.md" + elif [ "$MAGISK_VER" = "stable" ]; then + # Open GitHub readme page for Magisk Stable and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Stable.md" + elif [ "$MAGISK_VER" = "beta" ]; then + # Open GitHub readme page for Magisk Beta and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Beta.md" + elif [ "$MAGISK_VER" = "debug" ]; then + # Open GitHub readme page for Magisk Debug and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Debug.md" + elif [ "$MAGISK_VER" = "alpha" ]; then + # Open GitHub readme page for Magisk Alpha and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Alpha.md" + elif [ "$MAGISK_VER" = "delta" ]; then + # Open GitHub readme page for Magisk Delta and NoGappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/No%20Gapps%20and%20AMZ/Delta.md" + fi + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 + fi + if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" == "yes" ]]; then + if [ "$MAGISK_VER" = "canary" ]; then + # Open GitHub readme page for Magisk Canary and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Canary.md" + elif [ "$MAGISK_VER" = "stable" ]; then + # Open GitHub readme page for Magisk Stable and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Stable.md" + elif [ "$MAGISK_VER" = "beta" ]; then + # Open GitHub readme page for Magisk Beta and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Beta.md" + elif [ "$MAGISK_VER" = "debug" ]; then + # Open GitHub readme page for Magisk Debug and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Debug.md" + elif [ "$MAGISK_VER" = "alpha" ]; then + # Open GitHub readme page for Magisk Alpha and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Alpha.md" + elif [ "$MAGISK_VER" = "delta" ]; then + # Open GitHub readme page for Magisk Delta and GappsNoAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20Removed%20AMZ/Delta.md" + fi + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 + fi + if [[ "$ROOT_SOL" = "magisk" ]] && [[ "$GAPPS_BRAND" = "MindTheGapps" ]] && [[ "$REMOVE_AMAZON" != "yes" ]]; then + if [ "$MAGISK_VER" = "canary" ]; then + # Open GitHub readme page for Magisk Canary and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Canary.md" + elif [ "$MAGISK_VER" = "stable" ]; then + # Open GitHub readme page for Magisk Stable and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Stable.md" + elif [ "$MAGISK_VER" = "beta" ]; then + # Open GitHub readme page for Magisk Beta and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Beta.md" + elif [ "$MAGISK_VER" = "debug" ]; then + # Open GitHub readme page for Magisk Debug and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Debug.md" + elif [ "$MAGISK_VER" = "alpha" ]; then + # Open GitHub readme page for Magisk Alpha and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Alpha.md" + elif [ "$MAGISK_VER" = "delta" ]; then + # Open GitHub readme page for Magisk Delta and GappsAMZ + readmeUrl="https://github.com/MustardChef/WSABuilds/blob/master/Documentation/Usage%20Guides/Post-Installation%20Guides/Magisk/MindTheGapps%20and%20AMZ/Delta.md" + fi + sudo sed -i "/Start-Process \"shell:AppsFolder\\\\MicrosoftCorporationII.WindowsSubsystemForAndroid_8wekyb3d8bbwe!SettingsApp\"/a\ \ \ \ Start-Process \"$readmeUrl\"" ../installer/Install.ps1 + fi +fi +cp "../installer/$ARCH/Install.ps1" "$WORK_DIR/wsa/$ARCH" || abort +find "$WORK_DIR/wsa/$ARCH" -not -path "*/uwp*" -not -path "*/pri*" -not -path "*/xml*" -printf "%P\n" | sed -e 's@/@\\@g' -e '/^$/d' > "$WORK_DIR/wsa/$ARCH/filelist.txt" || abort +find "$WORK_DIR/wsa/$ARCH/pri" -printf "%P\n" | sed -e 's/^/pri\\/' -e '/^$/d' > "$WORK_DIR/wsa/$ARCH/filelist-pri.txt" || abort +find "$WORK_DIR/wsa/$ARCH/xml" -printf "%P\n" | sed -e 's/^/xml\\/' -e '/^$/d' >> "$WORK_DIR/wsa/$ARCH/filelist-pri.txt" || abort +cp "../installer/$ARCH/MakePri.ps1" "$WORK_DIR/wsa/$ARCH" || abort +cp ../installer/Run.bat "$WORK_DIR/wsa/$ARCH" || abort +echo -e "Remove signature and Add scripts done\n" + +echo "Generate info" +if [[ "$ROOT_SOL" = "none" ]]; then + name1="" +elif [ "$ROOT_SOL" = "magisk" ]; then + name1="-with-Magisk-$MAGISK_VERSION_NAME-$MAGISK_VER" +elif [ "$ROOT_SOL" = "kernelsu" ]; then + name1="-with-KernelSU-$KERNELSU_VER" +fi +if [ "$GAPPS_BRAND" = "none" ]; then + name2="-NoGApps" +else + name2=-MindTheGapps-13.0 +fi +artifact_name=WSA_${WSA_VER}_${ARCH}_${WSA_REL}${name1}${name2} +short_artifact_name=WSA_${WSA_VER}_${ARCH} +if [ "$REMOVE_AMAZON" = "yes" ]; then + artifact_name+="-RemovedAmazon" + touch "$WORK_DIR/wsa/$ARCH/apex/.gitkeep" +fi +echo "$artifact_name" +echo -e "\nFinishing building...." +mkdir -p "$OUTPUT_DIR" +OUTPUT_PATH="${OUTPUT_DIR:?