|  | // Copyright (C) 2018 The Android Open Source Project | 
|  | // | 
|  | // Licensed under the Apache License, Version 2.0 (the "License"); | 
|  | // you may not use this file except in compliance with the License. | 
|  | // You may obtain a copy of the License at | 
|  | // | 
|  | //     http://www.apache.org/licenses/LICENSE-2.0 | 
|  | // | 
|  | // Unless required by applicable law or agreed to in writing, software | 
|  | // distributed under the License is distributed on an "AS IS" BASIS, | 
|  | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
|  | // See the License for the specific language governing permissions and | 
|  | // limitations under the License. | 
|  |  | 
|  | // package apex implements build rules for creating the APEX files which are container for | 
|  | // lower-level system components. See https://source.android.com/devices/tech/ota/apex | 
|  | package apex | 
|  |  | 
|  | import ( | 
|  | "fmt" | 
|  | "path/filepath" | 
|  | "regexp" | 
|  | "sort" | 
|  | "strings" | 
|  |  | 
|  | "android/soong/bazel/cquery" | 
|  |  | 
|  | "github.com/google/blueprint" | 
|  | "github.com/google/blueprint/proptools" | 
|  |  | 
|  | "android/soong/android" | 
|  | "android/soong/bazel" | 
|  | "android/soong/bpf" | 
|  | "android/soong/cc" | 
|  | prebuilt_etc "android/soong/etc" | 
|  | "android/soong/filesystem" | 
|  | "android/soong/java" | 
|  | "android/soong/multitree" | 
|  | "android/soong/rust" | 
|  | "android/soong/sh" | 
|  | ) | 
|  |  | 
|  | func init() { | 
|  | registerApexBuildComponents(android.InitRegistrationContext) | 
|  | } | 
|  |  | 
|  | func registerApexBuildComponents(ctx android.RegistrationContext) { | 
|  | ctx.RegisterModuleType("apex", BundleFactory) | 
|  | ctx.RegisterModuleType("apex_test", TestApexBundleFactory) | 
|  | ctx.RegisterModuleType("apex_vndk", vndkApexBundleFactory) | 
|  | ctx.RegisterModuleType("apex_defaults", DefaultsFactory) | 
|  | ctx.RegisterModuleType("prebuilt_apex", PrebuiltFactory) | 
|  | ctx.RegisterModuleType("override_apex", OverrideApexFactory) | 
|  | ctx.RegisterModuleType("apex_set", apexSetFactory) | 
|  |  | 
|  | ctx.PreArchMutators(registerPreArchMutators) | 
|  | ctx.PreDepsMutators(RegisterPreDepsMutators) | 
|  | ctx.PostDepsMutators(RegisterPostDepsMutators) | 
|  | } | 
|  |  | 
|  | func registerPreArchMutators(ctx android.RegisterMutatorsContext) { | 
|  | ctx.TopDown("prebuilt_apex_module_creator", prebuiltApexModuleCreatorMutator).Parallel() | 
|  | } | 
|  |  | 
|  | func RegisterPreDepsMutators(ctx android.RegisterMutatorsContext) { | 
|  | ctx.TopDown("apex_vndk", apexVndkMutator).Parallel() | 
|  | ctx.BottomUp("apex_vndk_deps", apexVndkDepsMutator).Parallel() | 
|  | } | 
|  |  | 
|  | func RegisterPostDepsMutators(ctx android.RegisterMutatorsContext) { | 
|  | ctx.TopDown("apex_info", apexInfoMutator).Parallel() | 
|  | ctx.BottomUp("apex_unique", apexUniqueVariationsMutator).Parallel() | 
|  | ctx.BottomUp("apex_test_for_deps", apexTestForDepsMutator).Parallel() | 
|  | ctx.BottomUp("apex_test_for", apexTestForMutator).Parallel() | 
|  | // Run mark_platform_availability before the apexMutator as the apexMutator needs to know whether | 
|  | // it should create a platform variant. | 
|  | ctx.BottomUp("mark_platform_availability", markPlatformAvailability).Parallel() | 
|  | ctx.BottomUp("apex", apexMutator).Parallel() | 
|  | ctx.BottomUp("apex_directly_in_any", apexDirectlyInAnyMutator).Parallel() | 
|  | ctx.BottomUp("apex_dcla_deps", apexDCLADepsMutator).Parallel() | 
|  | // Register after apex_info mutator so that it can use ApexVariationName | 
|  | ctx.TopDown("apex_strict_updatability_lint", apexStrictUpdatibilityLintMutator).Parallel() | 
|  | } | 
|  |  | 
|  | type apexBundleProperties struct { | 
|  | // Json manifest file describing meta info of this APEX bundle. Refer to | 
|  | // system/apex/proto/apex_manifest.proto for the schema. Default: "apex_manifest.json" | 
|  | Manifest *string `android:"path"` | 
|  |  | 
|  | // AndroidManifest.xml file used for the zip container of this APEX bundle. If unspecified, | 
|  | // a default one is automatically generated. | 
|  | AndroidManifest *string `android:"path"` | 
|  |  | 
|  | // Determines the file contexts file for setting the security contexts to files in this APEX | 
|  | // bundle. For platform APEXes, this should points to a file under /system/sepolicy Default: | 
|  | // /system/sepolicy/apex/<module_name>_file_contexts. | 
|  | File_contexts *string `android:"path"` | 
|  |  | 
|  | // By default, file_contexts is amended by force-labelling / and /apex_manifest.pb as system_file | 
|  | // to avoid mistakes. When set as true, no force-labelling. | 
|  | Use_file_contexts_as_is *bool | 
|  |  | 
|  | // Path to the canned fs config file for customizing file's | 
|  | // uid/gid/mod/capabilities. The content of this file is appended to the | 
|  | // default config, so that the custom entries are preferred. The format is | 
|  | // /<path_or_glob> <uid> <gid> <mode> [capabilities=0x<cap>], where | 
|  | // path_or_glob is a path or glob pattern for a file or set of files, | 
|  | // uid/gid are numerial values of user ID and group ID, mode is octal value | 
|  | // for the file mode, and cap is hexadecimal value for the capability. | 
|  | Canned_fs_config *string `android:"path"` | 
|  |  | 
|  | ApexNativeDependencies | 
|  |  | 
|  | Multilib apexMultilibProperties | 
|  |  | 
|  | // List of runtime resource overlays (RROs) that are embedded inside this APEX. | 
|  | Rros []string | 
|  |  | 
|  | // List of bootclasspath fragments that are embedded inside this APEX bundle. | 
|  | Bootclasspath_fragments []string | 
|  |  | 
|  | // List of systemserverclasspath fragments that are embedded inside this APEX bundle. | 
|  | Systemserverclasspath_fragments []string | 
|  |  | 
|  | // List of java libraries that are embedded inside this APEX bundle. | 
|  | Java_libs []string | 
|  |  | 
|  | // List of sh binaries that are embedded inside this APEX bundle. | 
|  | Sh_binaries []string | 
|  |  | 
|  | // List of platform_compat_config files that are embedded inside this APEX bundle. | 
|  | Compat_configs []string | 
|  |  | 
|  | // List of filesystem images that are embedded inside this APEX bundle. | 
|  | Filesystems []string | 
|  |  | 
|  | // The minimum SDK version that this APEX must support at minimum. This is usually set to | 
|  | // the SDK version that the APEX was first introduced. | 
|  | Min_sdk_version *string | 
|  |  | 
|  | // Whether this APEX is considered updatable or not. When set to true, this will enforce | 
|  | // additional rules for making sure that the APEX is truly updatable. To be updatable, | 
|  | // min_sdk_version should be set as well. This will also disable the size optimizations like | 
|  | // symlinking to the system libs. Default is true. | 
|  | Updatable *bool | 
|  |  | 
|  | // Marks that this APEX is designed to be updatable in the future, although it's not | 
|  | // updatable yet. This is used to mimic some of the build behaviors that are applied only to | 
|  | // updatable APEXes. Currently, this disables the size optimization, so that the size of | 
|  | // APEX will not increase when the APEX is actually marked as truly updatable. Default is | 
|  | // false. | 
|  | Future_updatable *bool | 
|  |  | 
|  | // Whether this APEX can use platform APIs or not. Can be set to true only when `updatable: | 
|  | // false`. Default is false. | 
|  | Platform_apis *bool | 
|  |  | 
|  | // Whether this APEX is installable to one of the partitions like system, vendor, etc. | 
|  | // Default: true. | 
|  | Installable *bool | 
|  |  | 
|  | // If set true, VNDK libs are considered as stable libs and are not included in this APEX. | 
|  | // Should be only used in non-system apexes (e.g. vendor: true). Default is false. | 
|  | Use_vndk_as_stable *bool | 
|  |  | 
|  | // The type of filesystem to use. Either 'ext4', 'f2fs' or 'erofs'. Default 'ext4'. | 
|  | Payload_fs_type *string | 
|  |  | 
|  | // For telling the APEX to ignore special handling for system libraries such as bionic. | 
|  | // Default is false. | 
|  | Ignore_system_library_special_case *bool | 
|  |  | 
|  | // Whenever apex_payload.img of the APEX should include dm-verity hashtree. | 
|  | // Default value is true. | 
|  | Generate_hashtree *bool | 
|  |  | 
|  | // Whenever apex_payload.img of the APEX should not be dm-verity signed. Should be only | 
|  | // used in tests. | 
|  | Test_only_unsigned_payload *bool | 
|  |  | 
|  | // Whenever apex should be compressed, regardless of product flag used. Should be only | 
|  | // used in tests. | 
|  | Test_only_force_compression *bool | 
|  |  | 
|  | // Put extra tags (signer=<value>) to apexkeys.txt, so that release tools can sign this apex | 
|  | // with the tool to sign payload contents. | 
|  | Custom_sign_tool *string | 
|  |  | 
|  | // Whether this is a dynamic common lib apex, if so the native shared libs will be placed | 
|  | // in a special way that include the digest of the lib file under /lib(64)? | 
|  | Dynamic_common_lib_apex *bool | 
|  |  | 
|  | // Canonical name of this APEX bundle. Used to determine the path to the | 
|  | // activated APEX on device (i.e. /apex/<apexVariationName>), and used for the | 
|  | // apex mutator variations. For override_apex modules, this is the name of the | 
|  | // overridden base module. | 
|  | ApexVariationName string `blueprint:"mutated"` | 
|  |  | 
|  | IsCoverageVariant bool `blueprint:"mutated"` | 
|  |  | 
|  | // List of sanitizer names that this APEX is enabled for | 
|  | SanitizerNames []string `blueprint:"mutated"` | 
|  |  | 
|  | PreventInstall bool `blueprint:"mutated"` | 
|  |  | 
|  | HideFromMake bool `blueprint:"mutated"` | 
|  |  | 
|  | // Name that dependencies can specify in their apex_available properties to refer to this module. | 
|  | // If not specified, this defaults to Soong module name. This must be the name of a Soong module. | 
|  | Apex_available_name *string | 
|  |  | 
|  | // Variant version of the mainline module. Must be an integer between 0-9 | 
|  | Variant_version *string | 
|  | } | 
|  |  | 
|  | type ApexNativeDependencies struct { | 
|  | // List of native libraries that are embedded inside this APEX. | 
|  | Native_shared_libs []string | 
|  |  | 
|  | // List of JNI libraries that are embedded inside this APEX. | 
|  | Jni_libs []string | 
|  |  | 
|  | // List of rust dyn libraries that are embedded inside this APEX. | 
|  | Rust_dyn_libs []string | 
|  |  | 
|  | // List of native executables that are embedded inside this APEX. | 
|  | Binaries []string | 
|  |  | 
|  | // List of native tests that are embedded inside this APEX. | 
|  | Tests []string | 
|  |  | 
|  | // List of filesystem images that are embedded inside this APEX bundle. | 
|  | Filesystems []string | 
|  |  | 
|  | // List of native libraries to exclude from this APEX. | 
|  | Exclude_native_shared_libs []string | 
|  |  | 
|  | // List of JNI libraries to exclude from this APEX. | 
|  | Exclude_jni_libs []string | 
|  |  | 
|  | // List of rust dyn libraries to exclude from this APEX. | 
|  | Exclude_rust_dyn_libs []string | 
|  |  | 
|  | // List of native executables to exclude from this APEX. | 
|  | Exclude_binaries []string | 
|  |  | 
|  | // List of native tests to exclude from this APEX. | 
|  | Exclude_tests []string | 
|  |  | 
|  | // List of filesystem images to exclude from this APEX bundle. | 
|  | Exclude_filesystems []string | 
|  | } | 
|  |  | 
|  | // Merge combines another ApexNativeDependencies into this one | 
|  | func (a *ApexNativeDependencies) Merge(b ApexNativeDependencies) { | 
|  | a.Native_shared_libs = append(a.Native_shared_libs, b.Native_shared_libs...) | 
|  | a.Jni_libs = append(a.Jni_libs, b.Jni_libs...) | 
|  | a.Rust_dyn_libs = append(a.Rust_dyn_libs, b.Rust_dyn_libs...) | 
|  | a.Binaries = append(a.Binaries, b.Binaries...) | 
|  | a.Tests = append(a.Tests, b.Tests...) | 
|  | a.Filesystems = append(a.Filesystems, b.Filesystems...) | 
|  |  | 
|  | a.Exclude_native_shared_libs = append(a.Exclude_native_shared_libs, b.Exclude_native_shared_libs...) | 
|  | a.Exclude_jni_libs = append(a.Exclude_jni_libs, b.Exclude_jni_libs...) | 
|  | a.Exclude_rust_dyn_libs = append(a.Exclude_rust_dyn_libs, b.Exclude_rust_dyn_libs...) | 
|  | a.Exclude_binaries = append(a.Exclude_binaries, b.Exclude_binaries...) | 
|  | a.Exclude_tests = append(a.Exclude_tests, b.Exclude_tests...) | 
|  | a.Exclude_filesystems = append(a.Exclude_filesystems, b.Exclude_filesystems...) | 
|  | } | 
|  |  | 
|  | type apexMultilibProperties struct { | 
|  | // Native dependencies whose compile_multilib is "first" | 
|  | First ApexNativeDependencies | 
|  |  | 
|  | // Native dependencies whose compile_multilib is "both" | 
|  | Both ApexNativeDependencies | 
|  |  | 
|  | // Native dependencies whose compile_multilib is "prefer32" | 
|  | Prefer32 ApexNativeDependencies | 
|  |  | 
|  | // Native dependencies whose compile_multilib is "32" | 
|  | Lib32 ApexNativeDependencies | 
|  |  | 
|  | // Native dependencies whose compile_multilib is "64" | 
|  | Lib64 ApexNativeDependencies | 
|  | } | 
|  |  | 
|  | type apexTargetBundleProperties struct { | 
|  | Target struct { | 
|  | // Multilib properties only for android. | 
|  | Android struct { | 
|  | Multilib apexMultilibProperties | 
|  | } | 
|  |  | 
|  | // Multilib properties only for host. | 
|  | Host struct { | 
|  | Multilib apexMultilibProperties | 
|  | } | 
|  |  | 
|  | // Multilib properties only for host linux_bionic. | 
|  | Linux_bionic struct { | 
|  | Multilib apexMultilibProperties | 
|  | } | 
|  |  | 
|  | // Multilib properties only for host linux_glibc. | 
|  | Linux_glibc struct { | 
|  | Multilib apexMultilibProperties | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | type apexArchBundleProperties struct { | 
|  | Arch struct { | 
|  | Arm struct { | 
|  | ApexNativeDependencies | 
|  | } | 
|  | Arm64 struct { | 
|  | ApexNativeDependencies | 
|  | } | 
|  | Riscv64 struct { | 
|  | ApexNativeDependencies | 
|  | } | 
|  | X86 struct { | 
|  | ApexNativeDependencies | 
|  | } | 
|  | X86_64 struct { | 
|  | ApexNativeDependencies | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // These properties can be used in override_apex to override the corresponding properties in the | 
|  | // base apex. | 
|  | type overridableProperties struct { | 
|  | // List of APKs that are embedded inside this APEX. | 
|  | Apps []string | 
|  |  | 
|  | // List of prebuilt files that are embedded inside this APEX bundle. | 
|  | Prebuilts []string | 
|  |  | 
|  | // List of BPF programs inside this APEX bundle. | 
|  | Bpfs []string | 
|  |  | 
|  | // Names of modules to be overridden. Listed modules can only be other binaries (in Make or | 
|  | // Soong). This does not completely prevent installation of the overridden binaries, but if | 
|  | // both binaries would be installed by default (in PRODUCT_PACKAGES) the other binary will | 
|  | // be removed from PRODUCT_PACKAGES. | 
|  | Overrides []string | 
|  |  | 
|  | // Logging parent value. | 
|  | Logging_parent string | 
|  |  | 
|  | // Apex Container package name. Override value for attribute package:name in | 
|  | // AndroidManifest.xml | 
|  | Package_name string | 
|  |  | 
|  | // A txt file containing list of files that are allowed to be included in this APEX. | 
|  | Allowed_files *string `android:"path"` | 
|  |  | 
|  | // Name of the apex_key module that provides the private key to sign this APEX bundle. | 
|  | Key *string | 
|  |  | 
|  | // Specifies the certificate and the private key to sign the zip container of this APEX. If | 
|  | // this is "foo", foo.x509.pem and foo.pk8 under PRODUCT_DEFAULT_DEV_CERTIFICATE are used | 
|  | // as the certificate and the private key, respectively. If this is ":module", then the | 
|  | // certificate and the private key are provided from the android_app_certificate module | 
|  | // named "module". | 
|  | Certificate *string | 
|  |  | 
|  | // Whether this APEX can be compressed or not. Setting this property to false means this | 
|  | // APEX will never be compressed. When set to true, APEX will be compressed if other | 
|  | // conditions, e.g., target device needs to support APEX compression, are also fulfilled. | 
|  | // Default: false. | 
|  | Compressible *bool | 
|  |  | 
|  | // Trim against a specific Dynamic Common Lib APEX | 
|  | Trim_against *string | 
|  | } | 
|  |  | 
|  | type apexBundle struct { | 
|  | // Inherited structs | 
|  | android.ModuleBase | 
|  | android.DefaultableModuleBase | 
|  | android.OverridableModuleBase | 
|  | android.BazelModuleBase | 
|  | multitree.ExportableModuleBase | 
|  |  | 
|  | // Properties | 
|  | properties            apexBundleProperties | 
|  | targetProperties      apexTargetBundleProperties | 
|  | archProperties        apexArchBundleProperties | 
|  | overridableProperties overridableProperties | 
|  | vndkProperties        apexVndkProperties // only for apex_vndk modules | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // Inputs | 
|  |  | 
|  | // Keys for apex_payload.img | 
|  | publicKeyFile  android.Path | 
|  | privateKeyFile android.Path | 
|  |  | 
|  | // Cert/priv-key for the zip container | 
|  | containerCertificateFile android.Path | 
|  | containerPrivateKeyFile  android.Path | 
|  |  | 
|  | // Flags for special variants of APEX | 
|  | testApex bool | 
|  | vndkApex bool | 
|  |  | 
|  | // File system type of apex_payload.img | 
|  | payloadFsType fsType | 
|  |  | 
|  | // Whether to create symlink to the system file instead of having a file inside the apex or | 
|  | // not | 
|  | linkToSystemLib bool | 
|  |  | 
|  | // List of files to be included in this APEX. This is filled in the first part of | 
|  | // GenerateAndroidBuildActions. | 
|  | filesInfo []apexFile | 
|  |  | 
|  | // List of other module names that should be installed when this APEX gets installed (LOCAL_REQUIRED_MODULES). | 
|  | makeModulesToInstall []string | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // Outputs (final and intermediates) | 
|  |  | 
|  | // Processed apex manifest in JSONson format (for Q) | 
|  | manifestJsonOut android.WritablePath | 
|  |  | 
|  | // Processed apex manifest in PB format (for R+) | 
|  | manifestPbOut android.WritablePath | 
|  |  | 
|  | // Processed file_contexts files | 
|  | fileContexts android.WritablePath | 
|  |  | 
|  | // The built APEX file. This is the main product. | 
|  | // Could be .apex or .capex | 
|  | outputFile android.WritablePath | 
|  |  | 
|  | // The built uncompressed .apex file. | 
|  | outputApexFile android.WritablePath | 
|  |  | 
|  | // The built APEX file in app bundle format. This file is not directly installed to the | 
|  | // device. For an APEX, multiple app bundles are created each of which is for a specific ABI | 
|  | // like arm, arm64, x86, etc. Then they are processed again (outside of the Android build | 
|  | // system) to be merged into a single app bundle file that Play accepts. See | 
|  | // vendor/google/build/build_unbundled_mainline_module.sh for more detail. | 
|  | bundleModuleFile android.WritablePath | 
|  |  | 
