diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..ccf2efe
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,27 @@
+# Built application files
+*.apk
+*.ap_
+
+# Files for the Dalvik VM
+*.dex
+
+# Java class files
+*.class
+
+# Generated files
+bin/
+gen/
+
+# Gradle files
+.gradle/
+build/
+/*/build/
+
+# Local configuration file (sdk path, etc)
+local.properties
+
+# Proguard folder generated by Eclipse
+proguard/
+
+# Log Files
+*.log
diff --git a/AndroidTampering.iml b/AndroidTampering.iml
new file mode 100644
index 0000000..b33791d
--- /dev/null
+++ b/AndroidTampering.iml
@@ -0,0 +1,19 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/LICENSE b/LICENSE
new file mode 100644
index 0000000..fc37957
--- /dev/null
+++ b/LICENSE
@@ -0,0 +1,21 @@
+The MIT License (MIT)
+
+Copyright (c) 2016 Sandro Machado
+
+Permission is hereby granted, free of charge, to any person obtaining a copy
+of this software and associated documentation files (the "Software"), to deal
+in the Software without restriction, including without limitation the rights
+to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
+copies of the Software, and to permit persons to whom the Software is
+furnished to do so, subject to the following conditions:
+
+The above copyright notice and this permission notice shall be included in all
+copies or substantial portions of the Software.
+
+THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
+IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
+FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
+AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
+LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
+SOFTWARE.
diff --git a/README.md b/README.md
new file mode 100644
index 0000000..699fda2
--- /dev/null
+++ b/README.md
@@ -0,0 +1,64 @@
+# AndroidTampering [![Release](https://img.shields.io/github/release/SandroMachado/AndroidTampering.svg?label=jitpack)](https://jitpack.io/#SandroMachado/AndroidTampering)
+
+AndroidTampering is a library that provides an extra layer of security to your Android application. This library protects your application against simple tampering attacks. **Please note that this protection methods can also be hacked.** So, besides the tampering protection, don't forget to add all the other security recommendations like [ProGuard](http://developer.android.com/tools/help/proguard.html), [patching the Security Provider with ProviderInstaller](http://developer.android.com/training/articles/security-gms-provider.html#patching)...
+
+Check this [talk](https://youtu.be/18tn_mF4XRg) from Scott Alexander-Bown to learn more about android security for applications.
+
+# Gradle Dependency
+
+## Repository
+
+First, add the following to your app's `build.gradle` file:
+
+```Gradle
+repositories {
+ maven { url "https://jitpack.io" }
+}
+```
+
+Them include the openalpr-android dependency:
+
+```gradle
+dependencies {
+
+ // ... other dependencies here.
+ compile 'com.github.SandroMachado:AndroidTampering:1.0.0'
+}
+```
+
+# Usage
+
+## Code
+
+### Certificate signature
+
+Get your certificate signature:
+
+```Java
+// This method will print your certificate signature to the logcat.
+AndroidTamperingProtectionUtils.getCertificateSignature(context);
+```
+
+Check your logcat for something like:
+```
+01-12 01:16:15.965 32487-32487/com.sandro.test D/TAMPERING_PROTECTION: ___________
+ yweraaaaaaaaggggDfsa6egkjjI=
+
+ ___________
+```
+Please note that this certificate signature contains a `\n` at the end.
+
+### Add tampering protection
+
+```Java
+AndroidTamperingProtection androidTamperingProtection = AndroidTamperingProtection.Builder(context, "yweraaaaaaaaggggDfsa6egkjjI\n")
+ .installOnlyFromPlayStore(true) // By default is set to false.
