Commit graph

184 commits

Author SHA1 Message Date
qiaoli
9de81191c6 Add file contexts for FederatedCompute.
Test: TH
Change-Id: If302dc80a5be0b72e417698a60a92a05bedde8a1
2022-09-21 03:40:13 +00:00
Treehugger Robot
5a7f207a22 Merge "Add file contexts for HealthConnect APEX" am: 59c456eeb3
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2183548

Change-Id: I71c5c7248c9fa8a4916fadb0ab64993b2d2f790c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-08-15 13:46:13 +00:00
Anna Zhuravleva
406287da6c Add file contexts for HealthConnect APEX
Test: build
Bug: 242298335
Change-Id: I9ad9037590a40b29bdc00b11d0a9c352b50608fc
2022-08-12 19:03:11 +00:00
Roland Levillain
ddac3b9b82 Reconcile file_contexts files for Release and Debug ART APEXes. am: 4e8dbdf63e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2168184

Change-Id: Iac97b16658722eb52b32ea86e0fc30767538b85d
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-08-01 13:20:27 +00:00
Roland Levillain
4e8dbdf63e Reconcile file_contexts files for Release and Debug ART APEXes.
Replicate change
https://android-review.googlesource.com/c/1663786/2/apex/com.android.art-file_contexts
in `apex/com.android.art.debug-file_contexts`.

Test: Patch this commit into a tree that uses `artd` (only internal
      ones at the moment) and run the following command on a device
      running the Debug ART APEX:
        adb shell pm art \
          get-optimization-status com.google.android.youtube
Change-Id: If0b10b585778e8b585e76b2a4512a2f23facd22e
2022-08-01 09:13:46 +01:00
Treehugger Robot
de453119e2 Merge "Update SELinux policy for app compilation CUJ." am: 9e2f8aa7a1
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/2160660

Change-Id: I76e3fa493a483a85fec07fd77f8aba15e4136b49
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2022-07-29 17:48:30 +00:00
Jiakai Zhang
c871c1cc75 Update SELinux policy for app compilation CUJ.
- Adapt installd rules for app compilation.

- Add profman rules for checking the profile before compilation. This is new behavior compared to installd.

Bug: 229268202
Test: -
  1. adb shell pm art optimize-package -m speed-profile -f \
       com.google.android.youtube
  2. See no SELinux denial.
Change-Id: Idfe1ccdb1b27fd275fdf912bc8d005551f89d4fc
2022-07-29 14:07:52 +00:00
Oriol Prieto Gasco
57f48ae1d2 Include bluetooth cert in mac_permissions.xml
Also, rename the file_contexts file to match the new BT stack apex name
(com.android.bluetooth)

Test: TH
Bug: 236187653
Bug: 236192423
Ignore-AOSP-First: LSC

Change-Id: Ie610775d397d0a81f83e251ed3b5f73006bfd272
2022-06-21 22:00:01 +00:00
Ling Ma
444d77f603 Removed telephony apex
Will not need this in near future.

Fix: 230729916
Test: Build
Change-Id: Iec5049bb2cc16de1d947e07eec0f151182f5a22a
Merged-In: Iec5049bb2cc16de1d947e07eec0f151182f5a22a
Ignore-AOSP-First: cherry-picked from AOSP
2022-05-17 17:50:57 +00:00
Ling Ma
f2a540615b Removed telephony apex
Will not need this in near future.

Fix: 230729916
Test: Build
Change-Id: Iec5049bb2cc16de1d947e07eec0f151182f5a22a
2022-05-05 14:18:14 -07:00
Frank
711fee7dd0 Add file contexts for OnDevicePersonalization.
Test: build
Change-Id: I7fc206f06ca1dad52772211abef50407437a79dc
2022-03-11 08:31:41 +00:00
Frank Wang
62115b2d0a Remove Auxiliary file_contexts file.
Ignore-AOSP-First: Not released yet
Test: TH
Bug: 210728915
Change-Id: Id49b6232b32952846d09d64f47611c16b385f55a
2022-03-08 04:37:14 +00:00
Frank Wang
a5eb97af4b Remove Auxiliary module file context config.
Ignore-AOSP-First: this feature is developed in an internal branch
Test: TH
Bug: 210728915
Change-Id: I92db5c20db20a39af554cbeb8347e7bfb0c823ca
2022-03-05 07:20:59 +00:00
Nikita Ioffe
db8478cc37 Remove supplementalprocess APEX
Ignore-AOSP-First: this code is not available in AOSP
Bug: 220320098
Test: m
Change-Id: I131bb9ed3ea7014a6010977117e6c4e9a83ec277
2022-03-02 18:33:18 +00:00
Anton Kulakov
27e5834677 Add file contexts for AdServices APEX am: dc4332b32b am: 995d44896b am: d4d005f6fd
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1992910

