[devserver] Add sepolicy.zip artifact.
BUG=b:110011736
TEST=manual run
Change-Id: Ia53f407de7836c8ba7c32d44eacbdd1a47124bbe
Reviewed-on: https://chromium-review.googlesource.com/1114558
Commit-Ready: Qijiang Fan <fqj@google.com>
Tested-by: Qijiang Fan <fqj@google.com>
Reviewed-by: Luis Hector Chavez <lhchavez@chromium.org>
diff --git a/artifact_info.py b/artifact_info.py
index 46c26ec..5ed5cd1 100644
--- a/artifact_info.py
+++ b/artifact_info.py
@@ -132,6 +132,9 @@
# Zip file containing push_to_device.py and tools it depends on
ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device_zip'
+# Zip file containing selinux policy files.
+ANDROID_SEPOLICY_ZIP = 'sepolicy.zip'
+
# In general, downloading one artifact usually indicates that the caller will
# want to download other artifacts later. The following map explicitly defines
# this relationship. Specifically:
diff --git a/build_artifact.py b/build_artifact.py
index 3073cd9..e7e0514 100755
--- a/build_artifact.py
+++ b/build_artifact.py
@@ -71,6 +71,7 @@
ANDROID_TARGET_FILES_ZIP = r'[^-]*-target_files-.*\.zip'
ANDROID_DTB_ZIP = r'[^-]*-dtb-.*\.zip'
ANDROID_PUSH_TO_DEVICE_ZIP = 'push_to_device.zip'
+ANDROID_SEPOLICY_ZIP = 'sepolicy.zip'
_build_artifact_locks = common_util.LockDict()
@@ -744,6 +745,8 @@
ANDROID_DTB_ZIP, is_regex_name=True)
_AddAndroidArtifact(artifact_info.ANDROID_PUSH_TO_DEVICE_ZIP,
Artifact, ANDROID_PUSH_TO_DEVICE_ZIP)
+_AddAndroidArtifact(artifact_info.ANDROID_SEPOLICY_ZIP,
+ Artifact, ANDROID_SEPOLICY_ZIP)
class BaseArtifactFactory(object):
"""A factory class that generates build artifacts from artifact names."""