+ .build();
+
+if (!androidTamperingProtection.validate()) {
+ Toast.makeText(this, "The application is compromised! Contact the application provider.", Toast.LENGTH_LONG).show();
+
+ finish();
+}
+```
+
diff --git a/app/app.iml b/app/app.iml
new file mode 100644
index 0000000..4d51955
--- /dev/null
+++ b/app/app.iml
@@ -0,0 +1,90 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ generateDebugAndroidTestSources
+ generateDebugSources
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
\ No newline at end of file
diff --git a/app/build.gradle b/app/build.gradle
new file mode 100644
index 0000000..9b7421b
--- /dev/null
+++ b/app/build.gradle
@@ -0,0 +1,17 @@
+apply plugin: 'com.android.library'
+apply plugin: 'com.github.dcendents.android-maven'
+
+group='com.github.SandroMachado'
+
+android {
+ compileSdkVersion 23
+ buildToolsVersion "23.0.2"
+
+ defaultConfig {
+ minSdkVersion 16
+ targetSdkVersion 23
+ versionCode 1
+ versionName "1.0"
+ }
+}
+
diff --git a/app/proguard-rules.pro b/app/proguard-rules.pro
new file mode 100644
index 0000000..4a27e98
--- /dev/null
+++ b/app/proguard-rules.pro
@@ -0,0 +1,17 @@
+# Add project specific ProGuard rules here.
+# By default, the flags in this file are appended to flags specified
+# in /Users/sandromachado/Library/Android/sdk/tools/proguard/proguard-android.txt
+# You can edit the include path and order by changing the proguardFiles
+# directive in build.gradle.
+#
+# For more details, see
+# http://developer.android.com/guide/developing/tools/proguard.html
+
+# Add any project specific keep options here:
+
+# If your project uses WebView with JS, uncomment the following
+# and specify the fully qualified class name to the JavaScript interface
+# class:
+#-keepclassmembers class fqcn.of.javascript.interface.for.webview {
+# public *;
+#}
diff --git a/app/src/main/AndroidManifest.xml b/app/src/main/AndroidManifest.xml
new file mode 100644
index 0000000..b95ad1f
--- /dev/null
+++ b/app/src/main/AndroidManifest.xml
@@ -0,0 +1,5 @@
+
+
+
+
+
diff --git a/app/src/main/java/com/sandro/androidtampering/AndroidTamperingProtection.java b/app/src/main/java/com/sandro/androidtampering/AndroidTamperingProtection.java
new file mode 100644
index 0000000..4d387b2
--- /dev/null
+++ b/app/src/main/java/com/sandro/androidtampering/AndroidTamperingProtection.java
@@ -0,0 +1,144 @@
+package com.sandro.androidtampering;
+
+import android.content.Context;
+import android.content.pm.PackageInfo;
+import android.content.pm.PackageManager;
+import android.content.pm.Signature;
+import android.util.Base64;
+import android.util.Log;
+
+import java.security.MessageDigest;
+
+/**
+ * Android Tampering Protection have the objective to help the developers to add an extra protection layer to their android applications,
+ * validating the application signature and the installer.
+ */
+
+public class AndroidTamperingProtection {
+
+ private static final String PLAY_STORE_PACKAGE = "com.android.vending";
+
+ private final Context context;
+ private final Boolean playStoreOnly;
+ private final String certificateSignature;
+
+ private AndroidTamperingProtection(Builder builder) {
+ this.context = builder.context;
+ this.playStoreOnly = builder.playStoreOnly;
+ this.certificateSignature = builder.certificateSignature;
+ }
+
+ /**
+ * Validates the APK. This method should return true if the apk is not tampered.
+ *
+ * @return a boolean indicating if the APK is valid. It returns true if the APK is valid, not tampered.
+ */
+
+ public Boolean validate() {
+ // Check the application installer.
+ if (this.playStoreOnly && !wasInstalledFromPlayStore(this.context)) {
+ return false;
+ }
+
+ return isAValidSignature(context, certificateSignature);
+ }
+
+ /**
+ * Checks if the apk signature is valid.
+ *
+ * @param context The context.
+ * @param certificateSignature The certificate signature.
+ *
+ * @return a boolean indicating if the signature is valid.
+ */
+
+ private static boolean isAValidSignature(Context context, String certificateSignature) {
+ try {
+ PackageInfo packageInfo = context.getPackageManager().getPackageInfo(context.getPackageName(), PackageManager.GET_SIGNATURES);
+
+ // The APK is signed with multiple signatures, probably it was tampered.
