4dbb37ae95bdf60d230777c6a5e8d53b932e9d40 |
|
11-Aug-2015 |
Esteban Talavera <etalavera@google.com> |
Merge "Update setApplicationRestrictions documentation" into mnc-dev
|
6b8e06495b8bf7a9aeecb8f189fd174fcc457235 |
|
10-Aug-2015 |
Esteban Talavera <etalavera@google.com> |
Update setApplicationRestrictions documentation From M we support nested Bundles in the input parameter Bug: 23076454 Change-Id: I9c27d19ccfbc713ca757cbdde7ea9fbbc3839302
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
190a88d2ce6a08d0eb98d774b81e5ca6b82b45f8 |
|
06-Aug-2015 |
Alan Treadway <alantreadway@google.com> |
Merge "Update documentation of DevicePolicyManager intents." into mnc-dev
|
4582f8113d1f072087b57acbc915cc066f93917d |
|
28-Jul-2015 |
Alan Treadway <alantreadway@google.com> |
Update documentation of DevicePolicyManager intents. Add additional information about the intentions of result codes in device-owner and profile-owner launch intents, in alignment with changes made in http://ag/732321. Bug: 21063241 Change-Id: I0e0a931739cee5f46e8fc7622fe1de49e26dcb0a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
41f2ccb9e40670e6da9aa3d4deb6bbd74fae91c4 |
|
05-Aug-2015 |
Rubin Xu <rubinxu@google.com> |
Update javadoc for EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE Starting from M, this extra is also supported in NFC bump provisioning. Bug: 22914251 Change-Id: I835d12918c5de4ff782245def6565eeb0f052934
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0e3de6cacaffcfeda4d6353be61e2f1f9ed80705 |
|
30-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Change MNC codename to just M. Change-Id: I4281d200ff6560791c47cf9073ceea1cb509361e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
00799008832e11f06f9ddc0bf721799edee99f28 |
|
27-Jul-2015 |
Nicolas Prevot <nprevot@google.com> |
Send a public broadcast when the device owner is set. Make it a protected broadcast. BUG: 22623518 Change-Id: Ia36e8f0b80a6301d7d8e0461476842c78762b5e8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c088e30fd403b9843a00cc311e460734bd111c26 |
|
08-Jul-2015 |
Benjamin Franz <bfranz@google.com> |
Merge "Clarify javadoc of setPermissionPolicy" into mnc-dev
|
45dd6667e8d42c9df6957fba7e4df99b92b805ea |
|
08-Jul-2015 |
Benjamin Franz <bfranz@google.com> |
Clarify javadoc of setPermissionPolicy Bug: 22192363 Change-Id: I552eae1e84ce866d9873faacb5c261321351915a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3c43095757a673166359553af5dc03159177ebd3 |
|
03-Jul-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Update javadoc on DPM.setGlobalSetting Bug: 19967818 Change-Id: Id91c137f7b5200be8e8b581126a518f3b6be147e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
31659c253e62546c12f17c7f09b7f8df12758371 |
|
30-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Merge "Deprecate APIs for admin to create users." into mnc-dev
|
fef8cbd6a643a621a97f8e5616977e1fb65d9a5f |
|
30-Jun-2015 |
Esteban Talavera <etalavera@google.com> |
Merge "Marking some globals from setGlobalSetting as not supported" into mnc-dev
|
656fa7f5d1ce9299cb63043de80f2b4db9bff497 |
|
29-Jun-2015 |
Esteban Talavera <etalavera@google.com> |
Marking some globals from setGlobalSetting as not supported Those globals don't have the intended behaviour any more. Bug: 19967818 Change-Id: I8c7891e59280f9deb88b1f0ffead3de07f4eca56
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
14f48e5a937b07c83f7e7a37d0319f84171b692d |
|
29-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Deprecate APIs for admin to create users. Bug: 21921868 Change-Id: I0a59c85f6a87928de3df72278d4b65355ff7270f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
43904fd5b7ea74f21859ec94291a70529611304c |
|
29-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Merge "Revert "Deprecate APIs for admin to create users."" into mnc-dev
|
2703a13f11c27c36d1354e49fb70dd663cdf397c |
|
29-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Revert "Deprecate APIs for admin to create users." This reverts commit ea864c4d4d7ca390d3b67868fd2a640411bff020. Change-Id: I827e6364b61eeb9e1b2d3205b5e93e10b1df4bfe
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
bee7245c69cd3d3c1404f35299c3867d1b8525f5 |
|
29-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Hide MIME_TYPE_PROVISIONING_NFC_V2" into mnc-dev
|
01056b36622eafa657c95f9576ec2b4cacb741a4 |
|
29-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Merge "Deprecate APIs for admin to create users." into mnc-dev
|
3cc72bab488b7395347a3f30b40632d78d819b43 |
|
26-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Hide MIME_TYPE_PROVISIONING_NFC_V2 Bug: 21918725 Change-Id: I33d67ff8f7b47ab53cff8a2664d342caf9d6e03f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ea864c4d4d7ca390d3b67868fd2a640411bff020 |
|
22-Jun-2015 |
Kenny Guy <kennyguy@google.com> |
Deprecate APIs for admin to create users. Bug: 21921868 Change-Id: I956d24a8394d95bf975581a3451ceabe01708a10
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c200f44c46b7d6ddb104c0f09f2a4c679e218d0b |
|
25-Jun-2015 |
Benjamin Franz <bfranz@google.com> |
Block assist when screenshots are disabled by policy When a device or profile owner disables screen capture, we also want to block context data being collected for the assist structure. Bug: 21797707 Change-Id: Ib8716c6dd71d538a027c04e1e907c87e2afa0ac8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
28b9570d0235eca305dc76c006a54c8a85cf5db8 |
|
24-Jun-2015 |
Esteban Talavera <etalavera@google.com> |
Reset permission policy to default when device owner goes away Otherwise after the Device Owner is gone, runtime permissions might still be auto granted/denied. I understand that there are many other policies that we don't reset after the device/profile owner goes away (e.g. keyguard enabled/disabled). At least now we have a single method when we could clear the ones that we care about. Bug: 21889278 Change-Id: I6997655e6ef6d474bd25ae1c323eca5b17944b16
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0bf8f7cc3982164a9e11ea4a25ed930e466f1dd8 |
|
22-Jun-2015 |
Amith Yamasani <yamasani@google.com> |
Runtime permissions cannot be set on legacy apps by device policy Clarify docs that runtime permissions can be granted or revoked by a profile owner/device owner only for MNC apps and not legacy apps. Check the targetSdkVersion and return false if legacy app. Remove all policy flags from permissions when cleaning up a device or profile owner. Bug: 21835304 Bug: 21889278 Change-Id: I4271394737990983449048d112a1830f9d0f2d78
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2c3c66a2cf06b4d081f539a1fa01b44780cc65dc |
|
23-Jun-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Merge "Introduce Settings.Global.WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN" into mnc-dev
|
d66559f26da245d433b642d584ef290dc1fabfcc |
|
22-Jun-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Hide device initializer methods/fields." into mnc-dev
|
b4c469095f12972ef04558961ddbdbdfe8305ccb |
|
18-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove FRP wipe support for device initializers" into mnc-dev
|
94e7bf6ed59f386019dcb563145b16e5102bed81 |
|
10-Jun-2015 |
Julia Reynolds <juliacr@google.com> |
Hide device initializer methods/fields. Bug: 21605288 Change-Id: I4c861a053d585c16f8d05cbb3648ee5c82f6ca01
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
dd862aebda15a5b63c90b1b670373028b48172c4 |
|
16-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Deprecate SHA-1 in ManagedProvisioning (API doc change)" into mnc-dev
|
dbc86ad170e2c288f0154a264d12bd6dadf78c45 |
|
16-Jun-2015 |
Benjamin Franz <bfranz@google.com> |
Merge "Update documentation for PASSWORD_QUALITY_SOMETHING" into mnc-dev
|
c6a9653e0a4a8923116a01a5d690f5369ab63e43 |
|
16-Jun-2015 |
Benjamin Franz <bfranz@google.com> |
Update documentation for PASSWORD_QUALITY_SOMETHING Add a mention that PASSWORD_QUALITY_SOMETHING includes patterns. Bug: 20441473 Change-Id: I2608f36e338fb2bfbace80d49ee805841d59fa17
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d92e75776cb19a7ab0f81819a113dd6323860bba |
|
18-May-2015 |
Rubin Xu <rubinxu@google.com> |
Deprecate SHA-1 in ManagedProvisioning (API doc change) Bug: 21153521 Change-Id: Ie4ee70063457260e147e6c00458f96ccc6a425e0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a4f9dc1cf0297dc93615e638fd490e4ef346a249 |
|
12-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
Update doc of ACTION_PROVISION_MANAGED_DEVICE It also supports an optional extra EXTRA_PROVISIONING_ADMIN_EXTRAS_BUNDLE Bug: 21797182 Change-Id: Ie145e6a79dd7eebdbb4cc58e1baba761b9cc5bbf
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
5c82d2cc17df9774e677f6bab9cb52659fc2b56d |
|
02-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
Change references to APK Certificate to Signature The fact that currently apk signature is certificates is just implementation details. Bug: 20820366 Change-Id: Icdd02cb51a550ea71ff83a84e2bdfcc21f8d43ed
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
09ad6bfe9619ff7a61209131f1f3182d53d840d0 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove FRP wipe support for device initializers - Remove ManagedProvisioning NFC parameter key from DevicePolicyManager - Remove wipeIfAllowed from PersistentDataBlockManager Bug: 21558883 Change-Id: I59354b7bb1ef7e0b0346ff9a7d1654780231dff0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
77b2d49abb38fafb91fb99ce603a92f189553cd7 |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove device initializer status messages" into mnc-dev
|
d168d184c02c33863b4eda56fae431437f609e2c |
|
11-Jun-2015 |
Benjamin Franz <bfranz@google.com> |
Merge "Align the behaviour of different lock task modes" into mnc-dev
|
83881bdbdee14cc9726c89019490a0514686f314 |
|
10-Jun-2015 |
Robin Lee <rgl@google.com> |
Policy: make bulk CA uninstalls happen in service Fewer round trips, only one point of contact for bugs to creep in. Bug: 21650477 Change-Id: I1764faa753bd674ecb0d13149d778d99bd2ff4c4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
cedd53adc3875fe1b4275afa35ec5c3ede7b6c39 |
|
09-Jun-2015 |
Julia Reynolds <juliacr@google.com> |
Remove the ability to set a preferred setup activity. Bug: 21557327 Change-Id: I8c1809d25c5f5fcd186dfc0636d8ac47ed5fc903
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
469dd58baecb08d8f6daf559595362ada5fbe545 |
|
09-Jun-2015 |
Benjamin Franz <bfranz@google.com> |
Align the behaviour of different lock task modes Currently lock task modes started by the activity flag android:lockTaskMode behave differently from those started using startLockTask(). With those changes lock tasks initiated by non-priv apps cannot finish without calling into stopLockTask. Revoking the whitelisting on a locked task will also kill that task, independently of the way the lock task mode was started. Bug: 21608206 Change-Id: I841abf1103855e2d7218a4a8ca9b43c105630dc9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
4045d24971fea4f1506ac8f16d4deeb76ac415fe |
|
27-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Introduce Settings.Global.WIFI_DEVICE_OWNER_CONFIGS_LOCKDOWN This setting controls whether WiFi configurations created by a Device Owner app should be locked down (that is, editable or removable only by the Device Owner). Bug: 21427528 Change-Id: I0f8fb72bf9da1597e08d3dfc631d37b6b4178ff5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
64bf7b2870b4fd38c859080441927f5a63196f5a |
|
29-Apr-2015 |
Nicolas Prevot <nprevot@google.com> |
Make ACTION_PROVISION_MANAGED_DEVICE public. Also remove the doc saying that factory reset is impossible if there is a device owner: the device owner may not set the user restriciton DISALLOW_FACTORY_RESET. BUG:19889110 Change-Id: Iadc084a38e541061c0b0c95bfc95da73d48842d7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
25e264507cc665e11d5f0cef1360408b3a2da07e |
|
02-Jun-2015 |
Robin Lee <rgl@google.com> |
Device policy: consistent javadoc and annotations Annotated all uses of the ComponentName parameter to methods in DevicePolicyManager to indicate whether null is acceptable. Deleted/fixed some inconsistent or poorly-worded documentation. Bug: 21422939 Change-Id: Iadfa78c5170bf4899a9daaf93c3d4e9d8b170a45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
240e64828f68064b2a1074a1dda1fc41fe19d711 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove device initializer status messages - Remove ManagedProvision Bluetooth extras from DevicePolicyManager - Remove ManagedProvisioning device initializer status action and extras from DevicePolicyManager. - Remove DIA status update protected-broadcast and permission - Remove DPM.sendDeviceInitializerStatus method Bug: 21559093 Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
12e5fec238c6576c1fdec1a88d6696fc29426797 |
|
28-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Fixed indentation in setProfileName method" into mnc-dev
|
78f1314a695838c0630da96f03af68a107816fa6 |
|
28-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Fixed indentation in setProfileName method Change-Id: I819bfd509b184b7952d8f9c466c9418353f890cb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
184b3753de54241c67799089f5bc59a1ede4438a |
|
22-May-2015 |
Amith Yamasani <yamasani@google.com> |
Add getPermissionGrantState method in device policy This is to have a way to query what permission state was set by the profile owner. Bug: 21356830 Change-Id: Ie396e946b4285267c1d95f82b9d9765b43697d3c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d8ecc5aee49874ac1f100f69be94906a3e99b951 |
|
