blob: 5e8f2a86a352d8092e7ed7494913e000b8b1ea40 [file] [log] [blame]
markchien0abdd112019-11-28 10:17:03 +08001//
2// Copyright (C) 2019 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
16
Bob Badour97e6be22021-02-12 14:45:04 -080017package {
Aditya Choudhary985604c2024-01-31 11:08:57 +000018 default_team: "trendy_team_fwk_core_networking",
Bob Badour97e6be22021-02-12 14:45:04 -080019 default_applicable_licenses: ["Android-Apache-2.0"],
20}
21
markchien598a75b2021-11-22 10:36:32 +080022// Defaults to enable/disable java targets which uses development APIs. "enabled" may have a
23// different value depending on the branch.
24java_defaults {
25 name: "ConnectivityNextEnableDefaults",
Yuyang Huang892f3032023-08-25 13:10:52 +090026 enabled: false,
markchien598a75b2021-11-22 10:36:32 +080027}
Remi NGUYEN VAN02eee9a2023-01-30 19:19:48 +090028java_defaults {
29 name: "NetworkStackApiShimSettingsForCurrentBranch",
30 // API shims to include in the networking modules built from the branch. Branches that disable
31 // the "next" targets must use stable shims (latest stable API level) instead of current shims
32 // (X_current API level).
Yuyang Huang892f3032023-08-25 13:10:52 +090033 static_libs: ["NetworkStackApiStableShims"],
Remi NGUYEN VAN02eee9a2023-01-30 19:19:48 +090034}
markchien598a75b2021-11-22 10:36:32 +080035apex_defaults {
36 name: "ConnectivityApexDefaults",
37 // Tethering app to include in the AOSP apex. Branches that disable the "next" targets may use
38 // a stable tethering app instead, but will generally override the AOSP apex to use updatable
39 // package names and keys, so that apex will be unused anyway.
Yuyang Huang892f3032023-08-25 13:10:52 +090040 apps: ["Tethering"], // Replace to "Tethering" if ConnectivityNextEnableDefaults is false.
markchien598a75b2021-11-22 10:36:32 +080041}
Yuyang Huang892f3032023-08-25 13:10:52 +090042enable_tethering_next_apex = false
markchien598a75b2021-11-22 10:36:32 +080043// This is a placeholder comment to avoid merge conflicts
44// as the above target may have different "enabled" values
45// depending on the branch
46
Dan Stahre2be25f2023-01-16 18:02:30 +000047apex_defaults {
48 name: "CronetInTetheringApexDefaults",
Stefano Duo43d89f62023-03-15 16:11:52 +000049 jni_libs: [
Mohannad Farrag9c6801f2023-03-23 12:45:45 +000050 "cronet_aml_components_cronet_android_cronet",
Stefano Duo43d89f62023-03-15 16:11:52 +000051 "//external/cronet/third_party/boringssl:libcrypto",
52 "//external/cronet/third_party/boringssl:libssl",
53 ],
Dan Stahre2be25f2023-01-16 18:02:30 +000054 arch: {
55 riscv64: {
56 // TODO: remove this when there is a riscv64 libcronet
Stefano Duo43d89f62023-03-15 16:11:52 +000057 exclude_jni_libs: [
Mohannad Farrag9c6801f2023-03-23 12:45:45 +000058 "cronet_aml_components_cronet_android_cronet",
Stefano Duo43d89f62023-03-15 16:11:52 +000059 "//external/cronet/third_party/boringssl:libcrypto",
60 "//external/cronet/third_party/boringssl:libssl",
61 ],
Dan Stahre2be25f2023-01-16 18:02:30 +000062 },
63 },
64}
65
markchien0abdd112019-11-28 10:17:03 +080066apex {
markchien8f831c02019-12-18 17:47:26 +080067 name: "com.android.tethering",
Gurpreet Singha12858d2022-03-04 15:34:29 +000068 defaults: [
69 "ConnectivityApexDefaults",
Dan Stahre2be25f2023-01-16 18:02:30 +000070 "CronetInTetheringApexDefaults",
Gurpreet Singha12858d2022-03-04 15:34:29 +000071 "r-launched-apex-module",