Change-Id: I2b3e9c366ea16d7f7b2f2bdc5b1a6fe0a523b849
2022-02-21 14:33:38 +00:00
Anton Kulakov
dc4332b32b Add file contexts for AdServices APEX
Test: Build
Bug: 220336612
Change-Id: Iab64d228a5edcd3a9f71b59c5adf3a9460cd1947
2022-02-21 09:55:07 +00:00
Treehugger Robot
7128d68656 Merge "Modify sepolicy for compos key changes" am: 5273f3a486 am: 46aba72e48 am: 96bc5e6133
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1988307

Change-Id: Iaba5542e5f84282793985d6e3702e0898559c97b
2022-02-18 10:08:18 +00:00
Alan Stokes
766caba5de Modify sepolicy for compos key changes
Add the compos_key_helper domain for the process which has access to
the signing key, make sure it can't be crashdumped. Also extend that
protection to diced & its HAL.

Rename compos_verify_key to compos_verify, because it doesn't verify
keys any more.

Move exec types used by Microdroid to file.te in the host rather than
their own dedicated files.

Bug: 218494522
Test: atest CompOsSigningHostTest CompOsDenialHostTest
Change-Id: I942667355d8ce29b3a9eb093e0b9c4f6ee0df6c1
2022-02-17 12:14:40 +00:00
Frank Wang
41d3e030ed Add file contexts for OnDevicePersonalization module.
Test: Build
Bug: b/218749359
Ignore-AOSP-First: this feature is still under development.
Change-Id: Ib69e8e7098913e14b9973c65b37c88daa98b4e06
2022-02-10 17:02:21 +00:00
Roopa Sattiraju
d05629be96 Changing sepolicy file to the right apex name am: 89556c69df am: dd862e57ee am: cfe332e6ef am: 794914f434
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1967166

Change-Id: Id256bbb62678e16e3225e18c0df3be780df7875d
2022-02-02 06:14:59 +00:00
Roopa Sattiraju
89556c69df Changing sepolicy file to the right apex name
Bug: 216476895
Test: Compile
Change-Id: I31a5534bad0f5c01ee163f109fa5dd0b54835ea8
2022-02-01 15:59:30 -08:00
Maciej Żenczykowski
4f5a1ea0fb Merge "Add clatd to apex/com.android.tethering-file_contexts" am: 334d21491d am: 36c4a97895 am: 39672aac5c am: cd74c9117e
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1926907

Change-Id: I8a67e1117a9b0483ced498cb6ce7101134a164b1
2022-01-14 04:01:49 +00:00
Hungming Chen
5934dd8c90 Add clatd to apex/com.android.tethering-file_contexts
clatd binary is starting to be shipped by apex since T+ release
and the shipped clatd is belong to u:object_r:clatd_exec:s0.

Test: manual test
1. Connect to ipv6-only wifi.
2. Make IPv4 traffic.
   $ ping 8.8.8.8

Change-Id: I4f6f0944e94e165983a19a5d3c3a117274f6bbac
2022-01-11 17:04:05 +08:00
Inseob Kim
696d2d250c Merge "Fix contexts modules to use android:"path"" am: 514d49a3b7 am: 3b059bf014 am: d4e088aefc am: 8824d87d77
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1925691

Change-Id: I487a2848221409e9651b3284c2ad657a8f988818
2021-12-24 08:29:35 +00:00
Inseob Kim
6d3d5a6daf Fix contexts modules to use android:"path"
For now, contexts modules have been using se_filegroup modules, which
makes the build system logic unnecessarily complex. This change
refactors it to se_build_files modules and normal `android:"path"`
logic.

