History log of /frameworks/base/core/res/AndroidManifest.xml
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
cba436b312f1bf6890be1366843109eebdc1d229 13-Oct-2016 Svetoslav Ganov <svetoslavganov@google.com> Merge "Allow SetupWizard to do WiFi scans if location off" into nyc-mr1-dev
b2457c370451ca6eac9457369a30a43aa0179ee6 12-Oct-2016 Svetoslav Ganov <svetoslavganov@google.com> Allow SetupWizard to do WiFi scans if location off

Location permission is needed for apps to do WiFi scans
and if location is globally off no app can scan too. It
is possible that an OEM does not want location to be on
until the user agrees to that or a device owner can turn
location off before setup. As a result setup wizard
cannot show the WiFi networks preventing the user form
logging in. This change allows the setup wizard component
to perform WiFi scans even if location is globally off.

bug:29577364

Change-Id: Ic56bfb7fb3818658a843d309b67ef37324045f67
/frameworks/base/core/res/AndroidManifest.xml
0bba1c620b2fc65f9809a619042e75597075d431 10-Oct-2016 Jack He <siyuanh@google.com> List HF_INDICATORS_VALUE_CHANGED broadcast as protected

android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED
notification should be protected.

Bug: 32059227
Test: manual
Change-Id: I06d4a7e3aa3a5586eb09d2538b4b526a5d073f9a
(cherry picked from commit b798f79ba26e057531fb51e65824e0deee445f26)
/frameworks/base/core/res/AndroidManifest.xml
7e2657c30374dfc89993aa7cde8d96ae60a13d0a 26-Sep-2016 Salvador Martinez <dehboxturtle@google.com> Changed themes for core activities

Many activities in core were using the
material theme which would result in teal
colors on all devices. These themes have
all been changed to DeviceDefault so that
the color will be more suited to whatever
device the user has.

Test: Manual Inspection
Bug: 31623421
Change-Id: I6847023c4fb57a1c3384a1f8e483cd740229458f
/frameworks/base/core/res/AndroidManifest.xml
234d1afd7913bebd936c33eba93041aebfd8ac70 27-Aug-2016 Sudheer Shanka <sudheersai@google.com> Allow apps with CREATE_USERS permission to create demo users.

Bug: 31092477
Test: adb shell am create-user --ephemeral --demo <user-name>
Change-Id: Ia08a50ec4371466c62cdc9f5391e298a666b5081
/frameworks/base/core/res/AndroidManifest.xml
5cb2973495084f8ce3433b579e4b4962ed9d7efc 12-Jul-2016 Svetoslav Ganov <svetoslavganov@google.com> Only sync adapters with access can see an account - framework

It was possible for a sync adapter without accounts access to
see the account which it is supposed to sync which can be used to
identify the user. This change ensures that only sync adapters
with account access can run (which results in seeing the account),
otherwise we involve the user to approve access only to this account.

A sync adapter can access an account if one of these is true:
- it is signed as the authenticator for this account
- has the GET_ACCOUNTS permission
- has an auth token for the account
- it is a preinstalled app (system or privileged)

The main thing we need to figure out is if the extra prompts
for giving access to a sync adapter to the account create too
much friction.

bug:28163381

Change-Id: Ie083bb681b5a2aed81ca5f6a062193a175fad77e
/frameworks/base/core/res/AndroidManifest.xml
9a236066dbf604edfd5f873b4a3b94a200efd628 18-Aug-2016 Ajay Panicker <apanicke@google.com> Protect various Bluetooth broadcasts

Bug: 30832954
Change-Id: I37e0b2ffab65c0703244917a4ade9bb8afbb5e6f
/frameworks/base/core/res/AndroidManifest.xml
514da60fb6227de9700e145f03614c2081e8e5a5 19-Jul-2016 Hugo Benichi <hugobenichi@google.com> Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission

This patch creates a new permission used by ConnectivityService to give
access to restricted networks without the NET_CAPABILITY_NOT_RESTRICTED
capability bit on.

Bug: 24497316
Change-Id: I5b6c8a9ef14395b2f1ab26cb17b24d7876ec79f1
/frameworks/base/core/res/AndroidManifest.xml
1c9977b762b4bac46b4470f04c898bfd17da5d90 12-Jul-2016 Michael Wright <michaelwr@google.com> Rename color transform to color mode and persist the value.

Also, standardize on a set of possible modes for the displays to
enter and separate the configuration of the color mode from the
configuration of the display mode.

Bug: 29044347

Change-Id: I6af0a7d1f11bc72d4cefc380f115c1fb00788864
/frameworks/base/core/res/AndroidManifest.xml
1030520822c42cc7357b463d301c7e97e928ba22 15-Jul-2016 Makoto Onuki <omakoto@google.com> Cache the default launcher.

Originally we always checked with PM for the default launcher,
which would take ~2ms.

Now we cache the result, and clears the cache when (any) preferred
activities change.

Bug 30126557

Change-Id: Iceef288cd372c8bb9b119aa493e5173d894f2302
/frameworks/base/core/res/AndroidManifest.xml
dbbc7af06363435492410227c3c2b703ebda80e4 07-Jul-2016 Suprabh Shukla <suprabh@google.com> Making timeouts configurable through Settings

Adding a global setting for timeouts used in retail demo mode.
Also renaming the protected intent ACTION_RESET_DEMO to reflect proper
owner package.

Bug: 29917613
Change-Id: I9a174503626ab28cceb5024a8e63d27612439b92
/frameworks/base/core/res/AndroidManifest.xml
58dd0cd65e7ac9ca0c9ccbf42087baf2df751c61 29-Jun-2016 Ajay Panicker <apanicke@google.com> Protect REFRESH_BATCHED_SCAN broadcast

Bug: 29754520
Change-Id: Id3f43d36db2c5f026a5d3a94e7370051d2e23e37
/frameworks/base/core/res/AndroidManifest.xml
022b6fe928f51133166f09578335d7dcb7895d30 15-Jun-2016 Pavel Zhamaitsiak <pavelz@google.com> Move IMS-related protected broadcasts to packages/services/Telephony

Bug: 29228175
Change-Id: I03bf54dde0ae1a40eda7fde655124a1d2a901442
/frameworks/base/core/res/AndroidManifest.xml
84d2c0de2ec7ccc9fbbcf8e3357b0ac1eb5f9f56 13-Jun-2016 Ricky Wai <rickywai@google.com> resolve merge conflicts of 6f1ed20 to nyc-mr1-dev

Change-Id: I9fe1e50f99382cbd8cd90f77ef99d081b472bb81
6f1ed200b3aa01af88eb309a55a428ceac56a9a2 13-Jun-2016 Ricky Wai <rickywai@google.com> Merge "Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked" into nyc-dev
a2ef5c89c0945960510716eebe7965002d535789 10-Jun-2016 Sudheer Shanka <sudheersai@google.com> Merge \"Reduce shell power over user management.\" into nyc-dev
am: 1b4124fc95

Change-Id: Ia54f3ad9a8594e101407db6b52b378ae8bec72a2
1b4124fc954db07064e80d3e25c3549507c255ca 10-Jun-2016 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Reduce shell power over user management." into nyc-dev
f5cea03eb036c05cacc711ff90c97a48ffb2bc17 09-Jun-2016 Sudheer Shanka <sudheersai@google.com> Reduce shell power over user management.

Remove MANAGE_USERS permission from shell and whitelist it for
some specific functionality.

Bug: 29189712
Change-Id: Ifb37448c091af91991964511e3efb1bb4dea1ff3
/frameworks/base/core/res/AndroidManifest.xml
08504b5e0dd4ee87cc47d8a977d47466923bfc4b 10-Jun-2016 Svet Ganov <svetoslavganov@google.com> Merge \"Protect the android.intent.action.CALL_PRIVILEGED broadcast\" into nyc-dev
am: c94872e940

Change-Id: I722d5bfbed781c28db5da59f303c2579123d8e6e
c94872e9403ba4b6e8d374c29f42aeefed610bb0 10-Jun-2016 Svetoslav Ganov <svetoslavganov@google.com> Merge "Protect the android.intent.action.CALL_PRIVILEGED broadcast" into nyc-dev
aa587546ec8f9a3c1425106e83ece86e8437369f 09-Jun-2016 Stuart Scott <stuartscott@google.com> Add UCE Service Down protected broadcast

bug:29173516
Change-Id: I1c5743962dbca9c482ce7d87f6fe570a3249f3fe
/frameworks/base/core/res/AndroidManifest.xml
b1dd80bcfe8d495478d185a5d88fc2cb981e9c47 07-Jun-2016 Ricky Wai <rickywai@google.com> Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked

Bug: 29150970
Change-Id: Ie04cec116564147272896e4a5ca076bbc08e60b1
/frameworks/base/core/res/AndroidManifest.xml
c69266dec6556c5f82d74819251130b2ca820cec 09-Jun-2016 Svet Ganov <svetoslavganov@google.com> Protect the android.intent.action.CALL_PRIVILEGED broadcast

bug:29178416

Change-Id: I5e8f1e5423d0dd59cc532a45142b2401f5e5a45b
/frameworks/base/core/res/AndroidManifest.xml
211b5b10f6baddc290f7f65c0ac70eed3b9913c8 08-Jun-2016 Amith Yamasani <yamasani@google.com> resolve merge conflicts of 718f321 to nyc-mr1-dev

Change-Id: I0021aa5be1822082d8ff026cafa8c8b6b56b90b5
d2b21047c8c133d99cbd4821a5dc88f60d933445 03-Jun-2016 Amith Yamasani <yamasani@google.com> Add a separate read permission for oem unlock state

New privileged permission READ_OEM_UNLOCK_STATE added
for system privileged apps.

Changing the unlock state still requires the old
permission OEM_UNLOCK_STATE, which is signature protected.

Bug: 28953956
Change-Id: Iedd2ad1d2d1dc3ae91122d7c406e3ee623a47d61
/frameworks/base/core/res/AndroidManifest.xml
4ec430e0623e808c3a0feb1602d48c2894b130f9 27-May-2016 Suprabh Shukla <suprabh@google.com> Adding Reset Demo Notification

RetailDemoMOdeService adds a notification which allows user to wipe
current session and start a fresh demo session.

Bug: 27280140
Change-Id: I59dd82d236287206a2ca747210b3423fdc62c185
/frameworks/base/core/res/AndroidManifest.xml
a8e6f875bc07dc12d3c8284cef5b5d83d93ff743 24-May-2016 Dianne Hackborn <hackbod@google.com> Fix issue #28931042: wtf in system server

More broadcasts (from telephony) that should be protected.

Also put a little more information in the wtf message to
help determine where broadcasts from out of the system process
are coming from.

Change-Id: Ie3df25c883482ca54c7a7c5db57ca609950f5cbc
/frameworks/base/core/res/AndroidManifest.xml
0e351a945b55e106d26b1d32659358617eff0be5 10-May-2016 Sudheer Shanka <sudheersai@google.com> Merge "Update docs for DELETE_PACKAGES permission." into nyc-dev
eaa6c6b540431ba17f887d456cc1721ccf30c855 05-May-2016 Sudheer Shanka <sudheersai@google.com> Update docs for DELETE_PACKAGES permission.

Bug: 28302564
Change-Id: I283b8a5490a189fc90f64aec3278b87a430c2623
/frameworks/base/core/res/AndroidManifest.xml
27d92e4e397728d56f4f951dd4ce99668c7c447b 06-May-2016 Christopher Tate <ctate@google.com> Move the 'pretend idle jobs can run now' broadcast into AMS

It's a protected broadcast, so sending it directly from 'am' is
no longer an option. This is needed for CTS as well as being
generally useful during app development.

Bug 28406044

Change-Id: I101915a8c6f19454330a8db2079a75023c112582
/frameworks/base/core/res/AndroidManifest.xml
2759e429d1f5e18869de34e5f0e13257c269aff9 06-May-2016 Ajay Panicker <apanicke@google.com> Protect TRANSFER_COMPLETE broadcast

Bug: 28621801
Change-Id: Ia90abd00694ae80000f59ee0a17826592fd2159b
/frameworks/base/core/res/AndroidManifest.xml
a75d4877af7fa045cc91b2d60d3801aa098608de 05-May-2016 Adam Powell <adamp@google.com> Merge "Have the Resolver/Chooser activities handle resize config changes" into nyc-dev
46ef0579dddd6480306fa58553a6e3180aedf9c7 05-May-2016 Adam Powell <adamp@google.com> Have the Resolver/Chooser activities handle resize config changes

Both of these activities do additional work and look janky when
rebuilding for a config change, especially in the presence of
multiwindow. As neither of them use layouts or other resources that
vary based on configuration, mark them as handling the relevant config
changes.

Bug 27171954

Change-Id: I38df1d875bcb063d72316b586c4d3f8074c4fad9
/frameworks/base/core/res/AndroidManifest.xml
441da79d8aa7b873f23227d10ecd425671b85506 04-May-2016 TreeHugger Robot <treehugger-gerrit@google.com> Merge "Marking @SystemApi permissions @hide too." into nyc-dev
2f78bf96d20d81843a1b6013ee4d18e5ce58a206 03-May-2016 Ajay Panicker <apanicke@google.com> List the CONNECTION_STATE_CHANGED broadcast for MAP as protected

Bug: 28527879
Change-Id: Ifb2db87677e92022814bb9704c26009d249ac6ce
/frameworks/base/core/res/AndroidManifest.xml
65fad18461b64ac35bf65e463e7f792c6df72add 19-Apr-2016 Ajay Panicker <apanicke@google.com> List the SDP_RECORD broadcast as protected

Bug: 28257589
Change-Id: I97ef91fa3a7f7ef62fd96ca079e0a6d5a957bc71
/frameworks/base/core/res/AndroidManifest.xml
a895559a41930b6665d8e3056b463633f3096fbc 02-May-2016 Amit Mahajan <amitmahajan@google.com> Marking @SystemApi permissions @hide too.

Bug: 28287631
Change-Id: Ie0375620689263ebafd6850f2261e090f09521b1
/frameworks/base/core/res/AndroidManifest.xml
4d36b3a8c5ba1289d851ef337e46709bba333100 27-Apr-2016 Makoto Onuki <omakoto@google.com> ShortcutManager: finishing touches

- Change back the throttling quota to 10 calls / day
- Foreground apps are no longer throttled, and when an app comes to
foreground the call counter will be reset.
- When the system locale changes, reset throttling for all packages
for all users.
See LocalService.onSystemLocaleChangedNoLock() for how it's performed.
Because the reset must happen before any other apps have a chance to
publish shortcuts, the logic is not straightforward.

- Added an internal API to reset the throttling upon inline-reply
from a notification.

- Stop supporting icons from "content:" URIs
- Improved javadoc on several APIs.

Also internal refactor needed to this:
- ShortcutUser.getAllPackages()/getAllLaunchers() are no longer
accessible to outer code to prevent accidentally adding/removing the
content. Outer code should use forAllPackages() / forAllLaunchers().

Bug 27923857

Change-Id: I002511193d1d33718163bb1dabe77610bde58198
/frameworks/base/core/res/AndroidManifest.xml
dae6beda7b9037234e24a1986b4a69db52a7a31c 25-Apr-2016 Rubin Xu <rubinxu@google.com> Add back protected profile availibility broadcasts.

Bug: 27532254
Change-Id: Ifbf59f64358864cd1d48be5e797c45ec2744eac0
/frameworks/base/core/res/AndroidManifest.xml
ffcba67bf9d25d9b8131f0aab9d5c8a4df492b69 23-Apr-2016 Carlos Valdivia <carlosvaldivia@google.com> Merge "Rename GET_PASSWORD_PRIVILEGED and make it signature." into nyc-dev
714bbd8539b73f9d8cf396b6e0edd03f968ebfbd 22-Apr-2016 Carlos Valdivia <carlosvaldivia@google.com> Rename GET_PASSWORD_PRIVILEGED and make it signature.

Now named GET_PASSWORD. Now it is just a signature, not privileged.