+ if (packageInfo.signatures.length > 1) {
+ return false;
+ }
+
+ for (Signature signature : packageInfo.signatures) {
+ MessageDigest md = MessageDigest.getInstance("SHA");
+
+ md.update(signature.toByteArray());
+
+ if (certificateSignature.compareToIgnoreCase(Base64.encodeToString(md.digest(), Base64.DEFAULT)) == 0) {
+ return true;
+ }
+ }
+ } catch (Exception exception) {
+ Log.d("TAMPERING_PROTECTION", exception.getStackTrace().toString());
+ }
+
+ return false;
+ }
+
+ /**
+ * Verifies if the application was installed using the Google Play Store.
+ *
+ * @param context The application context.
+ *
+ * @return returns a boolean indicating if the application was installed using the Google Play Store.
+ */
+
+ private static boolean wasInstalledFromPlayStore(final Context context) {
+ final String installer = context.getPackageManager().getInstallerPackageName(context.getPackageName());
+
+ return installer != null && installer.startsWith(PLAY_STORE_PACKAGE);
+ }
+
+ /**
+ * Android Tampering protection builder.
+ */
+
+ public static class Builder {
+
+ private final Context context;
+ private Boolean playStoreOnly = false;
+ private final String certificateSignature;
+
+ /**
+ * Constructor.
+ *
+ * @param context The application context.
+ * @param certificateSignature The certificate signature.
+ */
+
+ public Builder(Context context, String certificateSignature) {
+ this.context = context;
+ this.certificateSignature = certificateSignature;
+ }
+
+ /**
+ * Configures the library to check against installations from outside the Google Play Store. The default is false.
+ *
+ * @param installOnlyFromPlayStore A boolean indicating if is to validate the application installer.
+ *
+ * @return the builder.
+ */
+
+ public Builder installOnlyFromPlayStore(Boolean installOnlyFromPlayStore) {
+ this.playStoreOnly = installOnlyFromPlayStore;
+
+ return this;
+ }
+
+ /**
+ * Builds the Android Tampering Protection.
+ *
+ * @return the Android Tampering Protection.
+ */
+
+ public AndroidTamperingProtection build() {
+ AndroidTamperingProtection androidTamperingProtection = new AndroidTamperingProtection(this);
+
+ return androidTamperingProtection;
+ }
+
+ }
+
+}
diff --git a/app/src/main/java/com/sandro/androidtampering/utils/AndroidTamperingProtectionUtils.java b/app/src/main/java/com/sandro/androidtampering/utils/AndroidTamperingProtectionUtils.java
new file mode 100644
index 0000000..570cdd6
--- /dev/null
+++ b/app/src/main/java/com/sandro/androidtampering/utils/AndroidTamperingProtectionUtils.java
@@ -0,0 +1,44 @@
+package com.sandro.androidtampering.utils;
+
+import android.content.Context;
+import android.content.pm.PackageInfo;
+import android.content.pm.PackageManager;
+import android.content.pm.Signature;
+import android.util.Base64;
+import android.util.Log;
+
+import java.security.MessageDigest;
+
+/**
+ * A set of utils for the Android Tampering Protection library.
+ */
+
+public class AndroidTamperingProtectionUtils {
+
+ /**
+ * Prints your current certificate signature to the Logcat. Use this method to obtain your certificate signature.
+ *
+ * @param context The application context.
+ */
+
+ public static void getCertificateSignature(Context context) {
+ try {
+ PackageInfo packageInfo = context.getPackageManager().getPackageInfo(context.getPackageName(), PackageManager.GET_SIGNATURES);
+
+ // The APK is signed with multiple signatures, probably it was tampered.
+ if (packageInfo.signatures.length > 1) {
+ return ;
+ }
+
+ for (Signature signature : packageInfo.signatures) {
+ MessageDigest md = MessageDigest.getInstance("SHA");
+
+ md.update(signature.toByteArray());
+
+ Log.d("TAMPERING_PROTECTION", "\n\n___________\n" + Base64.encodeToString(md.digest(), Base64.DEFAULT) + "\n___________\n\n");
+ }
+ } catch (Exception exception) {
+ Log.d("TAMPERING_PROTECTION", exception.getStackTrace().toString());
+ }
+ }
+}
diff --git a/build.gradle b/build.gradle
new file mode 100644
index 0000000..bed5a31
--- /dev/null
+++ b/build.gradle
@@ -0,0 +1,19 @@
+buildscript {
+ repositories {
+ jcenter()
+ }
+ dependencies {
+ classpath 'com.android.tools.build:gradle:2.0.0-alpha3'
+ classpath 'com.github.dcendents:android-maven-gradle-plugin:1.3'
+ }
+}
+
+allprojects {
+ repositories {
+ jcenter()
+ }
+}
+
+task clean(type: Delete) {
+ delete rootProject.buildDir
+}
diff --git a/gradle.properties b/gradle.properties
new file mode 100644
index 0000000..1d3591c
--- /dev/null
+++ b/gradle.properties
@@ -0,0 +1,18 @@
+# Project-wide Gradle settings.