Test: build and boot
Change-Id: I52e557e2dc8300186869a97fddfd3a74183473f7
2021-12-23 21:36:27 +09:00
Frank Wang
e46363f4e2 Add Auxiliary module file context config in sepolicy.
Test: loaded to an AVD
Bug: b/210728915
Ignore-AOSP-First: this feature is developed in an internal branch
Change-Id: I8a3d1ec25938c84cfe35a36e706e891ce2b9659e
2021-12-17 06:43:41 +00:00
Frank Wang
07394c9dc4 Add file contexts for Auxiliary module.
Test: loaded to an AVD
Bug: b/210728915
Ignore-AOSP-First: this feature is developed in an internal branch
Change-Id: I000ec62b5aa8fba1fbf2ac5f65ae5deb3ebe9ff7
2021-12-17 03:36:18 +00:00
Treehugger Robot
1b8168a7dc Merge "Add file_contexts for sepolicy mainline module" am: 8797f5841c am: 2b9f0a62cb am: 6ea8b3b3b3 am: 8fc3c1734f
Original change: https://android-review.googlesource.com/c/platform/system/sepolicy/+/1890636

Change-Id: Iaffdba595460e0a1d61d49a102bce913c66c227d
2021-11-12 16:31:43 +00:00
Jeff Vander Stoep
07246483ad Add file_contexts for sepolicy mainline module
Test: m com.android.sepolicy
Bug: 202394777
Change-Id: I6d11c693463206632237de1c4042845153fd6415
2021-11-12 14:55:54 +01:00
Nikita Ioffe
3efbc25e2c Add file contexts for SumplementalProcess APEX
Test: flash
Ignore-AOSP-First: feature is developed in internal branch
Change-Id: I586e668a6a77be498965c22af41af63558463a7e
2021-10-16 00:28:34 +01:00
Keun young Park
44025b07eb Add sepolicy for com.android.car.framework module
Bug: 192665266
Test: build
Change-Id: I69036c20a3bae10e34a3c076eb8e1c7c2f1d2517
2021-10-07 00:45:19 +00:00
Nikita Ioffe
8d003bc3c0 Merge "Cleanup sepolicy related to APEX pre/post-install hooks" 2021-09-27 20:16:54 +00:00
Alan Stokes
ec4a90f59c Enable odrefresh to work with composd.
composd spawns odrefresh in its usual domain. odrefresh then spawns
fd_server in a different domain, and makes binder calls back to
composd to perform individual compilation steps.

fd_server is fairly generic, and part of the virt APEX, but this
instance is specific to composd (e.g. it has access to ART files), so
I named the domain composd_fd_server.

Bug: 186126194
Test: Run composd_cmd, artifacts generated
Change-Id: I5a431dd00b5b396a67021c618fc6edcfb25aa21b
2021-09-23 12:03:30 +01:00
Nikita Ioffe
c0cac4114c Cleanup sepolicy related to APEX pre/post-install hooks
The pre/post-install hook functionality has been deprecated and removed.

Bug: 172606645
Test: atest ApexTestCases
Test: atest CtsStagedInstallHostTestCases
Change-Id: I8a5f726a0c8f005654d0430b5a4598e416ff9c28
2021-09-17 17:55:12 +01:00
Alan Stokes
d376e2041f Initial sepolicy for composd
Add what we need to allow composd to run and expose an AIDL service.

Also delete the policy for compsvc; we never access it in the host
now, and the real policy is in microdroid. Retain the compos_exec
type, since it is referenced in the APEX sepolicy.

Bug: 186126194
Test: adb shell cmd -w android.system.composd; no denials.
Change-Id: I5f06b2b01852cdebd2d67009b363ec08b17ce33a
2021-09-13 10:33:53 +01:00
Alan Stokes
39f497013c SEPolicy for compos_verify_key.
Remove some allow rules for odsign, since it no longer directly
modifies CompOs files. Instead allow it to run compos_verify_key in
its own domain.

Grant compos_verify_key what it needs to access the CompOs files and
start up the VM.

Currently we directly connect to the CompOs VM; that will change once
some in-flight CLs have landed.

As part of this I moved the virtualizationservice_use macro to
te_macros so I can use it here. I also expanded it to include
additional grants needed by any VM client that were previously done
for individual domains (and then deleted those rules as now
redundant).