}/$short_artifact_name" +mv "$WORK_DIR/wsa/$ARCH" "$WORK_DIR/wsa/$short_artifact_name" +{ + echo "artifact_folder=${short_artifact_name}" + echo "artifact=${artifact_name}" + echo "arch=${ARCH}" + echo "file_ext=.${COMPRESS_FORMAT}" + echo "built=$(date -u +%Y%m%d%H%M%S)" +} >> "$GITHUB_OUTPUT" +if [[ "$COMPRESS_FORMAT" = "7z" && -z $AFTER_COMPRESS ]]; then + echo "Compressing with 7-Zip" + OUTPUT_PATH="$OUTPUT_PATH.7z" + 7z a -mx=7 "${OUTPUT_PATH:?}" "$WORK_DIR/wsa/$short_artifact_name" || abort +else + echo "Compressing with ZIP later..." + cp -r "$WORK_DIR/wsa/$short_artifact_name" "$OUTPUT_PATH" || abort +fi +echo -e "Done\n" diff --git a/MagiskOnWSAOld/scripts/extractMagisk.py b/MagiskOnWSAOld/scripts/extractMagisk.py new file mode 100644 index 0000000..15ded6a --- /dev/null +++ b/MagiskOnWSAOld/scripts/extractMagisk.py @@ -0,0 +1,104 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +import sys +import zipfile +from pathlib import Path +import platform +import os +from typing import Any, OrderedDict + + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + + +is_x86_64 = platform.machine() in ("AMD64", "x86_64") +host_abi = "x64" if is_x86_64 else "arm64" +arch = sys.argv[1] +magisk_zip = sys.argv[2] +workdir = Path(sys.argv[3]) / "magisk" +if not Path(workdir).is_dir(): + workdir.mkdir() + +abi_map = {"x64": ["x86_64", "x86"], "arm64": ["arm64-v8a", "armeabi-v7a"]} + + +def extract_as(zip, name, as_name, dir): + info = zip.getinfo(name) + info.filename = as_name + zip.extract(info, workdir / dir) + + +with zipfile.ZipFile(magisk_zip) as zip: + props = Prop(zip.comment.decode().replace('\000', '\n')) + versionName = props.get("version") + versionCode = props.get("versionCode") + print(f"Magisk version: {versionName} ({versionCode})", flush=True) + with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: + env = Prop(environ_file.read()) + env.MAGISK_VERSION_NAME = versionName + env.MAGISK_VERSION_CODE = versionCode + with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: + environ_file.write(str(env)) + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libmagisk64.so", "magisk64", "magisk") + extract_as( + zip, f"lib/{ abi_map[arch][1] }/libmagisk32.so", "magisk32", "magisk") + standalone_policy = False + try: + zip.getinfo(f"lib/{ abi_map[arch][0] }/libmagiskpolicy.so") + standalone_policy = True + except: + pass + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskinit", "magisk") + if standalone_policy: + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libmagiskpolicy.so", "magiskpolicy", "magisk") + else: + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libmagiskinit.so", "magiskpolicy", "magisk") + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libmagiskboot.so", "magiskboot", "magisk") + extract_as( + zip, f"lib/{ abi_map[arch][0] }/libbusybox.so", "busybox", "magisk") + if standalone_policy: + extract_as( + zip, f"lib/{ abi_map[host_abi][0] }/libmagiskpolicy.so", "magiskpolicy", ".") + else: + extract_as( + zip, f"lib/{ abi_map[host_abi][0] }/libmagiskinit.so", "magiskpolicy", ".") + extract_as(zip, f"assets/boot_patch.sh", "boot_patch.sh", "magisk") + extract_as(zip, f"assets/util_functions.sh", + "util_functions.sh", "magisk") diff --git a/MagiskOnWSAOld/scripts/extractWSA.py b/MagiskOnWSAOld/scripts/extractWSA.py new file mode 100644 index 0000000..78c1b95 --- /dev/null +++ b/MagiskOnWSAOld/scripts/extractWSA.py @@ -0,0 +1,109 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +import os +import sys +from typing import Any, OrderedDict + +import zipfile +from pathlib import Path +import re +import shutil + + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + + +arch = sys.argv[1] + +zip_name = "" +wsa_zip_path = Path(sys.argv[2]) +rootdir = Path(sys.argv[3]) +env_file = Path(sys.argv[4]) + +workdir = rootdir / "wsa" +archdir = Path(workdir / arch) +pridir = workdir / archdir / 'pri' +xmldir = workdir / archdir / 'xml' +if not Path(rootdir).is_dir(): + rootdir.mkdir() + +if Path(workdir).is_dir(): + shutil.rmtree(workdir) +else: + workdir.unlink(missing_ok=True) + +if not Path(workdir).is_dir(): + workdir.mkdir() + +if not Path(archdir).is_dir(): + archdir.mkdir() +uid = os.getuid() +workdir_rw = os.access(workdir, os.W_OK) + +with zipfile.ZipFile(wsa_zip_path) as zip: + for f in zip.filelist: + if arch in f.filename.lower(): + zip_name = f.filename + if not Path(workdir / zip_name).is_file(): + print(f"unzipping {zip_name} to {workdir}", flush=True) + zip_path = zip.extract(f, workdir) + ver_no = zip_name.split("_") + long_ver = ver_no[1] + rel = ver_no[3].split(".") + rel_long = str(rel[0]) + with open(env_file, 'r') as environ_file: + env = Prop(environ_file.read()) + env.WSA_VER = long_ver + env.WSA_REL = rel_long + with open(env_file, 'w') as environ_file: + environ_file.write(str(env)) + filename_lower = f.filename.lower() + if 'language' in filename_lower or 'scale' in filename_lower: + name = f.filename.split("_")[2].split(".")