c845b2a21cedda4dd221fcf01aae74706ecade94 |
|
13-May-2016 |
Chad Brubaker <cbrubaker@google.com> |
Use an attribute for the network security config resource Originally we went with the meta-data approach to make unbundling easier, however with the amount of platform changes that the config ended up relying on it would be better to focus on exposing it through the platform. Bug:28763009 Change-Id: Iaf80001b1980220cd2e1e05faf2dc86af41700e1
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
6e2e7f585ba74213fde92bd23150949f76335fba |
|
02-May-2016 |
Todd Kennedy <toddke@google.com> |
use 'int' for min sdk version per api council Change-Id: Id3c1191534f61a0d511a6e9932f50ee613830999
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
2df5ba777a6ad271b1af6d9ef18d79e2aca5f105 |
|
11-Apr-2016 |
Chad Brubaker <cbrubaker@google.com> |
Document when usesCleartextTraffic is ignored. In N and above when using an Android Network Security Config the cleartext configuration from that is used and android:usesCleartextTraffic in the manifest is ignored. Bug:27596429 Change-Id: I50ec765cead6cfd6bbaec585723f99d72e0fd945
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8a372a0a280127743ce9a7ce4b6198c7a02d2a4f |
|
16-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Refactoring FBE APIs based on council feedback. Mostly consists of removing the word "encryption" from most APIs, since we can't actually make promises about the data being encrypted. Bug: 27531029 Change-Id: Iace9d7c4e64716abf86ed11847c40f3947e1d625
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
89d60189cd53a7f0e20c23bb42d4cd4c3dbc20b4 |
|
11-Mar-2016 |
Todd Kennedy <toddke@google.com> |
Add minSdk to dumpsys Bug: 27526333 Change-Id: I0148275013ebab899bcb63c07d71a840539c1863
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
43fbc5f898a488dcfa9ecf3030f05f27ce5428f9 |
|
18-Feb-2016 |
Christopher Tate <ctate@google.com> |
Add android:backupInForeground An app can now declare that it really needs to be backed up whenever possible even if it is currently engaged in foreground- equivalent work. Only applies to full-data backup clients: key/value backups are not intrusive on normal lifecycle so they can already happen in such circumstances. Bug 26790411 Change-Id: Ia0ebcc7a53da888ae9ae4d63cd4bcab6e3a2e866
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8212ae0aee1700b9c287ebadf15af8dacdc8eae6 |
|
10-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
Consistent naming for internal storage APIs. Also completely remove a few confusingly named deprecated APIs. Change-Id: Ia7e4ea3190a97f0a7dfa9bebf2118da0866ec38f
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
354cd3ce2213a1032d9138ea6fa1420f055ab08c |
|
17-Dec-2015 |
Svet Ganov <svetoslavganov@google.com> |
Multi packages per APK This change introduces the ability to have multiple packages per APK. The feature is currently restricted to privileged apps and updates to such apps. In essence the manifest can have multiple child package declarations. A child package can declare everything an Android package can except some tags or attributes that are not applicable and instead inherited from the parent when needed. For example, the target SDK of the parent applies to all children. A child package can be updated only through the parent package. A package with multiple child packages is installed, uninstalled atomically - no partial installs where some child packages are not installed. The remaining work is to ensure broadcasts are also sent for child packages. This will come in a subsequent change. Sample app:ag/848432 Design doc: https://docs.google.com/document/d/18nFWtJuZchLxrHf5SBbJW03-Ky9Rh_G0-OVB14b6u78 Change-Id: I6fd021d981bf5786290e0c53502724a14c97358c
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e4697136ed8d3e2486738b5798b22f2226b7de75 |
|
07-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
Migrate default app data on non-FBE devices. When a system app requests "forceDeviceEncrypted" they expect their default app storage to point at a consistent location regardless of device FBE support. So when booting upgraded non-FBE devices, we may need to migrate any data from CE to DE. Note that on non-FBE devices these are just semantic locations with identical protection. This migration *only* works for non-FBE devices; changing forceDeviceEncrypted flags on an FBE device always requires a full data wipe. Bug: 26668510 Change-Id: Ic5dfeaaf2db26c385901a638ca8ec35eb3c52859
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
6afdf91b179afd4e4ae9aa0e520961e57638d637 |
|
30-Jan-2016 |
Wale Ogunwale <ogunwale@google.com> |
Allow resizeableActivity to be specified at the application level Makes it easier for developers to set a state for all their activities vs. doing it individually. Bug: 26508215 Change-Id: I8d546487b6461a03f75cce7760522e7af9fc2740
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8de29ca4f3ce2be808eb17cd8739bb533d968a37 |
|
22-Jan-2016 |
Kweku Adams <kwekua@google.com> |
Fixing typo in ApplicationInfo documentation. Change-Id: I6d1d2e5d8bdfefa5ac28e3be46cca78b3a4b09e7
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ba75a9b6bab16114a8206015a4d2c7ce3bd70f2a |
|
07-Jan-2016 |
Jeff Sharkey <jsharkey@android.com> |
Instrumentation targets must have code. If they don't have code, give the developer a somewhat helpful error message instead of later falling into a weird classpath failure. Change-Id: Iebda10173ff99943cbbd71127ae24aa455b709f4
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
a73b8fd1f4faaad00d8a49d6e496aaf249fa7003 |
|
07-Jan-2016 |
Jeff Sharkey <jsharkey@android.com> |
Add some TestApis to fix build. Change-Id: Icf0d8d63f3a41d99e46ebe96003863bae637bd9d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
6142f90b9f99c33c4f75c2057fb1db3bc77425cf |
|
17-Dec-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Introduced PRIVATE_FLAG_REQUIRED_FOR_SYSTEM_USER"
|
1e2839188fb49575b86646d3aadb355c81ef9cc5 |
|
26-Nov-2015 |
Andrei Stingaceanu <stg@google.com> |
Wire call to suspend a package Adds APIs in DevicePolicyManager and PackageManager for allowing a device admin to suspend a package. PackageManagerService sets or unsets a new PackageUserState 'suspended' setting. Terminal command to suspend/unsuspend has been added via PackageManagerShellCommand (as root). Next steps: * use the new 'suspended' setting for denying access to start app (probably in ActivityStackSupervisor) * broadcast a PACKAGE_(UN)SUSPENDED intent for launchers to pick up * remove app from recents (go further and kill it if it is running) * erase existing notifications for this app Bug: 22776576 Change-Id: I718b3498f6a53cc0c6fdfb6d15031e53ddca4353
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
bdbc9692c7cb365d9d3f239baa2377724a6f7bc8 |
|
14-Dec-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Introduced PRIVATE_FLAG_REQUIRED_FOR_SYSTEM_USER When set, signals that the application is required for the system user and should not be uninstalled. Bug: 25616324 Change-Id: Idbbd1618e09c40bdb83fa26c0a3d9662dd73bea4
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
f99104dadddb8d7587aaa607821d284e214eb997 |
|
14-Dec-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Assigned a unique value for PRIVATE_FLAG_EPHEMERAL Previously the value was conflicting with a private flag PARTIALLY_ENCRYPTION_AWARE, which has been added before. Change-Id: I661d8b5f59a39b18288eae47b7522f87b120c57b
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e6748ce31f18782b7a47a5b2eb251efd83e7b609 |
|
12-Dec-2015 |
Andreas Gampe <agampe@google.com> |
Frameworks/base: Use Arrays.toString Fix a couple of cases where Arrays.toString should be used. Bug: 19797138 Change-Id: I905fc79e63face9b26975320a92086c732bf6316
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
6ac42aeed905181b484f97a53db57a17134ef7a8 |
|
09-Dec-2015 |
Dianne Hackborn <hackbod@google.com> |
Add a mechanism for broadcasts to control background dispatching. Right now this is just for the BOOT_COMPLETED broadcast to allow all apps to receive it. Also clean up the dumpsys of the broadcast queue to not have every little detail of ResolveInfo+ActivityInfo+ApplicationInfo, which is just not useful and makes reading the broadcast queue debug output a lot harder because of so much noise there is. And rename the package shell query-intent-* commands to a shorter query-* form. Change-Id: I0d01565babb87e68b840c9756a2ea730d699efc7
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
103d61b9f79de4d7b907227a7925e809e3e183c2 |
|
08-Dec-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Shift around encryption public APIs."
