Make change and version bump to SD2A.210616.001

Change-Id: I8cb76918c14b7bec6e6a6f004afaf213a3207ddf
This commit is contained in:
android-build-team Robot 2021-06-16 01:01:03 +00:00
commit d1d161aa33
4 changed files with 23 additions and 9 deletions

View File

@ -18,4 +18,4 @@
# (like "CRB01"). It must be a single word, and is
# capitalized by convention.
BUILD_ID=SD2A.210615.002
BUILD_ID=SD2A.210616.001

View File

@ -240,7 +240,7 @@ ifndef PLATFORM_SECURITY_PATCH
# It must be of the form "YYYY-MM-DD" on production devices.
# It must match one of the Android Security Patch Level strings of the Public Security Bulletins.
# If there is no $PLATFORM_SECURITY_PATCH set, keep it empty.
PLATFORM_SECURITY_PATCH := 2021-07-05
PLATFORM_SECURITY_PATCH := 2021-08-05
endif
.KATI_READONLY := PLATFORM_SECURITY_PATCH

View File

@ -216,7 +216,7 @@ PRODUCT_PACKAGES += \
mtpd \
ndc \
netd \
NetworkStackNext \
NetworkStack \
odsign \
org.apache.http.legacy \
otacerts \

View File

@ -217,6 +217,18 @@ for partition in common.AVB_PARTITIONS:
raise RuntimeError("Missing {} in AVB_FOOTER_ARGS".format(partition))
def IsApexFile(filename):
return filename.endswith(".apex") or filename.endswith(".capex")
def GetApexFilename(filename):
name = os.path.basename(filename)
# Replace the suffix for compressed apex
if name.endswith(".capex"):
return name.replace(".capex", ".apex")
return name
def GetApkCerts(certmap):
# apply the key remapping to the contents of the file
for apk, cert in certmap.items():
@ -356,8 +368,8 @@ def CheckApkAndApexKeysAvailable(input_tf_zip, known_keys,
unknown_files = []
for info in input_tf_zip.infolist():
# Handle APEXes on all partitions
if info.filename.endswith('.apex'):
name = os.path.basename(info.filename)
if IsApexFile(info.filename):
name = GetApexFilename(info.filename)
if name not in known_keys:
unknown_files.append(name)
continue
@ -388,10 +400,11 @@ def CheckApkAndApexKeysAvailable(input_tf_zip, known_keys,
invalid_apexes = []
for info in input_tf_zip.infolist():
if not info.filename.endswith('.apex'):
if not IsApexFile(info.filename):
continue
name = os.path.basename(info.filename)
name = GetApexFilename(info.filename)
(payload_key, container_key) = apex_keys[name]
if ((payload_key in common.SPECIAL_CERT_STRINGS and
container_key not in common.SPECIAL_CERT_STRINGS) or
@ -541,8 +554,9 @@ def ProcessTargetFiles(input_tf_zip, output_tf_zip, misc_info,
common.ZipWriteStr(output_tf_zip, out_info, data)
# Sign bundled APEX files on all partitions
elif filename.endswith(".apex"):
name = os.path.basename(filename)
elif IsApexFile(filename):
name = GetApexFilename(filename)
payload_key, container_key = apex_keys[name]
# We've asserted not having a case with only one of them PRESIGNED.