markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2019 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
| 16 | |
Bob Badour | 97e6be2 | 2021-02-12 14:45:04 -0800 | [diff] [blame] | 17 | package { |
Aditya Choudhary | 01b5ede | 2024-01-31 11:08:57 +0000 | [diff] [blame] | 18 | default_team: "trendy_team_fwk_core_networking", |
Bob Badour | 97e6be2 | 2021-02-12 14:45:04 -0800 | [diff] [blame] | 19 | default_applicable_licenses: ["Android-Apache-2.0"], |
| 20 | } |
| 21 | |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 22 | // Defaults to enable/disable java targets which uses development APIs. "enabled" may have a |
| 23 | // different value depending on the branch. |
| 24 | java_defaults { |
| 25 | name: "ConnectivityNextEnableDefaults", |
| 26 | enabled: true, |
| 27 | } |
Aditya Choudhary | 01b5ede | 2024-01-31 11:08:57 +0000 | [diff] [blame] | 28 | |
Remi NGUYEN VAN | 02eee9a | 2023-01-30 19:19:48 +0900 | [diff] [blame] | 29 | java_defaults { |
| 30 | name: "NetworkStackApiShimSettingsForCurrentBranch", |
| 31 | // API shims to include in the networking modules built from the branch. Branches that disable |
| 32 | // the "next" targets must use stable shims (latest stable API level) instead of current shims |
| 33 | // (X_current API level). |
| 34 | static_libs: ["NetworkStackApiCurrentShims"], |
| 35 | } |
Aditya Choudhary | 01b5ede | 2024-01-31 11:08:57 +0000 | [diff] [blame] | 36 | |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 37 | apex_defaults { |
| 38 | name: "ConnectivityApexDefaults", |
| 39 | // Tethering app to include in the AOSP apex. Branches that disable the "next" targets may use |
| 40 | // a stable tethering app instead, but will generally override the AOSP apex to use updatable |
| 41 | // package names and keys, so that apex will be unused anyway. |
| 42 | apps: ["TetheringNext"], // Replace to "Tethering" if ConnectivityNextEnableDefaults is false. |
| 43 | } |
Aditya Choudhary | 01b5ede | 2024-01-31 11:08:57 +0000 | [diff] [blame] | 44 | |
Remi NGUYEN VAN | f24553d | 2022-01-27 13:16:12 +0900 | [diff] [blame] | 45 | enable_tethering_next_apex = true |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 46 | // This is a placeholder comment to avoid merge conflicts |
| 47 | // as the above target may have different "enabled" values |
| 48 | // depending on the branch |
| 49 | |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 50 | apex_defaults { |
| 51 | name: "CronetInTetheringApexDefaults", |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 52 | jni_libs: [ |
Mohannad Farrag | 9c6801f | 2023-03-23 12:45:45 +0000 | [diff] [blame] | 53 | "cronet_aml_components_cronet_android_cronet", |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 54 | "//external/cronet/third_party/boringssl:libcrypto", |
| 55 | "//external/cronet/third_party/boringssl:libssl", |
| 56 | ], |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 57 | } |
| 58 | |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 59 | apex { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 60 | name: "com.android.tethering", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 61 | defaults: [ |
| 62 | "ConnectivityApexDefaults", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 63 | "CronetInTetheringApexDefaults", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 64 | "r-launched-apex-module", |
| 65 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 66 | compile_multilib: "both", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 67 | bootclasspath_fragments: [ |
| 68 | "com.android.tethering-bootclasspath-fragment", |
| 69 | ], |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 70 | systemserverclasspath_fragments: [ |
| 71 | "com.android.tethering-systemserverclasspath-fragment", |
Remi NGUYEN VAN | 2812f60 | 2021-01-08 01:19:44 +0000 | [diff] [blame] | 72 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 73 | multilib: { |
| 74 | first: { |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 75 | jni_libs: [ |
| 76 | "libservice-connectivity", |
Kangping Dong | b1c75db | 2023-08-30 19:15:04 +0800 | [diff] [blame] | 77 | "libservice-thread-jni", |
Remi NGUYEN VAN | 6a20eed | 2022-01-31 11:21:08 +0900 | [diff] [blame] | 78 | "libandroid_net_connectivity_com_android_net_module_util_jni", |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 79 | ], |
Remi NGUYEN VAN | fb70eba | 2022-04-04 20:26:16 +0900 | [diff] [blame] | 80 | native_shared_libs: [ |