[0] + zip.extract(f, workdir) + with zipfile.ZipFile(workdir / f.filename) as l: + for g in l.filelist: + if g.filename == 'resources.pri': + g.filename = f'resources.{name}.pri' + l.extract(g, pridir) + elif g.filename == 'AppxManifest.xml': + g.filename = f'resources.{name}.xml' + l.extract(g, xmldir) + elif re.search(u'Images/.+.png', g.filename): + l.extract(g, archdir) +with zipfile.ZipFile(zip_path) as zip: + stat = Path(zip_path).stat() + print(f"unzipping from {zip_path}", flush=True) + zip.extractall(archdir) diff --git a/MagiskOnWSAOld/scripts/fixGappsProp.py b/MagiskOnWSAOld/scripts/fixGappsProp.py new file mode 100644 index 0000000..59128ad --- /dev/null +++ b/MagiskOnWSAOld/scripts/fixGappsProp.py @@ -0,0 +1,96 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +from __future__ import annotations +from io import TextIOWrapper +from typing import OrderedDict +from pathlib import Path +import sys +class Prop(OrderedDict): + def __init__(self, file: TextIOWrapper) -> None: + super().__init__() + for i, line in enumerate(file.read().splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __str__(self) -> str: + return '\n'.join([v if k.startswith('.') else f"{k}={v}" for k, v in self.items()]) + + def __iadd__(self, other: str) -> Prop: + self[f".{len(self)}"] = other + return self + +new_props = { + ("product", "brand"): "google", + ("system", "brand"): "google", + ("product", "manufacturer"): "Google", + ("system", "manufacturer"): "Google", + ("build", "product"): sys.argv[2], + ("product", "name"): sys.argv[2], + ("system", "name"): sys.argv[2], + ("product", "device"): sys.argv[2], + ("system", "device"): sys.argv[2], + ("product", "model"): sys.argv[3], + ("system", "model"): sys.argv[3], + ("build", "flavor"): sys.argv[2] + "-user" +} + +def description(sec: str, p: Prop) -> str: + return f"{p[f'ro.{sec}.build.flavor']} {p[f'ro.{sec}.build.version.release_or_codename']} {p[f'ro.{sec}.build.id']} {p[f'ro.{sec}.build.version.incremental']} {p[f'ro.{sec}.build.tags']}" + + +def fingerprint(sec: str, p: Prop) -> str: + return f"""{p[f"ro.product.{sec}.brand"]}/{p[f"ro.product.{sec}.name"]}/{p[f"ro.product.{sec}.device"]}:{p[f"ro.{sec}.build.version.release"]}/{p[f"ro.{sec}.build.id"]}/{p[f"ro.{sec}.build.version.incremental"]}:{p[f"ro.{sec}.build.type"]}/{p[f"ro.{sec}.build.tags"]}""" + + +def fix_prop(sec, prop): + if not Path(prop).is_file(): + return + + print(f"fixing {prop}", flush=True) + with open(prop, 'r') as f: + p = Prop(f) + + p += "# extra props added by MagiskOnWSA" + + for k, v in new_props.items(): + p[f"ro.{k[0]}.{k[1]}"] = v + + if k[0] == "build": + p[f"ro.{sec}.{k[0]}.{k[1]}"] = v + elif k[0] == "product": + p[f"ro.{k[0]}.{sec}.{k[1]}"] = v + + p["ro.build.description"] = description(sec, p) + p[f"ro.build.fingerprint"] = fingerprint(sec, p) + p[f"ro.{sec}.build.description"] = description(sec, p) + p[f"ro.{sec}.build.fingerprint"] = fingerprint(sec, p) + p[f"ro.bootimage.build.fingerprint"] = fingerprint(sec, p) + + with open(prop, 'w') as f: + f.write(str(p)) + + +sys_path = sys.argv[1] +for sec, prop in {"system": sys_path+"/system/build.prop", "vendor": sys_path+"/vendor/build.prop", "odm": sys_path+"/vendor/odm/etc/build.prop", "vendor_dlkm": sys_path+"/vendor/vendor_dlkm/etc/build.prop"}.items(): + fix_prop(sec, prop) diff --git a/MagiskOnWSAOld/scripts/generateGappsLink.py b/MagiskOnWSAOld/scripts/generateGappsLink.py new file mode 100644 index 0000000..65ab7eb --- /dev/null +++ b/MagiskOnWSAOld/scripts/generateGappsLink.py @@ -0,0 +1,59 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +from datetime import datetime +import sys + +import requests +import json +import re +from pathlib import Path + +arch = sys.argv[1] +arg4 = sys.argv[2] +download_dir = Path.cwd().parent / "download" if arg4 == "" else Path(arg4) +tempScript = sys.argv[3] +file_name = sys.argv[4] +print(f"Generating MindTheGapps download link: arch={arch}", flush=True) +abi_map = {"x64": "x86_64", "arm64": "arm64"} +res = requests.get(f"https://api.github.com/repos/MustardChef/MindTheGappsArchived/releases/latest") +json_data = json.loads(res.content) +headers = res.headers +x_ratelimit_remaining = headers["x-ratelimit-remaining"] +if res.status_code == 200: + assets = json_data["assets"] + for asset in assets: + if re.match(f'.*13\\.0\\.0.{abi_map[arch]}.