I also removed the grant of VM access to all apps; instead we allow it
for untrusted apps, on userdebug or eng builds only. (Temporarily at
least.)

Bug: 193603140
Test: Manual - odsign successfully runs the VM at boot when needed.
Change-Id: I62f9ad8c7ea2fb9ef2d468331e26822d08e3c828
2021-09-03 16:31:02 +01:00
Victor Hsieh
9ef8696796 Remove obsolete file contexts
Bug: 194474784
Test: can't find "compos_key_main" and "compsvc_worker" in code search
Change-Id: If0959f180f54f798ecd90a12ce71f0570cf14484
2021-08-13 15:03:23 +00:00
Roshan Pius
3b7716c98c sepolicy: Add entry for uwb apex
Bug: 188911079
Test: Compiles
Change-Id: Icc4886d608e75e348ad9de0f249b23602d84694a
2021-07-29 18:44:50 -07:00
Alan Stokes
80bb558584 Remove compos_key_cmd from policy
It's a test tool which is generally run as root, and will be deleted
eventually. It doesn't need its own label; system_file works fine.

We never actually allowed it anything, nor defined a transition into
the domain.

Bug: 194474784
Test: Device boots, no denials
Test: compos_key_cmd run from root works
Change-Id: If118798086dae2faadeda658bc02b6eb6e6bf606
2021-07-28 14:36:50 +01:00
Inseob Kim
7560aed40a Add domain for compos binaries
Bug: 191263171
Test: atest MicrodroidHostTestCases
Test: atest ComposHostTestCases
Change-Id: I1fd35d0efe83d2cecaa41580e6d1d0b8f6242b3f
2021-07-23 06:01:39 +00:00
Andrew Walbran
4b80a3fc3d Rename VirtManager to VirtualizationService.
Bug: 188042280
Test: atest VirtualizationTestCases
Change-Id: Ia46a0dda923cb30382cbcba64aeb569685041d2b
2021-05-21 14:47:30 +00:00
Victor Hsieh
7b68126421 Add sepolicy for com.android.compos
This is to unblock the apex setup.

There is only a system_file in the context, but we might need more
specific ones later.

Bug: 186126404
Test: m

Change-Id: Icf713c9bb92e7f7402c0b45bd0f1b06e9cb35d2b
2021-05-11 14:07:57 -07:00
Chris Wailes
467d8a80ea Add SELinux properties for artd
Test: boot device and check for artd process
Change-Id: I2a161701102ecbde3e293af0346d1db0b11d4aab
2021-04-27 14:49:13 -07:00
Andrew Walbran
a995e84c18 Add crosvm domain and give virtmanager and crosvm necessary permissions.
Bug: 183583115
Test: make TARGET_KERNEL_USE=5.4 TARGET_VIM3L=true
Change-Id: I566436fa2d27597566014f2a63198a88d6d2dbd6
2021-04-13 09:30:20 +00:00
Jeff Vander Stoep
f16527f6cf virtmanager: add selinux domain
Address any denials in the log - currently just adding
the virtualization service.

Bug: 183583115
Test: ps -AZ | grep virtmanager
u: r:virtmanager:s0             virtmanager   2453     1 10930880  4544 0                   0 S virtmanager
Change-Id: Ie034dcc3b1dbee610c591220358065b8508d81cf
2021-03-25 22:22:05 +01:00
satayev
afc9791f21 Revert^2 "Introduce derive_classpath."
5fd85de907

Bug: 180105615
Test: manual boot of cuttlefish and gphone emulator
Change-Id: I9e43268d3b745e65b5ccc0a4896a7e55a253659d
2021-03-19 11:23:00 +00:00
Orion Hodson
5fd85de907 Revert "Introduce derive_classpath."
Revert submission 1602413-derive_classpath

Bug: 180105615
Fix: 183079517
Reason for revert: SELinux failure leading to *CLASSPATH variables not being set in all builds

Reverted Changes:
I6e3c64e7a:Introduce derive_classpath service.
I60c539a8f:Exec_start derive_classpath on post-fs-data.
I4150de69f:Introduce derive_classpath.

