b182955a1eabc30d3cf70856f838b46a91c34569 |
|
05-Jan-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #18901214: APR: Frequent crash in android The ShutdownActivity was implemented in the system server code, which is no longer part of the boot class path. This would work fine when requesting a shutdown from the primary user, since in that case the activity would be loaded in to the main system process which also has the system service code loaded. However, when executed from a secondary user, we need to spin up a new system process for it; that system process is just a regular app process, without the system service code, so *boom*. To fix this, move ShutdownActivity to the framework jar. Change-Id: Icb831cd6ed619da5feede5605c45ef177a892fbc
/frameworks/base/core/res/AndroidManifest.xml
|
df1d07b4c77bcc8928b2e5360440aa9b69a6cd21 |
|
05-Dec-2014 |
Jing Zhao <zhaojing@motorola.com> |
Add checking to find AppDirectedSmsProxy for App Directed SMS feature Adding new system permission android.permission.CARRIER_FILTER_SMS Bug: 18609762 Change-Id: I80a133653101cd4ec1793e726faf3601e2970224
/frameworks/base/core/res/AndroidManifest.xml
|
981344861cdea72580964d6936dcf2e2dd9ff439 |
|
05-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE Bug: 18005911 Change-Id: Iacb16a20c5cef4a55be0187af0a47e0cb82b409b
/frameworks/base/core/res/AndroidManifest.xml
|
109ec376da86de1275f73fa432d6344431a457e9 |
|
04-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
Merge "new SMS/MMS carrier app API" into lmp-mr1-dev
|
b72eb97e4bca1e4fd68e79f9d04e9a6a15aebd21 |
|
22-Nov-2014 |
Cheuksan Wang <edwang@google.com> |
new SMS/MMS carrier app API Changes based on api council review BUG: 18005911 Change-Id: I23bd207ce70f7fa201d6d964c1700cfc44cb009b
/frameworks/base/core/res/AndroidManifest.xml
|
6b0c7acd7f175552d90d1d73b9717ff347158e7d |
|
24-Nov-2014 |
Andres Morales <anmorales@google.com> |
Define permission for system apps to query size of block Allows ManagedProvisioning to determine whether there's a challenge and thus whether to disable NFC provisioning. Other implementation option: new hidden boolean API method. Can't think of benefit of new API method "isBlockInUse", other than doesn't leak PDB size and is more explicitly tied to the use case. Open to either impl if anyone has opinions on the matter. Bug: 18508767 Change-Id: I28d2eb5a0837ff85cb91f140b17ce1dd843fe9d6
/frameworks/base/core/res/AndroidManifest.xml
|
e0cb56b02eb2bb52a537b32c5d3f5360b9718c8a |
|
17-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev
|
fb8db1c84b7fd59f596a6c090a8035fab08ef2f5 |
|
13-Nov-2014 |
Abhijith Shastry <ashastry@google.com> |
Merge "new sms/mms carrier app API" into lmp-mr1-dev
|
f9c50c45c615338bf9bfe57cd1ecff490051c997 |
|
22-Oct-2014 |
Cheuksan Wang <edwang@google.com> |
new sms/mms carrier app API BUG: 18005911 Change-Id: Ib961badc1ccac270f1244f8d971d9abec324b73f
/frameworks/base/core/res/AndroidManifest.xml
|
bc19c181c8c058c824e4fee907a05129e142c388 |
|
11-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Enforce VPN control "permission" with an actual permission. The current implementation uses a whitelist of package names. Use a system|signature permission instead of rolling our own security and add that permission to the existing set of whitelisted packages (SystemUI and VpnDialogs). In addition to being less of a security risk (using well-known methods like Context.enforceCallingPermission rather than manually querying PackageManager and checking UIDs for package names), this enables other system-privileged apps to control VPN as needed per the below bug. Bug: 18327583 Change-Id: I38617965c40d62cf1ac28e3cb382c0877fb1275d
/frameworks/base/core/res/AndroidManifest.xml
|
f89b58ca834de833fe45130f49270b3743240b2e |
|
11-Nov-2014 |
Alan Viverette <alanv@google.com> |
Fix Material styling in remaining dialogs and layouts Also updates existing row and dialog layouts to use preferred list item or dialog padding as appropriate, fixes incorrect activity themes, and updates ChooseAccountActivity variants for Material. BUG: 18314215 BUG: 18292562 Change-Id: I2fde4ba6db80d839104abdaa334a46ad1861600f
/frameworks/base/core/res/AndroidManifest.xml
|
0e094d926c306c3667bcdf6f23c52cc7181f25f3 |
|
09-Nov-2014 |
Evan Charlton <evanc@google.com> |
Apply @hide / @SystemApi to android.telecom.* Move the android.telecom.* namespace back to @hide, and also mark it with @SystemApi so that system-privileged apps can use them. Bug: 18302450 Change-Id: I33ae1b9b0dfdb1c5eff51ca3c829196bcfc9411c
/frameworks/base/core/res/AndroidManifest.xml
|
b42bdef51c5a4de44333ad268f25df1aac5ab880 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev
|
161977998feebf0a855ea56558464470877040cf |
|
04-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED. This is necessary/desired for two reasons: 1. UX around network scoring shipped with L despite lacking underlying platform support. We do not want network scoring applications to trigger this UX on L devices, and therefore we must break the contract of what defines a network scorer so that apps build against the new contract don't trigger the old UX. 2. As a start towards generalizing the term "score" for a potentially broader role in the future, though that role is very much undefined. Bug: 18160480 Change-Id: If228977513e32e45bc44dbeda24aa18436fdfca6
/frameworks/base/core/res/AndroidManifest.xml
|
2ef87ee728e7ac76c9199f0b75c96835991c0ceb |
|
31-Oct-2014 |
Santos Cordon <santoscordon@google.com> |
Split Telecom PhoneAccount registration permissions. Bug: 18106506 Change-Id: Ic825b44c2dc42709073a3990f6a7ca8e372025e9
/frameworks/base/core/res/AndroidManifest.xml
|
cef5a5404a7c61667883cc1fdff842355bc511e9 |
|
25-Oct-2014 |
Evan Charlton <evanc@google.com> |
Move telecom permission to the public API Make REGISTER_PROVIDER_OR_SUBSCRIPTION and REGISTER_CONNECTION_MANAGER part of the public API so that they can be used by third-party apps. Bug: 18114695 Change-Id: I1b8578cbc82e95ea78b4a2166f4a23650a0c375f
/frameworks/base/core/res/AndroidManifest.xml
|
2af2d57d578e0c3a2740628e7c6336b19961cc49 |
|
18-Oct-2014 |
Wink Saville <wink@google.com> |
Radio Capability Support. New design of capability switch for L. Add new RIL requests: RIL_REQUEST_GET_RADIO_CAPABILITY RIL_REQUEST_SET_RADIO_CAPABILITY RIL_UNSOL_RADIO_CAPABILITY These commands allow the framework to communicate what the Radio Capabilities for each logical modem has or should be using. It can support 2/3/4G switch and has flexible architecture to support future technology. Change-Id: Iedf7f608d2ba3c06a883500f2d85abb98e69d9c1
/frameworks/base/core/res/AndroidManifest.xml
|
9621b79396303037a86eb2639035b12080c858bf |
|
18-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev * commit 'e4e3fcec415cdc9739f32ce1eaaec67666e5454d': Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
|
65d241b92db36e8f14d08efc6f35a91481b0d73d |
|
17-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions Bug: 18020724 Change-Id: I5a0e5ef8a1e40ee23f4b132f5877b63a738e776e
/frameworks/base/core/res/AndroidManifest.xml
|
097c8d60115a9207ba4140ef99766741a2256361 |
|
14-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev * commit '1901e175079e3b7242ace7d4b3ec38af3723f91b': Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
|
1901e175079e3b7242ace7d4b3ec38af3723f91b |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev
|
8ca4886e439685fdcb1eff4c3552a62522ebeeb0 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev * commit '317f9ce85a492a213b8f1dac477b1aefad55f621': Change RECEIVE_BLUETOOTH_MAP permission to signature or system
|
5742335cbdb1c84a88a8ed12240316271fbb0f25 |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem. Bug: 17952946 Change-Id: I4a75da11cb092ca795d0eacf824890eb12c7446a
/frameworks/base/core/res/AndroidManifest.xml
|
6e383350e4e06b31b885812c5d9df82761a41269 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
Change RECEIVE_BLUETOOTH_MAP permission to signature or system Bug: 17954105 Change-Id: I8b16cab7193c97e5f54d6e4ef33ebf8cda0da197
/frameworks/base/core/res/AndroidManifest.xml
|
9eef8749232c00afad5ca3c26736c0be785cb8c1 |
|
08-Oct-2014 |
Dan Sandler <dsandler@android.com> |
am 2200f86f: All (er, L) is finally revealed. * commit '2200f86f800876d005f911e6864708fa9772d03a': All (er, L) is finally revealed.
|
2200f86f800876d005f911e6864708fa9772d03a |
|
06-Oct-2014 |
Dan Sandler <dsandler@android.com> |
All (er, L) is finally revealed. If you exceed 20000 points, please send in a screenshot. Bug: 15984887 Change-Id: I1164160bfa8e7dca3b9e7d7ca5d50ef9abd38b61
/frameworks/base/core/res/AndroidManifest.xml
|
90d557b7a68e64e049a44560b76b959ef87f13d7 |
|
06-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev * commit '7f7d240b13b96b617e298c6178af0425308f5ef9': Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
|
2d7576b082b84068fb9d68419b710b9bec49139b |
|
04-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #17752399: Multiple apps broken by GET_TASKS permission change Keep around GET_TASKS as a permission available to apps, so apps still think they have it and don't get all uppity because they don't. Add a new REAL_GET_TASKS that is the actual permission now. Plus some temporary compatibility code until everyone can transition fromn GET_TASKS to REAL_GET_TASKS. Change-Id: I12c1102eed24844685dcbd2fa3b612811603958f
/frameworks/base/core/res/AndroidManifest.xml
|
981258e5f957899b034a98ebebade1f0366f506a |
|
23-Sep-2014 |
Benson Huang <benson.huang@mediatek.com> |
[FM] Add FM permission to support FM radio app Add FM permission like KK to support FM radio app. Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9 Signed-off-by: Benson Huang <benson.huang@mediatek.com> Conflicts: data/etc/platform.xml
/frameworks/base/core/res/AndroidManifest.xml
|
d796159bbb14fce247177ad25aabd70038437181 |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev * commit 'c172b2090317b158974bc73d8baa141449a1d784': Adds APIs for Bluetooth PBAP and MAP access permission.
|
1bbfcc2fdcbe72a69477b0395ea92f777efb7c9d |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev
|
7456ae83e8ae6ad3081a4a31589c1569b985be93 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev * commit '3a972844e934b1031d73bfb114d84a7d2f8d4b19': Zen: Make condition providers available via @SystemApi.
|
bf4e41747d138bf89c6c3fa5076a38334d3b45e1 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
Zen: Make condition providers available via @SystemApi. Bug:16819503 Change-Id: Ibd7004f7a0928d3f14f9ccd55088cf645d5285e2
/frameworks/base/core/res/AndroidManifest.xml
|
7137ee38cbfeb01b6e19b5e4b2588e765b5a56c6 |
|
10-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev * commit '38bd55ffd7084d744e4e814593056e1e12ebfb00': Make UsageStats API default on only for the system ActivityManager shouldn't return null for getCurrentUser
|
8dd30aadaf133fe1b8974847efdd5b8cf285136d |
|
05-Sep-2014 |
Edward Jee <edjee@google.com> |
Adds APIs for Bluetooth PBAP and MAP access permission. Currently, users' preference in phonebook and call history or message access per each Bluetooth-paired device is stored in Settings application's shared preferences. However, some privileged applications other than Settings need to access such data. So we decided to migrate the data from Settings application's shared preferences to Bluetooth application's. Bug: 17158953 Change-Id: I3771f03eaea3f57cf60d93ab9fd41c9eb3e1e99c
/frameworks/base/core/res/AndroidManifest.xml
|
6590d7c75c1d706f70ebf6a5594d6a7601c080df |
|
09-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
Make UsageStats API default on only for the system This changes the PACKAGE_USAGE_STATS permission to be a signature only permission, meaning that only apps signed with the system signature have access to the UsageStats API enabled by default. Bug:17428130 Change-Id: I79ba54d7102c770ea2490f014a1f6736f0f46b3a
/frameworks/base/core/res/AndroidManifest.xml
|
91488f464db3753d1534fb4d16cde2c90abd8126 |
|
05-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev * commit 'aa82a6c7adc6de4ec3f843328f7bb207aa6540ec': Update the broadcasts reserved to the system
|
26d6ff0b2406d2917b6ad1f6dd7b35450b0044fc |
|
03-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
Update the broadcasts reserved to the system The action value for all AUDIO*PLUG broadcasts has been changed from "android.intent" to "android.media". This value needs to be updated in the core manifest too as part of the broadcasts that only the system can send. Bug 17289385 Change-Id: Ibc0f4139c28ce863f85efc24ff0fcb81ab12ce21
/frameworks/base/core/res/AndroidManifest.xml
|
05e6dde3a0b9ba1eb3d13d511fe2e27a0d10c851 |
|
01-Sep-2014 |
Wink Saville <wink@google.com> |
ksd to lmp-sprout-dev Change-Id: I94eb65c62231b5831570bb0cbbbd9c916bee0a37
/frameworks/base/core/res/AndroidManifest.xml
|
9dd43afbb9f041e807d2051478e861c556f0771f |
|
26-Aug-2014 |
Sungsoo Lim <sungsoo@google.com> |
Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS Bug: 16948874 Change-Id: If44aaa7085705e8a2f55c71dae61bf6ac0cdfc09
/frameworks/base/core/res/AndroidManifest.xml
|
d7761be23d30b5e9ca9c07998af27e704d2a7ae2 |
|
23-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev
|
7805a10c86a2de9fb5ddf41d63075eef342a59ea |
|
22-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
Show a user switching dialog before starting the user switch switchUser() now first shows a dialog and the dialog calls startUserInForeground to do the actual switch. Bug: 16661752 Change-Id: Ie4e2e9eec8bf7c2116694072ea8555b8254a0e13
/frameworks/base/core/res/AndroidManifest.xml
|
0a571123544058578b4ef1558c276a4050519652 |
|
22-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Poke interactive hint from userActivity and add @SystemApi. Previously we only poked the interactive hint for input events that were dispatched through the regular input system. However, when using a car dock in projection mode input events are directly delivered to apps by other system components, bypassing user activity. So now we poke the interactive hint on all user activity. Added an @SystemApi version of userActivity. Added a new signature|system permission called USER_ACTIVITY to allow system apps to poke userActivity. For now it seems prudent to keep DEVICE_POWER signature only. Bug: 17043684 Change-Id: Ia84bd03083065b8938a9853c08901fbf71b2e56b
/frameworks/base/core/res/AndroidManifest.xml
|
b135d06cb83db03b1328b7a82f064de7868fb16f |
|
20-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Remove incomplete media router API. (DO NOT MERGE) Change-Id: I310fadafb5a6b8190a32e5d87f3e1823c87bcef7
/frameworks/base/core/res/AndroidManifest.xml
|
50cddeca1f6f66ccc3dbfd526aee621e1b87a516 |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev
|
2ac401093e5ebb975f14e5108d457c148370f7de |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Exposing in-call API to other implementing classes. (1/4) - Adding service_interface constant to InCallService. Bug: 16133960 Change-Id: I4ace89bc3300428d2c56ed43e47ccd12a9f9748a
/frameworks/base/core/res/AndroidManifest.xml
|
d86ecd26d78c7bcd7f820b9ef5e3f4c3eb037510 |
|
13-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Add callbacks for MediaProjection start / stop. Also, enforce that there is only one valid MediaProjection at a time. Bug: 16488053 Change-Id: Id05445d798c98cb208bc4dab186296392e15d30b
/frameworks/base/core/res/AndroidManifest.xml
|
0dae9a4cfa9d51cadb0f731b65f742d48e9e893c |
|
16-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Add BIND_CONNECTION_SERVICE permission. - Added system permission. - Added enforcement in ConnectionService API class. Bug: 16171070 Change-Id: Idbd26a31e8f6bb59d3e881a1e5885a44026f2fbd
/frameworks/base/core/res/AndroidManifest.xml
|
183415e521d599ca5e33e5022fec5ec7dfe1c055 |
|
12-Aug-2014 |
Doug Zongker <dougz@google.com> |
@hide RECOVERY permission Bug: 16959027 Change-Id: I99fbdf24d5e8bce4beb32fa872e0caa6bfdbe1e9
/frameworks/base/core/res/AndroidManifest.xml
|
c216c473eb50e16ab6c6361bd0c9232d5bfaeb39 |
|
07-Aug-2014 |
Chelsea Derrick <chelsead@google.com> |
Revert "Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE]" This reverts commit 41158d90a69cae2a9c4ced0e04f235e8cfef5259. Bug: 16871063 Change-Id: I93623be92f2de41789b16827867f3f95bf0480c5
/frameworks/base/core/res/AndroidManifest.xml
|
aac303d0a24294c1f9ac74a0e5e7b7fa77bb379f |
|
11-Aug-2014 |
Nicolas Prevot <nprevot@google.com> |
Removing the personal icon, which was only a placeholder. This icon should never show up: the avatar of the personal space should show up instead. If something goes wrong and correct avatar fails to show, the systems falls back to the green android now, which is desired behaviour. BUG: 15875652 Change-Id: I41beb4cbd5e707d27ef6d4cf35d02ec9cfa1b61d
/frameworks/base/core/res/AndroidManifest.xml
|
6b93229a211cd4b963dae0a46d6dde689beabb90 |
|
24-Jul-2014 |
Matthew Xie <mattx@google.com> |
Add BLUETOOTH_MAP permission to give Bluetooth app exclusive access to email access The permission is hidden. It's for Bluetooth app only. We may unhide it in the future. Change-Id: Ibc6f7b71f0c79dc282a8e5fdc786e1c16be7a892
/frameworks/base/core/res/AndroidManifest.xml
|
8694f2443230e74515e04e572d22406764746834 |
|
04-Aug-2014 |
Jeff Tinker <jtinker@google.com> |
Merge "Allow device to be unprovisioned" into lmp-dev
|
6bf5b600d6d1e98f7eabbbc884dd286b335acd66 |
|
30-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Allow device to be unprovisioned bug: 12247651 Change-Id: Ie2e77566d2c65925091296da5bcbec327985c946
/frameworks/base/core/res/AndroidManifest.xml
|
1bb480a3a4ce2ce63c5d09fa7f5cc38ec160ebf4 |
|
02-Aug-2014 |
John Spurlock <jspurlock@google.com> |
Battery saver: new policy changes + SystemUI tweaks. - Service policy changes: allow the user to turn off (snooze) saver mode below the auto-trigger level. Plugging in the device always exits saver mode. - Default trigger level is now 0 (never) instead of 15. - SystemUI now also listens to a new POWER_SAVE_MODE_CHANGING, since waiting for _CHANGED can take seconds. - Move shared feature description text into the framework so it can be shared. - Tweak dialog title + action strings. - Remove trigger-level from SystemUI, it no longer needs it. - Add the ability to turn off saver mode directly from the notification. - Migrate saver confirmation dialog to common system UI dialog helper, and add a few convenience methods. - Fix bug where the status bar area would be orange over the keyguard in SHADE_LOCKED mode. Bug:16214395 Change-Id: I3d1ded1eec9e63e7d97469486f6a320e1bebbccd
/frameworks/base/core/res/AndroidManifest.xml
|
783645e99f909ffc7a2d5d2fca9324cc0e9b7362 |
|
28-Jul-2014 |
Jae Seo <jaeseo@google.com> |
TIF: Merge TvParentalControlManager into TvInputManager This change addresses the following API council feedback. TvParentalControlManager: -- Replace the listener interface with a broadcast Intent with well-known action, something like ACTION_BLOCKED_RATINGS_CHANGED. -- TvParentalControlManager goes away, and two remaining methods move to TvInputManager. == Implementation changes == -- The user-selected rating preferences should be stored in an XML file, and loaded at boot by your internal system service. It should _not_ be stored in a Secure/Global setting. Bug: 16542165 Change-Id: I278df963576652ec9163a66c1ef99419fcdb36c2
/frameworks/base/core/res/AndroidManifest.xml
|
1f33d77f0430efb2d7eb532e360ba9a30004ffe7 |
|
25-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Rename work icon symbol to match the prefix used for badges. Also renames the images for consistency. Bug: 16369104 Change-Id: I19f97ae22cb2ee4f7db210f083badc1a30520b44
/frameworks/base/core/res/AndroidManifest.xml
|
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c |
|
28-Jul-2014 |
Adrian Roos <roosa@google.com> |
Make TrustAgentService a SystemApi Bug: 16401527 Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/res/AndroidManifest.xml
|
5eeb59cceb1f95813c548c1c5937f161c1ed3571 |
|
22-Jul-2014 |
Christopher Tate <ctate@google.com> |
Schedule full backups Initial policy: at most daily; backups only run when the device is idle + charging + on an unmetered network. Bug 16485874 Change-Id: I5665d890a943bac765adcef14be79d7dba6ce078
/frameworks/base/core/res/AndroidManifest.xml
|
16c8e3f49497b6046972ae650772f65768366be8 |
|
25-Jul-2014 |
Jeff Sharkey <jsharkey@android.com> |
PackageInstaller changes based on feedback. Mostly cosmetic changes from API council feedback. Bug: 16543552 Change-Id: Ic926829b3f77c31f50a899c59b779353daf00d59
/frameworks/base/core/res/AndroidManifest.xml
|
c086a3df3b28996cd10ebe42c5f59035d054aa0d |
|
18-Jun-2014 |
Terry Heo <terryheo@google.com> |
Add a frame capture API of TV input - Added new permission CAPTURE_TV_INPUT Bug: 15736756 Change-Id: I2ae8b2e3f5b1ad1d525854ed89ab2043cf66acbe
/frameworks/base/core/res/AndroidManifest.xml
|
193f049221dce7764d50293ac02255fd0223c538 |
|
10-Jun-2014 |
Jason Long <jasonlong@google.com> |
Switched Holo to Material for account chooser activities. Change-Id: I6a44fb174eb4e981c37fca0836b103d7ee3f5ffe
/frameworks/base/core/res/AndroidManifest.xml
|
dc00cbe2c15eef5141656311a6d05c753d7c6db6 |
|
21-Jul-2014 |
Craig Mautner <cmautner@google.com> |
Create API for launching from recents Relaunch apps from recents using the same uid and package as was used in the original launch. Fixes bug 16358208. Change-Id: I340800bfee79926b197929360d69f1d570bbf1eb
/frameworks/base/core/res/AndroidManifest.xml
|
33f5ddd1bea21296938f2cba196f95d223aa247c |
|
22-Jul-2014 |
Dianne Hackborn <hackbod@google.com> |
Add permissions associated with app ops. Change-Id: I575ad7a3ceea59486ca601f69760b14f6269511d
/frameworks/base/core/res/AndroidManifest.xml
|
09a65601b24b77b7e5b3d2d4c7c30eded1ba1040 |
|
21-Jul-2014 |
Adam Powell <adamp@google.com> |
Sort ResolverActivity items based on UsageStats Sort targets by the total amount of time the user has spent with their containing package in the foreground. Bug 15694906 Change-Id: I63c956424f78eb22911517674dfefd96901d19f8
/frameworks/base/core/res/AndroidManifest.xml
|
a19d7bfacf83837fab1f785ed1319d83a7f45675 |
|
19-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Rename voicemail permissions Rename READ_ALL_VOICEMAIL to READ_VOICEMAIL, and MANAGE_VOICEMAIL to WRITE_VOICEMAIL Bug: 16400686 Change-Id: I4c87a7e2fb3aa71d7de3865301f110bcfb29221b
/frameworks/base/core/res/AndroidManifest.xml
|
891f5b2638f30479eb8d78ecb28ba0b39808fca4 |
|
18-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Merge "Mark social APIs stream APIs as deprecated" into lmp-dev
|
bdb13c8c07f07d405e74f479068eb972d509cea5 |
|
17-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Mark social APIs stream APIs as deprecated Bug: 14490632 Change-Id: I6b54613514e52f34cfcc37d25493a7ea7d636a86
/frameworks/base/core/res/AndroidManifest.xml
|
c39d47a8e7c74bd539104b0efab898ef6fc43ddf |
|
09-Jul-2014 |
Michael Wright <michaelwr@google.com> |
Add MediaProjection APIs. The new MediaProjection infrastructure allows the system to hand out tokens granting the ability to capture the screen's contents, audio, etc. at a granular level. It's intended to be used both for screen casting, via the cast APIs, as well as screen sharing via third party applications. The screen sharing case is implemented, but all of audio capturing is still forthcoming. Change-Id: I4b24669bed7083e11413c10ed8d6b025f5375316
/frameworks/base/core/res/AndroidManifest.xml
|
4bd7efbe982d26a68950f3c92bd0e7142c4ecbf7 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Restrict SCORE_NETWORKS permission to signature|system. As long as the APIs aren't ready to be un-hidden, there's no need to allow non-system apps to access them. This can be reverted when the APIs are finalized and we have mechanisms in place for selecting between scorers installed on the device, rather than only a preselected scorer bundled with the system. Change-Id: I745b4c691eccfb526014d4cb71639db2119e4fdb
/frameworks/base/core/res/AndroidManifest.xml
|
58fba8b14b7e80dc2e7f676a32d1a69661fb13d4 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Expose network scoring APIs to /system apps." into lmp-dev
|
7be8e9725f4a60f0d1a6cb175a05a320968d7439 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Expose network scoring APIs to /system apps. Ideally, we'd only expose the methods that we intend unbundled apps to call (e.g. not NetworkScoreManager#setActiveScorer, which should only be called by Settings), but this isn't harmful in terms of permissions as the APIs still check security appropriately. Bug: 15833200 Change-Id: I2047515b41c8be0cf7cb51dd495fe72309c05f68
/frameworks/base/core/res/AndroidManifest.xml
|
cdd5858e481fb0087c40c5997a9fa1446b326165 |
|
18-Jun-2014 |
Wenchao Tong <tongwenchao@google.com> |
Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE] * Only allow system app to send/receive WIFI_CREDENTIAL_CHANGE. * Define constants in WifiManager. Bug: 15703353 Change-Id: I4bcc6bc82ec01952500eef3965cf81116bba693d (cherry picked from commit f4a43f196e1132968a8add60efa4ae4558f8b010)
/frameworks/base/core/res/AndroidManifest.xml
|
1a937b04e63539cb1fab1bde601031d415c7156f |
|
02-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Initial draft of new MediaRouter APIs. This patch introduces basic infrastructure for the new MediaRouter API. The code is fully documented but incompletely implemented. It is being submitted not to facilitate API reviews. MediaRouter is a new class that applications used to discovery, connect to, and control media devices as represented by media destinations and their routes. Routes may offer a variety of capabilities. This new class is a much more powerful replacement for the existing MediaRouter. MediaRouteService is a base class for creating media route services which third-parties can implement to make routes available to applications. It is analoguous to the MediaRouteProvider infrastructure of the old media router support library but it is designed to be integrated into the framework and enable a variety of new usages such as remote display projection. Stay tuned for more... Change-Id: I2c7c6013d9f751d71e83697e7fc9e49bf7751fef
/frameworks/base/core/res/AndroidManifest.xml
|
01a500ed1c6ae3fff66678144ae637aa8cad0ecc |
|
11-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Delete first draft of media routing APIs. The new APIs will not be as tightly integrated into MediaSession. Change-Id: I5cfd37d9d8d0c5d46c55edb5cf0772a8f1ef13ab
/frameworks/base/core/res/AndroidManifest.xml
|
06b6cdaed5c68816faac9d2354c6caf61e65e19d |
|
12-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Remove unnecessary code and APIs. This stuff has been replaced by setNetworkForUser() in NetdClient. Change-Id: If525ee259b74314191d1913f7c2a3e828e05c38f
/frameworks/base/core/res/AndroidManifest.xml
|
c42a1e1071937ae48b7aa5d6291a32c29078b74b |
|
07-Jul-2014 |
Adrian Roos <roosa@google.com> |
Add AlarmClock API to AlarmManager Adds a new kind of alarm that represents an alarm clock and a way to query the next scheduled alarm clock. Deprecates Settings.System.NEXT_ALARM_FORMATTED. Bug: 14589952 Change-Id: I297eeeff36d07adcda010afac183d0f5ee37dc99
/frameworks/base/core/res/AndroidManifest.xml
|
68d4acd205e8c2da524e62734ca42847306cc029 |
|
02-Jul-2014 |
Andres Morales <anmorales@google.com> |
Service for reading and writing blocks to PST partition Permits apps with permission android.permission.ACCESS_PERSISTENT_PARTITION to obtain a read and write data blocks to the PST partition. Only one block ever exists at one time in PST. When a client writes another block, the previous one is overwritten. This permits storing a block of data that will live across factory resets. Change-Id: I8f23df3531f3c0512118eb4b7530eff8a8e81c83
/frameworks/base/core/res/AndroidManifest.xml
|
99bd4eabd17c1211adcd8eb9afeb5e1c6077617c |
|
09-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Merge "Add manage voicemail permission (1/4)"
|
6752cba4642ea9103f3013336c005f06968fd442 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "ConfigUpdateInstallReceiver: pass content via content provider"
|
b708ce5f1a30a63ed79a86a23ead4e5ad972a48a |
|
08-Jul-2014 |
Shishir Agrawal <shishir@google.com> |
Remove permission SIM_COMMUNICATION. The permission is replaced by the MODIFY_PHONE_STATE permission which is System|Signature. Change-Id: I74dbd242fc0fdbb5884fdc7a5c3f0063424fbfcf
/frameworks/base/core/res/AndroidManifest.xml
|
103173e16da609bcf57a88961ca57a8de17e0ee7 |
|
28-Jun-2014 |
Nick Kralevich <nnk@google.com> |
ConfigUpdateInstallReceiver: pass content via content provider When receiving a request to update ConfigUpdater content, don't try to open by filename. Fetch the content via a file descriptor delivered from a content provider. This avoids the files needing to be marked world-readable, and resolves an SELinux violation. Bug: 14989241 Change-Id: I10ad0d710c9a833a45995c545ba585a533c35b0d
/frameworks/base/core/res/AndroidManifest.xml
|
b096bdceaf2a4becffd2d930a870ccb57bfbe99c |
|
01-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Add a SCORER_CHANGED broadcast. Sent whenever the active network scorer is changed. Bug: 16007033 Change-Id: Ib71e89e2cc98fa424db7e489445ec03edefb6880
/frameworks/base/core/res/AndroidManifest.xml
|
8949bfb90c415629dbd0e30d25003fb3e0375fb5 |
|
16-Aug-2013 |
Hemant Gupta <hemantg@codeaurora.org> |
Bluetooth: Support MAP Client role on Bluedroid. Implementation changes to support MAP client and PBAP client role on Bluedroid stack. Change-Id: I1733a67bf5256bd7b181bd5e68e40b476994ebfd
/frameworks/base/core/res/AndroidManifest.xml
|
5e4554351045776c1cf2da77375f0ca8363d647f |
|
25-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add manage voicemail permission (1/4) Bug: 6948882 Change-Id: I3367c20721b6e9572e79c7b4f42758b8c4e30372
/frameworks/base/core/res/AndroidManifest.xml
|
eb8d1be6acad180eabde84f19196b9ecaba81353 |
|
25-Jun-2014 |
John Spurlock <jspurlock@google.com> |
Add a BIND_DREAM_SERVICE signature-level permission. Starting in api 21, will be required to bind to a declared dream or doze service. Also added to aapt dump badging output. Bug:15862654 Change-Id: Ifa0a594eeecf21e6146176c7810a847e1d08fe3b
/frameworks/base/core/res/AndroidManifest.xml
|
d96e4948daf687f3f631ba8d93c89026fd3ce272 |
|
26-Jun-2014 |
Andres Morales <anmorales@google.com> |
Merge "interface for nfc handover supplicant commands"
|
5a2f488b70c9f9a712be7bcdbd9ec893c38670c2 |
|
24-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add REMOVE_VOICEMAIL permission to system Add a permission that will allow any app that has this permission to remove any voicemails in the user's call log, even those that don't belong to it. This will be needed for the unbundled dialer to be able to manage the user's voicemails. Bug: 6948882 Change-Id: Idca23ee83e541ba8aef24d6cb7fe09d5adac1e10
/frameworks/base/core/res/AndroidManifest.xml
|
9d4e9bcebbd97ad51daa0ef15cfba5aabb399bbb |
|
19-Jun-2014 |
Craig Mautner <cmautner@google.com> |
Allow a root activity to relinquish task identity If a an acitivty with attribute android:relinquishTaskIdentity true is the root activity of a task then the intent of that task will be that of the first activity in the stack with android:relinquishTaskIdentity set false. The ability to set intent also includes the ability to set the TaskDescription of the task. Fixes bug 15675610. Fixes bug 10428661. Change-Id: Ib28a9eae3b9832eeeef9106adbebe344184ee5ae
/frameworks/base/core/res/AndroidManifest.xml
|
5834ee75038e9095cefe089cdb26795b3ffe9e38 |
|
18-Jun-2014 |
fafaisland <fafaisland@google.com> |
Merge "Add READ_ALL_VOICEMAIL permission in the core"
|
88fb96505ce7587b23479d07ed77412f69a84ce8 |
|
17-Jun-2014 |
fafaisland <fafaisland@google.com> |
Add READ_ALL_VOICEMAIL permission in the core Bug:15695227 Change-Id: I96bebcd949293679d938b2ec290820d4ed9035fa
/frameworks/base/core/res/AndroidManifest.xml
|
cf1a2f73fc102be2ac7060ac97d4682bb2565ca5 |
|
17-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch everything to scheduled jobs Everything that used the IdleMaintenance APIs/broadcasts gets to use the spiffy new JobScheduler instead. Hooray! On top of that, the now-obsolete "idle maintenance" APIs are now gone entirely. Double hooray! Bug 14993295 Change-Id: I5fb67c296ca8cd0ba8a2c8760a0f0d9d962d813b
/frameworks/base/core/res/AndroidManifest.xml
|
9740e468bc895cbc08c71aecc35fc56c3faafa06 |
|
08-Feb-2014 |
Andres Morales <anmorales@google.com> |
interface for nfc handover supplicant commands expose: NFC_GET_HANDOVER_SEL NFC_GET_HANDOVER_REQ NFC_REPORT_HANDOVER These are used in for setting up WFD with NFC and are only accessible given the CONNECTIVITY_INTERNAL permission. Change-Id: Ia43afc137d474822cad896d335530654081a808c
/frameworks/base/core/res/AndroidManifest.xml
|
29372ab484c916c0774c976d5b896a7cf19a2b91 |
|
04-Jun-2014 |
Ido Ofir <iofir@google.com> |
Adding permission for launching the trust agent settings. Change-Id: Iac5bde57ca8d465fdf0fa5848d6716fc88801aeb
/frameworks/base/core/res/AndroidManifest.xml
|
94b59de852df7b6ce16aef73a9b2c11be8f3102d |
|
03-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothAvrcpController: Move AVRCP controller support to new BluetoothProfile subclass Change-Id: Id988040a7ce623ed68e0349920301ff48db1fbce
/frameworks/base/core/res/AndroidManifest.xml
|
2263dd1ddd1a8ac828c25d34000c85165cad21ef |
|
14-May-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothA2dpSink: Add new BluetoothProfile subclass for A2DP sink Change-Id: I09d5cb8fdaea4c4828f333949b7c18deffd22722
/frameworks/base/core/res/AndroidManifest.xml
|
cf916d34671f0ab6aad8de24c18e4dc96fb21941 |
|
12-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
Rename BluetoothHandsfreeClient to BluetoothHeadsetClient This makes our terminology consistent with the existing BluetoothHeadset profile Also updated arguments to Context.bindService() Change-Id: I27cc5a6fde256b1f5dccca53a7a15ec8f58691c2
/frameworks/base/core/res/AndroidManifest.xml
|
104e14531ca2212117540d8b6abc06ab67564ebc |
|
12-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am f894cad0: Merge "Some tweaks to improve document task creation." into lmp-preview-dev * commit 'f894cad093c1a3083f4aca099babc4677977a12f': Some tweaks to improve document task creation.
