markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2019 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
| 16 | |
Bob Badour | 97e6be2 | 2021-02-12 14:45:04 -0800 | [diff] [blame] | 17 | package { |
| 18 | default_applicable_licenses: ["Android-Apache-2.0"], |
| 19 | } |
| 20 | |
Maciej Żenczykowski | 760d1ed | 2022-07-08 05:57:10 -0700 | [diff] [blame] | 21 | prebuilt_etc { |
| 22 | name: "TetheringInProcessFlag", |
| 23 | src: "in-process", |
| 24 | filename_from_src: true, |
| 25 | sub_dir: "flag", |
| 26 | } |
| 27 | |
| 28 | prebuilt_etc { |
| 29 | name: "TetheringOutOfProcessFlag", |
| 30 | src: "out-of-process", |
| 31 | filename_from_src: true, |
| 32 | sub_dir: "flag", |
| 33 | } |
| 34 | |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 35 | // Defaults to enable/disable java targets which uses development APIs. "enabled" may have a |
| 36 | // different value depending on the branch. |
| 37 | java_defaults { |
| 38 | name: "ConnectivityNextEnableDefaults", |
| 39 | enabled: true, |
| 40 | } |
| 41 | apex_defaults { |
| 42 | name: "ConnectivityApexDefaults", |
| 43 | // Tethering app to include in the AOSP apex. Branches that disable the "next" targets may use |
| 44 | // a stable tethering app instead, but will generally override the AOSP apex to use updatable |
| 45 | // package names and keys, so that apex will be unused anyway. |
| 46 | apps: ["TetheringNext"], // Replace to "Tethering" if ConnectivityNextEnableDefaults is false. |
| 47 | } |
Remi NGUYEN VAN | f24553d | 2022-01-27 13:16:12 +0900 | [diff] [blame] | 48 | enable_tethering_next_apex = true |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 49 | // This is a placeholder comment to avoid merge conflicts |
| 50 | // as the above target may have different "enabled" values |
| 51 | // depending on the branch |
| 52 | |
Patrick Rohr | c65b451 | 2023-01-16 06:12:04 -0800 | [diff] [blame] | 53 | // cronet_in_tethering_apex_defaults can be used to specify an apex_defaults target that either |
| 54 | // enables or disables inclusion of Cronet in the Tethering apex. This is used to disable Cronet |
| 55 | // on tm-mainline-prod. Note: in order for Cronet APIs to work Cronet must also be enabled |
| 56 | // by the cronet_java_*_defaults in common/TetheringLib/Android.bp. |
| 57 | cronet_in_tethering_apex_defaults = "CronetInTetheringApexDefaultsEnabled" |
| 58 | // This is a placeholder comment to avoid merge conflicts |
| 59 | // as cronet_apex_defaults may have different values |
| 60 | // depending on the branch |
| 61 | |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 62 | apex_defaults { |
| 63 | name: "CronetInTetheringApexDefaults", |
| 64 | defaults: [cronet_in_tethering_apex_defaults], |
| 65 | } |
| 66 | |
| 67 | apex_defaults { |
| 68 | name: "CronetInTetheringApexDefaultsEnabled", |
Patrick Rohr | 77c084d | 2023-03-14 22:45:06 +0000 | [diff] [blame] | 69 | jni_libs: ["cronet_aml_components_cronet_android_cronet"], |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 70 | arch: { |
| 71 | riscv64: { |
| 72 | // TODO: remove this when there is a riscv64 libcronet |
Patrick Rohr | 77c084d | 2023-03-14 22:45:06 +0000 | [diff] [blame] | 73 | exclude_jni_libs: ["cronet_aml_components_cronet_android_cronet"], |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 74 | }, |
| 75 | }, |
| 76 | } |
| 77 | |
| 78 | apex_defaults { |
| 79 | name: "CronetInTetheringApexDefaultsDisabled", |
| 80 | } |
| 81 | |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 82 | apex { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 83 | name: "com.android.tethering", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 84 | defaults: [ |
| 85 | "ConnectivityApexDefaults", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 86 | "CronetInTetheringApexDefaults", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 87 | "r-launched-apex-module", |
| 88 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 89 | compile_multilib: "both", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 90 | bootclasspath_fragments: [ |
| 91 | "com.android.tethering-bootclasspath-fragment", |
| 92 | ], |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 93 | systemserverclasspath_fragments: [ |
| 94 | "com.android.tethering-systemserverclasspath-fragment", |
Remi NGUYEN VAN | 2812f60 | 2021-01-08 01:19:44 +0000 | [diff] [blame] | 95 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 96 | multilib: { |
| 97 | first: { |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 98 | jni_libs: [ |
| 99 | "libservice-connectivity", |
Remi NGUYEN VAN | 6a20eed | 2022-01-31 11:21:08 +0900 | [diff] [blame] | 100 | "libandroid_net_connectivity_com_android_net_module_util_jni", |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 101 | ], |