Change-Id: I17e2cd062d8fddc40250d00f02e40237ad62bd6a
2021-03-18 17:00:43 +00:00
Artur Satayev
d62193e9df Introduce derive_classpath.
The service generates /data/system/environ/classpath with values for
BOOTCLASSPATH, SYSTEMSERVERCLASSPATH, and DEX2OATCLASSPATH to be
exported by init.

See go/updatable-classpath for more details.

Bug: 180105615
Test: manual
Change-Id: I4150de69f7d39f685a202eb4f86c27b661f808dc
2021-03-11 07:20:25 +00:00
Bob Badour
601ebb43a3 [LSC] Add LOCAL_LICENSE_KINDS to system/sepolicy
Added SPDX-license-identifier-Apache-2.0 to:
  build/Android.bp
  build/soong/Android.bp
  tests/Android.bp
  tools/Android.bp

Added SPDX-license-identifier-Apache-2.0 legacy_unencumbered to:
  Android.bp
  Android.mk
  compat.mk
  contexts_tests.mk
  mac_permissions.mk
  seapp_contexts.mk
  treble_sepolicy_tests_for_release.mk

Added legacy_unencumbered to:
  apex/Android.bp
  tools/sepolicy-analyze/Android.bp

Bug: 68860345
Bug: 151177513
Bug: 151953481

Test: m all

Exempt-From-Owner-Approval: janitorial work
Change-Id: I1ab286543ef1bdcb494cf74f2b35e35a08225d28
2021-02-05 01:28:24 -08:00
Orion Hodson
8f75f76fbd Permissions for odrefresh and /data/misc/apexdata/com.android.art
odrefresh is the process responsible for checking and creating ART
compilation artifacts that live in the ART APEX data
directory (/data/misc/apexdata/com.android.art).

There are two types of change here:

1) enabling odrefresh to run dex2oat and write updated boot class path
   and system server AOT artifacts into the ART APEX data directory.

2) enabling the zygote and assorted diagnostic tools to use the
   updated AOT artifacts.

odrefresh uses two file contexts: apex_art_data_file and
apex_art_staging_data_file. When odrefresh invokes dex2oat, the
generated files have the apex_art_staging_data_file label (which allows
writing). odrefresh then moves these files from the staging area to
their installation area and gives them the apex_art_data_file label.

Bug: 160683548
Test: adb root && adb shell /apex/com.android.art/bin/odrefresh
Change-Id: I9fa290e0c9c1b7b82be4dacb9f2f8cb8c11e4895
2021-01-13 10:38:22 +00:00
Treehugger Robot
ba862cdeb6 Merge "Add com.android.virt" 2020-12-13 23:42:59 +00:00
Jiyong Park
c99eb585c9 Add com.android.virt
com.android.virt is an APEX for virtual machine monitors like crosvm.
The APEX currently empty and isn't updatable.

Bug: 174633082
Test: m com.android.virt

Change-Id: I8acc8e147aadb1701dc65f6950b61701131f89d2
2020-12-11 16:22:25 +09:00
Gavin Corkery
a1bd4fc620 Add file contexts for com.android.scheduling
Test: Build and flash
Bug: 161353402
Change-Id: I0e897dae34650022dc36cd95bc8519339d615bf8
2020-12-10 14:55:22 +00:00
Chong Zhang
9aed64920f add mediatranscoding to apex file context
bug: 159172726
Change-Id: I8fbedab2605167af637108d5f564abf6c78c32bd
2020-12-09 14:26:14 -08:00
Kiyoung Kim
357f5c4b1b Support linkerconfig in Runtime APEX
Add additional sepolicy so linkerconfig in Runtime APEX can be executed
from init.

Bug: 165769179
Test: Cuttlefish boot succeeded
Change-Id: Ic08157ce4c6a084db29f427cf9f5ad2cb12e50dd
2020-12-02 11:41:38 +09:00
Neil Fuller
8f033bd1b5 Changes associated with the new geotz module
The new geotz module has files that need to be readable by the system
process.