|
d38aed81420d7d992f65ef2efb5f69c1900fc61d |
|
11-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Some tweaks to improve document task creation. - Mark the chooser activity as never launching in to a new task, even if the caller asks for it. These are dialogs so don't make sense as stand-alone tasks. (Maybe later the policy should be to not launch into a new task in any case that the activity is a dialog or even transparent at all.) - Keep track in the task record of whether any activities in it have been shown to the user, and use this to automatically remove the task when all activities finish. This leans up cases where apps are launching stub activities that get turned in to tasks but are never seen by the user because they immediately launch another activity in another task and then finish. Change-Id: I00b641c80aa96bd5071479f36ee2e4d8e3a81aeb
/frameworks/base/core/res/AndroidManifest.xml
|
5833bbe2d6a38244e48dd793d2d0872321535f57 |
|
12-Jun-2014 |
Sandeep Siddhartha <sansid@google.com> |
Merge "Initial support for reading the enrollment metadata"
|
e5706787599f8397e19e66afa70753ba350cc91b |
|
30-May-2014 |
Sandeep Siddhartha <sansid@google.com> |
Initial support for reading the enrollment metadata - Defines schema for enrollment apps to publish metadata for the search keyphrase. This metadata consists of an ID, a user visible keyphrase, and the target package to handle the keyphrase, when it triggers. - Reads the metadata and populates the KeyphraseInfo object for access via the VoiceInteractionService - Adds permission and intent action for the enrollment app. The enrollment app needs to be a system app protected with the MANAGE_VOICE_KEYPHRASES permission and the activity performing the enrollment needs to handle the ACTION_MANAGE_VOICE_KEYPHRASES - The keyphrase info currently stores an ID - that's for internal bookkeeping only, a keyphrase text - that's used by the public APIs, and a list of supported locales, which isn't exposed but is used while indicating if hardware hotword is available for a particular keyphrase in a language or not. Change-Id: Ibe6c52a5a3eecfd74c4a8382713a35eb88d38df9
/frameworks/base/core/res/AndroidManifest.xml
|
0188bee2c526270c178a0b1f918b2a09999de25f |
|
11-Jun-2014 |
Christopher Tate <ctate@google.com> |
am d8f71d34: Merge "Out with the old; in with the new" into lmp-preview-dev * commit 'd8f71d34c3c7fb161a1586de8edb52161c32d672': Out with the old; in with the new
|
1b8aef2be7a467672b3ffdc37039b9233ece0fbc |
|
11-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Material-ize the restrictions pin challenge."
|
fe1de89fe91a099dd535acd3df0845839baf4232 |
|
11-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
am 3d5066de: Merge "Add different resolutions of afw icons" into lmp-preview-dev * commit '3d5066de154193cc3a08a7be168aa5e31bfe0359': Add different resolutions of afw icons
|
7060b04f6d92351b67222e636ab378a0273bf3e7 |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
Out with the old; in with the new Switch to the official "JobScheduler" etc naming. Bug 14997851 Change-Id: I73a61aaa9af0740c114d08188bd97c52f3ac86b7
/frameworks/base/core/res/AndroidManifest.xml
|
40e53cdc944472cf2417c069a7a4514c9e37911b |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
Merge "hide RECOVERY permission from L preview -- DO NOT MERGE" into lmp-preview-dev
|
085a1e793382580811798cbdd7e354cc755fc3ed |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
am af0c2ebf: @hide ACCESS_INPUT_FLINGER permission. * commit 'af0c2ebfc71f6106656eb17345e122ea7ac8cf2a': @hide ACCESS_INPUT_FLINGER permission.
|
4a1c0bd20b317fbc48efc35f986b9a7f5cef128e |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
am 2099866f: Merge "Switch framework to using new scheduled-work API" into lmp-preview-dev * commit '2099866f0d9ae5692e6edfc053aebe7f93a21618': Switch framework to using new scheduled-work API
|
b19fd00c51855954366a288cc4838327cb5d83a4 |
|
10-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Add different resolutions of afw icons Also update the name of the icon so that it is consistent with other namings in the framework and in managed provisioning. bug: 15538051 Change-Id: I9e8e680eb1c654d9f5d94ce27775687b3dc92a22
/frameworks/base/core/res/AndroidManifest.xml
|
465c5de4ee3df861dd1ad0b71ca40f3daeb9cbee |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_INPUT_FLINGER permission. Bug: 15516225 Change-Id: Ief70650d956a7161153e283c24f553fcfa7996b1
/frameworks/base/core/res/AndroidManifest.xml
|
115afdadb5863a02f0b0daefcc0511bfd35b531e |
|
07-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch framework to using new scheduled-work API Also add the intended permission-use enforcement to said API. Bug 14994893 Bug 14993295 Change-Id: I5a3ffd32d0702c68f4ef6da68f7fa6e9de674380
/frameworks/base/core/res/AndroidManifest.xml
|
c302e4d32f97c21400b3ab76911cad8984eff20e |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
hide RECOVERY permission from L preview -- DO NOT MERGE Bug: 15516323 Change-Id: I16a6355f631523919607bd111e5ebfe16fa4506e
/frameworks/base/core/res/AndroidManifest.xml
|
238fd930fc0131044d317d7c5ead756be89d1299 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. (DO NOT MERGE) This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
bbf4270a6c8c6441dfb9b22f3cc5394d42cdada8 |
|
09-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Material-ize the restrictions pin challenge. Change-Id: I90be6d2e1b1043f45a8067561a0d5ce56cc02dd6
/frameworks/base/core/res/AndroidManifest.xml
|
b61eaaac59298afafa973ee739a072290e000348 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
d8883df650b77dba3be38fb2ca8980594b901461 |
|
06-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am 87bc3c25: Merge "Improvements to low power mode." into lmp-preview-dev * commit '87bc3c258d8be516bc0fcedeb6eec34088582061': Improvements to low power mode.
|
eb94fa7975b1e8742f3b00cec6bd4f9d6b329e3a |
|
04-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Improvements to low power mode. Add new public API for monitoring low power mode. BatteryService now puts device in to low power mode when battery level is low. Window manager now watches low power mode to turn off animations. Modifying the animator scale now gets propagated to all processes. Change-Id: I8fa566994764ddd4e1977631e28381ab9409f8ee
/frameworks/base/core/res/AndroidManifest.xml
|
aaa688972a682a42c3ee207538f3e6b204748151 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
am 25d7a394: Merge "add permission for AudioManager routing APIs." into lmp-preview-dev * commit '25d7a394c0cf91d9e9711d3f36913f4ed8aa91d8': add permission for AudioManager routing APIs.
|
b4df2f586ad7b5a0387489401de0c83203610ba9 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
am b2302d43: Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev * commit 'b2302d437fd636d9973f466062cfad145cdd042d': Ensure trust agents are only provided by platform packages
|
94236c56ddef7f0a3db010c38940f6eae75f67b4 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
Merge "add permission for AudioManager routing APIs." into lmp-preview-dev
|
b803ad3c2cefaba57063385ecab1be27dd2636b0 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Hide TrustAgentService in lmp-preview - DO NOT MERGE Bug: 15287044 Change-Id: Iba0d53b87bcb4bddccec89cf943ed65491aa9d76
/frameworks/base/core/res/AndroidManifest.xml
|
1e9021aef89d53eb08d0e8a4e017c9e79d260241 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev
|
01fae55d175eea6e723d6fa8729bbe868d05cfc2 |
|
29-May-2014 |
Eric Laurent <elaurent@google.com> |
add permission for AudioManager routing APIs. Add signature or system permission "android.permission.MODIFY_AUDIO_ROUTING" for AudioManager APIs allowing system services and applications to modify audio routing. Bug: 14815883. Change-Id: If09f6f3a166a6b2f3761b65dbde0c86873850f07
/frameworks/base/core/res/AndroidManifest.xml
|
4c9e57f156d3cbd86b38e9897dfdab81964efe90 |
|
03-Jun-2014 |
Jae Seo <jaeseo@google.com> |
resolved conflicts for merge of ebe661c4 to master Change-Id: Ic25dc762ee43654b439de3ec237ead007bee3df4
|
18ea893a2319e2a192188d2288bb881149c9b06e |
|
28-May-2014 |
Adrian Roos <roosa@google.com> |
Ensure trust agents are only provided by platform packages Prevents the TrustManagerService from binding to any non-platform trust agents and updates the SampleTrustAgent to use the new permission. Bug: 15287044 Change-Id: I38c3deebd5ad359075e68f52d19417bab5ab43db
/frameworks/base/core/res/AndroidManifest.xml
|
faa3ff9ba89486aad83eab0526aea46ea7bbcfe6 |
|
03-Jun-2014 |
Evan Charlton <evanc@google.com> |
Merge "Revert sendEnvelope changes [DO NOT MERGE]" into lmp-preview-dev
|
d5cc4a281e7ce29d1e8687ff3394b57a3a549260 |
|
31-May-2014 |
Jae Seo <jaeseo@google.com> |
Put TV Input Framework under android.media.tv, including TvContract Bug: 15345342 Change-Id: I665ca23f0f074ce29cb2e047109b209178532107
/frameworks/base/core/res/AndroidManifest.xml
|
f20d640fa2b155a971ddfe0965fc803a73b5e53c |
|
25-May-2014 |
Amith Yamasani <yamasani@google.com> |
Restrictions Manager Mechanism to register a provider for requesting an administrator to respond to permission requests. Request format and response format constants. Description of manifest template for static restrictions. Int type introduced in RestrictionEntry. Needs more javadoc and better description of manifest templates, including specifying the XML attributes. Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/res/AndroidManifest.xml
|
fda1855eaa61daad528cb444e99d0fc5195a7bd1 |
|
28-May-2014 |
Evan Charlton <evanc@google.com> |
Revert sendEnvelope changes [DO NOT MERGE] Revert the following changes from the I/O preview. This reverts the following changes: Revert "Revert "Revert "Modify TelephonyManager to expose sendEnvelopeWithStatus instead of sendEnvelope.""" This reverts commit 452e185fb6df92358701fb68d4fe6c65f172cc29. Change-Id: I6bbff508b2f542d6ef3d372956db53d63a9165eb Revert "Revert "Revert "Expose sendEnvelope.""" This reverts commit 0d5e5b9cce8af40494f72ff9decc169f99780254. Revert "Adding support for SIM communication from Android over logical channels." This reverts commit 57f656b9f6271cf857b5ecec5f8c7eacb321ec0b. Change-Id: I975eb468841e85d63e506f68a5d8c879e110d9f6
/frameworks/base/core/res/AndroidManifest.xml
|
c22dbb69194c8e8fe2a32326d1f37a738cad0904 |
|
26-May-2014 |
Wonsik Kim <wonsik@google.com> |
Revert "Revert "Add physical TV input handling to TvInputManagerService"" This reverts commit 1940e197a8de186df5edf0b78e0907ae539bd215. Bug: 14118245, Bug: 15197740 Change-Id: Ia308f16d2ed8ec55112a4d21c180ccb97e8d7c6a
/frameworks/base/core/res/AndroidManifest.xml
|
fb052926b84d69fdc4bebcb0373e33388c7bcbb7 |
|
21-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Revert "Hide voice interaction APIs." This reverts commit a677a9b9367bcf8c81c36dc59b53554cb347b438.
/frameworks/base/core/res/AndroidManifest.xml
|
62b25a5bf0750483f36ac79c88177ee2ab630f8e |
|
20-May-2014 |
Andres Morales <anmorales@google.com> |
Revert "Adding INfcUnlockSettings and NfcUnlock interface class." This will be re-added as a Trustlet in a subsequent CL. This reverts commit 38a7ed05f8fed0aa81f7214d827875f9876ffbe1. Change-Id: I5aa36df42a7751f165b4ef184e0cda57e5568b59
/frameworks/base/core/res/AndroidManifest.xml
|
b19c19265448a6252b1c14f3da85d52e50be34c3 |
|
19-May-2014 |
RoboErik <epastern@google.com> |
Merge "Rename session classes to have media prefix, hide routes"
|
42ea7eecd149161ed192d3029f0d77d1d08a4aa5 |
|
17-May-2014 |
RoboErik <epastern@google.com> |
Rename session classes to have media prefix, hide routes This renames several of the core session classes to be prefixed with Media. It also adds @hide to all route references for now. Change-Id: Idb42897d490cf24626e4e93ca975b2cb93ec054c
/frameworks/base/core/res/AndroidManifest.xml
|
dcff99598f16737e75278e8ea9dbfe92579ea234 |
|
16-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Hide voice interaction APIs. Change-Id: I961b6399a6edca239caaba9bbd1dd5e03bc612bd
/frameworks/base/core/res/AndroidManifest.xml
|
7e03dfcb796ef1a6000a5fd5fda03c9e15ea62e1 |
|
16-May-2014 |
Adrian Roos <roosa@google.com> |
Apply revised TrustAgent API Bug: 14997466 Change-Id: I81042e058a20f28603a11471882f3dcfc4f8b13c
/frameworks/base/core/res/AndroidManifest.xml
|
fbf53d042d68d1b0f9fefbcb1e819f25bd385f89 |
|
08-May-2014 |
Jessica Hummel <jhummel@google.com> |
Merge "Disallow the INTERACT_ACROSS_USERS permission for system apps"
|
96599a05acd7559464d527d819eaf4571129eb77 |
|
06-May-2014 |
Jessica Hummel <jhummel@google.com> |
Disallow the INTERACT_ACROSS_USERS permission for system apps This reverts a temporary hack which was required for a temporary launcher version to work for development purposes. Change-Id: Ifd17447076bf5c67ad2ce8df8f184fe6f12baad3
/frameworks/base/core/res/AndroidManifest.xml
|
d83a096f299abd9c7fe5e441ef1bb169c314b575 |
|
03-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Bump up priority of system receiving BOOT_COMPLETED. Change-Id: I5166f88f11f781914312e867cb653c8ecbefa705
/frameworks/base/core/res/AndroidManifest.xml
|
09233289624a85093b1d99e4a6a149bf09059d8d |
|
30-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Make GET_TASKS signature|system. Normal apps can't hold it now. If they try to use getRecentTasks() or getRunningTasks() without the permission, they will only see their own tasks and home in the list. Also took this opportunity to eradicate all of the old pending thumbnail stuff. Change-Id: I6dc52a06221c78097162e4a8b482027b798bf3ee
/frameworks/base/core/res/AndroidManifest.xml
|
10fa67c77e11699391e27975fc2d276a0b8c7cbb |
|
24-Mar-2014 |
Nicolas Prevot <nprevot@google.com> |
Introduce forwarding intents across profiles. The package manager service maintains, for some user ids, a list of forwarding intent filters. A forwarding intent filter is an intent filter with a destination (a user id). If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent. When the package manager service is asked for components that resolve an intent: If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent: The package manager service also returns the IntentForwarderActivity. This activity will forward the intent to the destination. Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/res/AndroidManifest.xml
|
b22aabbbd2801db0be526a64badf2efa208f19f1 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Merge "Introduce condition provider services."
|
7340fc8665ae3f9f1978f42aa0e5e1da85036158 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Introduce condition provider services. Add the condition provider interface, base class, and associated system metadata. Pull out common service management code into a reusable helper, used by notification listeners and condition providers. The helper, ManagedServices, is now completely self-contained - it has no dependencies on NoMan or NoMan abstractions. Bug:13743109 Change-Id: I6856d40f0a2ead78ac9b5707568559a57e7eb009
/frameworks/base/core/res/AndroidManifest.xml
|
91097de49b0f683b00e26a75dbc0ac6082344137 |
|
05-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Initial implementation of new voice interaction API. This gives a basic working implementation of a persist running service that can start a voice interaction when it wants, with the target activity(s) able to go through the protocol to interact with it. It may even work when the screen is off by putting the activity manager in the correct state to act like the screen is on. Includes a sample app that is a voice interation service and also has an activity it can launch. Now that I have this initial implementation, I think I want to rework some aspects of the API. Change-Id: I7646d0af8fb4ac768c63a18fe3de43f8091f60e9
/frameworks/base/core/res/AndroidManifest.xml
|
0a57a1112ff45507ef6361aabf42c97460405f47 |
|
18-Apr-2014 |
RoboErik <epastern@google.com> |
Merge "Add RouteProviders to the new Media APIs"
|
07c7077c54717dbbf2c401ea32d00fa6df6d77c6 |
|
20-Mar-2014 |
RoboErik <epastern@google.com> |
Add RouteProviders to the new Media APIs Compiles and works with OneMedia. This currently is a rough test of the system for finding, connecting to, and sending messages to routes. This will just connect to the first route it finds when a request to open the route picker is made (and disconnect when another request is made). Change-Id: I5de5521a079471b9e02664be4654c0591dfd9a6d
/frameworks/base/core/res/AndroidManifest.xml
|
66e5d96cf9e689148b202787bdc269519c4b6f8f |
|
09-Apr-2014 |
Robin Lee <rgl@google.com> |
Allow ProfileOwner apps to manage app restrictions Simple wrapper around the UserManager.{get|set}ApplicationRestrictions APIs. Also added a new Intent to signal to running apps that the set of restrictions has changed since startup. Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/res/AndroidManifest.xml
|
b51e0a6c4b249e0d6f404fafef007645221be0d3 |
|
09-Apr-2014 |
Jeff Davidson <jpd@google.com> |
Stub APIs for network scoring. NetworkScoreManager defines all interactions between the framework and the scorer app. An ACTION_SCORE_NETWORKS broadcast is sent to the default scorer with any unscored networks, which responds by calling updateScores() with scores for those networks. An app may also check whether they are currently the default scorer with getDefaultScorerPackage() and request to become the default via the ACTION_CHANGE_DEFAULT broadcast. Bug: 13786258 Change-Id: Id3dc0f7c1109f0e3afd73356e2475b7f34167419
/frameworks/base/core/res/AndroidManifest.xml
|
d951ab230d80631731ef12b5d76c678c30165d6a |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am 8ebd66c2: am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit '8ebd66c259602f6b0be26fdfd3fe2f55538f6424': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
8ebd66c259602f6b0be26fdfd3fe2f55538f6424 |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit 'cd4c1c714c37a1bc7ba35ebd2509eca4f0f6a314': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
cd9a7bb3ba742606f93dcbd549d6d6eeb1cb5247 |
|
08-Apr-2014 |
Aravind Akella <aakella@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor This reverts commit 819239e5bec90ee3c861ac45fffac4a832a183a1. Change-Id: I4bbb222e5c9dc65aed03aa28fd9e0f00fe335819
/frameworks/base/core/res/AndroidManifest.xml
|
6be2f95202237b7284542e692273d13a5bd26913 |
|
10-Apr-2014 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding render stats APIs to UiAutomation (framework)."
|
3957091ba8f08c02b5e781098cb955a5f697a1ff |
|
21-Feb-2014 |
Jae Seo <jaeseo@google.com> |
Initial round of Television Input Framework This provides APIs to control and create individual television inputs on the system which will later be hosted by television applications. Change-Id: I6866d28e78175a1bff2c32a85c5d77e94d0cd60c
/frameworks/base/core/res/AndroidManifest.xml
|
1376d600d8e0eefdbc0aa11d398cf7517fc77129 |
|
13-Mar-2014 |
Svetoslav <svetoslavganov@google.com> |
Adding render stats APIs to UiAutomation (framework). bug:12927198 Change-Id: Iae21481c75ae58dcdab3731bf5f1e2844e29d434
/frameworks/base/core/res/AndroidManifest.xml
|
acf395fd9441bce9fbe68c1b7efbf824570284bc |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am 819239e5: Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" * commit '819239e5bec90ee3c861ac45fffac4a832a183a1': Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"
|
fa1d2417d296e28a48a8c4a5cfb932172edbdd65 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61 (cherry picked from commit 819239e5bec90ee3c861ac45fffac4a832a183a1)
/frameworks/base/core/res/AndroidManifest.xml
|
819239e5bec90ee3c861ac45fffac4a832a183a1 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61
/frameworks/base/core/res/AndroidManifest.xml
|
ded264733036bb566c54da5b771d63f57213c84e |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am bdfe3841: am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'bdfe384106de364ea2effac6ab80108556d11649': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
bdfe384106de364ea2effac6ab80108556d11649 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'fd53d8352a4617941b0a0449390aa562a01ea1d3': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
fd53d8352a4617941b0a0449390aa562a01ea1d3 |
|
25-Mar-2014 |
Etienne Le Grand <etn@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor Change-Id: I16e5da68f860494e24cca64075be76fad02617bc
/frameworks/base/core/res/AndroidManifest.xml
|
9de8c1d82b6bf2b70e854a3349c9f1da60a23e83 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
resolved conflicts for merge of 4f342e87 to master Change-Id: I2cdb238759beb49fede2de703df8defee92d316f
/frameworks/base/core/res/AndroidManifest.xml
|
4f342e878d88b1f75a9b487e2aa0582b59e29083 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
am 4995d725: Merge "Add signature|system permission to MediaDrm signer APIs" into klp-modular-dev * commit '4995d72520d16302fca13bc4614d1dd3c0d1c17c': Add signature|system permission to MediaDrm signer APIs
|
65c94e695929ffa1aaa49d7b5938b34aaf078b6c |
|
02-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Add signature|system permission to MediaDrm signer APIs Also addresses style issues noted in post-submit review from https://googleplex-android-review.git.corp.google.com/#/c/439054/ Change-Id: If177b11dbcc049bc271529c119bc5c36ae0107b5 related-to-bug: 12702350
/frameworks/base/core/res/AndroidManifest.xml
|
82142c21dd333307682d5f4bb09de3ab3ccfa06c |
|
27-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define trust agent framework components Adds the TrustManager system service that allows registering for changes to the trust status and reporting events that are important to trust agents. Bug: 13723878 Change-Id: I7d0d2ea86fd755702d31aa5d49cac038a6cd4301
/frameworks/base/core/res/AndroidManifest.xml
|
ff2144ccb4215acf4587fc628493b3d49dca6043 |
|
28-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define initial trust agent API Adds the minimal API needed to define a useful trust agent. Bug: 13723878 Change-Id: Ib24440bab7b16d0b656bde8b059e7d42cab2c7dc
/frameworks/base/core/res/AndroidManifest.xml
|
a42cb8b0e2b8fdfbac1a6590d6b60814caa01088 |
|
21-Mar-2014 |
Colin Cross <ccross@android.com> |
resolved conflicts for merge of a67e34c8 to master Change-Id: I597525886260884c9b2dfc7945e01eb8138a58c2
|
cf0c4a59b6d6c7d0abe6b643e200af2eb9f0d6b2 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am 4868da52: am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit '4868da52450d3e5456b3567c228967539144d108': Lock down MANAGE_DOCUMENTS permission.
|
4868da52450d3e5456b3567c228967539144d108 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit 'c620ec3614c8737b87d60efa9db96c288bcad794': Lock down MANAGE_DOCUMENTS permission.
|
f2fecf48f740a079cf9015ea8c2695039ca11d81 |
|
21-Mar-2014 |
Jinsuk Kim <jinsukkim@google.com> |
am c61f4dd7: Merge "Add HDMI-CEC service" into klp-modular-dev * commit 'c61f4dd744b1b0396703aa58eb22fc31d2b7050e': Add HDMI-CEC service
|
adfe8b86e9178a553b6db9722340fa4ff5201cf1 |
|
05-Feb-2014 |
Christopher Tate <ctate@google.com> |
App widget backup/restore infrastructure Backup/restore now supports app widgets. An application involved with app widgets, either hosting or publishing, now has associated data in its backup dataset related to the state of widget instantiation on the ancestral device. That data is processed by the OS during restore so that the matching widget instances can be "automatically" regenerated. To take advantage of this facility, widget-using apps need to do two things: first, implement a backup agent and store whatever widget state they need to properly deal with them post-restore (e.g. the widget instance size & location, for a host); and second, implement handlers for new AppWidgetManager broadcasts that describe how to translate ancestral-dataset widget id numbers to the post-restore world. Note that a host or provider doesn't technically need to store *any* data on its own via its agent; it just needs to opt in to the backup/restore process by publishing an agent. The OS will then store a small amount of data on behalf of each widget-savvy app within the backup dataset, and act on that data at restore time. The broadcasts are AppWidgetManager.ACTION_APPWIDGET_RESTORED and ACTION_APPWIDGET_HOST_RESTORED, and have three associated extras: EXTRA_APPWIDGET_OLD_IDS EXTRA_APPWIDGET_IDS EXTRA_HOST_ID [for the host-side broadcast] The first two are same-sized arrays of integer widget IDs. The _OLD_IDS values are the widget IDs as known to the ancestral device. The _IDS array holds the corresponding widget IDs in the new post- restore environment. The app should simply update the stored widget IDs in its bookkeeping to the new values, and things are off and running. The HOST_ID extra, as one might expect, is the app-defined host ID value of the particular host instance which has just been restored. The broadcasts are sent following the conclusion of the overall restore pass. This is because the restore might have occurred in a tightly restricted lifecycle environment without content providers or the package's custom Application class. The _RESTORED broadcast, however, is always delivered into a normal application environment, so that the app can use its content provider etc as expected. *All* widget instances that were processed over the course of the system restore are indicated in the _RESTORED broadcast, even if the backing provider or host is not yet installed. The widget participant is responsible for understanding that these are promises that might be fulfilled later rather than necessarily reflecting the immediate presentable widget state. (Remember that following a cloud restore, apps may be installed piecemeal over a lengthy period of time.) Telling the hosts up front about all intended widget instances allows them to show placeholder UI or similarly useful information rather than surprising the user with piecemeal unexpected appearances. The AppWidgetProvider helper class has been updated to add a new callback, onRestored(...), invoked when the _RESTORED broadcast is received. The call to onRestored() is immediately followed by an invocation of onUpdate() for the affected widgets because they will need to have their RemoteViews regenerated under the new ID values. Bug 10622506 Bug 10707117 Change-Id: Ie0007cdf809600b880d91989c00c3c3b8a4f988b
/frameworks/base/core/res/AndroidManifest.xml
|
8e3feb15c5aec2c72b0ef120a1da325e1e8f0dda |
|
24-Feb-2014 |
Svetoslav <svetoslavganov@google.com> |
Added accessibility APIs for introspecting interactive windows. 1. The old introspection model was allowing querying only the active window which is the one the user is touching or the focused one if no window is touched. This was limiting as auto completion drop downs were not inspectable, there was not way to know when the IME toggles, non-focusable windows were not inspectable if the user taps them as until a screen-reader starts introspecting the users finger is up, accessibility focus was limited to only one window and the user couldn't use gestures to visit the whole UI, and other things I can't remember right now. The new APIs allow getting all interactive windows, i.e. ones that a sighted user can interact with. This prevents an accessibility service from interacting with content a sighter user cannot. The list of windows can be obtained from an accessibility service or the host window from an accessibility node info. Introspecting windows obey the same rules for introspecting node, i.e. the service has to declare this capability in its manifest. When some windows change accessibility services receive a new type of event. Initially the types of windows is very limited. We provide the bounds in screen, layer, and some other properties which are enough for a client to determined the spacial and hierarchical relationship of the windows. 2. Update the documentation in AccessibilityService for newer event types. 3. LongArray was not removing elements properly. 4. Composite accessibility node ids were not properly constructed as they are composed of two ints, each taking 32 bits. However, the values for undefined were -1 so composing a 64 long from -1, -1 prevents from getting back these values when unpacking. 5. Some apps were generating inconsistent AccessibilityNodeInfo tree. Added a check that enforces such trees to be well formed on dev builds. 6. Removed an necessary code for piping the touch exploration state to the policy as it should just use the AccessibilityManager from context. 7. When view's visibility changed it was not firing an event to notify clients it disappeared/appeared. Also ViewGroup was sending accessibility events for changes if the view is included for accessibility but this is wrong as there may be a service that want all nodes, hence events from them. The accessibility manager service takes care of delivering events from not important for accessibility nodes only to services that want such. 8. Several places were asking for prefetching of sibling but not predecessor nodes which resulted in prefetching of unconnected subtrees. 9. The local AccessibilityManager implementation was relying on the backing service being ready when it is created but it can be fetched from a context before that. If that happens the local manager was in a broken state forever. Now it is more robust and starts working properly once the backing service is up. Several places were lacking locking. bug:13331285 Change-Id: Ie51166d4875d5f3def8d29d77973da4b9251f5c8
/frameworks/base/core/res/AndroidManifest.xml
|
4f512fb451c8ddcea852645c5c24314c20c0974b |
|
28-Feb-2014 |
Jinsuk Kim <jinsukkim@google.com> |
Add HDMI-CEC service This CL adds a system service handling HDMI-CEC protocol. The service is equipped with the capability sending/receiving HDMI-CEC messages Not all the messages are in place. Currently it has messages to support a few features only, as follows: - One touch play - System information - Routing control (partially - active source status maintenance only) - Device OSD transfer - Power status It will be extended to cover the wider usages in the follow up CLs. The CEC standard version referenced in the implementation is 1.3a. Change-Id: Ifed0b02f52ebf098eddb3bd0987efbf353b7e8fe
/frameworks/base/core/res/AndroidManifest.xml
|
d0abcedece5c749129af89cf096534c98a716d89 |
|
20-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Introduce the SearchIndexablesProvider and its friends"
|
b49995d4d997bf086c2f3214ca410b2a30861b13 |
|
15-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Introduce the SearchIndexablesProvider and its friends - enable retrieval of search data to be indexed Change-Id: I4a16408dec3d3305bf20107fb11eb2d1aee7fad5
/frameworks/base/core/res/AndroidManifest.xml
|
42c32c0c88e4049a358b0a2bf6e6a5881ee206b8 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
b4ca2639e4fddaaf7ff72ec7322929d6397e66b7 |
|
13-Mar-2014 |
Jessica Hummel <jhummel@google.com> |
Temporarily allow system apps to fully act across users. This is to allow launcher to start activities across users and will be reverted when an alternative API is provided. Change-Id: I67ec3e9d419afffbadce37d6e9958e2dfc096fb2
/frameworks/base/core/res/AndroidManifest.xml
|
d6396d67201fb2b64d13070324bb115c9c23b08a |
|
28-Jan-2014 |
Jason Gerecke <killertofu@gmail.com> |
Allow persistence of input device calibration This patch extends the PersistentDataStore store to read and write input device calibration data. A new SET_INPUT_CALIBRATION permission grants apps the ability to update this information, and a new TouchCalibration class is used to wrap the raw calibration data. Change-Id: I4daac2b15ef03616ea5b068c1e77bebd0ce7b8c1
/frameworks/base/core/res/AndroidManifest.xml
|
4c8c27ed7360abe3cd91a281e40d4e21948abc2a |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. DO NOT MERGE. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa (cherry picked from commit b4aeac730503eb4b9db7d2dcece48e1ca13b4b30)
/frameworks/base/core/res/AndroidManifest.xml
|
f55616cd8b78ed55148ee2dcfcf59cd34cdb4a96 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978 (cherry picked from commit 08d7c2861fee205a314c3847ab5f5894617a233b)
/frameworks/base/core/res/AndroidManifest.xml
|
b4aeac730503eb4b9db7d2dcece48e1ca13b4b30 |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa
/frameworks/base/core/res/AndroidManifest.xml
|
a4eeb0dca0108ac5b2c0f0dc044c9104ba1db302 |
|
04-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am bc8301df: am 0054ed81: am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit 'bc8301dfa3fc2789c4bf8dc82784075980b6329f': Update permission description string.
