Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
A
AndroidSystemSEPolicy
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Releases
Container registry
Model registry
Analyze
Contributor analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Werner Sembach
AndroidSystemSEPolicy
Commits
905c8133
Commit
905c8133
authored
8 years ago
by
dcashman
Committed by
android-build-merger
8 years ago
Browse files
Options
Downloads
Plain Diff
Split mac_permissions.xml into plat and non-plat components. am:
90b3b948
am:
e33de6a8
Change-Id: Icae7ddef1df97f469317438f63dd3613a87f5545
parents
c6bcdbdf
e33de6a8
Branches
Branches containing commit
Tags
Tags containing commit
No related merge requests found
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
Android.mk
+40
-10
40 additions, 10 deletions
Android.mk
reqd_mask/keys.conf
+2
-0
2 additions, 0 deletions
reqd_mask/keys.conf
reqd_mask/mac_permissions.xml
+3
-0
3 additions, 0 deletions
reqd_mask/mac_permissions.xml
with
45 additions
and
10 deletions
Android.mk
+
40
−
10
View file @
905c8133
...
...
@@ -706,7 +706,7 @@ general_service_contexts.tmp :=
##################################
include
$(CLEAR_VARS)
LOCAL_MODULE
:=
mac_permissions.xml
LOCAL_MODULE
:=
plat_
mac_permissions.xml
LOCAL_MODULE_CLASS
:=
ETC
LOCAL_MODULE_TAGS
:=
optional
LOCAL_MODULE_PATH
:=
$(
TARGET_OUT_ETC
)
/security
...
...
@@ -714,26 +714,56 @@ LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/security
include
$(BUILD_SYSTEM)/base_rules.mk
# Build keys.conf
mac_perms_keys.tmp
:=
$(
intermediates
)
/keys.tmp
$(mac_perms_keys.tmp)
:
PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
$(mac_perms_keys.tmp)
:
$(call build_policy
,
keys.conf
,
$(PLAT_PRIVATE_POLICY)
$(BOARD_SEPOLICY_DIRS)
)
plat_
mac_perms_keys.tmp
:=
$(
intermediates
)
/
plat_
keys.tmp
$(
plat_
mac_perms_keys.tmp)
:
PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
$(
plat_
mac_perms_keys.tmp)
:
$(call build_policy
,
keys.conf
,
$(PLAT_PRIVATE_POLICY))
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
m4
-s
$(
PRIVATE_ADDITIONAL_M4DEFS
)
$^
>
$@
all_mac_perms_files
:=
$(
call build_policy,
$(
LOCAL_MODULE
)
,
$(
PLAT_PRIVATE_POLICY
)
$(
BOARD_SEPOLICY_DIRS
)
)
all_
plat_
mac_perms_files
:=
$(
call build_policy,
mac_permissions.xml
,
$(
PLAT_PRIVATE_POLICY
))
# Should be synced with keys.conf.
all_keys
:=
platform media shared testkey
all_keys
:=
$(
all_keys:%
=
$(
dir
$(
DEFAULT_SYSTEM_DEV_CERTIFICATE
))
/%.x509.pem
)
all_
plat_
keys
:=
platform media shared testkey
all_
plat_
keys
:=
$(
all_keys:%
=
$(
dir
$(
DEFAULT_SYSTEM_DEV_CERTIFICATE
))
/%.x509.pem
)
$(LOCAL_BUILT_MODULE)
:
PRIVATE_MAC_PERMS_FILES := $(all_mac_perms_files)
$(LOCAL_BUILT_MODULE)
:
$(mac_perms_keys.tmp) $(HOST_OUT_EXECUTABLES)/insertkeys.py $(all_mac_perms_files) $(all_keys)
$(LOCAL_BUILT_MODULE)
:
PRIVATE_MAC_PERMS_FILES := $(all_plat_mac_perms_files)
$(LOCAL_BUILT_MODULE)
:
$(plat_mac_perms_keys.tmp) $(HOST_OUT_EXECUTABLES)/insertkeys.py
\
$(all_plat_mac_perms_files) $(all_plat_keys)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
DEFAULT_SYSTEM_DEV_CERTIFICATE
=
"
$(
dir
$(
DEFAULT_SYSTEM_DEV_CERTIFICATE
))
"
\
$(
HOST_OUT_EXECUTABLES
)
/insertkeys.py
-t
$(
TARGET_BUILD_VARIANT
)
-c
$(
TOP
)
$<
-o
$@
$(
PRIVATE_MAC_PERMS_FILES
)
mac_perms_keys.tmp
:=
all_mac_perms_files
:=
all_plat_keys
:=
plat_mac_perms_keys.tmp
:=
##################################
include
$(CLEAR_VARS)
LOCAL_MODULE
:=
nonplat_mac_permissions.xml
LOCAL_MODULE_CLASS
:=
ETC
LOCAL_MODULE_TAGS
:=
optional
LOCAL_MODULE_PATH
:=
$(
TARGET_OUT_ETC
)
/security
include
$(BUILD_SYSTEM)/base_rules.mk
# Build keys.conf
nonplat_mac_perms_keys.tmp
:=
$(
intermediates
)
/nonplat_keys.tmp
$(nonplat_mac_perms_keys.tmp)
:
PRIVATE_ADDITIONAL_M4DEFS := $(LOCAL_ADDITIONAL_M4DEFS)
$(nonplat_mac_perms_keys.tmp)
:
$(call build_policy
,
keys.conf
,
$(BOARD_SEPOLICY_DIRS) $(REQD_MASK_POLICY))
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
m4
-s
$(
PRIVATE_ADDITIONAL_M4DEFS
)
$^
>
$@
all_nonplat_mac_perms_files
:=
$(
call build_policy, mac_permissions.xml,
$(
BOARD_SEPOLICY_DIRS
)
$(
REQD_MASK_POLICY
))
$(LOCAL_BUILT_MODULE)
:
PRIVATE_MAC_PERMS_FILES := $(all_nonplat_mac_perms_files)
$(LOCAL_BUILT_MODULE)
:
$(nonplat_mac_perms_keys.tmp) $(HOST_OUT_EXECUTABLES)/insertkeys.py
\
$(all_nonplat_mac_perms_files)
@
mkdir
-p
$(
dir
$@
)
$(
hide
)
$(
HOST_OUT_EXECUTABLES
)
/insertkeys.py
-t
$(
TARGET_BUILD_VARIANT
)
-c
$(
TOP
)
$<
-o
$@
$(
PRIVATE_MAC_PERMS_FILES
)
nonplat_mac_perms_keys.tmp
:=
all_nonplat_mac_perms_files
:=
##################################
include
$(CLEAR_VARS)
...
...
This diff is collapsed.
Click to expand it.
reqd_mask/keys.conf
0 → 100644
+
2
−
0
View file @
905c8133
# empty keys.conf file - used to generate an empty nonplat_mac_permissions.xml
# on devices without any keys.conf or mac_permissions additions.
This diff is collapsed.
Click to expand it.
reqd_mask/mac_permissions.xml
0 → 100644
+
3
−
0
View file @
905c8133
<?xml version="1.0" encoding="utf-8"?>
<policy>
</policy>
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment