Skip to content

Commit

Permalink
Readme.md files: hard wrap long lines.
Browse files Browse the repository at this point in the history
  • Loading branch information
AA-MattO committed Feb 4, 2024
1 parent c6291ef commit d2687d9
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 7 deletions.
16 changes: 11 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,11 @@
# oculus-wireless-adb
An app that enables wireless ADB from within a Quest 2/Quest Pro VR headset.

This is done through the Android global settings provider (requires manually granting `WRITE_SECURE_SETTINGS`).
This is done through the Android global settings provider (requires manually granting
`WRITE_SECURE_SETTINGS`).

Since the TCP port is random each time, parsing is done on logcat output (`READ_LOGS` permission required) in order to display it within the app.
Since the TCP port is random each time, parsing is done on logcat output (`READ_LOGS` permission
required) in order to display it within the app.

### Installation commands
```
Expand All @@ -12,8 +14,12 @@ adb shell pm grant tdg.oculuswirelessadb android.permission.WRITE_SECURE_SETTING
adb shell pm grant tdg.oculuswirelessadb android.permission.READ_LOGS
```

After ADB wireless is enabled, [a script](script/) can be used to automatically discover and connect to it with the help of the mDNS protocol.
After ADB wireless is enabled, [a script](script/) can be used to automatically discover and
connect to it with the help of the mDNS protocol.

This app now also has a `tcpip` mode, which allows unauthorized/insecure connections to come through - this however needs a computer to set up for the first time, so that the embedded ADB client can be authorized so that it can enable the mode by itself in the future.
This app now also has a `tcpip` mode, which allows unauthorized/insecure connections to come
through - this however needs a computer to set up for the first time, so that the embedded ADB
client can be authorized so that it can enable the mode by itself in the future.

This can be achieved by running the command `adb tcpip 5555` from a computer, then activating ADB from within the app, with the tcpip mode option checked.
This can be achieved by running the command `adb tcpip 5555` from a computer, then activating ADB
from within the app, with the tcpip mode option checked.
8 changes: 6 additions & 2 deletions script/README.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,9 @@
In order to avoid manually typing the randomly generated port each time, this is an mDNS discovery script for the service types used on the Meta Quest headsets for ADB: `_adb_secure_connect._tcp.local` (Android 10) and `_adb-tls-connect._tcp.local` (Android 12).
This is done in order to automatically discover the IP and port of the spawned ADB TLS server and establish the connection.
In order to avoid manually typing the randomly generated port each time, this is an mDNS discovery
script for the service types used on the Meta Quest headsets for ADB:
`_adb_secure_connect._tcp.local` (Android 10) and `_adb-tls-connect._tcp.local` (Android 12).

This is done in order to automatically discover the IP and port of the spawned ADB TLS server and
establish the connection.

```
$ pip3 install -r requirements.txt
Expand Down

0 comments on commit d2687d9

Please sign in to comment.