介紹簽名的兩種方式:
1、signapk.jar命令行方式:
如果你需要開發一個帶有系統權限的app,往往需要配置SharedUserId,比如:
- </pre><pre name="code" class="html"><?xml version="1.0" encoding="utf-8"?>
- <manifest xmlns:android="http://schemas.android.com/apk/res/android"
- package="com.cxq.signdemo"
- android:sharedUserId="android.uid.shell">
- <application
- android:allowBackup="true"
- android:icon="@mipmap/ic_launcher"
- android:label="@string/app_name"
- android:supportsRtl="true"
- android:theme="@style/AppTheme">
- <activity android:name=".MainActivity">
- <intent-filter>
- <action android:name="android.intent.action.MAIN" />
- <category android:name="android.intent.category.LAUNCHER" />
- </intent-filter>
- </activity>
- </application>
此時,如果直接在AS中run,app是裝不上的,需要先生成app,然后再使用系統文件對apk進行簽名,
java -jar signapk.jar platform.x509.pem platform.pk8 signDemo.apk signDemo_signed.apk
雖然能夠滿足使用,但是作為開發者,不免會遇到需要調試的情況,然后這種離線的簽名方式,就沒法調試。。。嚴重影響了開發的效率。
2、在線自動打包簽名的方式:
需要准備的文件:
keytool-importkeypair (下載),或者COPY下面腳本。
platform.x509.pem、platform.pk8(位於../build/target/product/security)
其本質的原理是給apk加上開發者簽名(jks文件),使用keytool-importkeypair 對jks文件進行系統簽名,在出包的時候,直接使用帶有系統簽名的jks對apk進行簽名,這樣編譯生成的apk文件就自帶系統簽名了
1、使用keytool-importkeypair對jks文件引入系統簽名
把platform.x509.pem、platform.pk8和上一部生成的jks文件統一放到一個文件夾下,比如我的是放在工程目錄的signApk目錄下

將下載好的keytool-importkeypair配置一下,其實主要就是配置一下環境變量,不熟悉的可以閱讀官方文檔,然后使用下面這條命令(需要在linux下,用windows的可以去在linux下生成jks,然后復制出新的jks回原目錄也可以)對jks文件引入系統簽名
./keytool-importkeypair -k [jks文件名] -p [jks的密碼] -pk8 platform.pk8 -cert platform.x509.pem -alias [jks的別名]
例如我的對應的就是:
./keytool-importkeypair -k SignKitking.jks -p 123456 -pk8 platform.pk8 -cert platform.x509.pem -alias SignKitking
運行完這條命令之后,我們就得到了有系統簽名的jks
2、配置gradle(app)
在在android區域下(與defaultConfig同級)添加signingConfigs配置:
依次填寫jks的路徑,密碼,別名等
apply plugin: 'com.android.application' android { compileSdkVersion 22 buildToolsVersion "27.0.3" defaultConfig { applicationId "com.android.factorytest" } signingConfigs { release { storeFile file("../signApk/SignKitking.jks") storePassword '123456' keyAlias 'SignKitking' keyPassword '123456' } debug { storeFile file("../signApk/SignKitking.jks") storePassword '123456' keyAlias 'SignKitking' keyPassword '123456' } } buildTypes { release { minifyEnabled false proguardFiles getDefaultProguardFile('proguard-android.txt'), 'proguard-rules.txt' } } } dependencies { implementation files('src/main/libs/classes.jar') implementation files('src/main/libs/upgrade_ja.jar') }
3、運行
經過以上配置之后,點擊run,app就可以直接安裝到目標機器上了
keytool-importkeypair腳本內容:
#! /bin/bash # # This file is part of keytool-importkeypair. # DEFAULT_KEYSTORE=$HOME/.keystore keystore=$DEFAULT_KEYSTORE pk8="" cert="" alias="" passphrase="" tmpdir="" scriptname=`basename $0` usage() { cat << EOF usage: ${scriptname} [-k keystore] [-p storepass] -pk8 pk8 -cert cert -alias key_alias This script is used to import a key/certificate pair into a Java keystore. If a keystore is not specified then the key pair is imported into ~/.keystore in the user's home directory. The passphrase can also be read from stdin. EOF } cleanup() { if [ ! -z "${tmpdir}" -a -d ${tmpdir} ]; then rm -fr ${tmpdir} fi } while [ $# -gt 0 ]; do case $1 in -p | --passphrase | -passphrase) passphrase=$2 shift 2 ;; -h | --help) usage exit 0 ;; -k | -keystore | --keystore) keystore=$2 shift 2 ;; -pk8 | --pk8 | -key | --key) pk8=$2 shift 2 ;; -cert | --cert | -pem | --pem) cert=$2 shift 2 ;; -a | -alias | --alias) alias=$2 shift 2 ;; *) echo "${scriptname}: Unknown option $1, exiting" 1>&2 usage exit 1 ;; esac done if [ -z "${pk8}" -o -z "${cert}" -o -z "${alias}" ]; then echo "${scriptname}: Missing option, exiting..." 1>&2 usage exit 1 fi for f in "${pk8}" "${cert}"; do if [ ! -f "$f" ]; then echo "${scriptname}: Can't find file $f, exiting..." 1>&2 exit 1 fi done if [ ! -f "${keystore}" ]; then storedir=`dirname "${keystore}"` if [ ! -d "${storedir}" -o ! -w "${storedir}" ]; then echo "${scriptname}: Can't access ${storedir}, exiting..." 1>&2 exit 1 fi fi # Create temp directory ofr key and pkcs12 bundle tmpdir=`mktemp -q -d "/tmp/${scriptname}.XXXX"` if [ $? -ne 0 ]; then echo "${scriptname}: Can't create temp directory, exiting..." 1>&2 exit 1 fi key="${tmpdir}/key" p12="${tmpdir}/p12" if [ -z "${passphrase}" ]; then # Request a passphrase read -p "Enter a passphrase: " -s passphrase echo "" fi # Convert PK8 to PEM KEY openssl pkcs8 -inform DER -nocrypt -in "${pk8}" -out "${key}" # Bundle CERT and KEY openssl pkcs12 -export -in "${cert}" -inkey "${key}" -out "${p12}" -password pass:"${passphrase}" -name "${alias}" # Print cert echo -n "Importing \"${alias}\" with " openssl x509 -noout -fingerprint -in "${cert}" # Import P12 in Keystore keytool -importkeystore -deststorepass "${passphrase}" -destkeystore "${keystore}" -srckeystore "${p12}" -srcstoretype PKCS12 -srcstorepass "${passphrase}" # Cleanup cleanup
