[go: nahoru, domu]

tree: 95eee6bab8a34157d9521ba1940c1207b1aa5688 [path history] [tgz]
  1. wrapper/
  2. libs.versions.toml
  3. README.md
  4. verification-keyring.keys
  5. verification-metadata.xml
gradle/README.md

wrapper/gradle-wrapper.properties

Keeps track of Gradle version used by androidx. When updating the version a new version prebuilt needs to be added to tools/external/gradle repository.

libs.versions.toml

Keeps track of library and plugin dependencies used by androidx. Adding or updating a library there requires running ./development/importMaven/import_maven_artifacts.py -n myartifact:here:1.0.0

verification-keyring.keys

Checked-in local keyring that is used to avoid reaching out to key servers whenever a key is required by Gradle to verify an artifact.

AndroidX only uses human readable verification-keyring.keys. Gradle also generates binary verification-keyring.gpg, but it is optional, and thus we do not use it.

To update this file, after adding the relevant dependencies to the build, run:

development/update-verification-metadata.sh

verification-metadata.xml

Configuration file for Gradle dependency verification used by androidx to make sure dependencies are signed with trusted signatures and that unsigned artifacts have expected checksums.

When adding a new artifact

  • if it is signed, then run:
development/update-verification-metadata.sh

to trust the signature of the new artifact.

  • if it is not signed, then run the following to add generated checksums to verification-metadata.xml:
./gradlew -M sha256 buildOnServer --dry-run

Then you will want to diff gradle/verification-metadata.dryrun.xml and gradle/verification-metadata.xml using your favorite tool (e.g. meld) can copy over the entries that are relevant to your new artifacts.

Each new checksum that you copy over in this way must be associated with a bug that is tracking an effort to build or acquire a signed version of this dependency. To associate with a bug, please add an androidx:reason attribute to a string that contains a URL for a bug filed either in buganizer or github:

<component group="g" name="g" version="3.1" androidx:reason="Unsigned b/8675309">
  <artifact name="g-3.1.jar">
    <sha256
      value="f5759b7fcdfc83a525a036deedcbd32e5b536b625ebc282426f16ca137eb5902"
      origin="Generated by Gradle"
    />
  </artifact>
</component>

After doing this, you can then delete all the verification-*-dryrun.* files.

If that doesn't work.

If the artifact is not signed, and does not get automatically added to verification-metadata.xml when you go through the above process, it‘s possible it’s a dependency of a detached configuration.

In this case, your best option may be to generate and add the checksum by hand, to at least protect against any future tampering with the current artifact file. To do this, for an artifact file foo.tar.gz, run: sha256 foo.tar.gz. This will generate a sha256 checksum that you can hand-add to verification-metadata.xml following the example of other entries. For example, this is where the current checksum for kotlin-native-prebuilt-linux-x86_64 came from.