92d02491aded7ca233fd52d586cc0b0bda4521cf |
|
11-Nov-2013 |
Raj Mamadgi <rmamadgi@sta.samsung.com> |
Fix for the invalid Global Proxy Setting Adding validation for Global Proxy setting before it is being set. Proxy is validated at the boot time also to make sure the value set is valid. Signed-off-by: Raj Mamadgi <rmamadgi@sta.samsung.com> bug:11598568 Change-Id: Idff5ae81119d8143da096b5291ecbfbc5875cbd4
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
f65c0a99583cfaa8119836b8691d3a79db21dbbf |
|
11-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
Fix inconsistency in reporting device admin active state. When a device admin goes away due to a package change, only one of two lists was being updated, causing an inconsistency in the query for active admins depending on which API was being called. This makes sure that mAdminMap stays in sync with mAdminList so that isActiveAdmin() and getActiveAdmins() returns the same results. Bug: 11588094 Change-Id: I232608738249492d9fca7e4d7aa7566d96fccf46
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
44a01b742c2ad2ebc6185425be887b4bc987c4d0 |
|
16-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
Add a feature to specify if device admins are supported on the device Bug: 9520957 DevicePolicyManagerService will play dumb if the feature is not installed. Continue to keep track of failed password attempts for keyguard's use. Change-Id: I28d258dc09a8b4976b188da6f453d8daabcc4bdd
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
0469f41010d8001dba5e09606bb631b1d3313021 |
|
05-Sep-2013 |
Maggie Benthall <mbenthall@google.com> |
CA cert monitoring: add notifications and actions for dialog In DevicePolicyManagementService, on boot and when certs are installed, post notification to tell the user that their traffic may be monitored. Have QuickSettings use the MonitoringCertInfoActivity instead of building the dialog itself. Bug: 10633199 Change-Id: Ie4b97295a9fc25867c87872feccdb17f4bea071d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
334c7e32d494baf3bf0ae371d6b5949c80368982 |
|
08-Aug-2013 |
Geoffrey Borggaard <geoffreyb@google.com> |
Add a name to the DeviceOwner We will need to display the name of the device owner (the human readable name of the institution) to the user. "This device is managed by google.com" Change-Id: Ic33b6530c19cb14a118245692697205de3911a58
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
a418cf21c9d03c1435e9adec3e025387b6345cd9 |
|
19-Jul-2013 |
Amith Yamasani <yamasani@google.com> |
New permission to manage device admins The previously used permission was doing double duty as the permission that device admins to check for to ensure that calls are coming from valid system components. MANAGE_DEVICE_ADMINS is system|signature and is now required to add/remove device admins. Required for: Bug: 9856348 Change-Id: I64385d2ec734c3957af21b5a5d9cffd8a3bcd299
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
840f114395652b3d31815ae23302218305b8b780 |
|
26-May-2013 |
Dianne Hackborn <hackbod@android.com> |
am 7f3ff133: Merge "Fix wrong log information in DevicePolicyManagerService" * commit '7f3ff133c19ed50dd245e025a44e1de7bcc3d38a': Fix wrong log information in DevicePolicyManagerService
|
ad83c198a1151e054a0072e51cfb92b5dbe0061f |
|
18-Apr-2013 |
joonyoung.cho <joonyoung.cho@lge.com> |
Fix wrong log information in DevicePolicyManagerService When user reset password their password, if password doesn't match target quality of device, DPM print a log why can't reset password. however log message isn't correct information. in log context, it have to exist current quality and target quality. this patch can help print correct log. Change-Id: I5c8fb1c77ddbe1bdbc76e35038c897e2e8efb077
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
3fa3c28a356108a6558b6b54a0b10e1a5cc4f1b6 |
|
27-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Keep track of who has disabled applications. Change-Id: I2640d3dc2200b589e2beb42a43cc93efd090f06e
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
71e6c697e54a43d357cc25d87a446d140f17396a |
|
25-Mar-2013 |
Amith Yamasani <yamasani@google.com> |
Device Owner, a special kind of device admin A Device Owner cannot be uninstalled and is available to all users. It must be registered before the device_provisioned flag is set. Device admins can be disabled until used, but visible to device policy manager, so that users wont be bothered with update requests. Opened up a few related APIs for use by a system-installed Device Owner. Change-Id: I847b5fe68c0f724863f778a67602b5bddc79d8e5
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
e4cf73437a18c1444055f88a1fcc0d146ec23ac5 |
|
17-Dec-2012 |
Amith Yamasani <yamasani@google.com> |
