chromium/third_party/android_deps/README.chromium

Name: Android Deps Repository
Short Name: android_deps
URL: https://chromium.googlesource.com/chromium/src/+/main/third_party/android_deps/README.md
Version: 1
License: Refer to additional_readme_paths.json
License Android Compatible: yes
Security Critical: no
Shipped: no

Description:
A gradle-specified repository for Android and Java dependencies.

Local Modifications:
Everything directly here is chromium code, and third_party code lives under
`libs`, where each library has its own README.chromium and LICENSE:

```
third_party/android_deps
├── .gitignore (hand written)
├── Android_SDK_License-December_9_2016.txt ([1])
├── additional_license_paths.json (generated)
├── BUILD.gn (partly generated)
├── libs (generated)
│   ├── dependency_group_name_and_version
│   │   ├── 3pp (generated)
│   │   │   ├── 3pp.pb (generated)
│   │   │   └── fetch.py (generated)
│   │   ├── dependency_name_and_version.jar (third_party)
│   │   ├── LICENSE (third_party)
│   │   └── README.chromium (generated)
│   └── other_dependency_group_name_and_version
│       ├── 3pp (generated)
│       │   ├── 3pp.pb (generated)
│       │   └── fetch.py (generated)
│       ├── other_dependency_name_and_version.jar (third_party)
│       ├── LICENSE (third_party)
│       └── README.chromium (generated)
└── README.chromium (hand written)

[1] - Copied main text verbatim from https://developer.android.com/studio/terms
```

Instructions for adding/updating dependencies are in:
    //third_party/android_deps/README.md

Vulnerability detection: fetch_all.py runs 'gradle dependencyCheckAnalyze' to look
for known vulnerabilities each time the script is run. It is expected that Vomit
(go/vomit) will absorb this responsibility in future.