History log of /frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
c02a10d8b626469ea64babebfd88fb96ea9ececf 12-Sep-2015 Svet Ganov <svetoslavganov@google.com> Default grant SMS and Phone to the verifier

bug:24012164

Change-Id: I756644c8044076b2550d7ca104f542f50da0226b
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
f2cb6f7e3ea143ba4acace0821c9d49e363da7eb 17-Aug-2015 Junda Liu <junda@google.com> Merge "Grant SMS carrier provisioning app the permission to receive SMS." into mnc-dev
d878f5327793310d5fda083f800644bc96d6a6e8 13-Aug-2015 Junda Liu <junda@google.com> Grant SMS carrier provisioning app the permission to receive SMS.

Bug: b/22982966
Change-Id: I4af525532e2f97973ba255bf8dbb002e42997eea
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
52153f4c0540a991b5b7214f4f14b5a891479a3c 11-Aug-2015 Svet Ganov <svetoslavganov@google.com> Add GTS test to ensure valid default permission grants - framework

The platform grants runtime permissions by default to apps on the
system image that provide core device use cases which a user expects
to work out-of-the-box. We are now adding a test to ensure that
OEMs cannot pregrant premissions on non approved components.

bug:23043018

Change-Id: Id76717cce0ee59678956bd0be347d3c045fe4c51
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
0e62952aad13270bf3577a3381446cfc2dfba9ed 06-Aug-2015 Svetoslav <svetoslavganov@google.com> Pregrant unrevokable storage permission to the CertInstaller

bug:22988119

Change-Id: I310aa7149f67a7918cecfda13c69ab91c7c6e1a8
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
0855357c4fec1fddb4ebf20d9e7986090962f99d 03-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "User correct category for finding headless sync adapters" into mnc-dev
05069b96d0464744e27f0eededcff7bf0ba17e9e 01-Aug-2015 Svet Ganov <svetoslavganov@google.com> User correct category for finding headless sync adapters

bug:22857409

Change-Id: Icc42f1af72c59fba3c60e1bcd558c621df70940a
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
8d1d8fdaa40cc2149604c9947a7ccf1a6a494e36 30-Jul-2015 Shishir Agrawal <shishir@google.com> Merge "Add SMS permissions for Carrier app." into mnc-dev
ad63247690a5082a74891cd16278f6c2ba8760c6 30-Jul-2015 Shishir Agrawal <shishir@google.com> Add SMS permissions for Carrier app.

Carrier apps can act as a transport for SMS and MMS. They may proxy SMSes that
user is sending and need to have access to be able to send these SMSes via the
radio.

Bug: 22830087
Change-Id: I98c0ff1b208be1a7227aef7a4a69222050b3ddb4
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
393c7fb2c67e7fc9dfab710a52313f9b55aaa57c 29-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Default grants: handle update system packages" into mnc-dev
4aa97977863e01af3803afcee97292109bbec97c 29-Jul-2015 Svetoslav <svetoslavganov@google.com> Default grants: handle update system packages

If there is an app on the system image that gets default
grants but it is updated with a version that does not use
all permissions the version on the system image does, we
would wrongly try to grant a permission to the updated app
that it does not request and crash as a result. Now we
default grant permission that are requested by the system
version of the app regardless if it is updated but only if
the system app is not updated or the update also uses these
permissions.

bug:22800767

Change-Id: Ic22b62ba4976367420a56bdadc8e3824b0b9104f
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
cf85562bc9a0f01db51b4088e72f05a8089fc7f1 29-Jul-2015 Sailesh Nepal <sail@google.com> Default permissions for sim call manager

This CL adds the following permissions by default to the
SIM call manager:
- microphone
- phone

BUG: 22790160
Change-Id: Icaf1db6c6943b3ddbd16a946a81d1bfb734d761f
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
c6ab8b9ecbf08fe3b2dda18caaa808ce6280530d 23-Jul-2015 Svetoslav <svetoslavganov@google.com> Grant record audio to system reco service by default

bug:22668415

Change-Id: I0fec7cc671bb1cc3a13b870748fc8e110a11250e
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
fbc6f2cb6c5313ac246b8554764a719dd06582fc 18-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Revert "Do not auto grant GET_ACCOUNTS as it is temporarily normal"" into mnc-dev
5ff4383b466fc26e6696a7bbeb6df5eb7a3c8cc5 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Grant default permissions to default apps despite user choices." into mnc-dev
4bb5187e63456a500518e698d5646672188cb3c3 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Grant default permissions to default apps despite user choices.