|
7a30a30ebece75f4a73fa604d4c7721d28eecc16 |
|
08-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Shift around encryption public APIs. There are far too many Context APIs with special directory paths to replicate device-encryption versions of them all. Instead, add methods to clone a Context that explicitly stores its data in either credential- or device-encrypted storage. Methods to test the behavior of a given Context. Bug: 22358539 Change-Id: I6a6290a9b282605ce9a1f82742fc2c4c50536754
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
2acf063da08dfff69f184c9a6a90a7a5fe60d818 |
|
25-Nov-2015 |
Svet Ganov <svetoslavganov@google.com> |
Ephemeral cookie API Add APIs for an ephemeral app to set a cookie which is a small peice of data cached longer than the app itself. This is useful for avoiding the user to login every time they use the ephemeral app. The cookie is stored after an ephemeral app is uninstalled. Normal apps or ephemeral apps upgraded to full apps can also use these APIs with the difference that once they are uninstalled the cookie is deleted. The cookie size defaults to 16KB and is configurable by a global settings which can be adjusted via gservices. Also eviction policy is time based with a default of one month and is configurable by a global setting which can be adjusted via gservices. If the cert of the app cahnges (when ephemeral is installed, uninstalled and installed again) the cooke is wiped to prevent data leaks. This cahange also adds an API for apps to know whether they run in an ephemeral mode since it this mode some APIs will not be available. Another API exposed by this change is private for the system and exposes all ephemeral apps - installed and uninstalled. Only the system can call this API. When an ephemeral app is uninstalled the system stores its name, icon, and permissions. When the app is reinstalled or a full version is installed the permissions are propagated. Change-Id: Id4a73a7750bfbabda0bfcb9bf9018d2062e94367
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
2699f065558ba78066887210b0c7346105959860 |
|
20-Nov-2015 |
Todd Kennedy <toddke@google.com> |
Add ephemeral installs * Add a new --ephemeral argument to 'adb install' * Add plumbing to internally track ephemeralness * Create new app directory for ephemeral installs Bug: 25119046 Change-Id: I1d379f5ccd42e9444c9051eef2d025a37bd824fe
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8924e8759f9a8cffb5ad538ca40a7826793aac07 |
|
30-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
Wire up lifecycle, send unlocked broadcast. When the correct lock pattern is presented, ask the system to also unlock credential-encrypted storage, if enabled. The token passed along is empty for now, but can be wired up to gatekeeper in the future. During each system boot, ask vold to lock all users keys to give us a known starting state. This also has the effect of chmod'ing away any CE data when in emulation mode. Define and send a new foreground broadcast when the CE storage is unlocked for the first time. Add stronger last-ditch checking for encryption-awareness before starting an app. Bug: 22358539 Change-Id: Id1f1bece96a2b4e6f061214d565d51c7396ab521
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ba51235ef5c598d845b77fcf14491329493da34f |
|
13-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
More file-based encryption work. Add new "am unlock-user" command so we can trigger changes from the command line. Move FBE check to static method so it can safely be called early during boot before the mount service is ready. Move FBE emulation to persisted system property, and start reading/writing that value. Change default permission grants to ignore current encryption-aware flags, since many of the target apps aren't crypto aware. Always prepare package data directories, which is how we create the new "user_de" paths during boot. Bug: 22358539 Change-Id: I6f58ea2d34b3a466d3775d614f8a13de92272621
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
9edb7bf4c6f9c59d0c469798d5936019e8199043 |
|
17-Nov-2015 |
Jeff Vander Stoep <jeffv@google.com> |
fix ApplicationInfo flag collision Give PRIVATE_FLAG_AUTOPLAY unique value Bug: 25726468 Change-Id: I1dabe26eb4c72004ebd7e33252240e10c15c9159
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
25bfb2b3d82797b78f5f6b5a715dbe5d192a0949 |
|
16-Nov-2015 |
Jeffrey Vander Stoep <jeffv@google.com> |
Merge "pm: selinux support for AutoPlay apps"
|
a4407bfceef1bdb7eb4d83990722a61082d926c9 |
|
30-Oct-2015 |
Jeff Vander Stoep <jeffv@google.com> |
pm: selinux support for AutoPlay apps Add AutoPlay flag to ApplicationInfo. Append autoplay flag to seinfo string - passed to libselinux for domain labeling decision. Change-Id: Ieb45ba328140888c0b679bf344df154658f9fbae
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
f9fc6d6cc05595241bc7ced6d4cab97b45f9b901 |
|
09-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
More file-based encryption work. Add granular StorageManager APIs for key creation/destruction and unlocking/locking. Start passing through an opaque token as part of the unlock command, but leave it empty for now. We now have a separate "prepare" method that sanity checks that user directories are correctly setup. Define a handful of system properties used for marking devices that should be operating in FBE mode, and if they're emulating FBE. Wire a command to "sm", but persisting will come later. Start using new "encryptionAware" flag on apps previously marked with coreApp flag, which were apps running in the legacy CryptKeeper model. Small tweaks to handle non-encryptionAware voice interaction services. Switch PackageManager to consult StorageManager about the unlocked state of a user. Bug: 22358539 Change-Id: Ic2865f9b81c10ea39369c441422f7427a3c3c3d6
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e17ac1569793c333bb4dce86607a342e7c982ae7 |
|
07-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
More APIs for encryption-aware apps. Apps can mark manifest components as being encryption-aware, which means they can safely be run before the credential encrypted storage is available. Start adding filtering logic so that we only return these components when a user is running "with amnesia." That is to say, only device encrypted storage is available, so the user is running but with only partial knowledge of its data. To avoid calling into ActivityManager with the PackageManager lock held, we quickly determine user state and splice the state into the flags for later per-component evaluation. Bug: 22358539 Change-Id: Idc56ec29f1ef04da8963e004314d7f5e47400997
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
15447798a38d2b5acb1998731340255f4203f294 |
|
06-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
Initial file-based encryption public APIs. Define two explicit directories where device-encrypted and credential-encrypted data will be stored. Third-party apps only need access to the device-encrypted directory, so that's the only API exposed for now. General cleanup in how ApplicationInfo details are derived. Bug: 22358539 Change-Id: If0a0108721a4aa1c3052b4912e08604bbf24e1ae
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
712205bac075dc59a1ccd79a860d553ba31402f0 |
|
01-Sep-2015 |
Nick Kralevich <nnk@google.com> |
am 9d586927: Merge "Automatically assign default seinfo labels using the string "default"." * commit '9d586927102b597845607ccc82661e350821de82': Automatically assign default seinfo labels using the string "default".
|
5e16bc5a143b46bbe9a4873adceed85a6241d1d0 |
|
28-Aug-2015 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Automatically assign default seinfo labels using the string "default". default seinfo values are those for which policy lacks a matching stanza in the corresponding mac_permissions.xml file. Prior to this change the null object reference was used to represent the non-matching state. This is in contrast to a policy supplied default stanza which will assign a non null seinfo value. Confused yet? Basically, two default states were distinguished in the code to describe the two cases where either a policy stanza spelled out the base case seinfo label or not. Policy writers could either supply a default stanza or rely on the class instantiated value assigned by the ApplicationInfo object. The hope was that the later assignment could be used to help distinguish the cases where policy writers intentionally white listed apps. This change will just use the hard coded "default" string implicitly to describe all cases and removes the idea of a policy supplied default stanza. Change-Id: Ib7b01ee004775f24db9a69340a31784b967ce030 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
adc1cf46045ae756d3a9ccbccf6b0f894e4c1edd |
|
16-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Only grant runtime permissions to special components. Now runtime permissions are granted only to components that are part of the system or perform special system operations. For exmple, the shell UID gets its runtime permissions granted by default and the default phone app gets the phone permissions granted by default. bug:21764803 Change-Id: If8b8cadbd1980ffe7a6fc15bbb5f54a425f6e8f9
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d70b9e7aea9c7b0691f3ac1326752f91d5049458 |
|
27-May-2015 |
Alan Viverette <alanv@google.com> |
Move ApplicationInfo hardware acceleration to public flags Bug: 21342038 Change-Id: I5af826f3f2921eef24725c909304243c67f3da78
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
589f2b53f2ad4639d5a193bc89e903a8b2400975 |
|
23-Apr-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Do not create oat directory for an app in ASEC container Currently installation fails, if an app is located on SD card (inside ASEC). If an app is located inside ASEC, dexopt output should go to /data/dalvik-cache. dexopt also needs to be performed at a later stage, because the name of the oat file contains the absolute path to the dex file. Bug: 20452651 Bug: 21360107 (cherry picked from commit 94056d1cb8183bde3e942336735b289b9654deb1) Change-Id: Id1ced7159e5af9c05be0b637437b3b260e859c1d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
98fa656f1636525c27a6d91ad4d7a3385292b99a |
|
14-May-2015 |
Christopher Tate <ctate@google.com> |
fullBackupContent isn't public API Bug 21090205 Change-Id: I1b468f1e7bf86455576760e4a1d1ea9657074a9e
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
303650c9cdb7cec88e7ec20747b161d9fff10719 |
|
18-Apr-2015 |
Matthew Williams <mjwilliams@google.com> |
Add full backup criteria to android manifest BUG: 20010079 Api change: ApplicationInfo now has a fullBackupContent int where -1 is (off) 0 is (on) and >0 indicates an xml resource that should be parsed in order for a developer to indicate exactly which files they want to include/exclude from the backup set. dd: https://docs.google.com/document/d/1dnNctwhWOI-_qtZ7I3iNRtrbShmERj2GFTzwV4xXtOk/edit#heading=h.wcfw1q2pbmae Change-Id: I90273dc0aef5e9a3230c6b074a45e8f5409ed5ce
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
fbf4599a8edfc31585f207c434d35200a03657b4 |
|
21-Apr-2015 |
Alex Klyubin <klyubin@google.com> |
Document that WebView doesn't honor "uses cleartext traffic" flag. Bug: 19215516 Change-Id: I5dbbaa03f3cae007c0b9b68fcf8cc8f250c16a62
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
35075a07659254413b587b7a6557a1b922d8757f |
|
17-Apr-2015 |
Alex Klyubin <klyubin@google.com> |
Merge "Document usesCleartextTraffic app-level attribute."
|
e2d45be4dae116307f8edd85eaa61134221cb8f9 |
|
16-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Candidate volumes for packages, fix symlink. Add API to determine the possible candidate volumes that a package can be moved to. For example, it currently knows that we need to move ASEC-based apps through internal storage before migrating them to a private volume. Comparator for consistent VolumeInfo ordering when displayed in UI. Fix native library symlink to be volume UUID aware. Bug: 19993667 Change-Id: I68d5fac5f0f776ac1c7dd15e7a984bfe2704f3f7
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e35cefbf23ec2fe55e8be9e4d20fc9adf4374171 |
|
15-Apr-2015 |
Alex Klyubin <klyubin@google.com> |
Document usesCleartextTraffic app-level attribute. This updates the documentation of the application element of AndroidManifest.xml to mention the new android:usesCleartextTraffic attribute. This also updates the Javadoc of android.security.NetworkSecurityPolicy and ApplicationInfo to match. Bug: 19215516 Change-Id: I5c221b56addae8988b4db51994d18ae379d0fbe3
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d95e58cb609228c4c4b231e00d6bb648e9dcaf71 |
|
07-Apr-2015 |
Dmitriy Ivanov <dimitry@google.com> |
Merge "Load libraries directly from apk"
|
dec4688f40b0018fbd1f00db05581966f531d88f |
|
01-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
Load libraries directly from apk Introduced new 'extractNativeLibs' attribute to manifest/application. Setting it to false prevents installer from extracting library from apk. The default value for extractNativeLibs is true. Bug: 8076853 (cherry picked from commit ff193d642eea7128faad837d19e347cd25212c27) Change-Id: I1aa2c039bb2a590ae72f256acc9ba5401c2c59b1
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
b2b9ab8354da1485178cd8d8e9d89ac915b3f269 |
|
06-Apr-2015 |
Jeff Sharkey <jsharkey@android.com> |
Installing packages to expanded storage. PackageManager now offers to load/unload packages when expanded volumes are mounted/unmounted. Expanded storage volumes are still treated as FLAG_EXTERNAL_STORAGE from a public API point-of-view, but this change starts treating the INSTALL_EXTERNAL flag as exclusively meaning ASEC containers. Start tracking the UUID of the volume where a package is installed, giving us a quick way to find relevant packages. When resolving an install location, look across all expanded volumes and pick the one with the largest free space. When upgrading an existing package, continue preferring the existing volume. PackageInstaller now knows how to stage on these volumes. Add new movePackage() variant that accepts a target volume UUID as destination, it will eventually move data too. Expose this move command through "pm" command for testing. Automount expanded volumes when they appear. Bug: 19993667 Change-Id: I9ca2aa328b9977d34e8b3e153db4bea8b8d6f8e3
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
96bba82ac4295f68ef956ecae7ee169eb3c271d1 |
|
03-Apr-2015 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Add private flag PRIVATE_FLAG_HAS_DOMAIN_URLS to ApplicationInfo"
|
d3d8a32217d5a2d895917cfe7e1645935d228494 |
|
02-Apr-2015 |
Fabrice Di Meglio <fdimeglio@google.com> |
Add private flag PRIVATE_FLAG_HAS_DOMAIN_URLS to ApplicationInfo This is for supporting Settings UX and Domain URLs - the new PRIVATE_FLAG_HAS_DOMAIN_URLS flag will be set by generateApplicationInfo() when the Activity is said to have some IntentFilter with a VIEW action and a http / https data URI - code cleaning for args passing - also add a new constant for the MetricsLogger Change-Id: I5c9762fc2c4a9b46c0e255b9a23bffd70fae40c7
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
c38a54b1f076b86453041755e15504fd0b4d48af |
|
03-Apr-2015 |
Fyodor Kupolov <fkupolov@google.com> |
am 30c688da: am 031898df: am 3d8b7f4d: Merge "Support for storing OAT files in app directory" * commit '30c688da8bd2b3320446a06424e1cc57b693522a': Support for storing OAT files in app directory
|
b94c1657eb0140f7b91f5372a9f76de5a3d87e36 |
|
03-Mar-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Support for storing OAT files in app directory In installPackageLI, dexopt is now performed on a staging directory of the app (dexopt phase 1). For each codepath: - /oat/<isa> directory is created - dexopt output goes to the newly created directory. Optimized files have .odex extension. Bug: 19550105 Change-Id: Iec59790d97837b78af82b079fd1970de3388c91d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
545ebdefd25e4bbc0c7353df38f852f7ba982971 |
|
27-Mar-2015 |
Alex Klyubin <klyubin@google.com> |
Merge "Unhide public API about cleartext traffic policy."