Remi NGUYEN VAN | fb70eba | 2022-04-04 20:26:16 +0900 | [diff] [blame] | 102 | native_shared_libs: [ |
| 103 | "libcom.android.tethering.connectivity_native", |
| 104 | "libnetd_updatable", |
| 105 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 106 | }, |
| 107 | both: { |
Remi NGUYEN VAN | c8aa43c | 2022-02-02 13:03:29 +0900 | [diff] [blame] | 108 | jni_libs: [ |
| 109 | "libframework-connectivity-jni", |
| 110 | "libframework-connectivity-tiramisu-jni" |
| 111 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 112 | }, |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 113 | }, |
Hungming Chen | 378e323 | 2021-12-16 21:56:02 +0800 | [diff] [blame] | 114 | binaries: [ |
| 115 | "clatd", |
| 116 | ], |
Hungming Chen | f9d40ae | 2022-01-14 17:42:43 +0800 | [diff] [blame] | 117 | canned_fs_config: "canned_fs_config", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 118 | bpfs: [ |
Tyler Wear | b37f551 | 2021-10-01 13:22:00 -0700 | [diff] [blame] | 119 | "block.o", |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 120 | "clatd.o", |
Ken Chen | 74ff3ee | 2022-07-14 16:46:39 +0800 | [diff] [blame] | 121 | "dscpPolicy.o", |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 122 | "netd.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 123 | "offload.o", |
Maciej Żenczykowski | 07d3013 | 2022-04-23 12:33:32 -0700 | [diff] [blame] | 124 | "offload@btf.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 125 | "test.o", |
Maciej Żenczykowski | 07d3013 | 2022-04-23 12:33:32 -0700 | [diff] [blame] | 126 | "test@btf.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 127 | ], |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 128 | apps: [ |
| 129 | "ServiceConnectivityResources", |
Remi NGUYEN VAN | 51935fc | 2022-01-07 13:18:54 +0900 | [diff] [blame] | 130 | "HalfSheetUX", |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 131 | ], |
Andrei Onea | 52eac02 | 2021-12-03 15:11:27 +0000 | [diff] [blame] | 132 | prebuilts: [ |
| 133 | "current_sdkinfo", |
| 134 | "privapp_allowlist_com.android.tethering", |
Maciej Żenczykowski | 760d1ed | 2022-07-08 05:57:10 -0700 | [diff] [blame] | 135 | "TetheringOutOfProcessFlag", |
Andrei Onea | 52eac02 | 2021-12-03 15:11:27 +0000 | [diff] [blame] | 136 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 137 | manifest: "manifest.json", |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 138 | key: "com.android.tethering.key", |
Nikita Ioffe | 5f33357 | 2021-02-04 01:42:45 +0000 | [diff] [blame] | 139 | // Indicates that pre-installed version of this apex can be compressed. |
| 140 | // Whether it actually will be compressed is controlled on per-device basis. |
| 141 | compressible: true, |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 142 | |
| 143 | androidManifest: "AndroidManifest.xml", |
Taras Antoshchuk | 30d41e5 | 2021-08-02 18:06:35 +0200 | [diff] [blame] | 144 | |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 145 | compat_configs: [ |
| 146 | "connectivity-platform-compat-config", |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 147 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 148 | } |
| 149 | |
| 150 | apex_key { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 151 | name: "com.android.tethering.key", |
| 152 | public_key: "com.android.tethering.avbpubkey", |
| 153 | private_key: "com.android.tethering.pem", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 154 | } |
| 155 | |
| 156 | android_app_certificate { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 157 | name: "com.android.tethering.certificate", |
| 158 | certificate: "com.android.tethering", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 159 | } |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 160 | |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 161 | filegroup { |
| 162 | name: "connectivity-hiddenapi-files", |
Paul Duffin | c8164e4 | 2022-07-28 10:52:09 +0000 | [diff] [blame] | 163 | srcs: [ |
| 164 | ":connectivity-t-hiddenapi-files", |
| 165 | "hiddenapi/*.txt", |
| 166 | ], |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 167 | visibility: ["//packages/modules/Connectivity:__subpackages__"], |
| 168 | } |
| 169 | |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 170 | // Encapsulate the contributions made by the com.android.tethering to the bootclasspath. |
| 171 | bootclasspath_fragment { |
| 172 | name: "com.android.tethering-bootclasspath-fragment", |
| 173 | contents: [ |
| 174 | "framework-connectivity", |
paulhu | 699477a | 2022-02-08 21:25:28 +0800 | [diff] [blame] | 175 | "framework-connectivity-t", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 176 | "framework-tethering", |
