markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 1 | // |
| 2 | // Copyright (C) 2019 The Android Open Source Project |
| 3 | // |
| 4 | // Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | // you may not use this file except in compliance with the License. |
| 6 | // You may obtain a copy of the License at |
| 7 | // |
| 8 | // http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | // |
| 10 | // Unless required by applicable law or agreed to in writing, software |
| 11 | // distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | // See the License for the specific language governing permissions and |
| 14 | // limitations under the License. |
| 15 | // |
| 16 | |
Bob Badour | 97e6be2 | 2021-02-12 14:45:04 -0800 | [diff] [blame] | 17 | package { |
| 18 | default_applicable_licenses: ["Android-Apache-2.0"], |
| 19 | } |
| 20 | |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 21 | // Defaults to enable/disable java targets which uses development APIs. "enabled" may have a |
| 22 | // different value depending on the branch. |
| 23 | java_defaults { |
| 24 | name: "ConnectivityNextEnableDefaults", |
| 25 | enabled: true, |
| 26 | } |
Remi NGUYEN VAN | 02eee9a | 2023-01-30 19:19:48 +0900 | [diff] [blame] | 27 | java_defaults { |
| 28 | name: "NetworkStackApiShimSettingsForCurrentBranch", |
| 29 | // API shims to include in the networking modules built from the branch. Branches that disable |
| 30 | // the "next" targets must use stable shims (latest stable API level) instead of current shims |
| 31 | // (X_current API level). |
| 32 | static_libs: ["NetworkStackApiCurrentShims"], |
| 33 | } |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 34 | apex_defaults { |
| 35 | name: "ConnectivityApexDefaults", |
| 36 | // Tethering app to include in the AOSP apex. Branches that disable the "next" targets may use |
| 37 | // a stable tethering app instead, but will generally override the AOSP apex to use updatable |
| 38 | // package names and keys, so that apex will be unused anyway. |
| 39 | apps: ["TetheringNext"], // Replace to "Tethering" if ConnectivityNextEnableDefaults is false. |
| 40 | } |
Remi NGUYEN VAN | f24553d | 2022-01-27 13:16:12 +0900 | [diff] [blame] | 41 | enable_tethering_next_apex = true |
markchien | 598a75b | 2021-11-22 10:36:32 +0800 | [diff] [blame] | 42 | // This is a placeholder comment to avoid merge conflicts |
| 43 | // as the above target may have different "enabled" values |
| 44 | // depending on the branch |
| 45 | |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 46 | apex_defaults { |
| 47 | name: "CronetInTetheringApexDefaults", |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 48 | jni_libs: [ |
Mohannad Farrag | 9c6801f | 2023-03-23 12:45:45 +0000 | [diff] [blame] | 49 | "cronet_aml_components_cronet_android_cronet", |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 50 | "//external/cronet/third_party/boringssl:libcrypto", |
| 51 | "//external/cronet/third_party/boringssl:libssl", |
| 52 | ], |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 53 | arch: { |
| 54 | riscv64: { |
| 55 | // TODO: remove this when there is a riscv64 libcronet |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 56 | exclude_jni_libs: [ |
Mohannad Farrag | 9c6801f | 2023-03-23 12:45:45 +0000 | [diff] [blame] | 57 | "cronet_aml_components_cronet_android_cronet", |
Stefano Duo | 43d89f6 | 2023-03-15 16:11:52 +0000 | [diff] [blame] | 58 | "//external/cronet/third_party/boringssl:libcrypto", |
| 59 | "//external/cronet/third_party/boringssl:libssl", |
| 60 | ], |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 61 | }, |
| 62 | }, |
| 63 | } |
| 64 | |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 65 | apex { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 66 | name: "com.android.tethering", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 67 | defaults: [ |
| 68 | "ConnectivityApexDefaults", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 69 | "CronetInTetheringApexDefaults", |
Gurpreet Singh | a12858d | 2022-03-04 15:34:29 +0000 | [diff] [blame] | 70 | "r-launched-apex-module", |
| 71 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 72 | compile_multilib: "both", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 73 | bootclasspath_fragments: [ |
| 74 | "com.android.tethering-bootclasspath-fragment", |
| 75 | ], |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 76 | systemserverclasspath_fragments: [ |
| 77 | "com.android.tethering-systemserverclasspath-fragment", |
Remi NGUYEN VAN | 2812f60 | 2021-01-08 01:19:44 +0000 | [diff] [blame] | 78 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 79 | multilib: { |