Starting point for User Restrictions API Restrictions saved as key/value pairs, mostly booleans right now but might be expanded to other types later. Save and restore restrictions in the user manager service. Enforce some of the restrictions at the framework level. Some are enforced (also) at the app level, such as in Settings. Change-Id: Id11ffe129cb6a177e094edf79635727388c26f40
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
68e0da7e397f6808a90509615c08c62bb00af6ba |
|
29-Nov-2012 |
Dianne Hackborn <hackbod@google.com> |
Merge "Quiet down a lot of logging." into jb-mr1.1-dev
|
40e9f2922cae76ffcbc521481e5be8e80e8744ef |
|
28-Nov-2012 |
Dianne Hackborn <hackbod@google.com> |
Quiet down a lot of logging. Also fix a little problem where the USER_STARTED broadcasts were not being sent as ordered broadcasts(!). Change-Id: I3aa3e0a9b3900967cdd2d115ee103371b0a50c41
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
32f0742e52de8cebdbbb6c8ede9d6f4315d50189 |
|
17-Nov-2012 |
Amith Yamasani <yamasani@google.com> |
Only wipe device if primary user (for failed password attempts) When a DeviceAdmin requests a device wipe due to a number of incorrect password attempts, only primary user can wipe the device. Secondary users can only remove themselves from the device. Bug: 7554445 Change-Id: I24331cb4eff37571fcd792abb2efc794f7b3f2d2
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
f752202bee88e31ce765483ba2efa6999ae9c9ad |
|
04-Oct-2012 |
Adam Cohen <adamcohen@google.com> |
Plumbing to allow keyguard to be shown with user switcher (issue 7175023) -> Also reduced calls to lockNow, and moved this call in ActivityManagerService Change-Id: I9ba34ca902f7c0f71fa4ec302104688ca8d11f55
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
7077b3c9bb7367bae3e073aa213de51baf3321a9 |
|
04-Oct-2012 |
Amith Yamasani <yamasani@google.com> |
Read in the disable-keyguard-features flag from the XML file Bug: 7283501 Exchange Services crash while using Email App after upgrading Change-Id: I40d13f5d3805ea3139dc3938077a5265ff78c426
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
625239a05401bbf18b04d9874cea3f82da7c29a1 |
|
27-Sep-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate more Secure settings to Global. Migrate networking, storage, battery, DropBox, and PackageManager related Secure settings to Global table. Bug: 7232014, 7231331, 7231198 Change-Id: I772c2a9586a2f708c9db95622477f235064b8f4d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
48b9b0d068844af9eb37c215484831c4d6b831b0 |
|
20-Sep-2012 |
Jim Miller <jaggies@google.com> |
Make DPM API for disabling keyguard widgets more generic This change renames the widget-specific API to be more generic to allow further disabling of keyguard-specific customizations in the future. Currently only allows disabling widgets and the secure camera but can now easily be extended to disable other features we add. Fixes bug: 7021368 Change-Id: I3934cc2e7c64e0c6d511efb86980fc38a849708d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
599dd7ce9adf8ca067cefb0b191a5ac20ec35a79 |
|
15-Sep-2012 |
Amith Yamasani <yamasani@google.com> |
DevicePolicyManager per user Bug: 7136483 Store device policy information for each user and apply them when user switches. Global proxy can only be controlled by owner. Camera restriction applies to all users, if any one has an admin that disables it. Storage encryption can only be controlled by owner, although other users can query the state. Wipe data will only remove the user if non-zero, wipe the device, if zero. Change-Id: I359be46c1bc3828fd13d4be3228f11495081c8f2
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
b7a685978f3ea8a1514166c6986c1f1bacedab4a |
|
10-Sep-2012 |
Amith Yamasani <yamasani@google.com> |
Fix DevicePolicyManager crash when settings password quality (and possibly others). Bug: 7130570 Clear the calling identity before broadcasting to all users. Change-Id: Ibe84af1ee00aecfe4b2d5bb7731a952f617b4885
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
62df6eb5081fbb66d9245626e8c91497431040e4 |
|
08-Sep-2012 |
Christopher Tate <ctate@google.com> |
Refer to STAY_ON_WHILE_PLUGGED_IN via the Global namespace It moved from System to Global, so writes are not automatically redirected to the new namespace (else apps would start crashing). Bug 7126575 Change-Id: Ief31fcb5a6107a098da04d30d146e16921dee776
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
b8ec470617590fa2025db869e8e80dcce8eaec23 |
|
01-Sep-2012 |
Jim Miller <jaggies@google.com> |
Update DevicePolicyManager with ability to disable keyguard widgets Change-Id: I5876e9e180b2a995aaa355fbbb2b67cebb86104d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
5ac72a29593ab9a20337a2225df52bdf4754be02 |
|