20-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Allow DO/PO to go back to normal permission state. We have APIs for a DO/PO to fix a permission in a granted or denied state in which the user cannot manage this permission through the UI. However, there is no way to go back to the default state in which the user gets to choose the permission grant state. Change-Id: I2562a1d8b1385cd740b44812844ef14c895c2902
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
467eb0566ff1df320c9a9be3da0f44ee3d6bc9fa |
|
13-May-2015 |
Kenny Guy <kennyguy@google.com> |
Merge "Allowing profile to set a subset of keyguard restrictions." into mnc-dev
|
396d944001f0b897b1689baa0bd7d3e04046b3ca |
|
13-May-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Remove initiator name param." into mnc-dev
|
22fec2201f01222d61c84f536289fd1e8bb5a03f |
|
13-May-2015 |
Nicolas Prevot <nprevot@google.com> |
Merge "Fix the doc for ACTION_MANAGED_PROFILE_PROVISIONED." into mnc-dev
|
ebe2d991602a20e051d94ec77300336383d1e7eb |
|
13-May-2015 |
Nicolas Prevot <nprevot@google.com> |
Fix the doc for ACTION_MANAGED_PROFILE_PROVISIONED. In the html doc, it showed up as (@see #ACTION_PROVISION_MANAGED_PROFILE). Change-Id: I4b3eec26525c6bd87319296f4bb89d037dfc3d03
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
731051e36bb2d420a29cd889a38e02c88c930aad |
|
11-May-2015 |
Julia Reynolds <juliacr@google.com> |
Remove initiator name param. This won't be shown in the UI; it's not needed. Bug: 20820224 Change-Id: I51ecd0a9151a49e26faf52e792a0b316a8facc8e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0b7dd1e6c8422da0a21c1631244bec7a2af5085a |
|
12-Mar-2015 |
Kenny Guy <kennyguy@google.com> |
Allowing profile to set a subset of keyguard restrictions. Allow admins in managed profiles disable trust related keyguard features (trust agents and finger prints) for the parent user. Allow admins in managed profiles to control whether notifications from the profile are redacted on the keyguard. Bug: 18581512 Change-Id: Ic2323671f63781630206cc2efcc8e27ee58c38e6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d86d58cd010b087d6d481062f84c894e0ced7bbc |
|
05-May-2015 |
Rubin Xu <rubinxu@google.com> |
Tweak SystemUpdatePolicy according to API review. Make SystemUpdatePolicy Parcelable; hide public constructor and expose static builder methods. Bug: 20820025 Change-Id: I594ba3c7e5514551134ba6c866b24498b66506bf
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ed1ef7d4eb8934f6940a2e828ebd0e6878e1af89 |
|
09-May-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "DeviceInitializerStatus API review changes" into mnc-dev
|
4e401fa49875e083d18b46e0250be37ad565071c |
|
07-May-2015 |
Craig Lafayette <craiglafa@google.com> |
DevicePolicyManager API review changes Renamed DO_NOT_ASK_CREDENTIALS_ON_BOOT to RESET_PASSWORD_DO_NOT_ASK_CREDENTIALS_ON_BOOT. Bug: 20820907 Change-Id: I6455f9a6d370afbd5154505f402b409dba3b7918
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
9ef04bfb0711d54fc951ca79d38c4d14a0cc817a |
|
06-May-2015 |
Craig Lafayette <craiglafa@google.com> |
DeviceInitializerStatus API review changes - Remove DeviceInitializerStatus.is*Status() - Remove DeviceInitializerStatus.FLAG_STATUS_RESERVED - Rename STATUS_STATE_CONNECT_BLUETOOTH_PROXY to STATUS_STATE_CONNECTING_BLUETOOTH_PROXY - Rename STATUS_STATE_DISCONNECT_BLUETOOTH_PROXY to STATUS_STATE_DISCONNECTING_BLUETOOTH_PROXY Bug: 20819590 Change-Id: I276c5674a36726d3681dcc29e896ad39888d116d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
94fb2024b013522e95a880e02b73886fa7d01222 |
|
06-May-2015 |
Benjamin Franz <bfranz@google.com> |
Merge "Rename functions that disable status bar and keyguard" into mnc-dev
|
bece80645e2b2d84ea65aabfa7fc01d5ad633708 |
|
06-May-2015 |
Benjamin Franz <bfranz@google.com> |
Rename functions that disable status bar and keyguard Rename the DevicePolicyManager functions setKeyguardEnabledState and setStatusBarEnabledState to setKeyguardDisabled and setStatusBarDisabled respectively. Bug: 20820039 Change-Id: I06f6a19ac55b24e66e9f2cb340ead5d940cb2235
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2f46d949e2e901eb4c0dcc3e8e3b8ddba2f24109 |
|
05-May-2015 |
Julia Reynolds <juliacr@google.com> |
Fixing docs. Bug: 20823970 Bug: 20820224 Change-Id: If6b5c43ae5cf88bd5a09adc60c1204ba9e6ab459
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ddd553f2aee4f3821a2f17636bb86d9fa5af9bd7 |
|
30-Apr-2015 |
Robin Lee <rgl@google.com> |
Device policy: use owner label instead of name Managed provisioning does not currently set a meaningful profile owner name. This changes to use the application label as returned by PackageManager.getApplicationLabel which should be more descriptive. Bug: 20679292 Change-Id: I5a0e87ef05b62879a73814e6d338e8b984b81c94
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d49489b3af01c13d3b13af1cd04d53787185cc0a |
|
28-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Permissions control via profile/device owner admin Profile owners and Device owners can set policies for runtime permissions. Blanket grant/deny policy can be set for a user. They can also explicitly grant/revoke permissions for specific apps which cannot be overridden by the user and will not be prompted. [More implementation required in PackageManagerService and PackageInstaller] Bug: 20666663 Change-Id: I2c25c18c2a195db9023a17716d5896970848bb45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
13c58bacc8f1ff35bb24ba19069bab8a41aabf68 |
|
20-Apr-2015 |
Julia Reynolds <juliacr@google.com> |
Allow device initializers to set a preferred setup activity. This activity will launch by default on device reboot or user switch during user initialization, even if there are higher priority 'home' activities. Bug: 20223050 Change-Id: I335aeb010a1ae5db07a4343d26e160c74bd299e1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2806374f9531490296547d4e884ce9163f4ac867 |
|
08-Jan-2015 |
Nicolas Prevot <nprevot@google.com> |
Restrict setting the profile/device owner with a signature-level permission. Create the new permission MANAGE_PROFILE_OWNERS to restrict setting the profile/device owner. BUG:19838376 Change-Id: Ib55a2db85fcb6f34e3b88c398683bddb0ad66868
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
dc105cc91c63c27479d73a21702cd4ba0304acc4 |
|
15-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Enable system service to notify device owners about pending update Create a DevicePolicyManager API which can be used by OTA subsystem to tell device owners about pending updates. Device owners will get a callback from its DeviceAdminReceiver when the update service sends out such notifications. Bug: 20213644 Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
4eb6a36922f5e98fe181c0326cc5721f0e7589ca |
|
02-Apr-2015 |
Andrei Kapishnikov <kapishnikov@google.com> |
Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag A new flag for DPM.resetPassword() method that specifies that the device should be decrypted without asking for the password or pattern. Bug 19250601 Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206 Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
97e2f7d5afebb107a8c2c65a094ae4426bbe701b |
|
21-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Rename public OTA policy APIs in DevicePolicyManager"
|
5faad8e4cdf04211239f076b5d073e26d0ae3207 |
|
20-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Rename public OTA policy APIs in DevicePolicyManager Use the term "SystemUpdate" instead of "OTA", in public DevicePolicyManager APIs that handle OTA policies. Bug: 19650524 Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e94787a027763a6da7428639b0f5d00e23aa2196 |
|
20-Apr-2015 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Add certificate checksum extras."
|
ea2ec97f37c649881f2be8a5cc40bf44080cc632 |
|
16-Mar-2015 |
Benjamin Franz <bfranz@google.com> |
Introduce device owner API to disable the status bar Let the device owner disable the status bar to achieve multi-app single purpose mode. When the status bar is disabled, quick settings, notifications and the assist gesture are blocked. Bug: 19533026 Change-Id: I72830798135136e5edc53e5e2221aebb9a7c7d57
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e4f878cbe663a7b48f879d57ec003cebf0dcd1b6 |
|
14-Apr-2015 |
Sander Alewijnse <salewijnse@google.com> |
Add certificate checksum extras. Bug:19984678 Change-Id: I4fc24ea98869b8331185f53e8aacacdb3775a53d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e36087e5b6eeb92607f4ad5b3b1662bef9bafa4c |
|
07-Apr-2015 |
Benjamin Franz <bfranz@google.com> |
Introduce device owner API to disable the keyguard Let the device owner disable the keyguard to achieve undisturbed single use mode with multiple apps. Calling this API has no effect if a password has been set for the calling user. Bug: 19533026 Change-Id: I6b726b7f36efb669359e9da4b7e3db1f8031dad5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c9c9f7b40ec77217ce595fd152a505481326dc9a |
|
14-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Add setOtaPolicy/getOtaPolicy API in DPMS"
|
0c606812c5102fd19eda4b3e1ffbc9e61fec6430 |
|
14-Apr-2015 |
Ricky Wai <rickywai@google.com> |
Merge "Add Bluetooth Contacts Sharing policy in DevicePolicyManager"
|
778ba135380cda90c4c9317c34e875c00e2743a3 |
|
31-Mar-2015 |
Ricky Wai <rickywai@google.com> |
Add Bluetooth Contacts Sharing policy in DevicePolicyManager Bug: 19990979 Change-Id: Ide9adf66eec5721e50573c03956a1b63b7e8b18b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8027a4ffc285ba39df3a262abfff1cfdd6dd31db |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add setOtaPolicy/getOtaPolicy API in DPMS Allow device owners to set OTA policy for automatically accept/postpone incoming OTA system updates. This class only provides the setting and getting of OTA policy, the actual OTA subsystem should handle and respect the policy stored here. Bug: 19650524 Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c06bbbfe7ac3c848384cb667b23c42ce26cc5d95 |
|
14-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Grant cert installer access to installKeyPair()"
|
dbe31a6616f2e8cb8436ea235149d076302fb793 |
|
02-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Send device initializer status. - Create method in DevicePolicyManager to send device provisioning status to ManagedProvisioning. - Define status updates used by ManagedProvisioning. Bug: 20001077 Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
bc80a260cf9e1278f29bae22738ac6c03caa4ded |
|
07-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Add factory reset protection extras to DPM."
|
eaafdf72a410b445cee9fea274a57f31aec2509f |
|
02-Apr-2015 |
Julia Reynolds <juliacr@google.com> |
Store the device initializer componentname in addition to package. This removes ambiguity about which component in the initializer package handles device initialization when setting up secondary users. Bug: 19992262 Change-Id: I2e48168907725a56cd05d0b51c9f28b34fa28d1a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
acdc1839cf73c5ee1672f19f7098b81abdd4f0bc |
|
02-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Grant cert installer access to installKeyPair() Bug: 20041977 Change-Id: Id0dc0bce8461c71d7220c1802dcca82933805996
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8e27c4ddaeb4414bd0e658553672fa9cc57a41d3 |
|
19-Mar-2015 |
Craig Lafayette <craiglafa@google.com> |
Add factory reset protection extras to DPM. This extra will be sent to ManagedProvisioning via an NFC bump and allow factory reset protection challenges to be cleared. Bug: 19792435 Change-Id: I82b0e35ec7af4372341c202c06b643d6395cc65c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1040da1d4eb99fd2588e4c4d5b08b2e3fc0c7777 |
|
19-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Enterprise quick contact 1/2 Now openQuickContact goes thorough DPM. When a lookup URI is build with a lookup key returned by the enterprise lookup APIs for a corp contact, the lookup key will have a special prefix. In that case we go through DPM and have it launch QC on the managed profile, if the policy allows. For now we use the same DPM policy as enterprise-caller-id to disable this. Design doc: go/cp2-mnc-enterprise-dd Bug 19546108 Change-Id: I831a8190ae902ae3b1248cce6df02e3a48f602d2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
4fd8d4ab2aafe8ed73080408223e8b20a953cfc4 |
|
30-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Revert "Enterprise quick contact 1/2" This reverts commit 75a0882b946df6de4775c9e54ca023ff54f3f678. Change-Id: Ibe332885824b228bf1b1147d141c9395554ff67f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
75a0882b946df6de4775c9e54ca023ff54f3f678 |
|
19-Mar-2015 |
Makoto Onuki <omakoto@google.com> |
Enterprise quick contact 1/2 Now openQuickContact goes thorough DPM. When a lookup URI is build with a lookup key returned by the enterprise lookup APIs for a corp contact, the lookup key will have a special prefix. In that case we go through DPM and have it launch QC on the managed profile, if the policy allows. For now we use the same DPM policy as enterprise-caller-id to disable this. Design doc: go/cp2-mnc-enterprise-dd Bug 19546108 Change-Id: I4840e7fad8a6a60249df07d993d26d03619650d4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
6a38e43b8bc6b4329f5df9493f76a232eece0423 |
|
26-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Fix build breakage by ag/661236 Change-Id: Ia42440f238d76066f449dccc463b0485ab558c4d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a55c27a79b01a7903c765618a174c2273804a249 |
|
26-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Change doc for device initializer agent extra's type."