| 80 | first: { |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 81 | jni_libs: [ |
| 82 | "libservice-connectivity", |
Kangping Dong | b1c75db | 2023-08-30 19:15:04 +0800 | [diff] [blame^] | 83 | "libservice-thread-jni", |
Remi NGUYEN VAN | 6a20eed | 2022-01-31 11:21:08 +0900 | [diff] [blame] | 84 | "libandroid_net_connectivity_com_android_net_module_util_jni", |
markchien | 8fb75e3 | 2021-11-11 17:53:56 +0800 | [diff] [blame] | 85 | ], |
Remi NGUYEN VAN | fb70eba | 2022-04-04 20:26:16 +0900 | [diff] [blame] | 86 | native_shared_libs: [ |
Ken Chen | ec0f7ac | 2023-09-08 14:14:55 +0800 | [diff] [blame] | 87 | "libcom.android.tethering.dns_helper", |
Remi NGUYEN VAN | fb70eba | 2022-04-04 20:26:16 +0900 | [diff] [blame] | 88 | "libcom.android.tethering.connectivity_native", |
| 89 | "libnetd_updatable", |
| 90 | ], |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 91 | }, |
| 92 | both: { |
Remi NGUYEN VAN | c8aa43c | 2022-02-02 13:03:29 +0900 | [diff] [blame] | 93 | jni_libs: [ |
| 94 | "libframework-connectivity-jni", |
| 95 | "libframework-connectivity-tiramisu-jni" |
| 96 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 97 | }, |
Remi NGUYEN VAN | 6d575ca | 2021-01-13 15:44:38 +0900 | [diff] [blame] | 98 | }, |
Hungming Chen | 378e323 | 2021-12-16 21:56:02 +0800 | [diff] [blame] | 99 | binaries: [ |
| 100 | "clatd", |
Maciej Żenczykowski | f36ccc7 | 2023-10-15 21:18:48 -0700 | [diff] [blame] | 101 | "ethtool", |
Maciej Żenczykowski | a2a3d75 | 2023-10-10 15:24:13 -0700 | [diff] [blame] | 102 | "netbpfload", |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 103 | "ot-daemon", |
Hungming Chen | 378e323 | 2021-12-16 21:56:02 +0800 | [diff] [blame] | 104 | ], |
Hungming Chen | f9d40ae | 2022-01-14 17:42:43 +0800 | [diff] [blame] | 105 | canned_fs_config: "canned_fs_config", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 106 | bpfs: [ |
Tyler Wear | b37f551 | 2021-10-01 13:22:00 -0700 | [diff] [blame] | 107 | "block.o", |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 108 | "clatd.o", |
Ken Chen | 74ff3ee | 2022-07-14 16:46:39 +0800 | [diff] [blame] | 109 | "dscpPolicy.o", |
Maciej Żenczykowski | d72a5a7 | 2022-05-02 00:43:51 -0700 | [diff] [blame] | 110 | "netd.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 111 | "offload.o", |
Maciej Żenczykowski | 07d3013 | 2022-04-23 12:33:32 -0700 | [diff] [blame] | 112 | "offload@btf.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 113 | "test.o", |
Maciej Żenczykowski | 07d3013 | 2022-04-23 12:33:32 -0700 | [diff] [blame] | 114 | "test@btf.o", |
Maciej Żenczykowski | e9810ff | 2021-01-14 20:02:08 -0800 | [diff] [blame] | 115 | ], |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 116 | apps: [ |
| 117 | "ServiceConnectivityResources", |
Remi NGUYEN VAN | affd94b | 2021-03-08 23:09:31 +0900 | [diff] [blame] | 118 | ], |
Kangping Dong | f206061 | 2023-08-28 21:54:35 +0800 | [diff] [blame] | 119 | prebuilts: [ |
| 120 | "ot-daemon.init.34rc", |
| 121 | "current_sdkinfo", |
| 122 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 123 | manifest: "manifest.json", |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 124 | key: "com.android.tethering.key", |
Nikita Ioffe | 5f33357 | 2021-02-04 01:42:45 +0000 | [diff] [blame] | 125 | // Indicates that pre-installed version of this apex can be compressed. |
| 126 | // Whether it actually will be compressed is controlled on per-device basis. |
| 127 | compressible: true, |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 128 | |
| 129 | androidManifest: "AndroidManifest.xml", |
Taras Antoshchuk | 30d41e5 | 2021-08-02 18:06:35 +0200 | [diff] [blame] | 130 | |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 131 | compat_configs: [ |
| 132 | "connectivity-platform-compat-config", |
Remi NGUYEN VAN | 348bbb0 | 2022-07-19 16:33:04 +0900 | [diff] [blame] | 133 | ], |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 134 | } |
| 135 | |
| 136 | apex_key { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 137 | name: "com.android.tethering.key", |
| 138 | public_key: "com.android.tethering.avbpubkey", |
| 139 | private_key: "com.android.tethering.pem", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 140 | } |
| 141 | |
| 142 | android_app_certificate { |
markchien | 8f831c0 | 2019-12-18 17:47:26 +0800 | [diff] [blame] | 143 | name: "com.android.tethering.certificate", |
| 144 | certificate: "com.android.tethering", |
markchien | 0abdd11 | 2019-11-28 10:17:03 +0800 | [diff] [blame] | 145 | } |
markchien | dbaff66 | 2020-05-05 17:42:44 +0800 | [diff] [blame] | 146 | |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 147 | filegroup { |