|
0054ed815a3db340a27d8a179d3b748bf3eeaaf0 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '8bb3b8f805658ecf9106778992dceea9a05dcc4c': Update permission description string.
|
8bb3b8f805658ecf9106778992dceea9a05dcc4c |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '95cf532fe389713ff1fb33810012586fd460e223': Update permission description string.
|
26de0b7118e188bac5a30d9562418fa09be3826a |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am cce121fb: Merge "Update permission description string." into klp-docs * commit 'cce121fb7504fbc460b85564735ff5d8a1ed4d55': Update permission description string.
|
08d7c2861fee205a314c3847ab5f5894617a233b |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978
/frameworks/base/core/res/AndroidManifest.xml
|
3cff34742aa4f4b305b2edc462a369355b2e75da |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am 341e6b73: am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit '341e6b73e6362f8757717a2518b370724c3a3913': Make FORCE_STOP_PACKAGES "signature|system"
|
341e6b73e6362f8757717a2518b370724c3a3913 |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit 'fd6d8a8b736568ccb61af10dec04a99a8c36f29a': Make FORCE_STOP_PACKAGES "signature|system"
|
0c9bd3ed4da14fbfe7f9cab872b94ed2be436cc2 |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b (cherry picked from commit 4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e)
/frameworks/base/core/res/AndroidManifest.xml
|
89f545a4ebd96b7d36b00eafa43db8ea70ed21f9 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
5a92fec650447baddff3c85aaa83c6fc805880bf |
|
14-Feb-2014 |
rich cannings <richc@google.com> |
Merge "Make FORCE_STOP_PACKAGES "signature|system""
|
005151484546fb0bf7f83c5a6ee065715230bf26 |
|
13-Feb-2014 |
Narayan Kamath <narayan@google.com> |
resolved conflicts for merge of 396b9e79 to master Change-Id: Ie71a79699be57f5af6069559068bf6253835d805
|
27bf55c8159e7f883ddc839453d5a12374ddc50a |
|
13-Feb-2014 |
Wink Saville <wink@google.com> |
am 16c0b295: am bba3a694: Merge "Telephony API extension v2" * commit '16c0b295ef069e128a4e01fd2f72da06784950a1': Telephony API extension v2
|
4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b
/frameworks/base/core/res/AndroidManifest.xml
|
8f9b33e77686de8e917ba61c5e2f2e31a1e0e49b |
|
15-Jan-2014 |
Jake Hamby <jhamby@google.com> |
Add new RIL commands to read/write NV items and reset NV config. Add new RIL commands and generic code cleanups. The only changes required for OMA DM support are the addition of five new methods in ITelephony.aidl for reading/writing NV items and performing NV config and radio resets (requires MODIFY_PHONE_STATE), along with the new RIL request IDs in RILConstants.java. Bug: 12864208 Change-Id: I958d2571580d98a49936ef2e6822e5ac086acbe2
/frameworks/base/core/res/AndroidManifest.xml
|
31b4834b6d5eb1e5156950930b69221819a84766 |
|
03-Feb-2014 |
Christopher Tate <ctate@google.com> |
Merge "Introduce "IdleService" API to expose idle-time maintenance to apps"
|
d417d625d244356bc770e2692fd59e754a72f59f |
|
20-Aug-2013 |
Christopher Tate <ctate@google.com> |
Introduce "IdleService" API to expose idle-time maintenance to apps When an application wishes to do low-priority background work when the device is otherwise idle (e.g. in a desk dock overnight), it declares a service in its manifest that requires this permission: android:permission="android.permission.BIND_IDLE_SERVICE to launch, and which publishes this intent filter: <intent-filter> <action android:name="android.service.idle.IdleService" /> </intent-filter> This string is declared in the API as IdleService.SERVICE_INTERFACE. The service must be implemented by extending the new "IdleService" class, which provides the API through which the system will communicate with the app. IdleService declares three methods, two of which are lifecycle callbacks to the service, and the third of which is for the service itself to invoke when appropriate. The lifecycle callbacks are public abstract boolean onIdleStart(); public abstract void onIdleStop(); The first of these is a notification to the service that an idle maintenance interval has begun. The service can then spin off whatever non-UI work it wishes. When the interval is over, or if the OS determines that idle services should be shut down immediately, the onIdleStop() method will be invoked. The service must shut down any background processing immediately when this method is called. Both of these methods must return immediately. However, the OS holds a wakelock on the application's behalf for the entire period between the onIdleStart() and onIdleStop() callbacks. This means that for system-arbitrated idle-time operation, the application does not need to do any of its own wakelock management, and does not need to hold any wakelock permissions. The third method in IdleService is public final void finishIdle(); Calling this method notifies the OS that the application has finished whatever idle-time operation it needed to perform, and the OS is thus free to release the wakelock and return to normal operation (or to allow other apps to run their own idle services). Currently the idle window granted to each idle service is ten minutes. The OS is rather conservative about when these services are run; low battery or any user activity will suppress them, and the OS will not choose to run them particularly often. Idle services are granted their execution windows in round-robin fashion. Bug 9680213 Change-Id: Idd6f35940c938c31b94aa4269a67870abf7125b6
/frameworks/base/core/res/AndroidManifest.xml
|
17b79985f4e5e6b696320e29f665adb796a2aef5 |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
am 47e276db: am cbd156c1: Merge "Update READ&WRITE_DREAM_STATE to signature|system." into klp-modular-dev * commit '47e276db2a938ca4ff9767cba28062b892e81629': Update READ&WRITE_DREAM_STATE to signature|system.
|
4fda2d5ab7a3faf782c78e2f1ac4a54201ab8dff |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
Update READ&WRITE_DREAM_STATE to signature|system. Change-Id: Ic3c4c5445384712571e7a1188ed9e2ab6ceb4bde
/frameworks/base/core/res/AndroidManifest.xml
|
bca57ee556c26cd3eaeccab43ec3ddda39d287fa |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
am e2bb257c: Merge "Make MANAGE_ACTIVITY_STACKS a signature|system permission." into klp-modular-dev * commit 'e2bb257c349b21f68e3b9b87eb7cabd205380082': Make MANAGE_ACTIVITY_STACKS a signature|system permission.
|
9e24357ddb504e575ce86207355811bfc9008088 |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
Make MANAGE_ACTIVITY_STACKS a signature|system permission. To allow ActivityView support within privileged apps. Change-Id: Ic0246939bf71c52ca9415149415a976537c8270b
/frameworks/base/core/res/AndroidManifest.xml
|
3b0218b0ae1fad67f539ff3c10d6d2f3abec1a11 |
|
14-Jan-2014 |
Doug Zongker <dougz@android.com> |
boot into recovery via the pre-recovery service Change PowerManagerService to start the pre-recovery service rather than rebooting directly, when requested to reboot into recovery. Add a new RECOVERY permission which a caller needs (in addition to REBOOT) in order to go to recovery. Bug: 12188746 Change-Id: I39121b701c4724558fe751adfbad79f8567faa43
/frameworks/base/core/res/AndroidManifest.xml
|
c5ac15a3e11c03951e269b243674858411204b67 |
|
27-May-2013 |
Antonio Marín Cerezuela <amarin@swissms.ch> |
Telephony API extension v2 Added new AndroidManifest permission: android.permission.READ_PRECISE_PHONE_STATE Added the following PhoneStateListeners and corresponding broadcast intents: onPreciseCallStateChanged(PreciseCallState callState); onPreciseDataConnectionStateChanged(PreciseDataConnectionState dataConnectionState); broadcastPreciseCallStateChanged(int ringingCallState, int foregroundCallState, int backgroundCallState, int disconnectCause, int preciseDisconnectCause) broadcastPreciseDataConnectionStateChanged(int state, int networkType, String apnType, String apn, String reason, LinkProperties linkProperties, String failCause) Added TelephonyManager intent actions with their extras and constants: public static final String ACTION_PRECISE_CALL_STATE_CHANGED = "android.intent.action.PRECISE_CALL_STATE"; public static final String ACTION_PRECISE_DATA_CONNECTION_STATE_CHANGED = "android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED"; public static final int PRECISE_CALL_STATE_* Moved public static final int DISCONNECT_CAUSE_* from PreciseCallState.java to a new class DisconnectCause.java Moved public static final int PRECISE_DISCONNECT_CAUSE_* from PreciseCallState.java to a new class PreciseDisconnectCause.java Change-Id: If3b88c679507c529b746046c4a17cf6d9974bd09
/frameworks/base/core/res/AndroidManifest.xml
|
c4d41755d73ffe85d179d42a4f0c993b49303145 |
|
17-Dec-2013 |
Shishir Agrawal <shishir@google.com> |
Merge "Adding support for SIM communication from Android over logical channels."
|
57f656b9f6271cf857b5ecec5f8c7eacb321ec0b |
|
28-Oct-2013 |
Shishir Agrawal <shishir@google.com> |
Adding support for SIM communication from Android over logical channels. Expose the folowing commands in ITelephony.aidl and TelephonyManager: - iccOpenLogicalChannel - iccCloseLogicalChannel - iccTransmitApduLogicalChannel Also add a new SIM_COMMUNICATION permission (maked as dangerous) to control access to the above commands. Change-Id: I89c08adc6f9738907e3b547c749f3cc61f300710
/frameworks/base/core/res/AndroidManifest.xml
|
09e9cdceceb722643e2c80c6544d44a43d7f95f0 |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
DO NOT MERGE : Move some system services to their own sub package. (Cherry pick from master) As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: Idd92871c1828bdde81d85fe99a9c87a22d53169d
/frameworks/base/core/res/AndroidManifest.xml
|
38a7ed05f8fed0aa81f7214d827875f9876ffbe1 |
|
15-Nov-2013 |
Andres Morales <anmorales@google.com> |
Adding INfcUnlockSettings and NfcUnlock interface class. Change-Id: Ie55a5d4bb58c2944952fc84cce32d3573a3a1a22
/frameworks/base/core/res/AndroidManifest.xml
|
84e0747552cfaa0546822df221e3dece7481c4b1 |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
am 461febad: am 64397749: am 22010817: Merge "Handle backup transport registration dynamically" into klp-dev * commit '461febadc44190bf19e870a0bc1a706ec3667212': Handle backup transport registration dynamically
|
cefba58d14f9669b57c16b4ea493779d882c43bd |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
Handle backup transport registration dynamically Bug 11369873 Change-Id: I9bbdcc21ce25159c6645690123b5d03c553b0ddc
/frameworks/base/core/res/AndroidManifest.xml
|
30f8eb472e44228069c2ffb8bd0b43213edbf04e |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
Move some system services to their own sub package. As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: I33e48d070f38186819d3a1d7a4dc3984b75a9eda
/frameworks/base/core/res/AndroidManifest.xml
|
6c58d890f3a6993a3bcf413b84ba6fba875832f8 |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
am 84d76025: am eb223425: am 1f7a8a06: Merge "Add a platform library for remote display providers." into klp-dev * commit '84d760257f46232601e5f47411fb4e59f57f1872': Add a platform library for remote display providers.
|
1f7a8a06256907e03405f89108f081289c23e97a |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Merge "Add a platform library for remote display providers." into klp-dev
|
f3c99e883f46c56e5e2877e844b902b6eb45545b |
|
06-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Add a platform library for remote display providers. This interface allows applications to register services that offer remote displays to the system. The system will then provide UI to allow user to connect to these displays and enable mirroring. Bug: 11257292 Change-Id: I34da5b9dfdaf71267bd3450c505bc1b7368d1b40
/frameworks/base/core/res/AndroidManifest.xml
|
99543e03b87899ac5de4f7f2dc388e5c9f546d04 |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 8f4797d1: am 35c94390: am 7ce4381a: Merge "Move READ_EXTERNAL_STORAGE to storage group." into klp-dev * commit '8f4797d111cf3dd83fdda69bdbe2a7dcef1888d9': Move READ_EXTERNAL_STORAGE to storage group.
|
eaa9780fd64f122df8a306562786e106ae228ceb |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Move READ_EXTERNAL_STORAGE to storage group. Bug: 11437351 Change-Id: I460a3ee7860e8591e601eec7d390c3ca7eed1be6
/frameworks/base/core/res/AndroidManifest.xml
|
3aab4962513bc61ea75ac1e4cc239a97ee5f1860 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
am 41fab0a1: am fa191d5a: am d9e98a4b: Merge "Unhide BIND_NFC_SERVICE permission." into klp-dev * commit '41fab0a19caeb8077171f0eb605f416cbc4a0ef0': Unhide BIND_NFC_SERVICE permission.
|
8c99ab849e7d9c87bae3b20377af66ad266eba99 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
Unhide BIND_NFC_SERVICE permission. Needs to be held by host-based card emulation apps in order to work. Bug: 11352063 Change-Id: I8ba42446cd3066b38309d8e9cbc51d140a023547
/frameworks/base/core/res/AndroidManifest.xml
|
ad9739cdbeb09f672304a0812c6c5fef5733e1c2 |
|
14-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5f7f97e0: am 2dbe1627: am 12ad9ce2: Merge "Fix spelling." into klp-dev * commit '5f7f97e01507c6d5860388dfea860e05c2a3616e': Fix spelling.
|
ed74f8eda220445a09f4b49b66de73da2f71c3eb |
|
11-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Fix spelling. Change-Id: Ibcc5a5b976e185c4a6605b18b645b05a5c00f3ec
/frameworks/base/core/res/AndroidManifest.xml
|
0fae349f19e2f4738c12f4849054c72a007770b0 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am 353ec474: am 8029493f: am f012b777: Merge "Fix some doc issues." into klp-dev * commit '353ec47422cbd1bb40f19e7ec9ec6b4f300ee3ab': Fix some doc issues.
|
ebc15ef80ff1b4354be99a45d348537f094d6b59 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix some doc issues. Bug: 11079621 Bug: 10461610 Bug: 10461369 Bug: 10461417 Change-Id: I7fd966f3cda0660ba20fa15d7164dcac95efadd3
/frameworks/base/core/res/AndroidManifest.xml
|
b8aa12273f91b4b2689ceca5029da58d8f307bee |
|
02-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am af85c03d: am b9edb3a2: Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev * commit 'af85c03deb3506cebebd1719df4bfb844505fc9d': Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature.
|
3d2a664a426be706d293e895493ee96376b1de30 |
|
02-Oct-2013 |
Matthew Xie <mattx@google.com> |
am 9eb9ebb2: am 0e772b22: Merge "Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields" into klp-dev * commit '9eb9ebb2fbbe1135919cf685d84eba18cfecdf01': Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields
|
b9edb3a22b3342912bb9eef79aee0bfcb6be1675 |
|
01-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev
|
3714141d287c965ea3451831dd5167f63f8db87b |
|
30-Sep-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature. Change-Id: I432a2ddbd2fe1d095bb3895c5c122acf465d0c9b
/frameworks/base/core/res/AndroidManifest.xml
|
091fc2ba7a4441b9985dfd9ebe25cb7c99a7324b |
|
24-Sep-2013 |
Matthew Xie <mattx@google.com> |
Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields bug 9987787 Change-Id: Id1c149964137e35703310e2f2893c8830aacddea
/frameworks/base/core/res/AndroidManifest.xml
|
e5a8b028c3bccc5eb72c5d23c8a43eecee9740a7 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
am 54e3e7b5: am 92baafb4: Merge "Moving Launcher permission to Framework. (Bug 10343529)" into klp-dev * commit '54e3e7b5d43b87bddabfb2e312becb33a8c46582': Moving Launcher permission to Framework. (Bug 10343529)
|
4516798862bf46d12b3f1130b8480e8c804146d0 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
Moving Launcher permission to Framework. (Bug 10343529) Change-Id: Ic48c254c844e65171b5f92d81272962cdc673acc
/frameworks/base/core/res/AndroidManifest.xml
|
80326646b79538178c3115a4bf2d89b9616c50be |
|
19-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am 58910a74: am 1608f496: Merge "Public API for RemoteController" into klp-dev * commit '58910a746ebf915264b87536ab25148a94714ca2': Public API for RemoteController
|
a83487e8c618f3c267c3fe3a72d4eb9f1388d07e |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
Public API for RemoteController Public API, under system|signature permission for access to currently playing metadata and playback state. Public API for sending media key events. Bug 8209392 Change-Id: I39b9309ca3fb1bc305492bad98740df0ae0842b2
/frameworks/base/core/res/AndroidManifest.xml
|
cac8a1c08ce5c07e5d5a4ab4314fa46ddf52c983 |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am f54f7d70: am 15bcc323: Merge "RemoteController class to expose IRemoteControlDisplay features" into klp-dev * commit 'f54f7d707546a99ffc5345591f2c9488e6149e84': RemoteController class to expose IRemoteControlDisplay features
|
7ddd226e7c6e759feaf2747a90be1cc06acf37a3 |
|
02-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
RemoteController class to expose IRemoteControlDisplay features Wrap all the features of IRemoteControlDisplay.aidl in a new class, RemoteController, that implements the IRemoteControlDisplay interface. The API functions to expose in the SDK are tagged with "CANDIDATE FOR API" Bug 8209392 Change-Id: I597bcd503ac93e73889c9ae8b47b16c4fcb363bc
/frameworks/base/core/res/AndroidManifest.xml
|
8a4577a1697f053f94527fc2dfa89209284d8d71 |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am deae1e11: am b00e5cc6: Merge "Add permissions for the InCallUI Split." into klp-dev * commit 'deae1e11bf9d6ee40e70bee62d24dbcb01ef1b60': Add permissions for the InCallUI Split.
|
b00e5cc610f24aca7e989db0ca552c952d2a924f |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
798363894d21cf87bf1915372f9dcc4605b3d4ac |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic1023adba939c82e9bce844c104f85821f21f43c
/frameworks/base/core/res/AndroidManifest.xml
|
dde1f8b01b02b6227444d9096e106b93615bb83f |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
am 1e763fd2: am e4fdc847: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '1e763fd280b3dc555e6a0a3a6458fbdb9a43e096': Revert "Add permissions for the InCallUI Split."
|
e4fdc84794923f9408fc400ed9177178329a08cd |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
41b9ef9c4e175770e4ccef3d83d117f404915b48 |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit 4f7ffa90d117e499786c77bccefdef88c1714668. Change-Id: If07f7dd0b416c070398593e2d5a15b3557c1f323
/frameworks/base/core/res/AndroidManifest.xml
|
835b5f344ba63a6c0ac9c8a7cc40052134d59b8c |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
am e33b79ef: am 95a18139: Merge "Add HOTWORD as an AudioSource" into klp-dev * commit 'e33b79ef373fd3db9de035b5ecf2137a0684a441': Add HOTWORD as an AudioSource
|
e7f6bfbc51365f40185f53027c7dd5a07e162924 |
|
12-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 07d545e0: am e0b7e4cf: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '07d545e08d615865860a0f73b7eabfd149754893': Add permissions for the InCallUI Split.
|
4c980cc6aede622b165d7936a89aae507a317cd3 |
|
12-Sep-2013 |
Alexander Ray <aray@google.com> |
am b0049151: am 7563d423: Merge "Add consumer IR framework" into klp-dev * commit 'b0049151f7c1f2ffa7481ac7c6f6baf7a548c5e8': Add consumer IR framework
|
6f64688bc8c1fc01b632dadfe4f75587f446e626 |
|
12-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am 6c5e9fb4: am f702286c: Merge "Remove HotwordRecognition APIs" into klp-dev * commit '6c5e9fb4c4215f76a8a1fd8d72eee1154deb1039': Remove HotwordRecognition APIs
|
95a181397dad3113b96e3cc7392a5b0f5d742f39 |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Merge "Add HOTWORD as an AudioSource" into klp-dev
|
e0b7e4cf455b21316661b158edee12ac5467995c |
|
11-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
7563d42331ed7df7f026c8921ae990ce2fca9efd |
|
11-Sep-2013 |
Alexander Ray <aray@google.com> |
Merge "Add consumer IR framework" into klp-dev
|
65a6ba347848069b198869a7500d07a419aaf15d |
|
11-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Remove HotwordRecognition APIs - and its usage from Keyguard Bug: 10708010 Change-Id: Ic4a695a1d0e9312706a3b4ff01e59e2567b6ad9c
/frameworks/base/core/res/AndroidManifest.xml
|
51e95df8f24e9ea30775686b9e324b9a671213dc |
|
26-Jun-2013 |
Erik Gilling <konkers@android.com> |
Add consumer IR framework Change-Id: I786c00db0cce61ef75e4edc24e90f2cdcba6dbfb
/frameworks/base/core/res/AndroidManifest.xml
|
357263da0ec2bc2be9d48c1becc3d94288c2f3ed |
|
09-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Add HOTWORD as an AudioSource - This is a low-priority source that can be preempted by others - This is required for scenarios where someone wants an alway-on graceful microphone Bug: 10640877. Change-Id: Idb3577541103717cb713a7a93d3762ad2c2f4710
/frameworks/base/core/res/AndroidManifest.xml
|
4f7ffa90d117e499786c77bccefdef88c1714668 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: I7e45aeebbe8873f99fe897272390fb06f1840d2d
/frameworks/base/core/res/AndroidManifest.xml
|
bc7d392ef1fb7f7cf12a518b20d6e8f59e092c51 |
|
07-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am c3360d2a: am b05b4086: Merge "Add permission checks and unhide the Hotword recognition APIs" into klp-dev * commit 'c3360d2a8b6d7b8e820c99844364be4f1fc83824': Add permission checks and unhide the Hotword recognition APIs
|
c73c1783744baeeabc620ecede545e0ffbd034d4 |
|
06-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Add permission checks and unhide the Hotword recognition APIs - Also tweak the API a little to send an intent on hotword being recognized. Change-Id: I8a3fedaec4e1db595ed058089734d25c7957111e
/frameworks/base/core/res/AndroidManifest.xml
|
cd57b4950f5df4c3c435ec3995d730ad98b525dc |
|
06-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
am 3d27c9f9: am f1eebfc2: Merge "Remove unused APIs and rename others based on API review" into klp-dev * commit '3d27c9f973b1dd35ed457785b452851316cdca8a': Remove unused APIs and rename others based on API review
|
d304af69891483aad808356af1ac5f00e90c8edf |
|
05-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
Remove unused APIs and rename others based on API review Restrictions challenge is only to be used by device admins. Bug: 10461761 Change-Id: I3db1249e2ce99f386602de59ed930302bb0a97fb
/frameworks/base/core/res/AndroidManifest.xml
|
7275ecc5094f119be35f485ebad9ef1c858d8206 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
am 70c2dd93: am 2cf8138b: Merge "Add LocationManager.MODE_CHANGED_ACTION broadcast" into klp-dev * commit '70c2dd932bd585ed578ea684db06f17c4e5d24d3': Add LocationManager.MODE_CHANGED_ACTION broadcast
|
40a86c24d2601df4966c57573a5bf58b30a41990 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
Add LocationManager.MODE_CHANGED_ACTION broadcast - Currently redundant with PROVIDERS_CHANGED_ACTION, but that may change in the future - Part of fix for b/10409275 Change-Id: I12daaf20e6546fd9e9dc71c599967fa0ad95e27f
/frameworks/base/core/res/AndroidManifest.xml
|
92774a9f9739da20a47ea576f91777e656106db9 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8bd2eb31: am 90a5df1e: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '8bd2eb314bf923f556fda0229a1ef44392c4ec00': Revert "Add permissions for the InCallUI Split."
|
90a5df1ee8c89ca17df93d9ecf95652b2ae619f4 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
b6c46d2381e707f0b55b193636fc515ba3129d7a |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit bf84eb5ed579d13b74c97b995299ca61cafedea6. Change-Id: I40e311174898a741f5053501290833420355ad03
/frameworks/base/core/res/AndroidManifest.xml
|
42d1cd25be5865fa2f50948e71fd50cd74ba18c6 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8fab063a: am 7f60dc57: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '8fab063abcfef648bef9232dad62c8b8cea251d5': Add permissions for the InCallUI Split.
|
7f60dc57780281030f26a2109a64d0260e976af7 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
bf84eb5ed579d13b74c97b995299ca61cafedea6 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic759d14acefcea746e0d8e86c0f006d4bc462386
/frameworks/base/core/res/AndroidManifest.xml
|
4b905b6195443acb2e16f234f4cb24318b9a3458 |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 97c61ab7: am 86d2db97: Merge "Print spooler security and some new print service facing APIs." into klp-dev * commit '97c61ab7c02c24c485acf5775310a304730dfeea': Print spooler security and some new print service facing APIs.
|
86d2db9750657401deadea6766c94300c3bfc7cd |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Print spooler security and some new print service facing APIs." into klp-dev
|
d26d4898fcc9b78f4b66118895c375384098205e |
|
28-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print spooler security and some new print service facing APIs. 1. Updated the security mode of the print spooler. Now the spooler is not signed with the system key, it is not a privileged app so if it gets compromised (PDF rendering is a potential attack vector) it cannot access dangerous permissions. Also only the system can bind to the spooler. 2. Added APIs for asking a print service to start and stop tracking a given printer. This is need for the case when the user selects the printer and the print service should do a best effort to keep the system updated for the current state of the printer. 3. Added APIs for putting a print job in a blocked state. A print service would report the print job as blocked if for some reason the printer cannot proceed, e.g. 99 pages are printed but there is no paper for the last one. The user has to add more paper and the print service can resume the job. 4. Changed the read/write APIs to use ParcelFileDescriptor instead of FileDescriptor since the latter does not have a clean API for detaching the wrapped Linux file descriptor when one wants to push it to native. 5. Added API for getting the size of the printed document so the print service can avoid handling big filed over cellular network or ask the user if needed. 6. Now the print services that are preinstalled on the system image are automatically enabled. Change-Id: Ia06c311d3d21cabb9e1368f13928e11cd0030918
/frameworks/base/core/res/AndroidManifest.xml
|
ae1fda5aa3979445153d84f418092cc2473b3c24 |
|
30-Aug-2013 |
Wink Saville <wink@google.com> |
am d2f41b3d: am 35bd30b1: Merge "Merge commit \'270226b0\' into manualmerge" into klp-dev * commit 'd2f41b3dc692e2c9a0c2f60bdf0730d9b52b6df3': Add support for handling mobile provisioning networks.
|
7788c61af5927a0fac612ea94d5205eeec2f507f |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Merge commit '270226b0' into manualmerge * commit '270226b0': Add support for handling mobile provisioning networks. Conflicts: core/java/android/net/CaptivePortalTracker.java core/java/android/net/ConnectivityManager.java core/java/android/net/IConnectivityManager.aidl core/java/android/net/MobileDataStateTracker.java core/res/AndroidManifest.xml services/java/com/android/server/ConnectivityService.java Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
|
948282b0e6cf5310f09db97a4ae939db7c1cef72 |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Add support for handling mobile provisioning networks. When a sim is new or it has expired it needs to be provisioned with the carrier. Basically provisioning is associating a sim with a user account. When a sim isn't provisioned then operators will restrict access to the network and only allow certain addresses or services to be used. This set of changes allows two types of provisioning networks to be recognized. The first is a network that causes all DNS lookups to be redirected to a different address than was intended. This is exemplified by how T-Mobile works. The second technique uses a special apn for provisioning. An example is AT&T where lwaactivate is the provisioning apn and broadband is the normal apn. We first try broadband and if we are unable to connect we try lwaactivate. When we see the activate we identify it as special and the ApnContext.isProvisioningApn will return true. In the future our plan is to create a new network type that can be added to the apn list, but for now it identified by name. Here is a list of significant changes: - CaptivePortalTracker now only test WiFi networks instead of all networks - checkMobileProvisioning checks for provisioning networks and doesn't try to ping. - IConnectivityManager.aidl changes: * getProvisioningOrActiveNetworkInfo was added to and used by Manage mobile plan in WirelessSettings so even when there is no active network it will still allow provisioning. Otherwise it would report no internet connection. * setSignInErrorNotificationVisible is used by both CaptiviePortalTracker and checkMobileProvisioning so they use the same code for the notifications. * checkMobileProvisioning was simplified to have only a timeout as returning the result is now harder as we abort simultaneous call otherwise we'd could get into loops because we now check every time we connect to mobile. - Enhanced MDST to handle the provisioning network. - Added CONNECTED_TO_PROVISIONING_NETWORK to NetworkInfo to make a new state so we don't announce to the world we're connected. - TelephonyIntents.ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN is sent by the low level data connection code to notify Connectivity Service that a provisioning apn has connected. This allows CS to handle the connection differently than a normal connection. Bug: 10328264 Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
/frameworks/base/core/res/AndroidManifest.xml
|
18643b58eec84c0ce5a10ced66c93e95fbb41cb4 |
|
27-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
am 2517d08b: am 61d806c7: Merge "Docs changes pursuant to API review feedback." into klp-dev * commit '2517d08b9a09d123729b01d34840e96f099ea704': Docs changes pursuant to API review feedback.