Bug: 28295831
Change-Id: Ice93b527edced9546639b6c7096aad933c517548
/frameworks/base/core/res/AndroidManifest.xml
ae0e03a9e03de34e37b768b971d7596d7220a053 26-Feb-2016 Svet Ganov <svetoslavganov@google.com> Cleanup of the PackageInstaller API - Frameworks

The PackageInstaller app manages side-loading apps as well
as permission management. It should be updatable, hence
should rely on system APIs to talk to the platform. This
is the first step of defining an API boundary.

Change-Id: I9814eafd0b22ae03b4b847a7007cdbf14c9e5466
/frameworks/base/core/res/AndroidManifest.xml
b5b86c11008422ac4bf5af5fed736f04ebbaa858 29-Jan-2016 Sujith Ramakrishnan <sujithrk@google.com> Unbundle RemoteService on TV - part 3

- New service TVRemoteService triggered by SystemServer
- Provider service proxy and watcher for maintaining connections to unbundled
services which have the BIND_TV_REMOTE_SERVICE permission.
- Shared library to facilitate connections between unbundled service and
TVRemoteService.
- Unbundled service needs TV_VIRTUAL_REMOTE_CONTROLLER
permission to be fully functional.

b/23792608

Change-Id: Ief5c6995883d1f7268a73bdd0c920c4c3f42cddb
/frameworks/base/core/res/AndroidManifest.xml
b40667eccdd797d08560c33e696625509f90d52b 22-Apr-2016 Rubin Xu <rubinxu@google.com> Merge "Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast" into nyc-dev
59c9a93fc268e226495d4ee8cf7c507c2ea2c433 20-Apr-2016 Trevor Johns <trevorjohns@google.com> Merge changes from topic 'merge_docs_nyc-dev' into nyc-dev

* changes:
Remove links to createAndInitializeUser() and createUser()
Resolve merge conflicts of a5060ee to nyc-dev
682c24e22811d4ee17ae1cd61bf255c3f7e722b7 12-Apr-2016 Trevor Johns <trevorjohns@google.com> Resolve merge conflicts of a5060ee to nyc-dev

This undoes the automerger skip which occured in
commit e740c84dc32180214a7fd157105d6c18d30408ee and
replays it as a standard (NOT -s ours) merge.

Change-Id: If5a47be26f73d6a0735c425cd66310a3e2a89086
/frameworks/base/core/res/AndroidManifest.xml
19c2a57c24fa337030ff31867380b685e9a5b586 15-Apr-2016 Rubin Xu <rubinxu@google.com> Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast

Bug: 27532254
Change-Id: Iaca17355d3ec75fa09c36a5353f40d678cc2c812
/frameworks/base/core/res/AndroidManifest.xml
732bd6cb2736c9ae091f2b5b136570fc5d579224 12-Apr-2016 Dan Sandler <dsandler@android.com> Allow system apps to substitute a different app name in notifications.

This is a privileged permission and is only to be used by
the core OS and related packages whose names are confusing
or misleading when shown in notifications.

The user will always be able to see the true package name by
accessing the notification inspector (longpress or swipe
gesture on the notification row in SystemUI).

Fixes: 26517701
Change-Id: I2b021c9da0757b99df76399666af263668d88070
/frameworks/base/core/res/AndroidManifest.xml
e9c752aa37553cab4d27b1c63e6c58eebc87d4c0 12-Apr-2016 Jeff Sharkey <jsharkey@android.com> Another protected broadcast.

Bug: 28133722
Change-Id: I5fe8158a3c66168e1c5482711a487eba55876b73
/frameworks/base/core/res/AndroidManifest.xml
50e229f1f45a1550ba13ec3f81e864630fc3dc1c 06-Apr-2016 Ruben Brunk <rubenbrunk@google.com> Merge "Add VrManager AIDL interface for use by system apps." into nyc-dev
c7be3beced4ade05466a4a77c003ea81c2429f74 02-Apr-2016 Ruben Brunk <rubenbrunk@google.com> Add VrManager AIDL interface for use by system apps.

Bug: 27884853
Change-Id: I6de0d291deafe5003070d60866c60d6599312e79
/frameworks/base/core/res/AndroidManifest.xml
f9324a8dd9556785c6918c079b9236bc1a28e145 06-Apr-2016 Jeff Sharkey <jsharkey@android.com> Protect more broadcasts.

Bug: 28001192
Change-Id: I3a3a48ccfcd75bb91431988aa3495d091d5d00f4
/frameworks/base/core/res/AndroidManifest.xml
e95057ade126e9e159fe05b69c32f85f7891490f 01-Apr-2016 Rubin Xu <rubinxu@google.com> Split ACTION_MANAGED_PROFILE_AVAILABILITY_CHANGED into two.

Add more comment to EXTRA_QUIET_MODE

Bug: 27532254
Change-Id: I68a217561afca8b87f523c62393cdad097d5b75d
/frameworks/base/core/res/AndroidManifest.xml
f3f7965eb38d05cf2f09e8b54105ac35e8855b38 01-Apr-2016 Pavel Zhamaitsiak <pavelz@google.com> Merge "Change UCE permissions from dangerous to signatureOrSystem" into nyc-dev
d9855c797cebf279d45121e6ec52f025df4bd860 01-Apr-2016 Pavel Zhamaitsiak <pavelz@google.com> Change UCE permissions from dangerous to signatureOrSystem

Bug: 27812202
Change-Id: Icf9d97e4d3f802bc0b3ea26d61835e6471082118
/frameworks/base/core/res/AndroidManifest.xml
51b651aea178fcfca8a3219141f0ecfda1504887 30-Mar-2016 Carlos Valdivia <carlosvaldivia@google.com> introduce GET_PASSWORD_PRIVILEDGED permission.

That will be used to filter in passwords for Session based
AccountManager flows.

Bug: 27590532
Change-Id: I4a6d0540bcff186e416351a6f719600ce35d86a0
/frameworks/base/core/res/AndroidManifest.xml
f8c07d68c1813c6d9a05eb05951a320ace866168 01-Apr-2016 Russell Brenner <russellbrenner@google.com> Merge "Add new permission for am.updateLockTaskPackages()" into nyc-dev
b3ad567624475d3ad33fa0007e5ec5967b879cec 25-Mar-2016 Russell Brenner <russellbrenner@google.com> Add new permission for am.updateLockTaskPackages()

Adds android.permission.UPDATE_LOCK_TASK_PACKAGES, available only to
the system and setup wizard, providing access to
updateLockTaskPackages() without registering with the device policy
manager as a device owner.

Bug: 20016740
Change-Id: I6eceb5cece9407c84eabf3a818bb908f95989b91
/frameworks/base/core/res/AndroidManifest.xml
ae4908f41c6e96c973a65effe1dfbb3d0fbbeba2 31-Mar-2016 Alan Viverette <alanv@google.com> Remove DayNight theme

Bug: 21854466
Change-Id: I739872112d0ae457d0d4620f9222206072d54b4b
/frameworks/base/core/res/AndroidManifest.xml
9dcb86a48d73f399fb1b5c020005d76d350eeac2 14-Mar-2016 Philip P. Moltmann <moltmann@google.com> Add the print service recommendation service

This service connects through the print manager to the print spooler:

PrintSpooler.AddPrintersActivity <-> PrintManager <-> PrintManagerService <-> UserState <-> RemotePrintServiceRecommendationService <-> PrintRecommendationService <-> PrintRecommendationServiceImpl

Hence there is a lot of mindless plumming.

The actual changes are only in the AddPrintersActivity which is extended
to show another list of services: The recommended services.

The PrintServiceRecommendationService is based on the experimenal print
service stubs provider. This provider was contributed the Android by
Mopria. As this services uses Android own network discovery service most
code from the experimental provider goes away. In fact the only logic
left over is the selections of mdns-txt fields to look at and the
printer vendor configuration.

This relies on the Android MDNS to get fixed (Bug: 27696905). This also
does not deal with how to update the recommendation service.

Bug: 24533249
Change-Id: I6edc6e25fc08a50d478b61c71bb8ea158b08624c
/frameworks/base/core/res/AndroidManifest.xml
7700ee39ae624f02b03884d5caf60ad65ae4baa2 25-Mar-2016 Hall Liu <hallliu@google.com> Update documentation for the READ_PHONE_STATE permission

Bug: 26413825
Change-Id: I58d21ddd6e2ad1cc724648db5839d711d96663fb
/frameworks/base/core/res/AndroidManifest.xml
029ae4dcbfbde25b02968538f75f5729b3fba196 22-Mar-2016 Jeff Sharkey <jsharkey@android.com> Make DISK_SCANNED a protected broadcast.

Bug: 27763115
Change-Id: Ib8b40ff9f4c1f929ac4f07a9d5460a0a593ba080
/frameworks/base/core/res/AndroidManifest.xml
cfedd20d54687449bb6a6982085003cbf9a22bcb 19-Mar-2016 Pavel Zhamaitsiak <pavelz@google.com> ims:rcs: Add UCE interface files for RCS.

Bug: 23222011
Change-Id: I2ce9e60240740acfe70c4a239163fbdbedbd96e0
/frameworks/base/core/res/AndroidManifest.xml
8a372a0a280127743ce9a7ce4b6198c7a02d2a4f 16-Mar-2016 Jeff Sharkey <jsharkey@android.com> Refactoring FBE APIs based on council feedback.

Mostly consists of removing the word "encryption" from most APIs,
since we can't actually make promises about the data being encrypted.

Bug: 27531029
Change-Id: Iace9d7c4e64716abf86ed11847c40f3947e1d625
/frameworks/base/core/res/AndroidManifest.xml
440ef18fe7dcfaff28fad0137f4abe4235381e05 15-Mar-2016 Ian Pedowitz <ijpedowitz@google.com> Merge "Revert "Permissions: Get rid of GET_ACCOUNTS"" into nyc-dev
358e51f3d186719a6a5b1f346f55c5426925055f 15-Mar-2016 Ian Pedowitz <ijpedowitz@google.com> Revert "Permissions: Get rid of GET_ACCOUNTS"

This reverts commit d39600585bcb720d739ef6f0091066e3d4f77765.

Bug: 27665091
Change-Id: I7d017ba7062ac594225229436d2877c7d21fb065
/frameworks/base/core/res/AndroidManifest.xml
658e4c5eceefcb2f0d070d478fb1ab0af27a1bbe 15-Mar-2016 Carlos Valdivia <carlosvaldivia@google.com> Merge "Permissions: Get rid of GET_ACCOUNTS" into nyc-dev
8731408b11a24e3a92188653548f2c90bf866a32 12-Mar-2016 Jeff Sharkey <jsharkey@android.com> Offer to cache ContentResolver-related Bundles.

There are a handful of core system services that collect data from
third-party ContentProviders by spinning them up and then caching the
results locally in memory. However, if those apps are killed due to
low-memory pressure, they lose that cached data and have to collect
it again from scratch. It's impossible for those apps to maintain a
correct cache when not running, since they'll miss out on Uri change
notifications.

To work around this, this change introducing a narrowly-scoped
caching mechanism that maps from Uris to Bundles. The cache is
isolated per-user and per-calling-package, and internally it's
optimized to keep the Uri notification flow as fast as possible.
Each Bundle is invalidated whenever a notification event for a Uri
key is sent, or when the package hosting the provider is changed.

This change also wires up DocumentsUI to use this new mechanism,
which improves cold-start performance from 3300ms to 1800ms. The
more DocumentsProviders a system has, the more pronounced this
benefit is. Use BOOT_COMPLETED to build the cache at boot.

Add more permission docs, send a missing extra in DATA_CLEARED
broadcast.

Bug: 18406595
Change-Id: If3eae14bb3c69a8b83a65f530e081efc3b34d4bc
/frameworks/base/core/res/AndroidManifest.xml
d39600585bcb720d739ef6f0091066e3d4f77765 11-Feb-2016 Carlos Valdivia <carlosvaldivia@google.com> Permissions: Get rid of GET_ACCOUNTS

Second attempt. Still need to add strict mode violation checks and
logging.

Bug: 21901286

This reverts commit bf33bd4d31cfec895c96990525b0cb856407c8d6.

Change-Id: I5d73343544c32ce4fc4c377ba44db8e677a1287d
/frameworks/base/core/res/AndroidManifest.xml
be3696d42552ad55ae0a41e9dd9fe81f5b17d3e7 08-Mar-2016 Chris Wren <cwren@android.com> Merge "rename the asisstant service for the ranker" into nyc-dev
0f90653ca1d25a92e2a5c9864c1347254fe1f65d 08-Mar-2016 Amit Mahajan <amitmahajan@google.com> Merge "New permission for bypassing premium short code check." into nyc-dev
e24b9a6cfa4d565d7f49c9ae8f3aeca737d93312 17-Feb-2016 Ruben Brunk <rubenbrunk@google.com> Add a VR listener service.

Bug: 22855417
Bug: 26724891
Bug: 27364145

- Add an API for VrListenerService, which is bound/unbound
from the framework when the system VR mode changes.
- Allow only a single bound VrListenerService at a time.
- Monitor allowed VrListenerService implementations from
VrManagerService and evict services as needed when packages,
users, or settings change.
- Remove previous VR functionality in NotificationListenerService.
- Add component target to Activity#setVrMode to allow
explicit selection of the running VrListenerService from
the current VR activity.

Change-Id: I776335f4441be0e793d3126f2d16faf86a8c621a
/frameworks/base/core/res/AndroidManifest.xml
e5cd9fa4398c2059dc635da5ffd9b9cee28f605b 12-Feb-2016 Amit Mahajan <amitmahajan@google.com> New permission for bypassing premium short code check.

Bug: 18326557
Change-Id: I1b05f73103183b851bbef1280d0785ce0a48159a
/frameworks/base/core/res/AndroidManifest.xml
e0ba7eb365ac19fdc11c3f820349f0352761b9f4 04-Mar-2016 Chris Wren <cwren@android.com> rename the asisstant service for the ranker

Bug: 22960980
Change-Id: Ibe57933303a488b01c43a7621a488d425d6f707d
/frameworks/base/core/res/AndroidManifest.xml
925cc2a066889bb8b02493fafd5344bf8b2e9136 03-Mar-2016 Jeff Sharkey <jsharkey@android.com> More protected broadcasts!

Bug: 26144973
Change-Id: I56f047d7e4b9d7bcf1ac40c98ee381badd909057
/frameworks/base/core/res/AndroidManifest.xml
e5ad41bc022db99c4f6663da0a9e49356c006741 01-Mar-2016 Dianne Hackborn <hackbod@google.com> Fix issue #27317952: PendingIntent.getIntent() should be protected

Change-Id: Ib05135cd94f5251942a6fc6df542ed39083f7827
/frameworks/base/core/res/AndroidManifest.xml
bdb14a30d0ae0bd8fdaebf76b80f1ca92c42b8a6 26-Feb-2016 Makoto Onuki <omakoto@google.com> Remove READ_WRITE_CONTACT_METADATA, which is no longer used

Bug 27365657

Change-Id: Iaf1b62991bbb0ccce9488e4e50bc49a12663a2d0
/frameworks/base/core/res/AndroidManifest.xml
5cd52bee32250e14f5eca14d9e82535a0f2f4f87 23-Feb-2016 Svetoslav Ganov <svetoslavganov@google.com> Merge "Expose removed permissions flag as system API" into nyc-dev
2a1376d9dfb362a18ba110d8e172f96021f1d879 23-Feb-2016 Svet Ganov <svetoslavganov@google.com> Expose removed permissions flag as system API

There are some permissions that were removed from the platform
and guard nothing but legacy apps may be checking them before
calling APIs. Hence, these apps should get the permissions as
expected despite them being a no-op. To address this the platform
declares removed permissions as normal permissions that are hidden
such that legacy apps can always get them. These permissions are
not shown in the UI. Play needs a way to filter out these
permissions like the platform as they have permissions UI too.

bug:23361760

Change-Id: I10f442dfc09a299ddc5480d8bf2db0bd786aec62
/frameworks/base/core/res/AndroidManifest.xml
66d7588078fbdbdadf646577dce6b3821976d25c 22-Feb-2016 Felipe Leme <felipeal@google.com> Removed bugreport intents from protected list.

These intents are send by Shell, which is not a protected uid, and
already required the android.permission.DUMP permission, hence they are
protected by permission.

