blob: 9f67b39f33f2ef9ab027c3b3b60ca5e360dd38ab [file] [log] [blame]
markchien0abdd112019-11-28 10:17:03 +08001//
2// Copyright (C) 2019 The Android Open Source Project
3//
4// Licensed under the Apache License, Version 2.0 (the "License");
5// you may not use this file except in compliance with the License.
6// You may obtain a copy of the License at
7//
8// http://www.apache.org/licenses/LICENSE-2.0
9//
10// Unless required by applicable law or agreed to in writing, software
11// distributed under the License is distributed on an "AS IS" BASIS,
12// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13// See the License for the specific language governing permissions and
14// limitations under the License.
15//
16
Bob Badour97e6be22021-02-12 14:45:04 -080017package {
18 default_applicable_licenses: ["Android-Apache-2.0"],
19}
20
markchien598a75b2021-11-22 10:36:32 +080021// Defaults to enable/disable java targets which uses development APIs. "enabled" may have a
22// different value depending on the branch.
23java_defaults {
24 name: "ConnectivityNextEnableDefaults",
25 enabled: true,
26}
27apex_defaults {
28 name: "ConnectivityApexDefaults",
29 // Tethering app to include in the AOSP apex. Branches that disable the "next" targets may use
30 // a stable tethering app instead, but will generally override the AOSP apex to use updatable
31 // package names and keys, so that apex will be unused anyway.
32 apps: ["TetheringNext"], // Replace to "Tethering" if ConnectivityNextEnableDefaults is false.
33}
34// This is a placeholder comment to avoid merge conflicts
35// as the above target may have different "enabled" values
36// depending on the branch
37
markchien0abdd112019-11-28 10:17:03 +080038apex {
markchien8f831c02019-12-18 17:47:26 +080039 name: "com.android.tethering",
markchien598a75b2021-11-22 10:36:32 +080040 defaults: ["ConnectivityApexDefaults"],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090041 compile_multilib: "both",
42 updatable: true,
43 min_sdk_version: "30",
satayev8bb425a2021-05-12 13:28:58 +010044 bootclasspath_fragments: [
45 "com.android.tethering-bootclasspath-fragment",
46 ],
Jiakai Zhang86c139a2021-12-20 16:54:13 +000047 systemserverclasspath_fragments: [
48 "com.android.tethering-systemserverclasspath-fragment",
Remi NGUYEN VAN2812f602021-01-08 01:19:44 +000049 ],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090050 multilib: {
51 first: {
markchien8fb75e32021-11-11 17:53:56 +080052 jni_libs: [
53 "libservice-connectivity",
54 "libcom_android_connectivity_com_android_net_module_util_jni"
55 ],
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090056 },
57 both: {
58 jni_libs: ["libframework-connectivity-jni"],
Paul Duffinb28cb442021-05-26 10:46:20 +010059 },
Remi NGUYEN VAN6d575ca2021-01-13 15:44:38 +090060 },
Hungming Chen378e3232021-12-16 21:56:02 +080061 binaries: [
62 "clatd",
63 ],
Hungming Chenf9d40ae2022-01-14 17:42:43 +080064 canned_fs_config: "canned_fs_config",
Maciej Żenczykowskie9810ff2021-01-14 20:02:08 -080065 bpfs: [
66 "offload.o",
67 "test.o",
68 ],
Remi NGUYEN VANaffd94b2021-03-08 23:09:31 +090069 apps: [
70 "ServiceConnectivityResources",
Remi NGUYEN VANaffd94b2021-03-08 23:09:31 +090071 ],
Anton Hansson89eb55f2021-05-20 17:53:46 +010072 prebuilts: ["current_sdkinfo"],
markchien0abdd112019-11-28 10:17:03 +080073 manifest: "manifest.json",
markchien8f831c02019-12-18 17:47:26 +080074 key: "com.android.tethering.key",
Nikita Ioffe5f333572021-02-04 01:42:45 +000075 // Indicates that pre-installed version of this apex can be compressed.
76 // Whether it actually will be compressed is controlled on per-device basis.
77 compressible: true,
markchien0abdd112019-11-28 10:17:03 +080078
79 androidManifest: "AndroidManifest.xml",
80}
81
82apex_key {
markchien8f831c02019-12-18 17:47:26 +080083 name: "com.android.tethering.key",
84 public_key: "com.android.tethering.avbpubkey",
85 private_key: "com.android.tethering.pem",
markchien0abdd112019-11-28 10:17:03 +080086}
87
88android_app_certificate {
markchien8f831c02019-12-18 17:47:26 +080089 name: "com.android.tethering.certificate",
90 certificate: "com.android.tethering",
markchien0abdd112019-11-28 10:17:03 +080091}
markchiendbaff662020-05-05 17:42:44 +080092
satayev8bb425a2021-05-12 13:28:58 +010093// Encapsulate the contributions made by the com.android.tethering to the bootclasspath.
94bootclasspath_fragment {
95 name: "com.android.tethering-bootclasspath-fragment",
96 contents: [
97 "framework-connectivity",
98 "framework-tethering",
99 ],
100 apex_available: ["com.android.tethering"],
Paul Duffinb28cb442021-05-26 10:46:20 +0100101
102 // The bootclasspath_fragments that provide APIs on which this depends.
103 fragments: [
104 {
105 apex: "com.android.art",
106 module: "art-bootclasspath-fragment",
107 },
108 ],
109
110 // Additional stubs libraries that this fragment's contents use which are
111 // not provided by another bootclasspath_fragment.
112 additional_stubs: [
113 "android-non-updatable",
114 ],
115
116 // Additional hidden API flag files to override the defaults. This must only be
117 // modified by the Soong or platform compat team.
118 hidden_api: {
119 max_target_o_low_priority: ["hiddenapi/hiddenapi-max-target-o-low-priority.txt"],
120 unsupported: ["hiddenapi/hiddenapi-unsupported.txt"],
121 },
satayev8bb425a2021-05-12 13:28:58 +0100122}
123
Jiakai Zhang86c139a2021-12-20 16:54:13 +0000124systemserverclasspath_fragment {
125 name: "com.android.tethering-systemserverclasspath-fragment",
126 standalone_contents: ["service-connectivity"],
127 apex_available: ["com.android.tethering"],
128}
129
markchiendbaff662020-05-05 17:42:44 +0800130override_apex {
131 name: "com.android.tethering.inprocess",
132 base: "com.android.tethering",
133 package_name: "com.android.tethering.inprocess",
134 apps: [
Remi NGUYEN VANf0f0cca2021-03-12 15:04:29 +0000135 "ServiceConnectivityResources",
markchiendbaff662020-05-05 17:42:44 +0800136 "InProcessTethering",
137 ],
138}