|
511cd35fcc0b8ab048f284a6af374de8ccc69865 |
|
24-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Docs changes pursuant to API review feedback. Change-Id: I74c51791192f7fefad4e299d25c91438cbf6ab73
/frameworks/base/core/res/AndroidManifest.xml
|
7e458235ac2f2522bea07aa24423b39d1729d2e3 |
|
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I6c9fd490f2efd9c359c598eb2a18c4150b446564
/frameworks/base/core/res/AndroidManifest.xml
|
e2a6d3df1257c1c04b1a14777bb7ee65f634bdc3 |
|
22-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Merge "Introduce network link quality statistics" into klp-dev
|
1f12cb52a494a3eaefc62d03a8d2fdf47a5535e9 |
|
21-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Introduce network link quality statistics This change starts tracking traffic quality data for WiFi and mobile networks. The quality is tracked based on incidental traffic, and not on specific measurements. Theoretical bandwidths are hard-coded, as well as sampling interval; although sampling interval can be changed by setting a system policy. Bugs filed to remove shortcomings of this change - 10342372 Change LinkInfo name to something better 10342318 Move hardcoded values of MobileLinkInfo to resources so they can be updated without changing code Bug: 10006249 Change-Id: I83d8c7594da20fe53abbd5e1f909b1f606b035bb
/frameworks/base/core/res/AndroidManifest.xml
|
e530c41b57514d419cdc7a7b14802b6954d3293c |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Merge "Protect a bunch of broadcast intents" into klp-dev
|
6b8a6a6e056c0f639220c4bfdf044d5f04bc593e |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Protect a bunch of broadcast intents All the changed intents are restricted. Only Bluetooth Process can broadcast/send them. bug 7622253 Change-Id: I098664bf266ac44b7904f8f79b1804d5130f5cd5
/frameworks/base/core/res/AndroidManifest.xml
|
ff796e5a24481febd8c07b1a6a3c3eda0e3fd88b |
|
21-Aug-2013 |
Jason Monk <jmonk@google.com> |
Merge "Change PacProcessor to Android Service" into klp-dev
|
9ced3cd9d6ea414523051ec872fffc68f5fdbf08 |
|
12-Aug-2013 |
Jason Monk <jmonk@google.com> |
Change PacProcessor to Android Service This switches the PacProcessor over to an Android Service. The service is bound and unbound by the PacManager, which also adds it to the ServiceManager, allowing for Context-Free access by the PacProxySelector in all DVMs. bug:10182711 Change-Id: Id1ff7660be56e8976cdcccd76e041feb47a17a61
/frameworks/base/core/res/AndroidManifest.xml
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/res/AndroidManifest.xml
|
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 |
|
13-Aug-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add GIDs to packages.list, update SD card perms. Write supplementary GIDs to packages.list for lower-level system components to parse. WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always enforce READ_EXTERNAL_STORAGE permission. Update permission docs to mention new behavior. Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/core/res/AndroidManifest.xml
|
1ed51627d94b140e8893b8e1dcde9bf37e2adca7 |
|
01-Aug-2013 |
Brian Williammee <bwill@google.com> |
Track latency of captive portal checks When captive portal check occurs, track its latency, whether or not we received a response, and whether or not the response was a captive portal. Pair with information identifying the access point / base station, and broadcast it (with a system|signature-protected permission). Broadcast only occurs if user has consented to Settings.Global.WIFI_SCAN_ALWAYS_AVAILABLE. Change-Id: I6fd59954a7ee2cc7acedf064a1465882653b2173
/frameworks/base/core/res/AndroidManifest.xml
|
7d00affce6e25b22fd8fc135933b3bf6b547a0dc |
|
03-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Support public virtual displays. Refactor the new private virtual display API to also support creating public virtual displays with various characteristics. This feature requires special permissions and is only intended for use by the system. Change-Id: I44dd19f37cf76ea6d6e313afe42f4a412bd96663
/frameworks/base/core/res/AndroidManifest.xml
|
a7397883de67d674970d91f86d46ccf637e5e543 |
|
31-Jul-2013 |
Martijn Coenen <maco@google.com> |
NFC: Host-based card emulation APIs. - New INfcCardEmulation interface to allow apps to interface with card emulation system. - New BIND_NFC_SERVICE permission to prevent malicious apps from binding to card emulation services. - ApduServiceInfo is now in the framework. - Added constants to Settings.Secure for storing defaults. - Modified XML grammar a bit. Change-Id: I56b3fa6b42eb5dc132c91c1386ab1e6bac779059
/frameworks/base/core/res/AndroidManifest.xml
|
a418cf21c9d03c1435e9adec3e025387b6345cd9 |
|
19-Jul-2013 |
Amith Yamasani <yamasani@google.com> |
New permission to manage device admins The previously used permission was doing double duty as the permission that device admins to check for to ensure that calls are coming from valid system components. MANAGE_DEVICE_ADMINS is system|signature and is now required to add/remove device admins. Required for: Bug: 9856348 Change-Id: I64385d2ec734c3957af21b5a5d9cffd8a3bcd299
/frameworks/base/core/res/AndroidManifest.xml
|
538cdb98ef06a1768c582df28e8cc0e4335dd216 |
|
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
resolved conflicts for merge of 85b5e4c4 to master Change-Id: Idd0ad9b1504fddf68c4c4cc04731de1eddd204b3
|
e182bfe398a132236f723a76522bacd4d6d4c0a4 |
|
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add gservices updater for carrier provisioning url bug:9623159 Change-Id: I36697ed341353b7a3dbec5afe20241102e76f6f1
/frameworks/base/core/res/AndroidManifest.xml
|
6c1c0b6cbecf0cd0486a9a781da5e6f9bd2c0eaa |
|
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Declare permission for accessing input flinger. Change-Id: I2914b301b74e0d310a9e95e2d6fb5cb72d3e3703
/frameworks/base/core/res/AndroidManifest.xml
|
10dd2b6464c0d9b78ae16cf19e62df947299c408 |
|
15-Jul-2013 |
Evan Charlton <evanc@google.com> |
Merge "Add carrier setup app integration"
|
1df62d27838657a0988f38883f906be024af7d87 |
|
12-Jul-2013 |
Geremy Condra <gcondra@google.com> |
Merge "Permissions to protect socket marking settings"
|
f11e5d34766a589af46ffc47e461b0103250fd69 |
|
09-Jul-2013 |
Chad Brubaker <cbrubaker@google.com> |
Permissions to protect socket marking settings Add the manifest entries for the net_mark group that protects marking traffic as from another user in per user routing. Change-Id: I97932a9e407467a7adc733caea8746a712bc6b68
/frameworks/base/core/res/AndroidManifest.xml
|
843d5ea5ec965c17de525b3a9f52c8cb9d352c3c |
|
13-May-2013 |
Evan Charlton <evanc@google.com> |
Add carrier setup app integration Add an intent to invoke a native carrier setup app. This is paired with the INVOKE_CARRIER_SETUP permission, though it is up to the app to enforce that callers hold this permission. Change-Id: I317a40675de7e9587de23c028459be2331a2f8a2
/frameworks/base/core/res/AndroidManifest.xml
|
053f61d6a6e23825e680dc49982e55c5b4299d61 |
|
27-Jun-2013 |
Dianne Hackborn <hackbod@google.com> |
Work on issue #9586838: Crash after waking up Hammerhead device I made the power manager more rigid, not allowing different uids to use the same wake lock. This never should happen. I would guess there is somewhere that the activity manager is acquiring the wake lock without clearing the calling identity... but it is hard to follow all the paths this may happen in. So here we add some checks when acquiring/releasing the wake lock to make sure it is being done as the system uid. Also: - Protect the new activity stack calls with a permission, and make sure to clear the calling uid once past that. - Collect uid data from process stats so we can correctly associate CPU use with a uid even if we don't know about the pid for some reason. - Fix battery stats dump commands to clear calling uid before executing so they aren't broken. Change-Id: I0030d4f7b614e3270d794ecfc3669139a5703ce9
/frameworks/base/core/res/AndroidManifest.xml
|
5fa9f2b127c2d7c40da419540f3425ac45a89439 |
|
27-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Single-user restrictions"
|
505e35bca9e19773e42cb8771fcf36158208b8ab |
|
26-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am c869696e: am 65f7a95f: am 2f50097a: Merge "Fix power issues around wifi scans." into jb-mr2-dev * commit 'c869696ef3c1dca3efbc6ce8ab804e8a1b117900': Fix power issues around wifi scans.
|
89710842585404ea33f941afeb2c321e706005e9 |
|
25-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix power issues around wifi scans. - Sending a broadcast indicating when scan requests could be serviced so that apps don't request scans we won't do anything with. - Fix our batt stats accounting so we only count it if we send the request to the driver. bug: 8868201 bug: 9496690 Change-Id: I64a4f1c294c848ac64c50d8854ed4a6a1a47f603
/frameworks/base/core/res/AndroidManifest.xml
|
655d0e2029e6ae77a47e922dce4c4989818b8dd1 |
|
12-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Single-user restrictions Introduces a new "blocked" state for each package. This is used to temporarily disable an app via Settings->Restrictions. PIN creation and challenge activities for use by Settings and other apps. PIN is stored by the User Manager and it manages the interval for retry attempts across reboots. Change-Id: I4915329d1f72399bbcaf93a9ca9c0d2e69d098dd
/frameworks/base/core/res/AndroidManifest.xml
|
4b9a4d16872bbb50712e007b419ac0b35ff1582d |
|
12-Jun-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print - platform APIs Related changes: Skia (inlcude PDF APIs): https://googleplex-android-review.googlesource.com/#/c/305814/ Canvas to PDF: https://googleplex-android-review.googlesource.com/#/c/319367/ Settings (initial version): https://googleplex-android-review.googlesource.com/#/c/306077/ Build: https://googleplex-android-review.googlesource.com/#/c/292437/ Sample print services: https://googleplex-android-review.googlesource.com/#/c/281785/ Change-Id: I104d12efd12577f05c7b9b2a5e5e49125c0f09da
/frameworks/base/core/res/AndroidManifest.xml
|
6fbb5553a5b2d7c19ea411ace9a46e18262698c4 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Protect more system broadcasts."
|
61277dfcd9479cfaca0fce00f00a79a2e51083a2 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Protect more system broadcasts. Bug: 8877514 Change-Id: Iaff8a5fbfab2c48bf26ce611fe2caff4f22d9152
/frameworks/base/core/res/AndroidManifest.xml
|
81888d56610bd4771e61b47c2c57a62966c11385 |
|
11-Jun-2013 |
Scott Main <smain@google.com> |
am 26bc073d: am fe7c2220: Merge "add NA message for any "signature" level permissions" into jb-mr2-dev * commit '26bc073dfa32c8122ce194cfc39e2dfc44370fcd': add NA message for any "signature" level permissions
|
93e60b5b2618c65b9494c474fd09563f8b6e42f3 |
|
10-Jun-2013 |
Scott Main <smain@google.com> |
add NA message for any "signature" level permissions Change-Id: If76e9e3b7ffc5d97422321db312a03869c407f08
/frameworks/base/core/res/AndroidManifest.xml
|
5a3915b06bf1e82cda024945d3b71b51b470b809 |
|
24-May-2013 |
Amith Yamasani <yamasani@google.com> |
UX compliance for error messages Bug: 9122154 Change-Id: I4a64750f11845a230321450bc6a2955cb73e3b6d
/frameworks/base/core/res/AndroidManifest.xml
|
049219925fc2fb3adee803731a2ccd1c6c7c580a |
|
21-May-2013 |
Jay Shrauner <shrauner@google.com> |
am 66d67241: am 34bed420: Merge "Update CALL_PRIVILEGED docs" into jb-mr2-dev * commit '66d67241205e857e434bacf1a1e8fb8e3100018d': Update CALL_PRIVILEGED docs
|
592c9fc3122eb86cc66f18de4cc29dadb7a12c8c |
|
17-May-2013 |
Jay Shrauner <shrauner@google.com> |
Update CALL_PRIVILEGED docs Add usage restriction note to CALL_PRIVILEGED permission doc. Bug:8987211 Change-Id: I3545e2ae30464680e533e3eea0ff9ae913e20ef6
/frameworks/base/core/res/AndroidManifest.xml
|
9ecfee03fa188aebfbd9778b4e020323903495ee |
|
19-Apr-2013 |
Jeff Sharkey <jsharkey@android.com> |
Start fleshing out new storage APIs. Introduces new DocumentsContract which storage backends must implement. Backends surface a simple directory-like organizational structure that enables a document to appear at multiple locations in that hierarchy. Querying a document or the contents of a directory will return a Cursor populated with DocumentColumns, which includes simple metadata. Adds new OPEN_DOC and CREATE_DOC Intents, and permission to protect storage backends. Change-Id: Ib4984bc980182b2cedbe552908e5be94604ef085
/frameworks/base/core/res/AndroidManifest.xml
|
c0b676dcc23baedb12946c3470d9fa9b02cb39e0 |
|
23-Mar-2013 |
Jim Miller <jaggies@google.com> |
Add keyguard background scrim and protection around keyguard APIs With this change, the system process will put up a scrim in the event keyguard crashes to protect underlying content. It also adds permission checks to prevent unathorized access through the binder APIs. Cleaned up KeyguardTestActivity to build separately. Removed unused resources. Change-Id: I9e370c6bfb7dca68eae9eae304c815fb84a753d2
/frameworks/base/core/res/AndroidManifest.xml
|
2d0ed28ff65ad110c875a61cb3c20ca922640bd6 |
|
26-Apr-2013 |
Igor Murashkin <iam@google.com> |
am 10ce90ad: am eaebe4c1: Merge "Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED" into jb-mr2-dev * commit '10ce90adfafa25e417fdefa7510e53bc70bccd7b': Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED
|
f640bb9bbbe104fd08c98df240f1aeea0cacdbab |
|
23-Apr-2013 |
Igor Murashkin <iam@google.com> |
Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED This system-only permission allows a service to disable the transmit LED when a camera is in use. Bug: 8554573 Change-Id: I64f7e3fcdc8ded8be3904650bd0c91d3b8f10dd4
/frameworks/base/core/res/AndroidManifest.xml
|
5c0bd520b8095a12c6cd0c8cf0a6837b2addf520 |
|
19-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
am ab3f5903: am 688a6977: Replacing accessibility service permissions with capability attributes. * commit 'ab3f5903fc4cefbaed6c5cf2242703d56f80028e': Replacing accessibility service permissions with capability attributes.
|
688a6977cf7673ed0542ab3d839053c4e38a4dbd |
|
17-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
Replacing accessibility service permissions with capability attributes. Accessibility services can perform special operations such as retrieve the screen content, enable explore by touch, etc. To ensure the user is aware that the service will perform special operations we were using permissions. However, the special operations cannot be performed unless the service is really enabled by the user and it is at this point that we want to notify the user about the service capabilities. This change adds capability attributes to the accessibility service's meta-data XML file. The service has to declare the capability and when it is enabled we show the user the capabilities in the warining dialog. bug:8633951 Change-Id: Id3442dc71dad018e606888afdc40834682fdb037
/frameworks/base/core/res/AndroidManifest.xml
|
6c5a2e72bd2f9a83fef7abc1441d58212da48211 |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
am e0495912: am 5a02663d: Merge "Doc change: Eat some permissions group comments." into jb-mr2-dev * commit 'e0495912246495d784736cad7d5e4fa87ed788d8': Doc change: Eat some permissions group comments.
|
f6878b009ad680630577ed45207d064bc99059ad |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
Doc change: Eat some permissions group comments. Change-Id: I6db06ed80fbc9e3d71c2a029cc50a6fa954d35b9
/frameworks/base/core/res/AndroidManifest.xml
|
63e7dcf9cf190e1286003b4b3674e94b0d8c2dca |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am e3e55f2a: am 5d1a182a: Merge "Secure broadcasts." into jb-mr2-dev * commit 'e3e55f2a1943a296472d91680a385ea5dc288a31': Secure broadcasts.
|
5d1a182a8a2dd9613ef3b1f2de7b6a3d690ae890 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Secure broadcasts." into jb-mr2-dev
|
68b13ba12f2096cd69824187f9b744cbd651bc38 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure broadcasts. Prevents 3rd party spoofing. bug:7622253 Change-Id: I1e1a9887afe009d060205e349c31e3aefba2ea5b
/frameworks/base/core/res/AndroidManifest.xml
|
2590a8b341a176672474e67a7b322f82bcc93795 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
am bc463ea1: am e8d12dd6: Merge "Fix issue #8032572: Android app permission help text "null"..." into jb-mr2-dev * commit 'bc463ea1c5fa9c80fa06183a82fdd1acfb5289e5': Fix issue #8032572: Android app permission help text "null"...
|
84c7111c4ba2f2f956103e0a7dcc03664b8d6f23 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8032572: Android app permission help text "null"... ...for "Microphone / Record audio" Change-Id: Ie839b055771950e1078fa66506a007203338cfb5
/frameworks/base/core/res/AndroidManifest.xml
|
18a21459729ba6fd40545ee7ed2128dcb83eb23f |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
am 399a2977: am b3a98725: Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev * commit '399a2977a5067e4ea562ad4d74aaa0f1bffe4c53': Show an error dialog when account type is requested on a limited user
|
b3a9872549137f6c3983609e48e5b2d4fc94a3d4 |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev
|
a934b7c99ac558ba45a2a6fb8c6e3769cdd3db4b |
|
11-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
am 7228e1ae: am 8ce470dd: GPS Hardware geofencing. * commit '7228e1aeb9a2af8fad410749e2adc61266b2649a': GPS Hardware geofencing.
|
23c8b96a7e5c3f4c169bf65ae3886357943bb7b0 |
|
10-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Show an error dialog when account type is requested on a limited user This covers the scenario where an app doesn't find an account of the required type and requests the account manager to add one of that type. Bug: 8537648 Change-Id: I4d9c8842c2d90aa668f16034d3db007dc61714b8
/frameworks/base/core/res/AndroidManifest.xml
|
8ce470dd4ba0608abb6b5eae117cefca927af96b |
|
03-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
GPS Hardware geofencing. Add support for doing geofencing in hardware. Change-Id: I6d5015190e8d84e1f4beb1010ed977a71c1622d0
/frameworks/base/core/res/AndroidManifest.xml
|
8740cb1da6adb71a4e195774801c97db5853b097 |
|
05-Apr-2013 |
John Spurlock <jspurlock@google.com> |
resolved conflicts for merge of 29211d3a to master Change-Id: I9691f41b12fbf52d0ef35a9bf5223edef7afdfd2
|
5feceebb892d4cb5777cea3c6174b206705d456b |
|
23-Mar-2013 |
Daniel Sandler <dsandler@android.com> |
New NotificationListenerService. This is the best and only way for apps to listen for notifications: create a NotificationListenerService, wait for the NoMan to bind to you (as a result of the user checking a box somewhere in Settings and agreeing to a scary dialog box), and you'll start receiving notification posted and dismissed callbacks. Your service, while enabled, will also be able to clear one or all notifications. Use this power wisely. This change moves StatusBarNotification out of com.android.internal into android.service.notification. [Internal customers, including System UI and early users of the system-only listener binder API, will need to be updated.] Bug: 8199624 Change-Id: I1be46f823d4b3ddc901109ec1e085cd6deb740c2
/frameworks/base/core/res/AndroidManifest.xml
|
60765b285da48e7362b935105036efefbd1d5e58 |
|
05-Apr-2013 |
Ben Gruver <bgruv@google.com> |
am a1607a8c: am 65f420ec: Merge "Add a config updater component for the intent firewall" into jb-mr2-dev * commit 'a1607a8c62a630150b4e96ec1148e90dc40ab984': Add a config updater component for the intent firewall
|
633dc9bcef0935931781d7e4554566271fe9f2c5 |
|
04-Apr-2013 |
Ben Gruver <bgruv@google.com> |
Add a config updater component for the intent firewall Change-Id: I43f6defa16691099592bf87e75f2d1a732135cf3
/frameworks/base/core/res/AndroidManifest.xml
|
77118fb55eb3a0dcccbb8cf7861a96416f552390 |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
4e7f7e839e6adb8986114ee5b619030696f910ca |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
1a95a42c8984aa9012a9d9ea24fc54a7b09e6148 |
|
27-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am 177543db: am 3bcc2fba: Merge "Fix issue #8470131: Process thrash kills battery" into jb-mr2-dev * commit '177543db55f88f060d9a43df79afd6733cd565da': Fix issue #8470131: Process thrash kills battery
|
a40cfeb55f6caa35fee894b86175b7d916520c80 |
|
26-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8470131: Process thrash kills battery Protect app widget broadcasts from abuse. In this case the app was sending an APPWIDGET_UPDATE broadcast without specifying a target, which (a) should not be allowed (you should not be able to send updates to other apps), and (b) resulted in every single potential app widget in the system being launched... which was about 75 of them. Change-Id: I9d48733610ce6d5a7c32e69a3e06b9f33bd79a34
/frameworks/base/core/res/AndroidManifest.xml
|
c42a44931f75076d93860de2a7d2caa38a553b88 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am b2bf4ecd: am 71b00177: Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev * commit 'b2bf4ecd4ab7c2182c2a6611ff6dead67e712a80': Fix issue #8410116: "Disable your screen lock" permission...
|
71b0017759b825f8bddcdda7425afc802e8918c9 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev
|
3ad2769ba5215bdc1f777b27bfe99d5cce982095 |
|
18-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8410116: "Disable your screen lock" permission... ...appears under "Storage" section Change-Id: I55673c559551797aae3a0dd80e90c573a028b4b0
/frameworks/base/core/res/AndroidManifest.xml
|
2044158fe12fada339762825d0b4ec3961a14d34 |
|
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5d7b4a44: am 34f37e74: Merge "Handle finished bugreports, share from private." into jb-mr2-dev * commit '5d7b4a4448e0f29f36ba27aee2de06ce25ff2ee1': Handle finished bugreports, share from private.
|
02ffba940ca96988ed3e7774c606b43c58373b5e |
|
09-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Handle finished bugreports, share from private. Show notification when a bugreport is finished, letting the user launch a SEND_MULTIPLE intent to share them. Add dialog that warns user about contents before sharing. Since bugreports are now stored in private app data of the Shell app, use FileProvider to build Uris that we can grant others access to. Define BUGREPORT_FINISHED as being a protected broadcast. Delete older bugreports automatically to reclaim disk space. Migrate any Intent extras to ClipData when building PendingIntents. Add --receiver-permission support to am shell command. Bug: 7005318 Change-Id: If6c607dbcf137362d5887eac482ff7391563890f
/frameworks/base/core/res/AndroidManifest.xml
|
5ecd81154fa039961f65bb4e36d18ac555b0d1d6 |
|
10-Jan-2013 |
Jim Miller <jaggies@google.com> |
Move keyguard to its own process. This is in preparation to moving keyguard into its own process. Moved keyguard source and resources into new .apk. Got basic test app working. Still need to implement MockPatternUtils and means to pass it into KeyguardService with local binder interface. Added new ACCESS_KEYGUARD_SECURE_STORAGE permission. Temporarily disabled USER_PRESENT broadcast. Remove unintentional whitespace changes in PhoneWindowManager, etc. Checkpoint basic working version. Move to systemui process. Synchronize with TOT. Sync with recent user API changes. Fix bug with returing interface instead of stub for IKeyguardResult. Create KeyguardServiceDelegate to allow for runtime-selectable local or remote interface. More keyguard crash robustness. Keyguard crash recovery working. Currently fails safe (locked). Fix selector view which was still using frameworks resources. Remove more references to internal framework variables. Use aliases for those we should move but currently have dependencies. Allow runtime switching between service and local mode. Fix layout issue on tablets where orientation was reading the incorrect constant from the framework. Remove more framework dependencies. Fix PIN keyboard input. Remove unnecessary copy of orientation attrs. Remove unused user selector widget and attempt to get multi user working again. Fix multi-user avatar icon by grabbing it from UserManager rather than directly since keyguard can no longer read it. Merge with AppWidget userId changes in master. Change-Id: I254d6fc6423ae40f6d7fef50aead4caa701e5ad2
/frameworks/base/core/res/AndroidManifest.xml
|
aa7cc1e2ab9856e9c57c1664020df60afaae3d72 |
|
20-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding idle maintenance service."
|
b3038ec7cfc5d26eb0be18ae65c62825556bca0f |
|
13-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Adding idle maintenance service. It is beneficial that there is a mechanism on the platform to notify applications whether it is safe to perform somehow expensive operations while the user is not using the device. Thus, user experience will not be degraded. An example is discarding of unused blocks on a mounted file system instead of doing this on every write operation. bug:8056794 Change-Id: I708bad9d3ce6c8f1d5a1c05c0abf46f81a3d464b
/frameworks/base/core/res/AndroidManifest.xml
|
108da0cfa4a2f59cc953a4ec61314e69b61d6777 |
|
12-Feb-2013 |
Russell Brenner <russellbrenner@google.com> |
Adjust captive portal test for setup wizard During setup wizard, perform captive portal test without the typical delays. Change-Id: If596948e732966817aae6201440e87e19be0c2f8
/frameworks/base/core/res/AndroidManifest.xml
|
fde19b106b2b77bc3540b04445357870caf878b5 |
|
17-Jan-2013 |
Daniel Sandler <dsandler@android.com> |
New API to request a list of current notifications. The ACCESS_NOTIFICATIONS permission is signature|system only. Change-Id: I41338230aee9611117cbdac251c1b6b6c3cebf00
/frameworks/base/core/res/AndroidManifest.xml
|
3b53da493440efbacd147d1aedcea8679c3a642b |
|
04-Feb-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Sort out permission around "instant text response""
|
d4b1d9cf9cee4bd4f234e30069996dc7e449f0e7 |
|
31-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Merge changes I4859c8db,I7643024d * changes: Add the TZInfo updater and relevant intent. Fix ConfigUpdater for binary files.
|
ec695824af7ab263eaae613b87f2c0b24f176f91 |
|
31-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Remove "enhance web scripts" from settings and make it requested by plug-ins."
|
78a4c718e30b6af69fafa6c017af3b2719868631 |
|
30-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Add the TZInfo updater and relevant intent. Also add a hook for ConfigUpdateInstallReciever subclasses to change the delivery of data- in this case, from raw text to b64 encoded binary. Change-Id: I4859c8db1cc97c2427310a108b2fef03975df2b4
/frameworks/base/core/res/AndroidManifest.xml
|
58395e71ce7e99f8149eebbf39db77798165a539 |
|
30-Jan-2013 |
Doug Zongker <dougz@android.com> |
am 9c4ba4fe: am b616f0c2: add android.permission.LOOP_RADIO for access to loop radio device # Via Android Git Automerger (1) and Doug Zongker (1) * commit '9c4ba4fe752b131b01aa402389c96eb8f24764b8': add android.permission.LOOP_RADIO for access to loop radio device
|
3822896e226567c6cd3ef84518d318abd33a7624 |
|
29-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Remove "enhance web scripts" from settings and make it requested by plug-ins. Currently we have an "enhance web accessibility" setting that has to be enabled to make sure web content is accessible. We added the setting to get user consent because we are injecting JavaScript-based screen-reader pulled from the Google infrastructure. However, many users do not know that and (as expected) do not read the user documentation, resulting in critique for lacking accessibility support in WebViews with JavaScript enabled (Browser, Gmail, etc). To smoothen the user experience now "enhance web accessibility" is a feature an accessibility plug-in can request, similarly to explore by touch. Now a user does not need to know that she has to explicitly enable the setting and web accessibility will work out-of-the-box. Before we were showing a dialog when a plug-in tries to put the device in a touch exploration mode. However, now that we have one more feature a plug-in can request, showing two dialogs (assume a plug-in wants both features) will mean that a user should potentially deal with three dialogs, one for enabling the service, and one for each feature. We could merge the dialogs but still the user has to poke two dialogs. It seems that the permission mechanism is a perfect fit for getting user permission for an app to do something, in this case to enable an accessibility feature. We need a separate permission for explore by touch and enhance web accessibility since the former changes the interaction model and the latter injects JavaScript in web pages. It is critical to get user consent for the script injection part so we need a well-documented permission rather a vague umbrella permission for poking accessibility features. To allow better grouping of the accessibility permissions this patch adds a permission group as well. bug:8089372 Change-Id: Ic125514c34f191aea0416a469e4b3481ab3200b9
/frameworks/base/core/res/AndroidManifest.xml
|
b616f0c239ad61f818741909821b86aceff60b60 |
|
29-Jan-2013 |
Doug Zongker <dougz@android.com> |
add android.permission.LOOP_RADIO for access to loop radio device Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/core/res/AndroidManifest.xml
|
f9c5e0fe837a3090820da502ecaabc5accc00ace |
|
23-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
Add new API to propagate contextual data to the assist action When launching an assist, we have a new API allowing the current foreground activity/application to provide additional arbitrary contextual information that is stuffed in the assist intent before it is launched. Change-Id: I0b2a6f5a266dc42cc0175327fa76774f814af3b4
/frameworks/base/core/res/AndroidManifest.xml
|
35654b61e8fe7bc85afcb076ddbb590d51c5865f |
|
15-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
More work on App Ops service. Implemented reading and writing state to retain information across boots, API to retrieve state from it, improved location manager interaction to monitor both coarse and fine access and only note operations when location data is being delivered back to app (not when it is just registering to get the data at some time in the future). Also implement tracking of read/write ops on contacts and the call log. This involved tweaking the content provider protocol to pass over the name of the calling package, and some infrastructure in the ContentProvider transport to note incoming calls with the app ops service. The contacts provider and call log provider turn this on for themselves. This also implements some of the mechanics of being able to ignore incoming provider calls... all that is left are some new APIs for the real content provider implementation to be involved with providing the correct behavior for query() (return an empty cursor with the right columns) and insert() (need to figure out what URI to return). Change-Id: I36ebbcd63dee58264a480f3d3786891ca7cbdb4c
/frameworks/base/core/res/AndroidManifest.xml
|
a06de0f29b58df9246779cc4bfd8f06f7205ddb6 |
|
12-Dec-2012 |
Dianne Hackborn <hackbod@google.com> |
New "app ops" service. Initial implementation, tracking use of the vibrator, GPS, and location reports. Also includes an update to battery stats to also keep track of vibrator usage (since I had to be in the vibrator code anyway to instrument it). The service itself is only half-done. Currently no API to retrieve the data (which once there will allow us to show you which apps are currently causing the GPS to run and who has recently accessed your location), it doesn't persist its data like it should, and no way to tell it to reject app requests for various operations. But hey, it's a start! Change-Id: I05b8d76cc4a4f7f37bc758c1701f51f9e0550e15
/frameworks/base/core/res/AndroidManifest.xml
|
149ceec6ebac9dd000c213fc91ee8e5c08522cc6 |
|
26-Mar-2012 |
Daisuke Miyakawa <dmiyakawa@google.com> |
Sort out permission around "instant text response" - Remove SEND_SMS_NO_CONFIRMATION - Add SEND_RESPOND_VIA_MESSAGE Permission This permission is held by the phone and applications that want to handle respond-via-message should require this permission of the sender. This permission is signature/system and currently only held by the Phone app. Bug: 5108429 Change-Id: Ib611368d488de2f8e1e853f550eb2c654305eda4
/frameworks/base/core/res/AndroidManifest.xml
|
a4405ba6ea56cd1a13c45bf8e37f7b44f7d038b0 |
|
07-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Add new protected broadcasts According to the javadocs for these intents, they are all protected intents. It appears the original author forgot to add them to this file. Change-Id: I025061716d5707f10939019f2bc5bc3d4d23b04f
/frameworks/base/core/res/AndroidManifest.xml
|
a170bb81d5953c1f0aa0f5f49bd72eb43c50e233 |
|
06-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Remove duplicate AndroidManifest.xml entries. The automerger added the entries twice... Change-Id: I7910cb2126b339b0c8aee11051db1a2de8ae26ae
/frameworks/base/core/res/AndroidManifest.xml
|
849f5188e34ea667b689e795d88411a2412db2e8 |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
am 6643ea82: resolved conflicts for merge of 011132a7 to jb-mr1-dev * commit '6643ea823bf8b0726da0518ffecfcc7a9f60f87d': Secure a handful of framework broadcasts
|
6643ea823bf8b0726da0518ffecfcc7a9f60f87d |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
resolved conflicts for merge of 011132a7 to jb-mr1-dev Change-Id: I304ef91eef99526dec348a59b12c0934173bcfcb
|
b8da0376f2d50fdb2ee58deacc6d2041689e36d1 |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 (cherry picked from commit 47918ae3b4e7ebb54711884e9ff9d0300591ab8b) Conflicts: core/res/AndroidManifest.xml Change-Id: I118b31489fe7add5b8d69289cab9f4e8ab269495
/frameworks/base/core/res/AndroidManifest.xml
|
47918ae3b4e7ebb54711884e9ff9d0300591ab8b |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 Change-Id: Id8ec2778b15fe001e6fd0d5a010181bb21c52ad8
/frameworks/base/core/res/AndroidManifest.xml
|
2681faafae03548ab6fc09307215d7f2b279ab5c |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: explain implicit permissions applied by sdk versions bug: 7453055 Change-Id: I59ba2de6108b5209ff0db6b084fc0a887c5f2cce
/frameworks/base/core/res/AndroidManifest.xml
|
7dcacd559a85c2b567690fd5f3f1a8050ef6c35b |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
277b352d9f9002eb63541c86ea9388be3d7c0e16 |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: update description for location permissions bug: 6996667 Change-Id: I3b5d706d98b56386a88b33a343721ff7432063b9
/frameworks/base/core/res/AndroidManifest.xml
|
fc753c0cf676000b1c2d3cb2728af85a9b49f795 |
|
31-Oct-2012 |
Michael Jurka <mikejurka@google.com> |
Use new keyguard appwidget picker Also, remove ability to filter widgets by feature in appwidget picker in anticipation of api change Change-Id: I325de0b98f03d3a250758d504229ea27794b5330
/frameworks/base/core/res/AndroidManifest.xml
|
a1f739ea83b6d770b8469ae1c2c4161f6fe96334 |
|
19-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Merge "Change android.permission.SERIAL_PORT to signature|system." into jb-mr1-dev
|
c29f35b8f4610677d8fd9ae1816b39ef4b5f9983 |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
fca9d63635d9603c318a089397b23c17682453e3 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Add multi user support for bluetooth Create a BLUETOOTH_STACK permission to share between all users of Bluetooth apk. Bluetooth Manager binds to apk of current user bug 6925422 Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/core/res/AndroidManifest.xml
|
7c3586c576c7f7238274f1ffbc4577a57be0d1f1 |
|
29-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Merge "Make the theme for choose account and choose account type dialogs same." into jb-mr1-dev
|
3ff8e1a80058e5557d13693d3223e1aa011c0038 |
|
29-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #7211769 and #7244492, thrash around on #7226656." into jb-mr1-dev
|
d4ac8d7b3de27a9f0e4c6af2496ca71d794e42d1 |
|
28-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7211769 and #7244492, thrash around on #7226656. Issue #7211769: Crash dialog from background user has non-working "report" The report button now launches the issue reporter for the correct user. Also for crashes on background users, either disable the report button, or simply don't show the dialog depending on the build config. Issue #7244492: Bugreport button in Quick Settings doesn't actually do anything Now they do. Issue #7226656: second user seeing primary user's apps I haven't had any success at reproducing this. I have tried to tighten up the path where we create the user to ensure nothing could cause the user's applications to be accessed before the user it fully created and thus make them installed... but I can't convince myself that is the actual problem. Also tightened up the user switch code to use forground broadcasts for all of the updates about the switch (since this is really a foreground operation), added a facility to have BOOT_COMPELTED broadcasts not get launched for secondary users and use that on a few key system receivers, fixed some debug output. Change-Id: Iadf8f8e4878a86def2e495e9d0dc40c4fb347021
/frameworks/base/core/res/AndroidManifest.xml
|
856b01e7e41c6800c81d04f001e5dd4f7ae05a57 |
|
28-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Make the theme for choose account and choose account type dialogs same. Contacts app uses a custom account picker which calls the system account picker when an account needs to be added. The system accout picker invokes choose accout type dialog which overlays over the system acccount picker. Because these two dialog boxes use different themes, he one behind is wider than the one in foreground and ends up looking like a thin black strip protruding from the two sides. Bug: 6980517 Change-Id: Ia8b23767d995dcbe1a58087cb4bfbee140c2c744
/frameworks/base/core/res/AndroidManifest.xml
|
c6fa237daeaae6107174a9b9d4f591ea8cd26d86 |
|
24-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Use updatable file for premium-sms filter The data is really to big for a gservices-driven secure setting. bug:7221402 Change-Id: Ie3d4a1a0aeb69b9ef8fad360fa7ec32e927644e8
/frameworks/base/core/res/AndroidManifest.xml
|
7befb7deb2ac15134b3bb190520cba19165d16dd |
|
28-Sep-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Global gesture to toggle Accessibility system-wide. 1. This change adds a global gesture for enabling accessibility. To enable this gesture the user has to allow it from the accessibility settings or use the setup wizard to enable accessibility. When the global gesture is enabled the user can long press on power to bring the global actions dialog and then hold with two fingers for a few seconds to enable accessibility. The appropriate feedback is also provided. 2. The global gesture is writing directly into the settings for the current user if performed when the keyguard is not on. If the keygaurd is on and the current user has no accessibility enabled, the gesture will temporary enable accessibility for the current user, i.e. no settings are changed, to allow the blind user to log into his account. As soon as a user switch happens the new user settings are inherited. If no user change happens after temporary enabling accessibility the temporary changes will be undone when the keyguard goes away and the device will works as expected by the current user. bug:6171929 3. The initialization code for the owner was not executed due to a redundant check, thus putting the accessibility layer in an inconsistent state which breaks pretty much everything. bug:7240414 Change-Id: Ie7d7aba80f5867b7f88d5893b848b53fb02a7537
/frameworks/base/core/res/AndroidManifest.xml
|
52c62344c585662d6b441a08c2a69a5732255a6f |
|
21-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7213113: Remove old intent resolver Also make the query package restart broadcast protected like the documentation says it should be. Change-Id: I445166111318a02f2f2b1ab0dff9c641a441c20b
/frameworks/base/core/res/AndroidManifest.xml
|
f4f6b4c8b0fcf77d46567f13b409255948fe107b |
|
25-Aug-2012 |
John Spurlock <jspurlock@google.com> |
Fire "dreaming started" and "dreaming stopped" broadcasts. Dream manager now fires broadcast intents when entering + exiting dreamland (except when testing). Power manager can now listen for dreams ending, using polling only as a backstop. Also: - Bullet-proof dream-manager/dream against known failure modes - Add new read/write dream permissions - Refactor dream-manager to delegate work + state management into a new DreamController class, via a handler Bug:6999949 Bug:7152024 Change-Id: I986bb7812209d8c95ae1d660a5eee5998a7b08b1
/frameworks/base/core/res/AndroidManifest.xml
|
8832c18d8b63367929c2d394c9c508f56003d400 |
|
18-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix API review bugs. 7173152 API REVIEW: android.content.pm.PackageUserState 7172969 API REVIEW: android.app.PendingIntent 7172730 API REVIEW: android.content.Context 7172726 API REVIEW: android.manifest.permission Change-Id: Iad470256d3b5ca5596487f6a699ec1871457c3b5
/frameworks/base/core/res/AndroidManifest.xml
|
2ca2c8787130506d350d997c18bbc274faf88e37 |
|
17-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More adjustments to permissions. - New "cost money" flag can be put on a permission to have this emphasized in the UI. - Some further re-organization of permissions to better match UX spec. Change-Id: I450ac739eff6b90e7c7fc39589d68db82b61f897
/frameworks/base/core/res/AndroidManifest.xml
|
5dc5a00e7ebadc085ded7e29feacd17e53698486 |
|
16-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More multi-user stuff. - New public APIs to find out when a user goes to the foreground, background, and is first initializing. - New activity manager callback to be involved in the user switch process, allowing other services to let it know when it is safe to stop freezing the screen. - Wallpaper service now implements this to handle its user switch, telling the activity manager when it is done. (Currently this is only handling the old wallpaper going away, we need a little more work to correctly wait for the new wallpaper to get added.) - Lock screen now implements the callback to do its user switch. It also now locks itself when this happens, instead of relying on some other entity making sure it is locked. - Pre-boot broadcasts now go to all users. - WallpaperManager now has an API to find out if a named wallpaper is in use by any users. Change-Id: I27877aef1d82126c0a1428c3d1861619ee5f8653
/frameworks/base/core/res/AndroidManifest.xml
|
f60921d921947d7d40285f471a09b0478044c29c |
|
13-Sep-2012 |
Geremy Condra <gcondra@google.com> |
Merge changes I69689a73,Iaaef6d41,I7e3cb47a,I42307f58 into jb-mr1-dev * changes: DO NOT MERGE Push event logging down into libcore.EventLogger DO NOT MERGE Added event logging for config installation failures. DO NOT MERGE Create intermediate directories when installing config data. DO NOT MERGE Add components for the Android Config Updater to system server.
