blob: f25ac9db997ab03c210687f9daf367e54d9b3756 [file] [log] [blame]
Remi NGUYEN VANf231f5f2024-05-09 18:46:45 +09001#!/bin/bash
2
3# Script to swap core networking modules in a GMS userdebug device to AOSP modules, by remounting
4# the system partition and replacing module prebuilts. This is only to be used for local testing,
5# and should only be used on userdebug devices that support "adb root" and remounting the system
6# partition using overlayfs.
7#
8# Usage: aospify_device.sh [device_serial]
9# Reset by wiping data (adb reboot bootloader && fastboot erase userdata && fastboot reboot).
10#
11# This applies to NetworkStack, CaptivePortalLogin, dnsresolver, tethering, cellbroadcast modules,
12# which generally need to be preloaded together (core networking modules + cellbroadcast which
13# shares its certificates with NetworkStack and CaptivePortalLogin)
14#
15# This allows device manufacturers to test their changes in AOSP modules, running them on their
16# own device builds, before contributing contributing the patches to AOSP. After running this script
17# once AOSP modules can be quickly built and updated on the prepared device with:
18# m NetworkStack
19# adb install --staged $ANDROID_PRODUCT_OUT/system/priv-app/NetworkStack/NetworkStack.apk \
20# adb reboot
21# or for APEX modules:
22# m com.android.tethering deapexer
23# $ANDROID_HOST_OUT/bin/deapexer decompress --input $ANDROID_PRODUCT_OUT/system/apex/com.android.tethering.capex --output /tmp/decompressed.apex
24# adb install /tmp/decompressed.apex && adb reboot
25#
26# This has been tested on Android T and Android U Pixel devices. On recent (U+) devices, it requires
27# setting a released target SDK (for example target_sdk_version: "34") in
28# packages/modules/Connectivity/service/ServiceConnectivityResources/Android.bp before building.
29set -e
30
31function push_apex {
32 local original_apex_name=$1
33 local aosp_apex_name=$2
34 if $ADB_CMD shell ls /system/apex/$original_apex_name.capex 1>/dev/null 2>/dev/null; then
35 $ADB_CMD shell rm /system/apex/$original_apex_name.capex
36 $ADB_CMD push $ANDROID_PRODUCT_OUT/system/apex/$aosp_apex_name.capex /system/apex/
37 else
38 rm -f /tmp/decompressed_$aosp_apex_name.apex
39 $ANDROID_HOST_OUT/bin/deapexer decompress --input $ANDROID_PRODUCT_OUT/system/apex/$aosp_apex_name.capex --output /tmp/decompressed_$aosp_apex_name.apex
40 $ADB_CMD shell rm /system/apex/$original_apex_name.apex
41 $ADB_CMD push /tmp/decompressed_$aosp_apex_name.apex /system/apex/$aosp_apex_name.apex
42 rm /tmp/decompressed_$aosp_apex_name.apex
43 fi
44}
45
46function push_apk {
47 local app_type=$1
48 local original_apk_name=$2
49 local aosp_apk_name=$3
50 $ADB_CMD shell rm /system/$app_type/$original_apk_name/$original_apk_name.apk
51 $ADB_CMD push $ANDROID_PRODUCT_OUT/system/$app_type/$aosp_apk_name/$aosp_apk_name.apk /system/$app_type/$original_apk_name/
52}
53
54NETWORKSTACK_AOSP_SEPOLICY_KEY="<signer signature=\"308205dc308203c4a003020102020900fc6cb0d8a6fdd16\
558300d06092a864886f70d01010b0500308181310b30090603550406130255533113301106035504080c0a43616c69666f72\
