Merge Android 13 QPR3 tm-qpr-dev-plus-aosp-without-vendor@9936994
Bug: 275386652 Merged-In: I4b2ea3956c34aa56cc6f54bab7148f116c34759e Change-Id: I900022a8e8f104b6dc52745211c428601be53ba6
This commit is contained in:
commit
d6b6d0102a
7 changed files with 21 additions and 10 deletions
|
@ -110,7 +110,7 @@ endif
|
|||
# are controlled by the MODULE_BUILD_FROM_SOURCE environment variable by
|
||||
# default.
|
||||
INDIVIDUALLY_TOGGLEABLE_PREBUILT_MODULES := \
|
||||
bluetooth \
|
||||
btservices \
|
||||
permission \
|
||||
rkpd \
|
||||
uwb \
|
||||
|
|
|
@ -18,4 +18,4 @@
|
|||
# (like "CRB01"). It must be a single word, and is
|
||||
# capitalized by convention.
|
||||
|
||||
BUILD_ID=AOSP.MASTER
|
||||
BUILD_ID=TM
|
||||
|
|
|
@ -29,7 +29,8 @@ $(sts_sdk_zip): $(MERGE_ZIPS) $(ZIP2ZIP) $(compatibility_zip) $(sts_sdk_samples)
|
|||
$(ZIP2ZIP) -i $(STS_LITE_ZIP) -o $(STS_LITE_ZIP)_filtered \
|
||||
-x android-sts-lite/tools/sts-tradefed-tests.jar \
|
||||
'android-sts-lite/tools/*:sts-test/libs/' \
|
||||
'android-sts-lite/testcases/*:sts-test/utils/'
|
||||
'android-sts-lite/testcases/*:sts-test/utils/' \
|
||||
'android-sts-lite/jdk/**/*:sts-test/jdk/'
|
||||
$(MERGE_ZIPS) $@ $(STS_LITE_ZIP)_filtered $(STS_SDK_SAMPLES)
|
||||
rm -f $(STS_LITE_ZIP)_filtered
|
||||
|
||||
|
|
|
@ -30,7 +30,6 @@ test_suite_subdir := android-$(test_suite_name)
|
|||
out_dir := $(HOST_OUT)/$(test_suite_name)/$(test_suite_subdir)
|
||||
test_artifacts := $(COMPATIBILITY.$(test_suite_name).FILES)
|
||||
test_tools := $(HOST_OUT_JAVA_LIBRARIES)/tradefed.jar \
|
||||
$(HOST_OUT_JAVA_LIBRARIES)/tradefed-no-fwk.jar \
|
||||
$(HOST_OUT_JAVA_LIBRARIES)/tradefed-test-framework.jar \
|
||||
$(HOST_OUT_JAVA_LIBRARIES)/loganalysis.jar \
|
||||
$(HOST_OUT_JAVA_LIBRARIES)/compatibility-host-util.jar \
|
||||
|
|
|
@ -104,7 +104,7 @@ ifndef PLATFORM_SECURITY_PATCH
|
|||
# It must be of the form "YYYY-MM-DD" on production devices.
|
||||
# It must match one of the Android Security Patch Level strings of the Public Security Bulletins.
|
||||
# If there is no $PLATFORM_SECURITY_PATCH set, keep it empty.
|
||||
PLATFORM_SECURITY_PATCH := 2023-04-05
|
||||
PLATFORM_SECURITY_PATCH := 2023-06-05
|
||||
endif
|
||||
|
||||
include $(BUILD_SYSTEM)/version_util.mk
|
||||
|
|
|
@ -28,6 +28,7 @@ PRODUCT_CFI_INCLUDE_PATHS := \
|
|||
hardware/broadcom/wlan/bcmdhd/wpa_supplicant_8_lib \
|
||||
hardware/synaptics/wlan/synadhd/wpa_supplicant_8_lib \
|
||||
hardware/interfaces/nfc \
|
||||
hardware/qcom/wlan/qcwcn/wpa_supplicant_8_lib \
|
||||
hardware/qcom/wlan/legacy/qcwcn/wpa_supplicant_8_lib \
|
||||
hardware/qcom/wlan/wcn6740/qcwcn/wpa_supplicant_8_lib \
|
||||
hardware/interfaces/keymaster \
|
||||
|
|
|
@ -2391,12 +2391,22 @@ def GetMinSdkVersionInt(apk_name, codename_to_api_level_map):
|
|||
try:
|
||||
return int(version)
|
||||
except ValueError:
|
||||
# Not a decimal number. Codename?
|
||||
if version in codename_to_api_level_map:
|
||||
return codename_to_api_level_map[version]
|
||||
# Not a decimal number.
|
||||
#
|
||||
# It could be either a straight codename, e.g.
|
||||
# UpsideDownCake
|
||||
#
|
||||
# Or a codename with API fingerprint SHA, e.g.
|
||||
# UpsideDownCake.e7d3947f14eb9dc4fec25ff6c5f8563e
|
||||
#
|
||||
# Extract the codename and try and map it to a version number.
|
||||
split = version.split(".")
|
||||
codename = split[0]
|
||||
if codename in codename_to_api_level_map:
|
||||
return codename_to_api_level_map[codename]
|
||||
raise ExternalError(
|
||||
"Unknown minSdkVersion: '{}'. Known codenames: {}".format(
|
||||
version, codename_to_api_level_map))
|
||||
"Unknown codename: '{}' from minSdkVersion: '{}'. Known codenames: {}".format(
|
||||
codename, version, codename_to_api_level_map))
|
||||
|
||||
|
||||
def SignFile(input_name, output_name, key, password, min_api_level=None,
|
||||
|
|
Loading…
Reference in a new issue