72 ],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090073 compile_multilib: "both",
satayev8bb425a2021-05-12 13:28:58 +010074 bootclasspath_fragments: [
75 "com.android.tethering-bootclasspath-fragment",
76 ],
Jiakai Zhang9ecc66d2021-12-20 16:54:13 +000077 systemserverclasspath_fragments: [
78 "com.android.tethering-systemserverclasspath-fragment",
Remi NGUYEN VAN2812f602021-01-08 01:19:44 +000079 ],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090080 multilib: {
81 first: {
markchien8fb75e32021-11-11 17:53:56 +080082 jni_libs: [
83 "libservice-connectivity",
Kangping Dongb1c75db2023-08-30 19:15:04 +080084 "libservice-thread-jni",
Remi NGUYEN VAN6a20eed2022-01-31 11:21:08 +090085 "libandroid_net_connectivity_com_android_net_module_util_jni",
markchien8fb75e32021-11-11 17:53:56 +080086 ],
Remi NGUYEN VANfb70eba2022-04-04 20:26:16 +090087 native_shared_libs: [
Ken Chenec0f7ac2023-09-08 14:14:55 +080088 "libcom.android.tethering.dns_helper",
Remi NGUYEN VANfb70eba2022-04-04 20:26:16 +090089 "libcom.android.tethering.connectivity_native",
90 "libnetd_updatable",
91 ],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090092 },
93 both: {
Remi NGUYEN VANc8aa43c2022-02-02 13:03:29 +090094 jni_libs: [
95 "libframework-connectivity-jni",
Aditya Choudhary985604c2024-01-31 11:08:57 +000096 "libframework-connectivity-tiramisu-jni",
Remi NGUYEN VANc8aa43c2022-02-02 13:03:29 +090097 ],
Paul Duffinb28cb442021-05-26 10:46:20 +010098 },
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090099 },
Hungming Chen378e3232021-12-16 21:56:02 +0800100 binaries: [
101 "clatd",
Maciej Żenczykowskif36ccc72023-10-15 21:18:48 -0700102 "ethtool",
Maciej Żenczykowskia2a3d752023-10-10 15:24:13 -0700103 "netbpfload",
Kangping Dongf2060612023-08-28 21:54:35 +0800104 "ot-daemon",
Hungming Chen378e3232021-12-16 21:56:02 +0800105 ],
Hungming Chenf9d40ae2022-01-14 17:42:43 +0800106 canned_fs_config: "canned_fs_config",
Maciej Żenczykowskie9810ff2021-01-14 20:02:08 -0800107 bpfs: [
Tyler Wearb37f5512021-10-01 13:22:00 -0700108 "block.o",
Maciej Żenczykowskid72a5a72022-05-02 00:43:51 -0700109 "clatd.o",
Ken Chen74ff3ee2022-07-14 16:46:39 +0800110 "dscpPolicy.o",
Maciej Żenczykowskid72a5a72022-05-02 00:43:51 -0700111 "netd.o",
Maciej Żenczykowskie9810ff2021-01-14 20:02:08 -0800112 "offload.o",
Maciej Żenczykowski07d30132022-04-23 12:33:32 -0700113 "offload@btf.o",
Maciej Żenczykowskie9810ff2021-01-14 20:02:08 -0800114 "test.o",
Maciej Żenczykowski07d30132022-04-23 12:33:32 -0700115 "test@btf.o",
Maciej Żenczykowskie9810ff2021-01-14 20:02:08 -0800116 ],
Remi NGUYEN VANaffd94b2021-03-08 23:09:31 +0900117 apps: [
118 "ServiceConnectivityResources",
Remi NGUYEN VANaffd94b2021-03-08 23:09:31 +0900119 ],
Kangping Dongf2060612023-08-28 21:54:35 +0800120 prebuilts: [
Kangping Dongf2060612023-08-28 21:54:35 +0800121 "current_sdkinfo",
Maciej Żenczykowski041be522023-10-23 23:34:52 -0700122 "netbpfload.mainline.rc",
123 "ot-daemon.init.34rc",
Kangping Dongf2060612023-08-28 21:54:35 +0800124 ],
markchien0abdd112019-11-28 10:17:03 +0800125 manifest: "manifest.json",
markchien8f831c02019-12-18 17:47:26 +0800126 key: "com.android.tethering.key",
Nikita Ioffe5f333572021-02-04 01:42:45 +0000127 // Indicates that pre-installed version of this apex can be compressed.
128 // Whether it actually will be compressed is controlled on per-device basis.