*.zip$', asset["name"]): + link = asset["browser_download_url"] + break +elif res.status_code == 403 and x_ratelimit_remaining == '0': + message = json_data["message"] + print(f"Github API Error: {message}", flush=True) + ratelimit_reset = headers["x-ratelimit-reset"] + ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) + print(f"The current rate limit window resets in {ratelimit_reset}", flush=True) + exit(1) + +print(f"download link: {link}", flush=True) + +with open(download_dir/tempScript, 'a') as f: + f.writelines(f'{link}\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out={file_name}\n') diff --git a/MagiskOnWSAOld/scripts/generateKernelSULink.py b/MagiskOnWSAOld/scripts/generateKernelSULink.py new file mode 100644 index 0000000..9bcc127 --- /dev/null +++ b/MagiskOnWSAOld/scripts/generateKernelSULink.py @@ -0,0 +1,99 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +from datetime import datetime +import sys +import os +from typing import Any, OrderedDict + +import requests +import json +import re +from pathlib import Path + + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + + +arch = sys.argv[1] +arg2 = sys.argv[2] +download_dir = Path.cwd().parent / "download" if arg2 == "" else Path(arg2) +tempScript = sys.argv[3] +kernelVersion = sys.argv[4] +file_name = sys.argv[5] +abi_map = {"x64": "x86_64", "arm64": "arm64"} +print(f"Generating KernelSU download link: arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) +res = requests.get(f"https://api.github.com/repos/tiann/KernelSU/releases/latest") +json_data = json.loads(res.content) +headers = res.headers +x_ratelimit_remaining = headers["x-ratelimit-remaining"] +if res.status_code == 200: + link = "" + apk = "" + assets = json_data["assets"] + release_name = json_data["tag_name"] + for asset in assets: + if re.match(f'kernel-WSA-{abi_map[arch]}-{kernelVersion}.*.zip$', asset["name"]) and asset["content_type"] == "application/zip": + link = asset["browser_download_url"] + if re.match(f'KernelSU_{release_name}_.*-release.*.apk$', asset["name"]) and asset["content_type"] == "application/vnd.android.package-archive": + apk = asset["browser_download_url"] + break + if link == "": + print(f"Error: No KernelSU release found for arch={abi_map[arch]}, kernel version={kernelVersion}", flush=True) + exit(1) + elif apk == "": + print(f"Error: No KernelSU Manager release found", flush=True) + exit(1) + with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: + env = Prop(environ_file.read()) + env.KERNELSU_VER = release_name + with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: + environ_file.write(str(env)) +elif res.status_code == 403 and x_ratelimit_remaining == '0': + message = json_data["message"] + print(f"Github API Error: {message}", flush=True) + ratelimit_reset = headers["x-ratelimit-reset"] + ratelimit_reset = datetime.fromtimestamp(int(ratelimit_reset)) + print(f"The current rate limit window resets in {ratelimit_reset}", flush=True) + exit(1) + +print(f"download link: {link}", flush=True) + +with open(download_dir/tempScript, 'a') as f: + f.writelines(f'{link}\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out={file_name}\n') + f.writelines(f'{apk}\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out=KernelSU.apk\n') diff --git a/MagiskOnWSAOld/scripts/generateMagiskLink.py b/MagiskOnWSAOld/scripts/generateMagiskLink.py new file mode 100644 index 0000000..df57c66 --- /dev/null +++ b/MagiskOnWSAOld/scripts/generateMagiskLink.py @@ -0,0 +1,65 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +import sys + +import json +import requests +from pathlib import Path + +#Android header +headers = { + 'User-Agent': 'Mozilla/5.0 (Linux; Android 13; Pixel 5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.163 Mobile Safari/537.36', +} + +magisk_ver = sys.argv[1] +download_dir = Path.cwd().parent / "download" if sys.argv[2] == "" else Path(sys.argv[2]) +tempScript = sys.argv[3] +print(f"Generating Magisk download link: release type={magisk_ver}", flush=True) +if not magisk_ver: + magisk_ver = "stable" +if magisk_ver == "stable" or magisk_ver == "beta" or magisk_ver == "canary" or magisk_ver == "debug": + try: + magisk_link = json.loads(requests.get( + f"https://github.com/topjohnwu/magisk-files/raw/master/{magisk_ver}.json", headers=headers).content)['magisk']['link'] + except Exception: + print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") + magisk_link = json.loads(requests.get( + f"https://fastly.jsdelivr.net/gh/topjohnwu/magisk-files@master/{magisk_ver}.json", headers=headers).content)['magisk']['link'] +elif magisk_ver == "delta": + try: + magisk_link = json.loads(requests.get( + f"https://raw.githubusercontent.com/HuskyDG/magisk-files/main/canary.json", headers=headers).content)['magisk']['link'] + except