|
cd403fc0318684cb7c6c38987d3e0dd0fb8a55bd |
|
13-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Bring back new permission organization. Change-Id: I83e7dd06989ab7b0116bcff5ad52d36e01b851d1
/frameworks/base/core/res/AndroidManifest.xml
|
b631084613e12e1c6a0ae2ad9446e1284b650ccb |
|
24-Aug-2012 |
Geremy Condra <gcondra@google.com> |
DO NOT MERGE Add components for the Android Config Updater to system server. This adds the necessary bits to verify and install configuration updates using system server. It also includes the cert pinning updater as the first user. Change-Id: I42307f58074157b33b6e01216aab10022340d449
/frameworks/base/core/res/AndroidManifest.xml
|
5cf8bd79bbdef0185574f0e3514124583ad537cd |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware" into jb-mr1-dev
|
4497e0c3c672e507b4fd1ff1debefaf76c52ec28 |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware - add android:supportsRtl="true" to the manifest for system_process Change-Id: I9794f6880c883d91751d0037646253810b086d46
/frameworks/base/core/res/AndroidManifest.xml
|
9d9ece3c1e16001b63244459cdf4b428f4272d2e |
|
11-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Animations for user switching. The window manager now has a facility to provide a full-screen animation, which the activity manager uses every time a user switch happens. The current animation is just a simple dumb slide until we get a design from UX. Also some cleanup: moved the portrait task animations to the default config so we always have an animation for them, and finally got the java symbol stuff out of public.xml. Change-Id: I726f77422b2ef5f2d98f961f8da003e045f0ebe8
/frameworks/base/core/res/AndroidManifest.xml
|
e08ae388d63c4db8f9d9a7ecd634f9a51f6e91b9 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add new wifi display discovery API. The API is quite simple. There are a few extra functions on DisplayManager to scan, connect and disconnect from wifi displays and get status, and a single protected broadcast sent when the status changes. Change-Id: Ic91dbab5ee818e790b27fa32e1a1e93788793be0
/frameworks/base/core/res/AndroidManifest.xml
|
4b71e4e66cd12d581d4939bab86ec624d27eb570 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add permissions to control and configure wifi display. Change-Id: I54af6da53b7243516becd6a3d5985c0feda6c225
/frameworks/base/core/res/AndroidManifest.xml
|
1cf70bbf96930662cab0e699d70b62865766ff52 |
|
06-Aug-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Screen magnification - feature - framework. This change is the initial check in of the screen magnification feature. This feature enables magnification of the screen via global gestures (assuming it has been enabled from settings) to allow a low vision user to efficiently use an Android device. Interaction model: 1. Triple tap toggles permanent screen magnification which is magnifying the area around the location of the triple tap. One can think of the location of the triple tap as the center of the magnified viewport. For example, a triple tap when not magnified would magnify the screen and leave it in a magnified state. A triple tapping when magnified would clear magnification and leave the screen in a not magnified state. 2. Triple tap and hold would magnify the screen if not magnified and enable viewport dragging mode until the finger goes up. One can think of this mode as a way to move the magnified viewport since the area around the moving finger will be magnified to fit the screen. For example, if the screen was not magnified and the user triple taps and holds the screen would magnify and the viewport will follow the user's finger. When the finger goes up the screen will clear zoom out. If the same user interaction is performed when the screen is magnified, the viewport movement will be the same but when the finger goes up the screen will stay magnified. In other words, the initial magnified state is sticky. 3. Pinching with any number of additional fingers when viewport dragging is enabled, i.e. the user triple tapped and holds, would adjust the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 4. When in a permanent magnified state the user can use two or more fingers to pan the viewport. Note that in this mode the content is panned as opposed to the viewport dragging mode in which the viewport is moved. 5. When in a permanent magnified state the user can use three or more fingers to change the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 6. The magnification scale will be persisted in settings and in the cloud. Note: Since two fingers are used to pan the content in a permanently magnified state no other two finger gestures in touch exploration or applications will work unless the uses zooms out to normal state where all gestures works as expected. This is an intentional tradeoff to allow efficient panning since in a permanently magnified state this would be the dominant action to be performed. Design: 1. The window manager exposes APIs for setting accessibility transformation which is a scale and offsets for X and Y axis. The window manager queries the window policy for which windows will not be magnified. For example, the IME windows and the navigation bar are not magnified including windows that are attached to them. 2. The accessibility features such a screen magnification and touch exploration are now impemented as a sequence of transformations on the event stream. The accessibility manager service may request each of these features or both. The behavior of the features is not changed based on the fact that another one is enabled. 3. The screen magnifier keeps a viewport of the content that is magnified which is surrounded by a glow in a magnified state. Interactions outside of the viewport are delegated directly to the application without interpretation. For example, a triple tap on the letter 'a' of the IME would type three letters instead of toggling magnified state. The viewport is updated on screen rotation and on window transitions. For example, when the IME pops up the viewport shrinks. 4. The glow around the viewport is implemented as a special type of window that does not take input focus, cannot be touched, is laid out in the screen coordiates with width and height matching these of the screen. When the magnified region changes the root view of the window draws the hightlight but the size of the window does not change - unless a rotation happens. All changes in the viewport size or showing or hiding it are animated. 5. The viewport is encapsulated in a class that knows how to show, hide, and resize the viewport - potentially animating that. This class uses the new animation framework for animations. 6. The magnification is handled by a magnification controller that keeps track of the current trnasformation to be applied to the screen content and the desired such. If these two are not the same it is responsibility of the magnification controller to reconcile them by potentially animating the transition from one to the other. 7. A dipslay content observer wathces for winodw transitions, screen rotations, and when a rectange on the screen has been reqeusted. This class is responsible for handling interesting state changes such as changing the viewport bounds on IME pop up or screen rotation, panning the content to make a requested rectangle visible on the screen, etc. 8. To implement viewport updates the window manger was updated with APIs to watch for window transitions and when a rectangle has been requested on the screen. These APIs are protected by a signature level permission. Also a parcelable and poolable window info class has been added with APIs for getting the window info given the window token. This enables getting some useful information about a window. There APIs are also signature protected. bug:6795382 Change-Id: Iec93da8bf6376beebbd4f5167ab7723dc7d9bd00
/frameworks/base/core/res/AndroidManifest.xml
|
d1b5cfc94ae940f42be352e7ed98c21c973471b2 |
|
29-Aug-2012 |
rich cannings <richc@google.com> |
Notify verifiers that verification is complete Send the Intent.ACTION_PACKAGE_VERIFIED to all verifiers when verification is complete (either one verifier verified the package or a timeout occurred). Details of what occurred is in a new extra, PackageManager.EXTRA_VERIFICATION_RESULT. Bug: 7048930 Change-Id: I4f9855a29b0eb6d77f469891402c69e2e8922945
/frameworks/base/core/res/AndroidManifest.xml
|
e217ee4d7a8223289a1af7363627c69956c46d41 |
|
29-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Access to all users' external storage. System services holding this permission have external storage bound one level higher, giving them access to all users' files. Bug: 7003520 Change-Id: Ib2bcb8455740c713ebd01f71c9a2b89b4e642832
/frameworks/base/core/res/AndroidManifest.xml
|
80a4af2bbc6af42ae605e454bf89558e564f5244 |
|
28-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Start implementing concept of "running" users. The activity manager now keeps track of which users are running. Initially, only user 0 is running. When you switch to another user, that user is started so it is running. It is only at this point that BOOT_COMPLETED is sent for that user and it is allowed to execute anything. You can stop any user except user 0, which brings it back to the same state as when you first boot the device. This is also used to be able to more cleaning delete a user, by first stopping it before removing its data. There is a new broadcast ACTION_USER_STOPPED sent when a user is stopped; system services need to handle this like they currently handle ACTION_PACKAGE_RESTARTED when individual packages are restarted. Change-Id: I89adbd7cbaf4a0bb72ea201385f93477f40a4119
/frameworks/base/core/res/AndroidManifest.xml
|
7e67151b912622f8a279ab1523a9bcf26ebaff3d |
|
27-Aug-2012 |
rich cannings <richc@google.com> |
Add permission checks for Verification API calls Ensure that only applications with android.Manifest.permission.PACKAGE_VERIFICATION_AGENT can call application verification APIs, like PackageManager.verifyPendingInstall and PackageManager.extendVerificationTimeout Bug: 7049083 Change-Id: I5fc28b37e864d67cd319a1ed9d03a90dd15ad052
/frameworks/base/core/res/AndroidManifest.xml
|
1952637425eece18aa1ce3d80d4b49086ef3bcf7 |
|
22-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
Remove permission requirement for some UserManager calls Update javadocs to be explicit about permissions. Minor fixes in UserManagerService Change-Id: I0d355e0a60e5dbdb49ed06091111d480ff249f3d
/frameworks/base/core/res/AndroidManifest.xml
|
2a00329c6d55c6cd9166e01963d7410e95d80d21 |
|
15-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
UserHandle to UserSerialNo mapping Use AtomicFile for usermanager files. Added a MANAGE_USERS permission that apps (signature permission) can use to create/query/modify/remove users. Change-Id: I5cf232232d0539e7508df8ec9b216e29c2351cd9
/frameworks/base/core/res/AndroidManifest.xml
|
0224ccab3c7121aeafe7d491042dd38c3a2bb9d3 |
|
17-Aug-2012 |
Subir Jhanb <subir@google.com> |
Change directory permission to "signature|system" Change-Id: I53dea6984b4577803fdead5caad0112503d2b4e5
/frameworks/base/core/res/AndroidManifest.xml
|
603af61a7cd49f214743b286520419a3fe460774 |
|
07-Aug-2012 |
Subir Jhanb <subir@google.com> |
Add a new permission to have access to Gal Provider BUG:6897999 Change-Id: Ie60963b7f3911b402b971e794178754e1b4f0a43
/frameworks/base/core/res/AndroidManifest.xml
|
b4163a6e12ee7100c758c6d3d062ade1f2843fce |
|
03-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Add APIs for interacting across users. - Expose the existing Context.sendBroadcast() as Context.sendBroadcastAsUser(). - Add new android:singleUser attribute for services. - Add new INTERACT_ACROSS_USERS_FULL permission for full system-level access to cross-user interface (allows sendBroadcastAsUser() to send to any receiver). - Add new INTERACT_ACROSS_USERS_FULL permission for more restricted cross-user interaction: this is required for android:singleUser, and allows you to use sendBroadcastAsUser() but only to send to your own receivers. Change-Id: I0de88f6718e9505f4de72e3f45d29c0f503b76e9
/frameworks/base/core/res/AndroidManifest.xml
|
db3c8678e5cbdfec011afaf25bde2091152c30ad |
|
20-Jun-2012 |
Haoyu Bai <bhy@google.com> |
Network data activity change intent for network interfaces. The activity notification is received from netd, an intent DATA_ACTIVITY_CHANGE is then raised for other part of the system to consume. Change-Id: Idfcc4763c51c5b314c57f546c12557082f06bebf
/frameworks/base/core/res/AndroidManifest.xml
|
0f42037eb7b5118015c2caca635538324ccf0ccf |
|
12-Apr-2012 |
fredc <fredc@broadcom.com> |
Non persistent adapter service Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5 Conflicts: core/java/android/bluetooth/BluetoothInputDevice.java Conflicts: core/java/com/android/internal/app/ShutdownThread.java services/java/com/android/server/SystemServer.java Conflicts: services/java/com/android/server/SystemServer.java services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/core/res/AndroidManifest.xml
|
c9c9a48e7bafae63cb35a9aa69255e80aba83988 |
|
16-Jul-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Removing a workaround for incorrect window position on window move. 1. The window manager was not notifying a window when the latter has been moved. This was causing incorrect coordinates of the nodes reported to accessibility services. To workaround that we have carried the correct window location when making a call from the accessibility layer into a window. Now the window manager notifies the window when it is moved and the workaround is no longer needed. This change takes it out. 2. The left and right in the attach info were not updated properly after a report that the window has moved. 3. The accessibility manager service was calling directly methods on the window manager service without going through the interface of the latter. This leads to unnecessary coupling and in the long rung increases system complexity and reduces maintability. bug:6623031 Change-Id: Iacb734b1bf337a47fad02c827ece45bb2f53a79d
/frameworks/base/core/res/AndroidManifest.xml
|
d0d2cda9d414da73773285d7fee9e13aef3495e9 |
|
08-Jun-2012 |
Adam Powell <adamp@google.com> |
Further work on MediaRouter Remove volume control and tracking. This will be handled by extensions to existing audio and media APIs for now. Tweak/refine other aspects of the API. Pass the router to callbacks for easier future-proofing. Add group/ungroup callback methods. Change-Id: Ib69e76e5f46280a9002b545bcf4cbc7b839844ee
/frameworks/base/core/res/AndroidManifest.xml
|
636fd528f7ad51f565a390226d9f469f8c675ccf |
|
06-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
Docs (mostly): enumerate JELLY_BEAN target SDK changes. Okay this isn't entirely docs. I have un-hidden the new permission for binding to accessibility services; we were going to go out with it hidden since it didn't go into factory ROM, but now that we are doing other things we might as well expose it. Also changed a log from E to W, since it is not an error. Change-Id: I9226c95e3b63e12218fe41dc3f4290d9824a9e5c
/frameworks/base/core/res/AndroidManifest.xml
|
7c86958d73e7216a92bdfd84fce4440e1def7eaa |
|
03-Jun-2012 |
Adam Powell <adamp@google.com> |
Merge "Add MediaRouter API." into jb-dev
|
361dfebc943fa53f2a2e3fe0b3429ea5d2530ad0 |
|
02-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
For JB, the READ_EXTERNAL_STORAGE permission is not enforced by default. It may be enforced by default in future releases. Developers have the option of enabling enforcement to test their application and some may begin to include this permission on applications. To avoid user confusion, the permission is placed in the development tools group. Change-Id: Id27ba241db0253eac774401aaaa6e5c4340588d7
/frameworks/base/core/res/AndroidManifest.xml
|
9a1de308cea2d160778fd977825f10a07b49d738 |
|
22-May-2012 |
Adam Powell <adamp@google.com> |
Add MediaRouter API. This is just the initial state tracking. Still to go is actually triggering Bluetooth A2DP correctly and tracking process state in the system server. Change-Id: I33031d52799d6e2d7208910da833831085cc3677
/frameworks/base/core/res/AndroidManifest.xml
|
4c52235fbc257bc3d73459e61c2d595a539271ba |
|
01-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
Revert "Make the protectionLevel of framework permissions consistent and related to sensitive user data. Dangerous permissions are applied only where sensitive user data may be exposed." This reverts commit a8a200278dcc232eabd4550f814439c94857c47c. Conflicts: core/res/AndroidManifest.xml core/res/res/values/strings.xml Change-Id: I3f76d93a6ffde031bf82c2afea315ebcdbc179e3
/frameworks/base/core/res/AndroidManifest.xml
|
727c599454b1e280a237b10fea4dd7f7cb1096e0 |
|
29-May-2012 |
Alice Yang <alice@google.com> |
New UI for account picker - Added radio buttons to indicate the selected item - "Add account" is one of the list options instead of a button - Removed icons - Added "Cancel" and "OK" buttons - Use dialog theme - Omit description text by default Bug 6505441 Change-Id: I672a11481ee99e183142142bddf8f97b7b149d37
/frameworks/base/core/res/AndroidManifest.xml
|
1e7456ba74f93cdf80dc430aa082cc3c271b30b1 |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Fixing the build for real. Change-Id: I792d029c7fff4d96fbe238ff4b3f268cb8603b95
/frameworks/base/core/res/AndroidManifest.xml
|
e63049b838e94379ba1dae3137198bc3ddf5f19d |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding some missing files. Change-Id: I991d8bf815a7e57dc1cbad384e15aa21bef0c7c7
/frameworks/base/core/res/AndroidManifest.xml
|
507f5586fb48f59f7b4f2fa0ca5387e4d4f2bd8d |
|
08-May-2012 |
Jeff Brown <jeffbrown@google.com> |
Hide SET_KEYBOARD_LAYOUT permissions. Bug: 6427036 Change-Id: Idbb442ad8071b2ca4acf247b135c7aba0830cf70
/frameworks/base/core/res/AndroidManifest.xml
|
99222d212f9ff5081d4ce6eef09dbe8eff85b83a |
|
07-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Finish up issue #6249094: Display permissions based on relevance to private data Added bitmaps for permission group icons. We had to pick either icons for a dark or light background, and it had to be light for settings, so the installer theme has gone back to dark. Tweaked the permission groups to match the icons. Redid the group priorities to make them correct (they were written with higher priorities being less important). Fixed bug where priority was not being used for system apps. Change-Id: Ia3d3f0c1614a11b4cfd11682ce9e6c9f87d75c06
/frameworks/base/core/res/AndroidManifest.xml
|
dc410cb3499683509770bb88cb771a91acd16bd2 |
|
13-Apr-2012 |
Adrian Ludwig <aludwig@google.com> |
Reorganizing permissions into groups oriented around user-understandable concepts. These groups are assigned priority for sort-order when displayed to users, and use the new permissionGroupFlags to indicate whether they contain personalInfo. Change-Id: I27e81912e08b8d7766b8ce449b4b3bd6473d8f07
/frameworks/base/core/res/AndroidManifest.xml
|
fd5015be41080970c9a992a8ef17a1deefb57478 |
|
01-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new APIs for permission group flags and priorities. Change-Id: I2d476c6aa9dbd05407ec49be45986f42d2acf9e7
/frameworks/base/core/res/AndroidManifest.xml
|
098d580cc2bb6c0891c756a4e5230c6c6b0d2376 |
|
27-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate ringtone playback to SystemUI. Introduce IRingtonePlayer, which handles playback for both Ringtone objects and Notifications. SystemUI now hosts this player, which it registers with AudioService. It also keeps MediaPlayer instances warm, and cleans them up after stop() or Binder death. Move both Ringtone and NotificationManagerService to play back audio through this new interface. Bug: 6376128, 6350773 Change-Id: I1dcb86d16ee3c4f07cdb2248d33dcff4ead3609a
/frameworks/base/core/res/AndroidManifest.xml
|
8f014059d3084fcce9e82b4b1f8b8323744ac52d |
|
26-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Make audio routing Intents protected These intents should only be sent by the system: android.intent.action.HEADSET_PLUG android.intent.action.ANALOG_AUDIO_DOCK_PLUG android.intent.action.DIGITAL_AUDIO_DOCK_PLUG android.intent.action.HDMI_AUDIO_PLUG android.intent.action.USB_AUDIO_ACCESSORY_PLUG android.intent.action.USB_AUDIO_DEVICE_PLUG Change-Id: I7be41892a9c4e619ca3e1c892fad6f1f2714c74f Signed-off-by: Mike Lockwood <lockwood@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
6dcf382b1b1dde5e6303a51a27f8d3b928072415 |
|
18-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move RINGTONE_PICKER to handle external storage. To give RINGTONE_PICKER external storage access, move it from system to MediaProvider. Fix OOBE when getRingtoneUri() kicked requery(). Bug: 6346701 Change-Id: I837002eef0580b8cdd8920a27b068c745995a8a3
/frameworks/base/core/res/AndroidManifest.xml
|
2c8e19e81fb930fbb4d353c91ca0852fe91d8166 |
|
25-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
Merge "New API to allow third-party apps to bind widgets"
|
61a5b0160d9f2e53ef4d4b451212a63032dad32d |
|
13-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
New API to allow third-party apps to bind widgets Change-Id: I1a3761c1a0f557a32d4d3bdd0207567fec918ba7
/frameworks/base/core/res/AndroidManifest.xml
|
8238e717df4bc5eebf15f97172d68af3599a95bb |
|
24-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new signature-level permission to get details of tasks. Third party apps now can't get access to the extras of the intents associated with tasks, to keep private data in them from leaking out. Change-Id: I95af9e181ac42557bc8b981807e7ddd266a88d0e
/frameworks/base/core/res/AndroidManifest.xml
|
d65c2be5485143a0d489c6dfa24276ae834ccffc |
|
20-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Merge "Add ContentProvider for apps to read received SMS cell broadcasts."
|
35be7560300a97fc3675bdd325910f28827d9508 |
|
19-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move SystemUI out of system UID. Add permissions for various things it pokes. Create new permission to control launching non-exported activities from recents. Hidden API to relax WallpaperService checks. Change-Id: I547fdcd7c213dd153ae101533ce7c56cd8f86a0d
/frameworks/base/core/res/AndroidManifest.xml
|
c3296ffdfc70c6778b6ae760b812b4e53e335f97 |
|
18-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Add ContentProvider for apps to read received SMS cell broadcasts. The CellBroadcastReceiver app will allow apps with the new permission "android.permission.READ_CELL_BROADCASTS" to read previously received cell broadcast messages from a new ContentProvider database at URI "content://cellbroadcasts". This will enable third parties to provide additional information to users in the event of emergencies without delaying or interfering with the initial system alert dialog to warn the user when the alert is received. Includes a new android.telephony.CellBroadcastMessage class which can be instantiated from the Cursor retrieved from the ContentProvider. This was previously a part of the CellBroadcastReceiver app, but can now be used by third party apps with read permission on the ContentProvider. Change-Id: I2c31f62b63c050c7946de2d81c28a5f4dc6f00b0
/frameworks/base/core/res/AndroidManifest.xml
|
9f25b7fdf216c9ef0bd2322cd223eeaf0d60f77f |
|
10-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Request key maps from input manager service. Instead of each application loading the KeyCharacterMap from the file system, get them from the input manager service as part of the InputDevice object. Refactored InputManager to be a proper singleton instead of having a bunch of static methods. InputManager now maintains a cache of all InputDevice objects that it has loaded. Currently we never invalidate the cache which can cause InputDevice to return stale motion ranges if the device is reconfigured. This will be fixed in a future change. Added a fake InputDevice with ID -1 to represent the virtual keyboard. Change-Id: If7a695839ad0972317a5aab89e9d1e42ace28eb7
/frameworks/base/core/res/AndroidManifest.xml
|
e824120016248bcfe3962883fe9f3b0481dd1c3d |
|
06-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Hide the optional permission stuff, not making it in to JB. Also lock down the rest of the development tools permissions to be development permissions that must be granted through an explicit shell command. Change-Id: I1ba216fffe1aab4bb9f83fcef108efc504f892f4
/frameworks/base/core/res/AndroidManifest.xml
|
ac14351e16e1258f1cb54e2bf772b8be004eb2b8 |
|
06-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Move some APIs from window manager to input manager. Simplified input injection API down to just one call. Removed all input state reading API. It was only used by the window manager policy and required a permission that applications could not obtain. READ_INPUT_STATE is now unused and deprecated. Change-Id: I41278141586ddee9468cae0fb59ff0dced6cbc00
/frameworks/base/core/res/AndroidManifest.xml
|
5b8fd25029e8b53353f4cdcb7c0dacea294a6b44 |
|
27-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "Make READ_LOGS signature|system|development"
|
135936072b24b090fb63940aea41b408d855a4f3 |
|
23-Mar-2012 |
Amith Yamasani <yamasani@google.com> |
User management and switching Broadcast intents that get sent out when users are added/removed/switched. More work on generating user-specific information in package manager queries. APIs to update user name and query a user by id. Removed Package.mSetStopped and mSetEnabled, since they're not user specific. User removal: - Cleanup ActivityManager, PackageManager, WallpaperManager, AppWidgetService and AccountManager. - Shutdown processes belonging to the user. Don't show vibrate option in long-press power if there's no vibrator. Lock the screen when switching users, to force unlocking. Change-Id: Ib23a721cb75285eef5fd6ba8c7272462764038fa
/frameworks/base/core/res/AndroidManifest.xml
|
cb5863e022938fe98e0ddbfe1700082750a8761f |
|
23-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Make READ_LOGS signature|system|development Change-Id: I387d53ac4b7fd3d65891145985e4cd272dffddcf
/frameworks/base/core/res/AndroidManifest.xml
|
53567a756e34706edbeae7217ad4205c55bb76b6 |
|
13-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Merge "Introduce READ_CALL_LOG and WRITE_CALL_LOG"
|
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 |
|
12-Mar-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new READ_EXTERNAL_STORAGE permission. Also adds some initial compatibility code for dealing with it. Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/core/res/AndroidManifest.xml
|
f06d9497afe01896b52e0cb5e5ff38fd49ef6eef |
|
12-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Introduce READ_CALL_LOG and WRITE_CALL_LOG Bug:6141864 Change-Id: I66fcab2a35b8c1c73bac7cfffb9f008c82ed51e8
/frameworks/base/core/res/AndroidManifest.xml
|
8662cab5c6a01ea5c426512e6f6d2cf3e158aea0 |
|
23-Feb-2012 |
Christopher Tate <ctate@google.com> |
Merge: Introduce UpdateLocks An "UpdateLock" works similarly to a wake lock in API: the caller is providing a hint to the OS that now is not a good time to interrupt the user/device in order to do intrusive work like applying OTAs. This is particularly important for headless or kiosk-like products where ordinarily the update process will be automatically scheduled and proceed without user or administrator intervention. UpdateLocks require that the caller hold the new signatureOrSystem permission android.permission.UPDATE_LOCK. acquire() and release() will throw security exceptions if this is not the case. The "is now convenient?" state is expressed to interested parties by way of a sticky broadcast sent only to registered listeners. The broadcast is protected; only the system can send it, so listeners can trust it to be accurate. The broadcast intent also includes a timestamp (System.currentTimeMillis()) to help inform listeners that wish to implement scheduling policies based on when the device became idle. The API change here is a tiny one: a dump(PrintWriter) method has been added to the TokenWatcher class to facilitate getting information out of it for dumpsys purposes. UpdateLock itself is still @hide. Bug 5543442 Change-Id: I3709c831fc1883d7cb753cd2d3ee8e10a61e7e48
/frameworks/base/core/res/AndroidManifest.xml
|
e639da7baa23121e35aa06d6e182558e0e755696 |
|
22-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
New development permissions. These are permissions that an application can request, but won't normally be granted. To have the permission granted, the user must explicitly do so through a new "adb shell pm grant" command. I put these permissions in the "development tools" permission group. Looking at the stuff there, I think all of the permissions we already had in that group should be turned to development permissions; I don't think any of them are protecting public APIs, and they are really not things normal applications should use. The support this, the protectionLevel of a permission has been modified to consist of a base protection type with additional flags. The signatureOrSystem permission has thus been converted to a signature base type with a new "system" flag; you can use "system" and/or "dangerous" flags with signature permissions as desired. The permissions UI has been updated to understand these new types of permissions and know when to display them. Along with doing that, it also now shows you which permissions are new when updating an existing application. This also starts laying the ground-work for "optional" permissions (which development permissions are a certain specialized form of). Completing that work requires some more features in the package manager to understand generic optional permissions (having a facility to not apply them when installing), along with the appropriate UI for the app and user to manage those permissions. Change-Id: I6571785c6bb5f6b291862b7a9be584885f88f3a5
/frameworks/base/core/res/AndroidManifest.xml
|
25872aa3ef189ae5506a923398af11ce5eb1a9b9 |
|
04-Feb-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding shell commands for modifying content. 1. Added methods to the ActivityManagerService remote interface that allow accessing content providers outside of an application. These methods are guarded by an internal signature protected permission which is given to the shell user. This enables a shell program to access content providers. 2. Implemented a shell command that takes as input as standart fagls with values and manipulates content via the content provider mechanism. Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/core/res/AndroidManifest.xml
|
b01e8bf57b7492b77e3445db51471edcbadda75e |
|
30-Aug-2011 |
Mike Lockwood <lockwood@android.com> |
New Serial Manager API: SerialManager: provides access to serial ports SerialPort: for reading and writing data to and from serial ports IO with both array based and direct ByteBuffers is supported. Accessing serial ports requires android.permission.SERIAL_PORT permission Each platform must configure list of supported serial ports in the config_serialPorts resource overlay (this is needed to prevent apps from accidentally accessing the bluetooth or other system UARTs). In addition, the platform uevent.rc file must set the owner to the /dev/tty* files to "system" so the framework can access the port. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a573f6a1d9b12393fbdfd2c0850499973849854b |
|
10-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
Some hardening of isolated processes by restricting access to services. Services now must explicitly opt in to being accessed by isolated processes. Currently only the activity manager and surface flinger allow this. Activity manager is needed so that we can actually bring up the process; SurfaceFlinger is needed to be able to get the display information for creating the Configuration. The SurfaceFlinger should be safe because the app doesn't have access to the window manager so can't actually get a surface to do anything with. The activity manager now protects most of its entry points against isolated processes. Change-Id: I0dad8cb2c873575c4c7659c3c2a7eda8e98f46b0
/frameworks/base/core/res/AndroidManifest.xml
|
9be4962060ca67c4fe9bfc391043f6d2829cf720 |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Merge "Unhide social stream permissions." into ics-mr1
|
098d466a25cf294487188b34dfa95575911a37cf |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Unhide social stream permissions. Bug 5569021 Change-Id: I35ee70418be0e0286294fef54e194831b5fa3b2c
/frameworks/base/core/res/AndroidManifest.xml
|
20cf0916cc6a4920b1d882a9478615a15fe6b3b0 |
|
09-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Merge "Bug 5585323 New system permission for media decode" into ics-mr1
|
4ba27fe702580a90c6e9c1861d4ea2da6fc3b029 |
|
07-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Bug 5585323 New system permission for media decode Add a system permission to enable the use of any installed media decoder when decoding for playback (as opposed to transcode). Change-Id: Ifb10a5fa8d5663a78ccbb5fa8266ad6535c234f2
/frameworks/base/core/res/AndroidManifest.xml
|
8588e47358878b7a1add2bd1df2ade95091cdb8d |
|
08-Nov-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix build. Missed a commit that fixed some issues. bug:5237167 Change-Id: I61e44831e2c3f1cf613ca1387aa95d712b7d2ded
/frameworks/base/core/res/AndroidManifest.xml
|
148c7d0de720a92632aa6ed10a39bfc38b427239 |
|
13-Oct-2011 |
tk.mun <tk.mun@samsung.com> |
Wimax : wimax framework related open source. Integrate wimax network related changes into Android Framework. - In Connectivity service, start wimax service. - 4G icon display in StatusBarPolicy. - DHCP renew add. - Add radio for wiamx Change-Id: I2d9012247edfdf49d71ca7e1414afd0006f330ca Signed-off-by: tk.mun <tk.mun@samsung.com> bug:5237167
/frameworks/base/core/res/AndroidManifest.xml
|
0b61f59d77153e7d63a33fc5d47805feb99d918b |
|
04-Oct-2011 |
Dave Santoro <dsantoro@google.com> |
Add new permissions for read/write social stream. This is a manual merge of a change going in to ICS-FactoryROM. These permissions are needed to separate the (potentially invasive) access to the user's social stream from the existing read/write contacts permission. Per discussion with Android release team, we are also hiding the stream item API until we figure out a better way to guard the data. Bug 5406886 Change-Id: I8339d743c3ebe8923c7ee47f2900444efcf82a52
/frameworks/base/core/res/AndroidManifest.xml
|
b04fe4e82abb073b4e5d82563b0882cea0dcc139 |
|
17-Sep-2011 |
Fred Quintana <fredq@google.com> |
Continuation of the unified account chooser flow. - made the UI match the spec - added ability to force the account chooser to appear - added ability to pass in a description that will override the stock one - added ability to pass in requiredFeatures for addAccount - added ability to pass in an authTokenType for addAccount Bug: 5293377 Change-Id: I243c0fd6598c943b1f65753e1f5d3c86629f64f5
/frameworks/base/core/res/AndroidManifest.xml
|
1121bb5e6ff20a2c694225300507ed486e04fea2 |
|
15-Sep-2011 |
Fred Quintana <fredq@google.com> |
Add a generic account chooser/add account flow for apps. The activity is launched as follows: Account account1 = new Account("account1@gmail.com", "com.google") Account account2 = new Account("account2@gmail.com", "com.google") ArrayList<Account> accounts = new ArrayList<Account>(); accounts.add(account1); accounts.add(account2); String[] accountTypes = new String[]{"com.google", "com.android.exchange"}; Bundle addAccountOptions = null; Intent intent = AccountManager.newChooseAccountIntent(account1, accounts, accountTypes, addAccountOptions); startActivityForResult(intent, 0); Change-Id: I05a467bdc3552a2e39397b0182879351f4324389
/frameworks/base/core/res/AndroidManifest.xml
|
d2509fd83597595914ef0627685e917380863eb6 |
|
12-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Add boot mode where only "core apps" are started. A core app is one that has coreApp="true" in its manifest tag. The system can successfully boot (though a little painfully) with only framework-res.apk, SettingsProvider.apk, SystemUI.apk, DefaultContainerService.apk, and Launcher2.apk set as core apps. Currently this boot mode is always turned off. Change-Id: Ieaa4a8031c2c391a12996aa8d8b1d65fc2b09d6b
/frameworks/base/core/res/AndroidManifest.xml
|
905577f6345c014fc2489a8068ea967ba8c18012 |
|
08-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #5263361: Browser instance not created in application picker The resolver activity was hiding the following activity from recents. Also some other fixes: a little better memory use debugging, removed some unneeded code from window manager, moved some system activities into their own process, added some more running process information for manage apps. Change-Id: I66687d16989ff965d524b92dc360f37c19199717
/frameworks/base/core/res/AndroidManifest.xml
|
b6ae19a96d05546fca61cadcab5c39996d68c9ba |
|
08-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove connection access intents from protected broadcasts. These intents are sent by Bluetooth-Pbap app which doesn't have the system uuid. Instead protect with admin permission on the reciever side. Change-Id: Ibb788e1526108909b5a3b15462ac3a008b041613
/frameworks/base/core/res/AndroidManifest.xml
|
81e23acb0b2ffc8962a9b3ff40da328d2bfa401b |
|
06-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth intents to protected broadcasts. Change-Id: I3734a4ff7d964c64ce39ec3f897d3799aa9653f7
/frameworks/base/core/res/AndroidManifest.xml
|
cccdd721e95bff5f964ea6fdf389c1f740a03702 |
|
01-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Make WRITE_APN_SETTINGS a system-only permission. Protects us from apps getting packet snooping ability (ie, routing all your traffic through their server by modifing your APN settings). We may eventually revert this if/when we have time to provide a proper API and scary UI like VPN has. bug:5242750 Change-Id: I71d73807ca5268c6aacc2156839b4d11427048c4
/frameworks/base/core/res/AndroidManifest.xml
|
961e30458319cfd50e1892ba7dd14a1d0ebe4cc7 |
|
30-Aug-2011 |
Jeff Sharkey <jsharkey@android.com> |
Introduce immediate CONNECTIVITY_ACTION variant. New broadcast that is dispatched immediately after connectivity changes have been handled by ConnectivityService, bypassing any applicable CONNECTIVITY_CHANGE_DELAY. Also protect CONNECTIVITY_CHANGE broadcasts, since they should only be sent by system. Bug: 5198167 Change-Id: I75f1fb44b21da1879f0ab960bcaa481126d70fde
/frameworks/base/core/res/AndroidManifest.xml
|
463f22114587344c96460179069a08d7381fbfd6 |
|
22-Jul-2011 |
Jake Hamby <jhamby@google.com> |
Add ISIM application support for LTE devices. - Add methods to TelephonyManager to provide access to IMS records on the ISIM application of the UICC, as well as access to the ISIM AKA authentication algorithm. - Add support for the new IMS methods to CDMALTEPhone, using the helper class ImsUiccRecords to load the IMS records from the ISIM. The same approach can be used to implement IMS support for UMTS/LTE devices. - There is a new RIL request, RIL_REQUEST_ISIM_AUTHENTICATION, which is used to perform IMS AKA authentication using the algorithm on the ISIM application of the UICC. The challenge nonce and response are both encoded as Base64 strings. Change-Id: I73367c7d9bc573d0d883d68adf09891de1319129
/frameworks/base/core/res/AndroidManifest.xml
|
5ab2157bf1f105b02d3e2913cd3a33f9765b74ca |
|
27-Jul-2011 |
Kenny Root <kroot@google.com> |
Infrastructure to support package verifier Allow a package verifier to approve or disapprove of a package being installed. Change-Id: Ibfea0f2b1aaa4ab1589a4e59f96144702b9bf94b
/frameworks/base/core/res/AndroidManifest.xml
|
b0381688b8556f4f0a86bb534c8bc52275f16d12 |
|
11-Aug-2011 |
Tom Taylor <tomtaylor@google.com> |
Add private permission for sending SMS via Messaging app When the phone dialer sends an sms, it will use the Messaging app. That way the sent messages will end up in the messaging provider db and sending will be more reliable. Currently, the phone dialer uses the SmsManager directly. For now, the feature is only available to system apps and the permission is private. Bug 4563486 Change-Id: I10f7e1042683164ee61d01a2aaf738d19084da72
/frameworks/base/core/res/AndroidManifest.xml
|
e09cd7914c117e84bf78676d0e760c51aa147eb8 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "New broadcast telling when an app is fully removed."