BUG: 27287868
Change-Id: Ie7cfe20a119e8abe989186ca2e0ae16454b4cf22
/frameworks/base/core/res/AndroidManifest.xml
9cea80cdddbecadb304eb7c8373cf1ed397f433a 16-Feb-2016 Svet Ganov <svetoslavganov@google.com> No overlay when permissions shown - framework

bug:26973205

Change-Id: I88395e47649191bb7db6dd8723c49e741ef4f1e4
/frameworks/base/core/res/AndroidManifest.xml
5dbd4aad809e6fec51df62280bcc1bfe05cc7df5 07-Feb-2016 Jason Monk <jmonk@google.com> SysUI Tuner: Night mode v3

TwilightService:
- Add support for locking on/off twilight globally
- Change twilight state to have float amount rather than
having clients calculate it using the sunrise/set values
- State controlled through secure setting
- Override mode which locks to a state for a couple hours then
resets
- Add broadcast for SysUI to listen to

Brightness/Power:
- Updates to handle TwilightService changes
- Added secure setting to control whether or not to use
twilight when calculating brightness.

Tuner:
- UI Overhall
- NightModeController will set the values of the custom color matrix
taking into account the current twilight service state and any
custom calibration set by the user.
- Probably other stuff.

Change-Id: I213f1f76a143e711c507b2ba7d784f581bfc32b4
/frameworks/base/core/res/AndroidManifest.xml
087fd6829da7f8ce29db207d134d3b40771af257 18-Feb-2016 Martijn Coenen <maco@google.com> Merge "Update protected broadcasts used by NFC." into nyc-dev
5e906f8829ce2e036361917dafa0ae674a88ec8f 18-Feb-2016 Martijn Coenen <maco@google.com> Update protected broadcasts used by NFC.

Change-Id: Ie7d062e83929e1058e19427f6ca624ab3f8ee472
/frameworks/base/core/res/AndroidManifest.xml
37fc7a7fc0aefc44162fa38d49d3079ced899f26 16-Feb-2016 Jeff Sharkey <jsharkey@android.com> More protected broadcasts.

These actions are owned by the system and should not be sent by
third-party apps for security reasons.

Bug: 27171917, 27169730, 27172357, 27163393
Change-Id: I3161cd3c1c37d26a92723b22878dc5aef6f30c47
/frameworks/base/core/res/AndroidManifest.xml
b5f0049f9841dfe877c070e4aba41516ed7df710 15-Feb-2016 Rubin Xu <rubinxu@google.com> Fix typo in filling ACTION_MANAGED_PROFILE_UNLOCKED extras.

Change-Id: Ic949a0d7f72d46d7cc36018b4b0fc54024c3b180
/frameworks/base/core/res/AndroidManifest.xml
d820abddd255618e828f53040dc0bfcabe249412 01-Feb-2016 Pavel Zhamaitsiak <pavelz@google.com> Make ACTION_RADIO_OFF protected

Bug: 25113145
Change-Id: Idcb88cb1fd06d4761ef1f634136f8ec697bf0851
(cherry picked from commit ae6688ca5d2b506eff29ba27c7532513f2da7da8)
/frameworks/base/core/res/AndroidManifest.xml
901bbe066762a644ec0790de8b07199f4464bb4f 08-Feb-2016 Abhijith Shastry <ashastry@google.com> Merge "Hidden permissions to access blocked numbers." into nyc-dev
c08268e647f89f8ddfd9c6fb1f6ac4f99b13b9cf 05-Feb-2016 Amit Mahajan <amitmahajan@google.com> Make permission RECEIVE_EMERGENCY_BROADCAST public.

It is required to receive intent SMS_EMERGENCY_CB_RECEIVED_ACTION
which is already public.

Bug: 24914029
Change-Id: I2d5461fcedb2cb347c818ab6f94577008f6af242
(cherry picked from commit 45d9b36fc6a609893022b812084987cda3e3717d)
/frameworks/base/core/res/AndroidManifest.xml
d6e1ed59067acdb1683c8916e798729065a546bb 06-Feb-2016 Abhijith Shastry <ashastry@google.com> Hidden permissions to access blocked numbers.

BUG: 26232372
Change-Id: I213622ef4623dadcf56745798fb3452c57fa4bd5
/frameworks/base/core/res/AndroidManifest.xml
10c63d8a12caf5117524799efea95120f8b0845b 05-Feb-2016 Chris Wren <cwren@android.com> move assistant to system API

Bug: 26693581
Change-Id: I7e29b8521e2c33683b8032e63da734cfde1dfcc9
/frameworks/base/core/res/AndroidManifest.xml
ee081d5bd0fdbe7224382da7ce388b9d21f21c78 04-Feb-2016 Steven Ng <stevenckng@google.com> Merge "Add new permission and action for managed provisioning (QR flow)"
4cf5a49e545ec67271452ce1215de86d28fc2087 04-Feb-2016 Christopher Tate <ctate@google.com> Mark the idle-maint trigger broadcast 'protected'

Bug: 26942536
Change-Id: I52d6b304fc894cad7957f84946178378c309f621
/frameworks/base/core/res/AndroidManifest.xml
f933871976b4dc4c8e71a364b66f5208cefad3d3 03-Feb-2016 Felipe Leme <felipeal@google.com> Merge "Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent."
bf33bd4d31cfec895c96990525b0cb856407c8d6 02-Feb-2016 Carlos Valdivia <carlosvaldivia@google.com> Revert "Permissions: Get rid of GET_ACCOUNTS"

This reverts commit 918c55a67c2bf0cec79f75dec6ca468e914a5fd1.

Change-Id: I995f134336bf61ac1f21052355900ae89d0d6694
/frameworks/base/core/res/AndroidManifest.xml
980a1b6fa872f82133a7421bcfe14e2b03a0745e 02-Feb-2016 Steven Ng <stevenckng@google.com> Add new permission and action for managed provisioning (QR flow)

+ Instead of reusing NFC provisioning action, new action and permission
are introduced for QR code provisioning

Bug: 26240297
Change-Id: Id2632d6c6b9e62bf3cad5bc141430d49df4a2c5d
/frameworks/base/core/res/AndroidManifest.xml
a491c07f36350cbb13b0a3070508553ba6c96608 01-Feb-2016 Shreyas Basarge <snb@google.com> Merge "SyncManager on JobScheduler"
c3cd05f8a45ab789aae1cb553df86f94667d595a 11-Jan-2016 Rubin Xu <rubinxu@google.com> Add DevicePolicyManager APIs for process logging.

Add Device Owner APIs for controlling and retrieving the logs. Retrieving the
logs should be rate limited unless we are at the risk of losing logs due to
constrained buffer space.

Bug: 22860162
Change-Id: I80658f5a14e86d7cfd42402fbc5e98dc11698c0e
/frameworks/base/core/res/AndroidManifest.xml
54fa566ab74368bd0f0a8e9da7c695b2d33d6124 30-Jan-2016 Jaewan Kim <jaewan@google.com> Merge "PIP: Use StatusBarService to handle PIP key"
6c7185cd2086de86e51c47f99877a8159c1bab99 30-Jan-2016 Makoto Onuki <omakoto@google.com> Fix permission doc

Bug 26406584

Change-Id: I2c443cc52c600edb1ad904e0eb013829caee9897
/frameworks/base/core/res/AndroidManifest.xml
8c834c07675052c984728cbf79f7c2e0d8246e43 07-Jan-2016 Shreyas Basarge <snb@google.com> SyncManager on JobScheduler

SyncManager now uses JobScheduler for scheduling
and persistence purposes.

Change-Id: I38c92aedbf4d891ca297644d0b706835aaedfcd6
/frameworks/base/core/res/AndroidManifest.xml
c552b04cb4aac9d31dbaf9744f32ddc14886e222 18-Jan-2016 Jaewan Kim <jaewan@google.com> PIP: Use StatusBarService to handle PIP key

Bug: 26591829
Change-Id: I7051fab966e2fc0887b2a21ddbf11aff7e16804b
/frameworks/base/core/res/AndroidManifest.xml
9778f761237b2533903bacc091b1597990110a7e 27-Jan-2016 Felipe Leme <felipeal@google.com> Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent.

This intent will be broadcasted when:

- Global restrict background setting is changed (sent to all packages)
- An individual uid is added to or removed from the whitelist (sent just
to the packages belonging to that uid).

This intent is only sent to registered receivers.

BUG: 26451391
Change-Id: Ic0a5771f88baa52076ad04764f29098a386463cc
/frameworks/base/core/res/AndroidManifest.xml
e7c74cc96eeecec52401d9bf720234d1421cfebc 28-Jan-2016 Adam Powell <adamp@google.com> Revert "Pinning components in ChooserActivity"

This reverts commit ec6bc41e1835804533fd21b3ef8047ecd893bcfd.

Bug 26842512

Change-Id: I9fc775d21081885d0e26fca4ade412a18da45b7c
/frameworks/base/core/res/AndroidManifest.xml
ec6bc41e1835804533fd21b3ef8047ecd893bcfd 27-Jan-2016 Adam Powell <adamp@google.com> Pinning components in ChooserActivity

Move ChooserActivity to SystemUI. This is a safer place for it to live
and still be able to persist data to storage.

Add a context menu to long press for chooser targets allowing users to
'pin' a target component from an app. This causes it to sort to the
front of the list so that a user's favorite apps are always available
from share UIs, etc. Similarly, all ChooserTargets from a pinned
component receive an impossibly large boost for sorting so that they
will always appear first.

Bug 26791843

Change-Id: Ib4e603d9d4263403e98ce619287452ddab593044
/frameworks/base/core/res/AndroidManifest.xml
a35b5539a95342799a18e95616c5e5751a198e4c 20-Jan-2016 Peng Xu <pengxu@google.com> Dynamic Sensor Discovery Implementation

Defined the dynamic sensor meta data type and UUID of sensor, as well
as the broadcast intent that is related to dynamic sensor status
change.

Modify SensorManager, SystemSensorManager and the JNI layer to support
dynamic sensor discovery.

Added SensorNotificationService to notify apps that sensor connected
or disconnected via broadcast.

Change-Id: I28adfb005357d7e3983d65117d6865830c75027d
/frameworks/base/core/res/AndroidManifest.xml
4665f49b9ca404adbb9e1bb3053b5f75ed23f846 27-Jan-2016 Sailesh Nepal <sail@google.com> Merge "Add new public API to allow call screening"
1bef339b88b3f760603dcc08d79a62647fc18296 25-Jan-2016 Sailesh Nepal <sail@google.com> Add new public API to allow call screening

This CL adds a new service that the default dialer can implement to
screen incoming calls.

If the service is implemented then Telecom uses it to decide if a call
should be shown to the user or rejected.

Note, I initially tried to simply extend InCallService instead of
creating a whole new service. The problem with this approach is that:
- this breaks some in call services which show UI as soon as they are
bound to
- the in call service lifecycle is tightly coupled to adding and
removing calls. Call screening happens before a call is added which
makes it a bad fit to in call service
- call screening is a function of only the default dialer's in call
service but the existing code also binds to "controller" call
services

For these reasons it seemed simpler to just create a new optional
service.

BUG: 22857261
Change-Id: I53f2ef93360e0af19b6ce45af21026be6cf3a7f3
/frameworks/base/core/res/AndroidManifest.xml
a772e5fc062c8de48cb9c1d61755110f6b2e189b 25-Jan-2016 Arunesh Mishra <arunesh@google.com> SoundTrigger API improvements.

This CL implements the SoundTrigger API improvements as given in b/22860713. Only the java-level
parts are implemented in this CL.

Key changes include:

* Addition of a SoundTriggerManager/SoundTriggerDetector system API to manage
the sound-trigger based sound models.
* Addition of a SoundTriggerService service that manages all sound models
including voice (keyphrase) and sound-trigger based models.
* Includes logic to write sound-trigger based models to the database.
* VoiceInteractionManager service now uses SoundTriggerService instead of
SoundTriggerHelper.

Bug: 22860713
Change-Id: I7b5c0ed80702527c4460372efeb5e542d3693a69
/frameworks/base/core/res/AndroidManifest.xml
3cdbc806ff52d02bf215a5aa696b670434d9f401 27-Jan-2016 Carlos Valdivia <carlosvaldivia@google.com> Merge "Permissions: Get rid of GET_ACCOUNTS"
58941094d47deefffabc0222f96ca6e40148d83b 26-Jan-2016 Sailesh Nepal <sail@google.com> Merge "Mark mised call notification as protected"
e6e907ea090b3c6b7cd9b793ac5f4acbe326b003 25-Jan-2016 Rubin Xu <rubinxu@google.com> Merge "Show dialog when launching work apps is not possible."
f13c9801697ccac3171137df10dd15f491dd15bd 21-Jan-2016 Rubin Xu <rubinxu@google.com> Turn off profile by stopping the user.

Bug: 22541941
Change-Id: I713ab9b87f3dd1b7bd6206af137562d20a44d76d
/frameworks/base/core/res/AndroidManifest.xml
918c55a67c2bf0cec79f75dec6ca468e914a5fd1 14-Jan-2016 Carlos Valdivia <carlosvaldivia@google.com> Permissions: Get rid of GET_ACCOUNTS

Bug: 21901286

Change-Id: Id2c42f4d449a32c88078d80dcf952d15e67d536c
/frameworks/base/core/res/AndroidManifest.xml
d1a28aa17bac68cb81336a847a62ac10e5295036 23-Jan-2016 Sailesh Nepal <sail@google.com> Mark mised call notification as protected

This CL marks the missed call notification as protected. This prevents
other apps from being able to broadcast it.

BUG: 22857261
Change-Id: I01ae992f2a5fe255f057c5aa28c5c47d34a0a093
/frameworks/base/core/res/AndroidManifest.xml
58d25998321d9f4b1b76d18a5af9d42cdbaad30d 21-Jan-2016 Rubin Xu <rubinxu@google.com> Show dialog when launching work apps is not possible.

There are two cases when this could happen. First is when the work
profile is turned off by the user, and the second is when the profile
owner has suspened the package.

Bug: 22776761
Bug: 22541941
Change-Id: Ibc671e93f87dff0168bb7643494b9d6b45a1a7f9
/frameworks/base/core/res/AndroidManifest.xml
efd88c3bebca9ca24c8f56a77ac0975ad906632f 21-Jan-2016 Makoto Onuki <omakoto@google.com> Merge "Add missing system broadcast actions to the protected list."
730a759254f7a24e77a063eccd1b32ff1bf839ac 21-Jan-2016 Makoto Onuki <omakoto@google.com> Add missing system broadcast actions to the protected list.

Bug 26697573

Change-Id: I39e6b90b38c6e1dbe4978be1cb2a10d72b015cba
/frameworks/base/core/res/AndroidManifest.xml
69d5ebc59e3cbc9c394906a95dc4b9bdc3355c08 14-Jan-2016 Andrei Stingaceanu <stg@google.com> Suspend apps - broadcast intent and API

Send a protected broadcast to registered receivers only
when packages get suspended.

Bug: 22776761
Change-Id: I043053ed45bdc202ead18518a0c1e39cce47947c
/frameworks/base/core/res/AndroidManifest.xml
a8c8851caa0d1d44eccfcae2e01a2b6e7235d290 18-Jan-2016 Michal Karpinski <mkarpinski@google.com> Merge "DPM changes to support remote bugreports"
12747879b0204b9dfee997eddc981d09289e8b77 07-Dec-2015 Amith Yamasani <yamasani@google.com> User creation with an intent

New API for an app to request creating a new user with
a given user name and seed account information for the
SetupWizard to use when that user is switched into.

Also adds system APIs to read the seed account data from
UserManager.