|  | // Target directory to install this APEX. Usually out/target/product/<device>/<partition>/apex. | 
|  | installDir android.InstallPath | 
|  |  | 
|  | // Path where this APEX was installed. | 
|  | installedFile android.InstallPath | 
|  |  | 
|  | // Installed locations of symlinks for backward compatibility. | 
|  | compatSymlinks android.InstallPaths | 
|  |  | 
|  | // Text file having the list of individual files that are included in this APEX. Used for | 
|  | // debugging purpose. | 
|  | installedFilesFile android.WritablePath | 
|  |  | 
|  | // List of module names that this APEX is including (to be shown via *-deps-info target). | 
|  | // Used for debugging purpose. | 
|  | android.ApexBundleDepsInfo | 
|  |  | 
|  | // Optional list of lint report zip files for apexes that contain java or app modules | 
|  | lintReports android.Paths | 
|  |  | 
|  | isCompressed bool | 
|  |  | 
|  | // Path of API coverage generate file | 
|  | nativeApisUsedByModuleFile   android.ModuleOutPath | 
|  | nativeApisBackedByModuleFile android.ModuleOutPath | 
|  | javaApisUsedByModuleFile     android.ModuleOutPath | 
|  |  | 
|  | // Collect the module directory for IDE info in java/jdeps.go. | 
|  | modulePaths []string | 
|  | } | 
|  |  | 
|  | // apexFileClass represents a type of file that can be included in APEX. | 
|  | type apexFileClass int | 
|  |  | 
|  | const ( | 
|  | app apexFileClass = iota | 
|  | appSet | 
|  | etc | 
|  | javaSharedLib | 
|  | nativeExecutable | 
|  | nativeSharedLib | 
|  | nativeTest | 
|  | shBinary | 
|  | ) | 
|  |  | 
|  | var ( | 
|  | classes = map[string]apexFileClass{ | 
|  | "app":              app, | 
|  | "appSet":           appSet, | 
|  | "etc":              etc, | 
|  | "javaSharedLib":    javaSharedLib, | 
|  | "nativeExecutable": nativeExecutable, | 
|  | "nativeSharedLib":  nativeSharedLib, | 
|  | "nativeTest":       nativeTest, | 
|  | "shBinary":         shBinary, | 
|  | } | 
|  | ) | 
|  |  | 
|  | // apexFile represents a file in an APEX bundle. This is created during the first half of | 
|  | // GenerateAndroidBuildActions by traversing the dependencies of the APEX. Then in the second half | 
|  | // of the function, this is used to create commands that copies the files into a staging directory, | 
|  | // where they are packaged into the APEX file. | 
|  | type apexFile struct { | 
|  | // buildFile is put in the installDir inside the APEX. | 
|  | builtFile  android.Path | 
|  | installDir string | 
|  | partition  string | 
|  | customStem string | 
|  | symlinks   []string // additional symlinks | 
|  |  | 
|  | // Info for Android.mk Module name of `module` in AndroidMk. Note the generated AndroidMk | 
|  | // module for apexFile is named something like <AndroidMk module name>.<apex name>[<apex | 
|  | // suffix>] | 
|  | androidMkModuleName       string             // becomes LOCAL_MODULE | 
|  | class                     apexFileClass      // becomes LOCAL_MODULE_CLASS | 
|  | moduleDir                 string             // becomes LOCAL_PATH | 
|  | requiredModuleNames       []string           // becomes LOCAL_REQUIRED_MODULES | 
|  | targetRequiredModuleNames []string           // becomes LOCAL_TARGET_REQUIRED_MODULES | 
|  | hostRequiredModuleNames   []string           // becomes LOCAL_HOST_REQUIRED_MODULES | 
|  | dataPaths                 []android.DataPath // becomes LOCAL_TEST_DATA | 
|  |  | 
|  | jacocoReportClassesFile android.Path     // only for javalibs and apps | 
|  | lintDepSets             java.LintDepSets // only for javalibs and apps | 
|  | certificate             java.Certificate // only for apps | 
|  | overriddenPackageName   string           // only for apps | 
|  |  | 
|  | transitiveDep bool | 
|  | isJniLib      bool | 
|  |  | 
|  | multilib string | 
|  |  | 
|  | isBazelPrebuilt     bool | 
|  | unstrippedBuiltFile android.Path | 
|  | arch                string | 
|  |  | 
|  | // TODO(jiyong): remove this | 
|  | module android.Module | 
|  | } | 
|  |  | 
|  | // TODO(jiyong): shorten the arglist using an option struct | 
|  | func newApexFile(ctx android.BaseModuleContext, builtFile android.Path, androidMkModuleName string, installDir string, class apexFileClass, module android.Module) apexFile { | 
|  | ret := apexFile{ | 
|  | builtFile:           builtFile, | 
|  | installDir:          installDir, | 
|  | androidMkModuleName: androidMkModuleName, | 
|  | class:               class, | 
|  | module:              module, | 
|  | } | 
|  | if module != nil { | 
|  | ret.moduleDir = ctx.OtherModuleDir(module) | 
|  | ret.partition = module.PartitionTag(ctx.DeviceConfig()) | 
|  | ret.requiredModuleNames = module.RequiredModuleNames() | 
|  | ret.targetRequiredModuleNames = module.TargetRequiredModuleNames() | 
|  | ret.hostRequiredModuleNames = module.HostRequiredModuleNames() | 
|  | ret.multilib = module.Target().Arch.ArchType.Multilib | 
|  | } | 
|  | return ret | 
|  | } | 
|  |  | 
|  | func (af *apexFile) ok() bool { | 
|  | return af.builtFile != nil && af.builtFile.String() != "" | 
|  | } | 
|  |  | 
|  | // apexRelativePath returns the relative path of the given path from the install directory of this | 
|  | // apexFile. | 
|  | // TODO(jiyong): rename this | 
|  | func (af *apexFile) apexRelativePath(path string) string { | 
|  | return filepath.Join(af.installDir, path) | 
|  | } | 
|  |  | 
|  | // path returns path of this apex file relative to the APEX root | 
|  | func (af *apexFile) path() string { | 
|  | return af.apexRelativePath(af.stem()) | 
|  | } | 
|  |  | 
|  | // stem returns the base filename of this apex file | 
|  | func (af *apexFile) stem() string { | 
|  | if af.customStem != "" { | 
|  | return af.customStem | 
|  | } | 
|  | return af.builtFile.Base() | 
|  | } | 
|  |  | 
|  | // symlinkPaths returns paths of the symlinks (if any) relative to the APEX root | 
|  | func (af *apexFile) symlinkPaths() []string { | 
|  | var ret []string | 
|  | for _, symlink := range af.symlinks { | 
|  | ret = append(ret, af.apexRelativePath(symlink)) | 
|  | } | 
|  | return ret | 
|  | } | 
|  |  | 
|  | // availableToPlatform tests whether this apexFile is from a module that can be installed to the | 
|  | // platform. | 
|  | func (af *apexFile) availableToPlatform() bool { | 
|  | if af.module == nil { | 
|  | return false | 
|  | } | 
|  | if am, ok := af.module.(android.ApexModule); ok { | 
|  | return am.AvailableFor(android.AvailableToPlatform) | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | //////////////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // Mutators | 
|  | // | 
|  | // Brief description about mutators for APEX. The following three mutators are the most important | 
|  | // ones. | 
|  | // | 
|  | // 1) DepsMutator: from the properties like native_shared_libs, java_libs, etc., modules are added | 
|  | // to the (direct) dependencies of this APEX bundle. | 
|  | // | 
|  | // 2) apexInfoMutator: this is a post-deps mutator, so runs after DepsMutator. Its goal is to | 
|  | // collect modules that are direct and transitive dependencies of each APEX bundle. The collected | 
|  | // modules are marked as being included in the APEX via BuildForApex(). | 
|  | // | 
|  | // 3) apexMutator: this is a post-deps mutator that runs after apexInfoMutator. For each module that | 
|  | // are marked by the apexInfoMutator, apex variations are created using CreateApexVariations(). | 
|  |  | 
|  | type dependencyTag struct { | 
|  | blueprint.BaseDependencyTag | 
|  | name string | 
|  |  | 
|  | // Determines if the dependent will be part of the APEX payload. Can be false for the | 
|  | // dependencies to the signing key module, etc. | 
|  | payload bool | 
|  |  | 
|  | // True if the dependent can only be a source module, false if a prebuilt module is a suitable | 
|  | // replacement. This is needed because some prebuilt modules do not provide all the information | 
|  | // needed by the apex. | 
|  | sourceOnly bool | 
|  |  | 
|  | // If not-nil and an APEX is a member of an SDK then dependencies of that APEX with this tag will | 
|  | // also be added as exported members of that SDK. | 
|  | memberType android.SdkMemberType | 
|  | } | 
|  |  | 
|  | func (d *dependencyTag) SdkMemberType(_ android.Module) android.SdkMemberType { | 
|  | return d.memberType | 
|  | } | 
|  |  | 
|  | func (d *dependencyTag) ExportMember() bool { | 
|  | return true | 
|  | } | 
|  |  | 
|  | func (d *dependencyTag) String() string { | 
|  | return fmt.Sprintf("apex.dependencyTag{%q}", d.name) | 
|  | } | 
|  |  | 
|  | func (d *dependencyTag) ReplaceSourceWithPrebuilt() bool { | 
|  | return !d.sourceOnly | 
|  | } | 
|  |  | 
|  | var _ android.ReplaceSourceWithPrebuilt = &dependencyTag{} | 
|  | var _ android.SdkMemberDependencyTag = &dependencyTag{} | 
|  |  | 
|  | var ( | 
|  | androidAppTag   = &dependencyTag{name: "androidApp", payload: true} | 
|  | bpfTag          = &dependencyTag{name: "bpf", payload: true} | 
|  | certificateTag  = &dependencyTag{name: "certificate"} | 
|  | dclaTag         = &dependencyTag{name: "dcla"} | 
|  | executableTag   = &dependencyTag{name: "executable", payload: true} | 
|  | fsTag           = &dependencyTag{name: "filesystem", payload: true} | 
|  | bcpfTag         = &dependencyTag{name: "bootclasspathFragment", payload: true, sourceOnly: true, memberType: java.BootclasspathFragmentSdkMemberType} | 
|  | sscpfTag        = &dependencyTag{name: "systemserverclasspathFragment", payload: true, sourceOnly: true, memberType: java.SystemServerClasspathFragmentSdkMemberType} | 
|  | compatConfigTag = &dependencyTag{name: "compatConfig", payload: true, sourceOnly: true, memberType: java.CompatConfigSdkMemberType} | 
|  | javaLibTag      = &dependencyTag{name: "javaLib", payload: true} | 
|  | jniLibTag       = &dependencyTag{name: "jniLib", payload: true} | 
|  | keyTag          = &dependencyTag{name: "key"} | 
|  | prebuiltTag     = &dependencyTag{name: "prebuilt", payload: true} | 
|  | rroTag          = &dependencyTag{name: "rro", payload: true} | 
|  | sharedLibTag    = &dependencyTag{name: "sharedLib", payload: true} | 
|  | testForTag      = &dependencyTag{name: "test for"} | 
|  | testTag         = &dependencyTag{name: "test", payload: true} | 
|  | shBinaryTag     = &dependencyTag{name: "shBinary", payload: true} | 
|  | ) | 
|  |  | 
|  | // TODO(jiyong): shorten this function signature | 
|  | func addDependenciesForNativeModules(ctx android.BottomUpMutatorContext, nativeModules ApexNativeDependencies, target android.Target, imageVariation string) { | 
|  | binVariations := target.Variations() | 
|  | libVariations := append(target.Variations(), blueprint.Variation{Mutator: "link", Variation: "shared"}) | 
|  | rustLibVariations := append(target.Variations(), blueprint.Variation{Mutator: "rust_libraries", Variation: "dylib"}) | 
|  |  | 
|  | // Append "image" variation | 
|  | binVariations = append(binVariations, blueprint.Variation{Mutator: "image", Variation: imageVariation}) | 
|  | libVariations = append(libVariations, blueprint.Variation{Mutator: "image", Variation: imageVariation}) | 
|  | rustLibVariations = append(rustLibVariations, blueprint.Variation{Mutator: "image", Variation: imageVariation}) | 
|  |  | 
|  | // Use *FarVariation* to be able to depend on modules having conflicting variations with | 
|  | // this module. This is required since arch variant of an APEX bundle is 'common' but it is | 
|  | // 'arm' or 'arm64' for native shared libs. | 
|  | ctx.AddFarVariationDependencies(binVariations, executableTag, | 
|  | android.RemoveListFromList(nativeModules.Binaries, nativeModules.Exclude_binaries)...) | 
|  | ctx.AddFarVariationDependencies(binVariations, testTag, | 
|  | android.RemoveListFromList(nativeModules.Tests, nativeModules.Exclude_tests)...) | 
|  | ctx.AddFarVariationDependencies(libVariations, jniLibTag, | 
|  | android.RemoveListFromList(nativeModules.Jni_libs, nativeModules.Exclude_jni_libs)...) | 
|  | ctx.AddFarVariationDependencies(libVariations, sharedLibTag, | 
|  | android.RemoveListFromList(nativeModules.Native_shared_libs, nativeModules.Exclude_native_shared_libs)...) | 
|  | ctx.AddFarVariationDependencies(rustLibVariations, sharedLibTag, | 
|  | android.RemoveListFromList(nativeModules.Rust_dyn_libs, nativeModules.Exclude_rust_dyn_libs)...) | 
|  | ctx.AddFarVariationDependencies(target.Variations(), fsTag, | 
|  | android.RemoveListFromList(nativeModules.Filesystems, nativeModules.Exclude_filesystems)...) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) combineProperties(ctx android.BottomUpMutatorContext) { | 
|  | proptools.AppendProperties(&a.properties.Multilib, &a.targetProperties.Target.Android.Multilib, nil) | 
|  | } | 
|  |  | 
|  | // getImageVariationPair returns a pair for the image variation name as its | 
|  | // prefix and suffix. The prefix indicates whether it's core/vendor/product and the | 
|  | // suffix indicates the vndk version when it's vendor or product. | 
|  | // getImageVariation can simply join the result of this function to get the | 
|  | // image variation name. | 
|  | func (a *apexBundle) getImageVariationPair(deviceConfig android.DeviceConfig) (string, string) { | 
|  | if a.vndkApex { | 
|  | return cc.VendorVariationPrefix, a.vndkVersion(deviceConfig) | 
|  | } | 
|  |  | 
|  | var prefix string | 
|  | var vndkVersion string | 
|  | if deviceConfig.VndkVersion() != "" { | 
|  | if a.SocSpecific() || a.DeviceSpecific() { | 
|  | prefix = cc.VendorVariationPrefix | 
|  | vndkVersion = deviceConfig.VndkVersion() | 
|  | } else if a.ProductSpecific() { | 
|  | prefix = cc.ProductVariationPrefix | 
|  | vndkVersion = deviceConfig.ProductVndkVersion() | 
|  | } | 
|  | } | 
|  | if vndkVersion == "current" { | 
|  | vndkVersion = deviceConfig.PlatformVndkVersion() | 
|  | } | 
|  | if vndkVersion != "" { | 
|  | return prefix, vndkVersion | 
|  | } | 
|  |  | 
|  | return android.CoreVariation, "" // The usual case | 
|  | } | 
|  |  | 
|  | // getImageVariation returns the image variant name for this apexBundle. In most cases, it's simply | 
|  | // android.CoreVariation, but gets complicated for the vendor APEXes and the VNDK APEX. | 
|  | func (a *apexBundle) getImageVariation(ctx android.BottomUpMutatorContext) string { | 
|  | prefix, vndkVersion := a.getImageVariationPair(ctx.DeviceConfig()) | 
|  | return prefix + vndkVersion | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) DepsMutator(ctx android.BottomUpMutatorContext) { | 
|  | // apexBundle is a multi-arch targets module. Arch variant of apexBundle is set to 'common'. | 
|  | // arch-specific targets are enabled by the compile_multilib setting of the apex bundle. For | 
|  | // each target os/architectures, appropriate dependencies are selected by their | 
|  | // target.<os>.multilib.<type> groups and are added as (direct) dependencies. | 
|  | targets := ctx.MultiTargets() | 
|  | imageVariation := a.getImageVariation(ctx) | 
|  |  | 
|  | a.combineProperties(ctx) | 
|  |  | 
|  | has32BitTarget := false | 
|  | for _, target := range targets { | 
|  | if target.Arch.ArchType.Multilib == "lib32" { | 
|  | has32BitTarget = true | 
|  | } | 
|  | } | 
|  | for i, target := range targets { | 
|  | var deps ApexNativeDependencies | 
|  |  | 
|  | // Add native modules targeting both ABIs. When multilib.* is omitted for | 
|  | // native_shared_libs/jni_libs/tests, it implies multilib.both | 
|  | deps.Merge(a.properties.Multilib.Both) | 
|  | deps.Merge(ApexNativeDependencies{ | 
|  | Native_shared_libs: a.properties.Native_shared_libs, | 
|  | Tests:              a.properties.Tests, | 
|  | Jni_libs:           a.properties.Jni_libs, | 
|  | Binaries:           nil, | 
|  | }) | 
|  |  | 
|  | // Add native modules targeting the first ABI When multilib.* is omitted for | 
|  | // binaries, it implies multilib.first | 
|  | isPrimaryAbi := i == 0 | 
|  | if isPrimaryAbi { | 
|  | deps.Merge(a.properties.Multilib.First) | 
|  | deps.Merge(ApexNativeDependencies{ | 
|  | Native_shared_libs: nil, | 
|  | Tests:              nil, | 
|  | Jni_libs:           nil, | 
|  | Binaries:           a.properties.Binaries, | 
|  | }) | 
|  | } | 
|  |  | 
|  | // Add native modules targeting either 32-bit or 64-bit ABI | 
|  | switch target.Arch.ArchType.Multilib { | 
|  | case "lib32": | 
|  | deps.Merge(a.properties.Multilib.Lib32) | 
|  | deps.Merge(a.properties.Multilib.Prefer32) | 
|  | case "lib64": | 
|  | deps.Merge(a.properties.Multilib.Lib64) | 
|  | if !has32BitTarget { | 
|  | deps.Merge(a.properties.Multilib.Prefer32) | 
|  | } | 
|  | } | 
|  |  | 
|  | // Add native modules targeting a specific arch variant | 
|  | switch target.Arch.ArchType { | 
|  | case android.Arm: | 
|  | deps.Merge(a.archProperties.Arch.Arm.ApexNativeDependencies) | 
|  | case android.Arm64: | 
|  | deps.Merge(a.archProperties.Arch.Arm64.ApexNativeDependencies) | 
|  | case android.Riscv64: | 
|  | deps.Merge(a.archProperties.Arch.Riscv64.ApexNativeDependencies) | 
|  | case android.X86: | 
|  | deps.Merge(a.archProperties.Arch.X86.ApexNativeDependencies) | 
|  | case android.X86_64: | 
|  | deps.Merge(a.archProperties.Arch.X86_64.ApexNativeDependencies) | 
|  | default: | 
|  | panic(fmt.Errorf("unsupported arch %v\n", ctx.Arch().ArchType)) | 
|  | } | 
|  |  | 
|  | addDependenciesForNativeModules(ctx, deps, target, imageVariation) | 
|  | ctx.AddFarVariationDependencies([]blueprint.Variation{ | 
|  | {Mutator: "os", Variation: target.OsVariation()}, | 
|  | {Mutator: "arch", Variation: target.ArchVariation()}, | 
|  | }, shBinaryTag, a.properties.Sh_binaries...) | 
|  | } | 
|  |  | 
|  | // Common-arch dependencies come next | 
|  | commonVariation := ctx.Config().AndroidCommonTarget.Variations() | 
|  | ctx.AddFarVariationDependencies(commonVariation, rroTag, a.properties.Rros...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, bcpfTag, a.properties.Bootclasspath_fragments...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, sscpfTag, a.properties.Systemserverclasspath_fragments...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, javaLibTag, a.properties.Java_libs...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, fsTag, a.properties.Filesystems...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, compatConfigTag, a.properties.Compat_configs...) | 
|  | } | 
|  |  | 
|  | // DepsMutator for the overridden properties. | 
|  | func (a *apexBundle) OverridablePropertiesDepsMutator(ctx android.BottomUpMutatorContext) { | 
|  | if a.overridableProperties.Allowed_files != nil { | 
|  | android.ExtractSourceDeps(ctx, a.overridableProperties.Allowed_files) | 
|  | } | 
|  |  | 
|  | commonVariation := ctx.Config().AndroidCommonTarget.Variations() | 
|  | ctx.AddFarVariationDependencies(commonVariation, androidAppTag, a.overridableProperties.Apps...) | 
|  | ctx.AddFarVariationDependencies(commonVariation, bpfTag, a.overridableProperties.Bpfs...) | 
|  | if prebuilts := a.overridableProperties.Prebuilts; len(prebuilts) > 0 { | 
|  | // For prebuilt_etc, use the first variant (64 on 64/32bit device, 32 on 32bit device) | 
|  | // regardless of the TARGET_PREFER_* setting. See b/144532908 | 
|  | arches := ctx.DeviceConfig().Arches() | 
|  | if len(arches) != 0 { | 
|  | archForPrebuiltEtc := arches[0] | 