This implements the policy of granting default permissions to default
apps upon a selection despite past user permission choices. The act of
picking the app as the default one means the user expects it to work in
this capacity as SMS app, Phone app, Browser app.

bug:22062549

Change-Id: I5e427f2b939e85bb8bbfd311cc271b96857a7ce6
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
54a0cf1b95d5dfc40ef26035dfc4f45c0e7e3fe3 17-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Revert "Do not auto grant GET_ACCOUNTS as it is temporarily normal"

This reverts commit 33852d8cd21434b4106b8f2c504752ef34abb2da.

Change-Id: I29a212876c93ae0288967ffcff223abafad78827
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
33852d8cd21434b4106b8f2c504752ef34abb2da 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Do not auto grant GET_ACCOUNTS as it is temporarily normal

bug:22550851

Change-Id: Iea5dd8fde07074220167a937b32208b1c9488d9d
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
bc92479a297904856f0815bc14bcb6763bbbf8bf 16-Jul-2015 Makoto Onuki <omakoto@google.com> DefaultPermission: GET_ACCOUNTS is now in CONTACTS

Bug 22532312

Change-Id: If7ad0faa3a196bb28da1ddc13788c0430df1d1ee
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
50a8bf4da0fe1685bfe6a0ecd9a9677e363e2ee1 15-Jul-2015 Svet Ganov <svetoslavganov@google.com> Grant default permissions to the setup app robustly.

There is a zoo of components that handle the home intent and
have different priority. There is no reliable way to distinguish
the setup app from the other apps that handle home as some of
them have lower priority than the setup app and some higher.
This change adds a dedicated category to recognize the default
setup app.

Uncommented the code that grants accounts permissions as the
get_accounts permission is now a runtime permission and can be
granted.

bug:22471024
bug:22501463

Change-Id: I41726751fa2567cbcd7d09c7acfa7615b8aba577
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
fc2bc7f170ba564bc439fd22dd5a779d96670ffd 14-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Check signatures of privileged persistent apps for granting defailt permissions" into mnc-dev
8b24a1d30fa5d2b80b2b6a37454dcc1e67d0e79d 14-Jul-2015 Svetoslav <svetoslavganov@google.com> Fix two grant default permissions edge cases.

1. When querying for components to which to grant default
permissions we are now getting disabled components as
well as we want such packages to get default pemrissions
on upgrade as disabled components may get reenabled.

2. When resolving activities to whose packages to grant default
permissions we skip the corss-profile and skip-profile filters
as they are set by device policy which should not affect
implicitly default permission grants. Policy has explicit
APIs for permission management.

bug:22405963

Change-Id: Idf56d35e567a6fd6e097cd45988d1561422ee6fc
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
96d00ab359d60197321f06b4feb3d01f3fa03a29 13-Jul-2015 Billy Lau <billylau@google.com> Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev
22b3f4cb15207239e203d5ec8b72ec6bc90fef35 08-Jul-2015 Billy Lau <billylau@google.com> Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission

Raised the protection level of WRITE_SETTINGS permission to appop and also
allowed backwards compatibility with pre23 flag. Also made sure that this
permission is not added as RuntimePermission in DefaultPermissionGrantPolicy as
that breaks a lot of gmscore stuff.

Introduced new action to manage write system settings as a new API and
renamed the string that describes the managing of overlay permission.

Change-Id: Ifd25a6ddc06de68ee37015cb9fb23452e4ef10f4
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
824d453246d65db43fd7bc24df6fa3d536d2b54a 11-Jul-2015 Svet Ganov <svetoslavganov@google.com> Check signatures of privileged persistent apps for granting defailt permissions

bug:22391058

Change-Id: I56d060f0435fadf87a8cf255ea887dd5b3903821
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
6b7a07848b21001a41aea1b6426ec2f75ea652ec 09-Jul-2015 Jack Yu <jackyu@google.com> Merge "Grant SMS permissions to Cell Broadcast receiver which emergency/non-emergency broadcast messages from the network." into mnc-dev
ed79bf5d74009f0589407c0289e3c7f41488a0f3 07-Jul-2015 Jack Yu <jackyu@google.com> Grant SMS permissions to Cell Broadcast receiver which emergency/non-emergency broadcast messages from the network.