|
44ef750bd4cefd5141616b7fb482bd62b35dd830 |
|
23-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Change doc for device initializer agent extra's type. Change the DIA extra's type to ComponentName, making it consistent with EXTRA_PROVISIONING_DEVICE_ADMIN_COMPONENT_NAME. Bug: 19891726 Change-Id: Ib41a9d22ff22e114cde80010fbc41db26f2b5f82
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f1989002501f8133141deb7db34733b7c2e21167 |
|
25-Mar-2015 |
Amith Yamasani <yamasani@google.com> |
Merge "Fix documentation for ACTION_SET_PROFILE_OWNER"
|
814e9873bda63cbfbb792009a28af7eae851907c |
|
23-Mar-2015 |
Amith Yamasani <yamasani@google.com> |
Fix documentation for ACTION_SET_PROFILE_OWNER Does not require the mentioned permissions. Bug: 19892754 Change-Id: I22f2563c4f50457dbeb22d734e96a99ef79adf2b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
35e71f57b48ce7e0e5c14d1e14b0ed588148fdc8 |
|
16-Mar-2015 |
Andrei Kapishnikov <kapishnikov@google.com> |
Framework: Introduced new NFC provisioning mime-type application/com.android.managedprovisioning.v2 Related CL: https://googleplex-android-review.git.corp.google.com/657588 Bug: 19673809 Change-Id: I292f9a5b5c511c9102fb43fe938b0389af7fbc54
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
6fd1705fbc748a820cc1360acf8b6cd5999e3ea5 |
|
25-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Fix doc for package checksum in DevicePolicyManager."
|
1cef4196886b0cc1238111d396c1e3665a5fd2ae |
|
24-Mar-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Add Bluetooth connection extras to DPM."
|
e30ab114b1237ad88989a3d4acc608163e707451 |
|
24-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Fix doc for package checksum in DevicePolicyManager. The checksum should be in the URL-safe base64 encoded form. Bug: 19895519 Change-Id: I84523b796b980fb0ab8825c1ab9245489039564a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
97e473e1e19f4338f15395e5b371171fcd6e23ab |
|
19-Mar-2015 |
Craig Lafayette <craiglafa@google.com> |
Add Bluetooth connection extras to DPM. These extras will be used in ManagedProvisioning to allow Bluetooth connections from provisioned devices. Change-Id: I7118acd4ea71e2028a0c9f0c61031c78deef8908
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
151df5db5f7e7b5c094d818bac2c02328eb80b41 |
|
23-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "DPM constants for specifying minimum version numbers for DO and DIA."
|
c173174a20510b0ceae8c4b698725c9f9a09573e |
|
19-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
DPM constants for specifying minimum version numbers for DO and DIA. Bug: 19859261 Change-Id: Id2730dc33d433e21f3afab4f0c31c3371f368afc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ec32b56cc22658ecb549390fe0096fc6d7b5ac2a |
|
03-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add DelegatedCertInstaller API in DPMS Allow device/profile owner to delegate certificate APIs to third-party certificate installer apps. Bug: 19551274 Change-Id: Iaf9abb5ecb1dc0975fa98ea14408fe392d52fbf4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ee1f24ff2985a32b473244cc464b3ca7854de189 |
|
16-Mar-2015 |
Robin Lee <rgl@google.com> |
Merge "Recognise insecure encryption with a new constant"
|
68cc42009e656b785420c531e39c131bbe6729cf |
|
11-Mar-2015 |
Benjamin Franz <bfranz@google.com> |
Allow DO to set Settings.Global.STAY_ON_WHILE_PLUGGED_IN Bug: 19704419 Change-Id: I3fc970eae8ef947775b6b565916bb245dea1b43b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ba4df962972ee271e204d157aa785cb7d0b5d968 |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Document behavior change of isUninstallBlocked() since L MR1"
|
e1e6faad7b212d4042e74ca94f5428a346528ac0 |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Document behavior change of isUninstallBlocked() since L MR1 Bug: 17914630 Change-Id: I39ee2775c104e4dca7ca583b83deef0aa0e4d1e3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e71a2be2ba148dc14b168127b93bb05141d7970e |
|
09-Mar-2015 |
Adrian Roos <roosa@google.com> |
Merge "Revert "Remove TrustAgent whitelisting API""
|
1844025738e58d9556bf875233bfee9e9ff8e4fe |
|
09-Mar-2015 |
Nicolas Prevot <nprevot@google.com> |
Add a new extra to specify the admin component for provisioning. An app may have several device admins. For this case, allow the caller to specify which one will become an active device admin, and the profile owner (in the profile owner flow). BUG:19348295 Change-Id: Ia5f995eed6c7f8933eb00d3250daa703ba6ee616
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2482100fed93eac82f7d4b759bd1ec418b55be58 |
|
06-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow device and profile owners to set a user icon."
|
b37f5182052e7a3ab9e249a434367077c8d82400 |
|
05-Mar-2015 |
Adrian Roos <roosa@google.com> |
Revert "Remove TrustAgent whitelisting API" This reverts commit bc4f2ccf6cfd1a512ad907eda2713ea3c4a1755e and re-enables the API for MNC. Bug: 19461292 Change-Id: I53b94bacb6a879fcc0598edfc0f3d44a9dd9e84c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1c3754a35c434e4102c7ac3dceb887fa137b153b |
|
05-Mar-2015 |
Julia Reynolds <juliacr@google.com> |
Add security check for clearDeviceInitializer in the service. Bug: 19230954 Change-Id: I5c648492bef0d2b579b6f59b91afc890e3092d36
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e925440a551b66a3d3121ec8badaf948d71d66a1 |
|
11-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
DOs can clear the DI; rehide hasUserSetupCompleted. Bug: 19230954 Change-Id: I97467229b23f3c9be1c3c4fff1c888a812f14a95
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
fca04ca0965d5e04dacc025b77f2b4881ee1afd8 |
|
17-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
Allow device and profile owners to set a user icon. Change-Id: I7c2bafb85cff3fa063af7a2f27b76c69172f0525
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
20118f18c11c01c7743b5646cc1a0039c2e90037 |
|
11-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
Allow the device initializer to perform user setup tasks. A device initializer is an application that is allowed to run during user provisioning on device owner devices. During device provisioning (or, user provisioning of the first user of the device), a device initializer is granted device owner permissions. During secondary user provisioning, a device initializer is granted profile owner permissions. Once provisioning is complete for a user, all elevated permissions are removed from the device initializer and the device admin component of the app is disabled. Bug: 19230954 Change-Id: Ib6725fb3b09bb21e4198a5dc0b445ccebb40b27e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2eedc9f96ad225bd4fb745215504f84ab88d8f67 |
|
03-Mar-2015 |
Joe Fernandez <joefernandez@google.com> |
resolved conflicts for merge of 5864f5ed to master Change-Id: I6e413076af7fce85a5300abb2ba529c589dbc7e8
|
246a3a4a797edf5850073ec8f6b8aa997947d09b |
|
03-Mar-2015 |
Joe Fernandez <joefernandez@google.com> |
am 14fcef3b: am c4418980: am a31378dc: Merge "Minor typo fixes in managed profile Javadoc reference pages." into lmp-docs * commit '14fcef3bf02f46a057676d7a6d755daee735c4ea': Minor typo fixes in managed profile Javadoc reference pages.
|
27f5337841f41dabbbf4db57e7091e54c4ab61a0 |
|
03-Mar-2015 |
Andrew Solovay <asolovay@google.com> |
Minor typo fixes in managed profile Javadoc reference pages. See first comment for stage location. bug: 19389235 Change-Id: I2e1d5169a77e3f4000e73f08d493953ce4eee78c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
08c7116ab9cd04ad6dd3c04aa1017237e7f409ac |
|
28-Feb-2015 |
John Spurlock <jspurlock@google.com> |
Remove unused imports in frameworks/base. Change-Id: I031443de83f93eb57a98863001826671b18f3b17
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
abc03c7ae8c9c628de319819a10ce2cbaedf1c86 |
|
26-Feb-2015 |
Nicolas Prevot <nprevot@google.com> |
Merge "Fail silently when changing BLUETOOTH_ON/WIFI_ON directly"
|
6cdb27e7324b43d5e907f2be1de46d8b4db02398 |
|
26-Feb-2015 |
Benjamin Franz <bfranz@google.com> |
Fix javadoc for setLockTaskPackages Bug: 19523388 Change-Id: Idc6bdb6c7c37de2448eb2db84ab1685660639100
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
41916d492c38055928ae5ad1e0b815ff79dc4f5c |
|
24-Feb-2015 |
Nicolas Prevot <nprevot@google.com> |
Fail silently when changing BLUETOOTH_ON/WIFI_ON directly If the device owner tries to change BLUETOOTH_ON or WIFI_ON via DevicePolicyManager.setGlobalSetting, fail silently. There was not much point for the device owner to do it since it can also change bluetooth/wifi state via normal bluetooth and wifi apis. BUG:19311992 Change-Id: Ifba163800aa413865b8a2877cb21aacfa5cfc6c8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
74160d8cdb2d6d63ebb9c904cb6b83271d96555c |
|
25-Feb-2015 |
Jim Miller <jaggies@google.com> |
am b060f018: am 91aa1bdb: am 19847b07: am b46e4806: Merge "Remove TrustAgent whitelisting API" into lmp-mr1-dev * commit 'b060f018effb27a79797e55f9eb6a592db2cb39a': Remove TrustAgent whitelisting API
|
bc4f2ccf6cfd1a512ad907eda2713ea3c4a1755e |
|
25-Feb-2015 |
Jim Miller <jaggies@google.com> |
Remove TrustAgent whitelisting API Due to a bug caught late in the release, this API is broken and should be removed from API 22 because it's too late for a fix and there's no workaround. Bug 19461292 Change-Id: Ib0757a4484b14afe7f83ae9527bb3f5f4834ee62
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3795fb0a13bfa3c76113b1ecec383e8767824ee3 |
|
16-Feb-2015 |
Robin Lee <rgl@google.com> |
Recognise insecure encryption with a new constant This is the default state on some devices which ship with encrypted key storage set up already but no initial password. Bug: 18048558 Change-Id: I055527fde21298bae2dbdca8c3a145f19b045aad
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
7f38aab7ab98e92fb37e4dd6c79df3799c456df5 |
|
20-Feb-2015 |
Ying Wang <wangying@google.com> |
Fix docs. Change-Id: Iaa7f498dac5b87ee8f3cc6cfeabb04b51ce93245
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
db4bc57760aa74d50ac292c5b4c54e23a42473db |
|
08-Jan-2015 |
Alexandra Gherghina <alexgherghina@google.com> |
New intent action for returning account migration result Bug: 18551835 Change-Id: Ifc5dedf1753a7779793a8b056bac5f5733a2783d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
85bd63f461b117bf826003e671b3730255bbbe56 |
|
10-Feb-2015 |
Robin Lee <rgl@google.com> |
DevicePolicy: clarify wipeData docstring Wiping secondary users or profiles does not cause a reboot. Bug: 19294240 Change-Id: I59179b6d19061067326ea8ef1a730cc21f52ea53
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d22517a7084fd3a56f22490b405c002086dc14ac |
|
06-Feb-2015 |
Kenny Guy <kennyguy@google.com> |
am b6332fd2: am 70fb0ab4: am 8debf213: Merge "Fix mangled javadoc for setPermittedInputMethods." into lmp-mr1-dev automerge: afca061 * commit 'afca06105c1344dade61ec5812bf605b11de0f1c': Fix mangled javadoc for setPermittedInputMethods.
|
74a7024af08d8815ab3a76fe749216b58df88858 |
|
05-Feb-2015 |
Kenny Guy <kennyguy@google.com> |
Fix mangled javadoc for setPermittedInputMethods. Fix java doc for setPermittedInputMethods. Bug: 19276777 Change-Id: Iecd670b35cd675ff9dd4654c9876697801eb20ac
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a9ec70ba17666e61bd003591376459aa56e1b3ec |
|
02-Feb-2015 |
Julia Reynolds <juliacr@google.com> |
Add skip encryption constants for device owner provisioning. Bug: 19228730 Change-Id: Id5022f2f669cf0dfc1b1523190da52c77238a02c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
bdc58c66af3440f963731cdcdf820d7108d9f98a |
|
29-Jan-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Removed userHandle from setXXX methods User handle is now extracted from UID of the calling process. Previously setXXX methods may not work properly, if userHandle parameter was different from a user of the calling process. In practice, this wouldn't have happened because setters were always called with a userHandle of the caller process. Bug:17202572 Change-Id: I1c08c54c975a04b8c54719a1e280ad3cfaff2e67
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8abb6d5e9fb7a34cfb20f265af0885fc5b3b4adc |
|
22-Jan-2015 |
Jim Miller <jaggies@google.com> |
am 0ac8dfa3: Merge "Clarify getTrustAgentConfiguration() documentation." into lmp-mr1-dev automerge: ffd1a49 automerge: 54dbd1f * commit '54dbd1fd437862346f7cdacc484acd3e10501bfb': Clarify getTrustAgentConfiguration() documentation.
|
b5db57a27d5147c8a46f1ba8a6016c3f95d52756 |
|
15-Jan-2015 |
Jim Miller <jaggies@google.com> |
Clarify getTrustAgentConfiguration() documentation. Fixes bug 18983802 Change-Id: I2f6e208cdd4fac95d1d0228bec3de8199baafa57
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
568e54be71731bdbcd5338385eb6cc6a082c9456 |
|
15-Jan-2015 |
Jorim Jaggi <jjaggi@google.com> |
resolve merge conflicts of 87f5369 to master. Change-Id: I5d1a7aaf48c4bf70f7181508aa46fbbcc2cf7086
|
2c1c5dd5ef75183101ec22d424b2d11f6b52b61b |
|
12-Jan-2015 |
Nicolas Prevot <nprevot@google.com> |
Make documentation for cross-profile intent filters clearer. Explain why FLAG_MANAGED_CAN_ACCESS_PARENT and FLAG_PARENT_CAN_ACCESS_MANAGED have these names. Also do not mention the disambiguation list since there is not always a disambiguation list shown when resolving cross-profile intent filters. BUG:18962528 Change-Id: Ibbb9505dcab7cf17d87435eff2cef3e745e95209
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8add57224ffcf73705e507f1b73954e5de15eb88 |
|
23-Dec-2014 |
Esteban Talavera <etalavera@google.com> |
Remove deprecated version of setProfileOwner that takes packageName The ComponentName equivalent should be used instead. Bug: 17654371 Change-Id: I7001e86ab1709b824944148a3c44af5243dacb83
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
743a68fc5f62c645d442aa8b3c9ba7e7d9361785 |
|
17-Dec-2014 |
Nicolas Prevot <nprevot@google.com> |
am 237637e2: am f2bd50b2: Merge "Fix the doc of addCrossProfileIntentFilter." into lmp-mr1-dev automerge: 47cbcd7 * commit '237637e22ba9d98171f32d2302b9f532120729a9': Fix the doc of addCrossProfileIntentFilter.
