summaryrefslogtreecommitdiff
path: root/tools/warn/java_warn_patterns.py
diff options
context:
space:
mode:
author Oleh Cherpak <oleh.cherpak@globallogic.com> 2020-10-05 17:04:59 +0300
committer Oleh Cherpak <oleh.cherpak@globallogic.com> 2020-10-20 18:29:35 +0000
commite555ab18481114f61a603fbe6274b311758af14a (patch)
tree86c84a4db310d9c68e264ea72bf8ef0216513eb8 /tools/warn/java_warn_patterns.py
parent0071b0b56d7c630f4cd823e0b55c1f0e08b96010 (diff)
sign_target_files_apks: Fix password encrypted keys handle
This patch restores the possibility of using password encrypted keys for build signing. Bug: 171221825 Test: 1. Generate password encrypted keys (write non empty passwords): $ subject='/C=US/ST=California/L=Mountain View/O=Android/OU=Android/CN=Android/emailAddress=android@android.com' $ mkdir ~/.android-certs $ for x in releasekey platform shared media; do \ ./development/tools/make_key ~/.android-certs/$x \ "$subject"; \ done       2. Create a file with passwords: Example of passwd file: [[[ 12345678 ]]] /home/user/.android-certs/releasekey [[[ 12345678 ]]] /home/user/.android-certs/platform [[[ 12345678 ]]] /home/user/.android-certs/shared [[[ 12345678 ]]] /home/user/.android-certs/media [[[ 12345678 ]]] /home/user/.android-certs/networkstack 3. Tell system where to find passwords: $ export ANDROID_PW_FILE=/path/to/file/with/passwords 4. Generate a release image: $ make dist $ sign_target_files_apks \ -o --default_key_mappings ~/.android-certs \ out/dist/*-target_files-*.zip \ signed-target_files.zip Signed-off-by: Oleh Cherpak <oleh.cherpak@globallogic.com> Change-Id: I3e9d5318f69a2c3ac6eec64b36163b6544d49c90
Diffstat (limited to 'tools/warn/java_warn_patterns.py')
0 files changed, 0 insertions, 0 deletions