|  | for _, arch := range arches { | 
|  | // Prefer 64-bit arch if there is any | 
|  | if arch.ArchType.Multilib == "lib64" { | 
|  | archForPrebuiltEtc = arch | 
|  | break | 
|  | } | 
|  | } | 
|  | ctx.AddFarVariationDependencies([]blueprint.Variation{ | 
|  | {Mutator: "os", Variation: ctx.Os().String()}, | 
|  | {Mutator: "arch", Variation: archForPrebuiltEtc.String()}, | 
|  | }, prebuiltTag, prebuilts...) | 
|  | } | 
|  | } | 
|  |  | 
|  | // Dependencies for signing | 
|  | if String(a.overridableProperties.Key) == "" { | 
|  | ctx.PropertyErrorf("key", "missing") | 
|  | return | 
|  | } | 
|  | ctx.AddDependency(ctx.Module(), keyTag, String(a.overridableProperties.Key)) | 
|  |  | 
|  | cert := android.SrcIsModule(a.getCertString(ctx)) | 
|  | if cert != "" { | 
|  | ctx.AddDependency(ctx.Module(), certificateTag, cert) | 
|  | // empty cert is not an error. Cert and private keys will be directly found under | 
|  | // PRODUCT_DEFAULT_DEV_CERTIFICATE | 
|  | } | 
|  | } | 
|  |  | 
|  | func apexDCLADepsMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Config().ApexTrimEnabled() { | 
|  | return | 
|  | } | 
|  | if a, ok := mctx.Module().(*apexBundle); ok && a.overridableProperties.Trim_against != nil { | 
|  | commonVariation := mctx.Config().AndroidCommonTarget.Variations() | 
|  | mctx.AddFarVariationDependencies(commonVariation, dclaTag, String(a.overridableProperties.Trim_against)) | 
|  | } else if o, ok := mctx.Module().(*OverrideApex); ok { | 
|  | for _, p := range o.GetProperties() { | 
|  | properties, ok := p.(*overridableProperties) | 
|  | if !ok { | 
|  | continue | 
|  | } | 
|  | if properties.Trim_against != nil { | 
|  | commonVariation := mctx.Config().AndroidCommonTarget.Variations() | 
|  | mctx.AddFarVariationDependencies(commonVariation, dclaTag, String(properties.Trim_against)) | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | type DCLAInfo struct { | 
|  | ProvidedLibs []string | 
|  | } | 
|  |  | 
|  | var DCLAInfoProvider = blueprint.NewMutatorProvider(DCLAInfo{}, "apex_info") | 
|  |  | 
|  | type ApexBundleInfo struct { | 
|  | Contents *android.ApexContents | 
|  | } | 
|  |  | 
|  | var ApexBundleInfoProvider = blueprint.NewMutatorProvider(ApexBundleInfo{}, "apex_info") | 
|  |  | 
|  | var _ ApexInfoMutator = (*apexBundle)(nil) | 
|  |  | 
|  | func (a *apexBundle) ApexVariationName() string { | 
|  | return a.properties.ApexVariationName | 
|  | } | 
|  |  | 
|  | // ApexInfoMutator is responsible for collecting modules that need to have apex variants. They are | 
|  | // identified by doing a graph walk starting from an apexBundle. Basically, all the (direct and | 
|  | // indirect) dependencies are collected. But a few types of modules that shouldn't be included in | 
|  | // the apexBundle (e.g. stub libraries) are not collected. Note that a single module can be depended | 
|  | // on by multiple apexBundles. In that case, the module is collected for all of the apexBundles. | 
|  | // | 
|  | // For each dependency between an apex and an ApexModule an ApexInfo object describing the apex | 
|  | // is passed to that module's BuildForApex(ApexInfo) method which collates them all in a list. | 
|  | // The apexMutator uses that list to create module variants for the apexes to which it belongs. | 
|  | // The relationship between module variants and apexes is not one-to-one as variants will be | 
|  | // shared between compatible apexes. | 
|  | func (a *apexBundle) ApexInfoMutator(mctx android.TopDownMutatorContext) { | 
|  |  | 
|  | // The VNDK APEX is special. For the APEX, the membership is described in a very different | 
|  | // way. There is no dependency from the VNDK APEX to the VNDK libraries. Instead, VNDK | 
|  | // libraries are self-identified by their vndk.enabled properties. There is no need to run | 
|  | // this mutator for the APEX as nothing will be collected. So, let's return fast. | 
|  | if a.vndkApex { | 
|  | return | 
|  | } | 
|  |  | 
|  | // Special casing for APEXes on non-system (e.g., vendor, odm, etc.) partitions. They are | 
|  | // provided with a property named use_vndk_as_stable, which when set to true doesn't collect | 
|  | // VNDK libraries as transitive dependencies. This option is useful for reducing the size of | 
|  | // the non-system APEXes because the VNDK libraries won't be included (and duped) in the | 
|  | // APEX, but shared across APEXes via the VNDK APEX. | 
|  | useVndk := a.SocSpecific() || a.DeviceSpecific() || (a.ProductSpecific() && mctx.Config().EnforceProductPartitionInterface()) | 
|  | excludeVndkLibs := useVndk && a.useVndkAsStable(mctx) | 
|  | if proptools.Bool(a.properties.Use_vndk_as_stable) { | 
|  | if !useVndk { | 
|  | mctx.PropertyErrorf("use_vndk_as_stable", "not supported for system/system_ext APEXes") | 
|  | } | 
|  | if a.minSdkVersionValue(mctx) != "" { | 
|  | mctx.PropertyErrorf("use_vndk_as_stable", "not supported when min_sdk_version is set") | 
|  | } | 
|  | mctx.VisitDirectDepsWithTag(sharedLibTag, func(dep android.Module) { | 
|  | if c, ok := dep.(*cc.Module); ok && c.IsVndk() { | 
|  | mctx.PropertyErrorf("use_vndk_as_stable", "Trying to include a VNDK library(%s) while use_vndk_as_stable is true.", dep.Name()) | 
|  | } | 
|  | }) | 
|  | if mctx.Failed() { | 
|  | return | 
|  | } | 
|  | } | 
|  |  | 
|  | continueApexDepsWalk := func(child, parent android.Module) bool { | 
|  | am, ok := child.(android.ApexModule) | 
|  | if !ok || !am.CanHaveApexVariants() { | 
|  | return false | 
|  | } | 
|  | depTag := mctx.OtherModuleDependencyTag(child) | 
|  |  | 
|  | // Check to see if the tag always requires that the child module has an apex variant for every | 
|  | // apex variant of the parent module. If it does not then it is still possible for something | 
|  | // else, e.g. the DepIsInSameApex(...) method to decide that a variant is required. | 
|  | if required, ok := depTag.(android.AlwaysRequireApexVariantTag); ok && required.AlwaysRequireApexVariant() { | 
|  | return true | 
|  | } | 
|  | if !android.IsDepInSameApex(mctx, parent, child) { | 
|  | return false | 
|  | } | 
|  | if excludeVndkLibs { | 
|  | if c, ok := child.(*cc.Module); ok && c.IsVndk() { | 
|  | return false | 
|  | } | 
|  | } | 
|  | // By default, all the transitive dependencies are collected, unless filtered out | 
|  | // above. | 
|  | return true | 
|  | } | 
|  |  | 
|  | // Records whether a certain module is included in this apexBundle via direct dependency or | 
|  | // inndirect dependency. | 
|  | contents := make(map[string]android.ApexMembership) | 
|  | mctx.WalkDeps(func(child, parent android.Module) bool { | 
|  | if !continueApexDepsWalk(child, parent) { | 
|  | return false | 
|  | } | 
|  | // If the parent is apexBundle, this child is directly depended. | 
|  | _, directDep := parent.(*apexBundle) | 
|  | depName := mctx.OtherModuleName(child) | 
|  | contents[depName] = contents[depName].Add(directDep) | 
|  | return true | 
|  | }) | 
|  |  | 
|  | // The membership information is saved for later access | 
|  | apexContents := android.NewApexContents(contents) | 
|  | mctx.SetProvider(ApexBundleInfoProvider, ApexBundleInfo{ | 
|  | Contents: apexContents, | 
|  | }) | 
|  |  | 
|  | minSdkVersion := a.minSdkVersion(mctx) | 
|  | // When min_sdk_version is not set, the apex is built against FutureApiLevel. | 
|  | if minSdkVersion.IsNone() { | 
|  | minSdkVersion = android.FutureApiLevel | 
|  | } | 
|  |  | 
|  | // This is the main part of this mutator. Mark the collected dependencies that they need to | 
|  | // be built for this apexBundle. | 
|  |  | 
|  | apexVariationName := mctx.ModuleName() // could be com.android.foo | 
|  | a.properties.ApexVariationName = apexVariationName | 
|  | testApexes := []string{} | 
|  | if a.testApex { | 
|  | testApexes = []string{apexVariationName} | 
|  | } | 
|  | apexInfo := android.ApexInfo{ | 
|  | ApexVariationName: apexVariationName, | 
|  | MinSdkVersion:     minSdkVersion, | 
|  | Updatable:         a.Updatable(), | 
|  | UsePlatformApis:   a.UsePlatformApis(), | 
|  | InApexVariants:    []string{apexVariationName}, | 
|  | InApexModules:     []string{a.Name()}, // could be com.mycompany.android.foo | 
|  | ApexContents:      []*android.ApexContents{apexContents}, | 
|  | TestApexes:        testApexes, | 
|  | } | 
|  | mctx.WalkDeps(func(child, parent android.Module) bool { | 
|  | if !continueApexDepsWalk(child, parent) { | 
|  | return false | 
|  | } | 
|  | child.(android.ApexModule).BuildForApex(apexInfo) // leave a mark! | 
|  | return true | 
|  | }) | 
|  |  | 
|  | if a.dynamic_common_lib_apex() { | 
|  | mctx.SetProvider(DCLAInfoProvider, DCLAInfo{ | 
|  | ProvidedLibs: a.properties.Native_shared_libs, | 
|  | }) | 
|  | } | 
|  | } | 
|  |  | 
|  | type ApexInfoMutator interface { | 
|  | // ApexVariationName returns the name of the APEX variation to use in the apex | 
|  | // mutator etc. It is the same name as ApexInfo.ApexVariationName. | 
|  | ApexVariationName() string | 
|  |  | 
|  | // ApexInfoMutator implementations must call BuildForApex(ApexInfo) on any modules that are | 
|  | // depended upon by an apex and which require an apex specific variant. | 
|  | ApexInfoMutator(android.TopDownMutatorContext) | 
|  | } | 
|  |  | 
|  | // apexInfoMutator delegates the work of identifying which modules need an ApexInfo and apex | 
|  | // specific variant to modules that support the ApexInfoMutator. | 
|  | // It also propagates updatable=true to apps of updatable apexes | 
|  | func apexInfoMutator(mctx android.TopDownMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  |  | 
|  | if a, ok := mctx.Module().(ApexInfoMutator); ok { | 
|  | a.ApexInfoMutator(mctx) | 
|  | } | 
|  | enforceAppUpdatability(mctx) | 
|  | } | 
|  |  | 
|  | // apexStrictUpdatibilityLintMutator propagates strict_updatability_linting to transitive deps of a mainline module | 
|  | // This check is enforced for updatable modules | 
|  | func apexStrictUpdatibilityLintMutator(mctx android.TopDownMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if apex, ok := mctx.Module().(*apexBundle); ok && apex.checkStrictUpdatabilityLinting() { | 
|  | mctx.WalkDeps(func(child, parent android.Module) bool { | 
|  | // b/208656169 Do not propagate strict updatability linting to libcore/ | 
|  | // These libs are available on the classpath during compilation | 
|  | // These libs are transitive deps of the sdk. See java/sdk.go:decodeSdkDep | 
|  | // Only skip libraries defined in libcore root, not subdirectories | 
|  | if mctx.OtherModuleDir(child) == "libcore" { | 
|  | // Do not traverse transitive deps of libcore/ libs | 
|  | return false | 
|  | } | 
|  | if android.InList(child.Name(), skipLintJavalibAllowlist) { | 
|  | return false | 
|  | } | 
|  | if lintable, ok := child.(java.LintDepSetsIntf); ok { | 
|  | lintable.SetStrictUpdatabilityLinting(true) | 
|  | } | 
|  | // visit transitive deps | 
|  | return true | 
|  | }) | 
|  | } | 
|  | } | 
|  |  | 
|  | // enforceAppUpdatability propagates updatable=true to apps of updatable apexes | 
|  | func enforceAppUpdatability(mctx android.TopDownMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if apex, ok := mctx.Module().(*apexBundle); ok && apex.Updatable() { | 
|  | // checking direct deps is sufficient since apex->apk is a direct edge, even when inherited via apex_defaults | 
|  | mctx.VisitDirectDeps(func(module android.Module) { | 
|  | // ignore android_test_app | 
|  | if app, ok := module.(*java.AndroidApp); ok { | 
|  | app.SetUpdatable(true) | 
|  | } | 
|  | }) | 
|  | } | 
|  | } | 
|  |  | 
|  | // TODO: b/215736885 Whittle the denylist | 
|  | // Transitive deps of certain mainline modules baseline NewApi errors | 
|  | // Skip these mainline modules for now | 
|  | var ( | 
|  | skipStrictUpdatabilityLintAllowlist = []string{ | 
|  | "com.android.art", | 
|  | "com.android.art.debug", | 
|  | "com.android.conscrypt", | 
|  | "com.android.media", | 
|  | // test apexes | 
|  | "test_com.android.art", | 
|  | "test_com.android.conscrypt", | 
|  | "test_com.android.media", | 
|  | "test_jitzygote_com.android.art", | 
|  | } | 
|  |  | 
|  | // TODO: b/215736885 Remove this list | 
|  | skipLintJavalibAllowlist = []string{ | 
|  | "conscrypt.module.platform.api.stubs", | 
|  | "conscrypt.module.public.api.stubs", | 
|  | "conscrypt.module.public.api.stubs.system", | 
|  | "conscrypt.module.public.api.stubs.module_lib", | 
|  | "framework-media.stubs", | 
|  | "framework-media.stubs.system", | 
|  | "framework-media.stubs.module_lib", | 
|  | } | 
|  | ) | 
|  |  | 
|  | func (a *apexBundle) checkStrictUpdatabilityLinting() bool { | 
|  | return a.Updatable() && !android.InList(a.ApexVariationName(), skipStrictUpdatabilityLintAllowlist) | 
|  | } | 
|  |  | 
|  | // apexUniqueVariationsMutator checks if any dependencies use unique apex variations. If so, use | 
|  | // unique apex variations for this module. See android/apex.go for more about unique apex variant. | 
|  | // TODO(jiyong): move this to android/apex.go? | 
|  | func apexUniqueVariationsMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if am, ok := mctx.Module().(android.ApexModule); ok { | 
|  | android.UpdateUniqueApexVariationsForDeps(mctx, am) | 
|  | } | 
|  | } | 
|  |  | 
|  | // apexTestForDepsMutator checks if this module is a test for an apex. If so, add a dependency on | 
|  | // the apex in order to retrieve its contents later. | 
|  | // TODO(jiyong): move this to android/apex.go? | 
|  | func apexTestForDepsMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if am, ok := mctx.Module().(android.ApexModule); ok { | 
|  | if testFor := am.TestFor(); len(testFor) > 0 { | 
|  | mctx.AddFarVariationDependencies([]blueprint.Variation{ | 
|  | {Mutator: "os", Variation: am.Target().OsVariation()}, | 
|  | {"arch", "common"}, | 
|  | }, testForTag, testFor...) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // TODO(jiyong): move this to android/apex.go? | 
|  | func apexTestForMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if _, ok := mctx.Module().(android.ApexModule); ok { | 
|  | var contents []*android.ApexContents | 
|  | for _, testFor := range mctx.GetDirectDepsWithTag(testForTag) { | 
|  | abInfo := mctx.OtherModuleProvider(testFor, ApexBundleInfoProvider).(ApexBundleInfo) | 
|  | contents = append(contents, abInfo.Contents) | 
|  | } | 
|  | mctx.SetProvider(android.ApexTestForInfoProvider, android.ApexTestForInfo{ | 
|  | ApexContents: contents, | 
|  | }) | 
|  | } | 
|  | } | 
|  |  | 
|  | // markPlatformAvailability marks whether or not a module can be available to platform. A module | 
|  | // cannot be available to platform if 1) it is explicitly marked as not available (i.e. | 
|  | // "//apex_available:platform" is absent) or 2) it depends on another module that isn't (or can't | 
|  | // be) available to platform | 
|  | // TODO(jiyong): move this to android/apex.go? | 
|  | func markPlatformAvailability(mctx android.BottomUpMutatorContext) { | 
|  | // Recovery is not considered as platform | 
|  | if mctx.Module().InstallInRecovery() { | 
|  | return | 
|  | } | 
|  |  | 
|  | am, ok := mctx.Module().(android.ApexModule) | 
|  | if !ok { | 
|  | return | 
|  | } | 
|  |  | 
|  | availableToPlatform := am.AvailableFor(android.AvailableToPlatform) | 
|  |  | 
|  | // If any of the dep is not available to platform, this module is also considered as being | 
|  | // not available to platform even if it has "//apex_available:platform" | 
|  | mctx.VisitDirectDeps(func(child android.Module) { | 
|  | if !android.IsDepInSameApex(mctx, am, child) { | 
|  | // if the dependency crosses apex boundary, don't consider it | 
|  | return | 
|  | } | 
|  | if dep, ok := child.(android.ApexModule); ok && dep.NotAvailableForPlatform() { | 
|  | availableToPlatform = false | 
|  | // TODO(b/154889534) trigger an error when 'am' has | 
|  | // "//apex_available:platform" | 
|  | } | 
|  | }) | 
|  |  | 
|  | // Exception 1: check to see if the module always requires it. | 
|  | if am.AlwaysRequiresPlatformApexVariant() { | 
|  | availableToPlatform = true | 
|  | } | 
|  |  | 
|  | // Exception 2: bootstrap bionic libraries are also always available to platform | 
|  | if cc.InstallToBootstrap(mctx.ModuleName(), mctx.Config()) { | 
|  | availableToPlatform = true | 
|  | } | 
|  |  | 
|  | if !availableToPlatform { | 
|  | am.SetNotAvailableForPlatform() | 
|  | } | 
|  | } | 
|  |  | 
|  | // apexMutator visits each module and creates apex variations if the module was marked in the | 
|  | // previous run of apexInfoMutator. | 
|  | func apexMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  |  | 
|  | // This is the usual path. | 
|  | if am, ok := mctx.Module().(android.ApexModule); ok && am.CanHaveApexVariants() { | 
|  | android.CreateApexVariations(mctx, am) | 
|  | return | 
|  | } | 
|  |  | 
|  | // apexBundle itself is mutated so that it and its dependencies have the same apex variant. | 
|  | if ai, ok := mctx.Module().(ApexInfoMutator); ok && apexModuleTypeRequiresVariant(ai) { | 
|  | apexBundleName := ai.ApexVariationName() | 
|  | mctx.CreateVariations(apexBundleName) | 
|  | if strings.HasPrefix(apexBundleName, "com.android.art") { | 
|  | // Create an alias from the platform variant. This is done to make | 
|  | // test_for dependencies work for modules that are split by the APEX | 
|  | // mutator, since test_for dependencies always go to the platform variant. | 
|  | // This doesn't happen for normal APEXes that are disjunct, so only do | 
|  | // this for the overlapping ART APEXes. | 
|  | // TODO(b/183882457): Remove this if the test_for functionality is | 
|  | // refactored to depend on the proper APEX variants instead of platform. | 
|  | mctx.CreateAliasVariation("", apexBundleName) | 
|  | } | 
|  | } else if o, ok := mctx.Module().(*OverrideApex); ok { | 
|  | apexBundleName := o.GetOverriddenModuleName() | 
|  | if apexBundleName == "" { | 
|  | mctx.ModuleErrorf("base property is not set") | 
|  | return | 
|  | } | 
|  | mctx.CreateVariations(apexBundleName) | 
|  | if strings.HasPrefix(apexBundleName, "com.android.art") { | 
|  | // TODO(b/183882457): See note for CreateAliasVariation above. | 
|  | mctx.CreateAliasVariation("", apexBundleName) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // apexModuleTypeRequiresVariant determines whether the module supplied requires an apex specific | 
|  | // variant. | 
|  | func apexModuleTypeRequiresVariant(module ApexInfoMutator) bool { | 
|  | if a, ok := module.(*apexBundle); ok { | 
|  | // TODO(jiyong): document the reason why the VNDK APEX is an exception here. | 
|  | return !a.vndkApex | 
|  | } | 
|  |  | 
|  | return true | 
|  | } | 
|  |  | 
|  | // See android.UpdateDirectlyInAnyApex | 
|  | // TODO(jiyong): move this to android/apex.go? | 
|  | func apexDirectlyInAnyMutator(mctx android.BottomUpMutatorContext) { | 
|  | if !mctx.Module().Enabled() { | 
|  | return | 
|  | } | 
|  | if am, ok := mctx.Module().(android.ApexModule); ok { | 
|  | android.UpdateDirectlyInAnyApex(mctx, am) | 
|  | } | 
|  | } | 
|  |  | 
|  | const ( | 
|  | // File extensions of an APEX for different packaging methods | 
|  | imageApexSuffix  = ".apex" | 
|  | imageCapexSuffix = ".capex" | 
|  |  | 