| 177 | ], |
| 178 | apex_available: ["com.android.tethering"], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 179 | |
| 180 | // The bootclasspath_fragments that provide APIs on which this depends. |
| 181 | fragments: [ |
| 182 | { |
| 183 | apex: "com.android.art", |
| 184 | module: "art-bootclasspath-fragment", |
| 185 | }, |
| 186 | ], |
| 187 | |
| 188 | // Additional stubs libraries that this fragment's contents use which are |
| 189 | // not provided by another bootclasspath_fragment. |
| 190 | additional_stubs: [ |
| 191 | "android-non-updatable", |
| 192 | ], |
| 193 | |
| 194 | // Additional hidden API flag files to override the defaults. This must only be |
| 195 | // modified by the Soong or platform compat team. |
| 196 | hidden_api: { |
Remi NGUYEN VAN | 955c33c | 2021-12-16 15:10:40 +0000 | [diff] [blame] | 197 | max_target_o_low_priority: [ |
| 198 | "hiddenapi/hiddenapi-max-target-o-low-priority.txt", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 199 | ], |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 200 | unsupported: [ |
| 201 | "hiddenapi/hiddenapi-unsupported.txt", |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 202 | ], |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 203 | |
| 204 | // The following packages contain classes from other modules on the |
| 205 | // bootclasspath. That means that the hidden API flags for this module |
| 206 | // has to explicitly list every single class this module provides in |
| 207 | // that package to differentiate them from the classes provided by other |
| 208 | // modules. That can include private classes that are not part of the |
| 209 | // API. |
| 210 | split_packages: [ |
| 211 | "android.app.usage", |
| 212 | "android.nearby", |
| 213 | "android.net", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 214 | "android.net.http", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 215 | "android.net.netstats", |
| 216 | "android.net.util", |
| 217 | ], |
| 218 | |
| 219 | // The following packages and all their subpackages currently only |
| 220 | // contain classes from this bootclasspath_fragment. Listing a package |
| 221 | // here won't prevent other bootclasspath modules from adding classes in |
| 222 | // any of those packages but it will prevent them from adding those |
| 223 | // classes into an API surface, e.g. public, system, etc.. Doing so will |
| 224 | // result in a build failure due to inconsistent flags. |
| 225 | package_prefixes: [ |
| 226 | "android.nearby.aidl", |
| 227 | "android.net.apf", |
| 228 | "android.net.connectivity", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 229 | "android.net.http.apihelpers", |
| 230 | "android.net.http.internal", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 231 | "android.net.netstats.provider", |
| 232 | "android.net.nsd", |
Igor Chernyshev | 9dac660 | 2022-12-13 19:28:32 -0800 | [diff] [blame] | 233 | "android.net.wear", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 234 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 235 | }, |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 236 | } |
| 237 | |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 238 | systemserverclasspath_fragment { |
| 239 | name: "com.android.tethering-systemserverclasspath-fragment", |
| 240 | standalone_contents: ["service-connectivity"], |
| 241 | apex_available: ["com.android.tethering"], |
| 242 | } |
| 243 | |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 244 | override_apex { |
| 245 | name: "com.android.tethering.inprocess", |
| 246 | base: "com.android.tethering", |
| 247 | package_name: "com.android.tethering.inprocess", |
Remi NGUYEN VAN | f24553d | 2022-01-27 13:16:12 +0900 | [diff] [blame] | 248 | enabled: enable_tethering_next_apex, |
Maciej Żenczykowski | ccce4a3 | 2022-07-17 01:28:38 -0700 | [diff] [blame] | 249 | bpfs: [ |
| 250 | "block.o", |
| 251 | "clatd.o", |
Ken Chen | 74ff3ee | 2022-07-14 16:46:39 +0800 | [diff] [blame] | 252 | "dscpPolicy.o", |
Maciej Żenczykowski | ccce4a3 | 2022-07-17 01:28:38 -0700 | [diff] [blame] | 253 | "netd.o", |
| 254 | "offload@inprocess.o", |
| 255 | "test@inprocess.o", |
| 256 | ], |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 257 | apps: [ |
Remi NGUYEN VAN | f0f0cca | 2021-03-12 15:04:29 +0000 | [diff] [blame] | 258 | "ServiceConnectivityResources", |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 259 | "InProcessTethering", |
| 260 | ], |
Maciej Żenczykowski | 760d1ed | 2022-07-08 05:57:10 -0700 | [diff] [blame] | 261 | prebuilts: [ |
| 262 | "current_sdkinfo", |
| 263 | "privapp_allowlist_com.android.tethering", |
| 264 | "TetheringInProcessFlag", |
| 265 | ], |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 266 | } |