30-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Improve multi-user broadcasts. You can now use ALL and CURRENT when sending broadcasts, to specify where the broadcast goes. Sticky broadcasts are now correctly separated per user, and registered receivers are filtered based on the requested target user. New Context APIs for more kinds of sending broadcasts as users. Updating a bunch of system code that sends broadcasts to explicitly specify which user the broadcast goes to. Made a single version of the code for interpreting the requested target user ID that all entries to activity manager (start activity, send broadcast, start service) use. Change-Id: Ie29f02dd5242ef8c8fa56c54593a315cd2574e1c
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
9630704ed3b265f008a8f64ec60a33cf9dcd3345 |
|
28-Jul-2012 |
Jeff Brown <jeffbrown@google.com> |
Power manager rewrite. The major goal of this rewrite is to make it easier to implement power management policies correctly. According, the new implementation primarily uses state-based rather than event-based triggers for applying changes to the current power state. For example, when an application requests that the proximity sensor be used to manage the screen state (by way of a wake lock), the power manager makes note of the fact that the set of wake locks changed. Then it executes a common update function that recalculates the entire state, first looking at wake locks, then considering user activity, and eventually determining whether the screen should be turned on or off. At this point it may make a request to a component called the DisplayPowerController to asynchronously update the display's powe state. Likewise, DisplayPowerController makes note of the updated power request and schedules its own update function to figure out what needs to be changed. The big benefit of this approach is that it's easy to mutate multiple properties of the power state simultaneously then apply their joint effects together all at once. Transitions between states are detected and resolved by the update in a consistent manner. The new power manager service has is implemented as a set of loosely coupled components. For the most part, information only flows one way through these components (by issuing a request to that component) although some components support sending a message back to indicate when the work has been completed. For example, the DisplayPowerController posts a callback runnable asynchronously to tell the PowerManagerService when the display is ready. An important feature of this approach is that each component neatly encapsulates its state and maintains its own invariants. Moreover, we do not need to worry about deadlocks or awkward mutual exclusion semantics because most of the requests are asynchronous. The benefits of this design are especially apparent in the implementation of the screen on / off and brightness control animations which are able to take advantage of framework features like properties, ObjectAnimator and Choreographer. The screen on / off animation is now the responsibility of the power manager (instead of surface flinger). This change makes it much easier to ensure that the animation is properly coordinated with other power state changes and eliminates the cause of race conditions in the older implementation. The because of the userActivity() function has been changed so that it never wakes the device from sleep. This change removes ambiguity around forcing or disabling user activity for various purposes. To wake the device, use wakeUp(). To put it to sleep, use goToSleep(). Simple. The power manager service interface and API has been significantly simplified and consolidated. Also fixed some inconsistencies related to how the minimum and maximum screen brightness setting was presented in brightness control widgets and enforced behind the scenes. At present the following features are implemented: - Wake locks. - User activity. - Wake up / go to sleep. - Power state broadcasts. - Battery stats and event log notifications. - Dreams. - Proximity screen off. - Animated screen on / off transitions. - Auto-dimming. - Auto-brightness control for the screen backlight with different timeouts for ramping up versus ramping down. - Auto-on when plugged or unplugged. - Stay on when plugged. - Device administration maximum user activity timeout. - Application controlled brightness via window manager. The following features are not yet implemented: - Reduced user activity timeout for the key guard. - Reduced user activity timeout for the phone application. - Coordinating screen on barriers with the window manager. - Preventing auto-rotation during power state changes. - Auto-brightness adjustment setting (feature was disabled in previous version of the power manager service pending an improved UI design so leaving it out for now). - Interpolated brightness control (a proposed new scheme for more compactly specifying auto-brightness levels in config.xml). - Button / keyboard backlight control. - Change window manager to associated WorkSource with KEEP_SCREEN_ON_FLAG wake lock instead of talking directly to the battery stats service. - Optionally support animating screen brightness when turning on/off instead of playing electron beam animation (config_animateScreenLights). Change-Id: I1d7a52e98f0449f76d70bf421f6a7f245957d1d7