Bug: 22776757
Change-Id: I0bc3f11ee19c15e0ee2a908c88d98b13296cc30d
/frameworks/base/core/res/AndroidManifest.xml
52632e21faf5aa63e53e5626046bc1742cba100c 14-Jan-2016 Jaewan Kim <jaewan@google.com> PIP: Use long press HOME for PIP on Android TV (2/2)

Bug: 25580820
Change-Id: Ic269132ec7de1e725989ad57a1ee205b3334e3bb
/frameworks/base/core/res/AndroidManifest.xml
3fc437e89b018f258a3dee1a83014555aa156dc4 15-Dec-2015 Michal Karpinski <mkarpinski@google.com> DPM changes to support remote bugreports

Bug: 22860136
Change-Id: If984318e421f511d9b0fc7138aacd36d5334698f
/frameworks/base/core/res/AndroidManifest.xml
ab064b3b3687424e14dccfd60ff9a8f93ec22c23 13-Jan-2016 Dongwon Kang <dwkang@google.com> Merge "Add a way for SystemUI to receive media resource (e.g. A/V codec) usage"
2034a4c4c5edd1516d03b73a8c8d8600eb3d4cbc 14-Dec-2015 Dongwon Kang <dwkang@google.com> Add a way for SystemUI to receive media resource (e.g. A/V codec) usage

Bug: 26175834
Change-Id: If506a533c5c7b567e770217a9430bf68b539677a
/frameworks/base/core/res/AndroidManifest.xml
502658dd9037be08b30ce45f4d201da02ba01d8a 11-Jan-2016 Jeremy Klein <jlklein@google.com> Merge "Add a TETHER_PRIVILEGED permission and use it where needed."
ca8bce51f9f0e3ad0614d0d1e83da0ea6a7fd639 09-Jan-2016 Christopher Tate <ctate@google.com> Fix typo in protected broadcast decls

Bug 26471149

Change-Id: I4332fd9adc52d3bd2f6ee0ce3718bf844f1f9843
/frameworks/base/core/res/AndroidManifest.xml
867b3396605421708dbcb0595b8954a3f96858ed 09-Jan-2016 Andy Hung <hunga@google.com> Merge "Add setMasterMono and getMasterMono"
f04b84d4c66ea377ec6fe2b36f3a0994f3e94eba 19-Dec-2015 Andy Hung <hunga@google.com> Add setMasterMono and getMasterMono

Bug: 15283594
Bug: 22700363
Change-Id: I5d0552938ec2a54be4450512974d92ff8c77b1e9
/frameworks/base/core/res/AndroidManifest.xml
f3fa0f8fc689d644adc77e91c85e9311bc2f9c74 07-Jan-2016 Felipe Leme <felipeal@google.com> Added new API for URI permissions management.

The new methods are:

- getGrantedUriPermissions(String packageName)
- clearGrantedUriPermissions(String packageName)

These methods will be used by the Settings app to allow users to clear
the URI permissions granted to an application.

BUG: 26447975

Change-Id: I6867402e42b3d6fd03050ec57b73973ccd8a17af
/frameworks/base/core/res/AndroidManifest.xml
226940ed8550c02875a987f7e46699e6003ec1c0 15-Dec-2015 Michal Karpinski <mkarpinski@google.com> Modifying Shell to accomodate remote bugreports

After receiving android.intent.action.REMOTE_BUGREPORT_FINISHED
in newly created RemoteBugreportReceiver, Shell will generate URI
to the bugreport zip file and send the broadcast
android.intent.action.REMOTE_BUGREPORT_DISPATCH.

Bug: 26152603
Change-Id: I058d626e021b488c9347b45467a4e3505134e79c
/frameworks/base/core/res/AndroidManifest.xml
d42209db964de5597b0846cf8175cee6001ec8d7 29-Dec-2015 Jeremy Klein <jlklein@google.com> Add a TETHER_PRIVILEGED permission and use it where needed.

BUG: 26247383
Change-Id: I73f7227d77926faa9081e83eccb83c8ddee33e08
/frameworks/base/core/res/AndroidManifest.xml
9a25da192e12e3226e0b52dfc44bcac9a0283f73 06-Jan-2016 Julia Reynolds <juliacr@google.com> Send less unnecessary broadcasts.

Protect the broadcasts we do send.

Change-Id: I440a7accfc4509512063b663c0418a29f06ef09e
/frameworks/base/core/res/AndroidManifest.xml
a7ca3e73bfb9e95bd3e87c7d194f044bb16dd9e5 05-Jan-2016 Svetoslav Ganov <svetoslavganov@google.com> Merge "Remove FLASHLIGHT permission"
09bc4e0b7eb9142663703212dc500ab5eb05ed14 29-Dec-2015 Andre Eisenbach <eisenbach@google.com> Protect android.bluetooth.intent.DISCOVERABLE_TIMEOUT

Bug: 26347910
Change-Id: I61b211c3f32c9e79c40c2b07798dd9cb6d82df22
/frameworks/base/core/res/AndroidManifest.xml
1463cebd77f5ef7d165c5ca37b313b1ea2253847 04-Jan-2016 Svetoslav Ganov <svetoslavganov@google.com> Remove FLASHLIGHT permission

This permissions is not protecting access to the flashlight.
Anyone can use the latter via CameraManager.setTorchMode().

bug:26383626

Change-Id: I44c6395b5a0f80c1c539cffe61715b29b401a775
/frameworks/base/core/res/AndroidManifest.xml
d5a204f16e7c71ffdbc6c8307a4134dcc1efd60d 21-Dec-2015 Jason Monk <jmonk@google.com> Better service management for QS 3rd party tiles

Better wrapper around the service that will handle rebinding
when it dies, binding when it becomes available, and forwarding
along all messages to the service once it binds.

Also better handling of too many services at a time. Will only
ever bind to at most 3 tiles and will manage which ones are most
important to show based on pending clicks, last update, etc.

Change-Id: I5f4da0bc751f7eb25baa32e5c0bb9f1bc418f5bb
/frameworks/base/core/res/AndroidManifest.xml
96e2035223638b6e161cdedb795681eee62fae6e 16-Dec-2015 Jeff Sharkey <jsharkey@google.com> Merge "Roll back some broadcasts."
a050e127bbf4891d1e3c7199f56a4723af5fb90a 16-Dec-2015 Jeff Sharkey <jsharkey@android.com> Roll back some broadcasts.

Bug: 26219971, 26219772
Change-Id: Ic45691419f8fcd1b472a380f09408caf29d3c13d
/frameworks/base/core/res/AndroidManifest.xml
63b0318e4bd1fff25e6d434513488bb3bdca3097 15-Dec-2015 Jeff Sharkey <jsharkey@google.com> Merge "Protect some more broadcasts."
4267eacc3bd6c781423a871e135bac03cd93718a 15-Dec-2015 Jeff Sharkey <jsharkey@android.com> Protect some more broadcasts.

Bug: 26144973
Change-Id: Ic05bca52913ee5545719f0f24bed5b359f31259f
/frameworks/base/core/res/AndroidManifest.xml
edd137b9b98d6ed8fd3337ce91f529efe9d0aef5 14-Dec-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Change signature|system permissions to signature|privileged" am: cfed01af4b
am: 3dee9db651

* commit '3dee9db6516fd97d7db3641fc81533cc3553fde8':
Change signature|system permissions to signature|privileged
3dee9db6516fd97d7db3641fc81533cc3553fde8 14-Dec-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Change signature|system permissions to signature|privileged"
am: cfed01af4b

* commit 'cfed01af4bea6ff9025c31fbe3ed973f47529484':
Change signature|system permissions to signature|privileged
381e0a4177c26c2e454a7eef2262d34104e1ea58 13-Dec-2015 Yury Zhauniarovich <y.zhalnerovich@gmail.com> Change signature|system permissions to signature|privileged

Permission protection level changed from signature|system,
which is deprecated to signature|privileged.

Change-Id: I697723221617f8c12255d6911d34cd1bf96eff8b
Signed-off-by: Yury Zhauniarovich <y.zhalnerovich@gmail.com>
/frameworks/base/core/res/AndroidManifest.xml
7fff4a1794a842e83e19371bbf7054aa1e02d666 09-Dec-2015 Felipe Leme <felipeal@google.com> Protect android.intent.action.BUGREPORT_STARTED.

This intent is sent by dumpstate when launched with the -P (progress) option.

BUG: 25794470
Change-Id: I6b6265f85f366db3dfca758d90be83c9e3736d7c
/frameworks/base/core/res/AndroidManifest.xml
2acf063da08dfff69f184c9a6a90a7a5fe60d818 25-Nov-2015 Svet Ganov <svetoslavganov@google.com> Ephemeral cookie API

Add APIs for an ephemeral app to set a cookie which is a small
peice of data cached longer than the app itself. This is useful
for avoiding the user to login every time they use the ephemeral
app. The cookie is stored after an ephemeral app is uninstalled.
Normal apps or ephemeral apps upgraded to full apps can also use
these APIs with the difference that once they are uninstalled
the cookie is deleted.

The cookie size defaults to 16KB and is configurable by a global
settings which can be adjusted via gservices. Also eviction policy
is time based with a default of one month and is configurable by
a global setting which can be adjusted via gservices. If the cert
of the app cahnges (when ephemeral is installed, uninstalled and
installed again) the cooke is wiped to prevent data leaks.

This cahange also adds an API for apps to know whether they run in
an ephemeral mode since it this mode some APIs will not be available.
Another API exposed by this change is private for the system and
exposes all ephemeral apps - installed and uninstalled. Only the
system can call this API. When an ephemeral app is uninstalled the
system stores its name, icon, and permissions. When the app is
reinstalled or a full version is installed the permissions are
propagated.

Change-Id: Id4a73a7750bfbabda0bfcb9bf9018d2062e94367
/frameworks/base/core/res/AndroidManifest.xml
39a275b3980b5ea75e060da540229b95a47333f7 04-Dec-2015 Jeff Sharkey <jsharkey@android.com> Better protection for system broadcast intents.

When the system sends broadcast intents, it's in a very authoritative
position, and many apps blindly trust the sender. This is why we've
historically had the concept of "protected broadcasts" which can only
be sent by the system.

However, it's far too easy to send new broadcasts from the system
without adding them to the protected list. This CL adds logic to help
catch those cases. Currently it just logs the error and continues
sending the broadcast.

Based on boot analysis of a typical device, add 36 new protected
broadcasts.

Bug: 24571095
Change-Id: Ie2cc6b0b2026e67c64730af897e4eb3e0e8404f1
/frameworks/base/core/res/AndroidManifest.xml
0a29ecd8a53b5ac63b628e870a344650ff34c4b0 04-Nov-2015 Rubin Xu <rubinxu@google.com> Introduce quiet mode state to managed profile users

Quiet mode means the user will be free from visual and audio interruptions
from apps inside the managed profile, including notifications, widgets and
others. This CL adds the underlying state bit to users and exposes various
APIs to control and query the quiet mode state.

Bug: 22541941
Change-Id: If5f8e5a897843050e83b6ec26cb39561098f12b9
/frameworks/base/core/res/AndroidManifest.xml
b88dd9412e5348f9fa7aca1cff9c1610e0c6668c 03-Dec-2015 Keun-young Park <keunyoung@google.com> Merge "allow locking UI mode and block launching car dock for automotive"
a771049b2ef401ab911a9e0a277dbf9b475388a1 23-Sep-2015 keunyoung <keunyoung@google.com> allow locking UI mode and block launching car dock for automotive

- add config to lock UI mode change: When this is enabled,
request to change car mode will be ignored. Apps can check
the config using UiModeManager.isUiModeLocked()
- add config to lock day / night mode: When this is enabled,
apps cannot change day / night mode without having
MODIFY_DAY_NIGHT_MODE permission.
Apps can check the config using UiModeManager.isNightModeLocked()
- add config to disable car dock intent launch for home key
and mode change
- All new configs have default values which keeps the current behavior.
Car products should override the configs to get desirable behavior.

bug: 22700993
Change-Id: Ic0e58f3428151e0b1c19a2e9a7d6ded32ff962a6
/frameworks/base/core/res/AndroidManifest.xml
cf7021e827dde0047bd36d32b734893e98d988fe 03-Dec-2015 Chris Wren <cwren@android.com> Merge "Notification Assistant API"
9fa689f8b614d32f36b5f2de2e3065f4ad6b2358 20-Nov-2015 Chris Wren <cwren@android.com> Notification Assistant API

This API allows a single assistant on the device to help the
user manage their notification stream by taking actions on
individual notifications:

- modifying their priority up or down when they are posted
- possibly changing if and how the notification interrupts the user
- adding annotations under notifications

Bug: 22455414
Change-Id: Idf47972bb71c83f1dc1c9ec68a6fa92ac4fc522f
/frameworks/base/core/res/AndroidManifest.xml
568f4de11a87308cbcb888083f02818a8290a7d7 03-Dec-2015 Neil Fuller <nfuller@google.com> Merge "Fix @code escapes"
aa8b1c35add23922ff394e0193ba24cb15bd34f3 03-Dec-2015 Keun-young Park <keunyoung@google.com> Merge "Revert "allow locking UI mode and block launching car dock for automotive""
3b741e03b3eaa8a263f11cd1837091d3ac39483b 03-Dec-2015 Keun-young Park <keunyoung@google.com> Revert "allow locking UI mode and block launching car dock for automotive"

This reverts commit 1746369a6bcd1a7219e94366b3774bfdfff08fc6.

Change-Id: I4989e99b8f648145d0dbfe18e557102939e7d1e3
/frameworks/base/core/res/AndroidManifest.xml
ef3ca438c9b89949c020fecf13834851406f0482 03-Dec-2015 Keun-young Park <keunyoung@google.com> Merge "allow locking UI mode and block launching car dock for automotive"
8e4f4b3d9409c5a5329aaa4caf0102167d5e610d 02-Dec-2015 Chong Zhang <chz@google.com> Add permission to prevent third-parth apps from querying OOM scores

bug: 25853091
Change-Id: Ic1cdbf155e1e930405773fd078dfc57fda2d9afa
/frameworks/base/core/res/AndroidManifest.xml
71fbb81b14958b80fe55738607740c6630e4e9da 30-Nov-2015 Neil Fuller <nfuller@google.com> Fix @code escapes

The body of {@code} must not be HTML escaped. This is one of
several changes that fix the source in conjunction with a
doclava fix.

Bug: 25757239
Change-Id: Ib38a0fa2dd2a3d68e467f78a812071e763d7e881
/frameworks/base/core/res/AndroidManifest.xml
64cdc1458bcf0d09781463a6e421b9b870b09687 30-Nov-2015 Filip Gruszczynski <gruszczy@google.com> Remove dock divider surface when it's not visible.

We achieve the removal by notifying System UI about the visibility of
the dock divider. This way System UI can change visibility of the root
view, which in turn will cause the WMS to destroy or create the surface
as necessary.

Bug: 25844096
Bug: 25683717

Change-Id: Idbc33368db697a059af49106dfadb80c3d7d06c1
/frameworks/base/core/res/AndroidManifest.xml
a3ecf45fd93f3999e616a6b80d784144d5d6f44e 25-Nov-2015 Nick Kralevich <nnk@google.com> AndroidManifest.xml: More protected broadcasts

Make the following broadcasts protected:

android.intent.action.PRE_BOOT_COMPLETED
android.intent.action.USER_INITIALIZE

Bug: 25022002
Change-Id: Ic36e29c51b930e4d7367688ab837c6a40d74ec23
/frameworks/base/core/res/AndroidManifest.xml
7f35036c95650ee5b66166ad4517f3cd352efdaa 20-Nov-2015 Fyodor Kupolov <fkupolov@google.com> Merge "Added a placeholder home activity for system user"
c40e244b4a5f224d749be62e8fd512fadb568a85 18-Nov-2015 Fyodor Kupolov <fkupolov@google.com> Added a placeholder home activity for system user

Standard launcher can be uninstalled for system user. A low priority
placeholder home activity is used to make sure the system can always
boot. By default the component is disabled for all users, and is only enabled
for the system user at boot time.

Bug: 25726710
Change-Id: I97eed02c9e2bbd69a737cc1d203110bed837b803
/frameworks/base/core/res/AndroidManifest.xml
bbadff8603ca6922a0ef89338bee5b59d6dcf641 06-Nov-2015 Jason Monk <jmonk@google.com> Add Quick Settings API

It is a little bit limited right now, but it contains
the lifecycle of a tile getting added/removed, and
listening/not listening and clicks.

SysUI side will need some cleanup later on.

