[devserver] Add sepolicy.zip artifact. BUG=b:110011736 TEST=manual run Change-Id: Ia53f407de7836c8ba7c32d44eacbdd1a47124bbe Reviewed-on: https://chromium-review.googlesource.com/1114558 Commit-Ready: Qijiang Fan <fqj@google.com> Tested-by: Qijiang Fan <fqj@google.com> Reviewed-by: Luis Hector Chavez <lhchavez@chromium.org>
diff --git a/artifact_info.py b/artifact_info.py index 46c26ec..5ed5cd1 100644 --- a/artifact_info.py +++ b/artifact_info.py
@@ -132,6 +132,9 @@ # Zip file containing push_to_device.py and tools it depends on ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device_zip' +# Zip file containing selinux policy files. +ANDROID_SEPOLICY_ZIP = 'sepolicy.zip' + # In general, downloading one artifact usually indicates that the caller will # want to download other artifacts later. The following map explicitly defines # this relationship. Specifically:
diff --git a/build_artifact.py b/build_artifact.py index 3073cd9..e7e0514 100755 --- a/build_artifact.py +++ b/build_artifact.py
@@ -71,6 +71,7 @@ ANDROID_TARGET_FILES_ZIP = r'[^-]*-target_files-.*\.zip' ANDROID_DTB_ZIP = r'[^-]*-dtb-.*\.zip' ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device.zip' +ANDROID_SEPOLICY_ZIP = 'sepolicy.zip' _build_artifact_locks = common_util.LockDict() @@ -744,6 +745,8 @@ ANDROID_DTB_ZIP, is_regex_name=True) _AddAndroidArtifact(artifact_info.ANDROID_PUSH_TO_DEVICE_ZIP, Artifact, ANDROID_PUSH_TO_DEVICE_ZIP) +_AddAndroidArtifact(artifact_info.ANDROID_SEPOLICY_ZIP, + Artifact, ANDROID_SEPOLICY_ZIP) class BaseArtifactFactory(object): """A factory class that generates build artifacts from artifact names."""