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
3346bc69493e75565208f9b485bd6038e6abefe9 |
|
26-Jun-2012 |
Nick Kralevich <nnk@google.com> |
am ab294eeb: Merge "DevicePolicyManagerService: dump less" into jb-dev * commit 'ab294eeb20d884855b038600f94a6e17b88b5772': DevicePolicyManagerService: dump less
|
be00b410146b35b50fc213474a8d04d463021554 |
|
26-Jun-2012 |
Nick Kralevich <nnk@google.com> |
DevicePolicyManagerService: dump less Reduce the amount of unnecessary information emitted from the DevicePolicyManagerService. Bug: 6732364 Change-Id: I639f6beab8471bdbe41ce6cd3a5a378acaf678b2
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
608601924651531210ad3c6179d02c471f42dddf |
|
18-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
am d8bbf96a: Merge "Fix issue #6664140: Time to lock should work even Stay awake..." into jb-dev * commit 'd8bbf96a84cba7c31fa1535fe2467520f2aa0198': Fix issue #6664140: Time to lock should work even Stay awake...
|
2fe8fb276c28372edb60f5bb10e172c19ef2671b |
|
16-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #6664140: Time to lock should work even Stay awake... ...in Developer options is on Don't respect stay awake while on as long as a time to lock limit is being enforced. When we start enforcing one, make sure the setting is off (since we won't be respecting it anyway). Bug: 6664140 Change-Id: Id07cb528afa0c64c7766341841c51771f507121d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
c6df8417eaf60f80b2741ec29e8188324de95af3 |
|
25-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
am 541803cc: am fd63c857: Merge "Wipe the user data out in any case." * commit '541803ccc530b8cc1d8d95aa5a82ebc191fc218c': Wipe the user data out in any case.
|
fd63c85742f4b12065418d48ae10be4bb12468f5 |
|
25-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Wipe the user data out in any case."
|
d0d7503fd3e941113094532f28986f49b11b5fdb |
|
20-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Move handling of package changes to a background thread. Helps get rid of some jank when installing applications. Change-Id: I97d0022f82d67796e334d37086e5911dd6ca6b62
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
f535cb04f08575d29118fab0342b1e6274091734 |
|
15-Feb-2012 |
Masanori Ogino <ogino.masanori@sharp.co.jp> |
Wipe the user data out in any case. When the external storage is not mounted, the android system won't wipe out the user data (i.e. "/data") if wipeData() is called with the flag WIPE_EXTERNAL_STORAGE. We think that the user data should be wiped out in any options and also wipeData(int) method currently supports also for a external storage. So we will also change the API reference comment. If we should care about backward compatibility of this method behavior with the option WIPE_EXTERNAL_STORAGE, then we would add an another bitmask something like a ALWAYS_RESET. Change-Id: Id7bf673c722bacc0480d32e46553b9a348513879
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
93c518e4f8abd98f87cda1712b30a5a86cfa60dd |
|
18-Jan-2012 |
Jim Miller <jaggies@google.com> |
Fix 5863053: Add method to lock screen immediately. This fixes a bug where the device fails to lock when DevicePolicyManagerService requests the device to be locked and the screen was off because the user hit the power button. The change allows DPMS to directly invoke screen lock, bypasssing the screen state. Change-Id: Iecdda6fc61e9c519119de495be23c69c3b983921
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
de7a2f30548ac64d67e9ce8ac08090eb5458449d |
|
21-Dec-2011 |
Danielle Millett <dmillett@google.com> |
DO NOT MERGE - Cherry picking from master to MR1 Fix 5783857: Device Policy Manager doesn't allow Face Unlock This makes it so that if face unlock is enabled and then a device policy manager that requires something more secure than face unlock is installed, the user will be forced to choose a new acceptable lock type. This was previously fixed for the case where the device had been reset, or the shell was restarted after setting face unlock, but not for the case where the device remained on between setting face unlock and setting up a device policy manager. Also changed the function ordering of saveLockPattern() so that the overloaded wrapper function is next to the main function. Change-Id: Ibed8c4ab137ebbc07fb143faef6f047bc6dc4474
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
ed48c8b4f50e060add50ad72a8d7af2fa547885b |
|
18-Oct-2011 |
Ben Komalo <benkomalo@google.com> |
Fix remote device wipe to not hang. The DPM seemed to always go through ExternalStorageFormatter to wipe the device and SD card. For SD cards emulated on a fuse filesystem, this seems to fail unless the device is wholly encrypted. Bypass ExternalStorageFormatter in those cases and just wipe as normal. Bug: 5458396 Change-Id: Iec759ef894c6bd3863cb4e7329f4de4584c60c1a