|
7cb000ff56babf18d39ab0aa31dfc5dcac0bf11e |
|
26-Mar-2015 |
Alex Klyubin <klyubin@google.com> |
Unhide public API about cleartext traffic policy. Bug: 19215516 Change-Id: I5da81a36c2f3d0edcf715a5f1b14b0a56c7abc6d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
dcc36bf2a4c0ce863676affcb3cbdd0586a4f888 |
|
25-Mar-2015 |
Flavio Lerda <flerda@google.com> |
Dump sharedLibraryFiles in a readable way. Currently, we are dumping sharedLibraryFiles using the default toString() method, which for an array returns a not so useful string. Instead, use Arrays.toString() to get out something that is more useful. Change-Id: I717e37ab38ed784a327fad59d63536ae2c56576a
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ff193d642eea7128faad837d19e347cd25212c27 |
|
01-Oct-2014 |
Dmitriy Ivanov <dimitry@google.com> |
Load libraries directly from apk Introduced new 'extractNativeLibs' attribute to manifest/application. Setting it to false prevents installer from extracting library from apk. The default value for extractNativeLibs is true. Bug: 8076853 Change-Id: I1aa2c039bb2a590ae72f256acc9ba5401c2c59b1
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
160a253d48d81066c7dfaf7e21aca63942df75b8 |
|
19-Mar-2015 |
Alex Klyubin <klyubin@google.com> |
am d71f548f: am 4177b8cb: Merge "Add app-level usesCleartextTraffic manifest attribute." * commit 'd71f548f4803f0696af7de9a2989673cfd83800f': Add app-level usesCleartextTraffic manifest attribute.
|
9b0ab65ed46be992dd71b5f811bb972168e51c36 |
|
18-Mar-2015 |
Alan Viverette <alanv@google.com> |
Enable/disable hardware rendering on windows by application tag Previously, hardware rendering cannot be enabled or disabled on windows created without a parent activity (e.g. by services) by setting the <application> tag, "android:hardwareAccelerated" in AndroidManifest.xml. It's enabled by default in Android L from the commit, 5e1565ead6dbb7d5c414522591f61b16a23de1c3. This patch provides a way of setting hardware rendering for that case. Change-Id: I60ee9566e99db39cd661fe6f196f43c3968b311a Signed-off-by: Dohyun Lee <dohyun.lee@lge.com>
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
01a959d60a2c5f04ab240513a853d7845b3a309e |
|
18-Mar-2015 |
Alex Klyubin <klyubin@google.com> |
Add app-level usesCleartextTraffic manifest attribute. The attribute declares whether the app intends to use cleartext network traffic (e.g., HTTP, WebSockets, XMPP, SMTP, IMAP -- without TLS or STARTTLS). The default value is true. If set to false, the app declares that it does not intend to use cleartext network traffic. In this case the app requests the platform, tooling, and third-party libraries to prevent it from using cleartext traffic. The danger of cleartext network traffic is that its confidentiality, authenticity, and integrity are not guaranteed. This feature is designed to help apps which care about security of data exchanged over the network. These apps can accidentally regress/downgrade to using cleartext network communications. This typically happens when the server the app communicates with all of a sudden tells it to use cleartext communications (e.g, HTTP URL instead of an HTTPS URL) or when one of the components of the app gets updated and regresses to cleartext communications without the developer noticing. In general, the prevention measures are on best effort basis. It's impossible to automatically prevent all instances of cleartext traffic. For example, an app bent on bypassing restrictions could perform low-level network I/O with unusual TCP packet fragmentation, or could use a custom application-level protocol. The expectation is that most apps use libraries for network communications and these libraries over time will start to honor this flag, thus increasing the protections offered by it. Bug: 19215516 Change-Id: I8700d51ddbc5d528faa4b6a5fa5bc9551ad02d13
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
7487657ee9f3f91a1fb4e52ce2a03b56496ac1f4 |
|
24-Feb-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Extracted a separate class to run dexopt on packages performDexOptLibsLI and related methods were extracted to PackageDexOptimizer class. Minor refactoring of PackageManagerService. This is a non-functional change. It should simplify further work to allow storing OAT files inside package dir. (cherry picked from commit eeea67b8c3678d882d3774edc41242c63daa60fa) Change-Id: I3494a2da70605362bb6fb4625ffbee1cbe1cd457
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
eeea67b8c3678d882d3774edc41242c63daa60fa |
|
24-Feb-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Extracted a separate class to run dexopt on packages performDexOptLibsLI and related methods were extracted to PackageDexOptimizer class. Minor refactoring of PackageManagerService. This is a non-functional change. It should simplify further work to allow storing OAT files inside package dir. Change-Id: I3494a2da70605362bb6fb4625ffbee1cbe1cd457
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
b9f8a5204a1b0b3919fa921e858d04124c582828 |
|
03-Feb-2015 |
Alex Klyubin <klyubin@google.com> |
Move hidden ApplicationInfo flags into a separate field. The public API field android.content.pm.ApplicationInfo.flags can support only 32 flags. This limit has been reached. As a short term workaround to enable new public flags to be added, this CL moves flags which are not public API into a separate new field privateFlags and renames the affected flags constants accordingly (e.g., FLAG_PRIVILEGED is now PRIVATE_FLAG_PRIVILEGED). The new privateFlags field is not public API and should not be used for flags that are public API. The flags that are moved out of ApplicationInfo.flags are: * FLAG_HIDDEN, * FLAG_CANT_SAVE_STATE, * FLAG_FORWARD_LOCK, and * FLAG_PRIVILEGED. NOTE: This changes the format of packages.xml. Prior to this CL flags were stored in the "flags" attribute. With this CL, the public flags are stored in a new "publicFlags" attribute and private flags are stored in a new "privateFlags" attribute. The old "flags" attribute is interpreted by using the old values of hidden/private flags. Change-Id: Ie23eb8ddd5129de3c6e008c5261b639e22182ee5
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
7f1a57a3e709b9e1fdb03a7a8af5f13859f7f1ad |
|
08-Oct-2014 |
Jeff Sharkey <jsharkey@android.com> |
Bring along more ApplicationInfo fields. When we added scan paths, we forgot to bring them along through Parcel and copy constructor. Bug: 17900178 Change-Id: I0ee9374f909d375768045976fd88cee7431f7d4d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
a709314537164d959a18ee78768c69c4a9cb33c7 |
|
30-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Use the appropriate default icon ComponentInfo subclasses and ApplicationInfo have different ways to retrieving the default icon. Previously, in CL I2db300a69a08030eacc245ee91556f0443ba5878 we defaulted everything to the green Android. This makes sure that they get the right default. Bug: 16630068 Change-Id: Ifa499eac6f1543523d6ecf0831175bfd6b772edb
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e5bcff624fb58b6f95be8ddff7f5b6b3bf5d19c7 |
|
20-Jul-2014 |
Amith Yamasani <yamasani@google.com> |
Rename setApplicationBlocked to setApplicationHidden This corrects the expected behavior of the app state. Hidden apps can be installed by the store to be brought out of hidden state. Bug: 16191518 Change-Id: Id128ce971ceee99ba1dea14ba07ce03bd8d77335
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
7dba6eb3ac4fd6c8195cb0d0425866de50a9e114 |
|
16-Jul-2014 |
Narayan Kamath <narayan@google.com> |
Adjust nativeLibraryDir for package contexts of multiArch installs. When we're creating a package context for a multi-arch app, adjust the native library directory to match the bitness of the process creating the context. This change also removes apkRoot (which wasn't really being used) and replaces it with a fully constructed secondary library path. The secondary library path is a transitional measure until we can reorganize the system image so that we can use nativeLibraryRoot for system paths as well (nativeLibraryRootRequiresIsa will then be true for all packages except for legacy installs). bug: 16013931 Change-Id: I5ae090334b377b9e087aecf40075fab81b20b132
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
84f1294a958b42000755dc6570e3eda72ab42140 |
|
11-Jul-2014 |
Jeff Sharkey <jsharkey@android.com> |
Always derive native library paths at runtime. Over time, we've unpacked native libraries at various places with respect to their source APK. Persisting this path in PackageSettings has caused more pain recently with the switch to supporting multiArch and cluster installs. This change switches us to always derive the native library paths at runtime based on the type of install. This also ensures that transitioning between a bundled system app and an upgraded system app will always build the right path. We still persist the last generated path into PackageSettings to make cleanup at uninstall time easier. Bug: 16208505, 16206748, 16212206 Change-Id: Ieb82a424ca4a92b5674983453c50ba4b695abfb0
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ff110bd61a69f7ed8602ae14b27f7befec76b2e7 |
|
04-Jul-2014 |
Narayan Kamath <narayan@google.com> |
Multi-arch application installs. Each application now has two ABIs, the primary and the secondary. The app is always launched with the primary, but the secondary might be used by other apps that load the given applications code. This implies we must: - dex2oat the app both ways. - extract shared libraries for both abis. The former is relatively straightforward but the latter requires us to change the layout for shared libs that we unpack from applications. The bulk of this change deals with the latter. This change continues to fill in nativeLibraryPath during scans for backwards compatibility. This will be removed in a future patch. Change-Id: Ia943dd11ef815c5cbfc60f17929eaa2a652a385a
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
589a1bc0b00e570db079b4b157f60229ad8ef8f9 |
|
03-Jul-2014 |
Narayan Kamath <narayan@google.com> |
Add manifest attribute for multiArch apps. bug: 16013931 Change-Id: Ie8b01d364eed0846deeddf11e0d6e4cc1fba3e61
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d746057f2414cba2bdc69257cc5be8cb681bb592 |
|
07-Jul-2014 |
Jeff Sharkey <jsharkey@android.com> |
Change new file installs to be cluster-based! Now that all the other pieces are in place, we're ready to start installing new file-based packages as a cluster (the new unified directory-based layout). This greatly simplifies the renaming process. Also add helper methods to ApplicationInfo to give a much clearer mapping between it and internal field names, since we can't change the public API. Add recursive restorecon(). Bug: 14975160 Change-Id: I72a63c5ddbc594c2fec4a91dd59f73ef253fbfd7
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
57dcf5b177b56195421535938544f32d8b591b42 |
|
19-Jun-2014 |
Jeff Sharkey <jsharkey@android.com> |
Slow progress towards APK clusters. Differentiate between "split APKs" and "cluster packages". A cluster package is a directory containing zero or more APKs (base+splits), and a monolithic package is a single APK (base). PackageSetting will use the directory name as its codePath, so track the baseCodePath separately. Clarify documentation in several places. Require that all installers provide file:// URIs through existing hidden APIs; PackageInstaller hasn't been able to read content:// URIs for a long time. Bug: 14975160 Change-Id: I1c6fed1b55205c2474b09871161a98a26669d22e
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d1de2567c6758e81a87c0f5eff9ff53ffebab134 |
|
18-Jun-2014 |
Christopher Tate <ctate@google.com> |