Exception: + print("Failed to fetch from GitHub API, fallbacking to jsdelivr...") + magisk_link = json.loads(requests.get( + f"https://fastly.jsdelivr.net/gh/HuskyDG/magisk-files@main/canary.json", headers=headers).content)['magisk']['link'] +elif magisk_ver == "alpha": + try: + magisk_link = json.loads(requests.get( + f"https://install.appcenter.ms/api/v0.1/apps/vvb2060/magisk/distribution_groups/public/releases/latest?is_install_page=true", headers=headers).content)['download_url'] + except Exception: + print("Failed to fetch from AppCenter API...") +print(f"download link: {magisk_link}", flush=True) + +with open(download_dir/tempScript, 'a') as f: + f.writelines(f'{magisk_link}\n') + f.writelines(f' dir={download_dir}\n') + f.writelines(f' out=magisk-{magisk_ver}.zip\n') diff --git a/MagiskOnWSAOld/scripts/generateWSALinks.py b/MagiskOnWSAOld/scripts/generateWSALinks.py new file mode 100644 index 0000000..fbc8202 --- /dev/null +++ b/MagiskOnWSAOld/scripts/generateWSALinks.py @@ -0,0 +1,198 @@ +#!/usr/bin/python3 +# +# This file is part of MagiskOnWSALocal. +# +# MagiskOnWSALocal is free software: you can redistribute it and/or modify +# it under the terms of the GNU Affero General Public License as +# published by the Free Software Foundation, either version 3 of the +# License, or (at your option) any later version. +# +# MagiskOnWSALocal is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU Affero General Public License for more details. +# +# You should have received a copy of the GNU Affero General Public License +# along with MagiskOnWSALocal. If not, see . +# +# Copyright (C) 2023 LSPosed Contributors +# + +import html +import logging +import os +import re +import sys + +from pathlib import Path +from threading import Thread +from typing import Any, OrderedDict +from xml.dom import minidom + +from requests import Session +from packaging import version + + +class Prop(OrderedDict): + def __init__(self, props: str = ...) -> None: + super().__init__() + for i, line in enumerate(props.splitlines(False)): + if '=' in line: + k, v = line.split('=', 1) + self[k] = v + else: + self[f".{i}"] = line + + def __setattr__(self, __name: str, __value: Any) -> None: + self[__name] = __value + + def __repr__(self): + return '\n'.join(f'{item}={self[item]}' for item in self) + + +logging.captureWarnings(True) +arch = sys.argv[1] + +release_name_map = {"retail": "Retail", "RP": "Release Preview", + "WIS": "Insider Slow", "WIF": "Insider Fast"} +release_type = sys.argv[2] if sys.argv[2] != "" else "Retail" +release_name = release_name_map[release_type] +download_dir = Path.cwd().parent / \ + "download" if sys.argv[3] == "" else Path(sys.argv[3]) +ms_account_conf = download_dir/".ms_account" +tempScript = sys.argv[4] +cat_id = '858014f3-3934-4abe-8078-4aa193e74ca8' +user = '' +session = Session() +session.verify = False +if ms_account_conf.is_file(): + with open(ms_account_conf, "r") as f: + conf = Prop(f.read()) + user = conf.get('user_code') +print(f"Generating WSA download link: arch={arch} release_type={release_name}\n", flush=True) +with open(Path.cwd().parent / ("xml/GetCookie.xml"), "r") as f: + cookie_content = f.read().format(user) + +out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cookie_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} +) +doc = minidom.parseString(out.text) +cookie = doc.getElementsByTagName('EncryptedData')[0].firstChild.nodeValue + +with open(Path.cwd().parent / "xml/WUIDRequest.xml", "r") as f: + cat_id_content = f.read().format(user, cookie, cat_id, release_type) + +out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx', + data=cat_id_content, + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} +) + +doc = minidom.parseString(html.unescape(out.text)) + +filenames = {} +for node in doc.getElementsByTagName('ExtendedUpdateInfo')[0].getElementsByTagName('Updates')[0].getElementsByTagName('Update'): + node_xml = node.getElementsByTagName('Xml')[0] + node_files = node_xml.getElementsByTagName('Files') + if not node_files: + continue + else: + for node_file in node_files[0].getElementsByTagName('File'): + if node_file.hasAttribute('InstallerSpecificIdentifier') and node_file.hasAttribute('FileName'): + filenames[node.getElementsByTagName('ID')[0].firstChild.nodeValue] = (f"{node_file.attributes['InstallerSpecificIdentifier'].value}_{node_file.attributes['FileName'].value}", + node_xml.getElementsByTagName('ExtendedProperties')[0].attributes['PackageIdentityName'].value) + +identities = {} +for node in doc.getElementsByTagName('NewUpdates')[0].getElementsByTagName('UpdateInfo'): + node_xml = node.getElementsByTagName('Xml')[0] + if