extract-files.py 3.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374
  1. #!/usr/bin/env -S PYTHONPATH=../../../tools/extract-utils python3
  2. #
  3. # SPDX-FileCopyrightText: 2024 The LineageOS Project
  4. # SPDX-License-Identifier: Apache-2.0
  5. #
  6. from extract_utils.file import File
  7. from extract_utils.fixups_blob import (
  8. BlobFixupCtx,
  9. blob_fixup,
  10. blob_fixups_user_type,
  11. )
  12. from extract_utils.fixups_lib import (
  13. lib_fixup_remove,
  14. lib_fixups,
  15. lib_fixups_user_type,
  16. )
  17. from extract_utils.main import (
  18. ExtractUtils,
  19. ExtractUtilsModule,
  20. )
  21. namespace_imports = [
  22. # FIXME
  23. 'device/samsung/e3q',
  24. 'hardware/samsung',
  25. 'kernel/samsung/sm8650',
  26. 'kernel/samsung/sm8650-modules',
  27. 'hardware/qcom-caf/sm8650',
  28. 'vendor/qcom/opensource/commonsys/display',
  29. 'vendor/qcom/opensource/commonsys-intf/display',
  30. 'hardware/qcom-caf/sm8650/data-ipa-cfg-mgr',
  31. 'vendor/qcom/opensource/dataservices',
  32. 'hardware/qcom-caf/wlan',
  33. #'packages/apps/FMRadio/jni/fmr',
  34. #'frameworks/native/libs/vibrator',
  35. ]
  36. def lib_fixup_vendor_suffix(lib: str, partition: str, *args, **kwargs):
  37. return f'{lib}_{partition}' if partition == 'vendor' else None
  38. lib_fixups: lib_fixups_user_type = {
  39. **lib_fixups,
  40. (
  41. 'libsecril-client'
  42. ): lib_fixup_vendor_suffix,
  43. (
  44. 'libagmclient',
  45. 'libpalclient',
  46. 'libwpa_client',
  47. ): lib_fixup_remove,
  48. }
  49. blob_fixups: blob_fixups_user_type = {
  50. ('vendor/lib64/libhyper.so', 'vendor/lib64/libspukeymintdeviceutils.so', 'vendor/lib64/hw/gatekeeper.mdfpp.so', 'vendor/lib64/libcppcose_rkp.so', 'vendor/lib64/libspukeymint.so', 'vendor/lib64/libhermes.so', 'vendor/lib64/libese-grdg.so', 'vendor/lib64/libspukeymintutils.so', 'vendor/lib64/libskeymint10device.so', 'vendor/lib64/liblbs_core.so', 'vendor/lib64/liboemcrypto.so', 'vendor/lib64/libwifi-hal-qcom.so', 'vendor/lib64/libpuresoftkeymasterdevice.so', 'vendor/lib64/libpal_net_if.so', 'vendor/lib64/libsfp_sensor.so', 'vendor/lib64/libkeystore-engine-wifi-hidl.so', 'vendor/lib64/libkeymaster_portable.so', 'vendor/lib64/mediacas/libclearkeycasplugin.so', 'vendor/lib64/libqcc_sdk.so', 'vendor/lib64/libdk_vnd_service_core.so', 'vendor/lib64/libwifi-hal.so', 'vendor/lib64/libtlpd_crypto.so', 'vendor/lib64/libsec-ril.so', 'vendor/lib64/libcppbor_external.so', 'vendor/lib64/libucm_tlc_tz_esecomm.so', 'vendor/lib64/libqms.so', 'vendor/lib64/libskeymint_cli.so', 'vendor/lib64/libengmode15.so', 'vendor/lib64/libkeymaster4_1support.so', 'vendor/lib64/libizat_core.so', 'vendor/lib64/libspcom.so', 'vendor/lib64/libFaceService.so', 'vendor/lib64/uwb_uci.hal.so', 'vendor/lib64/libnicm_utils.so', 'vendor/lib64/mediadrm/libdrmclearkeyplugin.so', 'vendor/lib64/libkeymaster4support.so', 'vendor/lib64/libsdmextension.so'): blob_fixup()
  51. .replace_needed('libcrypto.so', 'libcrypto-v33.so')
  52. .add_needed('android.hardware.security.rkp-V3-ndk.so')
  53. } # fmt: skip
  54. module = ExtractUtilsModule(
  55. 'e3q',
  56. 'samsung',
  57. blob_fixups=blob_fixups,
  58. lib_fixups=lib_fixups,
  59. namespace_imports=namespace_imports,
  60. check_elf=True
  61. )
  62. if __name__ == '__main__':
  63. utils = ExtractUtils.device(module)
  64. utils.run()