| 148 | name: "connectivity-hiddenapi-files", |
Paul Duffin | c8164e4 | 2022-07-28 10:52:09 +0000 | [diff] [blame] | 149 | srcs: [ |
| 150 | ":connectivity-t-hiddenapi-files", |
| 151 | "hiddenapi/*.txt", |
| 152 | ], |
Remi NGUYEN VAN | e55a88d | 2022-04-20 15:59:16 +0900 | [diff] [blame] | 153 | visibility: ["//packages/modules/Connectivity:__subpackages__"], |
| 154 | } |
| 155 | |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 156 | // Encapsulate the contributions made by the com.android.tethering to the bootclasspath. |
| 157 | bootclasspath_fragment { |
| 158 | name: "com.android.tethering-bootclasspath-fragment", |
| 159 | contents: [ |
| 160 | "framework-connectivity", |
paulhu | 699477a | 2022-02-08 21:25:28 +0800 | [diff] [blame] | 161 | "framework-connectivity-t", |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 162 | "framework-tethering", |
| 163 | ], |
| 164 | apex_available: ["com.android.tethering"], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 165 | |
| 166 | // The bootclasspath_fragments that provide APIs on which this depends. |
| 167 | fragments: [ |
| 168 | { |
| 169 | apex: "com.android.art", |
| 170 | module: "art-bootclasspath-fragment", |
| 171 | }, |
| 172 | ], |
| 173 | |
| 174 | // Additional stubs libraries that this fragment's contents use which are |
| 175 | // not provided by another bootclasspath_fragment. |
| 176 | additional_stubs: [ |
| 177 | "android-non-updatable", |
| 178 | ], |
| 179 | |
| 180 | // Additional hidden API flag files to override the defaults. This must only be |
| 181 | // modified by the Soong or platform compat team. |
| 182 | hidden_api: { |
Remi NGUYEN VAN | 955c33c | 2021-12-16 15:10:40 +0000 | [diff] [blame] | 183 | max_target_o_low_priority: [ |
| 184 | "hiddenapi/hiddenapi-max-target-o-low-priority.txt", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 185 | ], |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 186 | unsupported: [ |
| 187 | "hiddenapi/hiddenapi-unsupported.txt", |
Junyu Lai | 2ef865e | 2022-01-17 11:52:57 +0000 | [diff] [blame] | 188 | ], |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 189 | |
| 190 | // The following packages contain classes from other modules on the |
| 191 | // bootclasspath. That means that the hidden API flags for this module |
| 192 | // has to explicitly list every single class this module provides in |
| 193 | // that package to differentiate them from the classes provided by other |
| 194 | // modules. That can include private classes that are not part of the |
| 195 | // API. |
| 196 | split_packages: [ |
| 197 | "android.app.usage", |
| 198 | "android.nearby", |
| 199 | "android.net", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 200 | "android.net.http", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 201 | "android.net.netstats", |
| 202 | "android.net.util", |
| 203 | ], |
| 204 | |
| 205 | // The following packages and all their subpackages currently only |
| 206 | // contain classes from this bootclasspath_fragment. Listing a package |
| 207 | // here won't prevent other bootclasspath modules from adding classes in |
| 208 | // any of those packages but it will prevent them from adding those |
| 209 | // classes into an API surface, e.g. public, system, etc.. Doing so will |
| 210 | // result in a build failure due to inconsistent flags. |
| 211 | package_prefixes: [ |
| 212 | "android.nearby.aidl", |
Igor Zaslavsky | ec344f4 | 2023-08-08 04:28:45 +0000 | [diff] [blame] | 213 | "android.remoteauth.aidl", |
| 214 | "android.remoteauth", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 215 | "android.net.apf", |
| 216 | "android.net.connectivity", |
Dan Stahr | e2be25f | 2023-01-16 18:02:30 +0000 | [diff] [blame] | 217 | "android.net.http.apihelpers", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 218 | "android.net.netstats.provider", |
| 219 | "android.net.nsd", |
Kangping Dong | 1cec48f | 2023-08-21 18:48:14 +0800 | [diff] [blame] | 220 | "android.net.thread", |
Igor Chernyshev | 9dac660 | 2022-12-13 19:28:32 -0800 | [diff] [blame] | 221 | "android.net.wear", |
Paul Duffin | 8be1764 | 2022-03-10 17:44:54 +0000 | [diff] [blame] | 222 | ], |
Paul Duffin | b28cb44 | 2021-05-26 10:46:20 +0100 | [diff] [blame] | 223 | }, |
satayev | 8bb425a | 2021-05-12 13:28:58 +0100 | [diff] [blame] | 224 | } |
| 225 | |
Jiakai Zhang | 9ecc66d | 2021-12-20 16:54:13 +0000 | [diff] [blame] | 226 | systemserverclasspath_fragment { |
| 227 | name: "com.android.tethering-systemserverclasspath-fragment", |
| 228 | standalone_contents: ["service-connectivity"], |
| 229 | apex_available: ["com.android.tethering"], |
| 230 | } |