not node_xml.getElementsByTagName('SecuredFragment'): + continue + else: + id = node.getElementsByTagName('ID')[0].firstChild.nodeValue + update_identity = node_xml.getElementsByTagName('UpdateIdentity')[0] + if id in filenames: + fileinfo = filenames[id] + if fileinfo[0] not in identities: + identities[fileinfo[0]] = ([update_identity.attributes['UpdateID'].value, + update_identity.attributes['RevisionNumber'].value], fileinfo[1]) + +with open(Path.cwd().parent / "xml/FE3FileUrl.xml", "r") as f: + FE3_file_content = f.read() + +if not download_dir.is_dir(): + download_dir.mkdir() + +tmpdownlist = open(download_dir/tempScript, 'a') +download_files = {} + + +def send_req(i, v, out_file_name): + out = session.post( + 'https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx/secured', + data=FE3_file_content.format(user, i, v, release_type), + headers={'Content-Type': 'application/soap+xml; charset=utf-8'} + ) + doc = minidom.parseString(out.text) + for l in doc.getElementsByTagName("FileLocation"): + url = l.getElementsByTagName("Url")[0].firstChild.nodeValue + if len(url) != 99: + download_files[out_file_name] = url + + +threads = [] +wsa_build_ver = 0 +latest_wsa_filename = "" +for filename, values in identities.items(): + if re.match(f"Microsoft.UI.Xaml..*_{arch}_.*.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif re.match(f"Microsoft.VCLibs..+.UWPDesktop_.*_{arch}_.*.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif re.match(f"Microsoft.VCLibs..+_.*_{arch}_.*.appx", filename): + out_file_name = f"{values[1]}_{arch}.appx" + out_file = download_dir / out_file_name + elif re.match(f"MicrosoftCorporationII.WindowsSubsystemForAndroid_.*.msixbundle", filename): + tmp_wsa_filename = filename + tmp_wsa_build_ver = re.search(r"\d{4}.\d{5}.\d{1,}.\d{1,}", filename).group() + if(wsa_build_ver == 0): + latest_wsa_filename = tmp_wsa_filename + wsa_build_ver = tmp_wsa_build_ver + else: + if version.parse(wsa_build_ver) < version.parse(tmp_wsa_build_ver): + latest_wsa_filename = tmp_wsa_filename + wsa_build_ver = tmp_wsa_build_ver + else: + continue + version_splited = wsa_build_ver.split(".") + major_ver = version_splited[0] + with open(os.environ['WSA_WORK_ENV'], 'r') as environ_file: + env = Prop(environ_file.read()) + env.WSA_VER = wsa_build_ver + env.WSA_MAJOR_VER = major_ver + with open(os.environ['WSA_WORK_ENV'], 'w') as environ_file: + environ_file.write(str(env)) + out_file_name = f"wsa-{release_type}.zip" + out_file = download_dir / out_file_name + continue + else: + continue + th = Thread(target=send_req, args=(values[0][0], values[0][1], out_file_name)) + threads.append(th) + th.daemon = True + th.start() +th = Thread(target=send_req, args=(identities[latest_wsa_filename][0][0], identities[latest_wsa_filename][0][1], f"wsa-{release_type}.zip")) +threads.append(th) +th.daemon = True +th.start() +for th in threads: + th.join() +print(f'WSA Build Version={wsa_build_ver}\n', flush=True) +for key, value in download_files.items(): + print(f"download link: {value}\npath: {download_dir / key}\n", flush=True) + tmpdownlist.writelines(value + '\n') + tmpdownlist.writelines(f' dir={download_dir}\n') + tmpdownlist.writelines(f' out={key}\n') +tmpdownlist.close() diff --git a/MagiskOnWSAOld/scripts/requirements.txt b/MagiskOnWSAOld/scripts/requirements.txt new file mode 100644 index 0000000..64e6ca4 --- /dev/null +++ b/MagiskOnWSAOld/scripts/requirements.txt @@ -0,0 +1,2 @@ +requests +packaging diff --git a/MagiskOnWSAOld/x64/system/priv-app/VpnDialogs/VpnDialogs.apk b/MagiskOnWSAOld/x64/system/priv-app/VpnDialogs/VpnDialogs.apk new file mode 100644 index 0000000..c345c99 Binary files /dev/null and b/MagiskOnWSAOld/x64/system/priv-app/VpnDialogs/VpnDialogs.apk differ diff --git a/MagiskOnWSAOld/xml/FE3FileUrl.xml b/MagiskOnWSAOld/xml/FE3FileUrl.xml new file mode 100644 index 0000000..093c314 --- /dev/null +++ b/MagiskOnWSAOld/xml/FE3FileUrl.xml @@ -0,0 +1,37 @@ + + + http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetExtendedUpdateInfo2 + urn:uuid:2cc99c2e-3b3e-4fb1-9e31-0cd30e6f43a0 + https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx/secured + + + 2017-08-01T00:29:01.868Z + 2017-08-01T00:34:01.868Z + + + + {} + + + + + + + + + {} + {} + + + + FileUrl + FileDecryption + + BranchReadinessLevel=CB;CurrentBranch=rs_prerelease;OEMModel=Virtual Machine;FlightRing={};AttrDataVer=21;SystemManufacturer=Microsoft Corporation;InstallLanguage=en-US;OSUILocale=en-US;InstallationType=Client;FlightingBranchName=external;FirmwareVersion=Hyper-V UEFI Release v2.5;SystemProductName=Virtual Machine;OSSkuId=48;FlightContent=Branch;App=WU;OEMName_Uncleaned=Microsoft Corporation;AppVer=10.0.22621.900;OSArchitecture=AMD64;SystemSKU=None;UpdateManagementGroup=2;IsFlightingEnabled=1;IsDeviceRetailDemo=0;TelemetryLevel=3;OSVersion=10.0.22621.900;DeviceFamily=Windows.Desktop; + + + diff --git a/MagiskOnWSAOld/xml/GetCookie.xml b/MagiskOnWSAOld/xml/GetCookie.xml new file mode 100644 index 0000000..6006128 --- /dev/null +++ b/MagiskOnWSAOld/xml/GetCookie.xml @@ -0,0 +1,37 @@ + +