|
f2bd50b2ec0e5d7a25694170e0dc1363465fd24e |
|
17-Dec-2014 |
Nicolas Prevot <nprevot@google.com> |
Merge "Fix the doc of addCrossProfileIntentFilter." into lmp-mr1-dev
|
fc7b4444629d9166e3fda7b28e96394356bcf56d |
|
17-Dec-2014 |
Nicolas Prevot <nprevot@google.com> |
Fix the doc of addCrossProfileIntentFilter. Mention that cross-profile-intent-filters only work for activity intents. BUG:18776618 Change-Id: I209d1e38641b4ae84b682a2525e6ddae603a71f9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
77779aa3a5eea2d275c82035b025df85b7702f07 |
|
09-Dec-2014 |
Fyodor Kupolov <fkupolov@google.com> |
am d483a85e: am fed2812d: am 22afe626: Merge "Added isRemovingAdmin method" into lmp-mr1-dev * commit 'd483a85e69c3bb83b25473b93806e063b72c9315': Added isRemovingAdmin method
|
96fb932666539e2b3be26ef91eb248a9ace5678e |
|
02-Dec-2014 |
Fyodor Kupolov <fkupolov@google.com> |
Added isRemovingAdmin method Added isRemovingAdmin method, so that clients can query if device admin is currently being removed. Bug: 17609838 Change-Id: I82547a9eeb228fcf8ac2a6e639ca1a75fa41d161
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ef370c0ca08cfdae1b33edcdb121790bb4eb1844 |
|
02-Dec-2014 |
Paul Crowley <paulcrowley@google.com> |
am 05f23d97: am f57d9dcb: am fbeeac82: Merge "Add a tag to separate paragraphs in Javadoc" into lmp-mr1-dev * commit '05f23d974bdfc5fb221f0bfa5bef4e9c915e52d9': Add a tag to separate paragraphs in Javadoc
|
2934b266e507ddda7d64201be7850af4589b9c9e |
|
02-Dec-2014 |
Paul Crowley <paulcrowley@google.com> |
Add a tag to separate paragraphs in Javadoc Bug: 18571794 Change-Id: Icb9bdb87415d85cdbf790224e40abbf99a441456
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
5ff0e5fb6b339a7dea0cbc344e88673b7a99e593 |
|
26-Nov-2014 |
Paul Crowley <paulcrowley@google.com> |
am 0d122e26: am ba94fd5e: am 77e25331: Merge "Add flag for wiping factory reset protection data." into lmp-mr1-dev * commit '0d122e265c52ef25dbad652378b3a5e51a86f041': Add flag for wiping factory reset protection data.
|
a7e87acb2416d4212c84fb9c45353dbf6ee15e6a |
|
18-Nov-2014 |
Paul Crowley <paulcrowley@google.com> |
Add flag for wiping factory reset protection data. Bug: 18366448 Change-Id: If8904888a6bf8611d34647e6d65d2347d824dbb3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e1d84dd914ffe29fe821b814924b0a56506dc238 |
|
25-Nov-2014 |
Adrian Roos <roosa@google.com> |
am 9a4d0257: am 520d20c1: am 702d9e31: Merge "Fix DPM.resetPassword("")" into lmp-mr1-dev * commit '9a4d0257beadf53c706afbcb4abc76c17a44ff00': Fix DPM.resetPassword("")
|
702d9e31b1bcacff975a2b8e0d04160bbd6811ed |
|
24-Nov-2014 |
Adrian Roos <roosa@google.com> |
Merge "Fix DPM.resetPassword("")" into lmp-mr1-dev
|
0d5ccb73785f83b9b74f04078e258cdc21eb4533 |
|
12-Sep-2014 |
Robin Lee <rgl@google.com> |
Ensure that private key is PKCS#8-encoded getEncoded() is not requred to return a PKCS#8-encoded result. Bug: 15065444 Change-Id: I1278ff9ffffe5887f149bae9288a174beed5f86a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3a3d212a51974ccec6100c1e117225291edc83cc |
|
29-Oct-2014 |
Amith Yamasani <yamasani@google.com> |
Different messages when wiping user and not device There are 3 types of users 1. Primary - device will be wiped 2. Managed profile - profile will be removed 3. Secondary user - user will be removed Show different messages for almost wipe and wipe in each of these 3 cases. Bug: 16843155 Change-Id: Icecfe520622773da9e45465bf2217e8ed38b266e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f8f56bce428bb2b89d1d572ccd2d604761dbbce8 |
|
20-Nov-2014 |
Adrian Roos <roosa@google.com> |
Fix DPM.resetPassword("") While we're at it, also fix some multi-user issues in LockPatternUtils. Bug: 17496766 Change-Id: I8e557ea640fa589817c8f8f818c91463585d5ea7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
735f22850edcb5c2447c37cb96f048de8a742907 |
|
19-Nov-2014 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove permission check in DevicePolicyManager.isUninstallBlocked()" into lmp-mr1-dev
|
a97855b784243c00b99dfcb6595164ab4a88d05c |
|
07-Nov-2014 |
Rubin Xu <rubinxu@google.com> |
Remove permission check in DevicePolicyManager.isUninstallBlocked() This is to allow Play to use this API to find out whether a package is uninstallable due to profile or device owner policy's restriction. Bug: 17914630 Change-Id: I4ce2963884ecdf3306805f36db80ed1ebf04d88f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
5a1442589f3fd3e1eca74e70ca666eb7b3a0f9b2 |
|
18-Nov-2014 |
Sander Alewijnse <salewijnse@google.com> |
Rename the dont_disable_system_apps constant. Bug:18414080 Change-Id: Ief9c6ac4346ab0588514f89a659fcb09d10d6574
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f39cec0b068abcf306eb91c304ed2eb76e60f8c0 |
|
14-Nov-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Add extra to enable device admins to skip removal of system apps." into lmp-mr1-dev
|
8c4115617833e83253a53fe855ea96bdb39fbe1d |
|
12-Nov-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add extra to enable device admins to skip removal of system apps. Bug:17369849 Change-Id: Ibc1c0f480c436c7075725f79ffaaf92832c1154a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
6e33f0fbb57a8afc2184bd9a1798db8bd29e680a |
|
13-Nov-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Merge "Add extra for account migration in the DevicePolicyMamager" into lmp-mr1-dev
|
aaf2f3e8954d3d5d01953ceb7c8f631db7412e13 |
|
13-Nov-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Add extra for account migration in the DevicePolicyMamager This is in preparation for the implementation CL Bug: 17716971 Change-Id: I3042b0781f48f3d9e84bfff899507b4b5ca156eb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
52c39a16db077f5017ab20214e60a205e075f2d7 |
|
21-Oct-2014 |
Amith Yamasani <yamasani@google.com> |
Allow profile owners to set the unknown source setting This allows work profile MDM to enable unknown sources even if the user doesn't have UI for it. Installing an app from an unknown source will still prompt the user with the package installer dialog, so it's not like the MDM can now quietly install apps from non-market sources. Bug: 18316350 Change-Id: Ia8f4fe36f12a258aa888e085acc0b358925f4817
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
541afcd0b761769cc519bcb99c9cd4ebd7c0c42d |
|
07-Nov-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Clarify documentation for DevicePolicyManager Bug: 17634106 Change-Id: I93e4c10cb942bc8452043f81f460a5db6c3bd0a4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3eed90f39301089a1c16d6e2c0d027b187567cf0 |
|
07-Nov-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Added the restrictions pending application restrictions key." into lmp-mr1-dev
|
53d63dcd04da3c1d5187b29f6530c2dcac9d516c |
|
07-Nov-2014 |
Sander Alewijnse <salewijnse@google.com> |
Added the restrictions pending application restrictions key. Bug:17632522 Change-Id: If5a0d0ea1f479b0584fc0b1cff2a179d296d2904
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e303bf443532c2ad756260133f00747bcff11e69 |
|
27-Aug-2014 |
Jim Miller <jaggies@google.com> |
Update TrustAgentService API after review This change incorporates API council feedback and enables the TrustAgent whitelisting API. It also contains a minor cleanup of DPM's use of UserHandle to eliminate unnecessary object creation. Fixes bug 17008504 Change-Id: I63cc50169fde54b34406845818bcaf6aadc1a3db
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
112e053b9a07972d5ceddc3ad19c7252f3963071 |
|
29-Oct-2014 |
Sander Alewijnse <salewijnse@google.com> |
Change javadoc of setAccountManagementDisabled. Method can also be called by device owner. Bug:18166033 Change-Id: I38ab17bdfe9f0c4b33f5257d2f335afe16e84031
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2c3886cb3463ff39c1986c5b85eba79748dd8c24 |
|
15-Oct-2014 |
Amith Yamasani <yamasani@google.com> |
Merge "Fix admin policies in managed profiles" into lmp-dev
|
242f4b125939276be866bb0a637b89bfbc5aa880 |
|
15-Oct-2014 |
Amith Yamasani <yamasani@google.com> |
Fix admin policies in managed profiles Some of the admin policies are throwing security exceptions in a managed profile without being documented correctly and others shouldn't be throwing security exceptions. Changed setCameraDisabled() to not throw an exception. It now just prevents work profile apps from using the camera. Changed wipeData() to allow passing in ERASE_EXTERNAL_STORAGE. In secondary users/profiles, this is just going to remove the user, so the flag is harmless. Updated documentation for setKeyguardDisabledFeatures() and resetPassword() to indicate that they cannot be called in a managed profile. Bug: 17987913 Change-Id: I8060be4c2d32bdd4edb46ce543551fabb9c8c983
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
9797880808320e3a7bae1f59bc7e0c5a13189e5f |
|
14-Oct-2014 |
Jeff Sharkey <jsharkey@android.com> |
Start cross profile intents as caller. The system should always be using new startActivityAsCaller() when starting activities on behalf of someone else, to ensure that security checks are enforced as the original caller. Bug: 17983737 Change-Id: Ic40816a797cfdb13c0adb48b86ed4ed7d6aae8eb
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8d9f12161823f267179f46825734c188b6c75b09 |
|
19-Sep-2014 |
Amith Yamasani <yamasani@google.com> |
Merge "Allow primary user profile owner to set device restrictions" into lmp-dev
|
c34dc7cdeb5cae8ca4c731838aafe90ed4c9a2b8 |
|
18-Sep-2014 |
Amith Yamasani <yamasani@google.com> |
Allow primary user profile owner to set device restrictions In addition to device owners, profile owners on the primary user can also set user restrictions that are necessary to lock down the user. This is to enable the case of a profile owner registered after setup wizard is completed, on the primary user. Also make managed profile vs. profile wording consistent in the DevicePolicyManager docs. Bug: 17555025 Change-Id: Ib9d08b8af34a99b25e11757fa7dc83673a7deb32
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d00cfc51fb5b6e067bf0cd31af670ad4b61d1a7d |
|
18-Sep-2014 |
Kenny Guy <kennyguy@google.com> |
Remove suggested key names as its confusing. Update java doc to not suggest package names as it confused people into thinking it would limit access to that package which isn't the case. Bug: 15177676 Change-Id: I0736976956d8bb604e5097326c8c4316b3007d64
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2b338a27bef881cf751d1aeb6e42241e47e5e77b |
|
12-Sep-2014 |
Sander Alewijnse <salewijnse@google.com> |
Rename email extra. Bug:17389863 Change-Id: Ie001d71e92e212b83882529ed7c93303b64277c6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
26408ccd8e852d947e58021792bfc3b315e5948d |
|
08-Sep-2014 |
Bernhard Bauer <bauerb@google.com> |
Add DevicePolicyManager PrivateKey mgmt Additional device policy API to install keypairs to the keychain silently. Bug: 15065444 Change-Id: Idc25774c9ab1a61080290bebd6f5c4f24e6ee2e0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d86734b4695a92359ed38d6053ed1ce16a470634 |
|
11-Sep-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow device owners to update LOCATION_MODE." into lmp-dev
|
df980618a309df46e8569d3b16a6ff4f286e24de |
|
10-Sep-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Update string value for provisioning action and extra" into lmp-dev
|
e3da790f8c2a8d728ba8febc1334ff44883055d2 |
|
20-Aug-2014 |
Jessica Hummel <jhummel@google.com> |
Remove unused DEFAULT_MANAGED_PROFILE_NAME extra from DevicePolicyManager. Change-Id: I6fe96df66a4a78cf2e2455d58bba13051d108fdf bug:17152955
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ef9c523848e76490270c3e954aab10369c56f602 |
|
08-Sep-2014 |
Esteban Talavera <etalavera@google.com> |
Update string value for provisioning action and extra As per API review. This will be submitted in sync with a new version of DMAgent, as the string is hardcoded there. Bug: 17389863 Change-Id: I3a3d7a9cf05bcb713da8690ceec6af02845a5ff1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
86a967312a45b194f7d2a9745c62e65d8c2e03d3 |
|
08-Sep-2014 |
Nicolas Prevot <nprevot@google.com> |
Marking two flags as final. Marking FLAG_PARENT_CAN_ACCESS_MANAGED and FLAG_MANAGED_CAN_ACCESS_PARENT as final. BUG:17387998 Change-Id: I1562b8638e7cce5706df4517493d1732f19ece8f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
37f0184d96ca066cb3f2e5aaf8a2ce7eda6ae946 |
|
05-Sep-2014 |
Esteban Talavera <etalavera@google.com> |
Changed value of EXTRAs to match constant name in code. As per API review. Bug: 17389863 Change-Id: I85df4453d3241745b5400a6805d8c8bb4f41e92a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
82735bcb1400cb5ab2da763a236a55927d87ab00 |
|
04-Sep-2014 |
Julia Reynolds <juliacr@google.com> |
Allow device owners to update LOCATION_MODE. Bug: 17388933 Change-Id: If3267aa52c2611cf764a19bee019c312f6ebf5d1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
aff9f4cb88c8f540bf6b22079107d9424ab63b22 |
|
04-Sep-2014 |
Sander Alewijnse <salewijnse@google.com> |
Rename email extra to email bundle key. Bug:17197410 Change-Id: I321bc52cbb73a14869538700204ac7b5aefb3755
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
aa924b52e94ac5757ce0ae43f844684808387579 |
|
03-Sep-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Pass ComponentName to probing certificate methods" into lmp-dev
|
f1fe51b9140a855515e257ebb85e6cba88ea89e7 |
|
03-Sep-2014 |
Brian Carlstrom <bdc@google.com> |
Fix DevicePolicyManager javadoc Bug: 17126717 Change-Id: Ib1d83a0e2003296ec1e17fa7c43e32c55b044df3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
808f6ef2ac2127ea0ea14e71c9599355b631a617 |
|
28-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Pass ComponentName to probing certificate methods Pass ComponentName and check whether that admin is a profile owner on DPM get/has certificate methods (requested on the API review). As per Change I55eec17e01489ab323f8a0e68b11592605a7b740, not keeping track of which admins installed which certificates for now: "Having per-admin CA certificates would be a fair bit of work. The only MDMs we're opening this up to for now are Device and Profile Owners which 100% manage the profile so will be the only admin. It seems like if we keep track of "who installed which certs" it'll be a little pointless because the answer will always be "the ProfileOwner" for every single one." Bug: 17005622 Change-Id: I45e9dac5236ab4ed235a341c208ac3cb6aba17da