Bug: 172546738
Test: build / boot
Change-Id: I4b9867fa1f738b0fabdf5b72e9e73282f1bd9cbc
2020-11-20 22:15:48 +00:00
Martin Stjernholm
a20322600a Rename ART release APEX to com.android.art.
Test: See https://r.android.com/1457217
Bug: 169639321
Change-Id: Idd7c667e8184518967892dd98d10ae7c3604efde
Merged-In: Idd7c667e8184518967892dd98d10ae7c3604efde
2020-10-21 15:41:07 +01:00
Orion Hodson
76ce7f5eaa Remove policy for deprecated ART apex update scripts
Earlier changes removed the scripts for ART APEX pre- and post-install
hooks (I39de908ebe52f06f19781dc024ede619802a3196) and the associated
boot integrity checks (I61b8f4b09a8f6695975ea1267e5f5c88f64a371f), but
did not cleanup the SELinux policy.

Bug: 7456955
Test: Successful build and boot
Test: adb install com.android.art.debug && adb reboot
Change-Id: I1580dbc1c083438bc251a09994c28107570c48c5
2020-09-30 16:14:41 +01:00
Yifan Hong
8ac37f025f Support GKI updates
Adds proper file_contexts and domains for pre/postinstall hooks.
Allow the pre/postinstall hooks to communicate with update_engine stable
service.

Bug: 161563386
Test: apply a GKI update

Change-Id: I4437aab8e87ccbe55858150b95f67ec6e445ac1f
2020-08-10 16:10:38 -07:00
Nicolas Geoffray
612ce87b51 Fix sepolicy of ART module.
The dex2oat debug binary ends with the bitness.

Bug: 160137482
Test: adb shell cmd package bg-dexopt-job
Change-Id: If78cd100eb1c0245e425361d56e1936f1c6c98a6
2020-07-06 10:15:39 +01:00
Victor Chang
3ee68f59d6 "Add shared library into i18n APEX and add the required sepolicy" Attempt 2
The change was reverted due to a cause unrelated to sepolicy change.
It was submitted in https://r.android.com/1283724.
Now, submit this independent of the topic.

Bug: 138994281
Test: device boots
Change-Id: I9943abb814a8043f66545e7db5225adbd62d19d2
2020-05-05 16:36:51 +01:00
vichang
bdc32ce577 Merge "Revert "Add shared library into i18n APEX and add the required s..."" 2020-05-05 11:46:51 +00:00
vichang
016098f923 Revert "Add shared library into i18n APEX and add the required s..."
Revert "Make com_android_i18n namespace visible"

Revert submission 1299494-i18nApex

Reason for revert: Breaking aosp_x86-eng on aosp-master
Reverted Changes:
I30fc3735b:Move ICU from ART APEX to i18n APEX
Icb7e98b5c:Calling @IntraCoreApi from core-icu4j should not c...
Ic7de63fe3:Move core-icu4j into I18n APEX
I65b97bdba:Make com_android_i18n namespace visible
Ia4c83bc15:Move v8 and libpac into i18n APEX
I10e6d4948:Move core-icu4j into i18n APEX
I8d989cad7:Move ICU from ART APEX into i18n APEX
I72216ca12:Move ICU into i18n APEX
Ief9dace85:Add shared library into i18n APEX and add the requ...
I7d97a10ba:Move libpac into i18n APEX
I90fff9c55:Move ICU from ART APEX into i18n APEX

Change-Id: I863878038af1290611b441f7f9190494cf0851b8
2020-05-05 11:11:30 +00:00
vichang
c18f8052e9 Merge "Add shared library into i18n APEX and add the required sepolicy" 2020-05-05 08:52:21 +00:00
David Sehr
80a1403c62 Control use of dex2oat64 by device property
Gate use of dex2oat64 by a device property.

Bug: 153380900
Test: atest -c  installd_dexopt_test
Change-Id: I640085b5cd744cdc4563f565f8a914f9b1adc3ab
2020-04-19 12:09:38 -07:00
Victor Chang
d6f9ff992a Add shared library into i18n APEX and add the required sepolicy
Bug: 138994281
Test: device boots
Change-Id: Ief9dace8557c1d0e5a32222b2c7d1effc50f2847
2020-04-11 02:28:49 +01:00
Peter Collingbourne
a7179b5668 Update sepolicy to account for crash_dump move.
Bug: 135772972
Change-Id: I740954a20656f69b00d75f804fd898179b6df878
Merged-In: I740954a20656f69b00d75f804fd898179b6df878
2020-03-18 10:38:40 -07:00
Jeffrey Huang
baacdfa48b Update selinux policy for statsd apex
Bug: 145923087
Test: m -j
Change-Id: I6197e6005d7c6e5c69b42de54f07965798663565
2020-02-13 15:42:23 -08:00
lpeter
93de13e535 Add filegroup for extservices file context
Add a filegroup for extservices so that it can be shared between the main
extservices apex and the one used for testing.