Change-Id: I4db803c8a271f8bf44f2ef710517969a84a95cf0
/frameworks/base/core/res/AndroidManifest.xml
1746369a6bcd1a7219e94366b3774bfdfff08fc6 23-Sep-2015 keunyoung <keunyoung@google.com> allow locking UI mode and block launching car dock for automotive

- add config to lock UI mode change: When this is enabled,
request to change car mode will be ignored. Apps can check
the config using UiModeManager.isUiModeLocked()
- add config to lock day / night mode: When this is enabled,
apps cannot change day / night mode without having
MODIFY_DAY_NIGHT_MODE permission.
Apps can check the config using UiModeManager.isNightModeLocked()
- add config to disable car dock intent launch for home key
and mode change
- All new configs have default values which keeps the current behavior.
Car products should override the configs to get desirable behavior.

bug: 22700993
Change-Id: I351fc53163575d2f523c2d6e886befdb69a5a0c6
/frameworks/base/core/res/AndroidManifest.xml
f9fc6d6cc05595241bc7ced6d4cab97b45f9b901 09-Nov-2015 Jeff Sharkey <jsharkey@android.com> More file-based encryption work.

Add granular StorageManager APIs for key creation/destruction and
unlocking/locking. Start passing through an opaque token as part
of the unlock command, but leave it empty for now. We now have a
separate "prepare" method that sanity checks that user directories
are correctly setup.

Define a handful of system properties used for marking devices that
should be operating in FBE mode, and if they're emulating FBE. Wire
a command to "sm", but persisting will come later.

Start using new "encryptionAware" flag on apps previously marked with
coreApp flag, which were apps running in the legacy CryptKeeper
model. Small tweaks to handle non-encryptionAware voice interaction
services. Switch PackageManager to consult StorageManager about the
unlocked state of a user.

Bug: 22358539
Change-Id: Ic2865f9b81c10ea39369c441422f7427a3c3c3d6
/frameworks/base/core/res/AndroidManifest.xml
aad093b67574a6d28963d07befd67a2a45784074 02-Nov-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Allow verifier to grant permissions" into mnc-dr-dev am: cfa233eefb am: 22d7f4c2ed am: 6423c0a29b
am: bd4168540f

* commit 'bd4168540f009c71af1242e5b7866146c8724d6f':
Allow verifier to grant permissions
22d7f4c2eddef09e0ceb16aadff2860a184a68d8 02-Nov-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Allow verifier to grant permissions" into mnc-dr-dev
am: cfa233eefb

* commit 'cfa233eefb5b77c96a3239a5a51f381a7f0722c9':
Allow verifier to grant permissions
7bddf5aa06e11117c623a4a44eab88df80084607 30-Oct-2015 Svetoslav <svetoslavganov@google.com> Allow verifier to grant permissions

bug:25329324

Change-Id: I2ac01a983ad812df7725a0499a8d9b470a7ea481
/frameworks/base/core/res/AndroidManifest.xml
0529672a8cffd2abb749265ddeb703a179c34662 29-Oct-2015 John Reck <jreck@google.com> resolve merge conflicts of a1b8d77ca3 to master.

Change-Id: Ia78c6d31687542dfaba20b177e774333cfb1edb5
35151fbc8b028f6633f477fd36044032a03b2bff 29-Oct-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev
am: 2658cb002a

* commit '2658cb002abae9341c9a82bfeaed764ba5bf97c8':
Make SYSTEM_ALERT_WINDOW development permission
2658cb002abae9341c9a82bfeaed764ba5bf97c8 29-Oct-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev
01af6a42a6a008d4b208a92510537791b261168c 27-Oct-2015 Svetoslav <svetoslavganov@google.com> Make SYSTEM_ALERT_WINDOW development permission

bug:25329324

Change-Id: I0086464846bab9424764dd0d726692d96a0f1207
/frameworks/base/core/res/AndroidManifest.xml
b6d8f81b10ba85651d2309afc665b9e9fc1ab955 26-Oct-2015 Paul Jensen <pauljensen@google.com> Merge "Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN"
67fb3d7358f01c1bea429b680db54629d6ff4a19 22-Oct-2015 Lorenzo Colitti <lorenzo@google.com> Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev am: 809dcade99 am: bdc458048a am: bb8f652372
am: 8ecad265b6

* commit '8ecad265b6db57f78dd142e974057c91f69489ed':
Reinstate CHANGE_NETWORK_STATE as a normal permission.
bdc458048abee78a945a26cd13a71245e7d4a2e5 22-Oct-2015 Lorenzo Colitti <lorenzo@google.com> Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev
am: 809dcade99

* commit '809dcade9906001f6aa51a68aa783e20bb1d7c0d':
Reinstate CHANGE_NETWORK_STATE as a normal permission.
809dcade9906001f6aa51a68aa783e20bb1d7c0d 22-Oct-2015 Lorenzo Colitti <lorenzo@google.com> Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev
d54270506669e474b5b8d1703212c77780a04ae9 15-Oct-2015 Lorenzo Colitti <lorenzo@google.com> Reinstate CHANGE_NETWORK_STATE as a normal permission.

This is a partial revert of http://ag/738523 , but not a full
revert because M apps that have gone through the WRITE_SETTINGS
route to obtain permission to change network state should
continue to have permission to do so.

Specifically:

1. Change the protection level of CHANGE_NETWORK_STATE back from
"signature|preinstalled|appop|pre23" to "normal". This allows
apps that declare CHANGE_NETWORK_STATE in their manifest to
acquire it, even if they target the M SDK or above.
2. Change the ConnectivityManager permission checks so that they
first check CHANGE_NETWORK_STATE, and then ask Settings
if the app has the WRITE_SETTINGS runtime permission.
3. Slightly simplify the code in the Settings provider code that
deals specifically with the ability to change network state.
4. Make the ConnectivityService permissions checks use the
ConnectivityManager code to avoid code duplication.
5. Update the ConnectivityManager public Javadoc to list both
CHANGE_NETWORK_STATE and WRITE_SETTINGS.

Bug: 21588539
Bug: 23597341
Change-Id: Ic06a26517c95f9ad94183f6d126fd0de45de346e
/frameworks/base/core/res/AndroidManifest.xml
244f776855b2144a7fe16be09c67e5b189e8dcfd 21-Oct-2015 Michael Wright <michaelwr@google.com> resolve merge conflicts of f013c3f111 to master.

Change-Id: I2045187f8fa948a1733cb9a2cdc0a69ae97b5907
bab2b424453e556a2e7bb9470d70673793dd82df 20-Oct-2015 Michael Wright <michaelwr@google.com> resolve merge conflicts of 57a5cba606 to cw-e-dev.

Change-Id: Ib43f0cf0b285c9799239658859af735279f87fff
627bc36eb7827c5a72f5a8ecb085028fb485f72f 15-Oct-2015 Paul Jensen <pauljensen@google.com> Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN

I centralized all the provisioning APN logic in Telephony back in
89e0f09 so this intent is now unused.

Bug:24451710
Change-Id: I401ac3e46442c8921545c88fee228873261ebd2b
/frameworks/base/core/res/AndroidManifest.xml
9209c9cd9a6f779d0d9d86f9b2e368df564fa6bb 03-Sep-2015 Michael Wright <michaelwr@google.com> Add SystemUI component to watch for keyboard attachment.

Add a new SystemUI component to watch for keyboard attachment /
detachment. If the config specifies the name of a keyboard that is
packaged with the device, then SystemUI will ask the user if they
would like to enable BT (if disabled) and then attempt to pair to the
device.

Bug: 22876536
Change-Id: I786db35524d49706d5e61d8b8bc71194d50113f3
/frameworks/base/core/res/AndroidManifest.xml
41da2f777f3195a857d25834274a9e4850102b6c 28-Sep-2015 Julia Reynolds <juliacr@google.com> Merge "Allow signature apps to modify notification policies."
6ee2617832548bdbff7cc27a6b8b852516625eb1 28-Sep-2015 Julia Reynolds <juliacr@google.com> Allow signature apps to modify notification policies.

Bug: 22977552
Change-Id: Ib2bc3a55a904011218bb3adb19998cc4a0b7e709
/frameworks/base/core/res/AndroidManifest.xml
7581121ba5736b1626109445c90cc1b65bf90da9 28-Sep-2015 Julia Reynolds <juliacr@google.com> Merge "Revert "Allow signature apps to modify notification policies.""
3a0ee8f9639bd3995bc50e7ecc666f3ca0350985 28-Sep-2015 Julia Reynolds <juliacr@google.com> Revert "Allow signature apps to modify notification policies."

This reverts commit 39a8c353a8f723e5e67bc846f8fa96d580c4abbb.

Change-Id: I9a9a5fcc76202f5d2b3b175e5d5b9361604285d8
/frameworks/base/core/res/AndroidManifest.xml
b487ffeef7e9e6cc2fae08c2ef7ac078cf626bd3 28-Sep-2015 Julia Reynolds <juliacr@google.com> Merge "Allow signature apps to modify notification policies."
39a8c353a8f723e5e67bc846f8fa96d580c4abbb 28-Sep-2015 Julia Reynolds <juliacr@google.com> Allow signature apps to modify notification policies.

Bug: 22977552
Change-Id: I7bfd2fe7bcb2e14b9eb7281acbb8a35dbc2ec93e
/frameworks/base/core/res/AndroidManifest.xml
b4a6d9847b7677611efa6fc64c9d78d92b8229d7 28-Sep-2015 Billy Lau <billylau@google.com> am 337c069a: am 81451c1c: am cb4bafb4: am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev

* commit '337c069ac897db69f239c1927ddaf9225a7a6fef':
Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
cb4bafb4c97dc5e73b055ae1c0e4a548068062cd 28-Sep-2015 Billy Lau <billylau@google.com> am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev

* commit '86e153d5f0614c9f3da137fd0b815a398598928b':
Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
86e153d5f0614c9f3da137fd0b815a398598928b 28-Sep-2015 Billy Lau <billylau@google.com> am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev

* commit 'f360bbca969f60ee968240d22bc0b1f1e5e17218':
Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
535570a7ce8fac764a45a603856d664227dba8c1 27-Sep-2015 Bryce Lee <brycelee@google.com> am 979a22ea: am 6ad696c3: am f0740e0a: Merge "Add ThermalObserver system service to capture thermal state uevents." into cw-e-dev

* commit '979a22eaf9c62637c02ebd6f92ef6ea2888aa5be':
Add ThermalObserver system service to capture thermal state uevents.
bc58f59da6226c6f1d240c95d566186f679fc310 26-Sep-2015 Bryce Lee <brycelee@google.com> Add ThermalObserver system service to capture thermal state uevents.

Bug: 21445745
Change-Id: I980d60b66ca51942a1fd62502d6cf1f09208fc3a
/frameworks/base/core/res/AndroidManifest.xml
a62e8a8d398f00332fa77bfe6be07cb6f5bf57ab 21-Sep-2015 Michael Wright <michaelwr@google.com> Make android.hardware.usb.action.USB_ACCESSORY_DETACHED...

a protected broadcast.

The broadcast "android.hardware.usb.action.USB_ACCESSORY_ATTACHED"
was accidentally included twice, changed the extra copy to
"android.hardware.usb.action.USB_ACCESSORY_DETACHED".

Bug: 24188595
Change-Id: I8863c336f70796b2a15633595648b594864e84e2
/frameworks/base/core/res/AndroidManifest.xml
c0f2bc0f0e11da0fd59b146425764a162c932410 19-Sep-2015 Justin Harrison <astyrrian@google.com> am 46db0f22: am 08b00423: am 1f463957: am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev

* commit '46db0f2215ad6e969418d1fedd1578445b46588f':
Add support for setting color transforms
1f46395702f609d90909df39ab990844c0731952 19-Sep-2015 Justin Harrison <astyrrian@google.com> am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev

* commit '91f2123b2a6d534372ab9b7c8e6ac0c62cf33ae6':
Add support for setting color transforms
58e829f71d2c525309e5bb5a1c02dc64397df221 15-Sep-2015 Michael Wright <michaelwr@google.com> Add support for setting color transforms

Bug: 24038268
Change-Id: I05275c906e02eb9e67331f6f909166eb08ad5536
/frameworks/base/core/res/AndroidManifest.xml
369b7ca4fbe6a635344f43845a82da25ececa0e4 18-Sep-2015 Billy Lau <billylau@google.com> Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE

Previously, when CHANGE_NETWORK_STATE's protection level was raised to
signature from normal, the documentation was not changed. This CL
addresses the documentation to reflect the correct protection level.

Change-Id: I0a4d2fcef5f30c58b38250865543e72b5eb1ab06
/frameworks/base/core/res/AndroidManifest.xml
51c61ee23a55ccc75e0ddb3582720fc626607e42 09-Sep-2015 Lorenzo Colitti <lorenzo@google.com> am fd183706: am 22262f31: am 0bc35668: am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev

* commit 'fd18370675f8794807747a18276dd7385e25f06e':
Require the new PACKET_KEEPALIVE_OFFLOAD permission.
Add an error code for generic hardware error.
Fix bugs and crashes in PacketKeepalive API.
Add tests for the PacketKeepalive API.
Add a PACKET_KEEPALIVE_OFFLOAD permission.
Use a CountDownLatch instead of sleep() in NetworkFactory tests.
Get rid of shortSleep() in ConnectivityServiceTest.
Make ConnectivityServiceTest a bit more readable.
0bc356687e022fa1ae611c4ebeb0e0622810d7e4 09-Sep-2015 Lorenzo Colitti <lorenzo@google.com> am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev

* commit '017223acda5bfe16cb87d0a33d72dd28d2fccd3b':
Require the new PACKET_KEEPALIVE_OFFLOAD permission.
Add an error code for generic hardware error.
Fix bugs and crashes in PacketKeepalive API.
Add tests for the PacketKeepalive API.
Add a PACKET_KEEPALIVE_OFFLOAD permission.
Use a CountDownLatch instead of sleep() in NetworkFactory tests.
Get rid of shortSleep() in ConnectivityServiceTest.
Make ConnectivityServiceTest a bit more readable.
7b70036abc4564b04251a979fe406f1d1d55d21b 08-Sep-2015 Lorenzo Colitti <lorenzo@google.com> Add a PACKET_KEEPALIVE_OFFLOAD permission.

Bug: 23884210
Change-Id: I0f9207ac9b9c07c676f64f2748905e523e891501
/frameworks/base/core/res/AndroidManifest.xml
56dafdb5ae5f1618e3583c2835759108e8c0d99f 03-Sep-2015 Michael Wright <michaelwr@google.com> am 7f7ffa37: am 87e4c951: am 59c1a0e1: am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev

* commit '7f7ffa3722ef90a7bf5611221c4a4c9d06823a38':
Add TabletModeChangedListener for SystemUI.
59c1a0e1cb6cad46e30821e25f99c1ecce1227f0 03-Sep-2015 Michael Wright <michaelwr@google.com> am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev

* commit '8ae90587a510f72a176119b1f23add8bc36285b9':
Add TabletModeChangedListener for SystemUI.
8ae90587a510f72a176119b1f23add8bc36285b9 03-Sep-2015 Michael Wright <michaelwr@google.com> Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev
8ef94501f0adfdbcc18b6ed0e32673b3abf69a14 26-Aug-2015 Julia Reynolds <juliacr@google.com> Merge "Allow third party condition providers."
4f5de340c9c7b12d7d67ca53bac863976b36fd32 25-Aug-2015 Fyodor Kupolov <fkupolov@google.com> Renamed primaryUserOnly to systemUserOnly

In the split mode, broadcast receivers and activities marked as
systemUserOnly will be running as system. This is a non-functional change for
non-split system user mode.

Bug: 22958572
Change-Id: I0f7d4f4a81275bc326bf630a776c695e8b5291a6
/frameworks/base/core/res/AndroidManifest.xml
b0a773f6b338f8ec35d9faaa3b566f482bdc2f92 25-Aug-2015 Julia Reynolds <juliacr@google.com> Allow third party condition providers.

Bug: 22977552
Change-Id: I3d8689f52daa9376496e14997a6dd7862fb3ade6
/frameworks/base/core/res/AndroidManifest.xml
39e5e947447bc611205404ae6a4690656f1aa0f9 19-Aug-2015 Michael Wright <michaelwr@google.com> Add TabletModeChangedListener for SystemUI.