Introduce <application> attribute android:fullBackupOnly={boolean} It is quite possible for an application to be happy with having the OS save full-data archives of its data, but still need to selectively filter the set of saved files or otherwise participate in full-data backup and restore. In general we assume that any app which provides a backup agent implementation will be directly participating via the incremental key/value backup API; this new attribute allows an app to tell the OS "perform full-data backup/restore for me even though I am supplying my own agent implementation to participate." Change-Id: I810c50d44aa683b1f23604b7d1f3e96a1722103a
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8a4c9721a9e09d20c63381c13fa29bd9f7cbc3e3 |
|
16-Jun-2014 |
Jeff Sharkey <jsharkey@android.com> |
Plumb split APKs into public API. Introduces new ApplicationInfo fields to surface zero or more split APKs for an application. Splice these APKs into both the class loader and resource system. Cleaner building of these paths. Run dexopt() on all split APKs found after a parse, and populate into ApplicationInfo. Change-Id: I4a376bf4492d84ea95aafa866e106ea43a43e492
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
34f6084bc21b07ae9112be6e7a8f50c49828ac9c |
|
30-Apr-2014 |
Narayan Kamath <narayan@google.com> |
Remove "required" prefix from ABI fields. As per a comment on an earlier code review. Change-Id: I3ae30f8a7bc90730068644f93b926e0e05a2cdfb
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
f148f36d140e995ec8f755e60bbb0b37f33c3da7 |
|
10-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am 9e289d70: am 1d26a3f1: am 09e13cc5: Merge "System services detect and register app CPU ABIs" * commit '9e289d70a8baaed0030413b5991653792e2a816d': System services detect and register app CPU ABIs
|
9e289d70a8baaed0030413b5991653792e2a816d |
|
10-Apr-2014 |
Narayan Kamath <narayan@google.com> |
am 1d26a3f1: am 09e13cc5: Merge "System services detect and register app CPU ABIs" * commit '1d26a3f1efd0d965e8751e8515608c31789bdbe2': System services detect and register app CPU ABIs
|
ff0c470833b2cb4130a30895093630242d5f238d |
|
01-Apr-2014 |
Ramin Zaghi <ramin.zaghi@arm.com> |
System services detect and register app CPU ABIs This patch uses the NativeLibraryHelper class to match native libraries in an .apk package with those listed in 'ro.cpu.abilist' property. The result is stored in packages.xml and the ApplicationInfo class. This information will be used by the ActivityManager to decide which zygote to use to launch the given app. Change-Id: I3ec3d050996d8f4621f286ca331b9ad47ea26fa0
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e9118138402b5631e7bea74b1b8b5cbfe24ca097 |
|
24-Mar-2014 |
Jose Lima <joselima@google.com> |
resolved conflicts for merge of 6c45157c to master Change-Id: I95d7f927f4321405318b44a21172b99f3f16e00a
|
12d0b4cd960e18493b1dc237adbfabed432c9df5 |
|
15-Mar-2014 |
Jose Lima <joselima@google.com> |
Added isGame application tag to the manifest Added the ability to flag applications as Games in the manifest, so they can receive a different treatment in the UI. Change-Id: I4c36bc1a96757030fad58ee050cd68491b31bb6c
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8472e6189cd4e0520c047bdb28457abc728b373f |
|
24-Jan-2014 |
Dianne Hackborn <hackbod@google.com> |
Add app version codes to procstats. Now the per-package proc stats data is also per-app-version-code. In addition to changing the data structure to have one more SparseArray and passing a version code all over, this also required improving how we reset the stats so that we can prune a multi-package process record back to a single package. Otherwise, as you install updates to apps, the proc stats data would continue to explode as the data for each of those app's processes got turned to a multi-package due to tracking the old and new versions at the same time. This also bumps the checkin version code, since the package entries also include a new field for the app version code. Change-Id: I80de36addb0a75c7b08aef747c6f6c8012d01ee4
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
655d0e2029e6ae77a47e922dce4c4989818b8dd1 |
|
12-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Single-user restrictions Introduces a new "blocked" state for each package. This is used to temporarily disable an app via Settings->Restrictions. PIN creation and challenge activities for use by Settings and other apps. PIN is stored by the User Manager and it manages the interval for retry attempts across reboots. Change-Id: I4915329d1f72399bbcaf93a9ca9c0d2e69d098dd
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
4ce55a3987c14b939cd416e24116c6ab3c760b82 |
|
25-Jun-2013 |
Christopher Tate <ctate@google.com> |
Fix FLAG_PRIVILEGED numbering Change-Id: Ia04326acb51a76c0f1931fce94f0501d4ce7faba
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ccbf84f44c9e6a5ed3c08673614826bb237afc54 |
|
09-May-2013 |
Christopher Tate <ctate@google.com> |
Some system apps are more system than others "signatureOrSystem" permissions are no longer available to all apps residing en the /system partition. Instead, there is a new /system/priv-app directory, and only apps whose APKs are in that directory are allowed to use signatureOrSystem permissions without sharing the platform cert. This will reduce the surface area for possible exploits of system- bundled applications to try to gain access to permission-guarded operations. The ApplicationInfo.FLAG_SYSTEM flag continues to mean what it is says in the documentation: it indicates that the application apk was bundled on the /system partition. A new hidden flag FLAG_PRIVILEGED has been introduced that reflects the actual right to access these permissions. At some point the "system" permission category will be renamed to "privileged". Bug 8765951 Change-Id: I6f0fd9cdb9170e076dfc66d83ecea76f8dd7335d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
0f40dc923c67e8822f9157aec4f786f73848af07 |
|
25-Mar-2013 |
Robert Craig <rpcraig@tycho.ncsc.mil> |
Add seinfo parsing to PackageManagerService. This patch set allows the PMS to parse the mac_permissions.xml file which contains the seinfo values. Each package that is installed on the device will be assigned an seinfo value based on policy. This seinfo value will help label the app process and data directory. Modifications include adjustments to ApplicationInfo.java to store the seinfo tag per package as well as adjustments to installd to communicate the seinfo tag to libselinux. Change-Id: I61ad1ea12fb6a9a6d0b108ec163bc4bf4c954b58 Signed-off-by: rpcraig <rpcraig@tycho.ncsc.mil>
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
bcb0255770caa6b053da100de13beb840da71b21 |
|
17-Oct-2012 |
Christopher Tate <ctate@google.com> |
Fix ApplicationInfo copy ctor Need to copy ALL the fields! Bug 7360899 Change-Id: Ie6ed2d6f41c2efaf793ebf111adc8fa5e8b57d7c
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
5e03e2ca7d25b899b129baad2dd5eca6bf99d88a |
|
06-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More multi-user stuff: - New (hidden) isUserRunning() API. - Maintain LRU list of visited users. - New FLAG_IS_DATA_ONLY for ApplicationInfo. - Clean up pending intent records when force-stopping a user (or package). (Also fixes bug #6880627: PendingIntent.getService() returns stale intent of force stopped app) - Fix force-stopping when installing an app to do the force-stop across all users for that app. - When selecting which processes to kill during a force stop, do this based on the actual packages loaded in the process, not just process name matching. - You can now use --user option in am when starting activities, services, and instrumentation. - The am --user option accepts "current" and "all" as arguments. - The pm uninstall command now uninstalls for all users, so it matches the semantics of the install command. - PhoneWindowManager now explicitly says to start home in the current user. - Activity manager call to retrieve the MIME type from a content provider now takes a user argument, so it will direct this to the proper user. - The package manager uninstall paths are now implemented around PackageSetting, not PackageParser.Package. This allows them to work even if the application's apk has been removed (in which case it only exists as a PackageSetting, not the PackageParser.Package parsed from the apk). Change-Id: I3522f6fcf32603090bd6e01cc90ce70b6c5aae40
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
7767eac3232ba2fb9828766813cdb481d6a97584 |
|
24-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Keep track of whether an app is installed for each user. This add a new per-user state for an app, indicating whether it is installed for that user. All system apps are always installed for all users (we still use disable to "uninstall" them). Now when you call into the package manager to install an app, it will only install the app for that user unless you supply a flag saying to install for all users. Only being installed for the user is just the normal install state, but all other users have marked in their state for that app that it is not installed. When you call the package manager APIs for information about apps, uninstalled apps are treated as really being not visible (somewhat more-so than disabled apps), unless you use the GET_UNINSTALLED_PACKAGES flag. If another user calls to install an app that is already installed, just not for them, then the normal install process takes place but in addition that user's installed state is toggled on. The package manager will not send PACKAGE_ADDED, PACKAGE_REMOVED, PACKAGE_REPLACED etc broadcasts to users who don't have a package installed or not being involved in a change in the install state. There are a few things that are not quite right with this -- for example if you go through a full install (with a new apk) of an app for one user who doesn't have it already installed, you will still get the PACKAGED_REPLACED messages even though this is technically the first install for your user. I'm not sure how much of an issue this is. When you call the existing API to uninstall an app, this toggles the installed state of the app for that user to be off. Only if that is the last user user that has the app uinstalled will it actually be removed from the device. Again there is a new flag you can pass in to force the app to be uninstalled for all users. Also fixed issues with cleaning external storage of apps, which was not dealing with multiple users. We now keep track of cleaning each user for each package. Change-Id: I00e66452b149defc08c5e0183fa673f532465ed5
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
59dfce8bdaf011337530a0dbec7f7280871f9bc9 |
|
03-Apr-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #6140391 Make RTL awareness as an opt-in into the AndroidManifest - introduce "supportsRtl" as a new application attribute in the AndroidManifest - "supportsRtl" default value is FALSE (no RTL support) - adapt the View layoutDirection and textDirection logic to take care of "supportsRtl" value Change-Id: I5e4f9f576e14f35dedc6b0c29a7142c397f598e0
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
269248d112e35fe8e9f0d5d11c96dcb2ac1118b0 |
|
02-Aug-2011 |
Adam Powell <adamp@google.com> |
Fix bug 5098288 - Rethink the suite of new themes Cut down the list of new themes for ICS. Holo apps now have Theme.Holo, Theme.Holo.Light, and Theme.Holo.Light.DarkActionBar to choose from. Add manifest attribute android:uiOptions to express splitActionBarWhenNarrow. Other options may move into this later as well. (DialogWhenLarge?) This attribute is valid on both activity and application tags; application settings will serve as the default for activities that do not explicitly set uiOptions. uiOptions are not currently reflected in the startup window for new activities. Change-Id: Iffdc2ce4cc69f79c9bd4e541b7923286e6936c1e
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
79ec80db70d788f35aa13346e4684ecbd401bd84 |
|
24-Jun-2011 |
Christopher Tate <ctate@google.com> |