bug: 22229152
Change-Id: Ide02f0c3faafd37b8205f92df8a33a0bc95dd3d7
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
3e07ee078de8e364d6be0b18b2b514e40decdb3c 08-Jul-2015 Svetoslav <svetoslavganov@google.com> Merge "Grant installer and verifier install permissions robustly" into mnc-dev
3e7d977ff7c743713f0ad6336a039d7760ba47d1 07-Jul-2015 Svetoslav <svetoslavganov@google.com> Grant installer and verifier install permissions robustly

bug:22248271

Change-Id: I3a47ae9a112ba7d88b421fcb5f9651d1168ba7a5
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
7a4082edc4fb85fd0c9aa92d799cb2cb9d957a3e 07-Jul-2015 Makoto Onuki <omakoto@google.com> Give fixed READ_PHONE_STATE permission to calllog provider

Calllog provider lives in the same APK as contacts provider.

Bug 22300894
Bug 22297735

Change-Id: I77f3ee18f093b5adb819308c113062c490a3b54b
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
a72eac60c7a34089c8e288f03ce031172e3b36b4 06-Jul-2015 Amith Yamasani <yamasani@google.com> Fix a typo causing NPE in restricted profiles

Bug: 22287398
Change-Id: Iec19d890c7b0b7ffed3381dc3f5a9b3e761362a7
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
77ab6a888afaeb9010c7c3884adcd4819dbcee66 03-Jul-2015 Svet Ganov <svetoslavganov@google.com> Show basic feature warning for default granted permissions

bug:22174223

Change-Id: Ie8209e1f678ac459893151b5125e86eb5025aad8
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
2799767886cc230d554ec7e7e9c7596b3e311e13 02-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Grant the default gallery app storage permissions" into mnc-dev
200d494b93e8920c61f3795c6c8fc8aac99f99b9 02-Jul-2015 Svet Ganov <svetoslavganov@google.com> Grant the default gallery app storage permissions

bug:22127986

Change-Id: I1ecd49d57d410bf10734fea4e0c92e6e5028d648
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
a5a0d94023b2d9b7c9019fc40e7479995b82066c 02-Jul-2015 Svetoslav <svetoslavganov@google.com> Make granting default SMS and Phone permissions robust

The default dialer and sms apps are provided by the telecomm
stak which is brought up asynchronously as a service to which
the system binds. Hence, by the time we grant default permissions
this service is not bound and we do not know the default dialer
(accidentally the default SMS app is available before the service
is up). Now the default permission grant code is robust to handle
both cases of the default sms and phone apps being available
at grant time or asynchronously.

bug:22208642

Change-Id: I6385a0432368731aa9caea046d57eccbfb5abac0
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
0010b70beae6fafd3faf06e1b02291f59f9f85db 01-Jul-2015 Svetoslav <svetoslavganov@google.com> Grant permissions to headless system calendar/contacts sync adapters.

bug:21861781

Change-Id: I5f9905a23ba1b23e387adf2cea842172d34207b0
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
fc2740ae571f68f1a83bf3197655970e7e597de4 01-Jul-2015 Jeff Sharkey <jsharkey@android.com> Merge "Hand out storage to more system apps." into mnc-dev
7186dd3a3073320df053145acce8e5d23568f312 01-Jul-2015 Jeff Sharkey <jsharkey@android.com> Hand out storage to more system apps.

Grant storage access to the Storage Access Framework provider that
offers to delegate access to storage devices. Also grant to the
default music app.

Bug: 22104872
Change-Id: I8cf7dceec8b4c1e31f8ddd40b094ccd4ecb1caf8
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
4a23ac45895ec65e2357b2e52726229dbead9bb1 30-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "Installer is a part of the system with unrevocable permissions" into mnc-dev
6a166af8fd25445c1b9a4d7869d87557fcb79cf9 30-Jun-2015 Svet Ganov <svetoslavganov@google.com> Installer is a part of the system with unrevocable permissions

1. Mark the installer permissions as not revocable.

2. Make the permission result dispatch more robust to handle installer death.

bug:22012614

Change-Id: Idee30ca884b87ccf97ba1bb878d4c49912e474b8
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
82143339d4bec1e67f8f3a8df6d276df0b2f9e03 30-Jun-2015 Dianne Hackborn <hackbod@google.com> Fix issue #22185268: apps crash with missing permissions and NPE on AppOpsManager

Turn off GET_ACCOUNTS permission assigning for now.