Bug: 138589409
Test: Manually
Change-Id: I2cca8a583b2aa72c8c29a32dd839fe599300b40f
2020-02-05 18:43:13 +08:00
Songchun Fan
9de90db5c0 Merge "[apex] remove module com.android.incremental" 2020-01-23 00:19:43 +00:00
Songchun Fan
1e0c849597 [apex] remove module com.android.incremental
No need for the sepolicy file.

Test: builds
Change-Id: I604e3354e762e87f9239eeb321c60193a39f1687
2020-01-17 17:01:15 -08:00
Dario Freni
e4e4d8eeac Add file contexts for com.android.extservices APEX.
Bug: 147674123
Test: built on aosp_taimen and verified package is available from the
apex.
Change-Id: I416b3267c116b18b204dd63f999b127f52b1757a
2020-01-17 13:47:30 +00:00
Luke Huang
ddbfce2080 Merge "Make cronet file_contexts as "android:path" property" 2020-01-10 13:43:57 +00:00
Luke Huang
a63ba2a0a1 Make cronet file_contexts as "android:path" property
It follows examples of other APEX to make file_contexts of cronet
module as "android:path" property

Bug: 146416755
Test: atest cronet_e2e_tests
Test: atest CronetApiTest
Change-Id: I0608eb4bb43cee50f49217f19fb53f297fbf5ead
Merged-In: I0608eb4bb43cee50f49217f19fb53f297fbf5ead
2020-01-10 13:15:07 +00:00
Anton Hansson
b84133555a Rename sdkext sepolicy to sdkextensions
The module is getting renamed, so rename all the policy
relating to it at the same time.

Bug: 137191822
Test: presubmit
Change-Id: Ia9d966ca9884ce068bd96cf5734e4a459158c85b
Merged-In: Ia9d966ca9884ce068bd96cf5734e4a459158c85b
(cherry picked from commit 6505573c36)
2020-01-08 11:41:18 +00:00
Anton Hansson
b26066cb10 Merge "Create filegroup for sdkext file contexts" 2019-12-19 14:26:03 +00:00
Anton Hansson
70b3800301 Create filegroup for sdkext file contexts
So that they can be reused in the test apex.

Bug: 137191822
Test: m
Change-Id: Iea23fee906d7c4dc9267bd3220f9d41c86fbb5db
2019-12-19 13:17:00 +00:00
Treehugger Robot
78ec8f6546 Merge "Change Tethering package name" 2019-12-19 12:35:49 +00:00
markchien
ba38521156 Change Tethering package name
Tethering apex module is renmae from com.android.tethering.aepx to
com.android.tethering. Renmae tethering apex file context accordingly.
Also add filegroup for tethering apex.

Bug: 146471733
Test: build, flash, boot
      atest TetheringTests
      atest CtsTetheringTest

Change-Id: I41ec17604067c684123085841182408c4e315ec2
Merged-In: I41ec17604067c684123085841182408c4e315ec2
2019-12-18 13:06:00 +00:00
Hall Liu
58798f2aa6 Merge "Add filegroup for telephony file context" 2019-12-18 02:13:23 +00:00
Hall Liu
6f6585d8b2 Add filegroup for telephony file context
Add a filegroup for telephony so that it can be shared between the main
telephony apex and the one used for testing.