|  | // variant names each of which is for a packaging method | 
|  | imageApexType = "image" | 
|  |  | 
|  | ext4FsType  = "ext4" | 
|  | f2fsFsType  = "f2fs" | 
|  | erofsFsType = "erofs" | 
|  | ) | 
|  |  | 
|  | var _ android.DepIsInSameApex = (*apexBundle)(nil) | 
|  |  | 
|  | // Implements android.DepInInSameApex | 
|  | func (a *apexBundle) DepIsInSameApex(_ android.BaseModuleContext, _ android.Module) bool { | 
|  | // direct deps of an APEX bundle are all part of the APEX bundle | 
|  | // TODO(jiyong): shouldn't we look into the payload field of the dependencyTag? | 
|  | return true | 
|  | } | 
|  |  | 
|  | var _ android.OutputFileProducer = (*apexBundle)(nil) | 
|  |  | 
|  | // Implements android.OutputFileProducer | 
|  | func (a *apexBundle) OutputFiles(tag string) (android.Paths, error) { | 
|  | switch tag { | 
|  | case "", android.DefaultDistTag: | 
|  | // This is the default dist path. | 
|  | return android.Paths{a.outputFile}, nil | 
|  | case imageApexSuffix: | 
|  | // uncompressed one | 
|  | if a.outputApexFile != nil { | 
|  | return android.Paths{a.outputApexFile}, nil | 
|  | } | 
|  | fallthrough | 
|  | default: | 
|  | return nil, fmt.Errorf("unsupported module reference tag %q", tag) | 
|  | } | 
|  | } | 
|  |  | 
|  | var _ multitree.Exportable = (*apexBundle)(nil) | 
|  |  | 
|  | func (a *apexBundle) Exportable() bool { | 
|  | return true | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) TaggedOutputs() map[string]android.Paths { | 
|  | ret := make(map[string]android.Paths) | 
|  | ret["apex"] = android.Paths{a.outputFile} | 
|  | return ret | 
|  | } | 
|  |  | 
|  | var _ cc.Coverage = (*apexBundle)(nil) | 
|  |  | 
|  | // Implements cc.Coverage | 
|  | func (a *apexBundle) IsNativeCoverageNeeded(ctx android.BaseModuleContext) bool { | 
|  | return ctx.DeviceConfig().NativeCoverageEnabled() | 
|  | } | 
|  |  | 
|  | // Implements cc.Coverage | 
|  | func (a *apexBundle) SetPreventInstall() { | 
|  | a.properties.PreventInstall = true | 
|  | } | 
|  |  | 
|  | // Implements cc.Coverage | 
|  | func (a *apexBundle) HideFromMake() { | 
|  | a.properties.HideFromMake = true | 
|  | // This HideFromMake is shadowing the ModuleBase one, call through to it for now. | 
|  | // TODO(ccross): untangle these | 
|  | a.ModuleBase.HideFromMake() | 
|  | } | 
|  |  | 
|  | // Implements cc.Coverage | 
|  | func (a *apexBundle) MarkAsCoverageVariant(coverage bool) { | 
|  | a.properties.IsCoverageVariant = coverage | 
|  | } | 
|  |  | 
|  | // Implements cc.Coverage | 
|  | func (a *apexBundle) EnableCoverageIfNeeded() {} | 
|  |  | 
|  | var _ android.ApexBundleDepsInfoIntf = (*apexBundle)(nil) | 
|  |  | 
|  | // Implements android.ApexBundleDepsInfoIntf | 
|  | func (a *apexBundle) Updatable() bool { | 
|  | return proptools.BoolDefault(a.properties.Updatable, true) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) FutureUpdatable() bool { | 
|  | return proptools.BoolDefault(a.properties.Future_updatable, false) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) UsePlatformApis() bool { | 
|  | return proptools.BoolDefault(a.properties.Platform_apis, false) | 
|  | } | 
|  |  | 
|  | // getCertString returns the name of the cert that should be used to sign this APEX. This is | 
|  | // basically from the "certificate" property, but could be overridden by the device config. | 
|  | func (a *apexBundle) getCertString(ctx android.BaseModuleContext) string { | 
|  | moduleName := ctx.ModuleName() | 
|  | // VNDK APEXes share the same certificate. To avoid adding a new VNDK version to the | 
|  | // OVERRIDE_* list, we check with the pseudo module name to see if its certificate is | 
|  | // overridden. | 
|  | if a.vndkApex { | 
|  | moduleName = vndkApexName | 
|  | } | 
|  | certificate, overridden := ctx.DeviceConfig().OverrideCertificateFor(moduleName) | 
|  | if overridden { | 
|  | return ":" + certificate | 
|  | } | 
|  | return String(a.overridableProperties.Certificate) | 
|  | } | 
|  |  | 
|  | // See the installable property | 
|  | func (a *apexBundle) installable() bool { | 
|  | return !a.properties.PreventInstall && (a.properties.Installable == nil || proptools.Bool(a.properties.Installable)) | 
|  | } | 
|  |  | 
|  | // See the generate_hashtree property | 
|  | func (a *apexBundle) shouldGenerateHashtree() bool { | 
|  | return proptools.BoolDefault(a.properties.Generate_hashtree, true) | 
|  | } | 
|  |  | 
|  | // See the test_only_unsigned_payload property | 
|  | func (a *apexBundle) testOnlyShouldSkipPayloadSign() bool { | 
|  | return proptools.Bool(a.properties.Test_only_unsigned_payload) | 
|  | } | 
|  |  | 
|  | // See the test_only_force_compression property | 
|  | func (a *apexBundle) testOnlyShouldForceCompression() bool { | 
|  | return proptools.Bool(a.properties.Test_only_force_compression) | 
|  | } | 
|  |  | 
|  | // See the dynamic_common_lib_apex property | 
|  | func (a *apexBundle) dynamic_common_lib_apex() bool { | 
|  | return proptools.BoolDefault(a.properties.Dynamic_common_lib_apex, false) | 
|  | } | 
|  |  | 
|  | // See the list of libs to trim | 
|  | func (a *apexBundle) libs_to_trim(ctx android.ModuleContext) []string { | 
|  | dclaModules := ctx.GetDirectDepsWithTag(dclaTag) | 
|  | if len(dclaModules) > 1 { | 
|  | panic(fmt.Errorf("expected exactly at most one dcla dependency, got %d", len(dclaModules))) | 
|  | } | 
|  | if len(dclaModules) > 0 { | 
|  | DCLAInfo := ctx.OtherModuleProvider(dclaModules[0], DCLAInfoProvider).(DCLAInfo) | 
|  | return DCLAInfo.ProvidedLibs | 
|  | } | 
|  | return []string{} | 
|  | } | 
|  |  | 
|  | // These functions are interfacing with cc/sanitizer.go. The entire APEX (along with all of its | 
|  | // members) can be sanitized, either forcibly, or by the global configuration. For some of the | 
|  | // sanitizers, extra dependencies can be forcibly added as well. | 
|  |  | 
|  | func (a *apexBundle) EnableSanitizer(sanitizerName string) { | 
|  | if !android.InList(sanitizerName, a.properties.SanitizerNames) { | 
|  | a.properties.SanitizerNames = append(a.properties.SanitizerNames, sanitizerName) | 
|  | } | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) IsSanitizerEnabled(config android.Config, sanitizerName string) bool { | 
|  | if android.InList(sanitizerName, a.properties.SanitizerNames) { | 
|  | return true | 
|  | } | 
|  |  | 
|  | // Then follow the global setting | 
|  | var globalSanitizerNames []string | 
|  | arches := config.SanitizeDeviceArch() | 
|  | if len(arches) == 0 || android.InList(a.Arch().ArchType.Name, arches) { | 
|  | globalSanitizerNames = config.SanitizeDevice() | 
|  | } | 
|  | return android.InList(sanitizerName, globalSanitizerNames) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) AddSanitizerDependencies(ctx android.BottomUpMutatorContext, sanitizerName string) { | 
|  | // TODO(jiyong): move this info (the sanitizer name, the lib name, etc.) to cc/sanitize.go | 
|  | // Keep only the mechanism here. | 
|  | if sanitizerName == "hwaddress" && strings.HasPrefix(a.Name(), "com.android.runtime") { | 
|  | imageVariation := a.getImageVariation(ctx) | 
|  | for _, target := range ctx.MultiTargets() { | 
|  | if target.Arch.ArchType.Multilib == "lib64" { | 
|  | addDependenciesForNativeModules(ctx, ApexNativeDependencies{ | 
|  | Native_shared_libs: []string{"libclang_rt.hwasan"}, | 
|  | Tests:              nil, | 
|  | Jni_libs:           nil, | 
|  | Binaries:           nil, | 
|  | }, target, imageVariation) | 
|  | break | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // apexFileFor<Type> functions below create an apexFile struct for a given Soong module. The | 
|  | // returned apexFile saves information about the Soong module that will be used for creating the | 
|  | // build rules. | 
|  | func apexFileForNativeLibrary(ctx android.BaseModuleContext, ccMod *cc.Module, handleSpecialLibs bool) apexFile { | 
|  | // Decide the APEX-local directory by the multilib of the library In the future, we may | 
|  | // query this to the module. | 
|  | // TODO(jiyong): use the new PackagingSpec | 
|  | var dirInApex string | 
|  | switch ccMod.Arch().ArchType.Multilib { | 
|  | case "lib32": | 
|  | dirInApex = "lib" | 
|  | case "lib64": | 
|  | dirInApex = "lib64" | 
|  | } | 
|  | if ccMod.Target().NativeBridge == android.NativeBridgeEnabled { | 
|  | dirInApex = filepath.Join(dirInApex, ccMod.Target().NativeBridgeRelativePath) | 
|  | } | 
|  | if handleSpecialLibs && cc.InstallToBootstrap(ccMod.BaseModuleName(), ctx.Config()) { | 
|  | // Special case for Bionic libs and other libs installed with them. This is to | 
|  | // prevent those libs from being included in the search path | 
|  | // /apex/com.android.runtime/${LIB}. This exclusion is required because those libs | 
|  | // in the Runtime APEX are available via the legacy paths in /system/lib/. By the | 
|  | // init process, the libs in the APEX are bind-mounted to the legacy paths and thus | 
|  | // will be loaded into the default linker namespace (aka "platform" namespace). If | 
|  | // the libs are directly in /apex/com.android.runtime/${LIB} then the same libs will | 
|  | // be loaded again into the runtime linker namespace, which will result in double | 
|  | // loading of them, which isn't supported. | 
|  | dirInApex = filepath.Join(dirInApex, "bionic") | 
|  | } | 
|  | // This needs to go after the runtime APEX handling because otherwise we would get | 
|  | // weird paths like lib64/rel_install_path/bionic rather than | 
|  | // lib64/bionic/rel_install_path. | 
|  | dirInApex = filepath.Join(dirInApex, ccMod.RelativeInstallPath()) | 
|  |  | 
|  | fileToCopy := android.OutputFileForModule(ctx, ccMod, "") | 
|  | androidMkModuleName := ccMod.BaseModuleName() + ccMod.Properties.SubName | 
|  | return newApexFile(ctx, fileToCopy, androidMkModuleName, dirInApex, nativeSharedLib, ccMod) | 
|  | } | 
|  |  | 
|  | func apexFileForExecutable(ctx android.BaseModuleContext, cc *cc.Module) apexFile { | 
|  | dirInApex := "bin" | 
|  | if cc.Target().NativeBridge == android.NativeBridgeEnabled { | 
|  | dirInApex = filepath.Join(dirInApex, cc.Target().NativeBridgeRelativePath) | 
|  | } | 
|  | dirInApex = filepath.Join(dirInApex, cc.RelativeInstallPath()) | 
|  | fileToCopy := android.OutputFileForModule(ctx, cc, "") | 
|  | androidMkModuleName := cc.BaseModuleName() + cc.Properties.SubName | 
|  | af := newApexFile(ctx, fileToCopy, androidMkModuleName, dirInApex, nativeExecutable, cc) | 
|  | af.symlinks = cc.Symlinks() | 
|  | af.dataPaths = cc.DataPaths() | 
|  | return af | 
|  | } | 
|  |  | 
|  | func apexFileForRustExecutable(ctx android.BaseModuleContext, rustm *rust.Module) apexFile { | 
|  | dirInApex := "bin" | 
|  | if rustm.Target().NativeBridge == android.NativeBridgeEnabled { | 
|  | dirInApex = filepath.Join(dirInApex, rustm.Target().NativeBridgeRelativePath) | 
|  | } | 
|  | dirInApex = filepath.Join(dirInApex, rustm.RelativeInstallPath()) | 
|  | fileToCopy := android.OutputFileForModule(ctx, rustm, "") | 
|  | androidMkModuleName := rustm.BaseModuleName() + rustm.Properties.SubName | 
|  | af := newApexFile(ctx, fileToCopy, androidMkModuleName, dirInApex, nativeExecutable, rustm) | 
|  | return af | 
|  | } | 
|  |  | 
|  | func apexFileForRustLibrary(ctx android.BaseModuleContext, rustm *rust.Module) apexFile { | 
|  | // Decide the APEX-local directory by the multilib of the library | 
|  | // In the future, we may query this to the module. | 
|  | var dirInApex string | 
|  | switch rustm.Arch().ArchType.Multilib { | 
|  | case "lib32": | 
|  | dirInApex = "lib" | 
|  | case "lib64": | 
|  | dirInApex = "lib64" | 
|  | } | 
|  | if rustm.Target().NativeBridge == android.NativeBridgeEnabled { | 
|  | dirInApex = filepath.Join(dirInApex, rustm.Target().NativeBridgeRelativePath) | 
|  | } | 
|  | dirInApex = filepath.Join(dirInApex, rustm.RelativeInstallPath()) | 
|  | fileToCopy := android.OutputFileForModule(ctx, rustm, "") | 
|  | androidMkModuleName := rustm.BaseModuleName() + rustm.Properties.SubName | 
|  | return newApexFile(ctx, fileToCopy, androidMkModuleName, dirInApex, nativeSharedLib, rustm) | 
|  | } | 
|  |  | 
|  | func apexFileForShBinary(ctx android.BaseModuleContext, sh *sh.ShBinary) apexFile { | 
|  | dirInApex := filepath.Join("bin", sh.SubDir()) | 
|  | if sh.Target().NativeBridge == android.NativeBridgeEnabled { | 
|  | dirInApex = filepath.Join(dirInApex, sh.Target().NativeBridgeRelativePath) | 
|  | } | 
|  | fileToCopy := sh.OutputFile() | 
|  | af := newApexFile(ctx, fileToCopy, sh.BaseModuleName(), dirInApex, shBinary, sh) | 
|  | af.symlinks = sh.Symlinks() | 
|  | return af | 
|  | } | 
|  |  | 
|  | func apexFileForPrebuiltEtc(ctx android.BaseModuleContext, prebuilt prebuilt_etc.PrebuiltEtcModule, depName string) apexFile { | 
|  | dirInApex := filepath.Join(prebuilt.BaseDir(), prebuilt.SubDir()) | 
|  | fileToCopy := prebuilt.OutputFile() | 
|  | return newApexFile(ctx, fileToCopy, depName, dirInApex, etc, prebuilt) | 
|  | } | 
|  |  | 
|  | func apexFileForCompatConfig(ctx android.BaseModuleContext, config java.PlatformCompatConfigIntf, depName string) apexFile { | 
|  | dirInApex := filepath.Join("etc", config.SubDir()) | 
|  | fileToCopy := config.CompatConfig() | 
|  | return newApexFile(ctx, fileToCopy, depName, dirInApex, etc, config) | 
|  | } | 
|  |  | 
|  | // javaModule is an interface to handle all Java modules (java_library, dex_import, etc) in the same | 
|  | // way. | 
|  | type javaModule interface { | 
|  | android.Module | 
|  | BaseModuleName() string | 
|  | DexJarBuildPath() java.OptionalDexJarPath | 
|  | JacocoReportClassesFile() android.Path | 
|  | LintDepSets() java.LintDepSets | 
|  | Stem() string | 
|  | } | 
|  |  | 
|  | var _ javaModule = (*java.Library)(nil) | 
|  | var _ javaModule = (*java.Import)(nil) | 
|  | var _ javaModule = (*java.SdkLibrary)(nil) | 
|  | var _ javaModule = (*java.DexImport)(nil) | 
|  | var _ javaModule = (*java.SdkLibraryImport)(nil) | 
|  |  | 
|  | // apexFileForJavaModule creates an apexFile for a java module's dex implementation jar. | 
|  | func apexFileForJavaModule(ctx android.BaseModuleContext, module javaModule) apexFile { | 
|  | return apexFileForJavaModuleWithFile(ctx, module, module.DexJarBuildPath().PathOrNil()) | 
|  | } | 
|  |  | 
|  | // apexFileForJavaModuleWithFile creates an apexFile for a java module with the supplied file. | 
|  | func apexFileForJavaModuleWithFile(ctx android.BaseModuleContext, module javaModule, dexImplementationJar android.Path) apexFile { | 
|  | dirInApex := "javalib" | 
|  | af := newApexFile(ctx, dexImplementationJar, module.BaseModuleName(), dirInApex, javaSharedLib, module) | 
|  | af.jacocoReportClassesFile = module.JacocoReportClassesFile() | 
|  | af.lintDepSets = module.LintDepSets() | 
|  | af.customStem = module.Stem() + ".jar" | 
|  | if dexpreopter, ok := module.(java.DexpreopterInterface); ok { | 
|  | for _, install := range dexpreopter.DexpreoptBuiltInstalledForApex() { | 
|  | af.requiredModuleNames = append(af.requiredModuleNames, install.FullModuleName()) | 
|  | } | 
|  | } | 
|  | return af | 
|  | } | 
|  |  | 
|  | func apexFileForJavaModuleProfile(ctx android.BaseModuleContext, module javaModule) *apexFile { | 
|  | if dexpreopter, ok := module.(java.DexpreopterInterface); ok { | 
|  | if profilePathOnHost := dexpreopter.OutputProfilePathOnHost(); profilePathOnHost != nil { | 
|  | dirInApex := "javalib" | 
|  | af := newApexFile(ctx, profilePathOnHost, module.BaseModuleName()+"-profile", dirInApex, etc, nil) | 
|  | af.customStem = module.Stem() + ".jar.prof" | 
|  | return &af | 
|  | } | 
|  | } | 
|  | return nil | 
|  | } | 
|  |  | 
|  | // androidApp is an interface to handle all app modules (android_app, android_app_import, etc.) in | 
|  | // the same way. | 
|  | type androidApp interface { | 
|  | android.Module | 
|  | Privileged() bool | 
|  | InstallApkName() string | 
|  | OutputFile() android.Path | 
|  | JacocoReportClassesFile() android.Path | 
|  | Certificate() java.Certificate | 
|  | BaseModuleName() string | 
|  | LintDepSets() java.LintDepSets | 
|  | PrivAppAllowlist() android.OptionalPath | 
|  | } | 
|  |  | 
|  | var _ androidApp = (*java.AndroidApp)(nil) | 
|  | var _ androidApp = (*java.AndroidAppImport)(nil) | 
|  |  | 
|  | func sanitizedBuildIdForPath(ctx android.BaseModuleContext) string { | 
|  | buildId := ctx.Config().BuildId() | 
|  |  | 
|  | // The build ID is used as a suffix for a filename, so ensure that | 
|  | // the set of characters being used are sanitized. | 
|  | // - any word character: [a-zA-Z0-9_] | 
|  | // - dots: . | 
|  | // - dashes: - | 
|  | validRegex := regexp.MustCompile(`^[\w\.\-\_]+$`) | 
|  | if !validRegex.MatchString(buildId) { | 
|  | ctx.ModuleErrorf("Unable to use build id %s as filename suffix, valid characters are [a-z A-Z 0-9 _ . -].", buildId) | 
|  | } | 
|  | return buildId | 
|  | } | 
|  |  | 
|  | func apexFilesForAndroidApp(ctx android.BaseModuleContext, aapp androidApp) []apexFile { | 
|  | appDir := "app" | 
|  | if aapp.Privileged() { | 
|  | appDir = "priv-app" | 
|  | } | 
|  |  | 
|  | // TODO(b/224589412, b/226559955): Ensure that the subdirname is suffixed | 
|  | // so that PackageManager correctly invalidates the existing installed apk | 
|  | // in favour of the new APK-in-APEX.  See bugs for more information. | 
|  | dirInApex := filepath.Join(appDir, aapp.InstallApkName()+"@"+sanitizedBuildIdForPath(ctx)) | 
|  | fileToCopy := aapp.OutputFile() | 
|  |  | 
|  | af := newApexFile(ctx, fileToCopy, aapp.BaseModuleName(), dirInApex, app, aapp) | 
|  | af.jacocoReportClassesFile = aapp.JacocoReportClassesFile() | 
|  | af.lintDepSets = aapp.LintDepSets() | 
|  | af.certificate = aapp.Certificate() | 
|  |  | 
|  | if app, ok := aapp.(interface { | 
|  | OverriddenManifestPackageName() string | 
|  | }); ok { | 
|  | af.overriddenPackageName = app.OverriddenManifestPackageName() | 
|  | } | 
|  |  | 
|  | apexFiles := []apexFile{} | 
|  |  | 
|  | if allowlist := aapp.PrivAppAllowlist(); allowlist.Valid() { | 
|  | dirInApex := filepath.Join("etc", "permissions") | 
|  | privAppAllowlist := newApexFile(ctx, allowlist.Path(), aapp.BaseModuleName()+"_privapp", dirInApex, etc, aapp) | 
|  | apexFiles = append(apexFiles, privAppAllowlist) | 
|  | } | 
|  |  | 
|  | apexFiles = append(apexFiles, af) | 
|  |  | 
|  | return apexFiles | 
|  | } | 
|  |  | 
|  | func apexFileForRuntimeResourceOverlay(ctx android.BaseModuleContext, rro java.RuntimeResourceOverlayModule) apexFile { | 
|  | rroDir := "overlay" | 
|  | dirInApex := filepath.Join(rroDir, rro.Theme()) | 
|  | fileToCopy := rro.OutputFile() | 
|  | af := newApexFile(ctx, fileToCopy, rro.Name(), dirInApex, app, rro) | 
|  | af.certificate = rro.Certificate() | 
|  |  | 
|  | if a, ok := rro.(interface { | 
|  | OverriddenManifestPackageName() string | 
|  | }); ok { | 
|  | af.overriddenPackageName = a.OverriddenManifestPackageName() | 
|  | } | 
|  | return af | 
|  | } | 
|  |  | 
|  | func apexFileForBpfProgram(ctx android.BaseModuleContext, builtFile android.Path, apex_sub_dir string, bpfProgram bpf.BpfModule) apexFile { | 
|  | dirInApex := filepath.Join("etc", "bpf", apex_sub_dir) | 
|  | return newApexFile(ctx, builtFile, builtFile.Base(), dirInApex, etc, bpfProgram) | 