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
0191bba17cf78285aa38e0a91acbce112774d348 |
|
21-Aug-2011 |
Jim Miller <jaggies@google.com> |
Fix 4993068: Don't check password history when dpm sets the password This fixes a crash caused by permission problems when we try to update the password history and discover there's no password salt. The code attempts to create the salt, which triggers the exception. This could be fixed by wrapping the call with a clearCallingIdentity()/ restoreCallingIdentity(ident). However, while looking at it, it occurred to me that this can cause unexpected failures if the DPM tries to set the password twice or happens to set it to something in the password history. Instead, we should *always* allow the DPM to reset the password to whatever it wants, provided it passes the minimum password criteria. Change-Id: I1505b24f9c097ee5c2c44e4bf378ba90095b113b
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
2447edd85baac3225a12b868ef40f76cfdc6ec11 |
|
10-May-2011 |
Ben Komalo <benkomalo@google.com> |
New device policy to disable camera. This introduces a new policy that a DeviceAdmin can use to disable _all_ cameras on the device. A separate CL will be made on the media side to watch this policy bit and act accordingly. Bug: 4185303 Change-Id: I700cfc4a8317bb74087ccae39346d74467fc58b2
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
61ad43dc1e62a9cfdbc3f6624d9c8b269fc59a44 |
|
02-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
am 469465c4: am 0821f274: am 2a108403: I am a dummy. * commit '469465c45e42c66201639feb49db5421f5843bbe': I am a dummy.
|
c994d693b684bcba1a690310b5b2be306074cc02 |
|
02-Jun-2011 |
Andy Stadler <stadler@google.com> |
Use unchecked admin lookup for getStorageEncryption() Due to a copy/paste typo, getStorageEncryption() was protected by getActiveAdminForCallerLocked(), which made the API unreadable if the caller is not an admin. This doesn't match the rest of the DPM API which allows the "get" calls to be made anonymously. This fix supercedes the proposed workaround CL in the DPM ApiDemo sample. Change-Id: If1a6237634e97ced09a7c6a8876bb6b0f60c9be9
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
2a108403803bd30bee1c019060c208fb8c52c10c |
|
26-May-2011 |
Dianne Hackborn <hackbod@google.com> |
I am a dummy. Change-Id: Ie6908a8931954f83ab0e9b905173b576dbf3661d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
d998acb3491fe750ce157b6171d5b0a18f4b3883 |
|
25-May-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #4445007: DPM initializes some values to 1, instead of 0 Also fix not writing the settings file when an admin is removed. And take care of an old to-do about not removing an admin until after it has received the broadcast about it being disabled. Change-Id: I4ebe0ea0461222b65425b2c5438b646b572f18c8
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
6b85768058b065cc682757a366abc828c9ca727a |
|
17-Feb-2011 |
Jim Miller <jaggies@google.com> |
Fix 3197205: Minor edits to device policy admin strings and documentation Change-Id: I3788772c375b916752cd8a98ff5d3751448e4334
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
0fe45dea927dc87c19d6afd4502658b36177aa07 |
|
21-Jan-2011 |
Andy Stadler <stadler@google.com> |
Read actual device encryption status Bug: 3346770 Change-Id: Ie70c14b1b4584a5f340a27102145f7860ba9e14b
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
22dbfda976aab9ae897eed0625e2e64ead32bbc4 |
|
17-Jan-2011 |
Andy Stadler <stadler@google.com> |
Add internal plumbing to DPM for encryption * Add code to persist per-admin setting * Add hooks for OS-level tie-in (is supported, get / set status) * Add 3rd API call to get OS status (irrespective of admin settings) * Remove "REQUESTED" status, no longer relevant with 3rd API * Fixed bug that impacted global proxy settings * Update api/11.xml to match current.xml Bug: 3346770 Change-Id: I56bdf9a7894f6ca4842402c7b82ddb3caf4b37b9
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
7b0f8f08ac7b3ed5cf462b92283713b033d6a64a |
|
12-Jan-2011 |
Andy Stadler <stadler@google.com> |
API changes to support encryption in DPM * New uses-policies value * Definitions for storage domain and encryption status * API to get and set encryption status * Intent to launch encryption changes * Both new calls bottom out in the DPM service and are suitable for a device that does not support encryption. NOTE: Nobody should use ACTION_START_ENCRYPTION yet. It needs a receiver to be built in Settings (different CL). Change-Id: I2ae193bedbec59f6ba46c0ec7de12ecf321e5803
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
c25f70a440ef9468085b8d98c8416c7e8b116753 |
|
09-Dec-2010 |
Andy Stadler <stadler@google.com> |