+
+# IDE (e.g. Android Studio) users:
+# Gradle settings configured through the IDE *will override*
+# any settings specified in this file.
+
+# For more details on how to configure your build environment visit
+# http://www.gradle.org/docs/current/userguide/build_environment.html
+
+# Specifies the JVM arguments used for the daemon process.
+# The setting is particularly useful for tweaking memory settings.
+# Default value: -Xmx10248m -XX:MaxPermSize=256m
+# org.gradle.jvmargs=-Xmx2048m -XX:MaxPermSize=512m -XX:+HeapDumpOnOutOfMemoryError -Dfile.encoding=UTF-8
+
+# When configured, Gradle will run in incubating parallel mode.
+# This option should only be used with decoupled projects. More details, visit
+# http://www.gradle.org/docs/current/userguide/multi_project_builds.html#sec:decoupled_projects
+# org.gradle.parallel=true
\ No newline at end of file
diff --git a/gradle/wrapper/gradle-wrapper.jar b/gradle/wrapper/gradle-wrapper.jar
new file mode 100644
index 0000000..13372ae
Binary files /dev/null and b/gradle/wrapper/gradle-wrapper.jar differ
diff --git a/gradle/wrapper/gradle-wrapper.properties b/gradle/wrapper/gradle-wrapper.properties
new file mode 100644
index 0000000..c1d4b9d
--- /dev/null
+++ b/gradle/wrapper/gradle-wrapper.properties
@@ -0,0 +1,6 @@
+#Tue Jan 12 01:55:15 WET 2016
+distributionBase=GRADLE_USER_HOME
+distributionPath=wrapper/dists
+zipStoreBase=GRADLE_USER_HOME
+zipStorePath=wrapper/dists
+distributionUrl=https\://services.gradle.org/distributions/gradle-2.10-bin.zip
diff --git a/gradlew b/gradlew
new file mode 100755
index 0000000..9d82f78
--- /dev/null
+++ b/gradlew
@@ -0,0 +1,160 @@
+#!/usr/bin/env bash
+
+##############################################################################
+##
+## Gradle start up script for UN*X
+##
+##############################################################################
+
+# Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
+DEFAULT_JVM_OPTS=""
+
+APP_NAME="Gradle"
+APP_BASE_NAME=`basename "$0"`
+
+# Use the maximum available, or set MAX_FD != -1 to use that value.
+MAX_FD="maximum"
+
+warn ( ) {
+ echo "$*"
+}
+
+die ( ) {
+ echo
+ echo "$*"
+ echo
+ exit 1
+}
+
+# OS specific support (must be 'true' or 'false').
+cygwin=false
+msys=false
+darwin=false
+case "`uname`" in
+ CYGWIN* )
+ cygwin=true
+ ;;
+ Darwin* )
+ darwin=true
+ ;;
+ MINGW* )
+ msys=true
+ ;;
+esac
+
+# Attempt to set APP_HOME
+# Resolve links: $0 may be a link
+PRG="$0"
+# Need this for relative symlinks.
+while [ -h "$PRG" ] ; do
+ ls=`ls -ld "$PRG"`
+ link=`expr "$ls" : '.*-> \(.*\)$'`
+ if expr "$link" : '/.*' > /dev/null; then
+ PRG="$link"
+ else
+ PRG=`dirname "$PRG"`"/$link"
+ fi
+done
+SAVED="`pwd`"
+cd "`dirname \"$PRG\"`/" >/dev/null
+APP_HOME="`pwd -P`"
+cd "$SAVED" >/dev/null
+
+CLASSPATH=$APP_HOME/gradle/wrapper/gradle-wrapper.jar
+
+# Determine the Java command to use to start the JVM.