|  | } | 
|  |  | 
|  | func apexFileForFilesystem(ctx android.BaseModuleContext, buildFile android.Path, fs filesystem.Filesystem) apexFile { | 
|  | dirInApex := filepath.Join("etc", "fs") | 
|  | return newApexFile(ctx, buildFile, buildFile.Base(), dirInApex, etc, fs) | 
|  | } | 
|  |  | 
|  | // WalkPayloadDeps visits dependencies that contributes to the payload of this APEX. For each of the | 
|  | // visited module, the `do` callback is executed. Returning true in the callback continues the visit | 
|  | // to the child modules. Returning false makes the visit to continue in the sibling or the parent | 
|  | // modules. This is used in check* functions below. | 
|  | func (a *apexBundle) WalkPayloadDeps(ctx android.ModuleContext, do android.PayloadDepsCallback) { | 
|  | ctx.WalkDeps(func(child, parent android.Module) bool { | 
|  | am, ok := child.(android.ApexModule) | 
|  | if !ok || !am.CanHaveApexVariants() { | 
|  | return false | 
|  | } | 
|  |  | 
|  | // Filter-out unwanted depedendencies | 
|  | depTag := ctx.OtherModuleDependencyTag(child) | 
|  | if _, ok := depTag.(android.ExcludeFromApexContentsTag); ok { | 
|  | return false | 
|  | } | 
|  | if dt, ok := depTag.(*dependencyTag); ok && !dt.payload { | 
|  | return false | 
|  | } | 
|  |  | 
|  | ai := ctx.OtherModuleProvider(child, android.ApexInfoProvider).(android.ApexInfo) | 
|  | externalDep := !android.InList(ctx.ModuleName(), ai.InApexVariants) | 
|  |  | 
|  | // Visit actually | 
|  | return do(ctx, parent, am, externalDep) | 
|  | }) | 
|  | } | 
|  |  | 
|  | // filesystem type of the apex_payload.img inside the APEX. Currently, ext4 and f2fs are supported. | 
|  | type fsType int | 
|  |  | 
|  | const ( | 
|  | ext4 fsType = iota | 
|  | f2fs | 
|  | erofs | 
|  | ) | 
|  |  | 
|  | func (f fsType) string() string { | 
|  | switch f { | 
|  | case ext4: | 
|  | return ext4FsType | 
|  | case f2fs: | 
|  | return f2fsFsType | 
|  | case erofs: | 
|  | return erofsFsType | 
|  | default: | 
|  | panic(fmt.Errorf("unknown APEX payload type %d", f)) | 
|  | } | 
|  | } | 
|  |  | 
|  | var _ android.MixedBuildBuildable = (*apexBundle)(nil) | 
|  |  | 
|  | func (a *apexBundle) IsMixedBuildSupported(ctx android.BaseModuleContext) bool { | 
|  | return true | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) QueueBazelCall(ctx android.BaseModuleContext) { | 
|  | bazelCtx := ctx.Config().BazelContext | 
|  | bazelCtx.QueueBazelRequest(a.GetBazelLabel(ctx, a), cquery.GetApexInfo, android.GetConfigKey(ctx)) | 
|  | } | 
|  |  | 
|  | // GetBazelLabel returns the bazel label of this apexBundle, or the label of the | 
|  | // override_apex module overriding this apexBundle. An apexBundle can be | 
|  | // overridden by different override_apex modules (e.g. Google or Go variants), | 
|  | // which is handled by the overrides mutators. | 
|  | func (a *apexBundle) GetBazelLabel(ctx android.BazelConversionPathContext, module blueprint.Module) string { | 
|  | return a.BazelModuleBase.GetBazelLabel(ctx, a) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) ProcessBazelQueryResponse(ctx android.ModuleContext) { | 
|  | if !a.commonBuildActions(ctx) { | 
|  | return | 
|  | } | 
|  |  | 
|  | a.setPayloadFsType(ctx) | 
|  | a.setSystemLibLink(ctx) | 
|  | a.compatSymlinks = makeCompatSymlinks(a.BaseModuleName(), ctx) | 
|  |  | 
|  | bazelCtx := ctx.Config().BazelContext | 
|  | outputs, err := bazelCtx.GetApexInfo(a.GetBazelLabel(ctx, a), android.GetConfigKey(ctx)) | 
|  | if err != nil { | 
|  | ctx.ModuleErrorf(err.Error()) | 
|  | return | 
|  | } | 
|  | a.installDir = android.PathForModuleInstall(ctx, "apex") | 
|  |  | 
|  | // Set the output file to .apex or .capex depending on the compression configuration. | 
|  | a.setCompression(ctx) | 
|  | if a.isCompressed { | 
|  | a.outputApexFile = android.PathForBazelOutRelative(ctx, ctx.ModuleDir(), outputs.SignedCompressedOutput) | 
|  | } else { | 
|  | a.outputApexFile = android.PathForBazelOutRelative(ctx, ctx.ModuleDir(), outputs.SignedOutput) | 
|  | } | 
|  | a.outputFile = a.outputApexFile | 
|  |  | 
|  | if len(outputs.TidyFiles) > 0 { | 
|  | tidyFiles := android.PathsForBazelOut(ctx, outputs.TidyFiles) | 
|  | a.outputFile = android.AttachValidationActions(ctx, a.outputFile, tidyFiles) | 
|  | } | 
|  |  | 
|  | // TODO(b/257829940): These are used by the apex_keys_text singleton; would probably be a clearer | 
|  | // interface if these were set in a provider rather than the module itself | 
|  | a.publicKeyFile = android.PathForBazelOut(ctx, outputs.BundleKeyInfo[0]) | 
|  | a.privateKeyFile = android.PathForBazelOut(ctx, outputs.BundleKeyInfo[1]) | 
|  | a.containerCertificateFile = android.PathForBazelOut(ctx, outputs.ContainerKeyInfo[0]) | 
|  | a.containerPrivateKeyFile = android.PathForBazelOut(ctx, outputs.ContainerKeyInfo[1]) | 
|  |  | 
|  | // Ensure ApexMkInfo.install_to_system make module names are installed as | 
|  | // part of a bundled build. | 
|  | a.makeModulesToInstall = append(a.makeModulesToInstall, outputs.MakeModulesToInstall...) | 
|  |  | 
|  | a.bundleModuleFile = android.PathForBazelOut(ctx, outputs.BundleFile) | 
|  | a.nativeApisUsedByModuleFile = android.ModuleOutPath(android.PathForBazelOut(ctx, outputs.SymbolsUsedByApex)) | 
|  | a.nativeApisBackedByModuleFile = android.ModuleOutPath(android.PathForBazelOut(ctx, outputs.BackingLibs)) | 
|  | // TODO(b/239084755): Generate the java api using.xml file from Bazel. | 
|  | a.javaApisUsedByModuleFile = android.ModuleOutPath(android.PathForBazelOut(ctx, outputs.JavaSymbolsUsedByApex)) | 
|  | a.installedFilesFile = android.ModuleOutPath(android.PathForBazelOut(ctx, outputs.InstalledFiles)) | 
|  | installSuffix := imageApexSuffix | 
|  | if a.isCompressed { | 
|  | installSuffix = imageCapexSuffix | 
|  | } | 
|  | a.installedFile = ctx.InstallFile(a.installDir, a.Name()+installSuffix, a.outputFile, | 
|  | a.compatSymlinks.Paths()...) | 
|  |  | 
|  | // filesInfo in mixed mode must retrieve all information about the apex's | 
|  | // contents completely from the Starlark providers. It should never rely on | 
|  | // Android.bp information, as they might not exist for fully migrated | 
|  | // dependencies. | 
|  | // | 
|  | // Prevent accidental writes to filesInfo in the earlier parts Soong by | 
|  | // asserting it to be nil. | 
|  | if a.filesInfo != nil { | 
|  | panic( | 
|  | fmt.Errorf("internal error: filesInfo must be nil for an apex handled by Bazel. " + | 
|  | "Did something else set filesInfo before this line of code?")) | 
|  | } | 
|  | for _, f := range outputs.PayloadFilesInfo { | 
|  | fileInfo := apexFile{ | 
|  | isBazelPrebuilt: true, | 
|  |  | 
|  | builtFile:           android.PathForBazelOut(ctx, f["built_file"]), | 
|  | unstrippedBuiltFile: android.PathForBazelOut(ctx, f["unstripped_built_file"]), | 
|  | androidMkModuleName: f["make_module_name"], | 
|  | installDir:          f["install_dir"], | 
|  | class:               classes[f["class"]], | 
|  | customStem:          f["basename"], | 
|  | moduleDir:           f["package"], | 
|  | } | 
|  |  | 
|  | arch := f["arch"] | 
|  | fileInfo.arch = arch | 
|  | if len(arch) > 0 { | 
|  | fileInfo.multilib = "lib32" | 
|  | if strings.HasSuffix(arch, "64") { | 
|  | fileInfo.multilib = "lib64" | 
|  | } | 
|  | } | 
|  |  | 
|  | a.filesInfo = append(a.filesInfo, fileInfo) | 
|  | } | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) setCompression(ctx android.ModuleContext) { | 
|  | if a.testOnlyShouldForceCompression() { | 
|  | a.isCompressed = true | 
|  | } else { | 
|  | a.isCompressed = ctx.Config().ApexCompressionEnabled() && a.isCompressable() | 
|  | } | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) setSystemLibLink(ctx android.ModuleContext) { | 
|  | // Optimization. If we are building bundled APEX, for the files that are gathered due to the | 
|  | // transitive dependencies, don't place them inside the APEX, but place a symlink pointing | 
|  | // the same library in the system partition, thus effectively sharing the same libraries | 
|  | // across the APEX boundary. For unbundled APEX, all the gathered files are actually placed | 
|  | // in the APEX. | 
|  | a.linkToSystemLib = !ctx.Config().UnbundledBuild() && a.installable() | 
|  |  | 
|  | // APEXes targeting other than system/system_ext partitions use vendor/product variants. | 
|  | // So we can't link them to /system/lib libs which are core variants. | 
|  | if a.SocSpecific() || a.DeviceSpecific() || (a.ProductSpecific() && ctx.Config().EnforceProductPartitionInterface()) { | 
|  | a.linkToSystemLib = false | 
|  | } | 
|  |  | 
|  | forced := ctx.Config().ForceApexSymlinkOptimization() | 
|  | updatable := a.Updatable() || a.FutureUpdatable() | 
|  |  | 
|  | // We don't need the optimization for updatable APEXes, as it might give false signal | 
|  | // to the system health when the APEXes are still bundled (b/149805758). | 
|  | if !forced && updatable { | 
|  | a.linkToSystemLib = false | 
|  | } | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) setPayloadFsType(ctx android.ModuleContext) { | 
|  | switch proptools.StringDefault(a.properties.Payload_fs_type, ext4FsType) { | 
|  | case ext4FsType: | 
|  | a.payloadFsType = ext4 | 
|  | case f2fsFsType: | 
|  | a.payloadFsType = f2fs | 
|  | case erofsFsType: | 
|  | a.payloadFsType = erofs | 
|  | default: | 
|  | ctx.PropertyErrorf("payload_fs_type", "%q is not a valid filesystem for apex [ext4, f2fs, erofs]", *a.properties.Payload_fs_type) | 
|  | } | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) isCompressable() bool { | 
|  | return proptools.BoolDefault(a.overridableProperties.Compressible, false) && !a.testApex | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) commonBuildActions(ctx android.ModuleContext) bool { | 
|  | a.checkApexAvailability(ctx) | 
|  | a.checkUpdatable(ctx) | 
|  | a.CheckMinSdkVersion(ctx) | 
|  | a.checkStaticLinkingToStubLibraries(ctx) | 
|  | a.checkStaticExecutables(ctx) | 
|  | if len(a.properties.Tests) > 0 && !a.testApex { | 
|  | ctx.PropertyErrorf("tests", "property allowed only in apex_test module type") | 
|  | return false | 
|  | } | 
|  | return true | 
|  | } | 
|  |  | 
|  | type visitorContext struct { | 
|  | // all the files that will be included in this APEX | 
|  | filesInfo []apexFile | 
|  |  | 
|  | // native lib dependencies | 
|  | provideNativeLibs []string | 
|  | requireNativeLibs []string | 
|  |  | 
|  | handleSpecialLibs bool | 
|  |  | 
|  | // if true, raise error on duplicate apexFile | 
|  | checkDuplicate bool | 
|  | } | 
|  |  | 
|  | func (vctx *visitorContext) normalizeFileInfo(mctx android.ModuleContext) { | 
|  | encountered := make(map[string]apexFile) | 
|  | for _, f := range vctx.filesInfo { | 
|  | dest := filepath.Join(f.installDir, f.builtFile.Base()) | 
|  | if e, ok := encountered[dest]; !ok { | 
|  | encountered[dest] = f | 
|  | } else { | 
|  | if vctx.checkDuplicate && f.builtFile.String() != e.builtFile.String() { | 
|  | mctx.ModuleErrorf("apex file %v is provided by two different files %v and %v", | 
|  | dest, e.builtFile, f.builtFile) | 
|  | return | 
|  | } | 
|  | // If a module is directly included and also transitively depended on | 
|  | // consider it as directly included. | 
|  | e.transitiveDep = e.transitiveDep && f.transitiveDep | 
|  | encountered[dest] = e | 
|  | } | 
|  | } | 
|  | vctx.filesInfo = vctx.filesInfo[:0] | 
|  | for _, v := range encountered { | 
|  | vctx.filesInfo = append(vctx.filesInfo, v) | 
|  | } | 
|  | sort.Slice(vctx.filesInfo, func(i, j int) bool { | 
|  | // Sort by destination path so as to ensure consistent ordering even if the source of the files | 
|  | // changes. | 
|  | return vctx.filesInfo[i].path() < vctx.filesInfo[j].path() | 
|  | }) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) depVisitor(vctx *visitorContext, ctx android.ModuleContext, child, parent blueprint.Module) bool { | 
|  | depTag := ctx.OtherModuleDependencyTag(child) | 
|  | if _, ok := depTag.(android.ExcludeFromApexContentsTag); ok { | 
|  | return false | 
|  | } | 
|  | if mod, ok := child.(android.Module); ok && !mod.Enabled() { | 
|  | return false | 
|  | } | 
|  | depName := ctx.OtherModuleName(child) | 
|  | if _, isDirectDep := parent.(*apexBundle); isDirectDep { | 
|  | switch depTag { | 
|  | case sharedLibTag, jniLibTag: | 
|  | isJniLib := depTag == jniLibTag | 
|  | switch ch := child.(type) { | 
|  | case *cc.Module: | 
|  | fi := apexFileForNativeLibrary(ctx, ch, vctx.handleSpecialLibs) | 
|  | fi.isJniLib = isJniLib | 
|  | vctx.filesInfo = append(vctx.filesInfo, fi) | 
|  | // Collect the list of stub-providing libs except: | 
|  | // - VNDK libs are only for vendors | 
|  | // - bootstrap bionic libs are treated as provided by system | 
|  | if ch.HasStubsVariants() && !a.vndkApex && !cc.InstallToBootstrap(ch.BaseModuleName(), ctx.Config()) { | 
|  | vctx.provideNativeLibs = append(vctx.provideNativeLibs, fi.stem()) | 
|  | } | 
|  | return true // track transitive dependencies | 
|  | case *rust.Module: | 
|  | fi := apexFileForRustLibrary(ctx, ch) | 
|  | fi.isJniLib = isJniLib | 
|  | vctx.filesInfo = append(vctx.filesInfo, fi) | 
|  | return true // track transitive dependencies | 
|  | default: | 
|  | propertyName := "native_shared_libs" | 
|  | if isJniLib { | 
|  | propertyName = "jni_libs" | 
|  | } | 
|  | ctx.PropertyErrorf(propertyName, "%q is not a cc_library or cc_library_shared module", depName) | 
|  | } | 
|  | case executableTag: | 
|  | switch ch := child.(type) { | 
|  | case *cc.Module: | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForExecutable(ctx, ch)) | 
|  | return true // track transitive dependencies | 
|  | case *rust.Module: | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForRustExecutable(ctx, ch)) | 
|  | return true // track transitive dependencies | 
|  | default: | 
|  | ctx.PropertyErrorf("binaries", | 
|  | "%q is neither cc_binary, rust_binary, (embedded) py_binary, (host) blueprint_go_binary, nor (host) bootstrap_go_binary", depName) | 
|  | } | 
|  | case shBinaryTag: | 
|  | if csh, ok := child.(*sh.ShBinary); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForShBinary(ctx, csh)) | 
|  | } else { | 
|  | ctx.PropertyErrorf("sh_binaries", "%q is not a sh_binary module", depName) | 
|  | } | 
|  | case bcpfTag: | 
|  | _, ok := child.(*java.BootclasspathFragmentModule) | 
|  | if !ok { | 
|  | ctx.PropertyErrorf("bootclasspath_fragments", "%q is not a bootclasspath_fragment module", depName) | 
|  | return false | 
|  | } | 
|  |  | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexBootclasspathFragmentFiles(ctx, child)...) | 
|  | return true | 
|  | case sscpfTag: | 
|  | if _, ok := child.(*java.SystemServerClasspathModule); !ok { | 
|  | ctx.PropertyErrorf("systemserverclasspath_fragments", | 
|  | "%q is not a systemserverclasspath_fragment module", depName) | 
|  | return false | 
|  | } | 
|  | if af := apexClasspathFragmentProtoFile(ctx, child); af != nil { | 
|  | vctx.filesInfo = append(vctx.filesInfo, *af) | 
|  | } | 
|  | return true | 
|  | case javaLibTag: | 
|  | switch child.(type) { | 
|  | case *java.Library, *java.SdkLibrary, *java.DexImport, *java.SdkLibraryImport, *java.Import: | 
|  | af := apexFileForJavaModule(ctx, child.(javaModule)) | 
|  | if !af.ok() { | 
|  | ctx.PropertyErrorf("java_libs", "%q is not configured to be compiled into dex", depName) | 
|  | return false | 
|  | } | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | default: | 
|  | ctx.PropertyErrorf("java_libs", "%q of type %q is not supported", depName, ctx.OtherModuleType(child)) | 
|  | } | 
|  | case androidAppTag: | 
|  | switch ap := child.(type) { | 
|  | case *java.AndroidApp: | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFilesForAndroidApp(ctx, ap)...) | 
|  | return true // track transitive dependencies | 
|  | case *java.AndroidAppImport: | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFilesForAndroidApp(ctx, ap)...) | 
|  | case *java.AndroidTestHelperApp: | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFilesForAndroidApp(ctx, ap)...) | 
|  | case *java.AndroidAppSet: | 
|  | appDir := "app" | 
|  | if ap.Privileged() { | 
|  | appDir = "priv-app" | 
|  | } | 
|  | // TODO(b/224589412, b/226559955): Ensure that the dirname is | 
|  | // suffixed so that PackageManager correctly invalidates the | 
|  | // existing installed apk in favour of the new APK-in-APEX. | 
|  | // See bugs for more information. | 
|  | appDirName := filepath.Join(appDir, ap.BaseModuleName()+"@"+sanitizedBuildIdForPath(ctx)) | 
|  | af := newApexFile(ctx, ap.OutputFile(), ap.BaseModuleName(), appDirName, appSet, ap) | 
|  | af.certificate = java.PresignedCertificate | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | default: | 
|  | ctx.PropertyErrorf("apps", "%q is not an android_app module", depName) | 
|  | } | 
|  | case rroTag: | 
|  | if rro, ok := child.(java.RuntimeResourceOverlayModule); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForRuntimeResourceOverlay(ctx, rro)) | 
|  | } else { | 
|  | ctx.PropertyErrorf("rros", "%q is not an runtime_resource_overlay module", depName) | 
|  | } | 
|  | case bpfTag: | 
|  | if bpfProgram, ok := child.(bpf.BpfModule); ok { | 
|  | filesToCopy, _ := bpfProgram.OutputFiles("") | 
|  | apex_sub_dir := bpfProgram.SubDir() | 
|  | for _, bpfFile := range filesToCopy { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForBpfProgram(ctx, bpfFile, apex_sub_dir, bpfProgram)) | 
|  | } | 
|  | } else { | 
|  | ctx.PropertyErrorf("bpfs", "%q is not a bpf module", depName) | 
|  | } | 
|  | case fsTag: | 
|  | if fs, ok := child.(filesystem.Filesystem); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForFilesystem(ctx, fs.OutputPath(), fs)) | 
|  | } else { | 
|  | ctx.PropertyErrorf("filesystems", "%q is not a filesystem module", depName) | 
|  | } | 
|  | case prebuiltTag: | 
|  | if prebuilt, ok := child.(prebuilt_etc.PrebuiltEtcModule); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForPrebuiltEtc(ctx, prebuilt, depName)) | 
|  | } else { | 
|  | ctx.PropertyErrorf("prebuilts", "%q is not a prebuilt_etc module", depName) | 
|  | } | 
|  | case compatConfigTag: | 
|  | if compatConfig, ok := child.(java.PlatformCompatConfigIntf); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForCompatConfig(ctx, compatConfig, depName)) | 
|  | } else { | 
|  | ctx.PropertyErrorf("compat_configs", "%q is not a platform_compat_config module", depName) | 
|  | } | 
|  | case testTag: | 
|  | if ccTest, ok := child.(*cc.Module); ok { | 
|  | if ccTest.IsTestPerSrcAllTestsVariation() { | 
|  | // Multiple-output test module (where `test_per_src: true`). | 
|  | // | 
|  | // `ccTest` is the "" ("all tests") variation of a `test_per_src` module. | 
|  | // We do not add this variation to `filesInfo`, as it has no output; | 
|  | // however, we do add the other variations of this module as indirect | 
|  | // dependencies (see below). | 
|  | } else { | 
|  | // Single-output test module (where `test_per_src: false`). | 
|  | af := apexFileForExecutable(ctx, ccTest) | 
|  | af.class = nativeTest | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | } | 
|  | return true // track transitive dependencies | 