API CHANGE - Add hasGrantedPolicy() API * Allows an app to detect that it needs to have additional policies granted * Add "refreshing" parameter to setActiveAdmin() to handle this case * Minor cleanups to eliminate warnings (mostly for unused things) Bug: 3253179 Change-Id: I4bf639bf560557130bf98e8cfb75f996fac416f1
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
043116a572c2bcb9dad4c264b38e252861fa54b4 |
|
30-Nov-2010 |
Andy Stadler <stadler@google.com> |
Update device password expiration/alarm behavior * Change alarm math to snap to multiples of 24h before expiration * Stop recurring alarm when no expirations upcoming * Fix small bug in update logic when device password is updated Change-Id: I31ce147e4f8c766245fae3e286fc50eaee4cfa22
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
1f35d487ba1a5208e66bc960f35f6e1d874fbd1e |
|
20-Nov-2010 |
Andy Stadler <stadler@google.com> |
Fixes to DevicePolicyManager.setPasswordExpirationTimeout * Fix permissions problem in DevicePolicyManager * Allow short timeouts (primarily for testing) * Remove unused debugging code Bug: 3212583 Change-Id: I3770b1c6f090363e8e8d65db92839cd53de05c45
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
434203a277cd2f237a71508a3d5a7d1602126cd5 |
|
12-Oct-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Notify all VMs when proxy changes. bug:2700664 Change-Id: I74cc6e0bd6e66847bf18f524ce851e3e9d2c4e87
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
a4e28d181942018ba8759989799a28fa88764ce3 |
|
09-Nov-2010 |
Jim Miller <jaggies@google.com> |
Add password expiration support to DevicePolicyManager. Change-Id: Ib2629ec547c123ac489d7f4cbd4e0a1d4aa07620
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
ab36acb39941ce981dddda9f9cf4d2d23a56fd26 |
|
05-Nov-2010 |
Dianne Hackborn <hackbod@google.com> |
Fixe some stuff. Addresses these bugs: 3061847 - With no headers, PreferenceActivity crashes 2888426 - minor typo in DevicePolicyManagerService.ActiveAdmin.writeToXml() 3159155 - IllegalStateException:"Can not perform this action after onSaveInstanceState" while dismissing a DialogFragment 3155995 - PopupWindow.showAtLocation does not respect LayoutParams Also tweak the new fragment APIs to use abstract classes instead of interfaces as base classes. Change-Id: I9c0b4337fe0e304b737b5f7c2762762372bb3020
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
027610a76e67f39e3a435d68ec785a1cf09dcf9c |
|
18-Oct-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 964eb438 to master Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
|
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 |
|
16-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3094621 and #3094609 - wipe sd card 3094621: add "wipe sd card" option to factory data reset 3094609: collapse unmount/format into one command Also since we have decided that it is important to consider the Crespo storage as internal storage, DevicePolicyManager gets a new API to be able to wipe it. (No big deal, since all of the work for this is now done in the implementation of the new UI.) Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
dc71b9e4d67327065a992924a021cad4bc100fa2 |
|
01-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 6a3eddb4 to master Change-Id: I1ca1d100274d4a733ef2bf58b0d5d7217b4f858e
|
cef65eeb0315c3118bf8860d6f723cb49ff6bc52 |
|
01-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Rub in a little 'ol log-b-gone. Mmmmmm... great fresh scent! Change-Id: I050e70b31b5d4a9c6731f15a4b51a3620a33a78d
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
69238c6a37ae43c748ad9cd7613f2209149ee7da |
|
03-Aug-2010 |
Oscar Montemayor <oam@google.com> |
Device Policy Manager changes to enable Global Proxy. Change-Id: I8489df7d28e4c5312e10d5cecc8e2a182413a034
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
c857740f242169f2ca7fd42f0d1268661b399ad6 |
|
05-Jun-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Adding support for minimum number of non letter characters. Change-Id: If54cb7209d65eef826d474d7e0dbbef63d2f2b47
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
1a0ce1cc6f6bda7ef7345b20860bc0c8cd3d8451 |
|
09-Jun-2010 |
Jim Miller <jaggies@google.com> |
am db603bb5: am 3b68548d: am 75b6a6b9: Merge "Fix 2737842: Disable KeguardManager API if device policy is enabled" into froyo
|
284b62e1b8c3419bfd02c6fea5ba0a68146c06f8 |
|
08-Jun-2010 |
Jim Miller <jaggies@google.com> |