Change-Id: I576117b26a43ca2da10db8bb2b1e4e176109ae39
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
b6e0013768f11e47b30cd707fd249b4609cc6ca7 30-Jun-2015 Svet Ganov <svetoslavganov@google.com> Fix build

Change-Id: I64fc25c9ddd79c31e5bf34ec7bb4e21541be315b
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
03b5f128dbc375c1a28468773f39e85a5f70fc9a 30-Jun-2015 Svetoslav <svetoslavganov@google.com> Merge "Grant default permissons to the default SMS, Phone, Browser app." into mnc-dev
cdfd230a392d0f0557a3a5bada221b7a05113392 26-Jun-2015 Svetoslav <svetoslavganov@google.com> Grant default permissons to the default SMS, Phone, Browser app.

The default SMS, Phone, Browser are selected in the UI and we
grant default permissions to these. We do this regardless if
they are on the system image as the user has made an explicit
choice in the UI and the permission we grant are considered
essential for such type of a core app to operate properly.

bug:22104986

Change-Id: Ide8caeb524b43dde11a20460666cf34c4d35f84b
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
388cd2c2ccc10c7ff8b074c9cb22fa03925b8ad2 27-Jun-2015 Dianne Hackborn <hackbod@google.com> Auto grant GET_ACCOUNTS where appropriate.

And add in a few other things.

Change-Id: If86a04a8ec63c252f895dcceb60a0248abb91083
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
143e118fa90bbeb8cf558ec0d303639d15ee7db7 27-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "Make grant default permission more robust." into mnc-dev
ba3ba81eb8756641ae0079ae9da2779cc22aeb89 26-Jun-2015 Svet Ganov <svetoslavganov@google.com> Make grant default permission more robust.

Change-Id: If492ee3305774419671bbdb72b438c8e540005e9
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
ca8e6da41c6e63e3ed17eb461171f1ef2e1d29c6 25-Jun-2015 Dianne Hackborn <hackbod@google.com> Fix issue #22023824: Download folder is not created in internal storage

The media provider and some other things need to be given storage access.

Also, seems like we should give storage access to the camera app as well.

And add a dump dump command that will dump data about a particular
permission name.

Change-Id: Idaaa9bba2ff4dc95290cf6d17e5df933df91e909
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
8d9ad19341e19256651ef86274a4382f2c09b279 23-Jun-2015 Jeff Davidson <jpd@google.com> Merge "Default permissions for carrier apps." into mnc-dev
2a880312086147577e1e814bda6985fa97fb343b 23-Jun-2015 Jeff Davidson <jpd@google.com> Default permissions for carrier apps.

Grant permissions in the PHONE and LOCATION buckets to default carrier
apps as defined by the telephony stack. Provide a system API to grant
default permissions for carrier apps, as the set of apps may change
when a new SIM is inserted.

Since the phone process is separate from the system process, we need
to allow for binder calls to these APIs.

Also fix a log tag that is too long (android.util.Log drops messages
silently if the tag is > 23 characters).

Bug: 21696731
Change-Id: I98ca0c49c69f621f835ba57c1fd0505f2cec0d0d
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
975fa474a7926d6041a4117bfbe5faa6e6e63057 23-Jun-2015 Svet Ganov <svetoslavganov@google.com> Auto grant read external storage too - it is now dangerous.

We grant external storage permissions to some default handlers by
default. Read external storage was promoted to runtime permission
but was not granted as a part of the external storage group, i.e.
with write external storage.

bug:21980225

Change-Id: I1edd7ae13222f12c9a488efb1919f5cf96e4b69d
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java
adc1cf46045ae756d3a9ccbccf6b0f894e4c1edd 16-Jun-2015 Svet Ganov <svetoslavganov@google.com> Only grant runtime permissions to special components.

Now runtime permissions are granted only to components that are
part of the system or perform special system operations. For
exmple, the shell UID gets its runtime permissions granted by
default and the default phone app gets the phone permissions
granted by default.

bug:21764803

Change-Id: If8b8cadbd1980ffe7a6fc15bbb5f54a425f6e8f9
/frameworks/base/services/core/java/com/android/server/pm/DefaultPermissionGrantPolicy.java