You want an example? GrapheneOS, to take back my privacy.
You want an example? GrapheneOS, to take back my privacy.
The kitty must’ve pressed the I key an extra time 'cause it’s misspelled.
Now that I think about it, I’m not sure that Automate currently natively supports running commands with the Shizuku service. It uses its own privileged service that does practically the same thing. If you’re really desperate for using Shizuku, you could look into using the rish adb shell that Shizuku provides, but I’d suggest trying out the native privileged functionality in Automate first.
You can run Shizuku in ADB privileged mode (running a shell command through ADB that starts a service so other apps can access that same privilege), or run Sui, a Magisk module that provides a same service but with root access instead. The ADB privileged version doesn’t trip Knox since it doesn’t require unlocking your bootloader, but Sui/Magisk most definitely will.
Fines like these should be exponential in some way, that way they can’t keep getting away with it.
You could define a function that takes a parameter, which touches a file with the parameters value, chmods it and then opens it with nano?
create_exec() { touch "$1" chmod +x "$1" nano "$1" }
Then you could type
create_exec file.sh
and it would do the rest for you.