Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 4508ca9e authored by Jihoon Kang's avatar Jihoon Kang
Browse files

Define additional container violation allowlist

These entries are proprietary, which are defined in vendor/google/build
in git_main, but vendor projects do not exist in
aosp-main-future-without-vendor branch. This change adds entries that
are supposed to be included in the future aosp release.

Ignore-AOSP-First: Intended aosp-main-future only change
Test: m nothing
Bug: 338660802
Change-Id: If48f56757e069a467a8ae0466820f27f97b011a8
parent dd898d85
Loading
Loading
Loading
Loading
+81 −0
Original line number Diff line number Diff line
@@ -169,6 +169,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsAppStartTestCases": {
		"framework", // cts -> unstable
	},

	"CtsAppTestStubsApp2": {
		"framework", // cts -> unstable
	},
@@ -273,6 +277,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsDocumentContentTestCases": {
		"framework", // cts -> unstable
	},

	"CtsDreamsTestCases": {
		"framework", // cts -> unstable
	},
@@ -281,6 +289,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsEmptyTestApp_RejectedByVerifier": {
		"framework", // cts -> unstable
	},

	"CtsEphemeralTestsEphemeralApp1": {
		"framework", // cts -> unstable
	},
@@ -301,10 +313,18 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsFgsTimeoutTestCases": {
		"framework", // cts -> unstable
	},

	"CtsFileDescriptorTestCases": {
		"framework", // cts -> unstable
	},

	"CtsFingerprintTestCases": {
		"framework", // cts -> unstable
	},

	"CtsHostsideCompatChangeTestsApp": {
		"framework", // cts -> unstable
	},
@@ -433,6 +453,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsMediaProviderTestCases": {
		"framework", // cts -> unstable
	},

	"CtsMediaProviderTranscodeTests": {
		"framework", // cts -> unstable
	},
@@ -501,6 +525,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsOnDeviceIntelligenceServiceTestCases": {
		"framework", // cts -> unstable
	},

	"CtsOnDevicePersonalizationTestCases": {
		"framework", // cts -> unstable
	},
@@ -521,6 +549,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsPackageWatchdogTestCases": {
		"framework", // cts -> unstable
	},

	"CtsPermissionsSyncTestApp": {
		"framework", // cts -> unstable
	},
@@ -669,6 +701,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"framework", // cts -> unstable
	},

	"CtsTvTunerTestCases": {
		"framework", // cts -> unstable
	},

	"CtsUsageStatsTestCases": {
		"framework", // cts -> unstable
	},
@@ -799,6 +835,11 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"ondevicepersonalization_flags_lib", // apex [com.android.ondevicepersonalization] -> system
	},

	"framework-pdf-v.impl": {
		"app-compat-annotations",      // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> system
		"modules-utils-preconditions", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> apex [com.android.adservices, com.android.appsearch, com.android.cellbroadcast, com.android.extservices, com.android.ondevicepersonalization, com.android.tethering, com.android.uwb, com.android.wifi, test_com.android.cellbroadcast, test_com.android.wifi]
	},

	"framework-pdf.impl": {
		"modules-utils-preconditions", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> apex [com.android.adservices, com.android.appsearch, com.android.cellbroadcast, com.android.extservices, com.android.ondevicepersonalization, com.android.tethering, com.android.uwb, com.android.wifi, test_com.android.cellbroadcast, test_com.android.wifi]
	},
@@ -837,14 +878,54 @@ var ContainerDependencyViolationAllowlist = map[string][]string{
		"libnativeloader_vendor_shared_lib", // system -> vendor
	},

	"MctsMediaBetterTogetherTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaCodecTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaDecoderTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaDrmFrameworkTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaEncoderTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaExtractorTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaMiscTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaMuxerTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaPlayerTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaRecorderTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaTranscodingTestCases": {
		"framework", // cts -> unstable
	},

	"MctsMediaV2TestCases": {
		"framework", // cts -> unstable
	},

	"MediaProvider": {
		"app-compat-annotations", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> system
	},