|
f9abb405903cab1fcd379388a96925524840c607 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
New broadcast telling when an app is fully removed. Change-Id: Ia516d826f302a01881fa92d9ffdc0adfbf669a4b
/frameworks/base/core/res/AndroidManifest.xml
|
d0d85f26cb7287c63adf95bace098bc1af3fe4e8 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I6f9ddb3fffe9e10cc2d34dda3ae8700b1af7e470
/frameworks/base/core/res/AndroidManifest.xml
|
89c95a0da87fc85a86a7341f60decf7e50609a18 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: remove unused protected intent. Change-Id: Id58f81d5f50a13a1fb422eafe66fa512047f9b05
/frameworks/base/core/res/AndroidManifest.xml
|
880f64ac1080ccec111de91a4af026cca3d1bb25 |
|
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: introduce VpnService as the base class for user space VPN."
|
199ed6ef89bd356895534ba09ac43ed340cd9a1a |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: introduce VpnService as the base class for user space VPN. Change-Id: I4793a6eb51b33f669fc6d39e1a16cf5eb9e3d851
/frameworks/base/core/res/AndroidManifest.xml
|
b234636105317942bdf2daf4f5581c2218847084 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: move away from the VPN permission."
|
e53eba0470b7578def756cd22952d447776ba141 |
|
04-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed permission READ_WRITE_OWN_VOICEMAIL from framework/base. This permission has now been replaced by ADD_VOICEMAIL. Bug: 5098551 Change-Id: Idc993f1674a66f0df3ec699ed14b2e5cfedfe3e8
/frameworks/base/core/res/AndroidManifest.xml
|
fcc1b41b663c1a0cb551344c4a16a5ad9ce36d60 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: move away from the VPN permission. VpnBuilder will be replaced by VpnService in the next change. Change-Id: I2dea67a1616b74d17b372f7b214d207f1617198e
/frameworks/base/core/res/AndroidManifest.xml
|
766839cb6f2aac8c802ec1de9f3cc12fcb9eabad |
|
02-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Step1 of renaming READ_WRITE_OWN_VOICEMAIL to ADD_VOICEMAILS. READ_WRITE_OWN_VOICEMAIL sounds a confusing name. Dianne recommened to rename it to ADD_VOICEMAILS as this simply allows 3rd party apps to add new voicemails to the system. The fact that we allow the app to acces only its own voicemail is implicit and need not be highlighted in the permission name. See bug: 5098551 for more details This CL implements the 1st step of this change by adding the permission ADD_VOICEMAILS. A follow up CL will remove READ_WRITE_OWN_VOICEMAIL once content provider and contacts app have been modified to start using the new ADD_VOICEMAILS permission instead. Bug: 5098551 Change-Id: I515e7967bdb0e8498a60a32983f9122ce10dcc4a
/frameworks/base/core/res/AndroidManifest.xml
|
ba39839444532af0ed3766f736582413f6d7a40b |
|
02-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Move ImageWallpaper to SystemUI process. Nice to not load 4MB bitmaps in the system process. Also, hey, with how we are now scrolling the surface instead of the bitmap, there is no reason to keep that 4MB bitmap loaded in to memory. So don't. Unfortunately it looks like for some reason the VM is still holding on to the bitmap. I'll need to figure out why. Later. Change-Id: Ib3503756144502fc5c8d5e294248c2417c4fe8c8
/frameworks/base/core/res/AndroidManifest.xml
|
e1538f05587386bbba8dac0b4b4a6c1059947429 |
|
01-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Revert "Unhide APIs for user space VPN." This reverts commit 3c2529c717cda3df321c1d0d6abe23ac1f298ac9. Change-Id: I37d4ea6c1079d337ede7ac567d88414a41fc1e11
/frameworks/base/core/res/AndroidManifest.xml
|
24a12104fd09ad8658b8d8af1f8efce4ec1c6701 |
|
30-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Hide permissions that are not available to apps. Change-Id: I5f3bc72114b780fffe218a5600bfd011ede029d3
/frameworks/base/core/res/AndroidManifest.xml
|
fcbb4924864976339d5ad8b7adb925d7a050df6a |
|
28-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "Unhide APIs for user space VPN."
|
988323c57bd25a58f05dfa492d9b9c8ab62c5153 |
|
22-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 This CL inherits https://android-git.corp.google.com/g/112600 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Iaa425c7915fe70767ad0b17bf6c6fbcd2a1200b2
/frameworks/base/core/res/AndroidManifest.xml
|
3c2529c717cda3df321c1d0d6abe23ac1f298ac9 |
|
22-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I2d9e5a8a3ee8556626e373bfdc93c809dad40bff
/frameworks/base/core/res/AndroidManifest.xml
|
0bc369ee66df6dc4c126f1991af591ea6a2c0fd0 |
|
21-Jul-2011 |
Jeff Hamilton <jham@android.com> |
Make READ_FRAME_BUFFER signatureOrSystem. Bug: 4941390 Change-Id: I6d38b2d5ca2ed3bbf9ec0561659a486a99cbc024
/frameworks/base/core/res/AndroidManifest.xml
|
cdf95e31024d235b51c7e6076ea2afc990f460cd |
|
20-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed READ_WRITE_ALL_VOICEMAILS permission from framework. This permission is meant to be a 'signature' permission and to be used only by the contacts app. We recently moved it to framework/base as part of opening up voicemail api into the SDK. However, the signature of framework is different from contacts app. Consequently the contacts app is not granted READ_WRITE_ALL_VOICEMAILS permission. This makes the contacts app crash on start. This fix removes the READ_WRITE_ALL_iVOICEMAILS from framework/base so that the one defined in contacts provider is then used by the system. Bug: 5054221 Change-Id: Iaa7a23fe95b0142978eff124e25fe2291dc7d212
/frameworks/base/core/res/AndroidManifest.xml
|
5521e892f8b5b2313619405684d426309f66ade4 |
|
07-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Voicemail content provider API for api council review. This is a new content provider implemented to add visual voicemail support in android. Voicemail content provider is the central repository for storing voicemails inserted by various voicemail sources. The content provider also exposes a status table to let the voicemail source application convey its current status to the system. The primary application that reads from this content provider is the phone app. The phone app shows voicemails along with other call entries within the call log and optionally any relevent message about the voicemail source status. The implementation of this content provider can be found at https://android-git.corp.google.com/w/?p=platform/packages/providers/ContactsProvider.git;a=blob;f=src/com/android/providers/contacts/VoicemailContentProvider.java Change-Id: I8ad46aec20c70684f7bfa45530bbb90dd841d81a
/frameworks/base/core/res/AndroidManifest.xml
|
45ce864ef41ce90938cc34d42a8e1075f69e7a61 |
|
15-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Move LoadAverageService to the SystemUI apk. Change-Id: I442e264802d1e35cd7d27bae121ae75f932595b6
/frameworks/base/core/res/AndroidManifest.xml
|
79ec80db70d788f35aa13346e4684ecbd401bd84 |
|
24-Jun-2011 |
Christopher Tate <ctate@google.com> |
Make full backup API available to apps New methods for full backup/restore have been added to BackupAgent (still hidden): onFullBackup() and onRestoreFile(). The former is the entry point for a full app backup to adb/socket/etc: the app then writes all of its files, entire, to the output. During restore, the latter new callback is invoked, once for each file being restored. The full backup/restore interface does not use the previously-defined BackupDataInput / BackupDataOutput classes, because those classes provide an API designed for incremental key/value data structuring. Instead, a new FullBackupDataOutput class has been introduced, through which we restrict apps' abilities to write data during a full backup operation to *only* writing entire on-disk files via a new BackupAgent method called fullBackupFile(). "FullBackupAgent" exists now solely as a concrete shell class that can be instantiated in the case of apps that do not have their own BackupAgent implementations. Along with the API change, responsibility for backing up the .apk file and OBB container has been moved into the framework rather than have the application side of the transaction do it. Change-Id: I12849b06b1a6e4c44d080587c1e9828a52b70dae
/frameworks/base/core/res/AndroidManifest.xml
|
428e84388af3695cb19549bdb107e2b88afd3708 |
|
30-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Extend network stats to signatureOrSystem. Change-Id: I82cc99797b5d5bc3bb9a876b67f311643174da33
/frameworks/base/core/res/AndroidManifest.xml
|
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 |
|
03-May-2011 |
Jeff Sharkey <jsharkey@android.com> |
Permissions to protect bandwidth statistics. Introduces new "net_bw_stats" group which will protect reading detailed bandwidth statistics from the kernel. Also introduce "net_bw_acct" group which will enable specific applications to request that their network traffic be counted against other UIDs. This change associates manifest permissions with the low-level GIDs. Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/core/res/AndroidManifest.xml
|
8969d9924c662ab4cdacc342bbdc33756db730be |
|
22-Jun-2011 |
satok <satok@google.com> |
Revert "Create TextServiceManager and SpellCheckerService" This reverts commit eaddb894865a804279659b4aad6364a34ab50beb.
/frameworks/base/core/res/AndroidManifest.xml
|
eaddb894865a804279659b4aad6364a34ab50beb |
|
01-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Ia25e7b4f308778891929e31b8cbd741f6848cce4
/frameworks/base/core/res/AndroidManifest.xml
|
3f3337a662e9916bbf14502ef3b32dedaa7adfa4 |
|
18-Jun-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: avoid leaking file descriptors. Change-Id: If70f5af3529d79bddb9d72675cf6eb038ff3ff70
/frameworks/base/core/res/AndroidManifest.xml
|
21c9c45e5caf62b935354b74392fb40c4bf18529 |
|
07-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Interface-level network policy, persist policies. Define NetworkPolicy as cycle-reset day and warning/limit values, and set/get through NetworkPolicyManager. Watch ConnectivityManager for network connection events, and apply quota rules based on matching interfaces. Policy service matches based on strong identity to support IMSI-specific policy values. Calculates remaining quota based on current stats recorded since the last reset cycle day. Tests to verify edge cases around February. Persist network and UID policies in XML, and restore on boot. Change-Id: Id40ba7d6eed6094fbd5e18e6331286c606880d80
/frameworks/base/core/res/AndroidManifest.xml
|
432513380e8ea8f4c70853190bfd55a9186407f4 |
|
11-May-2011 |
Dave Santoro <dsantoro@google.com> |
API modifications to handle profiles in Contacts. The user's profile is represented as a single Contact, comprised of Raw Contacts which may be contributed from any accounts the user has on the system. Two new permissions have been added: READ_PROFILE and WRITE_PROFILE. These are required for reading or writing any contact data that is designated as part of the user's profile. Contact queries can include the user's profile data by setting the include_profile URI parameter to 1 (this requires READ_PROFILE access). By default, the user's profile data will not be included in any Contact queries. Change-Id: I25616f59622dbb157032c9c435064eb36af6e8e1
/frameworks/base/core/res/AndroidManifest.xml
|
d4f1bacca50a74a74a02bf6a242bb22c495e4034 |
|
09-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 7ca13deb to master Change-Id: If34814d6c70cf63eca9bd816845389f6785518ae
|
7d259626d009a45195ec341646ce06658b842e40 |
|
08-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 0cb17a52 to honeycomb-plus-aosp Change-Id: I784e6d1946fa708f63becece070c7090cec6f1e2
|
8643aa0179e598e78d938c59035389054535a229 |
|
20-Apr-2011 |
Svetoslav Ganov <svetoslavganov@google.com> |
Interrogation of the view hierarchy from an AccessibilityService. 1. Views are represented as AccessibilityNodeInfos to AccessibilityServices. 2. An accessibility service receives AccessibilityEvents and can ask for its source and gets an AccessibilityNodeInfo which can be used to get its parent and children infos and so on. 3. AccessibilityNodeInfo contains some attributes and actions that can be performed on the source. 4. AccessibilityService can request the system to preform an action on the source of an AccessibilityNodeInfo. 5. ViewAncestor provides an interaction connection to the AccessibiltyManagerService and an accessibility service uses its connection to the latter to interact with screen content. 6. AccessibilityService can interact ONLY with the focused window and all calls are routed through the AccessibilityManagerService which imposes security. 7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos based on some criteria. These API go through the AccessibilityManagerServcie for security check. 8. Some actions are hidden and are exposes only to eng builds for UI testing. Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/core/res/AndroidManifest.xml
|
7218d830e27d81141588cd6e37f206d141a18f62 |
|
04-Jun-2011 |
Jeff Brown <jeffbrown@google.com> |
resolved conflicts for merge of ca2b552d to master Change-Id: I2f3693a59042ac5aa2d7bcdc3a504c78dc99a18b
|
ca2b552d981239043a575dfc9db86966492d0f9e |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am c8812761: am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'c8812761609e532cceb400b112ed9982149c2490': Add a preference panel for mouse speed.
|
c8812761609e532cceb400b112ed9982149c2490 |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'e1718de61c20c8d401633f83589f18d2c0c652db': Add a preference panel for mouse speed.
|
1a84fd1fb7a51f3fe4f8865e1cdd09f3490f696c |
|
02-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
Add a preference panel for mouse speed. Bug: 4124987 Change-Id: I3ce175d268a1d043cf5878481261b1049a15a149
/frameworks/base/core/res/AndroidManifest.xml
|
ab79ee4adcbc6eb9fb9c509766753f65d3857739 |
|
27-Apr-2011 |
Jake Hamby <jhamby@google.com> |
Enable full support for SMS Cell Broadcast. Implement full support for SMS Cell Broadcast (3GPP TS 23.041). Includes support for ETWS and CMAS emergency message types. Includes GSM and UMTS support (CDMA will be added later). Note: the change to GsmAlphabet.java is only necessary if the SMS national languages support patch has been applied. If that change has not been applied, then the changes to GsmAlphabet.java in this patch set can safely be ignored. Change-Id: Ia0362c53695b8ef9a0982f558f1cffa912def34b
/frameworks/base/core/res/AndroidManifest.xml
|
9f67adfc2d33ef63960d2e528ccbcbdea621f969 |
|
14-May-2011 |
Chia-chi Yeh <chiachi@android.com> |
Add a new permission for user space VPN applications. Change-Id: I2b87ef34db01209dac45fbceccafd865840830d5
/frameworks/base/core/res/AndroidManifest.xml
|
4a627c71ff53a4fca1f961f4b1dcc0461df18a06 |
|
01-Apr-2011 |
Christopher Tate <ctate@google.com> |
Full local backup infrastructure This is the basic infrastructure for pulling a full(*) backup of the device's data over an adb(**) connection to the local device. The basic process consists of these interacting pieces: 1. The framework's BackupManagerService, which coordinates the collection of app data and routing to the destination. 2. A new framework-provided BackupAgent implementation called FullBackupAgent, which is instantiated in the target applications' processes in turn, and knows how to emit a datastream that contains all of the app's saved data files. 3. A new shell-level program called "bu" that is used to bridge from adb to the framework's Backup Manager. 4. adb itself, which now knows how to use 'bu' to kick off a backup operation and pull the resulting data stream to the desktop host. 5. A system-provided application that verifies with the user that an attempted backup/restore operation is in fact expected and to be allowed. The full agent implementation is not used during normal operation of the delta-based app-customized remote backup process. Instead it's used during user-confirmed *full* backup of applications and all their data to a local destination, e.g. via the adb connection. The output format is 'tar'. This makes it very easy for the end user to examine the resulting dataset, e.g. for purpose of extracting files for debug purposes; as well as making it easy to contemplate adding things like a direct gzip stage to the data pipeline during backup/restore. It also makes it convenient to construct and maintain synthetic backup datasets for testing purposes. Within the tar format, certain artificial conventions are used. All files are stored within top-level directories according to their semantic origin: apps/pkgname/a/ : Application .apk file itself apps/pkgname/obb/: The application's associated .obb containers apps/pkgname/f/ : The subtree rooted at the getFilesDir() location apps/pkgname/db/ : The subtree rooted at the getDatabasePath() parent apps/pkgname/sp/ : The subtree rooted at the getSharedPrefsFile() parent apps/pkgname/r/ : Files stored relative to the root of the app's file tree apps/pkgname/c/ : Reserved for the app's getCacheDir() tree; not stored. For each package, the first entry in the tar stream is a file called "_manifest", nominally rooted at apps/pkgname. This file contains some metadata about the package whose data is stored in the archive. The contents of shared storage can optionally be included in the tar stream. It is placed in the synthetic location: shared/... uid/gid are ignored; app uids are assigned at install time, and the app's data is handled from within its own execution environment, so will automatically have the app's correct uid. Forward-locked .apk files are never backed up. System-partition .apk files are not backed up unless they have been overridden by a post-factory upgrade, in which case the current .apk *is* backed up -- i.e. the .apk that matches the on-disk data. The manifest preceding each application's portion of the tar stream provides version numbers and signature blocks for version checking, as well as an indication of whether the restore logic should expect to install the .apk before extracting the data. System packages can designate their own full backup agents. This is to manage things like the settings provider which (a) cannot be shut down on the fly in order to do a clean snapshot of their file trees, and (b) manage data that is not only irrelevant but actively hostile to non-identical devices -- CDMA telephony settings would seriously mess up a GSM device if emplaced there blind, for example. When a full backup or restore is initiated from adb, the system will present a confirmation UI that the user must explicitly respond to within a short [~ 30 seconds] timeout. This is to avoid the possibility of malicious desktop-side software secretly grabbing a copy of all the user's data for nefarious purposes. (*) The backup is not strictly a full mirror. In particular, the settings database is not cloned; it is handled the same way that it is in cloud backup/restore. This is because some settings are actively destructive if cloned onto a different (or especially a different-model) device: telephony settings and AndroidID are good examples of this. (**) On the framework side it doesn't care that it's adb; it just sends the tar stream to a file descriptor. This can easily be retargeted around whatever transport we might decide to use in the future. KNOWN ISSUES: * the security UI is desperately ugly; no proper designs have yet been done for it * restore is not yet implemented * shared storage backup is not yet implemented * symlinks aren't yet handled, though some infrastructure for dealing with them has been put in place. Change-Id: Ia8347611e23b398af36ea22c36dff0a276b1ce91
/frameworks/base/core/res/AndroidManifest.xml
|
4397c3240240080cf17a1cd4dcaff87ab7cacb3a |
|
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am c535f7f2: DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" * commit 'c535f7f291f0bda688efcee62f21cf44d0ebe38e': DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"
|
c535f7f291f0bda688efcee62f21cf44d0ebe38e |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: Iaf9cf120217e8417d328a51db0d82be6835b0ff0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f60ba87f075eb7bd278bc14af77ba41c70b2f8b0 |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I0b139a0f3b369c1080831a5b3a48f5d9a330b1bb Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ec9b5d17af1199e418b7352313575f0f7288b550 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit 'ee081bf5ee936396a89d5bd2b29487047b260f49': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
ee081bf5ee936396a89d5bd2b29487047b260f49 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit '3ed0a1ec7aa6364c236721a1bd29fd196f259cba': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 |
|
28-Mar-2011 |
Ramesh Sudini <ramesh.sudini@motorola.com> |
IMS: Provide net_admin permission so that IPSec could be configured/used. IMS configures the security database in kernel with keys generated from ISIM. Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/core/res/AndroidManifest.xml
|
1e23db4c2f5a6eba37a786e4390d52fe2012bfae |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0c5001d776d56bae02a5cc2663286a125d99bc5e |
|
13-Apr-2011 |
Dianne Hackborn <hackbod@google.com> |
Add APIs to remove tasks. You can remove sub-tasks inside of a task, or an entire task. When removing an entire task, you can have its process killed as well. When the process is killed, any running services will get an onTaskRemoved() callback for them to do cleanup before their process is killed (and the service possibly restarted). Or they can set a new android:stopWithTask attribute to just have the service automatically (cleanly) stopped at this point. Change-Id: I1891bc2da006fa53b99c52f9040f1145650e6808
/frameworks/base/core/res/AndroidManifest.xml
|
5ee250aa744720c90b264966f9721cfb9d256e96 |
|
05-Apr-2011 |
Jason parks <jparks@google.com> |
am 1d733625: am cca2f2f9: Merge "Send out a broadcast that the system is being factory reset." into gingerbread * commit '1d73362597c49f4692a580460bc8697a8f1d0efa': Send out a broadcast that the system is being factory reset.
|
016f8847471a9d4ffe6a03c29e0600529d51d929 |
|
31-Mar-2011 |
Jeff Hamilton <jham@android.com> |
am b9896794: am 96cf34d3: Merge "Make STOP_APP_SWITCHES signatureOrSystem." into gingerbread * commit 'b98967942e9a764b80abc8ff1c6f6f2d620c0f7a': Make STOP_APP_SWITCHES signatureOrSystem.
|
cca2f2f987ab772a4bae3176df7259f59d6502ce |
|
30-Mar-2011 |
Jason parks <jparks@google.com> |
Merge "Send out a broadcast that the system is being factory reset." into gingerbread
|
10de0b31df14a2f3337bbfc824419f8e4a246f52 |
|
25-Mar-2011 |
Jeff Hamilton <jham@android.com> |
Make STOP_APP_SWITCHES signatureOrSystem. The NFC service relies on this permission for it's dispatching mechanism and it is no longer signed with the platform cert. Bug: 4173610 Change-Id: I598ad2889c4af307f04433093923255fe7daedbb
/frameworks/base/core/res/AndroidManifest.xml
|
4ca74dc4c2e0c68803e777cf47ed8e01b8e8444e |
|
14-Mar-2011 |
Jason parks <jparks@google.com> |
Send out a broadcast that the system is being factory reset. Change-Id: I339b7ce58cb3f48316103be49b582d4f7e9b63bf
/frameworks/base/core/res/AndroidManifest.xml
|
a64e2ad4da3612586594a19489a2b5d44f3f23a0 |
|
14-Mar-2011 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of 38d0d562 to honeycomb-plus-aosp Change-Id: Iff9ea08b810b0d142a9227272492c0305a9bcf42
|
367f41f8f61126c2ab34a34cc676756a9fc23ac2 |
|
08-Mar-2011 |
Nick Pelly <npelly@google.com> |
Implement new NFC-EE API's as shared library (frameworks/base). Change-Id: I45c4eaf59ec78167fc236fdd59676465a5e1bcb7
/frameworks/base/core/res/AndroidManifest.xml
|
4bdab1751f0db3b2f03e8c58ef5c11a543dfa3c7 |
|
23-Feb-2011 |
TK MUN <tk.mun@samsung.com> |
DO NOT MERGE WiMAX support - In Connectivity service, start WiMAX service - 4G icon display in StatusBarPolicy - Add DHCP renew - Add radio for WiMAX Change-Id: Iffff012b270d80e84ec8fbd4486921a8adb847dd Signed-off-by: TK MUN <tk.mun@samsung.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a68b8338b431eb15d28e92f06452efbbda9493e |
|
08-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
USB: Add API and dialog for apps to request permissions for USB devices and accessories New APIs: UsbManager.hasPermission returns true if the caller has permission for the given device or accessory UsbManager.requestPermission poses a dialog to allow the user to give the caller permission for the device or accessory. Result is returned via a PendingIntent. No dialog is displayed if the caller already has permission. Also moved UsbResolverActivity to SystemUI package BUG: 4069037 Change-Id: I93be769501a8776b49ac26e468af19f8fa2114c9
/frameworks/base/core/res/AndroidManifest.xml
|
40bbf9295d5245d3917629ce15f7b37670aef1ac |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE: Backport USB accessory support to gingerbread Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
c4308f01c965571dc2354107c3574df113e397ee |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
Move USB framework support from android.hardware to android.hardware.usb package Change-Id: I00fd4f0caaa4aebe48f71c576bb211b5f38bf88d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
02eb8746de2d60563ec2751a34d20923192e4293 |
|
27-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: Enhancements for managing USB devices and accessories When a USB device or accessory is connected, the UsbService now asks the user which application to associate with the device or accessory. Applications interested in devices or accessories must specify the devices they work with via meta-data attached to their manifest. Permission to communicate with the device is assigned when the user chooses the activity to use for the device. The user has the option of clicking the "always use this application" checkbox to make the assignment automatic in the future. The user may later clear this preference and revoke permission for an application to have permission to communicate with the device by clicking the "Clear defaults" button for the activity in the Manage Applications panel in Settings. Added class UsbResolveActivity (a subclass or ResolveActivity for choosing an activity for a USB device or accessory) Added UsbDeviceManager, which manages the mapping between USB devices/accessories and applications, including default applications for devices and accessories, and manages application permissions. Add interface to allow Settings to clear device and accessory preferences and permissions for an application. Remove obsolete ACCESS_USB permission. Add new signatureOrSystem MANAGE_USB permission to allow administrating preferences and permissions. Moved UsbService.java to a "usb" subdirectory, along with new classes UsbResolveActivity and UsbDeviceManager. Change-Id: I92554381e9779e68ce380daaee4e1401fb875703 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7f972122db87dc54e41ed1a6e417534d43bca3a |
|
24-Feb-2011 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3426299: Introduce application "stopped" state The package manager now keeps track of whether an application is stopped. There are new intent flags to control whether intent filters in a stopped application will match the intent. This is currently used in one place, sending broadcasts, so that stopped apps can not be launched due to background processes. The package manager during first init makes sure no applications are in the stopped state. When new applications are installed, that begin in the stopped state. When the activity manager is launching a component of an application, it ensures the application is taken out of the stopped state. The "force stop" button in manage applications will now put an application back in to the stopped state; it can't go back out of the stopped state until one of its components is launched by the activity manager. There will probably be a few more places where we need to filter stopped applications out of intent matches, but doing this for broadcast is a very big first step. This also introduces a new broadcast that is sent to an application after it is replaced with a new .apk. But only if the app is not in the stopped state. This makes it a lot easier for developers to implement code to get their application back in proper running shape after an upgrade. Finally another new broadcast is added that is sent to a package's installer at the first time it is launched. This allows the installer to tell the package about it being installed only when it is first actually used. Change-Id: I589c53ff0e0ece868fe734ace4439c0d202dca2d
/frameworks/base/core/res/AndroidManifest.xml
|
8d224caf989b212f8e633cc1a8b0db453300a742 |
|
18-Feb-2011 |
Peter Visontay <pvisontay@google.com> |
ActivityManager exposes launch count API. Bug: 3431684 Change-Id: I49d4fb0b1620aafaf251d77700bc017859328968
/frameworks/base/core/res/AndroidManifest.xml
|
984dd8a206e782027c2b0c866aa845e6d236f218 |
|
16-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "UsbManager: New APIs for USB accessories"
|
ef12256ca500bb0c16af51e5a923b70e9adabd34 |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am d8d51fed: am 8c8e9d9a: am 1df862a4: Minor doc update. * commit 'd8d51fed861cd36f57f1eb2542def23322379d7c': Minor doc update.
