@@ -953,3 +953,55 @@ dev_type_test_genrule {
953
953
},
954
954
},
955
955
}
956
+
957
+ phony {
958
+ name : " selinux_policy_system_ext" ,
959
+ required : [
960
+ //"ifdef HAS_SYSTEM_EXT_PUBLIC_SEPOLICY" check included in system_ext_pub_policy.cil
961
+ " system_ext_mapping_file" ,
962
+ //"ifdef HAS_SYSTEM_EXT_SEPOLICY" check included in .cil
963
+ " system_ext_sepolicy.cil" ,
964
+ ] + [
965
+ //"ifdef HAS_SYSTEM_EXT_SEPOLICY" check included in .cil
966
+ " system_ext_29.0.cil" ,
967
+ " system_ext_30.0.cil" ,
968
+ " system_ext_31.0.cil" ,
969
+ " system_ext_32.0.cil" ,
970
+ " system_ext_33.0.cil" ,
971
+ " system_ext_34.0.cil" ,
972
+ ] + select(soong_config_variable(" ANDROID" , "PLATFORM_SEPOLICY_VERSION "), {
973
+ "202404 ": [],
974
+ default : [
975
+ " system_ext_202404.cil" ,
976
+ ],
977
+ }) +
978
+ select (soong_config_variable("ANDROID", "PRODUCT_PRECOMPILED_SEPOLICY"), {
979
+ true : [" system_ext_sepolicy_and_mapping.sha256" ],
980
+ default : [],
981
+ }) + [
982
+ "system_ext_file_contexts ",
983
+ "system_ext_file_contexts_test ",
984
+ "system_ext_keystore2_key_contexts ",
985
+ "system_ext_hwservice_contexts ",
986
+ "system_ext_hwservice_contexts_test ",
987
+ "system_ext_property_contexts ",
988
+ "system_ext_property_contexts_test ",
989
+ "system_ext_seapp_contexts ",
990
+ "system_ext_service_contexts ",
991
+ "system_ext_service_contexts_test ",
992
+ "system_ext_mac_permissions .xml",
993
+ "system_ext_bug_map ",
994
+ // $(addprefix system_ext_,$(addsuffix .compat.cil,$(PLATFORM_SEPOLICY_COMPAT_VERSIONS))) \
995
+ "system_ext_29 .0.compat.cil",
996
+ "system_ext_30 .0.compat.cil",
997
+ "system_ext_31 .0.compat.cil",
998
+ "system_ext_32 .0.compat.cil",
999
+ "system_ext_33 .0.compat.cil",
1000
+ "system_ext_34 .0.compat.cil",
1001
+ ] + select (soong_config_variable("ANDROID", "PLATFORM_SEPOLICY_VERSION"), {
1002
+ "202404 ": [],
1003
+ default : [
1004
+ " system_ext_202404.compat.cil" ,
1005
+ ],
1006
+ }),
1007
+ }
0 commit comments