+if [ -n "$JAVA_HOME" ] ; then
+ if [ -x "$JAVA_HOME/jre/sh/java" ] ; then
+ # IBM's JDK on AIX uses strange locations for the executables
+ JAVACMD="$JAVA_HOME/jre/sh/java"
+ else
+ JAVACMD="$JAVA_HOME/bin/java"
+ fi
+ if [ ! -x "$JAVACMD" ] ; then
+ die "ERROR: JAVA_HOME is set to an invalid directory: $JAVA_HOME
+
+Please set the JAVA_HOME variable in your environment to match the
+location of your Java installation."
+ fi
+else
+ JAVACMD="java"
+ which java >/dev/null 2>&1 || die "ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
+
+Please set the JAVA_HOME variable in your environment to match the
+location of your Java installation."
+fi
+
+# Increase the maximum file descriptors if we can.
+if [ "$cygwin" = "false" -a "$darwin" = "false" ] ; then
+ MAX_FD_LIMIT=`ulimit -H -n`
+ if [ $? -eq 0 ] ; then
+ if [ "$MAX_FD" = "maximum" -o "$MAX_FD" = "max" ] ; then
+ MAX_FD="$MAX_FD_LIMIT"
+ fi
+ ulimit -n $MAX_FD
+ if [ $? -ne 0 ] ; then
+ warn "Could not set maximum file descriptor limit: $MAX_FD"
+ fi
+ else
+ warn "Could not query maximum file descriptor limit: $MAX_FD_LIMIT"
+ fi
+fi
+
+# For Darwin, add options to specify how the application appears in the dock
+if $darwin; then
+ GRADLE_OPTS="$GRADLE_OPTS \"-Xdock:name=$APP_NAME\" \"-Xdock:icon=$APP_HOME/media/gradle.icns\""
+fi
+
+# For Cygwin, switch paths to Windows format before running java
+if $cygwin ; then
+ APP_HOME=`cygpath --path --mixed "$APP_HOME"`
+ CLASSPATH=`cygpath --path --mixed "$CLASSPATH"`
+ JAVACMD=`cygpath --unix "$JAVACMD"`
+
+ # We build the pattern for arguments to be converted via cygpath
+ ROOTDIRSRAW=`find -L / -maxdepth 1 -mindepth 1 -type d 2>/dev/null`
+ SEP=""
+ for dir in $ROOTDIRSRAW ; do
+ ROOTDIRS="$ROOTDIRS$SEP$dir"
+ SEP="|"
+ done
+ OURCYGPATTERN="(^($ROOTDIRS))"
+ # Add a user-defined pattern to the cygpath arguments
+ if [ "$GRADLE_CYGPATTERN" != "" ] ; then
+ OURCYGPATTERN="$OURCYGPATTERN|($GRADLE_CYGPATTERN)"
+ fi
+ # Now convert the arguments - kludge to limit ourselves to /bin/sh
+ i=0
+ for arg in "$@" ; do
+ CHECK=`echo "$arg"|egrep -c "$OURCYGPATTERN" -`
+ CHECK2=`echo "$arg"|egrep -c "^-"` ### Determine if an option
+
+ if [ $CHECK -ne 0 ] && [ $CHECK2 -eq 0 ] ; then ### Added a condition
+ eval `echo args$i`=`cygpath --path --ignore --mixed "$arg"`
+ else
+ eval `echo args$i`="\"$arg\""
+ fi
+ i=$((i+1))
+ done
+ case $i in
+ (0) set -- ;;
+ (1) set -- "$args0" ;;
+ (2) set -- "$args0" "$args1" ;;
+ (3) set -- "$args0" "$args1" "$args2" ;;
+ (4) set -- "$args0" "$args1" "$args2" "$args3" ;;
+ (5) set -- "$args0" "$args1" "$args2" "$args3" "$args4" ;;
+ (6) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" ;;
+ (7) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" ;;
+ (8) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" ;;
+ (9) set -- "$args0" "$args1" "$args2" "$args3" "$args4" "$args5" "$args6" "$args7" "$args8" ;;
+ esac
+fi
+
+# Split up the JVM_OPTS And GRADLE_OPTS values into an array, following the shell quoting and substitution rules
+function splitJvmOpts() {
+ JVM_OPTS=("$@")
+}
+eval splitJvmOpts $DEFAULT_JVM_OPTS $JAVA_OPTS $GRADLE_OPTS
+JVM_OPTS[${#JVM_OPTS[*]}]="-Dorg.gradle.appname=$APP_BASE_NAME"
+
+exec "$JAVACMD" "${JVM_OPTS[@]}" -classpath "$CLASSPATH" org.gradle.wrapper.GradleWrapperMain "$@"
diff --git a/gradlew.bat b/gradlew.bat
new file mode 100644
index 0000000..aec9973
--- /dev/null
+++ b/gradlew.bat
@@ -0,0 +1,90 @@
+@if "%DEBUG%" == "" @echo off
+@rem ##########################################################################
+@rem
+@rem Gradle startup script for Windows
+@rem
+@rem ##########################################################################
+
+@rem Set local scope for the variables with windows NT shell
+if "%OS%"=="Windows_NT" setlocal
+
+@rem Add default JVM options here. You can also use JAVA_OPTS and GRADLE_OPTS to pass JVM options to this script.
