diff options
Diffstat (limited to 'aconfig/bp2a/android.security')
8 files changed, 48 insertions, 6 deletions
diff --git a/aconfig/bp2a/android.security/Android.bp b/aconfig/bp2a/android.security/Android.bp index 5b89b72c..d78992d8 100644 --- a/aconfig/bp2a/android.security/Android.bp +++ b/aconfig/bp2a/android.security/Android.bp @@ -1,4 +1,4 @@ -// Copyright 2024 Google Inc. All rights reserved. +// Copyright 2025 Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. @@ -13,9 +13,9 @@ // limitations under the License. aconfig_values { - name: "aconfig-values-platform_build_release-bp2a-android.security-all", - package: "android.security", - srcs: [ - "*_flag_values.textproto", - ], + name: "aconfig-values-platform_build_release-bp2a-android.security-all", + package: "android.security", + srcs: [ + "*_flag_values.textproto", + ] } diff --git a/aconfig/bp2a/android.security/asm_restrictions_enabled_flag_values.textproto b/aconfig/bp2a/android.security/asm_restrictions_enabled_flag_values.textproto new file mode 100644 index 00000000..ee9436e2 --- /dev/null +++ b/aconfig/bp2a/android.security/asm_restrictions_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "asm_restrictions_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/content_uri_permission_apis_flag_values.textproto b/aconfig/bp2a/android.security/content_uri_permission_apis_flag_values.textproto new file mode 100644 index 00000000..8d00902d --- /dev/null +++ b/aconfig/bp2a/android.security/content_uri_permission_apis_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "content_uri_permission_apis" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/enforce_intent_filter_match_flag_values.textproto b/aconfig/bp2a/android.security/enforce_intent_filter_match_flag_values.textproto new file mode 100644 index 00000000..a3f2bb82 --- /dev/null +++ b/aconfig/bp2a/android.security/enforce_intent_filter_match_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "enforce_intent_filter_match" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/extend_ecm_to_all_settings_flag_values.textproto b/aconfig/bp2a/android.security/extend_ecm_to_all_settings_flag_values.textproto new file mode 100644 index 00000000..91e04e42 --- /dev/null +++ b/aconfig/bp2a/android.security/extend_ecm_to_all_settings_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "extend_ecm_to_all_settings" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/frp_enforcement_flag_values.textproto b/aconfig/bp2a/android.security/frp_enforcement_flag_values.textproto new file mode 100644 index 00000000..f80665c7 --- /dev/null +++ b/aconfig/bp2a/android.security/frp_enforcement_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "frp_enforcement" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/fsverity_api_flag_values.textproto b/aconfig/bp2a/android.security/fsverity_api_flag_values.textproto new file mode 100644 index 00000000..5aaa9642 --- /dev/null +++ b/aconfig/bp2a/android.security/fsverity_api_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "fsverity_api" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.security/mgf1_digest_setter_v2_flag_values.textproto b/aconfig/bp2a/android.security/mgf1_digest_setter_v2_flag_values.textproto new file mode 100644 index 00000000..85ccfab1 --- /dev/null +++ b/aconfig/bp2a/android.security/mgf1_digest_setter_v2_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.security" + name: "mgf1_digest_setter_v2" + state: ENABLED + permission: READ_ONLY +} |