Keeps track of Gradle version used by androidx. When updating the version a new version prebuilt needs to be added to tools/external/gradle
repository.
Keeps track of library and plugin dependencies used by androidx. Adding or updating a library there requires running ./development/importMaven/importMaven.sh myartifact:here:1.0.0
Checked-in local keyring that is used to avoid reaching out to key servers whenever a key is required by Gradle to verify an artifact.
AndroidX only uses human readable verification-keyring.keys
. Gradle also generates binary
verification-keyring.gpg
, but it is optional, and thus we do not use it.
To update this file, after adding the relevant dependencies to the build, run:
development/update-verification-metadata.sh
Configuration file for Gradle dependency verification used by androidx to make sure dependencies are signed with trusted signatures and that unsigned artifacts have expected checksums.
When adding a new artifact
- if it is signed, then run:
development/update-verification-metadata.sh
to trust the signature of the new artifact.
- if it is not signed, then run the following to add generated checksums to
verification-metadata.xml
:
./gradlew -M sha256 buildOnServer --dry-run
Then you will want to diff gradle/verification-metadata.dryrun.xml
and
gradle/verification-metadata.xml
using your favorite tool (e.g. meld) can copy over the entries
that are relevant to your new artifacts.
Each new checksum that you copy over in this way must be associated with a bug that is tracking
an effort to build or acquire a signed version of this dependency. To associate with a bug,
please add an androidx:reason
attribute to a string that contains a URL for a bug filed
either in buganizer or github:
<component group="g" name="g" version="3.1" androidx:reason="Unsigned b/8675309">
<artifact name="g-3.1.jar">
<sha256
value="f5759b7fcdfc83a525a036deedcbd32e5b536b625ebc282426f16ca137eb5902"
origin="Generated by Gradle"
/>
</artifact>
</component>
After doing this, you can then delete all the verification-*-dryrun.*
files.
If the artifact is not signed, and does not get automatically added to verification-metadata.xml when you go through the above process, it's possible it's a dependency of a detached configuration.
In this case, your best option may be to generate and add the checksum by hand, to at least
protect against any future tampering with the current artifact file. To do this, for an
artifact file foo.tar.gz, run: sha256 foo.tar.gz
. This will generate a sha256 checksum that
you can hand-add to verification-metadata.xml following the example of other entries. For
example, this is where the current checksum for kotlin-native-prebuilt-linux-x86_64 came from.