|  | } else { | 
|  | ctx.PropertyErrorf("tests", "%q is not a cc module", depName) | 
|  | } | 
|  | case keyTag: | 
|  | if key, ok := child.(*apexKey); ok { | 
|  | a.privateKeyFile = key.privateKeyFile | 
|  | a.publicKeyFile = key.publicKeyFile | 
|  | } else { | 
|  | ctx.PropertyErrorf("key", "%q is not an apex_key module", depName) | 
|  | } | 
|  | case certificateTag: | 
|  | if dep, ok := child.(*java.AndroidAppCertificate); ok { | 
|  | a.containerCertificateFile = dep.Certificate.Pem | 
|  | a.containerPrivateKeyFile = dep.Certificate.Key | 
|  | } else { | 
|  | ctx.ModuleErrorf("certificate dependency %q must be an android_app_certificate module", depName) | 
|  | } | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | if a.vndkApex { | 
|  | return false | 
|  | } | 
|  |  | 
|  | // indirect dependencies | 
|  | am, ok := child.(android.ApexModule) | 
|  | if !ok { | 
|  | return false | 
|  | } | 
|  | // We cannot use a switch statement on `depTag` here as the checked | 
|  | // tags used below are private (e.g. `cc.sharedDepTag`). | 
|  | if cc.IsSharedDepTag(depTag) || cc.IsRuntimeDepTag(depTag) { | 
|  | if ch, ok := child.(*cc.Module); ok { | 
|  | if ch.UseVndk() && a.useVndkAsStable(ctx) && ch.IsVndk() { | 
|  | vctx.requireNativeLibs = append(vctx.requireNativeLibs, ":vndk") | 
|  | return false | 
|  | } | 
|  | af := apexFileForNativeLibrary(ctx, ch, vctx.handleSpecialLibs) | 
|  | af.transitiveDep = true | 
|  |  | 
|  | abInfo := ctx.Provider(ApexBundleInfoProvider).(ApexBundleInfo) | 
|  | if !abInfo.Contents.DirectlyInApex(depName) && (ch.IsStubs() || ch.HasStubsVariants()) { | 
|  | // If the dependency is a stubs lib, don't include it in this APEX, | 
|  | // but make sure that the lib is installed on the device. | 
|  | // In case no APEX is having the lib, the lib is installed to the system | 
|  | // partition. | 
|  | // | 
|  | // Always include if we are a host-apex however since those won't have any | 
|  | // system libraries. | 
|  | // | 
|  | // Skip the dependency in unbundled builds where the device image is not | 
|  | // being built. | 
|  | if ch.IsStubsImplementationRequired() && !am.DirectlyInAnyApex() && !ctx.Config().UnbundledBuild() { | 
|  | // we need a module name for Make | 
|  | name := ch.ImplementationModuleNameForMake(ctx) + ch.Properties.SubName | 
|  | if !android.InList(name, a.makeModulesToInstall) { | 
|  | a.makeModulesToInstall = append(a.makeModulesToInstall, name) | 
|  | } | 
|  | } | 
|  | vctx.requireNativeLibs = append(vctx.requireNativeLibs, af.stem()) | 
|  | // Don't track further | 
|  | return false | 
|  | } | 
|  |  | 
|  | // If the dep is not considered to be in the same | 
|  | // apex, don't add it to filesInfo so that it is not | 
|  | // included in this APEX. | 
|  | // TODO(jiyong): move this to at the top of the | 
|  | // else-if clause for the indirect dependencies. | 
|  | // Currently, that's impossible because we would | 
|  | // like to record requiredNativeLibs even when | 
|  | // DepIsInSameAPex is false. We also shouldn't do | 
|  | // this for host. | 
|  | // | 
|  | // TODO(jiyong): explain why the same module is passed in twice. | 
|  | // Switching the first am to parent breaks lots of tests. | 
|  | if !android.IsDepInSameApex(ctx, am, am) { | 
|  | return false | 
|  | } | 
|  |  | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | } else if rm, ok := child.(*rust.Module); ok { | 
|  | af := apexFileForRustLibrary(ctx, rm) | 
|  | af.transitiveDep = true | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | } | 
|  | } else if cc.IsTestPerSrcDepTag(depTag) { | 
|  | if ch, ok := child.(*cc.Module); ok { | 
|  | af := apexFileForExecutable(ctx, ch) | 
|  | // Handle modules created as `test_per_src` variations of a single test module: | 
|  | // use the name of the generated test binary (`fileToCopy`) instead of the name | 
|  | // of the original test module (`depName`, shared by all `test_per_src` | 
|  | // variations of that module). | 
|  | af.androidMkModuleName = filepath.Base(af.builtFile.String()) | 
|  | // these are not considered transitive dep | 
|  | af.transitiveDep = false | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | } | 
|  | } else if cc.IsHeaderDepTag(depTag) { | 
|  | // nothing | 
|  | } else if java.IsJniDepTag(depTag) { | 
|  | // Because APK-in-APEX embeds jni_libs transitively, we don't need to track transitive deps | 
|  | } else if java.IsXmlPermissionsFileDepTag(depTag) { | 
|  | if prebuilt, ok := child.(prebuilt_etc.PrebuiltEtcModule); ok { | 
|  | vctx.filesInfo = append(vctx.filesInfo, apexFileForPrebuiltEtc(ctx, prebuilt, depName)) | 
|  | } | 
|  | } else if rust.IsDylibDepTag(depTag) { | 
|  | if rustm, ok := child.(*rust.Module); ok && rustm.IsInstallableToApex() { | 
|  | af := apexFileForRustLibrary(ctx, rustm) | 
|  | af.transitiveDep = true | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | } | 
|  | } else if rust.IsRlibDepTag(depTag) { | 
|  | // Rlib is statically linked, but it might have shared lib | 
|  | // dependencies. Track them. | 
|  | return true | 
|  | } else if java.IsBootclasspathFragmentContentDepTag(depTag) { | 
|  | // Add the contents of the bootclasspath fragment to the apex. | 
|  | switch child.(type) { | 
|  | case *java.Library, *java.SdkLibrary: | 
|  | javaModule := child.(javaModule) | 
|  | af := apexFileForBootclasspathFragmentContentModule(ctx, parent, javaModule) | 
|  | if !af.ok() { | 
|  | ctx.PropertyErrorf("bootclasspath_fragments", | 
|  | "bootclasspath_fragment content %q is not configured to be compiled into dex", depName) | 
|  | return false | 
|  | } | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | return true // track transitive dependencies | 
|  | default: | 
|  | ctx.PropertyErrorf("bootclasspath_fragments", | 
|  | "bootclasspath_fragment content %q of type %q is not supported", depName, ctx.OtherModuleType(child)) | 
|  | } | 
|  | } else if java.IsSystemServerClasspathFragmentContentDepTag(depTag) { | 
|  | // Add the contents of the systemserverclasspath fragment to the apex. | 
|  | switch child.(type) { | 
|  | case *java.Library, *java.SdkLibrary: | 
|  | af := apexFileForJavaModule(ctx, child.(javaModule)) | 
|  | vctx.filesInfo = append(vctx.filesInfo, af) | 
|  | if profileAf := apexFileForJavaModuleProfile(ctx, child.(javaModule)); profileAf != nil { | 
|  | vctx.filesInfo = append(vctx.filesInfo, *profileAf) | 
|  | } | 
|  | return true // track transitive dependencies | 
|  | default: | 
|  | ctx.PropertyErrorf("systemserverclasspath_fragments", | 
|  | "systemserverclasspath_fragment content %q of type %q is not supported", depName, ctx.OtherModuleType(child)) | 
|  | } | 
|  | } else if _, ok := depTag.(android.CopyDirectlyInAnyApexTag); ok { | 
|  | // nothing | 
|  | } else if depTag == android.DarwinUniversalVariantTag { | 
|  | // nothing | 
|  | } else if am.CanHaveApexVariants() && am.IsInstallableToApex() { | 
|  | ctx.ModuleErrorf("unexpected tag %s for indirect dependency %q", android.PrettyPrintTag(depTag), depName) | 
|  | } | 
|  | return false | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) shouldCheckDuplicate(ctx android.ModuleContext) bool { | 
|  | // TODO(b/263308293) remove this | 
|  | if a.properties.IsCoverageVariant { | 
|  | return false | 
|  | } | 
|  | // TODO(b/263308515) remove this | 
|  | if a.testApex { | 
|  | return false | 
|  | } | 
|  | if ctx.DeviceConfig().DeviceArch() == "" { | 
|  | return false | 
|  | } | 
|  | return true | 
|  | } | 
|  |  | 
|  | // Creates build rules for an APEX. It consists of the following major steps: | 
|  | // | 
|  | // 1) do some validity checks such as apex_available, min_sdk_version, etc. | 
|  | // 2) traverse the dependency tree to collect apexFile structs from them. | 
|  | // 3) some fields in apexBundle struct are configured | 
|  | // 4) generate the build rules to create the APEX. This is mostly done in builder.go. | 
|  | func (a *apexBundle) GenerateAndroidBuildActions(ctx android.ModuleContext) { | 
|  | //////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // 1) do some validity checks such as apex_available, min_sdk_version, etc. | 
|  | if !a.commonBuildActions(ctx) { | 
|  | return | 
|  | } | 
|  | //////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // 2) traverse the dependency tree to collect apexFile structs from them. | 
|  | // Collect the module directory for IDE info in java/jdeps.go. | 
|  | a.modulePaths = append(a.modulePaths, ctx.ModuleDir()) | 
|  |  | 
|  | // TODO(jiyong): do this using WalkPayloadDeps | 
|  | // TODO(jiyong): make this clean!!! | 
|  | vctx := visitorContext{ | 
|  | handleSpecialLibs: !android.Bool(a.properties.Ignore_system_library_special_case), | 
|  | checkDuplicate:    a.shouldCheckDuplicate(ctx), | 
|  | } | 
|  | ctx.WalkDepsBlueprint(func(child, parent blueprint.Module) bool { return a.depVisitor(&vctx, ctx, child, parent) }) | 
|  | vctx.normalizeFileInfo(ctx) | 
|  | if a.privateKeyFile == nil { | 
|  | if ctx.Config().AllowMissingDependencies() { | 
|  | // TODO(b/266099037): a better approach for slim manifests. | 
|  | ctx.AddMissingDependencies([]string{String(a.overridableProperties.Key)}) | 
|  | // Create placeholder paths for later stages that expect to see those paths, | 
|  | // though they won't be used. | 
|  | var unusedPath = android.PathForModuleOut(ctx, "nonexistentprivatekey") | 
|  | ctx.Build(pctx, android.BuildParams{ | 
|  | Rule:   android.ErrorRule, | 
|  | Output: unusedPath, | 
|  | Args: map[string]string{ | 
|  | "error": "Private key not available", | 
|  | }, | 
|  | }) | 
|  | a.privateKeyFile = unusedPath | 
|  | } else { | 
|  | ctx.PropertyErrorf("key", "private_key for %q could not be found", String(a.overridableProperties.Key)) | 
|  | return | 
|  | } | 
|  | } | 
|  |  | 
|  | if a.publicKeyFile == nil { | 
|  | if ctx.Config().AllowMissingDependencies() { | 
|  | // TODO(b/266099037): a better approach for slim manifests. | 
|  | ctx.AddMissingDependencies([]string{String(a.overridableProperties.Key)}) | 
|  | // Create placeholder paths for later stages that expect to see those paths, | 
|  | // though they won't be used. | 
|  | var unusedPath = android.PathForModuleOut(ctx, "nonexistentpublickey") | 
|  | ctx.Build(pctx, android.BuildParams{ | 
|  | Rule:   android.ErrorRule, | 
|  | Output: unusedPath, | 
|  | Args: map[string]string{ | 
|  | "error": "Public key not available", | 
|  | }, | 
|  | }) | 
|  | a.publicKeyFile = unusedPath | 
|  | } else { | 
|  | ctx.PropertyErrorf("key", "public_key for %q could not be found", String(a.overridableProperties.Key)) | 
|  | return | 
|  | } | 
|  | } | 
|  |  | 
|  | //////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // 3) some fields in apexBundle struct are configured | 
|  | a.installDir = android.PathForModuleInstall(ctx, "apex") | 
|  | a.filesInfo = vctx.filesInfo | 
|  |  | 
|  | a.setPayloadFsType(ctx) | 
|  | a.setSystemLibLink(ctx) | 
|  | a.compatSymlinks = makeCompatSymlinks(a.BaseModuleName(), ctx) | 
|  |  | 
|  | //////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // 4) generate the build rules to create the APEX. This is done in builder.go. | 
|  | a.buildManifest(ctx, vctx.provideNativeLibs, vctx.requireNativeLibs) | 
|  | a.buildApex(ctx) | 
|  | a.buildApexDependencyInfo(ctx) | 
|  | a.buildLintReports(ctx) | 
|  | } | 
|  |  | 
|  | // apexBootclasspathFragmentFiles returns the list of apexFile structures defining the files that | 
|  | // the bootclasspath_fragment contributes to the apex. | 
|  | func apexBootclasspathFragmentFiles(ctx android.ModuleContext, module blueprint.Module) []apexFile { | 
|  | bootclasspathFragmentInfo := ctx.OtherModuleProvider(module, java.BootclasspathFragmentApexContentInfoProvider).(java.BootclasspathFragmentApexContentInfo) | 
|  | var filesToAdd []apexFile | 
|  |  | 
|  | // Add classpaths.proto config. | 
|  | if af := apexClasspathFragmentProtoFile(ctx, module); af != nil { | 
|  | filesToAdd = append(filesToAdd, *af) | 
|  | } | 
|  |  | 
|  | pathInApex := bootclasspathFragmentInfo.ProfileInstallPathInApex() | 
|  | if pathInApex != "" { | 
|  | pathOnHost := bootclasspathFragmentInfo.ProfilePathOnHost() | 
|  | tempPath := android.PathForModuleOut(ctx, "boot_image_profile", pathInApex) | 
|  |  | 
|  | if pathOnHost != nil { | 
|  | // We need to copy the profile to a temporary path with the right filename because the apexer | 
|  | // will take the filename as is. | 
|  | ctx.Build(pctx, android.BuildParams{ | 
|  | Rule:   android.Cp, | 
|  | Input:  pathOnHost, | 
|  | Output: tempPath, | 
|  | }) | 
|  | } else { | 
|  | // At this point, the boot image profile cannot be generated. It is probably because the boot | 
|  | // image profile source file does not exist on the branch, or it is not available for the | 
|  | // current build target. | 
|  | // However, we cannot enforce the boot image profile to be generated because some build | 
|  | // targets (such as module SDK) do not need it. It is only needed when the APEX is being | 
|  | // built. Therefore, we create an error rule so that an error will occur at the ninja phase | 
|  | // only if the APEX is being built. | 
|  | ctx.Build(pctx, android.BuildParams{ | 
|  | Rule:   android.ErrorRule, | 
|  | Output: tempPath, | 
|  | Args: map[string]string{ | 
|  | "error": "Boot image profile cannot be generated", | 
|  | }, | 
|  | }) | 
|  | } | 
|  |  | 
|  | androidMkModuleName := filepath.Base(pathInApex) | 
|  | af := newApexFile(ctx, tempPath, androidMkModuleName, filepath.Dir(pathInApex), etc, nil) | 
|  | filesToAdd = append(filesToAdd, af) | 
|  | } | 
|  |  | 
|  | return filesToAdd | 
|  | } | 
|  |  | 
|  | // apexClasspathFragmentProtoFile returns *apexFile structure defining the classpath.proto config that | 
|  | // the module contributes to the apex; or nil if the proto config was not generated. | 
|  | func apexClasspathFragmentProtoFile(ctx android.ModuleContext, module blueprint.Module) *apexFile { | 
|  | info := ctx.OtherModuleProvider(module, java.ClasspathFragmentProtoContentInfoProvider).(java.ClasspathFragmentProtoContentInfo) | 
|  | if !info.ClasspathFragmentProtoGenerated { | 
|  | return nil | 
|  | } | 
|  | classpathProtoOutput := info.ClasspathFragmentProtoOutput | 
|  | af := newApexFile(ctx, classpathProtoOutput, classpathProtoOutput.Base(), info.ClasspathFragmentProtoInstallDir.Rel(), etc, nil) | 
|  | return &af | 
|  | } | 
|  |  | 
|  | // apexFileForBootclasspathFragmentContentModule creates an apexFile for a bootclasspath_fragment | 
|  | // content module, i.e. a library that is part of the bootclasspath. | 
|  | func apexFileForBootclasspathFragmentContentModule(ctx android.ModuleContext, fragmentModule blueprint.Module, javaModule javaModule) apexFile { | 
|  | bootclasspathFragmentInfo := ctx.OtherModuleProvider(fragmentModule, java.BootclasspathFragmentApexContentInfoProvider).(java.BootclasspathFragmentApexContentInfo) | 
|  |  | 
|  | // Get the dexBootJar from the bootclasspath_fragment as that is responsible for performing the | 
|  | // hidden API encpding. | 
|  | dexBootJar, err := bootclasspathFragmentInfo.DexBootJarPathForContentModule(javaModule) | 
|  | if err != nil { | 
|  | ctx.ModuleErrorf("%s", err) | 
|  | } | 
|  |  | 
|  | // Create an apexFile as for a normal java module but with the dex boot jar provided by the | 
|  | // bootclasspath_fragment. | 
|  | af := apexFileForJavaModuleWithFile(ctx, javaModule, dexBootJar) | 
|  | return af | 
|  | } | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // Factory functions | 
|  | // | 
|  |  | 
|  | func newApexBundle() *apexBundle { | 
|  | module := &apexBundle{} | 
|  |  | 
|  | module.AddProperties(&module.properties) | 
|  | module.AddProperties(&module.targetProperties) | 
|  | module.AddProperties(&module.archProperties) | 
|  | module.AddProperties(&module.overridableProperties) | 
|  |  | 
|  | android.InitAndroidMultiTargetsArchModule(module, android.DeviceSupported, android.MultilibCommon) | 
|  | android.InitDefaultableModule(module) | 
|  | android.InitOverridableModule(module, &module.overridableProperties.Overrides) | 
|  | android.InitBazelModule(module) | 
|  | multitree.InitExportableModule(module) | 
|  | return module | 
|  | } | 
|  |  | 
|  | func ApexBundleFactory(testApex bool) android.Module { | 
|  | bundle := newApexBundle() | 
|  | bundle.testApex = testApex | 
|  | return bundle | 
|  | } | 
|  |  | 
|  | // apex_test is an APEX for testing. The difference from the ordinary apex module type is that | 
|  | // certain compatibility checks such as apex_available are not done for apex_test. | 
|  | func TestApexBundleFactory() android.Module { | 
|  | bundle := newApexBundle() | 
|  | bundle.testApex = true | 
|  | return bundle | 
|  | } | 
|  |  | 
|  | // apex packages other modules into an APEX file which is a packaging format for system-level | 
|  | // components like binaries, shared libraries, etc. | 
|  | func BundleFactory() android.Module { | 
|  | return newApexBundle() | 
|  | } | 
|  |  | 
|  | type Defaults struct { | 
|  | android.ModuleBase | 
|  | android.DefaultsModuleBase | 
|  | } | 
|  |  | 
|  | // apex_defaults provides defaultable properties to other apex modules. | 
|  | func DefaultsFactory() android.Module { | 
|  | module := &Defaults{} | 
|  |  | 
|  | module.AddProperties( | 
|  | &apexBundleProperties{}, | 
|  | &apexTargetBundleProperties{}, | 
|  | &apexArchBundleProperties{}, | 
|  | &overridableProperties{}, | 
|  | ) | 
|  |  | 
|  | android.InitDefaultsModule(module) | 
|  | return module | 
|  | } | 
|  |  | 
|  | type OverrideApex struct { | 
|  | android.ModuleBase | 
|  | android.OverrideModuleBase | 
|  | android.BazelModuleBase | 
|  | } | 
|  |  | 
|  | func (o *OverrideApex) GenerateAndroidBuildActions(_ android.ModuleContext) { | 
|  | // All the overrides happen in the base module. | 
|  | } | 
|  |  | 
|  | // override_apex is used to create an apex module based on another apex module by overriding some of | 
|  | // its properties. | 
|  | func OverrideApexFactory() android.Module { | 
|  | m := &OverrideApex{} | 
|  |  | 
|  | m.AddProperties(&overridableProperties{}) | 
|  |  | 
|  | android.InitAndroidMultiTargetsArchModule(m, android.DeviceSupported, android.MultilibCommon) | 
|  | android.InitOverrideModule(m) | 
|  | android.InitBazelModule(m) | 
|  | return m | 
|  | } | 
|  |  | 
|  | func (o *OverrideApex) ConvertWithBp2build(ctx android.TopDownMutatorContext) { | 
|  | if ctx.ModuleType() != "override_apex" { | 
|  | return | 
|  | } | 
|  |  | 
|  | baseApexModuleName := o.OverrideModuleBase.GetOverriddenModuleName() | 
|  | baseModule, baseApexExists := ctx.ModuleFromName(baseApexModuleName) | 
|  | if !baseApexExists { | 
|  | panic(fmt.Errorf("Base apex module doesn't exist: %s", baseApexModuleName)) | 
|  | } | 
|  |  | 
|  | a, baseModuleIsApex := baseModule.(*apexBundle) | 
|  | if !baseModuleIsApex { | 
|  | panic(fmt.Errorf("Base module is not apex module: %s", baseApexModuleName)) | 
|  | } | 
|  | attrs, props, commonAttrs := convertWithBp2build(a, ctx) | 
|  |  | 
|  | // We just want the name, not module reference. | 
|  | baseApexName := strings.TrimPrefix(baseApexModuleName, ":") | 