Make full backup API available to apps New methods for full backup/restore have been added to BackupAgent (still hidden): onFullBackup() and onRestoreFile(). The former is the entry point for a full app backup to adb/socket/etc: the app then writes all of its files, entire, to the output. During restore, the latter new callback is invoked, once for each file being restored. The full backup/restore interface does not use the previously-defined BackupDataInput / BackupDataOutput classes, because those classes provide an API designed for incremental key/value data structuring. Instead, a new FullBackupDataOutput class has been introduced, through which we restrict apps' abilities to write data during a full backup operation to *only* writing entire on-disk files via a new BackupAgent method called fullBackupFile(). "FullBackupAgent" exists now solely as a concrete shell class that can be instantiated in the case of apps that do not have their own BackupAgent implementations. Along with the API change, responsibility for backing up the .apk file and OBB container has been moved into the framework rather than have the application side of the transaction do it. Change-Id: I12849b06b1a6e4c44d080587c1e9828a52b70dae
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
0ac3031c159a0904e73eb4439cdc724d8df4a6e6 |
|
17-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
Implement remaining infrastructure for user disabling apps. Change-Id: If8135eb0e27ec36f8f159eb7b6397add7acd0299
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ead40eaedb7993ca8c5153c349dd65f276d6862e |
|
04-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of cc20b4e3 to master Change-Id: I990368443a16a0577f7a1f5623b348cca3f81ac4
|
546d64f56d0f930070289e26021f97638601e388 |
|
02-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 5c2e4d20 to master Change-Id: Iadbee872468ceafb54c5877046c91f6052f3c953
|
2762ff3dc864018352362f6d103de471f9529ba6 |
|
02-Jun-2011 |
Dianne Hackborn <hackbod@google.com> |
Add new supports-screen API to set maximum allowed size. Change-Id: I0a7cd4ba73a4c18558e6daee28963d5fd12c7978
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
df6e980e3f63eb0f6f9eb437fa925d5009cd9c44 |
|
26-May-2011 |
Dianne Hackborn <hackbod@google.com> |
Add new supports-screens attributes for declaring the compatible screens. Change-Id: I40d57e4354e48accc1027c9f90916ea73eb5190d android:requiresSmallestWidthDp provides the smallest supported width. android:compatibleWidthLimitDp provides the largest compatible width.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
4a627c71ff53a4fca1f961f4b1dcc0461df18a06 |
|
01-Apr-2011 |
Christopher Tate <ctate@google.com> |
Full local backup infrastructure This is the basic infrastructure for pulling a full(*) backup of the device's data over an adb(**) connection to the local device. The basic process consists of these interacting pieces: 1. The framework's BackupManagerService, which coordinates the collection of app data and routing to the destination. 2. A new framework-provided BackupAgent implementation called FullBackupAgent, which is instantiated in the target applications' processes in turn, and knows how to emit a datastream that contains all of the app's saved data files. 3. A new shell-level program called "bu" that is used to bridge from adb to the framework's Backup Manager. 4. adb itself, which now knows how to use 'bu' to kick off a backup operation and pull the resulting data stream to the desktop host. 5. A system-provided application that verifies with the user that an attempted backup/restore operation is in fact expected and to be allowed. The full agent implementation is not used during normal operation of the delta-based app-customized remote backup process. Instead it's used during user-confirmed *full* backup of applications and all their data to a local destination, e.g. via the adb connection. The output format is 'tar'. This makes it very easy for the end user to examine the resulting dataset, e.g. for purpose of extracting files for debug purposes; as well as making it easy to contemplate adding things like a direct gzip stage to the data pipeline during backup/restore. It also makes it convenient to construct and maintain synthetic backup datasets for testing purposes. Within the tar format, certain artificial conventions are used. All files are stored within top-level directories according to their semantic origin: apps/pkgname/a/ : Application .apk file itself apps/pkgname/obb/: The application's associated .obb containers apps/pkgname/f/ : The subtree rooted at the getFilesDir() location apps/pkgname/db/ : The subtree rooted at the getDatabasePath() parent apps/pkgname/sp/ : The subtree rooted at the getSharedPrefsFile() parent apps/pkgname/r/ : Files stored relative to the root of the app's file tree apps/pkgname/c/ : Reserved for the app's getCacheDir() tree; not stored. For each package, the first entry in the tar stream is a file called "_manifest", nominally rooted at apps/pkgname. This file contains some metadata about the package whose data is stored in the archive. The contents of shared storage can optionally be included in the tar stream. It is placed in the synthetic location: shared/... uid/gid are ignored; app uids are assigned at install time, and the app's data is handled from within its own execution environment, so will automatically have the app's correct uid. Forward-locked .apk files are never backed up. System-partition .apk files are not backed up unless they have been overridden by a post-factory upgrade, in which case the current .apk *is* backed up -- i.e. the .apk that matches the on-disk data. The manifest preceding each application's portion of the tar stream provides version numbers and signature blocks for version checking, as well as an indication of whether the restore logic should expect to install the .apk before extracting the data. System packages can designate their own full backup agents. This is to manage things like the settings provider which (a) cannot be shut down on the fly in order to do a clean snapshot of their file trees, and (b) manage data that is not only irrelevant but actively hostile to non-identical devices -- CDMA telephony settings would seriously mess up a GSM device if emplaced there blind, for example. When a full backup or restore is initiated from adb, the system will present a confirmation UI that the user must explicitly respond to within a short [~ 30 seconds] timeout. This is to avoid the possibility of malicious desktop-side software secretly grabbing a copy of all the user's data for nefarious purposes. (*) The backup is not strictly a full mirror. In particular, the settings database is not cloned; it is handled the same way that it is in cloud backup/restore. This is because some settings are actively destructive if cloned onto a different (or especially a different-model) device: telephony settings and AndroidID are good examples of this. (**) On the framework side it doesn't care that it's adb; it just sends the tar stream to a file descriptor. This can easily be retargeted around whatever transport we might decide to use in the future. KNOWN ISSUES: * the security UI is desperately ugly; no proper designs have yet been done for it * restore is not yet implemented * shared storage backup is not yet implemented * symlinks aren't yet handled, though some infrastructure for dealing with them has been put in place. Change-Id: Ia8347611e23b398af36ea22c36dff0a276b1ce91
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e7f972122db87dc54e41ed1a6e417534d43bca3a |
|
24-Feb-2011 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3426299: Introduce application "stopped" state The package manager now keeps track of whether an application is stopped. There are new intent flags to control whether intent filters in a stopped application will match the intent. This is currently used in one place, sending broadcasts, so that stopped apps can not be launched due to background processes. The package manager during first init makes sure no applications are in the stopped state. When new applications are installed, that begin in the stopped state. When the activity manager is launching a component of an application, it ensures the application is taken out of the stopped state. The "force stop" button in manage applications will now put an application back in to the stopped state; it can't go back out of the stopped state until one of its components is launched by the activity manager. There will probably be a few more places where we need to filter stopped applications out of intent matches, but doing this for broadcast is a very big first step. This also introduces a new broadcast that is sent to an application after it is replaced with a new .apk. But only if the app is not in the stopped state. This makes it a lot easier for developers to implement code to get their application back in proper running shape after an upgrade. Finally another new broadcast is added that is sent to a package's installer at the first time it is launched. This allows the installer to tell the package about it being installed only when it is first actually used. Change-Id: I589c53ff0e0ece868fe734ace4439c0d202dca2d
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
75e616e8203a540c860888ccff73ffaa87498c5e |
|
16-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Change FLAG_FORWARD_LOCK back to its original value to not break things. Change-Id: Ib9a38521cc5031a81bae5a830aaf458b8a5ee7a5
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
3b81bc18bb661c02ad8074c39dab16644c1e65d0 |
|
15-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Add manifest API to request a large heap. You can now do android:largeHeap="true" on an application. Doesn't yet do anything, waiting for Dalvik API. Also tweak package parsing so that the SDK API level is set in the configuration, allowing manifest resource value selection based on that. Change-Id: I6e035f9702a97b055416743b88f83a22ba4a9584
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
a3cdaa5337fa573c4c61770195d6232c2e587090 |
|
13-Jan-2011 |
Jason parks <jparks@google.com> |
Revert "Remove the APIs for the old encryption scheme." This reverts commit 1125d780a8b61703b8eb28c5c77dac5f3f0022dd.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1125d780a8b61703b8eb28c5c77dac5f3f0022dd |
|
12-Jan-2011 |
Jason parks <jparks@google.com> |
Remove the APIs for the old encryption scheme. Change-Id: I55116a5b29b10dfd50015805ec019b485257f68b
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
46cb1d9602905061ff2a9ba3bc7654bfe94183db |
|
21-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am 674b856c: am fb2cd0aa: Merge "Fix java doc on FLAG_EXTERNAL." into gingerbread Merge commit '674b856c15206a23d9d8a22fbd936a4f3055894d' * commit '674b856c15206a23d9d8a22fbd936a4f3055894d': Fix java doc on FLAG_EXTERNAL.
|
eddfc04a08cc4d5315930d94d4627caa7dad5596 |
|
21-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix java doc on FLAG_EXTERNAL. Change-Id: Ic533b3a6c3300a986dd8d0da04243d723cf393ef
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8c4e779a4c968d4c7a4e4902484004e1659217aa |
|
07-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am e112b744: am 930d6c3c: Merge "Fix issue #3056500: Problem report for ASTRO" into gingerbread Merge commit 'e112b744c08cd7dcffe142f3cd22c96870bad482' * commit 'e112b744c08cd7dcffe142f3cd22c96870bad482': Fix issue #3056500: Problem report for ASTRO
|
72b526a13c9b548a1e1a0239f670e36744cb0fdc |
|
07-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am cb9f1e4d: am 6f7e10ca: Merge "Make it easier to figure out whether an app can go on sd card." into gingerbread Merge commit 'cb9f1e4d30ab4f9203e30abe807cbe33d07db4a0' * commit 'cb9f1e4d30ab4f9203e30abe807cbe33d07db4a0': Make it easier to figure out whether an app can go on sd card.