129 compressible: true,
markchien0abdd112019-11-28 10:17:03 +0800130
131 androidManifest: "AndroidManifest.xml",
Taras Antoshchuk30d41e52021-08-02 18:06:35 +0200132
Remi NGUYEN VAN348bbb02022-07-19 16:33:04 +0900133 compat_configs: [
134 "connectivity-platform-compat-config",
Remi NGUYEN VAN348bbb02022-07-19 16:33:04 +0900135 ],
markchien0abdd112019-11-28 10:17:03 +0800136}
137
138apex_key {
markchien8f831c02019-12-18 17:47:26 +0800139 name: "com.android.tethering.key",
140 public_key: "com.android.tethering.avbpubkey",
141 private_key: "com.android.tethering.pem",
markchien0abdd112019-11-28 10:17:03 +0800142}
143
144android_app_certificate {
markchien8f831c02019-12-18 17:47:26 +0800145 name: "com.android.tethering.certificate",
146 certificate: "com.android.tethering",
markchien0abdd112019-11-28 10:17:03 +0800147}
markchiendbaff662020-05-05 17:42:44 +0800148
Remi NGUYEN VANe55a88d2022-04-20 15:59:16 +0900149filegroup {
150 name: "connectivity-hiddenapi-files",
Paul Duffinc8164e42022-07-28 10:52:09 +0000151 srcs: [
152 ":connectivity-t-hiddenapi-files",
153 "hiddenapi/*.txt",
154 ],
Remi NGUYEN VANe55a88d2022-04-20 15:59:16 +0900155 visibility: ["//packages/modules/Connectivity:__subpackages__"],
156}
157
satayev8bb425a2021-05-12 13:28:58 +0100158// Encapsulate the contributions made by the com.android.tethering to the bootclasspath.
159bootclasspath_fragment {
160 name: "com.android.tethering-bootclasspath-fragment",
161 contents: [
162 "framework-connectivity",
paulhu699477a2022-02-08 21:25:28 +0800163 "framework-connectivity-t",
satayev8bb425a2021-05-12 13:28:58 +0100164 "framework-tethering",
165 ],
166 apex_available: ["com.android.tethering"],
Paul Duffinb28cb442021-05-26 10:46:20 +0100167
168 // The bootclasspath_fragments that provide APIs on which this depends.
169 fragments: [
170 {
171 apex: "com.android.art",
172 module: "art-bootclasspath-fragment",
173 },
174 ],
175
176 // Additional stubs libraries that this fragment's contents use which are
177 // not provided by another bootclasspath_fragment.
178 additional_stubs: [
179 "android-non-updatable",
180 ],
181
182 // Additional hidden API flag files to override the defaults. This must only be
183 // modified by the Soong or platform compat team.
184 hidden_api: {
Remi NGUYEN VAN955c33c2021-12-16 15:10:40 +0000185 max_target_o_low_priority: [
186 "hiddenapi/hiddenapi-max-target-o-low-priority.txt",
Paul Duffin8be17642022-03-10 17:44:54 +0000187 ],
Junyu Lai2ef865e2022-01-17 11:52:57 +0000188 unsupported: [
189 "hiddenapi/hiddenapi-unsupported.txt",
Junyu Lai2ef865e2022-01-17 11:52:57 +0000190 ],
Paul Duffin8be17642022-03-10 17:44:54 +0000191
192 // The following packages contain classes from other modules on the
193 // bootclasspath. That means that the hidden API flags for this module
194 // has to explicitly list every single class this module provides in
195 // that package to differentiate them from the classes provided by other
196 // modules. That can include private classes that are not part of the
197 // API.
198 split_packages: [
199 "android.app.usage",
200 "android.nearby",
201 "android.net",
Dan Stahre2be25f2023-01-16 18:02:30 +0000202 "android.net.http",
Paul Duffin8be17642022-03-10 17:44:54 +0000203 "android.net.netstats",
204 "android.net.util",
205 ],
206
207 // The following packages and all their subpackages currently only
208 // contain classes from this bootclasspath_fragment. Listing a package
209 // here won't prevent other bootclasspath modules from adding classes in
210 // any of those packages but it will prevent them from adding those
211 // classes into an API surface, e.g. public, system, etc.. Doing so will
212 // result in a build failure due to inconsistent flags.
213 package_prefixes: [
214 "android.nearby.aidl",
Igor Zaslavskyec344f42023-08-08 04:28:45 +0000215 "android.remoteauth.aidl",
216 "android.remoteauth",
Paul Duffin8be17642022-03-10 17:44:54 +0000217 "android.net.apf",
218 "android.net.connectivity",
Dan Stahre2be25f2023-01-16 18:02:30 +0000219 "android.net.http.apihelpers",
Paul Duffin8be17642022-03-10 17:44:54 +0000220 "android.net.netstats.provider",
221 "android.net.nsd",
Kangping Dong1cec48f2023-08-21 18:48:14 +0800222 "android.net.thread",
Igor Chernyshev9dac6602022-12-13 19:28:32 -0800223 "android.net.wear",
Paul Duffin8be17642022-03-10 17:44:54 +0000224 ],
Paul Duffinb28cb442021-05-26 10:46:20 +0100225 },
satayev8bb425a2021-05-12 13:28:58 +0100226}
227
Jiakai Zhang9ecc66d2021-12-20 16:54:13 +0000228systemserverclasspath_fragment {
229 name: "com.android.tethering-systemserverclasspath-fragment",
230 standalone_contents: ["service-connectivity"],
231 apex_available: ["com.android.tethering"],
232}