+ http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/GetCookie + urn:uuid:b9b43757-2247-4d7b-ae8f-a71ba8a22386 + https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx + + + 2017-12-02T00:16:15.210Z + 2017-12-29T06:25:43.943Z + + + + {} + + + +
+ + + + + 2015-10-21T17:01:07.1472913Z + 2017-12-02T00:16:15.217Z + 1.40 + + +
\ No newline at end of file diff --git a/MagiskOnWSAOld/xml/WUIDRequest.xml b/MagiskOnWSAOld/xml/WUIDRequest.xml new file mode 100644 index 0000000..4c2a32b --- /dev/null +++ b/MagiskOnWSAOld/xml/WUIDRequest.xml @@ -0,0 +1,677 @@ + + + http://www.microsoft.com/SoftwareDistribution/Server/ClientWebService/SyncUpdates + urn:uuid:175df68c-4b91-41ee-b70b-f2208c65438e + https://fe3.delivery.mp.microsoft.com/ClientWebService/client.asmx + + + 2017-08-05T02:03:05.038Z + 2017-08-05T02:08:05.038Z + + + + {} + + + + + + + + 2045-03-11T02:02:48Z + {} + + + false + + 1 + 2 + 3 + 11 + 19 + 544 + 549 + 2359974 + 2359977 + 5169044 + 8788830 + 23110993 + 23110994 + 54341900 + 54343656 + 59830006 + 59830007 + 59830008 + 60484010 + 62450018 + 62450019 + 62450020 + 66027979 + 66053150 + 97657898 + 98822896 + 98959022 + 98959023 + 98959024 + 98959025 + 98959026 + 104433538 + 104900364 + 105489019 + 117765322 + 129905029 + 130040031 + 132387090 + 132393049 + 133399034 + 138537048 + 140377312 + 143747671 + 158941041 + 158941042 + 158941043 + 158941044 + 159123858 + 159130928 + 164836897 + 164847386 + 164848327 + 164852241 + 164852246 + 164852252 + 164852253 + + + 10 + 17 + 2359977 + 5143990 + 5169043 + 5169047 + 8806526 + 9125350 + 9154769 + 10809856 + 23110995 + 23110996 + 23110999 + 23111000 + 23111001 + 23111002 + 23111003 + 23111004 + 24513870 + 28880263 + 30077688 + 30486944 + 30526991 + 30528442 + 30530496 + 30530501 + 30530504 + 30530962 + 30535326 + 30536242 + 30539913 + 30545142 + 30545145 + 30545488 + 30546212 + 30547779 + 30548797 + 30548860 + 30549262 + 30551160 + 30551161 + 30551164 + 30553016 + 30553744 + 30554014 + 30559008 + 30559011 + 30560006 + 30560011 + 30561006 + 30563261 + 30565215 + 30578059 + 30664998 + 30677904 + 30681618 + 30682195 + 30685055 + 30702579 + 30708772 + 30709591 + 30711304 + 30715418 + 30720106 + 30720273 + 30732075 + 30866952 + 30866964 + 30870749 + 30877852 + 30878437 + 30890151 + 30892149 + 30990917 + 31049444 + 31190936 + 31196961 + 31197811 + 31198836 + 31202713 + 31203522 + 31205442 + 31205557 + 31207585 + 31208440 + 31208451 + 31209591 + 31210536 + 31211625 + 31212713 + 31213588 + 31218518 + 31219420 + 31220279 + 31220302 + 31222086 + 31227080 + 31229030 + 31238236 + 31254198 + 31258008 + 36436779 + 36437850 + 36464012 + 41916569 + 47249982 + 47283134 + 58577027 + 58578040 + 58578041 + 58628920 + 59107045 + 59125697 + 59142249 + 60466586 + 60478936 + 66450441 + 66467021 + 66479051 + 75202978 + 77436021 + 77449129 + 85159569 + 90199702 + 90212090 + 96911147 + 97110308 + 98528428 + 98665206 + 98837995 + 98842922 + 98842977 + 98846632 + 98866485 + 98874250 + 98879075 + 98904649 + 98918872 + 98945691 + 98959458 + 98984707 + 100220125 + 100238731 + 100662329 + 100795834 + 100862457 + 103124811 + 103348671 + 104369981 + 104372472 + 104385324 + 104465831 + 104465834 + 104467697 + 104473368 + 104482267 + 104505005 + 104523840 + 104550085 + 104558084 + 104659441 + 104659675 + 104664678 + 104668274 + 104671092 + 104673242 + 104674239 + 104679268 + 104686047 + 104698649 + 104751469 + 104752478 + 104755145 + 104761158 + 104762266 + 104786484 + 104853747 + 104873258 + 104983051 + 105063056 + 105116588 + 105178523 + 105318602 + 105362613 + 105364552 + 105368563 + 105369591 + 105370746 + 105373503 + 105373615 + 105376634 + 105377546 + 105378752 + 105379574 + 105381626 + 105382587 + 105425313 + 105495146 + 105862607 + 105939029 + 105995585 + 106017178 + 106129726 + 106768485 + 107825194 + 111906429 + 115121473 + 115578654 + 116630363 + 117835105 + 117850671 + 118638500 + 118662027 + 118872681 + 118873829 + 118879289 + 118889092 + 119501720 + 119551648 + 119569538 + 119640702 + 119667998 + 119674103 + 119697201 + 119706266 + 119744627 + 119773746 + 120072697 + 120144309 + 120214154 + 120357027 + 120392612 + 120399120 + 120553945 + 120783545 + 120797092 + 120881676 + 120889689 + 120999554 + 121168608 + 121268830 + 121341838 + 121729951 + 121803677 + 122165810 + 