|
d8d51fed861cd36f57f1eb2542def23322379d7c |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am 8c8e9d9a: am 1df862a4: Minor doc update. * commit '8c8e9d9a7f1bddbc995a5c088f19a0a3be1f6a5b': Minor doc update.
|
1df862a4656bb0d7a3329311b1e243fc6db32448 |
|
15-Feb-2011 |
Nick Pelly <npelly@google.com> |
Minor doc update. Change-Id: I1d29adfccbdc196a145a2c2a044d63b00e5f788b
/frameworks/base/core/res/AndroidManifest.xml
|
9182d3c4eb1f9065cb33df5a3594969dd0d42acc |
|
15-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: New APIs for USB accessories USB accessories are peripherals that connect to android devices as a USB host. When connected, the accessory will first identify itself to the android device by sending manufacturer, product, accessory type and version strings to the device, and then request the device to enter USB accessory mode. The device will then enable the USB accessory kernel driver and disable all other USB functionality except possibly adb (adb can be used while the android device is connected to the PC and the PC is running software that emulates a USB accessory) The class android.hardware.UsbAccessory is used to describe the currently attached USB accessory. UsbAccessory contains the manufacturer, product, accessory type and version strings to identify the accessory. The accessory can be opened as a ParcelFileDescriptor, which can be used to communicate with the accessory over two bulk endpoints. The Intents UsbManager.USB_ACCESSORY_ATTACHED and UsbManager.USB_ACCESSORY_DETACHED are broadcast when accessories are connected and disconnected to the device. The USB_ACCESSORY_ATTACHED contains a UsbAccessory object for the attached accessory as an extra. The Intent also contains string extras for the manufacturer, product, accessory type and version strings to allow filtering on these strings. Change-Id: Ie77cbf51814a4aa44a6b1e62673bfe4c6aa81755 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a40182c77b9cfb608d1f9a17c3ed7d9a6a56efa |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am 49295e53: am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit '49295e5379472c22af8975e32271f9659c016531': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
49295e5379472c22af8975e32271f9659c016531 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit 'ccd79399cc2a28d79287fd1558c5f5a530356003': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
f5e4f208b9ed73ff9c8d74d9c2e75a95ec1014b4 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm. Change-Id: I53a6671d5478e7dbca44b17d90f1edfa8e3420bc
/frameworks/base/core/res/AndroidManifest.xml
|
7df04fb2a02515edb1398b891d857b27f348fd83 |
|
25-Jan-2011 |
Adam Powell <adamp@google.com> |
am 41cd1ce1: am f72a13ec: Merge "Fix bug 3378333 - Holo-style layout for granting permissions" into honeycomb * commit '41cd1ce1b97e48190b47447555560702d0843aba': Fix bug 3378333 - Holo-style layout for granting permissions
|
c91466f56a777ab44a9a025e9d51f576e21dcce9 |
|
22-Jan-2011 |
Adam Powell <adamp@google.com> |
Fix bug 3378333 - Holo-style layout for granting permissions Change-Id: Ie1bb925db3ddd8343c9756e220a0d821f4d31c6d
/frameworks/base/core/res/AndroidManifest.xml
|
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 |
|
07-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Make ACCESS_USB permission for applications to access USB devices: - change from signatureOrSystem to normal - no longer associate this permission with the "usb" unix group - add to public API Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7d511e148bc901ef41ac44d7b3593e5d803f72f |
|
30-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
New APIs for USB host support: UsbManager: - is now a service retrievable via Context.getSystemService(Context.USB_SERVICE). - provides support for returning a list all connected USB devices - broadcasts ACTION_USB_DEVICE_ATTACHED and USB_DEVICE_DETACHED when devices are added and removed from the USB host bus UsbDevice: - represents an attached USB device. UsbInterface: - represents an interface on a USB device - devices may have multiple interfaces if they provide multiple sets of functionality (for example, android phones typically have interfaces for both USB mass storage and adb) UsbEndpoint: - represents an endpoint on a USB interface - endpoints are used for sending or receiving data (only in one or the other direction) UsbRequest: - encapsulates a send or receive request to be sent over an endpoint Change-Id: Ieef3e434c62760770ea839070cf5eba1a705967a Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
795f135a08b6db7372935fa15874723307748fec |
|
21-Jan-2011 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #3338957 (Account Picker and Account type picker need love) - update UI to match design requirements Change-Id: Idb5dbea876eb7170a8c1f077a99cfe168d41f1e1
/frameworks/base/core/res/AndroidManifest.xml
|
8888c597c4bc3002e48738b6aea6fd43f69c0f78 |
|
21-Jan-2011 |
Jason parks <jparks@google.com> |
Add and enforce the permission for encrypting/decrypting. Change-Id: Ia292d8a5981266c2703743beb79fd786d77b375d
/frameworks/base/core/res/AndroidManifest.xml
|
81f39eb6e76d0be1dd341af835e8002a0f80524e |
|
12-Jan-2011 |
Winson Chung <winsonc@google.com> |
Refactoring app widgets to address security/performance issues. - Moving the service binding to AppWidgetService to prevent arbitrary apps from binding to widget services - Requiring RemoteViewsServices to require android.permission.BIND_REMOTEVIEWS permission Change-Id: Id135bafba998299eb278067712b8a5d8487cfd04
/frameworks/base/core/res/AndroidManifest.xml
|
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 |
|
12-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Remove permission android.permission.WRITE_MEDIA_STORAGE Access to the /data/media directory is now restricted exclusively to the sdcard daemon, so there is no longer a need for this permission. Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f9a04233c1db22a6ddd989b55db725badeae7539 |
|
11-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
@hide android.permission.WRITE_MEDIA_STORAGE This permission is not needed for non-system or unbundled apps, so we don't need it in the public API Change-Id: I1a2a0349c6c5b7b5dc3104d69f4e39e95b878db9 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
10bc1114f37d9edb3f153ec209745dd476530325 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to the MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3f182381e1279874148f619c6ad2f76840ab3990 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Framework manifest: Remove USB_CAMERA_ATTACHED and USB_CAMERA_DETACHED broadcasts These broadcasts no longer exist, so remove their <protected-broadcast> elements from the manifest. Signed-off-by: Mike Lockwood <lockwood@android.com> Change-Id: I4a724509d3058f16283870f02e5e1b51dfb21a43
/frameworks/base/core/res/AndroidManifest.xml
|
b19e62add0a747127952862bb7bea0b73379edcc |
|
16-Dec-2010 |
Fred Quintana <fredq@google.com> |
fix the TooManyDeletes to show up again It was moved so it was no longer in the location that SyncManager expected. I fixed it by (a) moving it to the SyncManager directory and by (b) changing the SyncManager to refer to it by class rather than by class name, which means it will now check for it at compile time, not run time. Bug: 3289922 Change-Id: I24f8bac371a16c62c2a38ed1024702c6d0913b93
/frameworks/base/core/res/AndroidManifest.xml
|
7458091ffc7c5b3ff9220351bb9e55da5d87f545 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
am ea294903: am eba947a3: Merge "Remove ACTION_TAG_DISCOVERED from protected broadcast list." into gingerbread * commit 'ea294903ca4c298c44b50b473b9b10ae2b77c9e3': Remove ACTION_TAG_DISCOVERED from protected broadcast list.
|
35042f1f58663fd00a08e4a8dd51c59bfeddda78 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
Remove ACTION_TAG_DISCOVERED from protected broadcast list. ACTION_TAG_DISCOVERED is a start activity intent, not a broadcast intent, so its presence in this list is redundant. Change-Id: I05419ec9c4471b7b11c9ae50a02e5ac3d9e572d2
/frameworks/base/core/res/AndroidManifest.xml
|
addfc766d535aa2cde76caa9b3049e311f656b5f |
|
02-Dec-2010 |
Freeman Ng <tenorslowworm@google.com> |
change SHUTDOWN permission to signatureOrSystem so setup wizard can start ACTION_REQUEST_SHUTDOWN bug: 3201638 Change-Id: I0d422667fa27df5df2fadbf27d4e3677a70db8f1
/frameworks/base/core/res/AndroidManifest.xml
|
fa04b8de117a017818761623a961426b03af2914 |
|
30-Nov-2010 |
Costin Manolache <costin@google.com> |
Revert "Merge "Fix permission."" It breaks apps that rely on the wrong permission. This reverts commit 974ab30569f9543c897047972260887cb33f8827, reversing changes made to 8b780ec773b2d1765f3ce932ee8f86c9048fdb85.
/frameworks/base/core/res/AndroidManifest.xml
|
e4e6efa46b8d324ddcf506649e349406aafd8052 |
|
23-Nov-2010 |
Costin Manolache <costin@google.com> |
Fix permission. Change-Id: Ifb545e8fb1a312f0fecb9aed35027c0cb98fab65
/frameworks/base/core/res/AndroidManifest.xml
|
434203a277cd2f237a71508a3d5a7d1602126cd5 |
|
12-Oct-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Notify all VMs when proxy changes. bug:2700664 Change-Id: I74cc6e0bd6e66847bf18f524ce851e3e9d2c4e87
/frameworks/base/core/res/AndroidManifest.xml
|
a4eb4c3a207c4d1b0e72bad332c3e6b928a77738 |
|
08-Nov-2010 |
Joe Onorato <joeo@google.com> |
Make all the activities in the framework use the holo theme. Change-Id: I18b669923fcd52e3bbb82b63e491d46cdb4bf4be
/frameworks/base/core/res/AndroidManifest.xml
|
03595d01188d88c169e8c9dd51b357fd545e69cc |
|
02-Nov-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Tell each VM to flush their DNS cache. bug:3095357 Change-Id: I93de24e3e5a7d8b94d55f4facfffc863a2b8c202
/frameworks/base/core/res/AndroidManifest.xml
|
482c9332972b928938e681d4553356896eb9b61c |
|
02-Nov-2010 |
Amith Yamasani <yamasani@google.com> |
Use Holo theme for Ringtone picker. Bug: 3148863
/frameworks/base/core/res/AndroidManifest.xml
|
3f425a6be47b706349f17679ed2b6877179df1cc |
|
29-Oct-2010 |
Mike Lockwood <lockwood@android.com> |
Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media BUG: 3113970 Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
4611bb1814afc7dcc3177cbb248bfb5ee1662ba0 |
|
29-Oct-2010 |
Nick Pelly <npelly@google.com> |
am ba1664b3: am 4bf4b491: Merge "Hide some NFC API\'s." into gingerbread * commit 'ba1664b34cc33ebb6b45fccedb35298ff8b1d998': Hide some NFC API's.
|
11b075e218b9921a953eeebe73fcd1a8a81f764b |
|
28-Oct-2010 |
Nick Pelly <npelly@google.com> |
Hide some NFC API's. We are leaving enough API so that you can see when any Tag is discovered, get its ID, and get its NDEF messages. But for advanced use - creating tag connections and writing messages - we have 2 problems. Firstly a lot of the code is untested (RawTagConnection.transceive()), or in some cases known not to work (NdefTagConnection.write()). Secondly, there is still debate about how to best expose information about Tags. The set of data/methods exposed for a Tag changes completely depending on the tag technology. There may be multiple sets of technology implemented in a single tag. Tag A may have technology X and Y, Tag B may have technology Y and Z. Furthermore, some NFC controllers will be not be able to use all technologies, and so Android Device 1 may see technology X and Y on Tag A but Android device 2 may only see technology X. So we have a pretty challenging set of constraints to work under, and we are not convinced the current Tag and NdefTag class is the best approach going forwards. The Tag application should be able to remain unbundled, since it just needs to get incoming NDEF Messages. Change-Id: Ic09f094f33794e10f8d730fffe011c9a5957e0ac Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
86417ea3f8041481a085823a1aa9f66d747231e8 |
|
27-Oct-2010 |
satok <satok@google.com> |
Remove InputMethodAndSubtypeEnabler and call intent of Settings.ACTION_INPUT_METHOD_AND_SUBTYPE_ENABLER Change-Id: I467cfba9644ec266f6a98f7aec0886ad205fef4f
/frameworks/base/core/res/AndroidManifest.xml
|
54770496d393385408cfba3198f87e139712ed94 |
|
19-Oct-2010 |
Nick Pelly <npelly@google.com> |
am 6b09a90a: am e47150e9: Fix up NFC permissions. Merge commit '6b09a90a818137de52a0c7325339849ccf584b9e' * commit '6b09a90a818137de52a0c7325339849ccf584b9e': Fix up NFC permissions.
|
027610a76e67f39e3a435d68ec785a1cf09dcf9c |
|
18-Oct-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 964eb438 to master Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
|
e47150e933e6f610546f57183477f324566e521e |
|
18-Oct-2010 |
Nick Pelly <npelly@google.com> |
Fix up NFC permissions. The initial (vendor) implementation had 4 perms, replace with 1. Requires no permissions: - Viewing UID, type of discovered tags and cards. - Viewing the NDEF message contents of NDEF formatted tags and cards. Requires android.permission.NFC - Get/Set the local tag "MyTag" - Creating or using a RawTagConnection (transceive()) - Creating or using a NdefTagConnection (write()/read()) Change-Id: I1b585c7d91738bed6261277061a48cf7c939482a Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 |
|
16-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3094621 and #3094609 - wipe sd card 3094621: add "wipe sd card" option to factory data reset 3094609: collapse unmount/format into one command Also since we have decided that it is important to consider the Crespo storage as internal storage, DevicePolicyManager gets a new API to be able to wipe it. (No big deal, since all of the work for this is now done in the implementation of the new UI.) Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/res/AndroidManifest.xml
|
f36c6db108364dea89b1e3c27c0b15103e560d87 |
|
15-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com> Conflicts: Android.mk CleanSpec.mk core/java/android/app/ContextImpl.java
/frameworks/base/core/res/AndroidManifest.xml
|
bc931eaf154b8f196fd15983b1d0603e12dae890 |
|
14-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am a007ab29: am ffbc4b94: Merge "Fix SD card mounting issues #3074555 and #3072332" into gingerbread Merge commit 'a007ab294d83db987b05b49ab869566978a87494' * commit 'a007ab294d83db987b05b49ab869566978a87494': Fix SD card mounting issues #3074555 and #3072332
|
590b73bc5b8e5f7b59bff1d9264a52388a5162e6 |
|
12-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d39d515b9110d7405d0f03dbf612ba5c9b8ac566 |
|
12-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix SD card mounting issues #3074555 and #3072332 Change-Id: I79572bb4e92d2546abd97512a119ae74f0d72019 3074555: Kill "Shared storage safe to remove" notification 3072332: "blank shared storage" notification doesn't go anywhere
/frameworks/base/core/res/AndroidManifest.xml
|
3d59480dc201c893c6da5c3934b14a2d95a1bef9 |
|
10-Oct-2010 |
Hung-ying Tyan <tyanh@google.com> |
am ea445758: am 08faac3c: Unhide SIP API. Merge commit 'ea445758efba6b728d5e597402e9d9538f3ef451' * commit 'ea445758efba6b728d5e597402e9d9538f3ef451': Unhide SIP API.
|
08faac3c26e12863858e1534985dd950193f755f |
|
15-Sep-2010 |
Hung-ying Tyan <tyanh@google.com> |
Unhide SIP API. Change-Id: I09468e3149a242a3b1e085ad220eb74f84ac6c68
/frameworks/base/core/res/AndroidManifest.xml
|
47a44916e2fb33cf4751906386d5f5c903b28d8b |
|
06-Oct-2010 |
satok <satok@google.com> |
Add InputMethodEnabler for enabling input methods and subtypes - Copyed functionarity from LanguageSettings.java TODO: Save enabled InputMethodSubtypes Change-Id: I7b4fb1a79cb8b3229f88773d261430e23ba7aae2
/frameworks/base/core/res/AndroidManifest.xml
|
4715bd91f5949a1919156a5a5cb50f0cccda645e |
|
29-Sep-2010 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of f4c3b7e9 to master Change-Id: Idcdc521144f3072058b2bb6cb383e42c852e64f4
|
038cabe0247ee46df62f9363f1a303bc5b9c1028 |
|
24-Sep-2010 |
Nick Pelly <npelly@google.com> |
NFC integration Source: Trusted_NFC_Device_Host_AA03.01e02_google.zip code drop (23-Sep-2010) Conflicts: core/java/android/app/ApplicationContext.java core/java/android/provider/Settings.java core/jni/Android.mk core/jni/AndroidRuntime.cpp core/res/AndroidManifest.xml include/utils/Asset.h Change-Id: I62c92f4c79f5ee65126c97602f6bc1c15794e573 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a0b49cfc0c68bafb0bd7826f3b4096f30148824a |
|
25-Sep-2010 |
Patrick Scott <phanna@android.com> |
am 888bcdbe: am 3ae249dc: Merge "Add new Alarm provider class for setting an alarm." into gingerbread Merge commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0' * commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0': Add new Alarm provider class for setting an alarm.
|
a73c4b082c2ab38831fc57c6bfb425d32ffe2aa4 |
|
22-Sep-2010 |
Patrick Scott <phanna@android.com> |
Add new Alarm provider class for setting an alarm. The new class provides static variables for creating an intent to broadcast to applications implementing the alarm clock. A new permission has been added and applications are recommended to require this permission if accepting the set alarm broadcast. Change-Id: I7b1014acdc54371cbda19bcf9b5c395b647aa413
/frameworks/base/core/res/AndroidManifest.xml
|
4e0bfd70d090b5653dd00c5a671db0519086dcfe |
|
16-Sep-2010 |
Chris Palmer <palmer@google.com> |
am 1b60963c: am b8dbdc29: Clarify the danger of READ_LOGS and DUMP permissions. Merge commit '1b60963c42e159aacc52d688defcac206e5ecec0' * commit '1b60963c42e159aacc52d688defcac206e5ecec0': Clarify the danger of READ_LOGS and DUMP permissions.
|
b6f8989385bd69e3b6fc56f5a095917f8624ed7e |
|
16-Sep-2010 |
David Brown <dab@google.com> |
am 0237cf2e: am 8626d1a3: Merge "Mark MODIFY_PHONE_STATE permission as signatureOrSystem" into gingerbread Merge commit '0237cf2eace5d35410e95f586fd40c3068c94582' * commit '0237cf2eace5d35410e95f586fd40c3068c94582': Mark MODIFY_PHONE_STATE permission as signatureOrSystem
|
b8dbdc293a8495a873a9c36353d6a9408c698256 |
|
15-Sep-2010 |
Chris Palmer <palmer@google.com> |
Clarify the danger of READ_LOGS and DUMP permissions. The logs inevitably contain PII, so now we are making that clear in user strings and developer docs. Moving DUMP and READ_LOGS into the PERSONAL_INFO group. Note that this means we need string translations. Change-Id: I1b5bf9d2d827ab1a31dedbdb30d0906a87c26a32
/frameworks/base/core/res/AndroidManifest.xml
|
f4ece2086f3b7060edc4b93a12f04c9af648867a |
|
15-Sep-2010 |
David Brown <dab@google.com> |
Mark MODIFY_PHONE_STATE permission as signatureOrSystem This permission isn't needed right now, since there aren't actually any public APIs that require it. (There are a few calls in the ITelephony interface that do, but they're all hidden.) Since there's no good reason for 3rd party apps to declare it, let's mark it signatureOrSystem for now. We can bring it back -- and probably split it apart into multiple finer-grained permissions -- once we finally expose full telephony APIs to 3rd party apps (see bug 1043005). Bug: 2989096 Change-Id: Idf898d5e12d648a959f622cd815e75597195aa82
/frameworks/base/core/res/AndroidManifest.xml
|
e746f03c6c8b8d0897d322ab524d545ace200fcd |
|
14-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 53686433 to master Change-Id: I27004dc464f5771d3205ae5757c6eccc5b16854d
|
7e9f4eb2608148436cef36c9969bf8a599b39e72 |
|
11-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Track client requests through location manager. This fixes a problem where applications could ask the location manager to do very heavy-weight things (like... say... update location every minute), which would get accounted against the system instead of the application because ultimately it is the system making the heavy calls (wake locks, etc). To solve this, we introduce a new class WorkSource representing the source of some work. Wake locks and Wifi locks allow you to set the source to use (but only if you are system code and thus can get the permission to do so), which is what will be reported to the battery stats until the actual caller. For the initial implementation, the location manager keeps track of all clients requesting periodic updates, and tells its providers about them as a WorkSource param when setting their min update time. The network location provider uses this to set the source on the wake and wifi locks it acquires, when doing work because of the update period. This should also be used elsewhere, such as in the GPS provider, but this is a good start. Change-Id: I2b6ffafad9e90ecf15d7c502e2db675fd52ae3cf
/frameworks/base/core/res/AndroidManifest.xml
|
94bf9431e5464c7757890abfe0716997151f153f |
|
08-Sep-2010 |
Jake Hamby <jhamby@google.com> |
am e7578344: am 5872e9d7: Merge "Allow incoming SMS until internal storage is almost full." into gingerbread Merge commit 'e75783440a55fb0a5ef75066be94a11898f652f0' * commit 'e75783440a55fb0a5ef75066be94a11898f652f0': Allow incoming SMS until internal storage is almost full.
|
bb3716332321e22537a5015be13e2229fb9b90bc |
|
24-Aug-2010 |
Jake Hamby <jhamby@google.com> |
Allow incoming SMS until internal storage is almost full. Fix for bug 2382830: new incoming SMS should not be rejected when running low on internal phone storage. Testing revealed that the /data partition should have at least 256 KiB available in order to prevent random app crashes (including system apps) due to SQLite transaction failures. With 256 KiB free, the device should safely boot without storage full errors. This takes into account the 36-40 KiB that the YAFFS2 filesystem reports as available even after the partition has been completely filled. I've set the default full threshold to 1 MiB to provide a generous safety margin. For this bug, I changed the DeviceStorageMonitorService demon to send two new hidden notifications for device storage "full" and "not full", when the free space falls below the full threshold (default 1 MiB, but configurable as a system setting), in addition to the existing storage low/okay notifications sent when the storage crosses the threshold of 90% full (also configurable). The SMS code was changed to use these new notifications so that it can accept messages until the data partition has been filled to the maximum safe capacity rather than stopping when it hits 90% full. There should be no negative impact on battery life because the additional check in the storage polling service should be offset by an optimization to cache the free threshold values which were previously being computed every time through the loop. While testing this change, I discovered that SMSDispatcher was being instantiated twice, the first time in GSMPhone/CDMAPhone, and the second time in SimSmsInterfaceManager / RuimSmsInterfaceManager. Changed the code to pass the original SMSDispatcher to the Sim/RuimSmsInterfaceManager constructor. Change-Id: Ie0c6d05294778ab6ee42e0fa01313af96d824c77
/frameworks/base/core/res/AndroidManifest.xml
|
b8a8a578c2483d84ef96fd7050bbbcbc48d49a37 |
|
08-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
Fix Intent.ACTION_REBOOT Turns out this would be useful for automated testing. Change-Id: Idd5e35a8d4a354447b17a77fe0b606f78df844d0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
44434f002aadb4e234a963ba9317a3c79d431d97 |
|
03-Sep-2010 |
Daniel Sandler <dsandler@google.com> |
Don't get stung! Change-Id: I8211675e619bcc31c991296387513d07ad53ff10
/frameworks/base/core/res/AndroidManifest.xml
|
8f5edc93b622bbdc33db24d348480fd7d55afb41 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
am 840f0fec: am d3efa392: Clean up some permissions. Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729' * commit '840f0fecd87357cadf4b2a0ae96d30b457f89729': Clean up some permissions.
|
d3efa3924407da6d38aa5931ac29aa088d9eb986 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Clean up some permissions. Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear to be associated with anything or used by anyone, so they are just deleted. Also deprecate the activity API to go in the foreground. I didn't realize that was released in the SDK. It needs to go away. Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/core/res/AndroidManifest.xml
|
7b6d0d99b6904b511996267efae215fe9cb5e98f |
|
11-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
am 679ac09a: am a5ae50cd: Merge "More native work." into gingerbread Merge commit '679ac09a5c22175354f3a04b28456b323839530e' * commit '679ac09a5c22175354f3a04b28456b323839530e': More native work.
|
08d5b8fad8d46ccb64db2fdcb4d66972ec87bf48 |
|
04-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
More native work. Implement save/restore of state, and add native APIs for configuration information. Change-Id: I2a3ddc2ba605db58d7c8b2b31b9215fb323f90b5
/frameworks/base/core/res/AndroidManifest.xml
|
da39f0e87814c5acb8b6319a1877b93197fb910e |
|
28-Jul-2010 |
Mike Lockwood <lockwood@android.com> |
Send Intents when PTP compatible devices are connected/disconnected to USB Usb.ACTION_USB_CAMERA_ATTACHED and Usb.ACTION_USB_CAMERA_DETACHED are sent when cameras are connected and disconnected. The data field of the intent contains a Uri for the camera in the Mtp content provider. Change-Id: I814221b4f0507b309997c71edb5a041e8efc54f7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
dad497e598de663c742289fe10dfa65c0cb154e9 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
am 0d929d7f: am 059f009d: Make android.hardware.action.USB_STATE a protected broadcast. Merge commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757' * commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757': Make android.hardware.action.USB_STATE a protected broadcast.
|
059f009d970fb37ac4e408dcf8e1d2d2cdcf0a84 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Make android.hardware.action.USB_STATE a protected broadcast. Change-Id: I84160e9342025228c1f810077f5aa25f5cc83023 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
57c798ade1a30c5587269519dd9f55b87c3b3be7 |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I919fcd5aa8d640d051cec87053f474a9843ed545 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2423607a32d63a0c646b17758ebeb4dc1d0b791f |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I11495d039429dbe22bd738067296e39ae415befa Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9163d42a50076c2a77694ff394363264d862c7bf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Add new permission to allow access to USB devices Adds permission android.permission.ACCESS_USB. This is a partial cherry pick of a change from master. It adds the permission, but not the support for associating it the AID_USB group. Change-Id: If5816721a4fc88bf444141a7b717da65ea37d5f4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
14f2ef4c9da27a3d58d65dc9f684c5f764ee279a |
|
15-Jun-2010 |
Robert Greenwalt <robdroid@android.com> |
Move the net transition wakelock to ConnService. When the default network goes down we lose the wake-on-incoming-data capability until the new net is brought up and apps rebuild their connections. We fixed this in Wifi, but it's a general connectivity issue, not a wifi issue so moving the mechanism to connecitivty so other networks can use it. bug:2734419 Change-Id: I39b5d825eb6b548bd9bb8f179b89254f4db53147
/frameworks/base/core/res/AndroidManifest.xml
|
8a5f10b30dae663eb01372490df3497e8a2ad56a |
|
10-Jun-2010 |
Joe Onorato <joeo@android.com> |
resolved conflicts for merge of f7b79151 to master Change-Id: Ia4538f73d8bade9e6565835d484dcb650830feca
|
1d46191d88ee9262ea05b868d2db5b44ad85fa43 |
|
09-Jun-2010 |
Joe Onorato <joeo@android.com> |
am b5f9b4f1: am 302759c1: Merge changes I4a11f027,Ib2c4abf6,Id0c7ef9f,I839d7771 into kraken
|
8bc6c5141974dbc36a6fe416853f558921be9f24 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Require the STATUS_BAR_SERVICE permission for something to be the status bar. Change-Id: I57b2d296e0d0cef0d256ae6697fffc47188d14df
/frameworks/base/core/res/AndroidManifest.xml
|
fe4f3ae33c8da86585399b4167fd7987c8a16066 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Move the usb mass storage notification & activity into SystemUI.apk. Also fix the notification to show properly when the runtime is restarted. Change-Id: Id0c7ef9f9dc9c9df18428cbaa7db1703f085137e
/frameworks/base/core/res/AndroidManifest.xml
|
d0b15cecc63b03ca4e42549ed3a54ae2c7e31866 |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f3307ae8 to master Change-Id: Ic59db363391f73343eba32894113914ceea5a963
|
860755faa6bdd3c2aeae49c05b87b5bc080ae60c |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Add support for heavy-weight applications. Only one can be running at a time, their process can not be killed, and a notification is posted while it is running. Change-Id: I843015723947e0c934ae63a1aeee139327c0bc01
/frameworks/base/core/res/AndroidManifest.xml
|
2b6b8351961d627be87396bbeb3e0ab811747bf3 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
am 0c6028c1: am c1959658: am fa2e3dcd: am 8ea9f130: Merge "Bug 2680071: Rename the Cloud to Device" into froyo
|
8d83f9e31bfff0281b522c53e035dffc7dd00ba9 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2680071: Rename the Cloud to Device Change-Id: I12ab32de393e44a499e3f9e3a0b38f4682156ff5
/frameworks/base/core/res/AndroidManifest.xml
|
3a17fbb757576ab52ff1ec5fcd54101f33977099 |
|
12-May-2010 |
Costin Manolache <costin@google.com> |
am b20842c7: am 8579a4d7: am 625de488: am e2055fe4: Merge "Bug 2673557: rename datamessaging" into froyo
|
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
Add new permission android.permission.ACCESS_USB to allow access to USB devices Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
161c75a0f3ca5255001f7d737a02a4f9d728f1f4 |
|
11-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2673557: rename datamessaging Change-Id: I583ac61c7b8fce69d60801dc76aeca9f13d250b2
/frameworks/base/core/res/AndroidManifest.xml
|
ec7c78fbf526816cd361fd482bdf3792ecfd9a9f |
|
31-Mar-2010 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_CACHE_FILESYSTEM and MOVE_PACKAGE Bug: b/2553489 Change-Id: I681b3f9a243777b931298cc93c9d34c8d7eae0f2
/frameworks/base/core/res/AndroidManifest.xml
|
9c9c532d3625ba2485eb4ea6924ed0a0163fd958 |
|
31-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2560791: Expose API to go in to car mode. Also fix bug where night mode was being used in desk dock. Change-Id: I56c1cf3d6fe800a4f986d40cc4cb2e70b76ac261
/frameworks/base/core/res/AndroidManifest.xml
|
98bfa39596448504f58f6dfe1b8bd2d31f25367b |
|
24-Mar-2010 |
Bjorn Bringert <bringert@android.com> |
Use a secure setting for default browser geolocation permissions Partly reverts I6308b476ad18b1d71d7438b936c592a45365c9f0 Bug: http://b/issue?id=2535598 Change-Id: Ib488c6d4f10a87b714ecb78eef6fe58f572907c6
/frameworks/base/core/res/AndroidManifest.xml
|
cbf953ed09b036441d90e14b0723a2ea417b3f35 |
|
22-Mar-2010 |
San Mehat <san@google.com> |
Permissions: Change ASEC permissions from 'dangerous' -> 'signature' Change-Id: I5e495332c45f718178486f2e07d37031e6fa5afc Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2ee89ea2887252053c31541c54126a8b084c9bca |
|
11-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Applications should -not- be able to set preferred activities. I can't believe I let this slip through. And in the SDK no less. :( The APIs for setting preferred activities will now throw a security exception when used. This may break some apps, we'll see how it goes. If it is too bad we can just make these log and not throw anything, but I would much prefer they throw an exception. Change-Id: I3aed434750eef8b202aa9d5bd774a0121be521c6
/frameworks/base/core/res/AndroidManifest.xml
|
7299c41630935a2b106e73e5603579a7747f7535 |
|
05-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Refactor car mode. Extract all UI behavior from dock observer and ACTION_DOCK_EVENT. Also introduce a desk type to go along with the car type all through the resource system, since we now need to have corresponding high-level broadcasts for desk dock mode. As part of that I also reworked some of the logic for switching modes to all funnel through a single update() call that looks all of the current state to decide what to do next, and fixed various locking issues. In addition I found there were bugs in the configuration change handling causing us to only switch into the car mode config and then never get out of it. Unfortunately now that we are actually changing the configuration for each mode change, the transitions between them are really crummy as we restart all kinds of activities. :(
/frameworks/base/core/res/AndroidManifest.xml
|
e7085e909d0c7f58a160b2730ff06aca085dfd6b |
|
04-Mar-2010 |
Robert Greenwalt <robdroid@android.com> |
Update framework tethering UI Getting rid of notification dialog - maybe the entire TetherActivity. Also getting rid of toasts - to ephemeral.
/frameworks/base/core/res/AndroidManifest.xml
|
8946dd3355fc1dcbad872c0546e356474d4cc5de |
|
19-Feb-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
Move package from internal to external and vice versa.
