Convert selinux_policy_nonsystem to Android.bp
Bug: 350881031
Test: m selinux_policy_nonsystem
Change-Id: I4355101a60637e24643e78b1148f0f58c3d23a21
diff --git a/Android.bp b/Android.bp
index 325cc17..9ef7e5a 100644
--- a/Android.bp
+++ b/Android.bp
@@ -1040,3 +1040,49 @@
],
}),
}
+
+phony {
+ name: "selinux_policy_nonsystem",
+ required: [
+ "plat_pub_versioned.cil",
+ "vendor_sepolicy.cil",
+ "plat_sepolicy_vers.txt",
+ "vendor_file_contexts",
+ "vendor_file_contexts_test",
+ "vendor_keystore2_key_contexts",
+ "vendor_mac_permissions.xml",
+ "vendor_property_contexts",
+ "vendor_property_contexts_test",
+ "vendor_seapp_contexts",
+ "vendor_service_contexts",
+ "vendor_service_contexts_test",
+ "vendor_hwservice_contexts",
+ "vendor_hwservice_contexts_test",
+ "vendor_bug_map",
+ "vndservice_contexts",
+ "vndservice_contexts_test",
+ "odm_sepolicy.cil",
+ "odm_file_contexts",
+ "odm_file_contexts_test",
+ "odm_seapp_contexts",
+ "odm_property_contexts",
+ "odm_property_contexts_test",
+ "odm_service_contexts",
+ "odm_service_contexts_test",
+ "odm_hwservice_contexts",
+ "odm_hwservice_contexts_test",
+ "odm_mac_permissions.xml",
+ "selinux_policy_system_ext",
+ "selinux_policy_product",
+ // Builds an additional userdebug sepolicy into the debug ramdisk.
+ "userdebug_plat_sepolicy.cil",
+ ] + select(soong_config_variable("ANDROID", "PRODUCT_PRECOMPILED_SEPOLICY"), {
+ true: [
+ "precompiled_sepolicy",
+ "precompiled_sepolicy.plat_sepolicy_and_mapping.sha256",
+ "precompiled_sepolicy.system_ext_sepolicy_and_mapping.sha256",
+ "precompiled_sepolicy.product_sepolicy_and_mapping.sha256",
+ ],
+ default: [],
+ }),
+}
diff --git a/Android.mk b/Android.mk
index 7dcbf6b..6655919 100644
--- a/Android.mk
+++ b/Android.mk
@@ -261,78 +261,6 @@
include $(BUILD_PHONY_PACKAGE)
-#################################
-
-include $(CLEAR_VARS)
-
-LOCAL_MODULE := selinux_policy_nonsystem
-LOCAL_LICENSE_KINDS := SPDX-license-identifier-Apache-2.0 legacy_unencumbered
-LOCAL_LICENSE_CONDITIONS := notice unencumbered
-LOCAL_NOTICE_FILE := $(LOCAL_PATH)/NOTICE
-# Include precompiled policy, unless told otherwise.
-ifneq ($(PRODUCT_PRECOMPILED_SEPOLICY),false)
-LOCAL_REQUIRED_MODULES += \
- precompiled_sepolicy \
- precompiled_sepolicy.plat_sepolicy_and_mapping.sha256
-
-ifdef HAS_SYSTEM_EXT_SEPOLICY
-LOCAL_REQUIRED_MODULES += precompiled_sepolicy.system_ext_sepolicy_and_mapping.sha256
-endif
-
-ifdef HAS_PRODUCT_SEPOLICY
-LOCAL_REQUIRED_MODULES += precompiled_sepolicy.product_sepolicy_and_mapping.sha256
-endif
-
-endif # ($(PRODUCT_PRECOMPILED_SEPOLICY),false)
-
-
-# These build targets are not used on non-Treble devices. However, we build these to avoid
-# divergence between Treble and non-Treble devices.
-LOCAL_REQUIRED_MODULES += \
- plat_pub_versioned.cil \
- vendor_sepolicy.cil \
- plat_sepolicy_vers.txt \
-
-LOCAL_REQUIRED_MODULES += \
- vendor_file_contexts \
- vendor_file_contexts_test \
- vendor_keystore2_key_contexts \
- vendor_mac_permissions.xml \
- vendor_property_contexts \
- vendor_property_contexts_test \
- vendor_seapp_contexts \
- vendor_service_contexts \
- vendor_service_contexts_test \
- vendor_hwservice_contexts \
- vendor_hwservice_contexts_test \
- vendor_bug_map \
- vndservice_contexts \
- vndservice_contexts_test \
-
-ifdef BOARD_ODM_SEPOLICY_DIRS
-LOCAL_REQUIRED_MODULES += \
- odm_sepolicy.cil \
- odm_file_contexts \
- odm_file_contexts_test \
- odm_seapp_contexts \
- odm_property_contexts \
- odm_property_contexts_test \
- odm_service_contexts \
- odm_service_contexts_test \
- odm_hwservice_contexts \
- odm_hwservice_contexts_test \
- odm_mac_permissions.xml
-endif
-
-LOCAL_REQUIRED_MODULES += selinux_policy_system_ext
-LOCAL_REQUIRED_MODULES += selinux_policy_product
-
-# Builds an addtional userdebug sepolicy into the debug ramdisk.
-LOCAL_REQUIRED_MODULES += \
- userdebug_plat_sepolicy.cil \
-
-include $(BUILD_PHONY_PACKAGE)
-
##################################
# Policy files are now built with Android.bp. Grab them from intermediate.
# See Android.bp for details of policy files.