[devserver] Add sepolicy.zip artifact.

BUG=b:110011736
TEST=manual run

Change-Id: Ia53f407de7836c8ba7c32d44eacbdd1a47124bbe
Reviewed-on: https://chromium-review.googlesource.com/1114558
Commit-Ready: Qijiang Fan <fqj@google.com>
Tested-by: Qijiang Fan <fqj@google.com>
Reviewed-by: Luis Hector Chavez <lhchavez@chromium.org>
diff --git a/artifact_info.py b/artifact_info.py
index 46c26ec..5ed5cd1 100644
--- a/artifact_info.py
+++ b/artifact_info.py
@@ -132,6 +132,9 @@
 # Zip file containing push_to_device.py and tools it depends on
 ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device_zip'
 
+# Zip file containing selinux policy files.
+ANDROID_SEPOLICY_ZIP = 'sepolicy.zip'
+
 # In general, downloading one artifact usually indicates that the caller will
 # want to download other artifacts later. The following map explicitly defines
 # this relationship. Specifically:
diff --git a/build_artifact.py b/build_artifact.py
index 3073cd9..e7e0514 100755
--- a/build_artifact.py
+++ b/build_artifact.py
@@ -71,6 +71,7 @@
 ANDROID_TARGET_FILES_ZIP = r'[^-]*-target_files-.*\.zip'
 ANDROID_DTB_ZIP = r'[^-]*-dtb-.*\.zip'
 ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device.zip'
+ANDROID_SEPOLICY_ZIP = 'sepolicy.zip'
 
 _build_artifact_locks = common_util.LockDict()
 
@@ -744,6 +745,8 @@
                     ANDROID_DTB_ZIP, is_regex_name=True)
 _AddAndroidArtifact(artifact_info.ANDROID_PUSH_TO_DEVICE_ZIP,
                     Artifact, ANDROID_PUSH_TO_DEVICE_ZIP)
+_AddAndroidArtifact(artifact_info.ANDROID_SEPOLICY_ZIP,
+                    Artifact, ANDROID_SEPOLICY_ZIP)
 
 class BaseArtifactFactory(object):
   """A factory class that generates build artifacts from artifact names."""