/frameworks/base/core/res/AndroidManifest.xml
|
154f7a1cc2d4f0468a7cc8dfa36e837c84cd9f7e |
|
17-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Show car mode notification in status bar. The notification is an ongoing event and can be used to get out of car mode.
/frameworks/base/core/res/AndroidManifest.xml
|
63cfebf2dbe628508cccc10f47754fdacd48c1a0 |
|
05-Feb-2010 |
Costin Manolache <costin@google.com> |
Switch from REMOTE_INTENT to the new push messaging, add the required permission.
/frameworks/base/core/res/AndroidManifest.xml
|
a87240c2270e83c3e865ffa1e56f79bfa74daffc |
|
12-Feb-2010 |
Christopher Tate <ctate@google.com> |
Remove BACKUP_DATA permission and associated checks Any package can now participate in backup/restore, without requiring any manifest-declared permission. *Control* of the backup manager is still guarded by the BACKUP permission, which is signatureOrSystem. Change-Id: I116fcfcd4cd255e3c976330da1c4dea7d4faae9d
/frameworks/base/core/res/AndroidManifest.xml
|
27b28b3f62bd3b54fa13acd5d035940b9be464f3 |
|
09-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Introduce special UI modes for night and car usage. The device mode is now called ui mode. Furthermore is the order of precedence for the resources now in such a way that the ui mode needs to be specified after the orientation and before the density. The ui mode can be set, like it is done for the locale, as follows: IActivityManager am = ActivityManagerNative.getDefault(); Configuration config = am.getConfiguration(); config.uiMode = Configuration.UI_MODE_TYPE_CAR | Configuration.UI_MODE_NIGHT_ANY; am.updateConfiguration(config); To allow users to disable the car mode and set the night mode the IUiModeManager interface is used. The automatic night mode switching will be added in a separate change.
/frameworks/base/core/res/AndroidManifest.xml
|
18e939623556928f73fcc7511c85a537929a4a7e |
|
11-Feb-2010 |
Dan Egnor <egnor@google.com> |
Eliminate dependencies on Checkin, replacing checkin events with EventLog events (and in one case, a DropBox entry). Add a simple intent that triggers master-clear (and toggle EFS), given the right permissions. Bug: 2264596 Bug: 2350452 Bug: 2264596
/frameworks/base/core/res/AndroidManifest.xml
|
91f2a20a5957095a6cba9f97326ea0f1eab17195 |
|
09-Feb-2010 |
Bjorn Bringert <bringert@android.com> |
Add content provider for browser geolocation permissions This replaces the old Google-specific geolocation setting. Fixes http://b/issue?id=2428694 Part of http://b/issue?id=2383870 Change-Id: I6308b476ad18b1d71d7438b936c592a45365c9f0
/frameworks/base/core/res/AndroidManifest.xml
|
4154c07c5cabc74029a2df379075391d782a682c |
|
10-Feb-2010 |
San Mehat <san@google.com> |
StorageNotification: Move notification / usb storage activity into StatusBarPolicy Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
97e44947282b3918ee0bed2d16b33b983f882580 |
|
05-Feb-2010 |
Dan Egnor <egnor@google.com> |
Add an AlarmManager API to set the system time (with the proper permissions).
/frameworks/base/core/res/AndroidManifest.xml
|
d0e18ffb82b59d38aeaf0e552f48e734202719ab |
|
26-Jan-2010 |
Robert Greenwalt <robdroid@android.com> |
First pass at USB Tethering. bug:2281900
/frameworks/base/core/res/AndroidManifest.xml
|
b94f795c257e32a1d7be1115568b5b6f576dec37 |
|
28-Jan-2010 |
Daniel Sandler <dsandler@google.com> |
New full-screen activity for USB mass storage interaction. Still TODO: patch into forthcoming callbacks from MountService so the USB storage activity always shows the correct state of the device. (Right now it only refreshes its display onResume.) Bug: 2299129
/frameworks/base/core/res/AndroidManifest.xml
|
c028be4f3b8c7476b46859f66c3f33d528adf181 |
|
25-Jan-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
AppsOnSd feature - Add default container Add new remote interface to do temporary copies. The new remote stub handling is done on mHandler thread and doesn't need locking for now. Add new InstallArgs class and subclasses to isolate cases for installation. Move resource deletion for failed installs/upgrades to later on in installation cycle. Fix code path for forward locked apps when using scanPackageLI TODO's Fix installation paths to completely use InstallArgs based design later on. Get rid of using flags in various install/uninstall code paths. Ideally InstallArgs should be created using these flags and used in the rest of the code. Function renames. Revisit mount api's.
/frameworks/base/core/res/AndroidManifest.xml
|
02735bc9b7686e56957cdec9c10660c4a6dd1090 |
|
27-Jan-2010 |
San Mehat <san@google.com> |
MountService: Introduce new @hide permissions to protect secure containers. Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d68478467e3f837511196c80891d7245d0e163df |
|
13-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
First pass at new device policy and administration APIs. This adds new DevicAdmin, DevicePolicyManager, and DeviceAdminInfo classes. See the java docs for each on documentation on them. Basically: a DeviceAdmin is what you derive from to administer a device; DevicePolicyManager is what you use to apply and check your policy requirements and perform other administration tasks.
/frameworks/base/core/res/AndroidManifest.xml
|
6e99b7a3b29fbb1936463a3a48fe693dae909c8f |
|
07-Jan-2010 |
Doug Zongker <dougz@android.com> |
add ACCESS_CACHE_FILESYSTEM permission to core manifest All of the permissions in data/etc/platform.xml are defined in core/res/AndroidManifest.xml, except for ACCESS_CACHE_FILESYSTEM. Add it. Change-Id: If7906bc0007484cc21196fb1c0593b967fd79920
/frameworks/base/core/res/AndroidManifest.xml
|
03abb8179f0d912e6dabfc0e2b0f129d85066d17 |
|
05-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
Kill the task killers. The ActivityManager.restartPackage() API is now deprecated, and no longer allows applications to mess up the state of other applications. This was being abused by task killers, causing users to think their other applications had bugs. A new API is introduced for task killers, ActivityManager.killBackgroundProcesses(), which allows these applications to kill processes but only the same amount that the out of memory killer does, thus causing no permanent damage. The old restartPackage() API is now a wrapper for calling this new API. There is also a new private forceStopPackage() API that is used for the system's force stop UI which does what the old restartPackage() API did.
/frameworks/base/core/res/AndroidManifest.xml
|
9256bb08d22b0dad73bdc3f14929dc519dc02414 |
|
19-Dec-2009 |
Scott Main <smain@google.com> |
am 9a6c8168: am 77fa05a4: Merge change Iab5952e1 into eclair Merge commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd' * commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd': docs: add "required" attribute to the <uses-feature> docs
|
0b91635caf91b76d304e80997c82fe582b636428 |
|
18-Dec-2009 |
Scott Main <smain@google.com> |
docs: add "required" attribute to the <uses-feature> docs and add a note to the CAMERA permission stating that it enables the <uses-feature> for camera. This is an incrimental update for the 2.0.1 docs. More changes to come for the 2.1 docs to include more features
/frameworks/base/core/res/AndroidManifest.xml
|
9ed7dc10d263a505da32522139098f085fee811a |
|
02-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
am 5886050f: Merge change I0d8f7593 into eclair Merge commit '5886050fad97923c33cbc831fe07a5b1746b2b58' into eclair-mr2 * commit '5886050fad97923c33cbc831fe07a5b1746b2b58': Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op
|
a7ca0e5e320bbb643f8bc9feb4717dbc5e78e0b9 |
|
01-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op Change-Id: I0d8f75938226e1bb49cf7b1154445631b0bb0bc9
/frameworks/base/core/res/AndroidManifest.xml
|
50a21f4d3b70360b36acad20e234c380654fd59f |
|
19-Nov-2009 |
Doug Zongker <dougz@android.com> |
add reboot() method to PowerManager In order to unbundle System Update, we need some to expose in the SDK some way to reboot the device into recovery. Add a reboot() method to PowerManager, protected by the android.permission.REBOOT permission.
/frameworks/base/core/res/AndroidManifest.xml
|
ac63ebc82433347e6c8e74e26fa670717acffac7 |
|
13-Nov-2009 |
Dan Egnor <egnor@google.com> |
Make WRITE_GSERVICES into system-or-signature (instead of just signature), as a temporary measure so unbundled Google components (GSF, etc.) can hold it. (In the longer term, WRITE_GSERVICES won't be a system permission at all, but it or something like it will be defined directly by GSF.)
/frameworks/base/core/res/AndroidManifest.xml
|
362d5b9b6429a2766f5b980d2010262135788ad8 |
|
12-Nov-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2256032: Change CONFIGURATION_CHANGED and add a locale changed broadcast You can no longer receive CONFIGURATION_CHANGED in a manifest, which is really really bad (launching apps every time the screen is rotated!). A new LOCALE_CHANGED broadcast is sent that you can receive in a manifest. Change-Id: I80022375f0716db2e672382a29db3cea1af74702
/frameworks/base/core/res/AndroidManifest.xml
|
f7ae77cd67f1a3993b8e56c1af4720a7adf4e69d |
|
03-Oct-2009 |
Fred Quintana <fredq@google.com> |
account manager api review changes
/frameworks/base/core/res/AndroidManifest.xml
|
29e4a3c566f435c32f0b95e4ac8e8b33cac6faba |
|
01-Oct-2009 |
Dianne Hackborn <hackbod@google.com> |
Update from API review. Change-Id: I16b1c566f91167aac9615ac59dd297a154c828ea
/frameworks/base/core/res/AndroidManifest.xml
|
96cb8d0b94b5737d0a06088bff3bf409ced3cd3d |
|
30-Sep-2009 |
Debajit Ghosh <debajit@google.com> |
fix account permission strings. this permission is used to protect more than just Google accounts.
/frameworks/base/core/res/AndroidManifest.xml
|
aef405d82931a08a7683cf0f58b5e74dbe268d45 |
|
28-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Allow wallpaper picker to work. Change-Id: I379f25e0e8e372d72c0a89e71ccd584a5dbb3648
/frameworks/base/core/res/AndroidManifest.xml
|
4cc86e1ae80eb1938500fe5fa06bbdf8b4b7b50d |
|
22-Sep-2009 |
Christopher Tate <ctate@android.com> |
Clear the device's data from the transport when backup is disabled Turning off backup in the Settings UI constitutes an opt-out of the whole mechanism. For privacy reasons we instruct the backend to wipe all of the data belonging to this device when the user does this. If the attempt fails it is rescheduled in the future based on the transport's requestBackupTime() suggestion. If network connectivity changes prompt the transport to indicate a backup pass is appropriate "now," any pending init operation is processed before the backup schedule is resumed. The broadcasts used internally to the backup manager are now fully protected; third party apps can neither send nor receive them. (Also a minor logging change; don't log 'appropriate' EOF encountered during parsing of a backup data stream.)
/frameworks/base/core/res/AndroidManifest.xml
|
ffa424800d0338b8b894aef2ea1e3e3344cbda7a |
|
24-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2133206: dialogs/menus should auto-dismiss when screen turns off Lot of infrastructure for more things to go away when "clear system dialogs" happens, and now do this when we turn on the lock screen. Change-Id: I567130296fe47ce82df065ed58ef21b37416ceaf
/frameworks/base/core/res/AndroidManifest.xml
|
72440a0e2c8f73240e0dcee36e58b1840ffbb5fd |
|
16-Sep-2009 |
Nick Pelly <npelly@google.com> |
Allow only System Service to send most Bluetooth intents. Change-Id: I9f63425995f12741b60b85cdffe5a94e97ca03f1
/frameworks/base/core/res/AndroidManifest.xml
|
5e1ab335e6e8fbfa19c64d53880a22f472010953 |
|
02-Sep-2009 |
Christopher Tate <ctate@android.com> |
Expand apps' control over the settings restore process Applications can now specify two more aspects of the restore process: whether they need to run with their own custom Application subclass rather than being launched in the usual restricted mode during restore, and whether it's okay for the backup manager to kill the app process once restore has completed. The new manifest attributes for these are, respectively, android:restoreNeedsApplication and android:killAfterRestore. If unspecified in the manifest, restoreNeedsApplication is false, and killAfterRestore is true. In order to support kill-after-restore cleanly, this change also adds a new system-process-only interface to the Activity Manager, which will schedule a "commit suicide" event on the target app's main thread looper. The framework backup agents have been given the appropriate new backup attributes as well.
/frameworks/base/core/res/AndroidManifest.xml
|
284ac93aa30642fda87d5c40263a1263677c21cd |
|
28-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
More work on wallpapers: animations, lifecycle, scaling, etc. Yet more work on improving the behavior of wallpapers. This fixes a few problems in their lifecycle (corresponding change in the picker also required for this), makes their animations better for hardware that supports alpha fades, adds animations for the wallpapers themselves, eliminates fixed size wallpapers, and adjusts the API for retrieving a wallpaper bitmap to take care of scaling the raw wallpaper image to match the current desired width and height. Change-Id: If1c0aaceba4ea4e175dcb7a8416ca7ddbb9bfa6f
/frameworks/base/core/res/AndroidManifest.xml
|
22d1f9fb23015471de6af1a70e40fb5c82ecb665 |
|
19-Aug-2009 |
Danke Xie <dankex@qualcomm.com> |
gps: Network initiated SUPL Initial contribution from Qualcomm. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
767be5f0b929cc1eeb8a7d5aa7a02e228053e9bb |
|
26-Aug-2009 |
Jim Miller <jaggies@google.com> |
Integrate CDMA provisioning into SetupWizard
/frameworks/base/core/res/AndroidManifest.xml
|
edc5ff862877d679578cbe9ecbbc806782620968 |
|
18-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
am c678a93a: Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode Merge commit 'c678a93a73c83e841032874bee9c202936da73c0' into eclair * commit 'c678a93a73c83e841032874bee9c202936da73c0': Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
|
c678a93a73c83e841032874bee9c202936da73c0 |
|
17-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
/frameworks/base/core/res/AndroidManifest.xml
|
f21adf6fc19bc9c6908c6f1aaae203389f104bfa |
|
13-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Always have a wallpaper service running.
/frameworks/base/core/res/AndroidManifest.xml
|
0749dcd19301fe4093f9cf8677c722d17bceabfb |
|
14-Aug-2009 |
Christopher Tate <ctate@android.com> |
Backup participants must now hold the BACKUP_DATA permission Packages that do not use android.permission.BACKUP_DATA will neither be backed up nor restored. That permission is currently signature-only. In the future if access to the backup/restore infrastructure is made available to arbitrary 3rd party applications, the permission checks (and indeed, the permission itself) can simply be removed.
/frameworks/base/core/res/AndroidManifest.xml
|
4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 |
|
09-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Very primitive wallpapers in a surface. This is all of the basic pieces: - The WallpaperService now creates a surface with the window manager for its contents. - There is a simple service that displays a bitmap. - The wallpaper manager takes care of starting and stopping the service. - The window manager knows about wallpaper windows and how to layer them with the windows that want to be shown on top of wallpaper. Lots and lots of issues remain, but at this point you can actually write a wallpaper service, select it in the UI, and see it behind an activity.
/frameworks/base/core/res/AndroidManifest.xml
|
49f746823eafabbf251f27a059ddd8c94ada04f1 |
|
31-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Remove android:multiprocess from ShutdownActivity to ensure it runs in the system process. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
bad80e0dccdeaeea97991f7d092678ff0df1bc84 |
|
30-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Add Activity Intent.ACTION_REQUEST_SHUTDOWN for requesting a system shutdown. The Intent.EXTRA_KEY_CONFIRM extra can be set to require user confirmation before shutting down. The ACTION_REQUEST_SHUTDOWN Intent is protected by android.permission.SHUTDOWN. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9bb8fd77c8dc177aab9ac96bed4f55972dcda70a |
|
29-Jul-2009 |
Joe Onorato <joeo@android.com> |
Only restore the bits for wallpapers that aren't built in.
/frameworks/base/core/res/AndroidManifest.xml
|
02f5228c3c224dc8804cbedd40899fa0c42bfd4a |
|
29-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f0d83fd9 to master
|
7f2054392e9957d3ba8579ef08c29cfb27df564e |
|
28-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Updates from API review. * AccessibilityService -- document onBind() to not be implemented. * GestureLibrary.getLearner() -- needs to be hidden. * IntentSender -- remove protected constructors, document that it is retrieved from a PendingIntent. * Hide permissions: SHUTDOWN, STOP_APP_SWITCHES. * Context -- hide BACKUP_SERVICE. * ContextWrapper -- hide getSharedPrefs bla h blah * Intent.parseUri() -- fix docs. * ApplicationInfo.FLAG_TEST_ONLY?!? * Hide MockContext.getSharedPrefs blah blah
/frameworks/base/core/res/AndroidManifest.xml
|
143a2ce1ea33aeba81cff26f66144065d379dc64 |
|
27-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am ba989ad0: Merge change 8648 into donut Merge commit 'ba989ad0ed91beda010d44945fa015d75d99cf67' * commit 'ba989ad0ed91beda010d44945fa015d75d99cf67': Use the old string for bookmarks permissions.
|
e7d1c8f3777375468de2e5932a691ef388ee2e75 |
|
27-Jul-2009 |
Leon Scroggins <scroggo@google.com> |
Use the old string for bookmarks permissions. When we made the bookmark permissions public, we also changed their names, which might break existing apps. Change them back. Depends on a change in packages/apps/Browser
/frameworks/base/core/res/AndroidManifest.xml
|
d4a1d2e14297a3387fdb5761090961e714370492 |
|
17-Jul-2009 |
Fred Quintana <fredq@google.com> |
add account manager permission checking
/frameworks/base/core/res/AndroidManifest.xml
|
602bee5bf2a4f688b050077291288b473a7cc6db |
|
13-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am cf29e116: Merge change 6867 into donut Merge commit 'cf29e116129f38309c18ba14b9893b079a712289' * commit 'cf29e116129f38309c18ba14b9893b079a712289': CLOSE_SYSTEM_DIALOGS can't be protected.
|
4554f30c834723db6946400bf1827be4419a3134 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
CLOSE_SYSTEM_DIALOGS can't be protected.
/frameworks/base/core/res/AndroidManifest.xml
|
54a26bc85f4fe972e929e42b986c65a710a229b3 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 889c2d37 to master
|
854060af30f928c0a65591e9c8314ae17056e6b8 |
|
10-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix bug #1873249i: Apps can DoS/brick device This is the problem where various things are listening for broadcasts (such as battery status, PIN/PUK/Network) that an application can send to cause harm to the system. Solving this is tricky because many of these broadcasts are sticky, and I have never figured out how to do permissions with sticky broadcasts in a sane way. So instead, I am going to punt on the general problem and just brute force it: There is new a way for system components to declare specific broadcast actions to be protected, which means that only the system and the phone can send them. This is good enough for now. None of it is exposed in the public API so we can make something a little less stupid in the future if we ever need to.
/frameworks/base/core/res/AndroidManifest.xml
|
e3f054411b9f025848f68389c4e2c325e76b3826 |
|
09-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 2af632f8 to master
|
2af632f87d487deaa5b2eb71341cfc4f0c0d1173 |
|
08-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Add new <path-permission tag for use by global search. This adds a new <path-permission> tag you can use inside of a <provide> to define additional path-based permissions that broaden the global read and write permissions. The initial use for this will be global search, so that a content provider that is protected by permissions can make a part of itself available to global search under another permission. This addresses the issue with global search not being able to request permissions it would need of providers it doesn't know about at build time.
/frameworks/base/core/res/AndroidManifest.xml
|
5ad2f1c05ed69176849f535e4a8ab02e50e8e048 |
|
30-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am dbcd9c34: Merge change 5654 into donut Merge commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4' * commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4': The BACKUP permission should have the signatureOrSystem protectionLevel,
|
8aeaf2e079a1776c5b17f95bf7ad401966f2beef |
|
29-Jun-2009 |
Joe Onorato <joeo@android.com> |
The BACKUP permission should have the signatureOrSystem protectionLevel, because the setup wizard isn't signed by the same cert as the framework.
/frameworks/base/core/res/AndroidManifest.xml
|
cc79800a741e4ee55ecfa7ec236b0087d83e41e4 |
|
25-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5416d7c9: Merge change 5317 into donut Merge commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2' * commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2': Start backing up wallpaper
|
111bd4acdb378266221b430a284f88a3990a3958 |
|
25-Jun-2009 |
Christopher Tate <ctate@google.com> |
Start backing up wallpaper This CL does the following: + adds an AbsoluteFileBackupHelper class for managing backup of files known by absolute path, not based off of the app's getFilesDir() root + bumps up the collection interval from its testing-only default of 1 second to 3 minutes + adds a SystemBackupAgent class to the main system package and names it as the android:backupAgent for the main OS package. Right now this agent only backs up & restores the wallpaper file. + amend the Wallpaper Service to inform the Backup Manager when the wallpaper changes. On the subject of the 3-minute collection interval before the backup actually occurs: this can be short-circuited from an adb shell. Running the command 'bmgr run' will cause the Backup Manager to kick off any pending backup operations immediately.
/frameworks/base/core/res/AndroidManifest.xml
|
d6377fbe7eb570b880ce5f1fcc71a556a24961ba |
|
22-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
resolved conflicts for merge of 9336f5d9 to master
|
9ce4c6c5cfc111a73e0cfc3c94daa50346c56867 |
|
19-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
Make browser bookmarks permissions part of the public API.
/frameworks/base/core/res/AndroidManifest.xml
|
3c3d3081aad5d3a0cadd18c7764974060c1a5274 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 727f36c6: Merge change 4265 into donut Merge commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef' * commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef': process: Fix bug where if a thread exited while we were changing its control Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally
|
29930a1cb884885f92c72a76e42e795ac948edc3 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 3dcea047: Merge change 4237 into donut Merge commit '3dcea047c5c7a61a56f618815e298d7bd38e2678' * commit '3dcea047c5c7a61a56f618815e298d7bd38e2678': Remove obsolete FOTA_UPDATE permission (which should never have been
|
48f72206dc4215ea2eb3898043eb713b5b72e135 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am aa67df9f: Merge change 4248 into donut Merge commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3' * commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3': Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions.
|
cb05cc4acba4724d06120d2c606d955751bd0d11 |
|
16-Jun-2009 |
Dan Egnor <egnor@google.com> |
Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally reintroduced in an errant and clumsy git merge operation. Also remove permission label and description strings for now-deleted permissions FOTA_UPDATE and (within the SettingsProvider package) WRITE_GSERVICES.
/frameworks/base/core/res/AndroidManifest.xml
|
2d4b6ad9d4c7e3e2dbb6a127f37271686253d71f |
|
15-Jun-2009 |
Dan Egnor <egnor@google.com> |
Remove obsolete FOTA_UPDATE permission (which should never have been made public, and wouldn't be used by any third party applications, and no longer does anything regardless). Also remove the WRITE_GSERVICES permission from the SettingsProvider package's manifest (the declaration there was redundant with the one in the core manifest, where all the other settings-related permissions live -- no other core package includes its own permission definitions).
/frameworks/base/core/res/AndroidManifest.xml
|
29148f90cd9fb34ff64f76936347547885906eb9 |
|
16-Jun-2009 |
Dianne Hackborn <hackbod@google.com> |
Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions. These are no longer used.
/frameworks/base/core/res/AndroidManifest.xml
|
7c49790cde0acb494b6e8980662842c95dd8859a |
|
01-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 162c9d0e: Merge change 2805 into donut Merge commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47' * commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47': base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE
|
5a3a77dabd744d5be79d7745c2a977c108a9ad98 |
|
01-Jun-2009 |
San Mehat <san@google.com> |
base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ad6042aa2342d0a869f84772774b47ae87346ccf |
|
01-Jun-2009 |
Christopher Tate <ctate@google.com> |
am 181fafaf: Retool the backup process to use a new \'BackupAgent\' class Merge commit '181fafaf48208978b8ba2022683ffa78aaeddde1' * commit '181fafaf48208978b8ba2022683ffa78aaeddde1': Retool the backup process to use a new 'BackupAgent' class
|
181fafaf48208978b8ba2022683ffa78aaeddde1 |
|
14-May-2009 |
Christopher Tate <ctate@google.com> |
Retool the backup process to use a new 'BackupAgent' class Backups will be handled by launching the application in a special mode under which no activities or services will be started, only the BackupAgent subclass named in the app's android:backupAgent manifest property. This takes the place of the BackupService class used earlier during development. In the cases of *full* backup or restore, an application that does not supply its own BackupAgent will be launched in a restricted manner; in particular, it will be using the default Application class rather than any manifest-declared one. This ensures that the app is not running any code that may try to manipulate its data while the backup system reads/writes its data set.
/frameworks/base/core/res/AndroidManifest.xml
|
96cdc61c69aa735e65295a50e3e2922425b3c877 |
|
28-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 1e2e44e9: Merge change 2365 into donut Merge commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc' * commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc': Fix wifi multicast API for public use. Revert "Bug fixes and performance improvements"
|
fc1b15cfbfc5f69235ec1f367abd7a909381cd05 |
|
23-May-2009 |
Robert Greenwalt <robdroid@android.com> |
Fix wifi multicast API for public use. Applying API review comments and taking it public.
/frameworks/base/core/res/AndroidManifest.xml
|
9b1e1400df4c6c4b69985f164097f0c842dd796f |
|
21-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 8c690ea9: Merge change 2182 into donut Merge commit '8c690ea9976d644db3c96eddbbbd2d50eac56913' * commit '8c690ea9976d644db3c96eddbbbd2d50eac56913': location: Replace ILocationCollector interface with new ILocationProvider method
|
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 |
|
21-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Replace ILocationCollector interface with new ILocationProvider method This change replaces ILocationCollector with a more general mechanism that passes locations received from a provider to all other providers. The network location provider now uses this to implement the location collector. In the future, this could be used to inject network locations to the GPS as aiding data. This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0bcad89a58ad49a0a836902ad41584777ca1f3f3 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
am 95fc68f2: Fix issue where apps could prevent the user from going home. Merge commit '95fc68f24a2a93e5664e2234abcfe479d385cc05' * commit '95fc68f24a2a93e5664e2234abcfe479d385cc05': Fix issue where apps could prevent the user from going home.
|
95fc68f24a2a93e5664e2234abcfe479d385cc05 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue where apps could prevent the user from going home. Now we have a 5-second time after home is pressed, during which only the home app (and the status bar) can switch to another app. After that time, any start activity requests that occurred will be executed, to allow things like alarms to be displayed. Also if during that time the user launches another app, the pending starts will be executed without resuming their activities and the one they started placed at the top and executed.
/frameworks/base/core/res/AndroidManifest.xml
|
470c1a8f394597329b400874f0b3afb58e558a1a |
|
19-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
am af999280: Change BIND_APPWIDGET to be signatureOrSystem. Merge commit 'af9992802992aaccfe1fb5893448939f215dd607' * commit 'af9992802992aaccfe1fb5893448939f215dd607': Change BIND_APPWIDGET to be signatureOrSystem.
|
af9992802992aaccfe1fb5893448939f215dd607 |
|
18-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
Change BIND_APPWIDGET to be signatureOrSystem. See http://b/issue?id=1839074 for more details.
/frameworks/base/core/res/AndroidManifest.xml
|
62da8461ed5317fe78ae5e3793662694e7fc99a3 |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
97ecc9cbe7eccafc0923d7655daf07f4c2ea9791 |
|
12-May-2009 |
Wei Huang <weih@google.com> |
define Intent.ACTION_REMOTE_INTENT, which replaces the old GTalk data messaging intent "android.intent.action.GTALK_DATA_MESSAGE_RECEIVED". The remote intent concept shouldn't be limited to Google or GTalkService. It should be owned by the Android platform.
/frameworks/base/core/res/AndroidManifest.xml
|
3531fdb1d9a0ca536bd7a7a27d35b3e62c318ad9 |
|
08-May-2009 |
The Android Open Source Project <initial-contribution@android.com> |
merge 55280a9 Merge commit '55280a9'
|
55280a91884b9256e8db6af6a09f28b3feeaa9d8 |
|
08-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Improve shutdown process to send broadcast for applications. This introduces a new class in the base platform for performing a clean shutdown (which was copied from the classes in the policies). It includes new features to send a shutdown broadcast for applications to do cleanup, and ot have the activity manager pause the current activity before proceeding with the shutdown. These facilities are also use to write at the most recent stat files for sync, battery and user activity.
/frameworks/base/core/res/AndroidManifest.xml
|
7a1355950172b7a549820e9a2cd4a9b2099ec32f |
|
06-May-2009 |
Dianne Hackborn <hackbod@google.com> |
merged 231cc608d06ffc31c24bf8aa8c8275bdd2636581
|
231cc608d06ffc31c24bf8aa8c8275bdd2636581 |
|
28-Apr-2009 |
Dianne Hackborn <hackbod@google.com> |
Rewrite SyncStorageEngine to use flat files and in-memory data structures. The previous implementation used a database for storing all of its state, which could cause a significant amount of IO activity as its tables were updated through the stages of a sync. This new implementation replaces that in-memory data structures, with hand-written code for writing them to persistent storage. There are now 4 files associated with this class, holding various pieces of its state that should be consistent. These are everything from a main XML file of account information that must always be retained, to a binary file of per-day statistics that can be thrown away at any time. Writes of these files as scheduled at various times based on their importance of the frequency at which they change. Because the database no longer exists, there needs to be a new explicit interface for interacting with the sync manager database. This is provided by new APIs on IContentService, with a hidden method on ContentResolver to retrieve the IContentService so that various system entities can use it. Other changes in other projects are required to update to the new API. The goal here is to have as little an impact on the code and functionality outside of SyncStorageEngine, though due to the necessary change in API it is still somewhat extensive.
/frameworks/base/core/res/AndroidManifest.xml
|
e90c0da675a945a86ac06098c1f5694ddc4efb23 |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
am 275555c: location: Add support for location providers outside of the Merge commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e' * commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e': location: Add support for location providers outside of the system process.
|
275555c8eb3fb5df6e7320873b88b77cdde85a9e |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Add support for location providers outside of the system process. Also added new permissions android.permission.INSTALL_LOCATION_PROVIDER and android.permission.INSTALL_LOCATION_COLLECTOR to the public API. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
1e89ef82b1cb06034c30f9772f936a8a0cf4a7df |
|
29-Apr-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 947fe79: Merge change 483 into donut Merge commit '947fe79e99d5536a10c5b81946d20e69d0e9d479' * commit '947fe79e99d5536a10c5b81946d20e69d0e9d479': API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings
|
29b57e63e54321f99ff086bb25439098d83292f6 |
|
23-Apr-2009 |
San Mehat <san@google.com> |
API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3326920329cecb57c7ff1fc5c6add5c98aab9ed9 |
|
21-Apr-2009 |
Fred Quintana <fredq@google.com> |
adding concept of features to accounts
/frameworks/base/core/res/AndroidManifest.xml
|
935ae463d495d41155e27feb849768ad2b8b16db |
|
14-Apr-2009 |
Dianne Hackborn <> |
AI 145994: Integrate #145778 from Donut. Automated import of CL 145994
/frameworks/base/core/res/AndroidManifest.xml
|
f8a7ceaef2e7d5cd530c9426bde91b6fa9a40b75 |
|
11-Apr-2009 |
Andy Stadler <> |
AI 145778: Manual merge changes 145382-145384 from cupcake. Automated import of CL 145778
/frameworks/base/core/res/AndroidManifest.xml
|
15ba27802eb23e01f4fada11f3fa1f35925eab49 |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/master/...@142576,142576
/frameworks/base/core/res/AndroidManifest.xml
|
603073430bbcb1bd29db7afb9b14e2732ad589fb |
|
25-Mar-2009 |
Fred Quintana <> |
Automated import from //branches/master/...@142414,142414
/frameworks/base/core/res/AndroidManifest.xml
|
7d1e577d5f7ae96bfc533e1c73a3a6a272a4a16d |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/donutburger/...@142472,142472
/frameworks/base/core/res/AndroidManifest.xml
|
246924180995326ed368dadbc59772b41095d6e6 |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/master/...@140750,140750
/frameworks/base/core/res/AndroidManifest.xml
|
77323363091b42060bfd697ffb33ce6b3696ad6f |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/donutburger/...@140749,140749
/frameworks/base/core/res/AndroidManifest.xml
|
c39a6e0c51e182338deb8b63d07933b585134929 |
|
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
/frameworks/base/core/res/AndroidManifest.xml
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
076357b8567458d4b6dfdcf839ef751634cd2bfb |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@132589
/frameworks/base/core/res/AndroidManifest.xml
|
3dec7d563a2f3e1eb967ce2054a00b6620e3558c |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@137055
/frameworks/base/core/res/AndroidManifest.xml
|
3001a035439d8134a7d70d796376d1dfbff3cdcd |
|
19-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@132276
/frameworks/base/core/res/AndroidManifest.xml
|
d24b8183b93e781080b2c16c487e60d51c12da31 |
|
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
/frameworks/base/core/res/AndroidManifest.xml
|
22f7dfd23490a3de2f21ff96949ba47003aac8f8 |
|
20-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@127101
/frameworks/base/core/res/AndroidManifest.xml
|
b798689749c64baba81f02e10cf2157c747d6b46 |
|
10-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@125939
/frameworks/base/core/res/AndroidManifest.xml
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/frameworks/base/core/res/AndroidManifest.xml
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/frameworks/base/core/res/AndroidManifest.xml
|