566e69613116301406035504070c0d4d6f756e7461696e20566965773110300e060355040a0c07416e64726f69643110300e0\
5760355040b0c07416e64726f69643121301f06035504030c18636f6d2e616e64726f69642e6e6574776f726b737461636b30\
5820170d3139303231323031343632305a180f34373537303130383031343632305a308181310b30090603550406130255533\
59113301106035504080c0a43616c69666f726e69613116301406035504070c0d4d6f756e7461696e20566965773110300e06\
600355040a0c07416e64726f69643110300e060355040b0c07416e64726f69643121301f06035504030c18636f6d2e616e647\
6126f69642e6e6574776f726b737461636b30820222300d06092a864886f70d01010105000382020f003082020a0282020100\
62bb71f5137ff0b2d757acc2ca3d378e0f8de11090d5caf3d49e314d35c283b778b02d792d8eba440364ca970985441660f0b\
63c00afbc63dd611b1bf51ad28a1edd21e0048f548b80f8bd113e25682822f57dab8273afaf12c64d19a0c6be238f3e66ddc7\
649b10fd926931e3ee60a7bf618644da3c2c4fc428139d45d27beda7fe45e30075b493ead6ec01cdd55d931c0a657e2e59742\
65ca632b6dc3842a2deb7d22443c809291d7a549203ae6ae356582a4ca23f30f0549c4ec8408a75278e95c69e8390ad5280bc\
66efaef6f1309a41bd9f3bfb5d12dca7e79ec6fd6848193fa9ab728224887b4f93e985ec7cbf6401b0e863a4b91c05d046f04\
670fe954004b1645954fcb4114cee1e8b64b47d719a19ef4c001cb183f7f3e166e43f56d68047c3440da34fdf529d44274b8b\
682f6afb345091ad8ad4b93bd5c55d52286a5d3c157465db8ddf62e7cdb6b10fb18888046afdd263ae6f2125d9065759c7e42\
69f8610a6746edbdc547d4301612eeec3c3cbd124dececc8d38b20e73b13f24ee7ca13a98c5f61f0c81b07d2b519749bc2bcb\
709e0949aef6c118a3e8125e6ab57fce46bb091a66740e10b31c740b891900c0ecda9cc69ecb4f3369998b175106dd0a4ffd7\
71024eb7e75fedd1a5b131d0bb2b40c63491e3cf86b8957b21521b3a96ed1376a51a6ac697866b0256dee1bcd9ab9a188bf4c\
72ed80b59a5f24c2da9a55eb7b0e502116e30203010001a3533051301d0603551d0e041604149383c92cfbf099d5c47b0c365\
737d8622a084b72e1301f0603551d230418301680149383c92cfbf099d5c47b0c3657d8622a084b72e1300f0603551d130101\
74ff040530030101ff300d06092a864886f70d01010b050003820201006a0501382fde2a6b8f70c60cd1b8ee4f788718c288b\
75170258ef3a96230b65005650d6a4c42a59a97b2ddec502413e7b438fbd060363d74b74a232382a7f77fd3da34e38f79fad0\
7635a8b472c5cff365818a0118d87fa1e31cc7ed4befd27628760c290980c3cc3b7ff0cfd01b75ff1fcc83e981b5b25a54d85\
77b68a80424ac26015fb3a4c754969a71174c0bc283f6c88191dced609e245f5938ffd0ad799198e2d0bf6342221c1b0a5d33\
782ed2fffc668982cabbcb7d3b630ff8476e5c84ac0ad37adf9224035200039f95ec1fa95bf83796c0e8986135cee2dcaef19\
790b249855a7e7397d4a0bf17ea63d978589c6b48118a381fffbd790c44d80233e2e35292a3b5533ca3f2cc173f85cf904adf\
80e2e4e2183dc1eba0ebae07b839a81ff1bc92e292550957c8599af21e9c0497b9234ce345f3f508b1cc872aa55ddb5e773c5\
81c7dd6577b9a8b6daed20ae1ff4b8206fd9f5c8f5a22ba1980bef01ae6fcb2659b97ad5b985fa81c019ffe008ddd9c8130c0\
826fc6032b2149c2209fc438a7e8c3b20ce03650ad31c4ee48f169777a0ae182b72ca31b81540f61f167d8d7adf4f6bb2330f\
83f5c24037245000d8172c12ab5d5aa5890b8b12db0f0e7296264eb66e7f9714c31004649fb4b864005f9c43c80db3f6de52f\
84d44d6e2036bfe7f5807156ed5ab591d06fd6bb93ba4334ea2739af8b41ed2686454e60b666d10738bb7ba88001\">\
85<seinfo value=\"network_stack\"\/><\/signer>"
86
87DEVICE=$1
88ADB_CMD="adb -s $DEVICE"
89
90if [ -z "$DEVICE" ]; then