Fix 2737842: Disable KeguardManager API if device policy is enabled This change adds notification to find out when the device policy has changed. When an admin adds or changes a policy, we get notified and reset the state of keyguard to be enabled. It also moves disabling keyguard into the TokenWatcher.acquired() method to avoid disabling keyguard when a policy doesn't permit it. This avoids reference counting issues in TokenWatcher and hence relieves the ordering issue. There is one remaining caveat. An application that uses KeyguardManager to disable keyguard will need to disable keyguard again after any policy change. Tested: Install and run app that disables keyguard with no admin. Result: keyguard is enabled/disabled as expected. Enable admin and set quality = "something" after installing & running app. Result: keyguard is enabled. Change admin password quality to "unspecified" and re-run app (per caveat). Result: keyguard is disabled. Change admin password quality to "something" again. Result: keyguard is enabled. Disable admin : Result: keyguard is enabled until app runs again (per caveat). Added minor cosmetic changes after review. Change-Id: I302f2b01446bf031f746b0f3e8b5fd7a6cc0e648
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
a15dcfaf2bc7cbd13b30db6766afe3bbaa01db97 |
|
25-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2677197: Adding minimum complex character support. Change-Id: I520bc5f9aa924bf9b5585b2235a91cc96cb99c25
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
3255823de062e981f7bfc7994919207988697e45 |
|
21-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2673731: Adding support for password history to Device Admin. Change-Id: If3240048813e32b2bae79fe5cb8a73aea20ec56c
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
85f2c9ce5a0e074df2429a5d66e1754e368a0430 |
|
22-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2530103: ActivePassword data in Device Policy Manager needs to be persisted Also fixes how the quality vs. mode is handled to be more consistent, which also required introducing a new "alphabetic" quality since it is possible for the user to enter such a password. The current password quality and length is stored in the DPM, since at boot it couldn't figure this out from the stored password. Change-Id: I519d9b76dd0b4431bcf42920c34dda38c9f1136e
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
1afd1c90ebe789b8d3a137004127a50d2db7e3b5 |
|
19-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Maybe fix issue #2457218: Corrupt batterystats.bin file preventing phone boot - LIBtt68127 No steps to repro, but makes the code more robust by using the standard JournaledFile class and doing sanity checks on the input it reads. This required moving the JournaledFile class in to the framework (and we really should get rid of either it or AtomicFile, but they have different recovery semantics so that is tough). Also went through and cleaned up the file management in various places. Change-Id: Ieb7268d8435e77dff66b6e67bb63b62e5dea572e
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
87bba1ee14279bb14a28d42e27c4ef66d9967bf8 |
|
27-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Move DeviceAdmin APIs to android.app.admin. Also add ability for admins to hide themselves when not in use, a facility for admins to not allow other admins to reset their password, and debug dumping.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
2269d1572e5fcfb725ea55f5764d8c3280d69f6d |
|
25-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Re-arrange android-common so framework no longer links with it. This is the framework part, moving classes around so the framework no longer needs to link to android-common. Makes some APIs public, others that didn't need to be public are private in the framework, some small things are copied.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
21f1bd17b2dfe361acbb28453b3f3b1a110932fa |
|
20-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2438980: Implement package watcher for voice recognizer service setting I am getting tired of writing package monitor code, realized this is missing in a number of places, and at this point it has gotten complicated enough that I don't think anyone actually does it 100% right so: Introducing PackageMonitor. Yes there are no Java docs. I am still playing around with just what this thing is to figure out what makes sense and how people will use it. It is being used to fix this bug for monitoring voice recognizers (integrating the code from the settings provider for setting an initial value), to replace the existing code for monitoring input methods (and fix the bug where we wouldn't remove an input method from the enabled list when it got uninstalled), to now monitor live wallpaper package changes (now allowing us to avoid reverting back to the default live wallpaper when the current one is updated!), and to monitor device admin changes. Also includes a fix so you can't uninstall an .apk that is currently enabled as a device admin. Also includes a fix where the default time zone was not initialized early enough which should fix issue #2455507 (Observed Google services frame work crash). In addition, this finally introduces a mechanism to determine if the "force stop" button should be enabled, with convenience in PackageMonitor for system services to handle it. All services have been updated to support this. There is also new infrastructure for reporting battery usage as an applicatin error report.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
