Esta é uma pré-visualização de arquivo. Entre para ver o arquivo original
META-INF/com/google/android/update-binary #!/sbin/sh ################# # Initialization ################# umask 022 # echo before loading util_functions ui_print() { echo "$1"; } require_new_magisk() { ui_print "*******************************" ui_print " Please install Magisk v20.4+! " ui_print "*******************************" exit 1 } ######################### # Load util_functions.sh ######################### OUTFD=$2 ZIPFILE=$3 mount /data 2>/dev/null [ -f /data/adb/magisk/util_functions.sh ] || require_new_magisk . /data/adb/magisk/util_functions.sh [ $MAGISK_VER_CODE -lt 20400 ] && require_new_magisk install_module exit 0 META-INF/com/google/android/updater-script #MAGISK classes.dex customize.sh # Error on < Android 8. if [ "$API" -lt 26 ]; then abort "- !!! You can't use this module on Android < 8.0" fi # safetynet-fix module is obsolete and it's incompatible with PIF. if [ -d /data/adb/modules/safetynet-fix ]; then rm -rf /data/adb/modules/safetynet-fix rm -f /data/adb/SNFix.dex ui_print "! safetynet-fix module will be removed. Do NOT install it again along PIF." fi # MagiskHidePropsConf module is obsolete in Android 8+ but it shouldn't give issues. if [ -d /data/adb/modules/MagiskHidePropsConf ]; then ui_print "! WARNING, MagiskHidePropsConf module may cause issues with PIF." fi # Check custom fingerprint if [ -f "/data/adb/pif.json" ]; then mv -f "/data/adb/pif.json" "/data/adb/pif.json.old" ui_print "- Backup old pif.json" fi module.prop id=playintegrityfix name=Play Integrity Fix version=v15.9.9 versionCode=15990 author=chiteroman description=Universal modular fix for Play Integrity (and SafetyNet) on devices running Android 8-14. updateJson=https://raw.githubusercontent.com/chiteroman/PlayIntegrityFix/main/update.json pif.json { "MANUFACTURER": "Google", "MODEL": "Pixel", "FINGERPRINT": "google/sailfish/sailfish:8.1.0/OPM1.171019.011/4448085:user/release-keys", "BRAND": "google", "PRODUCT": "sailfish", "DEVICE": "sailfish", "RELEASE": "8.1.0", "ID": "OPM1.171019.011", "INCREMENTAL": "4448085", "TYPE": "user", "TAGS": "release-keys", "SECURITY_PATCH": "2017-12-05", "DEVICE_INITIAL_SDK_INT": "25" } post-fs-data.sh # Remove Play Services from Magisk Denylist when set to enforcing if magisk --denylist status; then magisk --denylist rm com.google.android.gms fi # Remove safetynet-fix module if installed if [ -d /data/adb/modules/safetynet-fix ]; then rm -rf /data/adb/modules/safetynet-fix rm -rf /data/adb/SNFix.dex fi resetprop_if_diff() { local NAME="$1" local EXPECTED="$2" local CURRENT="$(resetprop "$NAME")" [ -z "$CURRENT" ] || [ "$CURRENT" = "$EXPECTED" ] || resetprop "$NAME" "$EXPECTED" } resetprop_if_diff ro.build.tags release-keys resetprop_if_diff ro.boot.warranty_bit 0 resetprop_if_diff ro.vendor.boot.warranty_bit 0 resetprop_if_diff ro.vendor.warranty_bit 0 resetprop_if_diff ro.warranty_bit 0 resetprop_if_diff ro.is_ever_orange 0 resetprop_if_diff ro.build.type user resetprop_if_diff ro.debuggable 0 resetprop_if_diff ro.secure 1 service.sh # Conditional sensitive properties resetprop_if_diff() { local NAME="$1" local EXPECTED="$2" local CURRENT="$(resetprop "$NAME")" [ -z "$CURRENT" ] || [ "$CURRENT" = "$EXPECTED" ] || resetprop "$NAME" "$EXPECTED" } resetprop_if_match() { local NAME="$1" local CONTAINS="$2" local VALUE="$3" [[ "$(resetprop "$NAME")" = *"$CONTAINS"* ]] && resetprop "$NAME" "$VALUE" } # Magisk recovery mode resetprop_if_match ro.bootmode recovery unknown resetprop_if_match ro.boot.mode recovery unknown resetprop_if_match vendor.boot.mode recovery unknown # SELinux resetprop_if_diff ro.boot.selinux enforcing # use delete since it can be 0 or 1 for enforcing depending on OEM if [ -n "$(resetprop ro.build.selinux)" ]; then resetprop --delete ro.build.selinux fi # use toybox to protect *stat* access time reading if [ "$(toybox cat /sys/fs/selinux/enforce)" = "0" ]; then chmod 640 /sys/fs/selinux/enforce chmod 440 /sys/fs/selinux/policy fi # Late props which must be set after boot_completed { until [[ "$(getprop sys.boot_completed)" == "1" ]]; do sleep 1 done # SafetyNet/Play Integrity | Avoid breaking Realme fingerprint scanners resetprop_if_diff ro.boot.flash.locked 1 # SafetyNet/Play Integrity | Avoid breaking Oppo fingerprint scanners resetprop_if_diff ro.boot.vbmeta.device_state locked # SafetyNet/Play Integrity | Avoid breaking OnePlus display modes/fingerprint scanners resetprop_if_diff vendor.boot.verifiedbootstate green # SafetyNet/Play Integrity | Avoid breaking OnePlus display modes/fingerprint scanners on OOS 12 resetprop_if_diff ro.boot.verifiedbootstate green resetprop_if_diff ro.boot.veritymode enforcing resetprop_if_diff vendor.boot.vbmeta.device_state locked }& zygisk/arm64-v8a.so zygisk/armeabi-v7a.so zygisk/x86.so zygisk/x86_64.so