91 echo "Usage: aospify_device.sh [device_serial]"
92 exit 1
93fi
94
95if [ -z "$ANDROID_BUILD_TOP" ]; then
96 echo "Run build/envsetup.sh first to set ANDROID_BUILD_TOP"
97 exit 1
98fi
99
100if ! $ADB_CMD wait-for-device shell pm path com.google.android.networkstack; then
101 echo "This device is already not using GMS modules"
102 exit 1
103fi
104
105read -p "This script is only for test purposes and highly likely to make your device unusable. \
106Continue ? <y/N>" prompt
107if [[ $prompt != "y" ]]
108then
109 exit 0
110fi
111
112cd $ANDROID_BUILD_TOP
113source build/envsetup.sh
114lunch aosp_arm64-trunk_staging-userdebug
115m NetworkStack CaptivePortalLogin com.android.tethering com.android.cellbroadcast \
116 com.android.resolv deapexer \
117 out/target/product/generic_arm64/system/etc/selinux/plat_mac_permissions.xml \
118 out/target/product/generic_arm64/system/etc/permissions/com.android.networkstack.xml
119
120$ADB_CMD root
121$ADB_CMD remount
122$ADB_CMD reboot
123
124echo "Waiting for boot..."
125$ADB_CMD wait-for-device;
126until [[ $($ADB_CMD shell getprop sys.boot_completed) == 1 ]]; do
127 sleep 1;
128done
129
130$ADB_CMD root
131$ADB_CMD remount
132
133push_apk priv-app NetworkStackGoogle NetworkStack
134push_apk app CaptivePortalLoginGoogle CaptivePortalLogin
135push_apex com.google.android.tethering com.android.tethering
136push_apex com.google.android.cellbroadcast com.android.cellbroadcast
137push_apex com.google.android.resolv com.android.resolv
138
139# Replace the network_stack key used to set its sepolicy context
140rm -f /tmp/pulled_plat_mac_permissions.xml
141$ADB_CMD pull /system/etc/selinux/plat_mac_permissions.xml /tmp/pulled_plat_mac_permissions.xml
142sed_replace='s/<signer signature="[0-9a-fA-F]+"><seinfo value="network_stack"\/><\/signer>/'$NETWORKSTACK_AOSP_SEPOLICY_KEY'/'
143sed -E "$sed_replace" /tmp/pulled_plat_mac_permissions.xml |
144 $ADB_CMD shell 'cat > /system/etc/selinux/plat_mac_permissions.xml'
145rm /tmp/pulled_plat_mac_permissions.xml
146
147# Update the networkstack privapp-permissions allowlist
148rm -f /tmp/pulled_privapp-permissions.xml
149$ADB_CMD pull /system/etc/permissions/privapp-permissions-google.xml /tmp/pulled_privapp-permissions.xml
150
151# Remove last </permission> line, and the permissions for com.google.android.networkstack
152sed -nE '1,/<\/permissions>/p' /tmp/pulled_privapp-permissions.xml \
153 | sed -E '/com.google.android.networkstack/,/privapp-permissions/d' > /tmp/modified_privapp-permissions.xml
154# Add the AOSP permissions and re-add the </permissions> line
155sed -nE '/com.android.networkstack/,/privapp-permissions/p' $ANDROID_PRODUCT_OUT/system/etc/permissions/com.android.networkstack.xml \
156 >> /tmp/modified_privapp-permissions.xml
157echo '</permissions>' >> /tmp/modified_privapp-permissions.xml
158
159$ADB_CMD push /tmp/modified_privapp-permissions.xml /system/etc/permissions/privapp-permissions-google.xml
160
161rm /tmp/pulled_privapp-permissions.xml /tmp/modified_privapp-permissions.xml
162
163echo "Done modifying, rebooting"
164$ADB_CMD reboot