ef6b22fc04a8d5ab26e13efac8069c097e0da7c9 |
|
17-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2420412: API review: DeviceAdmin API changes Note in docs that callbacks are on main thread. Rename to DeviceAdminReceiver? Document resetPassword is the device's password. Also hide android.R.attr.neverEncrypt.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
315ada7fbb9e967c22e87b4921bec720ceb2c73c |
|
11-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Get rid of the limit-unlock policy control. This is merged with force-lock. These both allow effectively the same thing, so there is no reason to junk up the user experience with them as separate entities.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
e83cefcef07f9ac025642c1ffec76b4c7ab39cf2 |
|
05-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
New external storage APIs. This implements the spec for external storage organization, and properly reflects how the media scanner organizes the files it finds. Also includes package manager support for removing app private files from external storage when the application is uninstalled. For the new APIs and paths, the main place to look is Environment and Context.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
9327f4f671de3cbb795612bf4f314ceff88de865 |
|
29-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
More device policy work: clarify password modes, monkeying. Clarifies what the password modes mean, renaming them to "quality" and updating their documentation and the implementation to follow. Also adds a facility to find out if a monkey is running, which I need for the api demo to avoid letting it wipe the device.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
254cb446faa7cb13699d8150eb4cc4f44cb61a2d |
|
28-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
More device admin. - Clean up device policy manager APIs. - Implement lockNow(). For now this just turns the screen off to lock the device.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
d47c6ed4a9f2b5bd31f6c806b74701428efe458b |
|
28-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
Bite the bullet and add support for multiple device admins.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
8ea138cbf12b140d43fd81f4f12fe1a9234f1f25 |
|
27-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
More work on device admins: - You can now show a dynamic message to the user when asking to have your DeviceAdmin added. - A DeviceAdmin can now provide a warning message that is displayed before a user disables it. - Better ordering (and text) of the policy warnings. - New API to set the maximum failed password attempts before the device wipes itself. - We now store the number of failed unlock attempts in persistent storage. - New managed dialog APIs that will be used by the settings app. Also a little bit of cleanup as I was working on this - removed the long unused MailboxNotAvailableException, fixed a java doc in Messenger.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
8aa2e8939c61d788cbc192098465e79f584e173a |
|
22-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
More device admin work: description, policy control. There is now a description attribute associated with all components, that can supply user-visible information about what the component does. We use this to show such information about device admins, and wallpapers are also updated to be able to show this in addition to the existing description in their meta-data. This also defines security control for admins, requiring that they declare the policies they will touch, and enforcing that they do so to be able to use various APIs.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
4141d035c7d41f39f023d7a051568dff87c7cd32 |
|
22-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
Don't crash when there is no admin.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
df83afaf299666e99c519aa86e7e082b7c116e95 |
|
20-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
More device policy manager / admin work. Update API with some new features, re-arrange how you check for valid passwords, and start hooking up the back-end implementation.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|
d68478467e3f837511196c80891d7245d0e163df |
|
13-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
First pass at new device policy and administration APIs. This adds new DevicAdmin, DevicePolicyManager, and DeviceAdminInfo classes. See the java docs for each on documentation on them. Basically: a DeviceAdmin is what you derive from to administer a device; DevicePolicyManager is what you use to apply and check your policy requirements and perform other administration tasks.
/frameworks/base/services/java/com/android/server/DevicePolicyManagerService.java
|