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
90f14bf53e4c37d0d6d13fbecd48fb88dad06241 |
|
20-Aug-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add the provisioning extra admin extras bundle. Enables the MDM app running (as a regular app) in the primary user to pass through a bundle of data with which to bootstrap the instance of itself running as profile owner in the managed profile. Bug:17126717 Change-Id: I28a368d13e33990b16dcd68436902e0a077d5f5d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
24ac55e658f955c330fff4bb143cfc6af37e40bf |
|
27-Aug-2014 |
Selim Cinek <cinek@google.com> |
Added a warning when the profile has an owner Also fixed a bug where a post in the QSFooter was not always on the mainthread leading to a crash. Bug: 17066115 Change-Id: Iea9e1032973058ed5e63e70da4dc0bcf34fa59a3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
729b2a6c2f330c10674bb3fc0c4f2eb57e3d0a43 |
|
27-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Renamed getUninstallBlocked to isUninstallBlocked As per API review. Bug: 17297103 Change-Id: Icb4ceded317b0df4deb0f5221512541a632e150b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e193455ee20dc6bb44740959d010a8e41f1e64df |
|
27-Aug-2014 |
Jim Miller <jaggies@google.com> |
Merge "Hide trust agent whitelisting until new API is ready." into lmp-dev
|
b1474f4432097cf20c06b471b57359ddd16fe460 |
|
27-Aug-2014 |
Jim Miller <jaggies@google.com> |
Hide trust agent whitelisting until new API is ready. Fixes bug 17008504 Change-Id: Ic93d52042e9b6d6f7d634f22aa04642f2da1af32
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
19d431f330bf1d89c92c0971dad5fa8f5950b16d |
|
27-Aug-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Limit the settings profile/device owners can update." into lmp-dev
|
9ed66da8dfd15001cebe8f7ef453718f41f9904d |
|
26-Aug-2014 |
Julia Reynolds <juliacr@google.com> |
Limit the settings profile/device owners can update. Bug: 16351901 Change-Id: Id33a57ad651b5b7b58de0549eb90d5a1fe5c19c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ebaf5c70e9889c99a74b7066b20b1c6ccd0da86a |
|
27-Aug-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Provide lockdown of date/time device owners." into lmp-dev
|
d22a6677312d17d23da3b655a2e9b12533dfff76 |
|
27-Aug-2014 |
Jim Miller <jaggies@google.com> |
Merge "Limit grantTrust() duration to DevicePolicy-imposed limit." into lmp-dev
|
fbb28dfb9511679bc615c4424c21a901b2dba4cc |
|
26-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Revert API constants to previous value to match hardcoded value in google3 apps Revert value of DevicePolicyManager constants that were hardcoded in dmagent. See previous change I6f60a43fe23526cfe855d81015feb759cf643926. Bug: 17275391,17005622 Change-Id: I606b010eb0399f7b34b59c99f96549949410bafc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0ced6272911f440843e9ff8e89b9fafdb49b243b |
|
26-Aug-2014 |
Sander Alewijnse <salewijnse@google.com> |
Provide lockdown of date/time device owners. Fixed two minor issues with the screencapture as well. Updated documentation and added enforceCrossUserPermission. Bug:16948504 Change-Id: I9a645dcf480a4a044879ba481bce964d06fe5153
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
76b9b8b0ca537bad6c4da388d77a9e5dee023856 |
|
23-Aug-2014 |
Jim Miller <jaggies@google.com> |
Limit grantTrust() duration to DevicePolicy-imposed limit. Fixes bug 17046034 Change-Id: I5c512c2d05e7e0ed81eaf0dcafacc6f62a5c5937
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d4efaac5d54cdb3735b032bb76a5639949f33216 |
|
15-Aug-2014 |
Jim Miller <jaggies@google.com> |
Update TrustAgentService API after review. Also documents timebase on related DevicePolicyManager API. Fixes bugs 16401527 and 17046034 Change-Id: I8ee6d0055ab6f52ec71630344d3232f7875d9c1d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
01e6a6fef1ebcbdf391629197d050c03b415c602 |
|
21-Aug-2014 |
Nicolas Prevot <nprevot@google.com> |
Merge "Marking the methods to get Profile/Device Owner with @SystemApi." into lmp-dev
|
465acf3f3f5111b58025d6272f2fd734c0c69390 |
|
06-Aug-2014 |
Nicolas Prevot <nprevot@google.com> |
Marking the methods to get Profile/Device Owner with @SystemApi. BUG: 16860239 Change-Id: I60126a8112a57e836cae3bcd9b62ebf50385f5ec
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e4be1bf2bed48afd234ea1f2558c60beffe3fa18 |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Set last phrase for constant values of EXTRA_* fields to ALL_CAPS" into lmp-dev
|
5cef4fa9c189a43ca081d74319f6046e4eba6b8d |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Updated documentation for setScreenCaptureDisabled()" into lmp-dev
|
2df7d1ef51ebff5228e0cbd7e15a34fce7307390 |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Rename PROVISIONING_NFC_MIME_TYPE to MIME_TYPE_PROVISIONING_NFC" into lmp-dev
|
d5c5c13c8505a27290a2540ff1f64c8753431cb1 |
|
20-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Rename get/setBlockUninstall() to get/setUninstallBlocked() As requested in the API review Bug: 17005622 Change-Id: I1332ad11e588ab3fa409f2a28222608936cb383e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8c5c37364776266d9d91bb35094a9755707833f7 |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Merge "Remove setApplicationsHidden" into lmp-dev
|
d469a0b9cef0cd68e666e64a8ea05c14be8299f0 |
|
20-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Set last phrase for constant values of EXTRA_* fields to ALL_CAPS As requested in the API review. Bug: 17005622,16486199 Change-Id: I6f60a43fe23526cfe855d81015feb759cf643926
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1aee98fbf3937879c65c523396939ffa054d2fa0 |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Updated documentation for setScreenCaptureDisabled() As requested in the API review. Also, removed unused import. Bug: 17005622 Change-Id: I0bc57411ec34119f64e28eaf27c32a67b45fd66f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
b9e468cb9d77abf57473436e29042e1b27d9f70b |
|
21-Aug-2014 |
Kenny Guy <kennyguy@google.com> |
Merge "Add apis for whitelisting IMEs and accessibility services." into lmp-dev
|
115cd65d2a3417b506563e6b2d60c269d69efaef |
|
21-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Remove setApplicationsHidden As requested in the API review. This version (the one that takes an Intent) was used only in the DeviceAdminSample and some CTS tests. Bug: 17005622 Change-Id: I9984b22836417ad4d025302f61bd91704e9345a4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
fa80a4faa3ab32f61742b684e832126dae8468e7 |
|
20-Aug-2014 |
Kenny Guy <kennyguy@google.com> |
Add apis for whitelisting IMEs and accessibility services. Adds apis for device / profile owners to white list the accessibility and input methods a user can enable. Bug: 14469005 Change-Id: I921888660d29a5370395db87adf75d4d106660c9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f057f06631e32471cd1ce8f34222251c0537a406 |
|
20-Aug-2014 |
Esteban Talavera <etalavera@google.com> |
Rename PROVISIONING_NFC_MIME_TYPE to MIME_TYPE_PROVISIONING_NFC As requested in the API review. References to that field fixed on changes I123a5193d03b313160f934644b02be62b8394649 and Ibf1bb38f481e9e0dd898d662b18a1c54f201f830 Bug: 17005622 Change-Id: I08c53465d98678c06f65eeed5e7e9dcdce7bbcf0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
38f836b972adac73c563692352b345cc09556364 |
|
20-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
Add a hidden method to query profile owner name for a user Bug: 17066115 Change-Id: I812a37ea2e7bb6da5aa4c31cb7e37934e5d698fa
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d1d7c022c6f83e836acb74eed1a5a201e495bd85 |
|
20-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
Rename restrictions API class and method AbstractRestrictionsProvider -> android.service.restrictions.RestrictionsReceiver requestPermission->onRequestPermission Bug: 17006805 Change-Id: I03b1626d6abcd2ad739a55b60b54fdbf9810ceca
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
95d9ad0f79c900db9bca1745100f14d0ec9cc133 |
|
18-Aug-2014 |
Jason Monk <jmonk@google.com> |
Merge "Fixes to lock task API from API review" into lmp-dev
|
48aacba761527a529c2b668c8151c7f98ff70524 |
|
13-Aug-2014 |
Jason Monk <jmonk@google.com> |
Fixes to lock task API from API review Adding ComponentNames and some splitting/renaming of broadcasts. Bug: 17005622 Change-Id: I9ece3553310fb20b0c3c3e4032b408e86384363a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
7e67871174774973d416c6f25c9f23abad86d3fd |
|
24-Jul-2014 |
Robin Lee <rgl@google.com> |
Clean up DevicePolicyManager CA certificate APIs For consistency all CA-related methods now require the ComponentName of a DeviceAdminReceiver as the first parameter. Updated javadoc for this and added in some more detail about the methods in general as well. Created two new utility APIs,one to list all installed CAs and one to remove all installed (user) CAs. Deleted old hasAnyCaCertsInstalled method because it is now redundant. @bug 16488006 Change-Id: I55eec17e01489ab323f8a0e68b11592605a7b740
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
976e8bd2017d0263216c62111454438cc0f130e3 |
|
17-Jul-2014 |
Svetoslav <svetoslavganov@google.com> |
Allow adding widgets from user profiles. The goal of this change is to enable support for appwidget from user profiles to the user main profile. A user profile is a user which is associated as a child of the main user profile. For example, a user may have a personal (parent) and corporate (child) profile. The device policy should be able to control whether adding a widget from a child profile and given packages is allowed. This change assumes that all packages from managed profiles are white listed. Another change will add the device policy changes. Change-Id: I267260b55d74c48b112a29979a9f59eef7a8194e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3f1ddf83a4faba3dec71ed7eebe1835f4685cf60 |
|
02-Jul-2014 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Add AsUser versions of existing DevicePolicyManager methods Some API methods on DevicePolicyManager call underlying IDevicePolicyManager methods that can be parameterised with a user id. DPM however only exposed methods for the current user. This CL makes it possible to call them with any user id by introducing hidden methods on DevicePolicyManager. Bug: 15558397 Change-Id: I1786a64fa7cf5f6590ddd04cbf4527bb159f8795
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
90af6d736550305a9201c57a5e055fb52c999dab |
|
30-Jul-2014 |
Nicolas Prevot <nprevot@google.com> |
Fixing a NullPointerException in isProfileOwnerApp. Fixing a NullPointerException in isProfileOwnerApp of DevicePolicyManager if there is no profile owner. BUG: 16673376 Change-Id: I912fcd38343d3c1893313e6335802d26014a2e9d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
bf3a9465483976dcd5692b619b47132c2b95f73e |
|
28-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Set profile owner via an intent priv apps can request to become a profile owner after setup has completed. This will pop up a consent dialog (in Settings). Also, clean up profile owner concept to be a component name. Change-Id: I5e8532866e8018f61836c4e84fbbadb6150218ae
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
489d2dfc2931dcf51358fd51e4bee6901bff30ac |
|
29-Jul-2014 |
Adrian Roos <roosa@google.com> |
Fix checkbuild Change-Id: I9c3de31af792863b93a29ef81b50e2149b0a2184
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c |
|
28-Jul-2014 |
Adrian Roos <roosa@google.com> |
Make TrustAgentService a SystemApi Bug: 16401527 Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
604e7558ef32098644b2f9456d7743a07ae789dc |
|
19-Jul-2014 |
Jim Miller <jaggies@google.com> |
Add new DevicePolicyManager API to allow fine-grained TrustAgent management This adds a new feature that allows a device admin to specify a whitelist of features that are allowed for the given admin. Change-Id: I83f853318efbcf72308532d0a997374f73fa9c10
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
ddbce3263270c3b66c377be2d9f388fc11b23483 |
|
28-Jul-2014 |
Nicolas Prevot <nprevot@google.com> |
Merge "Storing the app who sets a CrossProfileIntentFilter." into lmp-dev
|
3f7777fa4f1d392e18bad39edcd4539880c52ff9 |
|
24-Jul-2014 |
Nicolas Prevot <nprevot@google.com> |
Storing the app who sets a CrossProfileIntentFilter. When we add a CrossProfileIntentFilter, we store the package and userId of the calling app inside the CrossProfileIntentFilter. When an app calls clearCrossProfileIntentFilters, we only remove the filters that the calling app has set itself. BUG: 16537557 Change-Id: I6e7bc859383ea66553d9f4230365df8ba27525f3
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
af9f8aed7d3955b0d1c75943290467f39c7a7681 |
|
28-Jul-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Add http cookie header key as a provisioning extra." into lmp-dev
|
681bce94df324ef84a804131691b6c33119197c4 |
|
24-Jul-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add http cookie header key as a provisioning extra. Change-Id: Id07ab52f265536b9790f4eb6ae314875e81a61d7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
b5deda7382effe9b6dc5cc7d96d68f950c2fc88b |
|
24-Jul-2014 |
Justin Morey <jmorey@google.com> |
Fix build Change-Id: I8790b274864610b7e00d7ea12efe96b3b826301f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
80440cc853611e77268d8c67db2279c10b2e076e |
|
24-Jul-2014 |
Justin Morey <jmorey@google.com> |
Expose setActiveProfileOwner() using @SystemApi Change-Id: I1607fa90e76da495ede48f01ad250baae60108af (cherry picked from commit 85db24136eefb01341760208541563aba05ce82e)
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d2a1eec400128f39e1b223a720a88dbd395f3e6e |
|