|
817c24752cf1d70bcd53a038a0d06abbb1ec6aad |
|
05-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #3056500: Problem report for ASTRO Change-Id: Ifa07dbc50930f5d6a20cdc0ee541c0566f3785ba
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
54e570f78b45d6c47578a4a2513097b590b6d43f |
|
05-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Make it easier to figure out whether an app can go on sd card. Change-Id: I9195a0881b2c435b138f39c2ab1505dc820caf10
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
cec7eb1c079331ba38ed4472abe26a55d6427324 |
|
13-Sep-2010 |
Kenny Root <kroot@google.com> |
am 8b11f30c: am 1bece432: Make nativeLibraryDir visible in the API Merge commit '8b11f30cb2cfe9922439e8a032311de114ce4da4' * commit '8b11f30cb2cfe9922439e8a032311de114ce4da4': Make nativeLibraryDir visible in the API
|
1bece4320c1d2308b4a5b5aeda47b065312b3053 |
|
13-Sep-2010 |
Kenny Root <kroot@google.com> |
Make nativeLibraryDir visible in the API Change-Id: Ic88e76a85b0041e97b4c29c42dfa09db0356391c
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
69717ccd13bb5568b912701ab39d603cfa7091cc |
|
03-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
DO NOT MERGE. Some stuff that is Not Ready. Change-Id: I8fdba32722d86b92c791dbf7c6c0166bcdb02852
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
85387d7ba36e56b291cbde87acb5a5b2200fe01c |
|
26-Aug-2010 |
Kenny Root <kroot@google.com> |
Allow native shared libraries in ASEC containers This change moves the native library handling earlier in the package installation process so that it may be inserted into ASEC containers before they are finalized in the DefaultContainerService. Note that native libraries on SD card requires that vold mount ASEC containers without the "noexec" flag on the mount point. Change-Id: Ib34b1886bf6f94b99bb7b3781db6e9b5a58807ba
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
02486b1327e3007c62d253dd89ba9db1852b87f8 |
|
26-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
Hide heavy-weight API. And give it a better name, for when it is later un-hidden. Change-Id: Iae0d3054d44f873b9f953bc41d175a47802a185e
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
39792d2262352ae775091876d5488d2412a2ff92 |
|
20-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix bugs with granting permissions through onNewIntent(). It would grant the permission to the temporary ActivityRecord, not the real one, so it never got cleaned up. Also allow granting of permissions to services because... well, it would be really really useful. And it introduces some refactoring that we'll need to support cut/paste. Change-Id: If521f509042e7baad7f5dc9bec84b6ba0d90ba09
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
860755faa6bdd3c2aeae49c05b87b5bc080ae60c |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Add support for heavy-weight applications. Only one can be running at a time, their process can not be killed, and a notification is posted while it is running. Change-Id: I843015723947e0c934ae63a1aeee139327c0bc01
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
22ec9ab3b881d71866279ba9363c644a9e4e7164 |
|
30-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix build. Change-Id: Iac00a1d02d04c346807ff2580362adfc838d1813
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
14cee9f688c32d63d8521188e7422811629bb7c2 |
|
24-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
New xlarge screen size. Not complete, only for experimentation at this point. This includes a reworking of how screen size configurations are matched, so that if you are on a larger screen we can select configurations for smaller screens if there aren't any exactly matching the current screen. The screen size at which we switch to xlarge has been arbitrarily chosen; the compatibility behavior has not yet been defined. Change-Id: I1a33b3818eeb51a68fb72397568c39ab040a07f5
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
b6c459276f222e01777380c4c1e3a31680e561ec |
|
27-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
am 44f2c6ba: am 2e4b98dc: Merge "Whoops a little more on issue #2631417: Expose FLAG_EXTERNAL_STORAGE" into froyo Merge commit '44f2c6baa68e02f7837cd1ca285d5c4f0f871b18' into kraken * commit '44f2c6baa68e02f7837cd1ca285d5c4f0f871b18': Whoops a little more on issue #2631417: Expose FLAG_EXTERNAL_STORAGE
|
34483a0f6e1db9b0d96abc8b6dd056ec385f82b6 |
|
27-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 5a8f877c to kraken Change-Id: I3e320cfe9fcafe4f49e1863eaeddac96bc3f72c6
|
94c567e1e344d49168603f5a0560215a4ce735e6 |
|
27-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
Whoops a little more on issue #2631417: Expose FLAG_EXTERNAL_STORAGE There was a gap in the bit numbers. Change-Id: I0feef7dc4abed5db7412659b5ad078caffe4f2d4
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
3202d380226043fa665df3c92252f791f8c52d55 |
|
27-Apr-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2631417: Expose FLAG_EXTERNAL_STORAGE Also update 8.xml to match the current API. Change-Id: I668fe56f6c156c2e8daa458baa7410fdb8ebef52
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
767225d8206adf4db968f3fa86d9ebb107a12067 |
|
31-Mar-2010 |
Jeff Brown <jeffbrown@google.com> |
resolved conflicts for merge of d9ee01a9 to kraken Change-Id: I645177513e6dfa4b3b02c0061b8026bde4acde8d
|
07330791116513710d879c45b2f095cd314cbfd0 |
|
31-Mar-2010 |
Jeff Brown <jeffbrown@google.com> |
Show SD unavailable icon for apps on SD when ejected. This change include a minor refactoring of PackageItemInfo and related classes to eliminate code duplication and to avoid redundant work searching for an ApplicationInfo instance we already have. Bug: b/2537578 Change-Id: Id0794c3f055ea58b943028f7a84abc7dec9d0aac
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1f4df90bfab8ca42eabe95f19eadff3432eee7fd |
|
27-Mar-2010 |
Oscar Montemayor <oam@google.com> |
DO NOT MERGE Removing unused features from source tree. Please refer to Bug#2502219. Change-Id: I879c29bfd5ffe933f64bb1082aaae7c956450a5a
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ef3f5ddc2137ed99e41f00441b688fb56b855179 |
|
30-Mar-2010 |
Ben Cheng <bccheng@android.com> |
Replace "safeMode" with a more specific name "vmSafeMode" in the public API. Bug: 2553512 Change-Id: Id0dad80ecdcb8c7430dcf1ac26132ccd9c0770f5
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
3de55bcd34afd5871816526294f9514d1adf3fe5 |
|
13-Mar-2010 |
Christopher Tate <ctate@google.com> |
API CHANGE: expose the backup-related ApplicationInfo flag masks Fixes bug #2507582 by doing the following: - Un-@hide the FLAG_ALLOW_BACKUP, FLAG_KILL_AFTER_RESTORE, and FLAG_RESTORE_ANY_VERSION mask constants in ApplicationInfo. These correspond, respectively, to the <application> manifest tag's android:allowBackup, android:killAfterRestore, and android:restoreAnyVersion attributes. - Remove the android:restoreNeedsApplication attribute and the corresponding FLAG_RESTORE_NEEDS_APPLICATION constant [which was still marked @hide]. We now always use the application's own Application class when performing a normal restore. In the future when we support an externalized full-filesystem backup/restore operation, we will use an OS-defined agent class with a base-class Application instance, but this will not happen until a future release. Also expands real documentation on the above ApplicationInfo constants; that work is part of bug #2465360 Change-Id: I735d07a963ae80a01343637d83bef84e4c23fdcc
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
15a4d2ffd04dc6c70f2cd17dae12ac6bc14c69ab |
|
12-Mar-2010 |
Kenny Root <kroot@google.com> |
Add correct copyright headers to multiple files Format for the list of changes shows the origin commit reference followed by the file name. 33931-p9 awt/org/apache/harmony/awt/gl/font/AndroidGlyphVector.java 33931-p9 awt/org/apache/harmony/awt/gl/image/PngDecoderJava.java 133776-p9 core/java/android/app/IntentService.java 127013-p9 core/java/android/appwidget/AppWidgetHost.java 27863-p9 core/java/android/bluetooth/BluetoothAudioGateway.java 60765-p9 core/java/android/content/SyncResult.java 43920-p9 core/java/android/content/pm/ActivityInfo.java 43920-p9 core/java/android/content/pm/ApplicationInfo.java 43920-p9 core/java/android/content/pm/InstrumentationInfo.java 43920-p9 core/java/android/content/pm/PackageInfo.java 44103-p9 core/java/android/content/pm/PackageItemInfo.java 68960-p9 core/java/android/content/pm/PackageStats.java 43920-p9 core/java/android/content/pm/ResolveInfo.java 43920-p9 core/java/android/content/pm/ServiceInfo.java 60641-p9 core/java/android/content/res/Configuration.java 60734-p9 core/java/android/content/res/TypedArray.java 137672-p9 core/java/android/inputmethodservice/ExtractButton.java 123112-p9 core/java/android/inputmethodservice/ExtractEditText.java 119291-p9 core/java/android/inputmethodservice/IInputMethodSessionWrapper.java 112946-p9 core/java/android/inputmethodservice/IInputMethodWrapper.java 115078-p9 core/java/android/os/BatteryStats.java 124790-p9 core/java/android/text/style/UpdateAppearance.java 45083-p9 core/java/android/view/RawInputEvent.java 101491-p9 core/java/android/view/inputmethod/EditorInfo.java 114701-p9 core/java/android/view/inputmethod/ExtractedText.java 123112-p9 core/java/android/view/inputmethod/ExtractedTextRequest.java 119291-p9 core/java/com/android/internal/os/HandlerCaller.java 129279-p9 core/java/com/android/internal/os/PkgUsageStats.java 114701-p9 core/java/com/android/internal/view/IInputConnectionWrapper.java 114701-p9 core/java/com/android/internal/view/InputConnectionWrapper.java 84364-p9 opengl/java/android/opengl/EGLLogWrapper.java 11355-p9 opengl/tools/glgen/src/CFunc.java 11355-p9 opengl/tools/glgen/src/CType.java 11355-p9 opengl/tools/glgen/src/CodeEmitter.java 11355-p9 opengl/tools/glgen/src/GenerateGL.java 11355-p9 opengl/tools/glgen/src/JFunc.java 11355-p9 opengl/tools/glgen/src/JType.java 11355-p9 opengl/tools/glgen/src/JniCodeEmitter.java 11355-p9 opengl/tools/glgen/src/ParameterChecker.java 57236-p9 services/java/com/android/server/status/AnimatedImageView.java 66754-p9 services/java/com/android/server/status/CloseDragHandle.java 57188-p9 services/java/com/android/server/status/DateView.java 46928-p9 services/java/com/android/server/status/ExpandedView.java 70590-p9 services/java/com/android/server/status/FixedSizeDrawable.java 45968-p9 services/java/com/android/server/status/IconData.java 57470-p9 services/java/com/android/server/status/IconMerger.java 82719-p9 services/java/com/android/server/status/LatestItemView.java 45968-p9 services/java/com/android/server/status/NotificationData.java 66754-p9 services/java/com/android/server/status/NotificationLinearLayout.java 57458-p9 services/java/com/android/server/status/NotificationViewList.java 45968-p9 services/java/com/android/server/status/StatusBarException.java 45968-p9 services/java/com/android/server/status/StatusBarIcon.java 46130-p9 services/java/com/android/server/status/StatusBarNotification.java 45968-p9 services/java/com/android/server/status/StatusBarView.java 46199-p9 services/java/com/android/server/status/Ticker.java 62286-p9 services/java/com/android/server/status/TickerView.java 57188-p9 services/java/com/android/server/status/TrackingView.java 86041-p9 telephony/java/android/telephony/PhoneStateListener.java 87020-p9 telephony/java/com/android/internal/telephony/TelephonyIntents.java 136269-p9 telephony/java/com/android/internal/telephony/gsm/SpnOverride.java 34409-p9 tests/FrameworkTest/src/com/android/frameworktest/FrameworkTestApplication.java 55717-p9 tests/FrameworkTest/src/com/android/frameworktest/performance/InvalidateCycle.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/AutoCompleteTextViewActivityLandscape.