125408034 + 127293130 + 127566683 + 127762067 + 127861893 + 128571722 + 128647535 + 128698922 + 128701748 + 128771507 + 129037212 + 129079800 + 129175415 + 129317272 + 129319665 + 129365668 + 129378095 + 129424803 + 129590730 + 129603714 + 129625954 + 129692391 + 129714980 + 129721097 + 129886397 + 129968371 + 129972243 + 130009862 + 130033651 + 130040030 + 130040032 + 130040033 + 130091954 + 130100640 + 130131267 + 130131921 + 130144837 + 130171030 + 130172071 + 130197218 + 130212435 + 130291076 + 130402427 + 130405166 + 130676169 + 130698471 + 130713390 + 130785217 + 131396908 + 131455115 + 131682095 + 131689473 + 131701956 + 132142800 + 132525441 + 132765492 + 132801275 + 133399034 + 134522926 + 134524022 + 134528994 + 134532942 + 134536993 + 134538001 + 134547533 + 134549216 + 134549317 + 134550159 + 134550214 + 134550232 + 134551154 + 134551207 + 134551390 + 134553171 + 134553237 + 134554199 + 134554227 + 134555229 + 134555240 + 134556118 + 134557078 + 134560099 + 134560287 + 134562084 + 134562180 + 134563287 + 134565083 + 134566130 + 134568111 + 134624737 + 134666461 + 134672998 + 134684008 + 134916523 + 135100527 + 135219410 + 135222083 + 135306997 + 135463054 + 135779456 + 135812968 + 136097030 + 136131333 + 136146907 + 136157556 + 136320962 + 136450641 + 136466000 + 136745792 + 136761546 + 136840245 + 138160034 + 138181244 + 138210071 + 138210107 + 138232200 + 138237088 + 138277547 + 138287133 + 138306991 + 138324625 + 138341916 + 138372035 + 138372036 + 138375118 + 138378071 + 138380128 + 138380194 + 138534411 + 138618294 + 138931764 + 139536037 + 139536038 + 139536039 + 139536040 + 140367832 + 140406050 + 140421668 + 140422973 + 140423713 + 140436348 + 140483470 + 140615715 + 140802803 + 140896470 + 141189437 + 141192744 + 141382548 + 141461680 + 141624996 + 141627135 + 141659139 + 141872038 + 141993721 + 142006413 + 142045136 + 142095667 + 142227273 + 142250480 + 142518788 + 142544931 + 142546314 + 142555433 + 142653044 + 143191852 + 143258496 + 143299722 + 143331253 + 143432462 + 143632431 + 143695326 + 144219522 + 144590916 + 145410436 + 146720405 + 150810438 + 151258773 + 151315554 + 151400090 + 151429441 + 151439617 + 151453617 + 151466296 + 151511132 + 151636561 + 151823192 + 151827116 + 151850642 + 152016572 + 153111675 + 153114652 + 153123147 + 153267108 + 153389799 + 153395366 + 153718608 + 154171028 + 154315227 + 154559688 + 154978771 + 154979742 + 154985773 + 154989370 + 155044852 + 155065458 + 155578573 + 156403304 + 159085959 + 159776047 + 159816630 + 160733048 + 160733049 + 160733050 + 160733051 + 160733056 + 164824922 + 164824924 + 164824926 + 164824930 + 164831646 + 164831647 + 164831648 + 164831650 + 164835050 + 164835051 + 164835052 + 164835056 + 164835057 + 164835059 + 164836898 + 164836899 + 164836900 + 164845333 + 164845334 + 164845336 + 164845337 + 164845341 + 164845342 + 164845345 + 164845346 + 164845349 + 164845350 + 164845353 + 164845355 + 164845358 + 164845361 + 164845364 + 164847387 + 164847388 + 164847389 + 164847390 + 164848328 + 164848329 + 164848330 + 164849448 + 164849449 + 164849451 + 164849452 + 164849454 + 164849455 + 164849457 + 164849461 + 164850219 + 164850220 + 164850222 + 164850223 + 164850224 + 164850226 + 164850227 + 164850228 + 164850229 + 164850231 + 164850236 + 164850237 + 164850240 + 164850242 + 164850243 + 164852242 + 164852243 + 164852244 + 164852247 + 164852248 + 164852249 + 164852250 + 164852251 + 164852254 + 164852256 + 164852257 + 164852258 + 164852259 + 164852260 + 164852261 + 164852262 + 164853061 + 164853063 + 164853071 + 164853072 + 164853075 + 168118980 + 168118981 + 168118983 + 168118984 + 168180375 + 168180376 + 168180378 + 168180379 + 168270830 + 168270831 + 168270833 + 168270834 + 168270835 + + false + true + + + {} + + + true + false + + + + Extended + + + en-US + en + + + + en-US + + + false + BranchReadinessLevel=CB;CurrentBranch=rs_prerelease;OEMModel=Virtual Machine;FlightRing={};AttrDataVer=21;SystemManufacturer=Microsoft Corporation;InstallLanguage=en-US;OSUILocale=en-US;InstallationType=Client;FlightingBranchName=external;FirmwareVersion=Hyper-V UEFI Release v2.5;SystemProductName=Virtual Machine;OSSkuId=48;FlightContent=Branch;App=WU;OEMName_Uncleaned=Microsoft Corporation;AppVer=10.0.22621.900;OSArchitecture=AMD64;SystemSKU=None;UpdateManagementGroup=2;IsFlightingEnabled=1;IsDeviceRetailDemo=0;TelemetryLevel=3;OSVersion=10.0.22621.900;DeviceFamily=Windows.Desktop; + Interactive=1;IsSeeker=0; + + + + + + diff --git a/MagiskOnWSAOld/xml/priconfig.xml b/MagiskOnWSAOld/xml/priconfig.xml new file mode 100644 index 0000000..5bae2e3 --- /dev/null +++ b/MagiskOnWSAOld/xml/priconfig.xml @@ -0,0 +1,29 @@ + + + + + + + + + + + +