Ken Chen | ec0f7ac | 2023-09-08 14:14:55 +0800 | [diff] [blame] | 81 | "libcom.android.tethering.dns_helper", |
Remi NGUYEN VAN | fb70eba | 2022-04-04 20:26:16 +0900 | [diff] [blame] | 82 | "libcom.android.tethering.connectivity_native", |
| 83 | "libnetd_updatable", |
| 84 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 85 | }, |
| 86 | both: { |
Remi NGUYEN VAN | c8aa43c | 2022-02-02 13:03:29 +0900 | [diff] [blame] | 87 | jni_libs: [ |
| 88 | "libframework-connectivity-jni", |
Aditya Choudhary | 01b5ede | 2024-01-31 11:08:57 +0000 | [diff] [blame] | 89 | "libframework-connectivity-tiramisu-jni", |
Remi NGUYEN VAN | c8aa43c | 2022-02-02 13:03:29 +0900 | [diff] [blame] | 90 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 91 | }, |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 92 | }, |
Hungming Chen | 378e323 | 2021-12-16 21:56:02 +0800 | [diff] [blame] | 93 | binaries: [ |
| 94 | "clatd", |
Maciej Żenczykowski | f36ccc7 | 2023-10-15 21:18:48 -0700 | [diff] [blame] | 95 | "ethtool", |
Maciej Żenczykowski | a2a3d75 | 2023-10-10 15:24:13 -0700 | [diff] [blame] | 96 | "netbpfload", |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 97 | "ot-daemon", |
Hungming Chen | 378e323 | 2021-12-16 21:56:02 +0800 | [diff] [blame] | 98 | ], |
Hungming Chen | f9d40ae | 2022-01-14 17:42:43 +0800 | [diff] [blame] | 99 | canned_fs_config: "canned_fs_config", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 100 | bpfs: [ |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 101 | "clatd.o", |
Ken Chen | 74ff3ee | 2022-07-14 16:46:39 +0800 | [diff] [blame] | 102 | "dscpPolicy.o", |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 103 | "netd.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 104 | "offload.o", |
Maciej Żenczykowski | 561fb4a | 2023-10-24 18:48:54 -0700 | [diff] [blame] | 105 | "offload@mainline.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 106 | "test.o", |
Maciej Żenczykowski | 561fb4a | 2023-10-24 18:48:54 -0700 | [diff] [blame] | 107 | "test@mainline.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 108 | ], |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 109 | apps: [ |
| 110 | "ServiceConnectivityResources", |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 111 | ], |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 112 | prebuilts: [ |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 113 | "current_sdkinfo", |
Maciej Żenczykowski | b4a1e87 | 2024-06-13 13:41:19 -0700 | [diff] [blame] | 114 | "netbpfload.33rc", |
Maciej Żenczykowski | 3218a81 | 2024-04-15 00:39:59 -0700 | [diff] [blame] | 115 | "netbpfload.35rc", |
Maciej Żenczykowski | bd1fd22 | 2024-08-29 19:42:38 -0700 | [diff] [blame] | 116 | "ot-daemon.34rc", |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 117 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 118 | manifest: "manifest.json", |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 119 | key: "com.android.tethering.key", |
Nikita Ioffe | 5f33357 | 2021-02-04 01:42:45 +0000 | [diff] [blame] | 120 | // Indicates that pre-installed version of this apex can be compressed. |
| 121 | // Whether it actually will be compressed is controlled on per-device basis. |
| 122 | compressible: true, |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 123 | |
| 124 | androidManifest: "AndroidManifest.xml", |
Taras Antoshchuk | 30d41e5 | 2021-08-02 18:06:35 +0200 | [diff] [blame] | 125 | |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 126 | compat_configs: [ |
| 127 | "connectivity-platform-compat-config", |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 128 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 129 | } |
| 130 | |
| 131 | apex_key { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 132 | name: "com.android.tethering.key", |
| 133 | public_key: "com.android.tethering.avbpubkey", |
| 134 | private_key: "com.android.tethering.pem", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 135 | } |
| 136 | |
| 137 | android_app_certificate { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 138 | name: "com.android.tethering.certificate", |
| 139 | certificate: "com.android.tethering", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 140 | } |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 141 | |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 142 | filegroup { |
| 143 | name: "connectivity-hiddenapi-files", |
Paul Duffin | c8164e4 | 2022-07-28 10:52:09 +0000 | [diff] [blame] | 144 | srcs: [ |