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/AutoCompleteTextViewActivityPortrait.java 129372-p9 tests/ImfTest/src/com/android/imftest/samples/BigEditTextActivityNonScrollablePanScan.java 129372-p9 tests/ImfTest/src/com/android/imftest/samples/BigEditTextActivityNonScrollableResize.java 129372-p9 tests/ImfTest/src/com/android/imftest/samples/BigEditTextActivityScrollablePanScan.java 129372-p9 tests/ImfTest/src/com/android/imftest/samples/BigEditTextActivityScrollableResize.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/BottomEditTextActivityPanScan.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/BottomEditTextActivityResize.java 127341-p9 tests/ImfTest/src/com/android/imftest/samples/ButtonActivity.java 129347-p9 tests/ImfTest/src/com/android/imftest/samples/DialogActivity.java 129372-p9 tests/ImfTest/src/com/android/imftest/samples/EditTextActivityDialog.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/ManyEditTextActivityNoScrollPanScan.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/ManyEditTextActivityScrollPanScan.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/ManyEditTextActivityScrollResize.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/OneEditTextActivityNotSelected.java 128994-p9 tests/ImfTest/src/com/android/imftest/samples/OneEditTextActivitySelected.java 25959-p9 tests/framework-tests/src/android/test/FrameworkTests.java 46162-p9 tests/framework-tests/src/com/android/internal/http/multipart/MultipartTest.java 77101-p9 tools/layoutlib/bridge/tests/com/android/layoutlib/bridge/NinePatchTest.java 9788976b1465ce982b5ae7c741345edd0ecd9322 core/java/android/accounts/AuthenticatorDescription.java 53332883543868fb83e111a07306368b7772b340 core/java/android/app/UiModeManager.java 93e7e22ec91dbc641d10ca6d70423e1357a95bba core/java/android/app/FullBackupAgent.java 328c0e7986aa6bb7752ec6de3da9c999920bb55f core/java/android/content/CursorEntityIterator.java 307da1a46b4c9b711bafe8fbaaa6b98e8868c18e core/java/android/content/SyncQueue.java 307da1a46b4c9b711bafe8fbaaa6b98e8868c18e core/java/android/content/SyncOperation.java eb034652c2037a47ebfd99779e8383bb8bb528af core/java/android/content/pm/LabeledIntent.java 49237345d83e62fdb9eb8d50b13ad086636a04fa core/java/android/content/pm/FeatureInfo.java a2b6c3775ed6b8924232d6a01bae4a19740a15f8 core/java/android/content/pm/PackageInfoLite.java 3ecd5f437580e49d80beecd29489d5fb1f7a7db0 core/java/android/content/pm/RegisteredServicesCacheListener.java 5ebbb4a6b3e16f711735ae0615b9a9ea64faad38 core/java/android/content/pm/XmlSerializerAndParser.java c4516a7b62de525e3d6d5e76851bdfaf12c11f05 core/java/android/database/sqlite/SQLiteTransactionListener.java 9bbc21a773cbdfbef2876a75c32bda5839647751 core/java/com/android/internal/backup/LocalTransport.java 21f1bd17b2dfe361acbb28453b3f3b1a110932fa core/java/com/android/internal/content/PackageMonitor.java 4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 core/java/com/android/internal/view/BaseSurfaceHolder.java 4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 core/java/com/android/internal/view/BaseIWindow.java e540833fdff4d58e37c9ba859388e24e2945ed45 core/java/com/android/internal/os/SamplingProfilerIntegration.java 192ab903887bbb8e7c7b6da5c581573850e30f46 core/tests/coretests/src/android/widget/expandablelistview/PositionTesterContextMenuListener.java 1619367ab823150fa8856d419abe02ceb75886f1 media/tests/MediaFrameworkTest/src/com/android/mediaframeworktest/MediaProfileReader.java 27f8002e591b5c579f75b2580183b5d1c4219cd4 opengl/tools/glgen/stubs/gles11/glGetString.java 560814f6b11abe83ff0c4ed18cac015c276b3181 opengl/tools/glgen/stubs/gles11/glGetProgramInfoLog.java 560814f6b11abe83ff0c4ed18cac015c276b3181 opengl/tools/glgen/stubs/gles11/glGetShaderInfoLog.java 560814f6b11abe83ff0c4ed18cac015c276b3181 opengl/tools/glgen/stubs/gles11/glShaderSource.java 1c4907ee77392afb768c2f088e0dedbe4239f6fb opengl/tools/glgen/src/GenerateGLES.java 1c4907ee77392afb768c2f088e0dedbe4239f6fb opengl/tools/glgen/src/Jsr239CodeEmitter.java 1c4907ee77392afb768c2f088e0dedbe4239f6fb opengl/tools/glgen/src/GLESCodeEmitter.java 69e21f5f6e0d04539cd92848ea009dd615d88c2c opengl/tests/gldual/src/com/android/gldual/TriangleRenderer.java c028be4f3b8c7476b46859f66c3f33d528adf181 packages/DefaultContainerService/src/com/android/defcontainer/DefaultContainerService.java 7c6efa13f129dbae5319f0981a430d4662f43354 tests/BrowserPowerTest/src/com/android/browserpowertest/PowerMeasurement.java 7c6efa13f129dbae5319f0981a430d4662f43354 tests/BrowserPowerTest/src/com/android/browserpowertest/PowerTestActivity.java 7c6efa13f129dbae5319f0981a430d4662f43354 tests/BrowserPowerTest/src/com/android/browserpowertest/PowerTestRunner.java df8a3f31d871db25e952972c2eb346a71186e9e3 tests/BrowserTestPlugin/src/com/android/testplugin/TestPlugin.java cfaef699e1dfb3a75d5b51f3b15816f13670fd51 tests/permission/src/com/android/framework/permission/tests/ActivityManagerPermissionTests.java cfaef699e1dfb3a75d5b51f3b15816f13670fd51 tests/permission/src/com/android/framework/permission/tests/ServiceManagerPermissionTests.java cfaef699e1dfb3a75d5b51f3b15816f13670fd51 tests/permission/src/com/android/framework/permission/tests/WindowManagerPermissionTests.java Copyright header moved to top in following file: core/tests/coretests/src/android/widget/ListViewTest.java Change-Id: I3c3198be5a0ba36e18679ed834170432bf0b8418
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
6069beb2dfed6da837bf7faa3db3f6119edc017a |
|
10-Mar-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
Rename ApplicationInfo.FLAG_ON_SDCARD to ApplicationInfo.FLAG_EXTERNAL_STORAGE Change-Id: Iadef9f9bb2851c38b6d79be1bafbf932abce4210 Change-Id: I2e412bace3d8005db5057a3497bd836d0038b90c
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
3dda518a4fd57cdded3afa50d8aa206501de7fc6 |
|
25-Feb-2010 |
Christopher Tate <ctate@google.com> |
Add 'restoreAnyVersion' attr for apps that want to restore "future" data If a backup-participating app sets android:restoreAnyVersion="true" in its manifest <application> tag, then its agent will be invoked for restore even if the available dataset was created by a later version of the app than is currently installed on the device. This will not typically be a problem for third party applications, since for them the installation and initial data restore are tightly coupled, but it can cause serious problems for applications which are both preinstalled on the system partition and overridden by later updates. The primary difficulty that this new attribute addresses is this: 1. User buys a Nexus One, Market self-updates, and the user installs some apps. At this point the backup data on the server may indicate that the version of Market which originated its bookkeeping is newer than the stock N1 Market app. 2. User loses their phone, and buys a replacement N1. At setup time, Market has not yet had a chance to self-update, so when the restore comes in, it's tagged as being from "the future" and so the restore is refused. No apps get reinstalled. Bug: 2442127 Change-Id: I076a9553dc613e5c3189350e778315718ed1ed2b
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1bb6906c7a903ee6427c8ff37bdc5896c386ff73 |
|
20-Feb-2010 |
Christopher Tate <ctate@google.com> |
Automatically restore app data at install time When an application being installed defines a backupAgent in its manifest, we now automatically perform a restore of the latest-known-good data for that app. This is defined as "data backed up by this app from this handset, if available; otherwise data for this app as it existed when the device was initially provisioned." If neither option exists for the app, no restore action is taken. The CL involves major changes in the Backup and Package Managers... * The Package Manager's act of installing an application has now been split into two separate phases, with a data-restore phase optionally occurring between these two PM actions. First, the details of the install are performed as usual. Instead of immediately notifying install observers and issuing the install-related broadcasts, the in-process install state is snapshotted and the backup manager notified that a restore operation should be attempted. It does this by calling a new API on IBackupManager, passing a token by which it identifies its in-progress install state. The backup manager then downloads [if possible] the data for the newly-installed application and invokes the app's backupAgent to do the restore. After this step, regardless of failure, it then calls back into the Package Manager to indicate that the restore phase has been completed, supplying the token that was passed in the original notification from the Package Manager. The Package Manager then runs the final post-install actions: notifying install observers and sending out all the appropriate broadcasts. It's only at this point that the app becomes visible to the Launcher and the rest of the OS. ... and a few other bits and pieces... * The ApplicationInfo.backupAgentName field has been exposed to the SDK. This can be reverted if there's a reason to do so, but it wasn't clear that this info needs to be hidden from 3rd party apps. * Debug logging of restore set IDs and operation timeout tokens [used during any asynchronous Backup Manager operation] are now consistently in hex for readability. * We now properly reset our binder identity before calling into the transport during restore-set operations. This fixes a permissions failure when a single-app restore was attempted. * The 'BackupTest' test app is no longer lumped onto the system partition by default. Change-Id: If3addefb846791f327e2a221de97c8d5d20ee7b3
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
23085b781e145ed684e7270af1d5ced6800b8eff |
|
09-Feb-2010 |
Ben Cheng <bccheng@android.com> |
Support per-application switch to execute the VM in safe mode. The new attribute can be set by adding android:safeMode="true" in AndroidManifest.xml with the SDK. Tested with pairing locally compiled SDK with Eclipse and verified that the JIT (the only component currently included in the safe mode) is indeed disabled with the new attribute. Bug: 2267583
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ace5a3fbfbf1b41905410925f1ea007040a7a675 |
|
05-Feb-2010 |
Kenny Root <kroot@google.com> |
Hide resourceDirs from public API Change-Id: I070558c0adca43c8650ac740d3cda4334d0f4a50
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1edab2b551995a8df25f4b533405d6003b8b8b66 |
|
22-Jan-2010 |
David 'Digit' Turner <digit@google.com> |
Make PackageManager unpack gdbserver binaries at installation time. Native-debuggable packages contain a lib/<abi>/gdbserver executable. This patch ensures that the package manager will copy it to the proper location (/data/data/<appname>/lib) at installation time. Note that such packages are marked with a new ApplicationInfo flag named FLAG_NATIVE_DEBUGGABLE, to be used later by the Activity Manager.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d1ab01682b136b586aac94334f976f03c762b3c7 |
|
22-Jan-2010 |
Kenny Root <kroot@google.com> |
Add extra resources field for ApplicationInfo Allow ApplicationInfo to track multiple files it wants to use as resources by adding a string array to its public definition. Change-Id: Ieffc4b1755270520b59c4e5a3c084e86aef02346
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8d528c85d00cea5168ed6842f17c7f5afae338c4 |
|
15-Jan-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
Fix build error
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
af8e9f4805643f90a9dc0ecfa119e0a860c12f8a |
|
12-Jan-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
