From 4508ca9e70dacfecff218deada0eb1c323cf1acf Mon Sep 17 00:00:00 2001 From: Jihoon Kang Date: Wed, 28 Aug 2024 19:24:38 +0000 Subject: [PATCH] Define additional container violation allowlist These entries are proprietary, which are defined in vendor/google/build in git_main, but vendor projects do not exist in aosp-main-future-without-vendor branch. This change adds entries that are supposed to be included in the future aosp release. Ignore-AOSP-First: Intended aosp-main-future only change Test: m nothing Bug: 338660802 Change-Id: If48f56757e069a467a8ae0466820f27f97b011a8 --- android/container_violations.go | 81 +++++++++++++++++++++++++++++++++ 1 file changed, 81 insertions(+) diff --git a/android/container_violations.go b/android/container_violations.go index 14cd61b1f..5c49cfd79 100644 --- a/android/container_violations.go +++ b/android/container_violations.go @@ -169,6 +169,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsAppStartTestCases": { + "framework", // cts -> unstable + }, + "CtsAppTestStubsApp2": { "framework", // cts -> unstable }, @@ -273,6 +277,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsDocumentContentTestCases": { + "framework", // cts -> unstable + }, + "CtsDreamsTestCases": { "framework", // cts -> unstable }, @@ -281,6 +289,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsEmptyTestApp_RejectedByVerifier": { + "framework", // cts -> unstable + }, + "CtsEphemeralTestsEphemeralApp1": { "framework", // cts -> unstable }, @@ -301,10 +313,18 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsFgsTimeoutTestCases": { + "framework", // cts -> unstable + }, + "CtsFileDescriptorTestCases": { "framework", // cts -> unstable }, + "CtsFingerprintTestCases": { + "framework", // cts -> unstable + }, + "CtsHostsideCompatChangeTestsApp": { "framework", // cts -> unstable }, @@ -433,6 +453,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsMediaProviderTestCases": { + "framework", // cts -> unstable + }, + "CtsMediaProviderTranscodeTests": { "framework", // cts -> unstable }, @@ -501,6 +525,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsOnDeviceIntelligenceServiceTestCases": { + "framework", // cts -> unstable + }, + "CtsOnDevicePersonalizationTestCases": { "framework", // cts -> unstable }, @@ -521,6 +549,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsPackageWatchdogTestCases": { + "framework", // cts -> unstable + }, + "CtsPermissionsSyncTestApp": { "framework", // cts -> unstable }, @@ -669,6 +701,10 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "framework", // cts -> unstable }, + "CtsTvTunerTestCases": { + "framework", // cts -> unstable + }, + "CtsUsageStatsTestCases": { "framework", // cts -> unstable }, @@ -799,6 +835,11 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "ondevicepersonalization_flags_lib", // apex [com.android.ondevicepersonalization] -> system }, + "framework-pdf-v.impl": { + "app-compat-annotations", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> system + "modules-utils-preconditions", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> apex [com.android.adservices, com.android.appsearch, com.android.cellbroadcast, com.android.extservices, com.android.ondevicepersonalization, com.android.tethering, com.android.uwb, com.android.wifi, test_com.android.cellbroadcast, test_com.android.wifi] + }, + "framework-pdf.impl": { "modules-utils-preconditions", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> apex [com.android.adservices, com.android.appsearch, com.android.cellbroadcast, com.android.extservices, com.android.ondevicepersonalization, com.android.tethering, com.android.uwb, com.android.wifi, test_com.android.cellbroadcast, test_com.android.wifi] }, @@ -837,14 +878,54 @@ var ContainerDependencyViolationAllowlist = map[string][]string{ "libnativeloader_vendor_shared_lib", // system -> vendor }, + "MctsMediaBetterTogetherTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaCodecTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaDecoderTestCases": { + "framework", // cts -> unstable + }, + "MctsMediaDrmFrameworkTestCases": { "framework", // cts -> unstable }, + "MctsMediaEncoderTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaExtractorTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaMiscTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaMuxerTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaPlayerTestCases": { + "framework", // cts -> unstable + }, + + "MctsMediaRecorderTestCases": { + "framework", // cts -> unstable + }, + "MctsMediaTranscodingTestCases": { "framework", // cts -> unstable }, + "MctsMediaV2TestCases": { + "framework", // cts -> unstable + }, + "MediaProvider": { "app-compat-annotations", // apex [com.android.mediaprovider, test_com.android.mediaprovider] -> system },