Bug: 23256614
Change-Id: I6e5d636c24a84846cfad84da800911a469689dda
/frameworks/base/core/res/AndroidManifest.xml
dec9a216d24dabe168b60e460b6ab6a6026be0c0 21-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> am f18cbd76: am c9dec164: am e96b80f3: am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev

* commit 'f18cbd760142e627ab6c9672e4aca3a29d05d9ee':
Add missing removed permissions to the platform manifest
e96b80f3deb7a49225112d497dcf75cc4211b092 21-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev

* commit '446c00a2919da5b4ea0bdf08f72ac4f95125ea45':
Add missing removed permissions to the platform manifest
446c00a2919da5b4ea0bdf08f72ac4f95125ea45 21-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev

* commit 'cb59747de7222bc7310162c4174f7b460c34adef':
Add missing removed permissions to the platform manifest
f1418ae65be77a0d0fac1b616cc9901f9bceffc7 20-Aug-2015 Svet Ganov <svetoslavganov@google.com> Add missing removed permissions to the platform manifest

We need to keep in the manifest as normal hidden permissions
all removed dangerous ones to ensure backwards compatibility
as apps may be gating operations based on whether they have
a removed permission.

bug:23377184

Change-Id: I105bd646c4594d85c501f53a10ea393ee50046bc
/frameworks/base/core/res/AndroidManifest.xml
741abfc12074623d24297ebb67d98cb2d9126add 11-Aug-2015 Nicolas Prevot <nprevot@google.com> Fix cross-profile intent filters with system-user split.

Don't assume that the parent is always the user owner.

BUG:23105562
Change-Id: Ia98ed608e2b6d1d82d95a73110134d85274c6abf
/frameworks/base/core/res/AndroidManifest.xml
4ea5152bd8b7f046562901b5dfc2ca917dbd987b 19-Aug-2015 Jim Miller <jaggies@google.com> am 849b9e58: am ce6fb7bb: am 7ef77271: am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev

* commit '849b9e58d6775a393f7d86a6305b658c6af9d16f':
Reset fingerprint lockout timer when strong auth is used.
7ef772713fac5d7b69874f2b972cdec7a60f074b 19-Aug-2015 Jim Miller <jaggies@google.com> am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev

* commit 'bea9d7b94cfa16da8f257ed705e218b017d459a7':
Reset fingerprint lockout timer when strong auth is used.
e0507bbbf95ae6d958c900f32122baf078d47d71 13-Aug-2015 Jim Miller <jaggies@google.com> Reset fingerprint lockout timer when strong auth is used.

Fixes bug 22565462

Change-Id: I4842877839845e7fe103396d8ca8104928568c04
/frameworks/base/core/res/AndroidManifest.xml
9600b7fb406714ae26bce5e50e4ecd5e0c924f90 17-Aug-2015 Bryce Lee <brycelee@google.com> am de243eb2: am 55d39ecb: am d74a66bd: Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev

* commit 'de243eb290c194b2204a27c0276bae5cd024797d':
Introduce permission for updating the cell broadcast content provider.
d74a66bd97ed52fc985e9fa145072a9fc4e0a3e3 17-Aug-2015 Bryce Lee <brycelee@google.com> Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev
143ebdb94e13f7a9fee2c9f3801bda1df17844c1 11-Aug-2015 Zach Johnson <zachoverflow@google.com> DO NOT MERGE Allow a custom component to handle network policy notifications

Broadcasts information about network policy notifications
to a custom component, if specified, so it can handle them.

Also exposes an API to snooze warning notifications.

Change-Id: Ic89478fa437861e2d4b6a9443858bcaf12122fba
/frameworks/base/core/res/AndroidManifest.xml
60d18aba1d0ad32147367ab30313ca5b9f0645cb 11-Aug-2015 Dianne Hackborn <hackbod@google.com> am b44cdfdd: am afacdbe1: am 09e77852: am 5cf89a01: am b2b02092: Merge "Fix issue #23037899: Support for Battery Optimization permission + Dialog" into mnc-dev

* commit 'b44cdfdd10ffa861492d044a058cfbaa167d71db':
Fix issue #23037899: Support for Battery Optimization permission + Dialog
c7b57b1e65b487defad4967cf42cf076b499cbee 10-Aug-2015 Dianne Hackborn <hackbod@google.com> Fix issue #23037899: Support for Battery Optimization permission + Dialog

New permission, new Intent action.

Change-Id: I1d9ba55be8f72074e29d33ad7a0a12a820bbac39
/frameworks/base/core/res/AndroidManifest.xml
64b9b9ad9e5f10d7a4d31c5e393432b87afbd742 08-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> am 618e065c: am 546a3449: am e12a685c: am 02d6c013: am 90b030ba: Merge "Do not show removed permissions in the UI - framework" into mnc-dev

* commit '618e065cc14b9069954e462fc25cdc934ee3300f':
Do not show removed permissions in the UI - framework
3e0be7440bf40f5d81581077bc4f5f47e57b88b7 08-Aug-2015 Svet Ganov <svetoslavganov@google.com> Do not show removed permissions in the UI - framework

bug:23043018

Change-Id: Ia5cf49f299eda627d9fde2b34498812afcb3a6d5
/frameworks/base/core/res/AndroidManifest.xml
e37acf3256c107da2a9c4892225aa7238d148669 08-Aug-2015 Billy Lau <billylau@google.com> am 4a10b66d: am 99271a39: am 9751afcf: am 26ab6ed3: am 70f998e5: Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev

* commit '4a10b66df364092cdc42a3cfaa990c877b389624':
Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS
70f998e57df2b3ed79331669a93a0ba314f25e7d 08-Aug-2015 Billy Lau <billylau@google.com> Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev
a7238a397d5c3431eeb19b5b77e8c7c2bf0e608f 01-Aug-2015 Billy Lau <billylau@google.com> Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS

Merge the CHANGE_NETWORK_STATE permission with WRITE_SETTINGS.

AndroidManifest.xml:
Raised the protection level of CHANGE_NETWORK_STATE permission from
normal to signature|appops and pre23|preinstall for compatibility

provider/Settings:
Wrote new helper methods to check if app is allowed to change network
state.

ConnectivityManager.java & ConnectivityService.java:
Replace enforcement checks for CHANGE_NETWORK_STATE with
checkAndNoteChangeNetworkStateOperations instead.

Change-Id: If8c2dd3c76a5324ca43f1d90fa17973216c2bcc5
/frameworks/base/core/res/AndroidManifest.xml
598b03d1008fb416a597ae4b2e037c4492bf696d 07-Aug-2015 Svetoslav Ganov <svetoslavganov@google.com> am 9bf912c1: am 5ed03384: am 1f514608: am 5a624aad: am 38d30dc5: Merge "Immediately kill a shared user process on a permission revocation." into mnc-dev

* commit '9bf912c1cf6941402dc0f8ef449f34787796875e':
Immediately kill a shared user process on a permission revocation.
aa41add33b8d7d318387cc74c34e3d347d245211 07-Aug-2015 Svetoslav <svetoslavganov@google.com> Immediately kill a shared user process on a permission revocation.

1. When a permission is revoked we kill the app immediately but do
not do an immediate kill for shared uid processes. This fixes it.

2. Remove system APIs that are used only by the package installer.

bug:22984670

Change-Id: I3d4ae52ea8679f894aa7c5972941263903479183
/frameworks/base/core/res/AndroidManifest.xml
b66cec227739f328b7004a3bb71d4a97b98022af 31-Jul-2015 Fyodor Kupolov <fkupolov@google.com> am 3c01ac0b: am fc0b2e98: am df961732: am f9fdb08c: am 4988378c: Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev

* commit '3c01ac0b199d787f6a81b01ab3b6296421ea40a0':
Introduced android.permission.PEERS_MAC_ADDRESS permission
4988378cd0f1bb6cdd83f797d10fd45105672296 30-Jul-2015 Fyodor Kupolov <fkupolov@google.com> Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev
523d865d9f2853f26089cbbd2bd0dbb75804050d 29-Jul-2015 Nicolas Prévot <nprevot@google.com> am 327046d0: am e1d51934: am 95c26295: am 2b0cd2c7: am 64ac302f: Merge "Send a public broadcast when the device owner is set." into mnc-dev

* commit '327046d0e75c8917dc18cbc23b4aa72b1ba61034':
Send a public broadcast when the device owner is set.
9069fab8bca535a33501a75bc8f61b23dcdcaffd 01-May-2015 Amit Mahajan <amitmahajan@google.com> Changes to update APN db via Gservices and ConfigUpdater.

- Adding settings that are updated by Gservices.
- Changes to handle UPDATE_APN_DB intent.
- UPDATE_APN_DB intent triggers update of apns-conf.xml and carriers db.

Change-Id: I65a63f3015da1b827b974d17e48bee4c747544ff
/frameworks/base/core/res/AndroidManifest.xml
00799008832e11f06f9ddc0bf721799edee99f28 27-Jul-2015 Nicolas Prevot <nprevot@google.com> Send a public broadcast when the device owner is set.

Make it a protected broadcast.

BUG: 22623518
Change-Id: Ia36e8f0b80a6301d7d8e0461476842c78762b5e8
/frameworks/base/core/res/AndroidManifest.xml
136a2e7fc94098f762cd3d9bd092b4c4d5bf4c70 27-Jul-2015 Fyodor Kupolov <fkupolov@google.com> Introduced android.permission.PEERS_MAC_ADDRESS permission

Introduced signature-level permission android.permission.PEERS_MAC_ADDRESS.
It allows access to MAC addresses of WiFi and Bluetooth peer devices, without
having location permission or even if location is turned off.

Bug: 21852542
Bug: 22728628
Change-Id: If0ff80636e57b38dbedc8fcf5f520a3a6d6f734e
/frameworks/base/core/res/AndroidManifest.xml
61fe8e010520d92362167556cff48c5052a0254f 24-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> am 1298b1a0: am 1ad413c0: am af27474f: am cc3c6dbf: am 3d6f6060: Merge "Add a privileged permission to get user accounts" into mnc-dev

* commit '1298b1a0a25a19559c81293ac87b31a4ffcbc973':
Add a privileged permission to get user accounts
7b97b2332927d8a2aa1de2e2759123d576c9eec3 24-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> am 6ae3ec45: am d14cbeab: am 8276a97f: am 010b53c0: am bdb7d936: Merge "Update permission icons to final versions - framework" into mnc-dev

* commit '6ae3ec45352b5ef54366150f68d1c44994f52657':
Update permission icons to final versions - framework
3d6f606031da248a3b1fd6f0f569ac33a26c0b5e 22-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Add a privileged permission to get user accounts" into mnc-dev
2062eeff0156bc4e119398f1736e699d90ad8345 22-Jul-2015 Svet Ganov <svetoslavganov@google.com> Add a privileged permission to get user accounts

bug:22602794

Change-Id: I6e5429f0eb5f2cb274d4740755070e588735e179
/frameworks/base/core/res/AndroidManifest.xml
39c8a08b5e673dbf1416543840854faae39e59d9 21-Jul-2015 Svet Ganov <svetoslavganov@google.com> Update permission icons to final versions - framework

bug:22383613

Change-Id: I3f524fd0538a1b843b0394fa766f032835d1ecaa
/frameworks/base/core/res/AndroidManifest.xml
0269352160a8f1ed02189ba40481cb899e1616cf 17-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> am 6b2d1be6: am f4d5fa93: am 55596f85: am 098a88e6: am 2a500e32: Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev

* commit '6b2d1be6628fa80a4e2c9f8c893606dc1030cf7f':
Revert "Temporary lower GET_ACCOUNTS protection level"
4f4734ff0e8dfab7b5b04b94a2a6c91769b66f38 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> am 62237c4e: am 60584816: am e329ce0c: am 7a8f2006: am ecb88792: Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev

* commit '62237c4ea09ab52db7176c838ca713ae3d87e933':
Temporary lower GET_ACCOUNTS protection level
2a500e32169b53679db83077e57f3c9cd02cfd36 17-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev
2c20277dd51e8aeeb10b800a67d97273dee0c5f2 17-Jul-2015 Svetoslav Ganov <svetoslavganov@google.com> Revert "Temporary lower GET_ACCOUNTS protection level"

This reverts commit 6e20ac343c22ab27e5ac7471bc1219df6bf11282.

Change-Id: I96b21bad9406abffa95c90abde509dc8dcf3eff5
/frameworks/base/core/res/AndroidManifest.xml
ecb887925a3ff3d54ecb6593932d4f866a6fe9e9 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev
6e20ac343c22ab27e5ac7471bc1219df6bf11282 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Temporary lower GET_ACCOUNTS protection level

bug:22550851

Change-Id: If43f10639220f9a69d304b08def6d869658c2960
/frameworks/base/core/res/AndroidManifest.xml
28e7313992ba6efd94ddc16b45278863f84d7fcb 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> am 71d12704: am 475858c3: am b295963b: am c00e49b6: am d4b566bf: Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev

* commit '71d12704f64eeace695a6b8e0cd8f36007b96270':
Add APIs for verifier to grant at install and revoke permissions
d4b566bf56333de708908ce4accb5fb067be64f0 17-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev
f82631ff35e22f43ed7e79e9fbc75ca241aae70a 30-Jun-2015 Bryce Lee <brycelee@google.com> Introduce permission for updating the cell broadcast content provider.

Change-Id: I64a1001b6aaf7c0032cde01216abb240c54520f7
/frameworks/base/core/res/AndroidManifest.xml
7121e18595d4c559044e26bfe6035406a862f466 14-Jul-2015 Svet Ganov <svetoslavganov@google.com> Add APIs for verifier to grant at install and revoke permissions

bug:22231699

Change-Id: Ie0c758bf73699f50bf99ff5aa0bf98dcc9004e37
/frameworks/base/core/res/AndroidManifest.xml
4085a74b4c6b46c9a08a20b5d63d728713767db4 16-Jul-2015 Jeff Brown <jeffbrown@google.com> am 209c8ced: am 6e4997db: am 8bdd92d4: am 0cb1cfdc: am 76c4c666: Add USB port manager.

* commit '209c8cedab87359564c032a3e56b3acd452e1ac9':
Add USB port manager.
76c4c6668a1486bc003ab0c585bb1f41d16e27a7 07-Jul-2015 Jeff Brown <jeffbrown@google.com> Add USB port manager.

Add some new internal APIs to enumerate USB Type C ports, query their
status, determine whether they support changing power or data roles,
and doing so. The API also adds a new ACTION_USB_PORT_CHANGED broadcast
for port state changes.

The implementation includes a mechanism for simulating the behavior
of the USB stack. See 'adb shell dumpsys usb -h' for details.

Note that the underlying kernel driver interface is still subject
to change but its behavior has been encapsulated as much as possible.

Bug: 21615151
Change-Id: I0c853ae179248a4550b3e60d02a7a7e65e4546b2
/frameworks/base/core/res/AndroidManifest.xml
db4f4b226ce1bad7d4d900d1396c598d8bf0ae92 14-Jul-2015 Svetoslav <svetoslavganov@google.com> am 5edc6ffd: am a6fc7f96: am 779e5e0e: am d72fc63a: am 46d1864c: Merge "Make get_accounts a runtime permissions again" into mnc-dev

* commit '5edc6ffda765c51bbd97bd7ae6f1bd2082309dd2':
Make get_accounts a runtime permissions again
46d1864ceee7229cd7fe7bac80226c930539861d 14-Jul-2015 Svetoslav <svetoslavganov@google.com> Merge "Make get_accounts a runtime permissions again" into mnc-dev
f07602bea9f964d03a009445ffe3a6172fa33432 14-Jul-2015 Jim Miller <jaggies@google.com> am c1aaa6ae: am 5ab70110: am a9845680: am a95d9f0b: am 16c1764c: Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev

* commit 'c1aaa6ae49d6c1820472a2061ec8f6df08ffea50':
Change MANAGE_FINGERPRINT permission to system|signature
949d16ebd5f4902db8fe79970479fcb1bee4a524 14-Jul-2015 Rubin Xu <rubinxu@google.com> am 5571a986: am afe3c2b3: am 474f987d: am f5d6d432: am cf9aebf1: Merge "Remove ExternalStorageFormatter" into mnc-dev

* commit '5571a986f0a2939248aefc584248d08732c761e4':
Remove ExternalStorageFormatter
4c8d3126068334826e2a6f921799e2b86dba8916 14-Jul-2015 Billy Lau <billylau@google.com> am e385d26f: am cb2a7a2c: am 0be2efb2: am f028ba3d: am 96d00ab3: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev

* commit 'e385d26fef2f62988c082ee8066f5d6715aa16c9':
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
4079c7ec6adb3fb4c6d1efd829c7a68f556c476d 14-Jul-2015 Svetoslav <svetoslavganov@google.com> Make get_accounts a runtime permissions again

The permission was lowered in protection level to normal
allowing apps to assess migration strategy. This change
makes the permission dangerous again allowing apps to
implement this strategy.

bug:22385299

Change-Id: I3694c06236a33b97f63761b48745b1df654a2bf4
/frameworks/base/core/res/AndroidManifest.xml
16c1764cf552432d304eaefd912d5aebe3192449 13-Jul-2015 Jim Miller <jaggies@google.com> Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev
cf9aebf138a3ec07277b1e5564751d2396a155c0 13-Jul-2015 Rubin Xu <rubinxu@google.com> Merge "Remove ExternalStorageFormatter" into mnc-dev
22b3f4cb15207239e203d5ec8b72ec6bc90fef35 08-Jul-2015 Billy Lau <billylau@google.com> Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission

Raised the protection level of WRITE_SETTINGS permission to appop and also
allowed backwards compatibility with pre23 flag. Also made sure that this
permission is not added as RuntimePermission in DefaultPermissionGrantPolicy as
that breaks a lot of gmscore stuff.