09-Jul-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add Device Policy API to disable screen capture. WindowManager will set secure flag on SurfaceControl for all windows of a flagged user to prevent screen capture. API is consistent with the camera disable API. Change-Id: Ib180f67f1ad827b6f4aca2af615274256cce58f4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
e5bcff624fb58b6f95be8ddff7f5b6b3bf5d19c7 |
|
20-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Rename setApplicationBlocked to setApplicationHidden This corrects the expected behavior of the app state. Hidden apps can be installed by the store to be brought out of hidden state. Bug: 16191518 Change-Id: Id128ce971ceee99ba1dea14ba07ce03bd8d77335
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
570002ffd477271c3c9a8457fd67ed3711615daa |
|
19-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Add a hidden API to expose cross profile caller id check To be used by telephony/contacts. Change-Id: If8e06c20a708ce5e8f7d717d8758c19a78efa46d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
06e345089a0425c6cd5a5596835113fb229b7d41 |
|
17-Jul-2014 |
Jim Miller <jaggies@google.com> |
Add DevicePolicyManager flag for fingerprint. Change-Id: Icb3e4b98d97487179acefabc7a3b747d3d0fa23a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c8fa3ae2ce238843496d7aa3f1c4042bb9bb98b4 |
|
17-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Merge "Create DPM APIs for cross profile callerId" into lmp-dev
|
210fe21e95cfff98734f5b849b205cdcb0706948 |
|
17-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Create DPM APIs for cross profile callerId Contact information in the managed profile is shown in the incoming call UI unless blocked using this API. TODO: Actually plumb this into the caller-id logic. Bug: 16301261 Change-Id: If03adc907d9558baa0a45a1833b857206b7bf96a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
999d394adee533c55fce38bd632ffd4f1af91362 |
|
03-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Ads per-user APIs to manage accounts through the AccountManager Bug: 16056552 Bug: 14642886 Change-Id: I17ff6c2515285e63c84cecf2f861d10666c393c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
655be2a98ea6285fc33aec4b223e90c2620927f1 |
|
14-Jul-2014 |
Adam Connors <adamconnors@google.com> |
Revert "Remove enableSystemApp methods." We need to go back to uninstalling system apps so we can re-install non-default system applications through Play. This reverts commit e3dbcd138c07f2d32ac84229d0a49052cc18d424. Change-Id: I0a7af094614c4a10800971c82e10571f7312e079
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c8c8425b51a4f68fae993e68b357679ca27d155d |
|
14-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
App restrictions schema and parser Documented the restrictions schema in RestrictionsManager docs. Added a parser to read the meta-data and XML file on the device. Added more types and methods in RestrictionEntry to accomodate some new types and construction modes. Added a styleable for restriction attributes. Slight tweak to permission response params. Bug: 14582645 Change-Id: I193d1162741d110c100831cab33b48e2baf7426c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f6e2fcc2eaf5e650237d3c6d79a2de49d2d4111e |
|
10-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Improvements to Restrictions API Convert restrictions provider to a service instead of a receiver. Add a way to get pending responses from restrictions provider. Add AbstractRestrictionsProvider. Add a callback API for responses. Removed some constants in RestrictionsManager. Added new constants for errors and error codes. Much improved javadocs. Bug: 16176009 Change-Id: I838a50fabc80b94b632294b3a55cd5d8092acf55
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
582d9111d76632027fed7af10d05d4b44df16c0c |
|
10-Jul-2014 |
Jason Monk <jmonk@google.com> |
Add API for device owner to switch users Once verified that caller is device owner just calls through to the activity manager and acts like that call. Change-Id: I34023313cd6742b73d2105655ec6b631879aa37a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
85516d028b2dcc7ebc09f4a68085836aa26191d5 |
|
01-Feb-2014 |
Jim Miller <jaggies@google.com> |
Add new "pin complex" type to supported keyguard PINs This adds a feature to allow DevicePolicyAdmins to prevent using simple PINs, which are defined as those containing more than 3 repeated values. Examples include '1234', '2468', '1111', '9876', etc. Bug 12081139 Change-Id: I4ebe1c76a48087dcd7c878e9bd79a4e3ee2a27fe
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
98acdc8007a0e168a018f90b4e03d4dd0b2ccc9b |
|
05-Jul-2014 |
Nick Kralevich <nnk@google.com> |
am 3cdc06bb: am dbb32da8: am c9eff23b: Merge "Fix typo in DevicePolicyManager documentation" * commit '3cdc06bb370a2f29d334e6916969e954875d51fe': Fix typo in DevicePolicyManager documentation
|
c9eff23b443f26fb8c4873a6ecb61eded0564163 |
|
05-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "Fix typo in DevicePolicyManager documentation"
|
c13053bf1c05b980421611487ce67677c08db299 |
|
29-May-2014 |
Kenny Guy <kennyguy@google.com> |
Add package state to block uninstall. Add package state to allow profile or device owners to block uninstall of packages. Add API to DevicePolicyManager to set/get the state. Bug: 14127299 Change-Id: I03528819850b42df7bafa7747bb9e4558d20c4e6
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
edb7ae704b7a37b3665bc96165ba8aa9ff86b375 |
|
26-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Remove unused action from DevicePolicyManager. This is part of a simplification to cut out one communication with mdm apps. Change-Id: I7d0067928c20387dca8fcc45a7bc48d9d158fa2c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1c7c319bb89b9988bfd12afc3e8d89449fd163fc |
|
26-Jun-2014 |
Jason Monk <jmonk@google.com> |
User restriction for disallowing window creation Block any types of windows that could by used by apps to create views on top of a locked app. This can be used by device admins in conjunction with lock task mode. Added a way for system (and priv apps) to bypass user restrictions for specified op codes. Bug: 15279535 Change-Id: I2381530ef6226a5bb32a99bb4030baafb39bf564
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
aba4f1b54a2b7b2aefc840dcb3b46459aa1bde23 |
|
01-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Add a method to set a profile owner and active admin at once This can be used by system apps to register a profile owner during setup Bug: 15922051 Change-Id: Iee1b5adeb47d7e40ab36df18e3a057d8ee430f46
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a55fc9920117eabae7c0bb7339d8d9f5d3f5a9c1 |
|
30-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Merge "Provide api to set the managed profile name."
|
1333ea1ed7a95eb9e1be43c20a0c48e901654cac |
|
23-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Provide api to set the managed profile name. Instead of sending the profile name in the provisioning intent the mdm should set the profile name after provisioning has completed. This allows us to simplify the provisioning flow and the mdm can change the name of the profile later on if required. Change-Id: I821ef2300eae74e89872152ae1c89ac3ecbb82e7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1cc4ecc3e2c64ade5078581b039e1b068c6ed0ed |
|
23-Jun-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add public constants for Device Owner Provisioning. Change-Id: I46dca4e31ab256273eb810f57083f31541815735
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c5185f2bf1bf15ea0cfd72d30167fcbb1d61d437 |
|
24-Jun-2014 |
Jason Monk <jmonk@google.com> |
The profile owner shouldn't control lock task Since managed profiles are started on bootup, the managed profile would be allowed to set an app (possibly itself) as a lock task app and then run itself on bootup and constantly control the device. This privelege should be restricted to device owners. Change-Id: I4a93aabd6054cbe75076ef0517fce03ffa74dc93
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
aab72f3b0ab740e12b4a2576a99852081529feb5 |
|
19-Jun-2014 |
Robin Lee <rgl@google.com> |
Merge "Revert "Revert "Publish DevicePolicyManager CA certificate APIs"""
|
306fe08ce2b06671336e67a87afaa0851f0105eb |
|
19-Jun-2014 |
Robin Lee <rgl@google.com> |
Revert "Revert "Publish DevicePolicyManager CA certificate APIs"" This reverts commit 792b270dbdc980cfe04e8d461bf00a1f45b5e936. Change-Id: I18c7e0eca39868230cd8e4f4bbeb3c44ff9e8b78
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2b5e917026fe4e6dec8712ee24bdffee8d62ab33 |
|
18-Jun-2014 |
Robin Lee <rgl@google.com> |
Revert "Publish DevicePolicyManager CA certificate APIs" This reverts commit 5260bf69946563dc47c17e7441b352adfce384c5. Change-Id: I5e44fdac8a7375576b25171f58e31a1fa0e3c569
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
7ccf51dd796cc4c2bfcdf3d3a17b9987a4c8461d |
|
18-Jun-2014 |
Jason Monk <jmonk@google.com> |
Merge "Change clearDeviceOwnerApp to take a package"
|
94d2cf9725ba21a60e28fc9dadb3b65bac873e12 |
|
18-Jun-2014 |
Jason Monk <jmonk@google.com> |
Change clearDeviceOwnerApp to take a package If the caller is sharing uid, then the package from getPackage() may not be the desired one. This also matches better with the other device owner calls. Change-Id: I14f2ec4bff0717273f626072dabad0d2c76068a5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d7b8621bde44857ebb07130693a00f5f777887d4 |
|
16-Jun-2014 |
Jason Monk <jmonk@google.com> |
Change lock-task DPM authorization to packages Switch the DPM lock-task authorization to be controlled by a package rather than a component. Change-Id: Ife9bed068f31ff2449b4451ab69d3586a3f09d89
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
837304f6f6ae37dc475fa6e0e620f1c2321f2e11 |
|
11-Jun-2014 |
Robin Lee <rgl@google.com> |
Publish DevicePolicyManager CA certificate APIs Exposes these methods: - hasCaCertInstalled - hasAnyCaCertsInstalled - installCaCert - uninstallCaCert Allows device and profile owners to perform some certificate management including querying for and enabling/disabling specific CA certificates. Change-Id: I4aa8a1a8601b234e30acde99dfa382e04cb62495
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0cc9c1e9d3d3121d961cf184de73578bc6708879 |
|
11-Jun-2014 |
Nicolas Prevot <nprevot@google.com> |
Merge "Changing the value of the user consent extra in DevicePolicyManager."
|
4e81913a66c98bfd9939376640b89015a23580a1 |
|
12-Jun-2014 |
Jason Monk <jmonk@google.com> |
Merge "Allow device owner to configure secondary users"
|
03978a40b3a4c268329ae733eff8dfffd92f6e09 |
|
10-Jun-2014 |
Jason Monk <jmonk@google.com> |
Allow device owner to configure secondary users Currently the device owner can create secondary users, but unless it is a system app it will not be installed and will not be able to pass data easily from the code that creates the user and any code running on that user. This allows the device owner to install itself while creating a user and start up a service to configure that user. createUser takes an bundle so that the device owner can pass across any initial setup data it needs to, this bundle will be sent to the admin receiver in onEnable. Change-Id: Ic1f8565dd2a7bd85363527cf68b0ecd4dc9c3636
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
fb8a98d3f30487b2ecb69693c5b82061490cf8ad |
|
10-Jun-2014 |
Nicolas Prevot <nprevot@google.com> |
Changing the value of the user consent extra in DevicePolicyManager. Renaming android.app.action.USER_HAS_CONSENTED to android.app.action.ACTION_PROVISIONING_USER_HAS_CONSENTED Change-Id: I65a3b8f1ec29a0bed5b61ff9e7587195e1c96cec
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
4a21b25fad62e4f19d13ba814263841c931f56ef |
|
04-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Allow profile and device owners to change and get the master volume mute state. Also protect muting master volume with op code OP_AUDIO_MASTER_VOLUME. Bug: 13585918 Change-Id: I91fe7ee60cd291cca15966b3127c0bb8a4828f6a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f89fa8337466be97e40c3ae3cc37704e3f666b5e |
|
09-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Merge "Update documentation so it meets api requirements"
|
e8b8f99dde2aea3958d3169627e1fe2b02d8627b |
|
09-Jun-2014 |
Nicolas Prevot <nprevot@google.com> |
Merge "Updating documentation for the flags of addCrossProfileIntentFilter"
|
9da603973bcde2fb4566d6cc1bcb0f764fd383f4 |
|
21-May-2014 |
Jessica Hummel <jhummel@google.com> |
Update documentation so it meets api requirements Change-Id: Ice52dc3d5ecca77f81d3df1b43179c94aece6fef bug:15023443
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
41d926e3e4dc5b6a7f21f56168d222df562a5ebd |
|
09-Jun-2014 |
Nicolas Prevot <nprevot@google.com> |
Updating documentation for the flags of addCrossProfileIntentFilter Change-Id: I32ed07aecdc8009cbb5708777da5085feabfd4ef
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
b0dced8173a9a930bc0ea2a7a669a907aaffd735 |
|
06-Jun-2014 |
Jason Monk <jmonk@google.com> |
Add an API to clear the device owner. Only the device owner will be able to clear itself. Change-Id: Ie3231467d92e8c5d22ec51256177793f34110432
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
03bc9918345a977e9c45796bf3bb5bf9a3b87d25 |
|
13-May-2014 |
Jason Monk <jmonk@google.com> |
Add device-owner based setting of global proxy. Re-hide the setGlobalProxy on the ConnectivityManager as it requires CONNECTIVITY_INTERNAL. Instead add a function to the DevicePolicyManager to set the global proxy, that can only be called by the device owner. Change-Id: I9ffb2cc4f30a6dc9b868d86f056e1fbd512d8dfc
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
07ac20bb2c763409cfc2f3b33ca692181fd1fb1a |
|
27-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Adding an extra and an action to notify the mdm to start the provisioning. Adding EXTRA_PROVISIONING_EMAIL_ADDRESS and ACTION_START_PROVISIONING to DevicePolicyManager. BUG: 15157562 Change-Id: Ic3ecc6b0a501e1df9a5f803a44347dd024a7a07c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1b8737ee18f5d80adda41eafca6143a046a47a13 |
|
04-Jun-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Remove enableSystemApp() and enableSystemAppWithInten()."