| 145 | ":connectivity-t-hiddenapi-files", |
| 146 | "hiddenapi/*.txt", |
| 147 | ], |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 148 | visibility: ["//packages/modules/Connectivity:__subpackages__"], |
| 149 | } |
| 150 | |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 151 | // Encapsulate the contributions made by the com.android.tethering to the bootclasspath. |
| 152 | bootclasspath_fragment { |
| 153 | name: "com.android.tethering-bootclasspath-fragment", |
| 154 | contents: [ |
| 155 | "framework-connectivity", |
paulhu | 699477a | 2022-02-08 21:25:28 +0800 | [diff] [blame] | 156 | "framework-connectivity-t", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 157 | "framework-tethering", |
| 158 | ], |
| 159 | apex_available: ["com.android.tethering"], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 160 | |
| 161 | // The bootclasspath_fragments that provide APIs on which this depends. |
| 162 | fragments: [ |
| 163 | { |
| 164 | apex: "com.android.art", |
| 165 | module: "art-bootclasspath-fragment", |
| 166 | }, |
| 167 | ], |
| 168 | |
| 169 | // Additional stubs libraries that this fragment's contents use which are |
| 170 | // not provided by another bootclasspath_fragment. |
| 171 | additional_stubs: [ |
| 172 | "android-non-updatable", |
| 173 | ], |
| 174 | |
| 175 | // Additional hidden API flag files to override the defaults. This must only be |
| 176 | // modified by the Soong or platform compat team. |
| 177 | hidden_api: { |
Remi NGUYEN VAN | 955c33c | 2021-12-16 15:10:40 +0000 | [diff] [blame] | 178 | max_target_o_low_priority: [ |
| 179 | "hiddenapi/hiddenapi-max-target-o-low-priority.txt", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 180 | ], |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 181 | unsupported: [ |
| 182 | "hiddenapi/hiddenapi-unsupported.txt", |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 183 | ], |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 184 | |
| 185 | // The following packages contain classes from other modules on the |
| 186 | // bootclasspath. That means that the hidden API flags for this module |
| 187 | // has to explicitly list every single class this module provides in |
| 188 | // that package to differentiate them from the classes provided by other |
| 189 | // modules. That can include private classes that are not part of the |
| 190 | // API. |
| 191 | split_packages: [ |
| 192 | "android.app.usage", |
| 193 | "android.nearby", |
| 194 | "android.net", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 195 | "android.net.http", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 196 | "android.net.netstats", |
| 197 | "android.net.util", |
| 198 | ], |
| 199 | |
| 200 | // The following packages and all their subpackages currently only |
| 201 | // contain classes from this bootclasspath_fragment. Listing a package |
| 202 | // here won't prevent other bootclasspath modules from adding classes in |
| 203 | // any of those packages but it will prevent them from adding those |
| 204 | // classes into an API surface, e.g. public, system, etc.. Doing so will |
| 205 | // result in a build failure due to inconsistent flags. |
| 206 | package_prefixes: [ |
| 207 | "android.nearby.aidl", |
Igor Zaslavsky | ec344f4 | 2023-08-08 04:28:45 +0000 | [diff] [blame] | 208 | "android.remoteauth.aidl", |
| 209 | "android.remoteauth", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 210 | "android.net.apf", |
| 211 | "android.net.connectivity", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 212 | "android.net.http.apihelpers", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 213 | "android.net.netstats.provider", |
| 214 | "android.net.nsd", |
Kangping Dong | 1cec48f | 2023-08-21 18:48:14 +0800 | [diff] [blame] | 215 | "android.net.thread", |
Igor Chernyshev | 9dac660 | 2022-12-13 19:28:32 -0800 | [diff] [blame] | 216 | "android.net.wear", |
Motomu Utsumi | 2fc1154 | 2024-08-15 12:34:15 +0900 | [diff] [blame] | 217 | "android.net.http.internal", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 218 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 219 | }, |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 220 | } |
| 221 | |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 222 | systemserverclasspath_fragment { |
| 223 | name: "com.android.tethering-systemserverclasspath-fragment", |
| 224 | standalone_contents: ["service-connectivity"], |
| 225 | apex_available: ["com.android.tethering"], |
| 226 | } |