|  | attrs.Base_apex_name = &baseApexName | 
|  |  | 
|  | for _, p := range o.GetProperties() { | 
|  | overridableProperties, ok := p.(*overridableProperties) | 
|  | if !ok { | 
|  | continue | 
|  | } | 
|  |  | 
|  | // Manifest is either empty or a file in the directory of base APEX and is not overridable. | 
|  | // After it is converted in convertWithBp2build(baseApex, ctx), | 
|  | // the attrs.Manifest.Value.Label is the file path relative to the directory | 
|  | // of base apex. So the following code converts it to a label that looks like | 
|  | // <package of base apex>:<path of manifest file> if base apex and override | 
|  | // apex are not in the same package. | 
|  | baseApexPackage := ctx.OtherModuleDir(a) | 
|  | overrideApexPackage := ctx.ModuleDir() | 
|  | if baseApexPackage != overrideApexPackage { | 
|  | attrs.Manifest.Value.Label = "//" + baseApexPackage + ":" + attrs.Manifest.Value.Label | 
|  | } | 
|  |  | 
|  | // Key | 
|  | if overridableProperties.Key != nil { | 
|  | attrs.Key = bazel.LabelAttribute{} | 
|  | attrs.Key.SetValue(android.BazelLabelForModuleDepSingle(ctx, *overridableProperties.Key)) | 
|  | } | 
|  |  | 
|  | // Certificate | 
|  | if overridableProperties.Certificate == nil { | 
|  | // If overridableProperties.Certificate is nil, clear this out as | 
|  | // well with zeroed structs, so the override_apex does not use the | 
|  | // base apex's certificate. | 
|  | attrs.Certificate = bazel.LabelAttribute{} | 
|  | attrs.Certificate_name = bazel.StringAttribute{} | 
|  | } else { | 
|  | attrs.Certificate, attrs.Certificate_name = android.BazelStringOrLabelFromProp(ctx, overridableProperties.Certificate) | 
|  | } | 
|  |  | 
|  | // Prebuilts | 
|  | if overridableProperties.Prebuilts != nil { | 
|  | prebuiltsLabelList := android.BazelLabelForModuleDeps(ctx, overridableProperties.Prebuilts) | 
|  | attrs.Prebuilts = bazel.MakeLabelListAttribute(prebuiltsLabelList) | 
|  | } | 
|  |  | 
|  | // Compressible | 
|  | if overridableProperties.Compressible != nil { | 
|  | attrs.Compressible = bazel.BoolAttribute{Value: overridableProperties.Compressible} | 
|  | } | 
|  |  | 
|  | // Package name | 
|  | // | 
|  | // e.g. com.android.adbd's package name is com.android.adbd, but | 
|  | // com.google.android.adbd overrides the package name to com.google.android.adbd | 
|  | // | 
|  | // TODO: this can be overridden from the product configuration, see | 
|  | // getOverrideManifestPackageName and | 
|  | // PRODUCT_MANIFEST_PACKAGE_NAME_OVERRIDES. | 
|  | // | 
|  | // Instead of generating the BUILD files differently based on the product config | 
|  | // at the point of conversion, this should be handled by the BUILD file loading | 
|  | // from the soong_injection's product_vars, so product config is decoupled from bp2build. | 
|  | if overridableProperties.Package_name != "" { | 
|  | attrs.Package_name = &overridableProperties.Package_name | 
|  | } | 
|  |  | 
|  | // Logging parent | 
|  | if overridableProperties.Logging_parent != "" { | 
|  | attrs.Logging_parent = &overridableProperties.Logging_parent | 
|  | } | 
|  | } | 
|  |  | 
|  | commonAttrs.Name = o.Name() | 
|  |  | 
|  | ctx.CreateBazelTargetModule(props, commonAttrs, &attrs) | 
|  | } | 
|  |  | 
|  | /////////////////////////////////////////////////////////////////////////////////////////////////// | 
|  | // Vality check routines | 
|  | // | 
|  | // These are called in at the very beginning of GenerateAndroidBuildActions to flag an error when | 
|  | // certain conditions are not met. | 
|  | // | 
|  | // TODO(jiyong): move these checks to a separate go file. | 
|  |  | 
|  | var _ android.ModuleWithMinSdkVersionCheck = (*apexBundle)(nil) | 
|  |  | 
|  | // Ensures that min_sdk_version of the included modules are equal or less than the min_sdk_version | 
|  | // of this apexBundle. | 
|  | func (a *apexBundle) CheckMinSdkVersion(ctx android.ModuleContext) { | 
|  | if a.testApex || a.vndkApex { | 
|  | return | 
|  | } | 
|  | // apexBundle::minSdkVersion reports its own errors. | 
|  | minSdkVersion := a.minSdkVersion(ctx) | 
|  | android.CheckMinSdkVersion(ctx, minSdkVersion, a.WalkPayloadDeps) | 
|  | } | 
|  |  | 
|  | // Returns apex's min_sdk_version string value, honoring overrides | 
|  | func (a *apexBundle) minSdkVersionValue(ctx android.EarlyModuleContext) string { | 
|  | // Only override the minSdkVersion value on Apexes which already specify | 
|  | // a min_sdk_version (it's optional for non-updatable apexes), and that its | 
|  | // min_sdk_version value is lower than the one to override with. | 
|  | minApiLevel := minSdkVersionFromValue(ctx, proptools.String(a.properties.Min_sdk_version)) | 
|  | if minApiLevel.IsNone() { | 
|  | return "" | 
|  | } | 
|  |  | 
|  | overrideMinSdkValue := ctx.DeviceConfig().ApexGlobalMinSdkVersionOverride() | 
|  | overrideApiLevel := minSdkVersionFromValue(ctx, overrideMinSdkValue) | 
|  | if !overrideApiLevel.IsNone() && overrideApiLevel.CompareTo(minApiLevel) > 0 { | 
|  | minApiLevel = overrideApiLevel | 
|  | } | 
|  |  | 
|  | return minApiLevel.String() | 
|  | } | 
|  |  | 
|  | // Returns apex's min_sdk_version SdkSpec, honoring overrides | 
|  | func (a *apexBundle) MinSdkVersion(ctx android.EarlyModuleContext) android.ApiLevel { | 
|  | return a.minSdkVersion(ctx) | 
|  | } | 
|  |  | 
|  | // Returns apex's min_sdk_version ApiLevel, honoring overrides | 
|  | func (a *apexBundle) minSdkVersion(ctx android.EarlyModuleContext) android.ApiLevel { | 
|  | return minSdkVersionFromValue(ctx, a.minSdkVersionValue(ctx)) | 
|  | } | 
|  |  | 
|  | // Construct ApiLevel object from min_sdk_version string value | 
|  | func minSdkVersionFromValue(ctx android.EarlyModuleContext, value string) android.ApiLevel { | 
|  | if value == "" { | 
|  | return android.NoneApiLevel | 
|  | } | 
|  | apiLevel, err := android.ApiLevelFromUser(ctx, value) | 
|  | if err != nil { | 
|  | ctx.PropertyErrorf("min_sdk_version", "%s", err.Error()) | 
|  | return android.NoneApiLevel | 
|  | } | 
|  | return apiLevel | 
|  | } | 
|  |  | 
|  | // Ensures that a lib providing stub isn't statically linked | 
|  | func (a *apexBundle) checkStaticLinkingToStubLibraries(ctx android.ModuleContext) { | 
|  | // Practically, we only care about regular APEXes on the device. | 
|  | if a.testApex || a.vndkApex { | 
|  | return | 
|  | } | 
|  |  | 
|  | abInfo := ctx.Provider(ApexBundleInfoProvider).(ApexBundleInfo) | 
|  |  | 
|  | a.WalkPayloadDeps(ctx, func(ctx android.ModuleContext, from blueprint.Module, to android.ApexModule, externalDep bool) bool { | 
|  | if ccm, ok := to.(*cc.Module); ok { | 
|  | apexName := ctx.ModuleName() | 
|  | fromName := ctx.OtherModuleName(from) | 
|  | toName := ctx.OtherModuleName(to) | 
|  |  | 
|  | // If `to` is not actually in the same APEX as `from` then it does not need | 
|  | // apex_available and neither do any of its dependencies. | 
|  | // | 
|  | // It is ok to call DepIsInSameApex() directly from within WalkPayloadDeps(). | 
|  | if am, ok := from.(android.DepIsInSameApex); ok && !am.DepIsInSameApex(ctx, to) { | 
|  | // As soon as the dependency graph crosses the APEX boundary, don't go further. | 
|  | return false | 
|  | } | 
|  |  | 
|  | // The dynamic linker and crash_dump tool in the runtime APEX is the only | 
|  | // exception to this rule. It can't make the static dependencies dynamic | 
|  | // because it can't do the dynamic linking for itself. | 
|  | // Same rule should be applied to linkerconfig, because it should be executed | 
|  | // only with static linked libraries before linker is available with ld.config.txt | 
|  | if apexName == "com.android.runtime" && (fromName == "linker" || fromName == "crash_dump" || fromName == "linkerconfig") { | 
|  | return false | 
|  | } | 
|  |  | 
|  | isStubLibraryFromOtherApex := ccm.HasStubsVariants() && !abInfo.Contents.DirectlyInApex(toName) | 
|  | if isStubLibraryFromOtherApex && !externalDep { | 
|  | ctx.ModuleErrorf("%q required by %q is a native library providing stub. "+ | 
|  | "It shouldn't be included in this APEX via static linking. Dependency path: %s", to.String(), fromName, ctx.GetPathString(false)) | 
|  | } | 
|  |  | 
|  | } | 
|  | return true | 
|  | }) | 
|  | } | 
|  |  | 
|  | // checkUpdatable enforces APEX and its transitive dep properties to have desired values for updatable APEXes. | 
|  | func (a *apexBundle) checkUpdatable(ctx android.ModuleContext) { | 
|  | if a.Updatable() { | 
|  | if a.minSdkVersionValue(ctx) == "" { | 
|  | ctx.PropertyErrorf("updatable", "updatable APEXes should set min_sdk_version as well") | 
|  | } | 
|  | if a.UsePlatformApis() { | 
|  | ctx.PropertyErrorf("updatable", "updatable APEXes can't use platform APIs") | 
|  | } | 
|  | if proptools.Bool(a.properties.Use_vndk_as_stable) { | 
|  | ctx.PropertyErrorf("use_vndk_as_stable", "updatable APEXes can't use external VNDK libs") | 
|  | } | 
|  | if a.FutureUpdatable() { | 
|  | ctx.PropertyErrorf("future_updatable", "Already updatable. Remove `future_updatable: true:`") | 
|  | } | 
|  | a.checkJavaStableSdkVersion(ctx) | 
|  | a.checkClasspathFragments(ctx) | 
|  | } | 
|  | } | 
|  |  | 
|  | // checkClasspathFragments enforces that all classpath fragments in deps generate classpaths.proto config. | 
|  | func (a *apexBundle) checkClasspathFragments(ctx android.ModuleContext) { | 
|  | ctx.VisitDirectDeps(func(module android.Module) { | 
|  | if tag := ctx.OtherModuleDependencyTag(module); tag == bcpfTag || tag == sscpfTag { | 
|  | info := ctx.OtherModuleProvider(module, java.ClasspathFragmentProtoContentInfoProvider).(java.ClasspathFragmentProtoContentInfo) | 
|  | if !info.ClasspathFragmentProtoGenerated { | 
|  | ctx.OtherModuleErrorf(module, "is included in updatable apex %v, it must not set generate_classpaths_proto to false", ctx.ModuleName()) | 
|  | } | 
|  | } | 
|  | }) | 
|  | } | 
|  |  | 
|  | // checkJavaStableSdkVersion enforces that all Java deps are using stable SDKs to compile. | 
|  | func (a *apexBundle) checkJavaStableSdkVersion(ctx android.ModuleContext) { | 
|  | // Visit direct deps only. As long as we guarantee top-level deps are using stable SDKs, | 
|  | // java's checkLinkType guarantees correct usage for transitive deps | 
|  | ctx.VisitDirectDepsBlueprint(func(module blueprint.Module) { | 
|  | tag := ctx.OtherModuleDependencyTag(module) | 
|  | switch tag { | 
|  | case javaLibTag, androidAppTag: | 
|  | if m, ok := module.(interface { | 
|  | CheckStableSdkVersion(ctx android.BaseModuleContext) error | 
|  | }); ok { | 
|  | if err := m.CheckStableSdkVersion(ctx); err != nil { | 
|  | ctx.ModuleErrorf("cannot depend on \"%v\": %v", ctx.OtherModuleName(module), err) | 
|  | } | 
|  | } | 
|  | } | 
|  | }) | 
|  | } | 
|  |  | 
|  | // checkApexAvailability ensures that the all the dependencies are marked as available for this APEX. | 
|  | func (a *apexBundle) checkApexAvailability(ctx android.ModuleContext) { | 
|  | // Let's be practical. Availability for test, host, and the VNDK apex isn't important | 
|  | if a.testApex || a.vndkApex { | 
|  | return | 
|  | } | 
|  |  | 
|  | // Because APEXes targeting other than system/system_ext partitions can't set | 
|  | // apex_available, we skip checks for these APEXes | 
|  | if a.SocSpecific() || a.DeviceSpecific() || (a.ProductSpecific() && ctx.Config().EnforceProductPartitionInterface()) { | 
|  | return | 
|  | } | 
|  |  | 
|  | // Coverage build adds additional dependencies for the coverage-only runtime libraries. | 
|  | // Requiring them and their transitive depencies with apex_available is not right | 
|  | // because they just add noise. | 
|  | if ctx.Config().IsEnvTrue("EMMA_INSTRUMENT") || a.IsNativeCoverageNeeded(ctx) { | 
|  | return | 
|  | } | 
|  |  | 
|  | a.WalkPayloadDeps(ctx, func(ctx android.ModuleContext, from blueprint.Module, to android.ApexModule, externalDep bool) bool { | 
|  | // As soon as the dependency graph crosses the APEX boundary, don't go further. | 
|  | if externalDep { | 
|  | return false | 
|  | } | 
|  |  | 
|  | apexName := ctx.ModuleName() | 
|  | for _, props := range ctx.Module().GetProperties() { | 
|  | if apexProps, ok := props.(*apexBundleProperties); ok { | 
|  | if apexProps.Apex_available_name != nil { | 
|  | apexName = *apexProps.Apex_available_name | 
|  | } | 
|  | } | 
|  | } | 
|  | fromName := ctx.OtherModuleName(from) | 
|  | toName := ctx.OtherModuleName(to) | 
|  |  | 
|  | // If `to` is not actually in the same APEX as `from` then it does not need | 
|  | // apex_available and neither do any of its dependencies. | 
|  | // | 
|  | // It is ok to call DepIsInSameApex() directly from within WalkPayloadDeps(). | 
|  | if am, ok := from.(android.DepIsInSameApex); ok && !am.DepIsInSameApex(ctx, to) { | 
|  | // As soon as the dependency graph crosses the APEX boundary, don't go | 
|  | // further. | 
|  | return false | 
|  | } | 
|  |  | 
|  | if to.AvailableFor(apexName) || baselineApexAvailable(apexName, toName) { | 
|  | return true | 
|  | } | 
|  | ctx.ModuleErrorf("%q requires %q that doesn't list the APEX under 'apex_available'."+ | 
|  | "\n\nDependency path:%s\n\n"+ | 
|  | "Consider adding %q to 'apex_available' property of %q", | 
|  | fromName, toName, ctx.GetPathString(true), apexName, toName) | 
|  | // Visit this module's dependencies to check and report any issues with their availability. | 
|  | return true | 
|  | }) | 
|  | } | 
|  |  | 
|  | // checkStaticExecutable ensures that executables in an APEX are not static. | 
|  | func (a *apexBundle) checkStaticExecutables(ctx android.ModuleContext) { | 
|  | ctx.VisitDirectDepsBlueprint(func(module blueprint.Module) { | 
|  | if ctx.OtherModuleDependencyTag(module) != executableTag { | 
|  | return | 
|  | } | 
|  |  | 
|  | if l, ok := module.(cc.LinkableInterface); ok && l.StaticExecutable() { | 
|  | apex := a.ApexVariationName() | 
|  | exec := ctx.OtherModuleName(module) | 
|  | if isStaticExecutableAllowed(apex, exec) { | 
|  | return | 
|  | } | 
|  | ctx.ModuleErrorf("executable %s is static", ctx.OtherModuleName(module)) | 
|  | } | 
|  | }) | 
|  | } | 
|  |  | 
|  | // A small list of exceptions where static executables are allowed in APEXes. | 
|  | func isStaticExecutableAllowed(apex string, exec string) bool { | 
|  | m := map[string][]string{ | 
|  | "com.android.runtime": { | 
|  | "linker", | 
|  | "linkerconfig", | 
|  | }, | 
|  | } | 
|  | execNames, ok := m[apex] | 
|  | return ok && android.InList(exec, execNames) | 
|  | } | 
|  |  | 
|  | // Collect information for opening IDE project files in java/jdeps.go. | 
|  | func (a *apexBundle) IDEInfo(dpInfo *android.IdeInfo) { | 
|  | dpInfo.Deps = append(dpInfo.Deps, a.properties.Java_libs...) | 
|  | dpInfo.Deps = append(dpInfo.Deps, a.properties.Bootclasspath_fragments...) | 
|  | dpInfo.Deps = append(dpInfo.Deps, a.properties.Systemserverclasspath_fragments...) | 
|  | dpInfo.Paths = append(dpInfo.Paths, a.modulePaths...) | 
|  | } | 
|  |  | 
|  | var ( | 
|  | apexAvailBaseline        = makeApexAvailableBaseline() | 
|  | inverseApexAvailBaseline = invertApexBaseline(apexAvailBaseline) | 
|  | ) | 
|  |  | 
|  | func baselineApexAvailable(apex, moduleName string) bool { | 
|  | key := apex | 
|  | moduleName = normalizeModuleName(moduleName) | 
|  |  | 
|  | if val, ok := apexAvailBaseline[key]; ok && android.InList(moduleName, val) { | 
|  | return true | 
|  | } | 
|  |  | 
|  | key = android.AvailableToAnyApex | 
|  | if val, ok := apexAvailBaseline[key]; ok && android.InList(moduleName, val) { | 
|  | return true | 
|  | } | 
|  |  | 
|  | return false | 
|  | } | 
|  |  | 
|  | func normalizeModuleName(moduleName string) string { | 
|  | // Prebuilt modules (e.g. java_import, etc.) have "prebuilt_" prefix added by the build | 
|  | // system. Trim the prefix for the check since they are confusing | 
|  | moduleName = android.RemoveOptionalPrebuiltPrefix(moduleName) | 
|  | if strings.HasPrefix(moduleName, "libclang_rt.") { | 
|  | // This module has many arch variants that depend on the product being built. | 
|  | // We don't want to list them all | 
|  | moduleName = "libclang_rt" | 
|  | } | 
|  | if strings.HasPrefix(moduleName, "androidx.") { | 
|  | // TODO(b/156996905) Set apex_available/min_sdk_version for androidx support libraries | 
|  | moduleName = "androidx" | 
|  | } | 
|  | return moduleName | 
|  | } | 
|  |  | 
|  | // Transform the map of apex -> modules to module -> apexes. | 
|  | func invertApexBaseline(m map[string][]string) map[string][]string { | 
|  | r := make(map[string][]string) | 
|  | for apex, modules := range m { | 
|  | for _, module := range modules { | 
|  | r[module] = append(r[module], apex) | 
|  | } | 
|  | } | 
|  | return r | 
|  | } | 
|  |  | 
|  | // Retrieve the baseline of apexes to which the supplied module belongs. | 
|  | func BaselineApexAvailable(moduleName string) []string { | 
|  | return inverseApexAvailBaseline[normalizeModuleName(moduleName)] | 
|  | } | 
|  |  | 
|  | // This is a map from apex to modules, which overrides the apex_available setting for that | 
|  | // particular module to make it available for the apex regardless of its setting. | 
|  | // TODO(b/147364041): remove this | 
|  | func makeApexAvailableBaseline() map[string][]string { | 
|  | // The "Module separator"s below are employed to minimize merge conflicts. | 
|  | m := make(map[string][]string) | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.appsearch"] = []string{ | 
|  | "icing-java-proto-lite", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.btservices"] = []string{ | 
|  | // empty | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.cellbroadcast"] = []string{} | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.extservices"] = []string{ | 
|  | "ExtServices-core", | 
|  | "libtextclassifier-java", | 
|  | "textclassifier-statsd", | 
|  | "TextClassifierNotificationLibNoManifest", | 
|  | "TextClassifierServiceLibNoManifest", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.neuralnetworks"] = []string{ | 
|  | "android.hardware.neuralnetworks@1.0", | 
|  | "android.hardware.neuralnetworks@1.1", | 
|  | "android.hardware.neuralnetworks@1.2", | 
|  | "android.hardware.neuralnetworks@1.3", | 
|  | "android.hidl.allocator@1.0", | 
|  | "android.hidl.memory.token@1.0", | 
|  | "android.hidl.memory@1.0", | 
|  | "android.hidl.safe_union@1.0", | 
|  | "libarect", | 
|  | "libprocpartition", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.media"] = []string{ | 
|  | // empty | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.media.swcodec"] = []string{ | 
|  | // empty | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.mediaprovider"] = []string{ | 
|  | "MediaProvider", | 
|  | "MediaProviderGoogle", | 
|  | "fmtlib_ndk", | 
|  | "libbase_ndk", | 
|  | "libfuse", | 
|  | "libfuse_jni", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.runtime"] = []string{ | 
|  | "libdebuggerd", | 
|  | "libdebuggerd_common_headers", | 
|  | "libdebuggerd_handler_core", | 
|  | "libdl_static", | 
|  | "libjemalloc5", | 
|  | "liblinker_main", | 
|  | "liblinker_malloc", | 
|  | "liblzma", | 
|  | "libprocinfo", | 
|  | "libpropertyinfoparser", | 
|  | "libscudo", | 
|  | "libsystemproperties", | 