|
3742ec394f2603af465dcaa5909916b1065243c3 |
|
27-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Adding user consent extras to DevicePolicyManager. Adding ACTION_PROVISIONING_USER_HAS_CONSENTED and EXTRA_PROVISIONING_TOKEN to DevicePolicyManager. They can be used to tell ManagedProvisioning to skip user consent. Change-Id: I5ef8ab2a14969bb29a2ee3dbdce5ca3225e0759a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f20d640fa2b155a971ddfe0965fc803a73b5e53c |
|
25-May-2014 |
Amith Yamasani <yamasani@google.com> |
Restrictions Manager Mechanism to register a provider for requesting an administrator to respond to permission requests. Request format and response format constants. Description of manifest template for static restrictions. Int type introduced in RestrictionEntry. Needs more javadoc and better description of manifest templates, including specifying the XML attributes. Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
866896df168d1382732c97e49617ab2f2995d376 |
|
27-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Remove enableSystemApp() and enableSystemAppWithInten(). Use setApplicationBlocked() and setApplicationsBlocked() instead. Change-Id: I3d323d704db0a45e936f63675821707b4fddc48b
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8194899071e0a84c95ef10614bd1b9485b48f589 |
|
16-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Rename code related to cross-profile intents. For example, replace ForwardingIntentFilter by CrossProfileIntentFilter Bug: 15023443 Change-Id: Iee8cdf578817ef9956bcdece803a49b0d07b67f7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1e958398232cb11935f5341d71df52c5455c620f |
|
16-May-2014 |
Julia Reynolds <juliacr@google.com> |
Create deviceowner gated APIs for creating and removing users in devicepolicymanager. This will allow DMAgent to manage users for EDU's cart model user case. Bug: 15015887 Change-Id: I1eadf1701cb75fc4b50eb1a0df1525eff818286e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
37f4e44ae614987c5ed953a1829c7181bb775e1f |
|
21-May-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Add Device/Profile Owner gated apis for setting/getting blocked packages."
|
966881e8951f9bb297689745dcaecfdc13432656 |
|
14-May-2014 |
Julia Reynolds <juliacr@google.com> |
Add Device/Profile Owner gated apis for setting/getting blocked packages. DMAgent currently needs to live in /system/priv-app in order to (among other things) set and get blocked packages. These APIs will get us closer to being able to move DMAgent out of priv-app. Bug: 14945334 Change-Id: I108e2013c67409dca554acf78e3a710745900706
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
da551653219092306fc7e1ce5743ab40683cee6f |
|
14-May-2014 |
Julia Reynolds <juliacr@google.com> |
Allow device/profile owners to update settings. Device owners can update Settings.Secure and Settings.Global settings. Profile owners can update Settings.Secure settings. DMAgent currently needs to live in /system/priv-app in order to (among other things) update global and secure settings. This change will get us closer to being able to move DMAgent out of priv-app. Bug: 14965414 Change-Id: If2cc3a56de91bffde33b838ab8ecea2c32412803
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
57dacb7eb009130264972468cda2876e58999c2f |
|
13-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Merge "Group account management methods and add some comments."
|
91da58ded2e7c0dd3d045244cc78eb0d788736a7 |
|
10-Apr-2014 |
Jessica Hummel <jhummel@google.com> |
Allow setting password restrictions from a managed profile. A managed profile will now share password settings with its parent. - the current password is always stored in the parent - admins of profiles are notified if that password changes - checks for password quality now take the requirements of admins on the parent and its profiles into account Todo: - Currently KeyguardSecurityContainer wipes the whole device when the maximum fails has been reached on any profile. We need to limit the wipe to the profile for which the fails exceeded the maximum number. - Intents with ACTION_SET_NEW_PASSWORD need to be forwarded to the parent of the profile when sent from a managed profile Change-Id: I8532c59f753f8d9c61200f553f275214ad90276e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
511e0d8323d2d2ed341ba40b15bc646e134ac03b |
|
24-Mar-2014 |
justinzhang <justinzhang@google.com> |
DevicePolicyManager Authentication for Lock Task Here we let DevicePolicyManager keep a list of tasks that are allowed to start the lock task mode. This list can only be set by a device owner app. The ActivityManager will call DevicePolicyManager to check whether a given task can start the lock task mode or not. Change-Id: I650fdae43fc35bf9fd63452283f4e2bbadd11551 Bug: 14611303
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
650c3341be05e268bb247e6a3f5b20afecf2e712 |
|
08-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Group account management methods and add some comments. Change-Id: I994142b557d21fbf75fc500d5ed1da9eceef6599
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
5c02db60be02cc0c4798ea6d9c2b0e6cf972c158 |
|
07-May-2014 |
Sander Alewijnse <salewijnse@google.com> |
Add API to disable account management for certain types of accounts. The account types with disabled account management are stored in a blacklist in the active admin object, editable by profile owners. Change-Id: I57dc5f709ad79674fa28dd006969283585daea24
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
007bbc0ed332a5fb40fbca294870adf854c200dd |
|
07-May-2014 |
Amith Yamasani <yamasani@google.com> |
Fix javadoc typo Use @return, not @returns Change-Id: I6c8fab2d236cf9c68c79090d3830bc3e01c8aa6f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
010cfd458121034075c7439020ffef4eedbcc0fc |
|
16-Apr-2014 |
Adam Connors <adamconnors@google.com> |
Add enableSystemApp methods to DevicePolicyManager These methods allow profile or device owners to enable systems apps pre-installed in the primary user in the managed profile. Apps can be specified by either package name or intent. Bug: 13587051 Change-Id: Ifcbc68c139308506b6c18cf3c0ea62b8026ff75f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c79586ede6dcd6a167bc8360f058cb5cc655b33d |
|
06-May-2014 |
Nicolas Prevot <nprevot@google.com> |
Cleaning code related to the forwarding intent filters. Checking for INTERACT_ACROSS_USERS_FULL Adding equivalent methods in the PackageManager Change-Id: Iaa1328fa666613a78e67ca669ea045144275e895
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3c4d9c56db5b24699956de0a5a841196185363cc |
|
01-May-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Merge "Adds an enabled state in UserInfo instead of DevicePolicyManager"
|
df35d570ed25257c6782e632ab1bae5e1603855a |
|
09-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Adds an enabled state in UserInfo instead of DevicePolicyManager Bug: 14377459 Change-Id: Ib4ec43d87da96c3dddaf9b7ae1796f261863a182
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
10fa67c77e11699391e27975fc2d276a0b8c7cbb |
|
24-Mar-2014 |
Nicolas Prevot <nprevot@google.com> |
Introduce forwarding intents across profiles. The package manager service maintains, for some user ids, a list of forwarding intent filters. A forwarding intent filter is an intent filter with a destination (a user id). If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent. When the package manager service is asked for components that resolve an intent: If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent: The package manager service also returns the IntentForwarderActivity. This activity will forward the intent to the destination. Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
df2258be5bd9df4f9a31c4389e8b07b996d26f0b |
|
28-Apr-2014 |
Jim Miller <jaggies@google.com> |
Fix doc build. We probably don't need to deprecate this constant. It can still be used by partner devices if they choose to continue to support widgets. Change-Id: Ie8c33446e0c5c32d96ed0670df1772adedf6a5de
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
66fbe3dc81f2786b2be9afa122038228a31e2cdb |
|
26-Apr-2014 |
Jim Miller <jaggies@google.com> |
Merge "Add new DevicePolicyManager disable flags for keyguard."
|
50e62183d4aed2fb8e189196c1809e333e71dd89 |
|
24-Apr-2014 |
Jim Miller <jaggies@google.com> |
Add new DevicePolicyManager disable flags for keyguard. - KEYGUARD_DISABLE_SECURE_NOTIFICATIONS - KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS - KEYGUARD_DISABLE_TRUST_AGENTS Change-Id: I4ed2b9cef78b497d87bb719c57fabdad94c18e82
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
be46532c9fbebf3ab6498c1b78013a33f620cd31 |
|
24-Apr-2014 |
Amith Yamasani <yamasani@google.com> |
Allow profile owners to set user restrictions Pass the setting along to UserManager. Fixes a security exception when fetching the profile's enabled state. Change-Id: If71698cf32c52cce1158cf2027443a339bc58488
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
385124d8cee38dee00d4fac31e8fbe46fb30565b |
|
03-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Modify getUserProfiles to return only enabled profiles: Add a new enabled state for a managed profile. Expose that as a new API on DevicePolicyManager. Set the new state when enabling the profile. Return only enabled profiles from the user manager. Bug: 13755441 Bug: 13755091 Change-Id: I2907b182e19b3562592da688b3f68ef5f4088557
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
66e5d96cf9e689148b202787bdc269519c4b6f8f |
|
09-Apr-2014 |
Robin Lee <rgl@google.com> |
Allow ProfileOwner apps to manage app restrictions Simple wrapper around the UserManager.{get|set}ApplicationRestrictions APIs. Also added a new Intent to signal to running apps that the set of restrictions has changed since startup. Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
512675b07d1643f018e84d66e4ee8b641d3e191c |
|
02-Apr-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Add new call to DevicePolicyManager to enable a profile. Bug: 13755091 Change-Id: Idb6975431f842ededf78966c578b0533e6f186af
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
6d36b60bebe77b88e0aff6cefb027f8c6f4716be |
|
04-Apr-2014 |
Jessica Hummel <jhummel@google.com> |
Allow setting the active admin across users. This is required so that provisioning can call it from the primary user when it sets up the mdm on the managed profile. Change-Id: I185af168754aa4aeae61f1d4522c1794681cb400
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
03dd22079cc43ae0a008e5080a45fe665d29a69c |
|
13-Mar-2014 |
Jessica Hummel <jhummel@google.com> |
Standardize the provisioning intent action. Change-Id: Iea7f8827cf4b52e2e97e8675687412108dd917e4
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f72078bdc54d1ecd286c21d8460e522582d64627 |
|
06-Mar-2014 |
Jessica Hummel <jhummel@google.com> |
Move the provisioning intents to DevicePolicyManager. Change-Id: Ibde867b193e64c1fda8d9c84b0d1be36a1592035
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
9070484e179b2215ea595c8f3f1f69dbc0dc149d |
|
01-Mar-2014 |
Yuhao Zheng <yuhaozheng@google.com> |
Return detailed reason of invalid proxy settings Make Proxy.validate() return valid/invalid int code, instead of throwing exceptions. If invalid, detailed reason code is returned (currently for Settings UI use). bug: 13248097 Change-Id: Ic68d03f666f1cd63667afc311de7dc370d233901
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
875e2101d71afe7e4acf10b061c942fbf7294775 |
|
24-Feb-2014 |
Torne (Richard Coles) <torne@google.com> |
Fix missing # in method name in javadoc. Fix doc generation. Change-Id: I2e333a7224eeaff7a870fedc7f7a4eb113d1fe2f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
f475ca33d9232785710aaa438f17915029dfa83b |
|
17-Feb-2014 |
Sander Alewijnse <salewijnse@google.com> |
Enables a profile owner or device owner to set and clear default intent handler activities. Those intent handlers are persistent preferences. They will remain the default intent handler even if the set of potential event handlers for the intent filter changes and if the intent preferences are reset. Change-Id: Id0cfae46f93c10d89e441f272096a205ec518dd0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
661ec4710b30516a2c7a1101ba65ecac109af619 |
|
11-Feb-2014 |
Adam Connors <adamconnors@google.com> |
Change API for setProfileOwner to require userId Previously the userId of the current process used but it makes the provisioning process cleaner to be able to pass it in explicitly. Change-Id: I670c4cf3638f1340f6d0bf856c3e01045df8c29e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
776c555d954d9494069f786785877c08add27327 |
|
09-Jan-2014 |
Adam Connors <adamconnors@google.com> |
Extend DeviceOwner concept to accommodate ProfileOwners ProfileOwners, like DeviceOwners, are Device Admins that have additional priviledges. ProfileOwners however are scoped per user. Change-Id: I1e22c85878e0672121e6ebbe97fca38591f992b2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2450a0e669f2edf7e35a5db420bdd445aa9f73e7 |
|
20-Sep-2013 |
Paul Quei <paulquei@gmail.com> |
Fix typo in DevicePolicyManager documentation Typo in DevicePolicyManager documentation See: http://code.google.com/p/android/issues/detail?id=60235 Change-Id: Ic120297cfdc46ec49f870e0750ec831ba6362399
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
0469f41010d8001dba5e09606bb631b1d3313021 |
|
05-Sep-2013 |
Maggie Benthall <mbenthall@google.com> |
CA cert monitoring: add notifications and actions for dialog In DevicePolicyManagementService, on boot and when certs are installed, post notification to tell the user that their traffic may be monitored. Have QuickSettings use the MonitoringCertInfoActivity instead of building the dialog itself. Bug: 10633199 Change-Id: Ie4b97295a9fc25867c87872feccdb17f4bea071d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