app install on sdcard. provide skeleton implementation to install an app on sdcard, just resources. Add new install path for /asec in installd. ignore . when checking for apk path since the sdcard packages id'ed by package name. Add new -s option to adb shell pm Refactor fwd locked from scanMode to ApplicationInfo. Add new flag for sd install Add new parse flags for fwd locking and installing on sdcard New mock api's in PackageManagerService to invoke MountService api's. These will be refactored again and so have been wrapped internally. Some error codes in PackageManager Changes in PackageManagerService to use mPath and mScanPath during installation and switch to using PackageParser.Package.applicationInfo attributes for source and public resource directories. Some known issues that will be addressed later using system_uid for now. needs some tinkering with uid and packagesetting creation to use the actual app uid error handling from vold not very robust. ignoring lot of things for now sending a delayed destroy to delete packages. will revisit later revisit temp file creation later. just copy for now
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
78bceeb925dff57543d7d9cd27f560448fb2e854 |
|
12-Nov-2009 |
Dianne Hackborn <hackbod@google.com> |
am 8c3fc080: am 5bb200fd: am 2ade6421: Merge change I775e1ec0 into eclair Merge commit '8c3fc0801bb32a99dd5ab97c93bb615999b2c977' * commit '8c3fc0801bb32a99dd5ab97c93bb615999b2c977': Debugging for issue #2250075: Desk dock clock app sometimes doesn't
|
12527f9fb1cb0a1ad3be8149c1c88a0e731cb4d6 |
|
12-Nov-2009 |
Dianne Hackborn <hackbod@google.com> |
Debugging for issue #2250075: Desk dock clock app sometimes doesn't This adds a history of the last 100 broadcasts that is printed in the debug log, to be able to see what recently happened at the time the bug report was taken. Also does some optimization of the printing of the broadcast records to make it feasible to print this number of entries. (We kind-of need to do this because there are some broadcasts like SIG_STR and SYNC_STATE_CHANGED that are being broadcast a LOT.) Change-Id: I775e1ec0f63369c8bca8c83cee27b95ddc5ec450
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1874aa487cf5da31f5770d21f0973a417f99247c |
|
11-Nov-2009 |
Oscar Montemayor <oam@google.com> |
Encrypted File Systems project. Implementation of opt-out flag in AndroidManifest XML file. This flag is necessary for applications to specifythat their daa is never to be encrypted when the encrypted file system feature is commplete and enabled. Encrypted File Systems project. Adding android:neverEncrypt flag to AndroidManifest.XML to allow packages to opt-out from EFS features. Encrypted File Systems Project. Fixing white spaces and end-line issues. Encrypted File SYstems Project: opt-out flag. Removed AndroidManifest.xml changes, as will make that change in a separate integration.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
3b3e145d3c41fd68974e08f799b1fd1f8f060cf0 |
|
25-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
A variety of work on animations. - The lock screen now fades in and out. - Fixed a bug where we would accidentally freeze the screen when switching to an activity with a different orientation than the current (but the screen itself is in the current orientation). This would mess up the animations on the car dock. - New API to force a particular animation for an activity transition (untested). - New wallpaper animations. - Resources now uses the next API version when in a development build, to help applications being developed against such builds. Change-Id: I2d9998f8400967ff09a04d693dc4ce55f0dbef5b
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
5e1ab335e6e8fbfa19c64d53880a22f472010953 |
|
02-Sep-2009 |
Christopher Tate <ctate@android.com> |
Expand apps' control over the settings restore process Applications can now specify two more aspects of the restore process: whether they need to run with their own custom Application subclass rather than being launched in the usual restricted mode during restore, and whether it's okay for the backup manager to kill the app process once restore has completed. The new manifest attributes for these are, respectively, android:restoreNeedsApplication and android:killAfterRestore. If unspecified in the manifest, restoreNeedsApplication is false, and killAfterRestore is true. In order to support kill-after-restore cleanly, this change also adds a new system-process-only interface to the Activity Manager, which will schedule a "commit suicide" event on the target app's main thread looper. The framework backup agents have been given the appropriate new backup attributes as well.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
7f2054392e9957d3ba8579ef08c29cfb27df564e |
|
28-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Updates from API review. * AccessibilityService -- document onBind() to not be implemented. * GestureLibrary.getLearner() -- needs to be hidden. * IntentSender -- remove protected constructors, document that it is retrieved from a PendingIntent. * Hide permissions: SHUTDOWN, STOP_APP_SWITCHES. * Context -- hide BACKUP_SERVICE. * ContextWrapper -- hide getSharedPrefs bla h blah * Intent.parseUri() -- fix docs. * ApplicationInfo.FLAG_TEST_ONLY?!? * Hide MockContext.getSharedPrefs blah blah
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
11b822d2a91ea17c34c0cb1c11e80a9a30d72864 |
|
22-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Simplify density compatibility to a boolean. Instead of a list, we now just have a single boolean indicating whether an application is density aware, and this set set to true by default as of Donut.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
c4db95c077f826585d20be2f3db4043c53d30cf5 |
|
22-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
First pass at reworking screen density/size APIs. This changes the names of the directories in aapt, to what you see in the list of DpiTest resources. Also adds a new "long" configuration for wide screens, which the platform sets appropriate, and introduces a new kind of resizeability for not large but significantly larger than normal screens which may have compatibility issues.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
69fff4a72d4dfc9208db79d773ef3ca23350287e |
|
21-Jul-2009 |
Mitsuru Oshima <oshima@google.com> |
* Disable compatibility mode for all cases.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
1ecf5d28817f0a051e77488380dcd5bc622ea169 |
|
07-Jul-2009 |
Mitsuru Oshima <oshima@google.com> |
Re-implementation of large screen support using window manager. * added background filler surface to fill the outer rim. Using the same layer as dim surface because they never co-exists (in the same window) * clean up the obsolete code in CompatibiltyMode/ViewRoot for support large screen support.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
723738cfaec3dd7b0fe152c872c41bebf94074c4 |
|
26-Jun-2009 |
Dianne Hackborn <hackbod@google.com> |
Expand support for different screen sizes. Applications can now declare that they support small, normal, or large screens. Resource selection can also be done based on these sizes. By default, pre-Donut apps are false for small and large, and Donut or later apps are assumed to support all sizes. In either case they can use <supports-screens> in their manifest to declare what they actually support.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
5c1e00b14d2ef10ec76abf3e951fa8003a67f558 |
|
19-Jun-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix targetSdkVersion, make resize mode a flag, delayed dexopt, easy ApplicationInfo. - Fix a bug where targetSdkVersion could not be set if minSdkVersion. Stupid, stupid. Also make sure to fail if minSdkVersion is for a code name. Really stupid. - Change the API for resize compatibility mode to be a bit in the flags field, instead of a separate boolean. - Implement delayed dexopting, to avoid the looong full dexopt during boot. This is only enabled for "eng" builds. When in this mode, the activity manager will make sure that a dexopt has been done before loading an .apk into a process, and will try to avoid displaying ANRs if they are due to the dexopt causing some operation to take longer than it normally would (though I make no guarantees about this totally working). - Add API to Context to get the ApplicationInfo for its package, for easy access to things like targetSdkVersion.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
e5fb328825995aa33b5b7ecf8b5bee2b17f81715 |
|
10-Jun-2009 |
Mitsuru Oshima <oshima@google.com> |
resolution support fix/improvement * adding compatibility menu * backup gravity * set expanable=true if the screen size is hvga * density. * added "supports any density" mode. I'll add sdk check later. * disallow to catch orientation change event if the app is not expandable. This was causing layout problem under non-expandable mode. I discussed this with Mike C and we agreed to do this approach for now. We'll revisit if this causes problem to a lot of applications.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
9189cabb0b6c6c28232fe6f412b7ba7a37352a6a |
|
03-Jun-2009 |
Mitsuru Oshima <oshima@google.com> |
* Moved supports-density tag under manifest * Refactored Compatibility code * Added CompatibilityInfo class * Removed getApplicationScale from Context * Added Resources#getCompatibilityInfo so that RootView can get the compatibility info w/o going through Context * Expandable support * Added expandable tag under manifest * Old application w/o expandable is given the default screen size ([320, 480] x density). * The non-expandable window is centered.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
181fafaf48208978b8ba2022683ffa78aaeddde1 |
|
14-May-2009 |
Christopher Tate <ctate@google.com> |
Retool the backup process to use a new 'BackupAgent' class Backups will be handled by launching the application in a special mode under which no activities or services will be started, only the BackupAgent subclass named in the app's android:backupAgent manifest property. This takes the place of the BackupService class used earlier during development. In the cases of *full* backup or restore, an application that does not supply its own BackupAgent will be launched in a restricted manner; in particular, it will be using the default Application class rather than any manifest-declared one. This ensures that the app is not running any code that may try to manipulate its data while the backup system reads/writes its data set.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
ade3ecad94d1f4431576f53bae26c35efbf7a2c9 |
|
12-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #1783881 (manifest option for adb-install-only apps) You can now use android:testOnly="true" to not allow your .apk to be installed as a normal app. The only way to do so is with the pm command and giving the -t option, which sets a new INSTALL_ALLOW_TEST flag when installing. I also used this to clean up the install API... actually, mostly to hide it, since it is not accessible to apps so shouldn't be in the SDK. We will be doing some more work on it, so this will prevent adding yet another backwards-compatibility-for-no-reason version.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
851a54143c15a1c33361efae2db3f7f45059b472 |
|
08-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement targetSdkVersion and maxSdkVersion, plus version code names. This adds new attributes for specifying a targetSdkVersion and maxSdkVersion. There is a new ApplicationInfo flag that is set if the application has set its targetSdkVersion to the current platform or later. Also you can now use a string for minSdkVersion and targetSdkVerion, to indicate you are building against a development tree instead of an official platform.
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
8d112675879a2b83197d3b4ae4fb623abd1a1ec3 |
|
27-Apr-2009 |
Mitsuru Oshima <> |
AI 147845: Compatibility mode support. Part 1 Adding supports-density tag to manifest file/ApplicationInfo. BUG=1752478 Automated import of CL 147845
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/frameworks/base/core/java/android/content/pm/ApplicationInfo.java
|