+set DEFAULT_JVM_OPTS=
+
+set DIRNAME=%~dp0
+if "%DIRNAME%" == "" set DIRNAME=.
+set APP_BASE_NAME=%~n0
+set APP_HOME=%DIRNAME%
+
+@rem Find java.exe
+if defined JAVA_HOME goto findJavaFromJavaHome
+
+set JAVA_EXE=java.exe
+%JAVA_EXE% -version >NUL 2>&1
+if "%ERRORLEVEL%" == "0" goto init
+
+echo.
+echo ERROR: JAVA_HOME is not set and no 'java' command could be found in your PATH.
+echo.
+echo Please set the JAVA_HOME variable in your environment to match the
+echo location of your Java installation.
+
+goto fail
+
+:findJavaFromJavaHome
+set JAVA_HOME=%JAVA_HOME:"=%
+set JAVA_EXE=%JAVA_HOME%/bin/java.exe
+
+if exist "%JAVA_EXE%" goto init
+
+echo.
+echo ERROR: JAVA_HOME is set to an invalid directory: %JAVA_HOME%
+echo.
+echo Please set the JAVA_HOME variable in your environment to match the
+echo location of your Java installation.
+
+goto fail
+
+:init
+@rem Get command-line arguments, handling Windowz variants
+
+if not "%OS%" == "Windows_NT" goto win9xME_args
+if "%@eval[2+2]" == "4" goto 4NT_args
+
+:win9xME_args
+@rem Slurp the command line arguments.
+set CMD_LINE_ARGS=
+set _SKIP=2
+
+:win9xME_args_slurp
+if "x%~1" == "x" goto execute
+
+set CMD_LINE_ARGS=%*
+goto execute
+
+:4NT_args
+@rem Get arguments from the 4NT Shell from JP Software
+set CMD_LINE_ARGS=%$
+
+:execute
+@rem Setup the command line
+
+set CLASSPATH=%APP_HOME%\gradle\wrapper\gradle-wrapper.jar
+
+@rem Execute Gradle
+"%JAVA_EXE%" %DEFAULT_JVM_OPTS% %JAVA_OPTS% %GRADLE_OPTS% "-Dorg.gradle.appname=%APP_BASE_NAME%" -classpath "%CLASSPATH%" org.gradle.wrapper.GradleWrapperMain %CMD_LINE_ARGS%
+
+:end
+@rem End local scope for the variables with windows NT shell
+if "%ERRORLEVEL%"=="0" goto mainEnd
+
+:fail
+rem Set variable GRADLE_EXIT_CONSOLE if you need the _script_ return code instead of
+rem the _cmd.exe /c_ return code!
+if not "" == "%GRADLE_EXIT_CONSOLE%" exit 1
+exit /b 1
+
+:mainEnd
+if "%OS%"=="Windows_NT" endlocal
+
+:omega
diff --git a/settings.gradle b/settings.gradle
new file mode 100644
index 0000000..e7b4def
--- /dev/null
+++ b/settings.gradle
@@ -0,0 +1 @@
+include ':app'