334c7e32d494baf3bf0ae371d6b5949c80368982 |
|
08-Aug-2013 |
Geoffrey Borggaard <geoffreyb@google.com> |
Add a name to the DeviceOwner We will need to display the name of the device owner (the human readable name of the institution) to the user. "This device is managed by google.com" Change-Id: Ic33b6530c19cb14a118245692697205de3911a58
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3b458ad9ee5f2d6b7cf28a13bc29123cdf540763 |
|
19-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Improve API and documentation API for querying accounts visible to a specific package. Improve API and docs for device owner. Bug: 8657158 Change-Id: I01b8701534f64b383391508a49ae93ed21f22ae0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
71e6c697e54a43d357cc25d87a446d140f17396a |
|
25-Mar-2013 |
Amith Yamasani <yamasani@google.com> |
Device Owner, a special kind of device admin A Device Owner cannot be uninstalled and is available to all users. It must be registered before the device_provisioned flag is set. Device admins can be disabled until used, but visible to device policy manager, so that users wont be bothered with update requests. Opened up a few related APIs for use by a system-installed Device Owner. Change-Id: I847b5fe68c0f724863f778a67602b5bddc79d8e5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
40a419c2a5f83a00a2e6978ded4e8fcf634b7b46 |
|
08-Nov-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge commit '58ed5d748c0b9b64845975ef5844ad313de7c3f6' into HEAD
|
58ed5d748c0b9b64845975ef5844ad313de7c3f6 |
|
07-Nov-2012 |
Kenny Root <kroot@google.com> |
am 768d9e1a: Merge "Correct executable bit for source files" * commit '768d9e1a72ceee7d4a5f608776b87b62d6ce4a04': Correct executable bit for source files
|
3a084af2e90849aaa8beb3a610189e3399c63ea0 |
|
07-Nov-2012 |
Kenny Root <kroot@google.com> |
Correct executable bit for source files Many media files and source code files were marked as executable in Git. Remove those. Also a shell script and python script were not marked as executable. Change-Id: Ieb51bafb46c895a21d2e83696f5a901ba752b2c5
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3520774a91aee6fd59200aef4238efbdb580202a |
|
02-Nov-2012 |
Jim Miller <jaggies@google.com> |
Update DevicePolicyManager documentation with new keyguard flags Change-Id: Idb1fa306a5706ba5b9543d7dff5450a4af5c394f
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
48b9b0d068844af9eb37c215484831c4d6b831b0 |
|
20-Sep-2012 |
Jim Miller <jaggies@google.com> |
Make DPM API for disabling keyguard widgets more generic This change renames the widget-specific API to be more generic to allow further disabling of keyguard-specific customizations in the future. Currently only allows disabling widgets and the secure camera but can now easily be extended to disable other features we add. Fixes bug: 7021368 Change-Id: I3934cc2e7c64e0c6d511efb86980fc38a849708d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
599dd7ce9adf8ca067cefb0b191a5ac20ec35a79 |
|
15-Sep-2012 |
Amith Yamasani <yamasani@google.com> |
DevicePolicyManager per user Bug: 7136483 Store device policy information for each user and apply them when user switches. Global proxy can only be controlled by owner. Camera restriction applies to all users, if any one has an admin that disables it. Storage encryption can only be controlled by owner, although other users can query the state. Wipe data will only remove the user if non-zero, wipe the device, if zero. Change-Id: I359be46c1bc3828fd13d4be3228f11495081c8f2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
b8ec470617590fa2025db869e8e80dcce8eaec23 |
|
01-Sep-2012 |
Jim Miller <jaggies@google.com> |
Update DevicePolicyManager with ability to disable keyguard widgets Change-Id: I5876e9e180b2a995aaa355fbbb2b67cebb86104d
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
fd63c85742f4b12065418d48ae10be4bb12468f5 |
|
25-May-2012 |
Jean-Baptiste Queru <jbq@google.com> |
Merge "Wipe the user data out in any case."
|
f535cb04f08575d29118fab0342b1e6274091734 |
|
15-Feb-2012 |
Masanori Ogino <ogino.masanori@sharp.co.jp> |
Wipe the user data out in any case. When the external storage is not mounted, the android system won't wipe out the user data (i.e. "/data") if wipeData() is called with the flag WIPE_EXTERNAL_STORAGE. We think that the user data should be wiped out in any options and also wipeData(int) method currently supports also for a external storage. So we will also change the API reference comment. If we should care about backward compatibility of this method behavior with the option WIPE_EXTERNAL_STORAGE, then we would add an another bitmask something like a ALWAYS_RESET. Change-Id: Id7bf673c722bacc0480d32e46553b9a348513879
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3aef8e1d1b2f0b87d470bcccf37ba4ebb6560c45 |
|
20-Dec-2011 |
Joe Fernandez <joefernandez@google.com> |
docs: Add developer guide cross-references, Project ACRE, round 4 Change-Id: I1b43414aaec8ea217b39a0d780c80a25409d0991
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3e5d3fd7e172ee85a7bb67baa01acbc3549dfdb6 |
|
03-Sep-2011 |
Jim Miller <jaggies@google.com> |
Fix 5185505: Update DevicePolicyManager to support weak biometric security. Change-Id: If0fa49908a10d8057b9398112d47eb968cc77060
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
2447edd85baac3225a12b868ef40f76cfdc6ec11 |
|
10-May-2011 |
Ben Komalo <benkomalo@google.com> |
New device policy to disable camera. This introduces a new policy that a DeviceAdmin can use to disable _all_ cameras on the device. A separate CL will be made on the media side to watch this policy bit and act accordingly. Bug: 4185303 Change-Id: I700cfc4a8317bb74087ccae39346d74467fc58b2
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
50c294f21b3348010c3f91c5a998d54e1e45d2e4 |
|
08-Mar-2011 |
Andy Stadler <stadler@google.com> |
Clarify rules about encryption of emulated storage. Bug: 3351426 Change-Id: I3a8fcd369862f3eab1781699108e29fe7ab474a0
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
91fd9a97727b6aa0b669b92bb0f7ef1db884dd26 |
|
17-Feb-2011 |
Jim Miller <jaggies@google.com> |
Merge "Fix 3197205: Minor edits to device policy admin strings and documentation"
|
6b85768058b065cc682757a366abc828c9ca727a |
|
17-Feb-2011 |
Jim Miller <jaggies@google.com> |
Fix 3197205: Minor edits to device policy admin strings and documentation Change-Id: I3788772c375b916752cd8a98ff5d3751448e4334
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
d26727273d16745ceddc2203121d29c3a9e7733c |
|
16-Feb-2011 |
Andy Stadler <stadler@google.com> |
@hide DPM global proxy settings They don't work as advertised, so remove from SDK. Bug: 3460938 Change-Id: I87f80ebf38b228a4085630f1c2526c1d86b93dd7
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
22dbfda976aab9ae897eed0625e2e64ead32bbc4 |
|
17-Jan-2011 |
Andy Stadler <stadler@google.com> |
Add internal plumbing to DPM for encryption * Add code to persist per-admin setting * Add hooks for OS-level tie-in (is supported, get / set status) * Add 3rd API call to get OS status (irrespective of admin settings) * Remove "REQUESTED" status, no longer relevant with 3rd API * Fixed bug that impacted global proxy settings * Update api/11.xml to match current.xml Bug: 3346770 Change-Id: I56bdf9a7894f6ca4842402c7b82ddb3caf4b37b9
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
7b0f8f08ac7b3ed5cf462b92283713b033d6a64a |
|
12-Jan-2011 |
Andy Stadler <stadler@google.com> |
API changes to support encryption in DPM * New uses-policies value * Definitions for storage domain and encryption status * API to get and set encryption status * Intent to launch encryption changes * Both new calls bottom out in the DPM service and are suitable for a device that does not support encryption. NOTE: Nobody should use ACTION_START_ENCRYPTION yet. It needs a receiver to be built in Settings (different CL). Change-Id: I2ae193bedbec59f6ba46c0ec7de12ecf321e5803
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c25f70a440ef9468085b8d98c8416c7e8b116753 |
|
09-Dec-2010 |
Andy Stadler <stadler@google.com> |
API CHANGE - Add hasGrantedPolicy() API * Allows an app to detect that it needs to have additional policies granted * Add "refreshing" parameter to setActiveAdmin() to handle this case * Minor cleanups to eliminate warnings (mostly for unused things) Bug: 3253179 Change-Id: I4bf639bf560557130bf98e8cfb75f996fac416f1
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1f35d487ba1a5208e66bc960f35f6e1d874fbd1e |
|
20-Nov-2010 |
Andy Stadler <stadler@google.com> |
Fixes to DevicePolicyManager.setPasswordExpirationTimeout * Fix permissions problem in DevicePolicyManager * Allow short timeouts (primarily for testing) * Remove unused debugging code Bug: 3212583 Change-Id: I3770b1c6f090363e8e8d65db92839cd53de05c45
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a4e28d181942018ba8759989799a28fa88764ce3 |
|
09-Nov-2010 |
Jim Miller <jaggies@google.com> |
Add password expiration support to DevicePolicyManager. Change-Id: Ib2629ec547c123ac489d7f4cbd4e0a1d4aa07620
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
027610a76e67f39e3a435d68ec785a1cf09dcf9c |
|
18-Oct-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 964eb438 to master Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
|
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 |
|
16-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3094621 and #3094609 - wipe sd card 3094621: add "wipe sd card" option to factory data reset 3094609: collapse unmount/format into one command Also since we have decided that it is important to consider the Crespo storage as internal storage, DevicePolicyManager gets a new API to be able to wipe it. (No big deal, since all of the work for this is now done in the implementation of the new UI.) Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
8063589c6ca6ee3575befe8caf4f6c3e6b58b655 |
|
05-Aug-2010 |
Oscar Montemayor <oam@google.com> |
Removed extra parameter tag in JavaDocs Change-Id: I0bc6f201d12a95a7c96b3fac90688d113a554d22
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
69238c6a37ae43c748ad9cd7613f2209149ee7da |
|
03-Aug-2010 |
Oscar Montemayor <oam@google.com> |
Device Policy Manager changes to enable Global Proxy. Change-Id: I8489df7d28e4c5312e10d5cecc8e2a182413a034
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
c857740f242169f2ca7fd42f0d1268661b399ad6 |
|
05-Jun-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Adding support for minimum number of non letter characters. Change-Id: If54cb7209d65eef826d474d7e0dbbef63d2f2b47
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
1a0ce1cc6f6bda7ef7345b20860bc0c8cd3d8451 |
|
09-Jun-2010 |
Jim Miller <jaggies@google.com> |
am db603bb5: am 3b68548d: am 75b6a6b9: Merge "Fix 2737842: Disable KeguardManager API if device policy is enabled" into froyo
|
284b62e1b8c3419bfd02c6fea5ba0a68146c06f8 |
|
08-Jun-2010 |
Jim Miller <jaggies@google.com> |
Fix 2737842: Disable KeguardManager API if device policy is enabled This change adds notification to find out when the device policy has changed. When an admin adds or changes a policy, we get notified and reset the state of keyguard to be enabled. It also moves disabling keyguard into the TokenWatcher.acquired() method to avoid disabling keyguard when a policy doesn't permit it. This avoids reference counting issues in TokenWatcher and hence relieves the ordering issue. There is one remaining caveat. An application that uses KeyguardManager to disable keyguard will need to disable keyguard again after any policy change. Tested: Install and run app that disables keyguard with no admin. Result: keyguard is enabled/disabled as expected. Enable admin and set quality = "something" after installing & running app. Result: keyguard is enabled. Change admin password quality to "unspecified" and re-run app (per caveat). Result: keyguard is disabled. Change admin password quality to "something" again. Result: keyguard is enabled. Disable admin : Result: keyguard is enabled until app runs again (per caveat). Added minor cosmetic changes after review. Change-Id: I302f2b01446bf031f746b0f3e8b5fd7a6cc0e648
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
a15dcfaf2bc7cbd13b30db6766afe3bbaa01db97 |
|
25-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2677197: Adding minimum complex character support. Change-Id: I520bc5f9aa924bf9b5585b2235a91cc96cb99c25
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
3255823de062e981f7bfc7994919207988697e45 |
|
21-May-2010 |
Konstantin Lopyrev <klopyrev@google.com> |
Fix 2673731: Adding support for password history to Device Admin. Change-Id: If3240048813e32b2bae79fe5cb8a73aea20ec56c
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
85f2c9ce5a0e074df2429a5d66e1754e368a0430 |
|
22-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2530103: ActivePassword data in Device Policy Manager needs to be persisted Also fixes how the quality vs. mode is handled to be more consistent, which also required introducing a new "alphabetic" quality since it is possible for the user to enter such a password. The current password quality and length is stored in the DPM, since at boot it couldn't figure this out from the stored password. Change-Id: I519d9b76dd0b4431bcf42920c34dda38c9f1136e
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|
87bba1ee14279bb14a28d42e27c4ef66d9967bf8 |
|
27-Feb-2010 |
Dianne Hackborn <hackbod@google.com> |
Move DeviceAdmin APIs to android.app.admin. Also add ability for admins to hide themselves when not in use, a facility for admins to not allow other admins to reset their password, and debug dumping.
/frameworks/base/core/java/android/app/admin/DevicePolicyManager.java
|