Bug: 145232009
Test: atest telephony_e2e_tests
Change-Id: I5e20d7b7fc30d2c28de8f339c7b4722e1e438e17
2019-12-12 21:06:51 -08:00
Roshan Pius
fbfcfe7de9 sepolicy: Add filegroup for wifi apex
Bug: 146163587
Test: atest wifi_e2e_tests
Change-Id: I4238f585fb535f163e39a7ac1c61cb04bb15eacd
2019-12-12 15:01:17 -08:00
Zach Johnson
759e45856b Merge "Add sepolicy for bluetooth apex" 2019-12-06 23:20:27 +00:00
Anton Hansson
902f4fe2e6 Merge "Add sepolicy for sdkext module prop" 2019-12-06 11:13:03 +00:00
Amit Mahajan
f32216ae46 Merge "Create telephony apex." 2019-12-06 05:13:29 +00:00
Treehugger Robot
eac0c5a190 Merge "[incremental] checking in apex configs in selinux" 2019-12-06 04:17:51 +00:00
Songchun Fan
e462a23b71 [incremental] checking in apex configs in selinux
Test: builds
Change-Id: Iae7b2f2e6e57418365dabfb271afe03b766d5f29
2019-12-06 01:11:51 +00:00
Amit Mahajan
cccf34dcb0 Create telephony apex.
Test: m com.android.telephony && adb install com.android.telephony.apex
Bug: 145555313
Change-Id: I0aa28cd05af937b2af86a1ed352e8b41b64e2fdc
2019-12-05 14:52:57 -08:00
Anton Hansson
e822545909 Add sepolicy for sdkext module prop
Add a domain for derive_sdk which is allowed to set
persist.com.android.sdkext.sdk_info, readable by all
apps (but should only be read by the BCP).

Bug: 137191822
Test: run derive_sdk, getprop persist.com.android.sdkext.sdk_info
Change-Id: I389116f45faad11fa5baa8d617dda30fb9acec7a
2019-12-05 14:11:50 +00:00
Luke Huang
13ed58b6eb Add file_contexts for apex com.android.cronet
Bug: 139397529
Bug: 143926783
Test: build
Change-Id: Ic39f88b4f4d22ea3953cb27a72f5f20a74672bd3
2019-12-05 16:58:36 +08:00
Yan Yan
fe55f30397 Merge "Make ipsec file_contexts as "android:path" property" 2019-12-04 02:07:34 +00:00
Jeff Sharkey
8d287db808 Structure MediaProvider as an APEX.
Based on guidance from the Mainline team, we're placing the
MediaProvider APK inside a new APEX, as this will allow us to
move MediaStore.java inside the module boundary in a future CL.

Bug: 144247087
Test: manual
Change-Id: I88f6f2e598d9611e8b92143504e4328d93671cab
2019-12-03 13:35:46 -07:00
Anton Hansson
fd25d49569 Add sepolicy for com.android.sdkext module
Bug: 137191822
Test: m com.android.sdkext
Change-Id: Ia5fb99af7fad43ce4321b1c6611ab54340a87589
2019-12-02 14:13:41 +00:00
Mark Chien
9bf53d557d Merge "[Tether18] Add file_contexts for com.android.tethering.apex" 2019-12-02 04:11:35 +00:00
Mark Chien
646864216f [Tether18] Add file_contexts for com.android.tethering.apex
Bug: 144320626
Test: build

Change-Id: I6b5c079a917524bf4f1ad3f89b1f44708f0d6ed7
2019-11-28 14:53:58 +08:00
evitayan
780185f503 Make ipsec file_contexts as "android:path" property
It follows examples of other APEX to make file_contexts of ipsec
module as "android:path" property

Bug: 143192273
Test: atest ipsec_e2e_tests
Change-Id: Idbba1f964aad7e54077ac77250f9cfd6a6b5049e
2019-11-27 07:00:14 -08:00
Treehugger Robot
4a51f6d55d Merge "Add apex structure to appsearch module." 2019-11-27 02:04:39 +00:00
Zach Johnson
f2c87aaf79 Add sepolicy for bluetooth apex
Bug: 142747680
Test: compile, verify APEX mounts correctly
Change-Id: I3d1bd964343584b3f344d82b58019acad6de353c
2019-11-25 17:07:31 -08:00
Roshan Pius
3fbdcd4380 sepolicy: Add entry for wifi apex mainline module
Bug: 144722612
Test: Device boots up & connects to wifi networks
Change-Id: If9207075b87dc938926c1fc1432d3b8fe481bc02
2019-11-25 20:51:50 +00:00
Terry Wang
fe5e7f7000 Add apex structure to appsearch module.
This change adds file_contexts for appsearch.

Bug: 144874026
Test: manual
Change-Id: Id8cba2eab3dbaab252eb42095e2ed265446b93c8
2019-11-25 11:30:38 -08:00