|  | "libtombstoned_client_static", | 
|  | "libunwindstack", | 
|  | "libz", | 
|  | "libziparchive", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.tethering"] = []string{ | 
|  | "android.hardware.tetheroffload.config-V1.0-java", | 
|  | "android.hardware.tetheroffload.control-V1.0-java", | 
|  | "net-utils-framework-common", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m["com.android.wifi"] = []string{ | 
|  | "PlatformProperties", | 
|  | "android.hardware.wifi-V1.0-java", | 
|  | "android.hardware.wifi-V1.0-java-constants", | 
|  | "android.hardware.wifi-V1.1-java", | 
|  | "android.hardware.wifi-V1.2-java", | 
|  | "android.hardware.wifi-V1.3-java", | 
|  | "android.hardware.wifi-V1.4-java", | 
|  | "android.hardware.wifi.hostapd-V1.0-java", | 
|  | "android.hardware.wifi.hostapd-V1.1-java", | 
|  | "android.hardware.wifi.hostapd-V1.2-java", | 
|  | "android.hardware.wifi.supplicant-V1.0-java", | 
|  | "android.hardware.wifi.supplicant-V1.1-java", | 
|  | "android.hardware.wifi.supplicant-V1.2-java", | 
|  | "android.hardware.wifi.supplicant-V1.3-java", | 
|  | "bouncycastle-unbundled", | 
|  | "framework-wifi-util-lib", | 
|  | "ksoap2", | 
|  | "libnanohttpd", | 
|  | "wifi-lite-protos", | 
|  | "wifi-nano-protos", | 
|  | "wifi-service-pre-jarjar", | 
|  | } | 
|  | // | 
|  | // Module separator | 
|  | // | 
|  | m[android.AvailableToAnyApex] = []string{ | 
|  | "libprofile-clang-extras", | 
|  | "libprofile-clang-extras_ndk", | 
|  | "libprofile-extras", | 
|  | "libprofile-extras_ndk", | 
|  | } | 
|  | return m | 
|  | } | 
|  |  | 
|  | func init() { | 
|  | android.AddNeverAllowRules(createBcpPermittedPackagesRules(qBcpPackages())...) | 
|  | android.AddNeverAllowRules(createBcpPermittedPackagesRules(rBcpPackages())...) | 
|  | } | 
|  |  | 
|  | func createBcpPermittedPackagesRules(bcpPermittedPackages map[string][]string) []android.Rule { | 
|  | rules := make([]android.Rule, 0, len(bcpPermittedPackages)) | 
|  | for jar, permittedPackages := range bcpPermittedPackages { | 
|  | permittedPackagesRule := android.NeverAllow(). | 
|  | With("name", jar). | 
|  | WithMatcher("permitted_packages", android.NotInList(permittedPackages)). | 
|  | Because(jar + | 
|  | " bootjar may only use these package prefixes: " + strings.Join(permittedPackages, ",") + | 
|  | ". Please consider the following alternatives:\n" + | 
|  | "    1. If the offending code is from a statically linked library, consider " + | 
|  | "removing that dependency and using an alternative already in the " + | 
|  | "bootclasspath, or perhaps a shared library." + | 
|  | "    2. Move the offending code into an allowed package.\n" + | 
|  | "    3. Jarjar the offending code. Please be mindful of the potential system " + | 
|  | "health implications of bundling that code, particularly if the offending jar " + | 
|  | "is part of the bootclasspath.") | 
|  |  | 
|  | rules = append(rules, permittedPackagesRule) | 
|  | } | 
|  | return rules | 
|  | } | 
|  |  | 
|  | // DO NOT EDIT! These are the package prefixes that are exempted from being AOT'ed by ART. | 
|  | // Adding code to the bootclasspath in new packages will cause issues on module update. | 
|  | func qBcpPackages() map[string][]string { | 
|  | return map[string][]string{ | 
|  | "conscrypt": { | 
|  | "android.net.ssl", | 
|  | "com.android.org.conscrypt", | 
|  | }, | 
|  | "updatable-media": { | 
|  | "android.media", | 
|  | }, | 
|  | } | 
|  | } | 
|  |  | 
|  | // DO NOT EDIT! These are the package prefixes that are exempted from being AOT'ed by ART. | 
|  | // Adding code to the bootclasspath in new packages will cause issues on module update. | 
|  | func rBcpPackages() map[string][]string { | 
|  | return map[string][]string{ | 
|  | "framework-mediaprovider": { | 
|  | "android.provider", | 
|  | }, | 
|  | "framework-permission": { | 
|  | "android.permission", | 
|  | "android.app.role", | 
|  | "com.android.permission", | 
|  | "com.android.role", | 
|  | }, | 
|  | "framework-sdkextensions": { | 
|  | "android.os.ext", | 
|  | }, | 
|  | "framework-statsd": { | 
|  | "android.app", | 
|  | "android.os", | 
|  | "android.util", | 
|  | "com.android.internal.statsd", | 
|  | "com.android.server.stats", | 
|  | }, | 
|  | "framework-wifi": { | 
|  | "com.android.server.wifi", | 
|  | "com.android.wifi.x", | 
|  | "android.hardware.wifi", | 
|  | "android.net.wifi", | 
|  | }, | 
|  | "framework-tethering": { | 
|  | "android.net", | 
|  | }, | 
|  | } | 
|  | } | 
|  |  | 
|  | // For Bazel / bp2build | 
|  |  | 
|  | type bazelApexBundleAttributes struct { | 
|  | Manifest              bazel.LabelAttribute | 
|  | Android_manifest      bazel.LabelAttribute | 
|  | File_contexts         bazel.LabelAttribute | 
|  | Canned_fs_config      bazel.LabelAttribute | 
|  | Key                   bazel.LabelAttribute | 
|  | Certificate           bazel.LabelAttribute  // used when the certificate prop is a module | 
|  | Certificate_name      bazel.StringAttribute // used when the certificate prop is a string | 
|  | Min_sdk_version       bazel.StringAttribute | 
|  | Updatable             bazel.BoolAttribute | 
|  | Installable           bazel.BoolAttribute | 
|  | Binaries              bazel.LabelListAttribute | 
|  | Prebuilts             bazel.LabelListAttribute | 
|  | Native_shared_libs_32 bazel.LabelListAttribute | 
|  | Native_shared_libs_64 bazel.LabelListAttribute | 
|  | Compressible          bazel.BoolAttribute | 
|  | Package_name          *string | 
|  | Logging_parent        *string | 
|  | Tests                 bazel.LabelListAttribute | 
|  | Base_apex_name        *string | 
|  | Apex_available_name   *string | 
|  | Variant_version       *string | 
|  | } | 
|  |  | 
|  | type convertedNativeSharedLibs struct { | 
|  | Native_shared_libs_32 bazel.LabelListAttribute | 
|  | Native_shared_libs_64 bazel.LabelListAttribute | 
|  | } | 
|  |  | 
|  | const ( | 
|  | minSdkVersionPropName = "Min_sdk_version" | 
|  | ) | 
|  |  | 
|  | // ConvertWithBp2build performs bp2build conversion of an apex | 
|  | func (a *apexBundle) ConvertWithBp2build(ctx android.TopDownMutatorContext) { | 
|  | // We only convert apex and apex_test modules at this time | 
|  | if ctx.ModuleType() != "apex" && ctx.ModuleType() != "apex_test" { | 
|  | return | 
|  | } | 
|  |  | 
|  | attrs, props, commonAttrs := convertWithBp2build(a, ctx) | 
|  | commonAttrs.Name = a.Name() | 
|  | ctx.CreateBazelTargetModule(props, commonAttrs, &attrs) | 
|  | } | 
|  |  | 
|  | func convertWithBp2build(a *apexBundle, ctx android.TopDownMutatorContext) (bazelApexBundleAttributes, bazel.BazelTargetModuleProperties, android.CommonAttributes) { | 
|  | var manifestLabelAttribute bazel.LabelAttribute | 
|  | manifestLabelAttribute.SetValue(android.BazelLabelForModuleSrcSingle(ctx, proptools.StringDefault(a.properties.Manifest, "apex_manifest.json"))) | 
|  |  | 
|  | var androidManifestLabelAttribute bazel.LabelAttribute | 
|  | if a.properties.AndroidManifest != nil { | 
|  | androidManifestLabelAttribute.SetValue(android.BazelLabelForModuleSrcSingle(ctx, *a.properties.AndroidManifest)) | 
|  | } | 
|  |  | 
|  | var fileContextsLabelAttribute bazel.LabelAttribute | 
|  | if a.properties.File_contexts == nil { | 
|  | // See buildFileContexts(), if file_contexts is not specified the default one is used, which is //system/sepolicy/apex:<module name>-file_contexts | 
|  | fileContextsLabelAttribute.SetValue(android.BazelLabelForModuleDepSingle(ctx, a.Name()+"-file_contexts")) | 
|  | } else if strings.HasPrefix(*a.properties.File_contexts, ":") { | 
|  | // File_contexts is a module | 
|  | fileContextsLabelAttribute.SetValue(android.BazelLabelForModuleDepSingle(ctx, *a.properties.File_contexts)) | 
|  | } else { | 
|  | // File_contexts is a file | 
|  | fileContextsLabelAttribute.SetValue(android.BazelLabelForModuleSrcSingle(ctx, *a.properties.File_contexts)) | 
|  | } | 
|  |  | 
|  | var cannedFsConfigAttribute bazel.LabelAttribute | 
|  | if a.properties.Canned_fs_config != nil { | 
|  | cannedFsConfigAttribute.SetValue(android.BazelLabelForModuleSrcSingle(ctx, *a.properties.Canned_fs_config)) | 
|  | } | 
|  |  | 
|  | productVariableProps := android.ProductVariableProperties(ctx, a) | 
|  | // TODO(b/219503907) this would need to be set to a.MinSdkVersionValue(ctx) but | 
|  | // given it's coming via config, we probably don't want to put it in here. | 
|  | var minSdkVersion bazel.StringAttribute | 
|  | if a.properties.Min_sdk_version != nil { | 
|  | minSdkVersion.SetValue(*a.properties.Min_sdk_version) | 
|  | } | 
|  | if props, ok := productVariableProps[minSdkVersionPropName]; ok { | 
|  | for c, p := range props { | 
|  | if val, ok := p.(*string); ok { | 
|  | minSdkVersion.SetSelectValue(c.ConfigurationAxis(), c.SelectKey(), val) | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | var keyLabelAttribute bazel.LabelAttribute | 
|  | if a.overridableProperties.Key != nil { | 
|  | keyLabelAttribute.SetValue(android.BazelLabelForModuleDepSingle(ctx, *a.overridableProperties.Key)) | 
|  | } | 
|  |  | 
|  | // Certificate | 
|  | certificate, certificateName := android.BazelStringOrLabelFromProp(ctx, a.overridableProperties.Certificate) | 
|  |  | 
|  | nativeSharedLibs := &convertedNativeSharedLibs{ | 
|  | Native_shared_libs_32: bazel.LabelListAttribute{}, | 
|  | Native_shared_libs_64: bazel.LabelListAttribute{}, | 
|  | } | 
|  |  | 
|  | // https://cs.android.com/android/platform/superproject/+/master:build/soong/android/arch.go;l=698;drc=f05b0d35d2fbe51be9961ce8ce8031f840295c68 | 
|  | // https://cs.android.com/android/platform/superproject/+/master:build/soong/apex/apex.go;l=2549;drc=ec731a83e3e2d80a1254e32fd4ad7ef85e262669 | 
|  | // In Soong, decodeMultilib, used to get multilib, return "first" if defaultMultilib is set to "common". | 
|  | // Since apex sets defaultMultilib to be "common", equivalent compileMultilib in bp2build for apex should be "first" | 
|  | compileMultilib := "first" | 
|  | if a.CompileMultilib() != nil { | 
|  | compileMultilib = *a.CompileMultilib() | 
|  | } | 
|  |  | 
|  | // properties.Native_shared_libs is treated as "both" | 
|  | convertBothLibs(ctx, compileMultilib, a.properties.Native_shared_libs, nativeSharedLibs) | 
|  | convertBothLibs(ctx, compileMultilib, a.properties.Multilib.Both.Native_shared_libs, nativeSharedLibs) | 
|  | convert32Libs(ctx, compileMultilib, a.properties.Multilib.Lib32.Native_shared_libs, nativeSharedLibs) | 
|  | convert64Libs(ctx, compileMultilib, a.properties.Multilib.Lib64.Native_shared_libs, nativeSharedLibs) | 
|  | convertFirstLibs(ctx, compileMultilib, a.properties.Multilib.First.Native_shared_libs, nativeSharedLibs) | 
|  |  | 
|  | prebuilts := a.overridableProperties.Prebuilts | 
|  | prebuiltsLabelList := android.BazelLabelForModuleDeps(ctx, prebuilts) | 
|  | prebuiltsLabelListAttribute := bazel.MakeLabelListAttribute(prebuiltsLabelList) | 
|  |  | 
|  | binaries := android.BazelLabelForModuleDeps(ctx, a.properties.ApexNativeDependencies.Binaries) | 
|  | binariesLabelListAttribute := bazel.MakeLabelListAttribute(binaries) | 
|  |  | 
|  | var testsAttrs bazel.LabelListAttribute | 
|  | if a.testApex && len(a.properties.ApexNativeDependencies.Tests) > 0 { | 
|  | tests := android.BazelLabelForModuleDeps(ctx, a.properties.ApexNativeDependencies.Tests) | 
|  | testsAttrs = bazel.MakeLabelListAttribute(tests) | 
|  | } | 
|  |  | 
|  | var updatableAttribute bazel.BoolAttribute | 
|  | if a.properties.Updatable != nil { | 
|  | updatableAttribute.Value = a.properties.Updatable | 
|  | } | 
|  |  | 
|  | var installableAttribute bazel.BoolAttribute | 
|  | if a.properties.Installable != nil { | 
|  | installableAttribute.Value = a.properties.Installable | 
|  | } | 
|  |  | 
|  | var compressibleAttribute bazel.BoolAttribute | 
|  | if a.overridableProperties.Compressible != nil { | 
|  | compressibleAttribute.Value = a.overridableProperties.Compressible | 
|  | } | 
|  |  | 
|  | var packageName *string | 
|  | if a.overridableProperties.Package_name != "" { | 
|  | packageName = &a.overridableProperties.Package_name | 
|  | } | 
|  |  | 
|  | var loggingParent *string | 
|  | if a.overridableProperties.Logging_parent != "" { | 
|  | loggingParent = &a.overridableProperties.Logging_parent | 
|  | } | 
|  |  | 
|  | attrs := bazelApexBundleAttributes{ | 
|  | Manifest:              manifestLabelAttribute, | 
|  | Android_manifest:      androidManifestLabelAttribute, | 
|  | File_contexts:         fileContextsLabelAttribute, | 
|  | Canned_fs_config:      cannedFsConfigAttribute, | 
|  | Min_sdk_version:       minSdkVersion, | 
|  | Key:                   keyLabelAttribute, | 
|  | Certificate:           certificate, | 
|  | Certificate_name:      certificateName, | 
|  | Updatable:             updatableAttribute, | 
|  | Installable:           installableAttribute, | 
|  | Native_shared_libs_32: nativeSharedLibs.Native_shared_libs_32, | 
|  | Native_shared_libs_64: nativeSharedLibs.Native_shared_libs_64, | 
|  | Binaries:              binariesLabelListAttribute, | 
|  | Prebuilts:             prebuiltsLabelListAttribute, | 
|  | Compressible:          compressibleAttribute, | 
|  | Package_name:          packageName, | 
|  | Logging_parent:        loggingParent, | 
|  | Tests:                 testsAttrs, | 
|  | Apex_available_name:   a.properties.Apex_available_name, | 
|  | Variant_version:       a.properties.Variant_version, | 
|  | } | 
|  |  | 
|  | props := bazel.BazelTargetModuleProperties{ | 
|  | Rule_class:        "apex", | 
|  | Bzl_load_location: "//build/bazel/rules/apex:apex.bzl", | 
|  | } | 
|  |  | 
|  | commonAttrs := android.CommonAttributes{} | 
|  | if a.testApex { | 
|  | commonAttrs.Testonly = proptools.BoolPtr(true) | 
|  | // Set the api_domain of the test apex | 
|  | attrs.Base_apex_name = proptools.StringPtr(cc.GetApiDomain(a.Name())) | 
|  | } | 
|  |  | 
|  | return attrs, props, commonAttrs | 
|  | } | 
|  |  | 
|  | // The following conversions are based on this table where the rows are the compile_multilib | 
|  | // values and the columns are the properties.Multilib.*.Native_shared_libs. Each cell | 
|  | // represents how the libs should be compiled for a 64-bit/32-bit device: 32 means it | 
|  | // should be compiled as 32-bit, 64 means it should be compiled as 64-bit, none means it | 
|  | // should not be compiled. | 
|  | // multib/compile_multilib, 32,        64,        both,     first | 
|  | // 32,                      32/32,     none/none, 32/32,    none/32 | 
|  | // 64,                      none/none, 64/none,   64/none,  64/none | 
|  | // both,                    32/32,     64/none,   32&64/32, 64/32 | 
|  | // first,                   32/32,     64/none,   64/32,    64/32 | 
|  |  | 
|  | func convert32Libs(ctx android.TopDownMutatorContext, compileMultilb string, | 
|  | libs []string, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | libsLabelList := android.BazelLabelForModuleDeps(ctx, libs) | 
|  | switch compileMultilb { | 
|  | case "both", "32": | 
|  | makeNoConfig32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "first": | 
|  | make32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "64": | 
|  | // Incompatible, ignore | 
|  | default: | 
|  | invalidCompileMultilib(ctx, compileMultilb) | 
|  | } | 
|  | } | 
|  |  | 
|  | func convert64Libs(ctx android.TopDownMutatorContext, compileMultilb string, | 
|  | libs []string, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | libsLabelList := android.BazelLabelForModuleDeps(ctx, libs) | 
|  | switch compileMultilb { | 
|  | case "both", "64", "first": | 
|  | make64SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "32": | 
|  | // Incompatible, ignore | 
|  | default: | 
|  | invalidCompileMultilib(ctx, compileMultilb) | 
|  | } | 
|  | } | 
|  |  | 
|  | func convertBothLibs(ctx android.TopDownMutatorContext, compileMultilb string, | 
|  | libs []string, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | libsLabelList := android.BazelLabelForModuleDeps(ctx, libs) | 
|  | switch compileMultilb { | 
|  | case "both": | 
|  | makeNoConfig32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | make64SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "first": | 
|  | makeFirstSharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "32": | 
|  | makeNoConfig32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "64": | 
|  | make64SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | default: | 
|  | invalidCompileMultilib(ctx, compileMultilb) | 
|  | } | 
|  | } | 
|  |  | 
|  | func convertFirstLibs(ctx android.TopDownMutatorContext, compileMultilb string, | 
|  | libs []string, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | libsLabelList := android.BazelLabelForModuleDeps(ctx, libs) | 
|  | switch compileMultilb { | 
|  | case "both", "first": | 
|  | makeFirstSharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "32": | 
|  | make32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | case "64": | 
|  | make64SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | default: | 
|  | invalidCompileMultilib(ctx, compileMultilb) | 
|  | } | 
|  | } | 
|  |  | 
|  | func makeFirstSharedLibsAttributes(libsLabelList bazel.LabelList, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | make32SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | make64SharedLibsAttributes(libsLabelList, nativeSharedLibs) | 
|  | } | 
|  |  | 
|  | func makeNoConfig32SharedLibsAttributes(libsLabelList bazel.LabelList, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | list := bazel.LabelListAttribute{} | 
|  | list.SetSelectValue(bazel.NoConfigAxis, "", libsLabelList) | 
|  | nativeSharedLibs.Native_shared_libs_32.Append(list) | 
|  | } | 
|  |  | 
|  | func make32SharedLibsAttributes(libsLabelList bazel.LabelList, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | makeSharedLibsAttributes("x86", libsLabelList, &nativeSharedLibs.Native_shared_libs_32) | 
|  | makeSharedLibsAttributes("arm", libsLabelList, &nativeSharedLibs.Native_shared_libs_32) | 
|  | } | 
|  |  | 
|  | func make64SharedLibsAttributes(libsLabelList bazel.LabelList, nativeSharedLibs *convertedNativeSharedLibs) { | 
|  | makeSharedLibsAttributes("x86_64", libsLabelList, &nativeSharedLibs.Native_shared_libs_64) | 
|  | makeSharedLibsAttributes("arm64", libsLabelList, &nativeSharedLibs.Native_shared_libs_64) | 
|  | } | 
|  |  | 
|  | func makeSharedLibsAttributes(config string, libsLabelList bazel.LabelList, | 
|  | labelListAttr *bazel.LabelListAttribute) { | 
|  | list := bazel.LabelListAttribute{} | 
|  | list.SetSelectValue(bazel.ArchConfigurationAxis, config, libsLabelList) | 
|  | labelListAttr.Append(list) | 
|  | } | 
|  |  | 
|  | func invalidCompileMultilib(ctx android.TopDownMutatorContext, value string) { | 
|  | ctx.PropertyErrorf("compile_multilib", "Invalid value: %s", value) | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) IsTestApex() bool { | 
|  | return a.testApex | 
|  | } | 
|  |  | 
|  | func (a *apexBundle) useVndkAsStable(ctx android.BaseModuleContext) bool { | 
|  | // VNDK cannot be linked if it is deprecated | 
|  | if ctx.Config().IsVndkDeprecated() { | 
|  | return false | 
|  | } | 
|  |  | 
|  | return proptools.Bool(a.properties.Use_vndk_as_stable) | 
|  | } |