Introduced new action to manage write system settings as a new API and
renamed the string that describes the managing of overlay permission.

Change-Id: Ifd25a6ddc06de68ee37015cb9fb23452e4ef10f4
/frameworks/base/core/res/AndroidManifest.xml
9da440786d8001dbfddfcfc1a6b535f522ae06be 11-Jul-2015 Jim Miller <jaggies@google.com> Change MANAGE_FINGERPRINT permission to system|signature

This allows fingerprint enrollment to be done from
system-installed apps, such as Setup Wizard.

Fixes bug 21695577

Change-Id: I990912dcf229aa03f6350f96a09ff4588b20ca48
/frameworks/base/core/res/AndroidManifest.xml
cb746a860cc6830a1d7d1762a57a871b100ded77 09-Jul-2015 Rubin Xu <rubinxu@google.com> Remove ExternalStorageFormatter

Bug: 9433509
Change-Id: I815770e0e0314fc7012ebc213f2167a13d6f37d1
/frameworks/base/core/res/AndroidManifest.xml
8bc65585564b034af38031e52f50cb743d2dd953 08-Jul-2015 Etan Cohen <etancohen@google.com> am a8c58435: am e62c69ee: am 7fc77e60: am d453d7e4: am 3e639057: Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev

* commit 'a8c5843591ab3f7cc1f62c5b1396ea38e506c140':
Add ACCESS_IMS_CALL_SERVICE hidden permission.
3e639057b8d9c4287bc5e92ce29c122e805bbe17 08-Jul-2015 Etan Cohen <etancohen@google.com> Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev
ee94484303ebddbb5eb7cc7efa347240ad641bc7 08-Jul-2015 Dianne Hackborn <hackbod@google.com> am 7b3add61: am f368f6b9: am 6ee8a509: am c55c4a28: am b14dc048: Merge "Add new "preinstalled" permission flag." into mnc-dev

* commit '7b3add61c9e47b708725147dffc23d396db37add':
Add new "preinstalled" permission flag.
4e5dac3d6ef6f28aecb116b8dfd92ff31d49c926 08-Jul-2015 Svetoslav <svetoslavganov@google.com> am 3fd5ebfd: am 7cc8de60: am 0ce19f8e: am 240f8e5f: am 3e07ee07: Merge "Grant installer and verifier install permissions robustly" into mnc-dev

* commit '3fd5ebfd778e540276fb5205a8ba3185e620647d':
Grant installer and verifier install permissions robustly
a90c8def2c6762bc6e5396b78c43e65e4b05079d 08-Jul-2015 Dianne Hackborn <hackbod@google.com> Add new "preinstalled" permission flag.

This allows you to specify that a permission can be granted to
any pre-installed system app (not just privileged ones).

And as long as I am doing this, clean up the old "system" permission
flag, renaming it to "privileged" which is what it really is today,
deprecating the old names. And switch the platform's permission
declarations to use the new name.

Change-Id: Iabf484746af232144786851ec7fe90e3de9dddb2
/frameworks/base/core/res/AndroidManifest.xml
3e7d977ff7c743713f0ad6336a039d7760ba47d1 07-Jul-2015 Svetoslav <svetoslavganov@google.com> Grant installer and verifier install permissions robustly

bug:22248271

Change-Id: I3a47ae9a112ba7d88b421fcb5f9651d1168ba7a5
/frameworks/base/core/res/AndroidManifest.xml
ecb7af7d10e10a3db3435057adcbfcf726af4aa5 07-Jul-2015 Ian Pedowitz <ijpedowitz@google.com> am 0a5e18bf: am a3599c78: am 8ea98a8a: am 13c2a4f5: am 937edac8: Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission"

* commit '0a5e18bfe23f4b256bbda995a1f3e383fa979ee3':
Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission"
bbf40aeab3445dc81e37b1e47f25c8e47ae035d8 01-Jul-2015 Etan Cohen <etancohen@google.com> Add ACCESS_IMS_CALL_SERVICE hidden permission.

Bug: 17361897
Change-Id: I2b3ef57c647204d981ada9c8bd4f92fbbd3fc748
/frameworks/base/core/res/AndroidManifest.xml
937edac8e8583023019b625dd426ebf65169e30d 07-Jul-2015 Ian Pedowitz <ijpedowitz@google.com> Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission"

This reverts commit d6b404c72da7e2475508c7d5948494b2e9b1a262.

This CL seems to have broken the build, causing GMSCore to continuously
crash.

Bug: 22313634
Bug: 22312938
Bug: 22314605
Bug: 22308392
Bug: 22307889
/frameworks/base/core/res/AndroidManifest.xml
bfe288690a53560f500ada91c13acfc6fd78ccde 07-Jul-2015 Billy Lau <billylau@google.com> am 4ce9ebea: am bb1a1e5f: am e2835f9f: am 212c006e: am c81ecb6d: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev

* commit '4ce9ebea91be2456f5958b86e1c7e36b800e8dde':
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
e35360d806d0858229ec8dde4929da0bdb93e7d3 07-Jul-2015 Jeff Sharkey <jsharkey@android.com> am 67804838: am ccde254c: am 0cae3e9e: am 7dfe0f83: am 7fd3c296: Merge "Permission to view shared storage for all users." into mnc-dev

* commit '67804838150fc85efb1bd27cc68422197976fe3f':
Permission to view shared storage for all users.
c81ecb6d2c6badb5ddbf19f7c90e350cf24322ee 07-Jul-2015 Billy Lau <billylau@google.com> Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev
d6b404c72da7e2475508c7d5948494b2e9b1a262 07-Jul-2015 Billy Lau <billylau@google.com> Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission

Raised the protection level of WRITE_SETTINGS permission to appop and also
allowed backwards compatibility with pre23 flag.

Introduced new action to manage write system settings as a new API and
renamed the string that describes the managing of overlay permission.

Change-Id: I939a95b9a8b1ae75bf67aa6d8190c92a8d2001d3
/frameworks/base/core/res/AndroidManifest.xml
32e80d7588720bdc9f8a3e961ac4566d7c80b2b9 06-Jul-2015 Jeff Sharkey <jsharkey@android.com> Permission to view shared storage for all users.

Typical apps are restricted so they can only view shared storage
belonging to the user they're running as. However, a handful of
system components need access to shared storage across all users,
such as DefaultContainerService and SystemUI.

Since WRITE_MEDIA_STORAGE already offers this functionality by
bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID
which is no longer handed out to third-party apps. Then we change
the FUSE daemon to allow the "sdcard_rw" GID to see shared storage
of all users.

Bug: 19995822
Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
/frameworks/base/core/res/AndroidManifest.xml
7e07288c7720001542182a4a70a5395015bcff1c 04-Jul-2015 Dianne Hackborn <hackbod@google.com> am 0783b9a4: am ee987ce4: am 76664d9d: Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev

* commit '0783b9a47ae682cc85a14284e79643b5087b8c9f':
Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW...
fab8c63aa005af30fcb610d4f99c4ab3f7ac4876 03-Jul-2015 Svet Ganov <svetoslavganov@google.com> am 5243632f: am 10f87f47: am 22233b51: Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev

* commit '5243632f918169bd58e388db988454a16983e490':
Remove the empty accounts group and not needed storage resources.
76664d9dcfbbe04c50a00ea1e268e80b9a9f6087 02-Jul-2015 Dianne Hackborn <hackbod@google.com> Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev
de15edaa9bf486a4050bb067317d313fd807bb10 01-Jul-2015 Dianne Hackborn <hackbod@google.com> Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW...

...to an explicit toggle to enable in Settings

Add a new permission flag, saying the permission can be automatically
granted to pre-api-23 apps. Apply this to SYSTEM_ALERT_WINDOW.

Change-Id: I24a0ceabe7e9f5e458a864d30eda2696ad14a699
/frameworks/base/core/res/AndroidManifest.xml
22233b51c3c3e678571dbe5e6d1035b7e1440408 01-Jul-2015 Svet Ganov <svetoslavganov@google.com> Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev
28aad8efe60d7d7c59d748ef50d8fe0118b9c323 30-Jun-2015 Billy Lau <billylau@google.com> am 67dfa491: am e4c3fd72: am f62f4c94: Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev

* commit '67dfa49194cf91241ff791730bacb71e07530ef3':
Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings.
f62f4c94a36f5c2f7ad3c70316dc585ea3fd721a 30-Jun-2015 Billy Lau <billylau@google.com> Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev
ca2c590ba3d6de067c6b5cd820e6ee9319cbfeb7 29-Jun-2015 Svet Ganov <svetoslavganov@google.com> Remove the empty accounts group and not needed storage resources.

bug:22044480

Change-Id: I76297f5540614301893871b3b41219002076b920
/frameworks/base/core/res/AndroidManifest.xml
2ce64b872d464209efefb6c74584d6ab1088d169 26-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 0678733a: am a9f79160: am 6cbf7928: Merge "Revert get accounts permission to normal for now" into mnc-dev

* commit '0678733a525c6a785feb68a9a2004ff8c494c911':
Revert get accounts permission to normal for now
a508bf8ba227c90e15fd7e6260264be4ccd1dcbd 26-Jun-2015 Svet Ganov <svetoslavganov@google.com> Revert get accounts permission to normal for now

Change-Id: I51efe557b69a50d85dc53ba7a1622b7bafc301e6
/frameworks/base/core/res/AndroidManifest.xml
cbe540f94691b595ca2eaede2871d885c38a845c 25-Jun-2015 Billy Lau <billylau@google.com> Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle
to be manually enabled in Settings.

Raised the protection level of SYSTEM_ALERT_WINDOW from dangerous to
system|signature|appop. Added a new API in Settings for developers to invoke
the main configuration setting. Also added a new metrics in MetricsLogger.
Finally, also made changes to PhoneWindowManager to check the permission to draw
overlay properly.

Change-Id: I4a073e6f038b8b8d2fa5bd6ad60abda496be9701
/frameworks/base/core/res/AndroidManifest.xml
e072d842ec16eb82d933ef04d01f2d9005892293 26-Jun-2015 Svetoslav <svetoslavganov@google.com> am e7fe26c9: am f513006c: am e171899a: Merge "Add JavaDoc for permission protection level" into mnc-dev

* commit 'e7fe26c94b46b6e8b4860ceaba46b95584e38914':
Add JavaDoc for permission protection level
71b6ca6d4325d7851030486bb4a080ecbc18c9a5 26-Jun-2015 Svetoslav <svetoslavganov@google.com> Add JavaDoc for permission protection level

1. Add the permission protection level in the java doc

2. Make some system permissions that are not mean to be
used by third-parties system API.

bug:21402257

Change-Id: Ic0ae8d6ca44dbbbf12848a9164acc0e908c90402
/frameworks/base/core/res/AndroidManifest.xml
9c58c651ceef19d9bf6352c59b309158cfa65fd2 24-Jun-2015 Svetoslav <svetoslavganov@google.com> am 4074a871: am 338ac4ac: am c5e43c50: Only current IME and spell checker can access user dictionary

* commit '4074a871cbc109d4fd518413fc4e43ba3eea41a5':
Only current IME and spell checker can access user dictionary
c5e43c508f415a72a77825ed260df60bdb048218 24-Jun-2015 Svetoslav <svetoslavganov@google.com> Only current IME and spell checker can access user dictionary

Change-Id: I6c5716d4d6ea9d5f55a71b6268d34f4faa3ac043
/frameworks/base/core/res/AndroidManifest.xml
b96d1f1e6979a91b9e35657cbfbee6acff3330ed 24-Jun-2015 Svetoslav Ganov <svetoslavganov@google.com> am 242c1f33: am 4475dbca: am 2c99ea35: Merge "Remove not needed contacts related permissions." into mnc-dev

* commit '242c1f333431b32445336faed18feb1a90ebd6e4':
Remove not needed contacts related permissions.
caef842f35dae5c3aa2f0af7a27b0fbeee400912 24-Jun-2015 Adam Lesinski <adamlesinski@google.com> am c62dafdf: am 05feded4: am 8144aa2e: Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev

* commit 'c62dafdffc5a382b47d47d5aad528d8500eafb3b':
Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS
2c99ea3524bba58f87a9fefad79aa136538b6e0e 24-Jun-2015 Svetoslav Ganov <svetoslavganov@google.com> Merge "Remove not needed contacts related permissions." into mnc-dev
6d2c0e5ee2f717d4a5c00df08aca21c76eea8278 23-Jun-2015 Svetoslav Ganov <svetoslavganov@google.com> Remove not needed contacts related permissions.

This reverts commit ed5ff51b2ca7c051e2719dfc8a8a083e6208848e.

Change-Id: If2407e4e474a438d95e1b7ad1aa6f441bb3ace08
/frameworks/base/core/res/AndroidManifest.xml
8144aa2e9a732be6ba66c385a590e07ec59c5f77 23-Jun-2015 Adam Lesinski <adamlesinski@google.com> Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev
f374a4bc2ad5c31f252c7d37104e1315a955daad 23-Jun-2015 Adam Lesinski <adamlesinski@google.com> Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS

Bug:22008542
Change-Id: Ifb4565ec8077e88596f0304328c083c7d1c9db04
/frameworks/base/core/res/AndroidManifest.xml
edfda6a1c8eed3be77b506ca84f045ae22ea465c 23-Jun-2015 Bart Sears <bsears@google.com> am 0623d635: am 2544da4c: am 1ef23ade: Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev

* commit '0623d6359178df8861159f188df7645959866cd8':
Revert "Remove not needed contacts related perissions."
1ef23adef84f8b0080f315aa9283a416737e2e34 23-Jun-2015 Bart Sears <bsears@google.com> Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev
ed5ff51b2ca7c051e2719dfc8a8a083e6208848e 23-Jun-2015 Bart Sears <bsears@google.com> Revert "Remove not needed contacts related perissions."

Broke the build, reverting.

This reverts commit a2991da0d671adf511ccb884cf25bf1241303f92.

Change-Id: I2bdfa70fbd8a6c03e48426f85eeb63896762d5da
/frameworks/base/core/res/AndroidManifest.xml
46e28423030178711bcaa34ebc2ed2a840246ce6 23-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 8bf62c7d: am 477bb484: am 2b5bec93: Merge "Remove not needed contacts related perissions." into mnc-dev

* commit '8bf62c7d0ccda08ae5982d3bbf39b72ba327b2fc':
Remove not needed contacts related perissions.
8baaf220e4a4f979328a5fdc1e8a1765f7a5a95b 23-Jun-2015 Adam Powell <adamp@google.com> am 04333109: am f66c97b5: am 9f49dcda: Merge "Add voice interaction support to ResolverActivity/ChooserActivity" into mnc-dev

* commit '04333109ce6ea332a9136fbdd69ca83b8f8e56e5':
Add voice interaction support to ResolverActivity/ChooserActivity
2b5bec9356de159a216e5aec8d553e6da7078b72 23-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "Remove not needed contacts related perissions." into mnc-dev
4c470d641c6906a742b63273b305695ba575b3e1 20-Jun-2015 Adam Powell <adamp@google.com> Add voice interaction support to ResolverActivity/ChooserActivity

All options are sent to the VoiceInteractor once ChooserTargetServices
have reported in. We don't perform explicit progressive refinement or
filtering, but an explicit option picked will be invoked.

Also fix a lingering bug around being able to nested-fling the
resolver drawer closed.

Bug 21516866

Change-Id: I6b141f5fa87d74dccec9dcb88110630696e9c38e
/frameworks/base/core/res/AndroidManifest.xml
a2991da0d671adf511ccb884cf25bf1241303f92 22-Jun-2015 Svet Ganov <svetoslavganov@google.com> Remove not needed contacts related perissions.

Removing the read/write profile/social stream permissions as they
are not needed anymore. These permissions are for accessing data
nested in the conacts provider which is already guaded by the
read/write contacts runtime permissions. The removed permissions
would be in the contacts group which means they would not provide
more protection compated to read/write contacts. Also removing
the permissions voids the need for app op support for legacy apps.

Removed deprecated APIs for social streams as these were deprecated
and will go away in the next release. We want apps targeting M to
not be able to compile if still suing these APIs to help with
migration.

Change-Id: I26ed9055847af7f92c78eb0f4ac8f9f1aa616fcd
/frameworks/base/core/res/AndroidManifest.xml
c71c4d56c522b9511ee7695b0a881fafb7c134d4 22-Jun-2015 Rubin Xu <rubinxu@google.com> am 57f605f8: am a136f8d7: am c54bcade: Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev

* commit '57f605f82b6ebf87bd9e7f2def4a082ab06a4556':
New internal permission to protect apps against rogue Nfc message.
c54bcade1b7ec7e044aca7fe9c60357ad957a8c2 22-Jun-2015 Rubin Xu <rubinxu@google.com> Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev
9fe6c3805607ae407fa9f7f05bf4a5cb81454052 20-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 07247e48: am af4ace3d: am d8e247db: Make READ_EXTERNAL_STORAGE dangerous

* commit '07247e482e63984bdeac02a47a15c67b3a6a2eb0':
Make READ_EXTERNAL_STORAGE dangerous
d8e247db8cabe209966f4bfcb550637b45f18441 20-Jun-2015 Svet Ganov <svetoslavganov@google.com> Make READ_EXTERNAL_STORAGE dangerous

We have a new storage permission group that has read and
write external storage. However, read external storage is
(not a regression) a normal permission while write is a
dangerous one. This leads to cases where the user disables
the Storage permission and apps still read form it. This
change makes read external storage a dangerous permission.

bug:21949045

Change-Id: I7e28f629dda6e9c1f70cb20a3d5bea74fb109890
/frameworks/base/core/res/AndroidManifest.xml
b8c0e7a85b64b4328b503893730bd0b642a7592d 20-Jun-2015 Hyunyoung Song <hyunyoungs@google.com> am 64dba615: am a0a5dc5e: am 95499dcb: Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev

* commit '64dba6159f83c6b91d3aa418d4229c9d1f581ac0':
Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit
95499dcbb404d8e4d5575be7d5568115c35a639a 20-Jun-2015 Hyunyoung Song <hyunyoungs@google.com> Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev
8a1533ed2ea77b9f68dae84759b3376eafdc2fc8 20-Jun-2015 Hyunyoung Song <hyunyoungs@google.com> Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level
https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit

b/21853008

Change-Id: If9c4e88fd2074de17814120d111546d6ecf58cf4
/frameworks/base/core/res/AndroidManifest.xml
1213487aa7dc32d392cb5f2489f0c76321f02430 19-Jun-2015 Rubin Xu <rubinxu@google.com> New internal permission to protect apps against rogue Nfc message.

Bug: 19838376
Change-Id: Id23f6d14ce8d93988e4382ea0d0dc5c586456bf7
/frameworks/base/core/res/AndroidManifest.xml
172671b349062b6958ad1a6de6d1232c92b9f9e8 19-Jun-2015 Pierre Vandwalle <vandwalle@google.com> am 8a55a5ad: am 7c74c944: am 0b00db8e: Merge "create Wifi PNO ALARM intent" into mnc-dev

* commit '8a55a5ade28ac4622a4ca2b60106280c23cd66e7':
create Wifi PNO ALARM intent
5297c2fb7f6cc3e6e3421297856ec1c9450d0b4f 19-Jun-2015 Todd Kennedy <toddke@google.com> am bd626dd9: am 24cd7b03: am f29c4a07: Merge "Add getPackageImportance() system API" into mnc-dev

* commit 'bd626dd96d25033812e7d3aa528d63fafc96cb0d':
Add getPackageImportance() system API
0b00db8eebd3b677c1d9190061d0d97dd672976e 19-Jun-2015 Pierre Vandwalle <vandwalle@google.com> Merge "create Wifi PNO ALARM intent" into mnc-dev
f29c4a07f42eecb77fbd9acdcf61a26d3480c047 19-Jun-2015 Todd Kennedy <toddke@google.com> Merge "Add getPackageImportance() system API" into mnc-dev
69810483c770e99b65f4fd01ad1973885969062c 18-Jun-2015 Todd Kennedy <toddke@google.com> Add getPackageImportance() system API

Callers must have the permission GET_PACKAGE_IMPORTANCE

Bug: 20642684
Change-Id: I6f3ef2ec810c884e0dee239e5909bcb314957302
/frameworks/base/core/res/AndroidManifest.xml
15d48a16f645509cb0c6a1f3abf52ddd233cd8b5 19-Jun-2015 Alan Viverette <alanv@google.com> DO NOT MERGE: Remove DayNight theme

Do not go gentle into that good night,
Old age should burn and rave at close of day;
Rage, rage against the dying of the light.

Though wise men at their end know dark is right,
Because their words had forked no lightning they
Do not go gentle into that good night.

Bug: 21854466
Change-Id: I0b7cd116c23f7df88e94f31b3aee7dd22a102804
/frameworks/base/core/res/AndroidManifest.xml
b6ca937abeb145ec0e39073aaa72bfb769160704 18-Jun-2015 Pierre Vandwalle <vandwalle@google.com> create Wifi PNO ALARM intent

Change-Id: I9bdae8ae37e30d36bf82b731468b8a157bb2862b
/frameworks/base/core/res/AndroidManifest.xml
9faad27a1e4f4005ca0cc9f017a4e5f56de5146b 18-Jun-2015 Craig Lafayette <craiglafa@google.com> am 2cabb0da: am a4e0fca0: am b4c46909: Merge "Remove FRP wipe support for device initializers" into mnc-dev

* commit '2cabb0da0c5b09f3736c61a7eea74ee947182702':
Remove FRP wipe support for device initializers
b4c469095f12972ef04558961ddbdbdfe8305ccb 18-Jun-2015 Craig Lafayette <craiglafa@google.com> Merge "Remove FRP wipe support for device initializers" into mnc-dev
e981e00b14fc0bdf4906303c66eef3a125f33037 16-Jun-2015 Yorke Lee <yorkelee@google.com> am fc86e40d: am 8d308309: am a5f59258: Merge "Send broadcast when default dialer changes" into mnc-dev

* commit 'fc86e40d9632366d05af4db8b56d6a85f4502710':
Send broadcast when default dialer changes
107c4ce2ac9b76e7b4ed251fff8929958c5d3e63 15-Jun-2015 Yorke Lee <yorkelee@google.com> Send broadcast when default dialer changes

Add hidden TelecomManager.setDefaultDialer for system apps
to set the default dialer and trigger the broadcast

Bug: 21846308
Change-Id: Ifdd30cd1323ab0157edf7fd966173b6c52df6ba0
/frameworks/base/core/res/AndroidManifest.xml
f8d6ce6aab07a83d99b50147aac464205eddd528 14-Jun-2015 Svetoslav <svetoslavganov@google.com> am 13fb3353: am 281c8389: am 6d977832: Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev

* commit '13fb33535f93c8cd49650b398f5728938f90933b':
Remove bookmarks provider and associated permissions - framework
6d9778328a3c3c9da525870fff606af8ac5e9529 14-Jun-2015 Svetoslav <svetoslavganov@google.com> Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev
b299f8d984548874493909b6623ec3bed6d95efd 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 986506c4: am f4c6f135: am 7f55b008: Merge "Revert write secure settings permission protection level." into mnc-dev

* commit '986506c42a9565acd73d28020b461c0a95fddefd':
Revert write secure settings permission protection level.
353d0ef9358df95ffe42afb591905347da48a4e2 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Revert write secure settings permission protection level.

bug:21619456

Change-Id: I31212d3677b74fbf26b2d9eb222a2a8132de2271
/frameworks/base/core/res/AndroidManifest.xml
53e5a05378919c4b4ac04d9dee745ecfda008393 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> am ede23cfe: am 9b53c26b: am 033a68fe: Lower protection level of WiFi state change permissions.

* commit 'ede23cfe868641da64d91a9cd8cf940e07eab1c1':
Lower protection level of WiFi state change permissions.
887b2d6989589bb83f3eb9929d32db14a137c442 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 5289bc37: am ab32fe21: am 6f918b2f: Merge "Add new storage permission group" into mnc-dev

* commit '5289bc37688f4e0b570c197184feadd37d3d4deb':
Add new storage permission group
32c00bbbdbbd633c2ea8834e3a2f8c6569251e1a 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> am ea1ac5ea: am b4e3c87f: am 55fd0a70: Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev

* commit 'ea1ac5ea97c188b59bf57100306da80e8d789b49':
Bump up the protection level of the CLEAR_APP_CACHE permission
c27407e1adbd7ab8f34a6da4f9c85bb31370e514 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> am 1891eb8e: am cdf20eac: am 592d3d35: Merge changes Ic643bc07,I4bef927b into mnc-dev

* commit '1891eb8e6a3eeb2394c6eb2343da42bb7e925606':
Lower protection level of the dangerous Bluetooth permissions
Update sensors permission group name string
033a68fe2739aac89bded94bb4ca99473050bcd7 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Lower protection level of WiFi state change permissions.

bug:21724236

Change-Id: Ib2305bf8a6be62fe6b00d9bccc7685100edba9ba
/frameworks/base/core/res/AndroidManifest.xml
bfa216ac261dd3c5035ad38795650ce5f4ce6fb7 05-Jun-2015 Svetoslav <svetoslavganov@google.com> Remove bookmarks provider and associated permissions - framework

Change-Id: I7f5a2f14a12da473f05a5075d98e762f8f8ed970
/frameworks/base/core/res/AndroidManifest.xml
6f918b2f92ece0ba7904262fc1fd0b50cf746a6c 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "Add new storage permission group" into mnc-dev
55fd0a702d5bb346efb3a149b3cbaba4dc5952b2 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev
592d3d35a6ae4eee0645bf92bc8cf4ab9d0d9b7b 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge changes Ic643bc07,I4bef927b into mnc-dev

* changes:
Lower protection level of the dangerous Bluetooth permissions
Update sensors permission group name string
a83d3eaf05dd7b29362aa7897628a67c4428eb65 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Bump up the protection level of the CLEAR_APP_CACHE permission

This permission guards only hidden and system APIs, hance it
should be signatureOrSystem protection level.

Change-Id: I8d2b75167c6887a285af0b494c39b4ffea2f0cbf
/frameworks/base/core/res/AndroidManifest.xml
d81897d0232e4629340a541bf6ffb8dcfae0fd52 12-Jun-2015 Svet Ganov <svetoslavganov@google.com> Lower protection level of the dangerous Bluetooth permissions

bug:21594947

Change-Id: Ic643bc0768b0fc9adcc3e07661ee34fa59f4ec35
/frameworks/base/core/res/AndroidManifest.xml
1d2bd010ecd0399fd1992c00fffd1b0ac1cbafaf 12-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> am e6f426a1: am fe216ddd: am b3c134e1: Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev

* commit 'e6f426a109aff7b081f9dc59722cee80c1092e91':
Revert "Revert "Permissions: Fix account related permissions.""
b44339776a434cbfd65f0c5b7186347fad37f2dd 11-Jun-2015 Amit Mahajan <amitmahajan@google.com> am 7e2bbad7: am 486d4283: am 02184244: Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev

* commit '7e2bbad7f9feac0a484bb59afcc711ddde3b314e':
Change to add STK_PERMISSION for stk related commands.
6b4450bcf8ca2a7fddc3dfe4ecfd2fddad04bcf9 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> am f68b581c: am 9c9ebccd: am d0041e5f: Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev

* commit 'f68b581cb0687fb1b40258ea526d1154df311bee':
Revert "Permissions: Fix account related permissions."
b3c134e1614e02471811a43d12bedcfc5778667b 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev
6eb73a577850a4b6ddb06fd746f09a6c1d124f34 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> Revert "Revert "Permissions: Fix account related permissions.""

This reverts commit dcddc476651deb72a27798de56eef584e5be5d32.

Change-Id: Ie2402167fc7cd3d5e57bf2fba704fdf00cfcb4fe
/frameworks/base/core/res/AndroidManifest.xml
02184244dcd0149252676bbf24c6d9a5c9ebfd5b 11-Jun-2015 Amit Mahajan <amitmahajan@google.com> Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev
d0041e5f474f4e795d6bc9e5eeaec4098949897c 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev
dcddc476651deb72a27798de56eef584e5be5d32 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> Revert "Permissions: Fix account related permissions."

This reverts commit ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814.

Change-Id: I4c62b1b5a5bd4e2a5fac76244a16730526ed67fc
/frameworks/base/core/res/AndroidManifest.xml
59acd140b6e3165767ec5a11a16779bc9e220def 11-Jun-2015 Amit Mahajan <amitmahajan@google.com> Change to add STK_PERMISSION for stk related commands.

Bug: 21697171
Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
/frameworks/base/core/res/AndroidManifest.xml
db6ac98ec375f388d4815fe405201e9649a003f8 11-Jun-2015 Svet Ganov <svetoslavganov@google.com> Merge "DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885" into mnc-dev
9fb3c8826ceb2c1b7d93c7c151ec5f39f26c9e1d 11-Jun-2015 Svet Ganov <svetoslavganov@google.com> DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework
b/20220885

Instead, move it to GSF:
ag/700092

SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider
that stores sync feeds for 1p apps (Gmail, Claendar, etc).
The sync feeds are used for delivering and processing
GCM tickle-to-sync messages.

These permissions should not be used by 3rd parties but
if they were, this change will break them.

I don't know the reason these were not in GSF and 'signature'
to begin with. If someone does, please, comment.

Change-Id: I6c4e4c774fea12c7fe7082477c210ad75f007c66
/frameworks/base/core/res/AndroidManifest.xml
afd71a8fb6cca37c8ba874b941be8944b0224e3f 11-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> am 2e2d22a2: am e262829d: am ffb46022: Permissions: Fix account related permissions.

* commit '2e2d22a20e7eb8216fa299a1b9b4f8ef98078021':
Permissions: Fix account related permissions.
2e8beb5d40a7ed56ea4adb80b1a8b7efbf06567e 11-Jun-2015 Craig Lafayette <craiglafa@google.com> am 6c5acdbc: am 7ff09f2b: am 77b2d49a: Merge "Remove device initializer status messages" into mnc-dev

* commit '6c5acdbc938bc9ee989fb36b8ace7f91b3bfbc1b':
Remove device initializer status messages
79b71e71962a2993de517f8a9695e685cc7a7da5 29-May-2015 Georgi Nikolov <geonik@google.com> Remove SUBSCRIBED_FEEDS permissions from framework
b/20220885

Instead, move it to GSF:
ag/700092

SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider
that stores sync feeds for 1p apps (Gmail, Claendar, etc).
The sync feeds are used for delivering and processing
GCM tickle-to-sync messages.

These permissions should not be used by 3rd parties but
if they were, this change will break them.

I don't know the reason these were not in GSF and 'signature'
to begin with. If someone does, please, comment.

Change-Id: I22b5233893df7f0c6db41ed7d4e878722bd412f0
/frameworks/base/core/res/AndroidManifest.xml
ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814 09-Jun-2015 Carlos Valdivia <carlosvaldivia@google.com> Permissions: Fix account related permissions.

Requires updating the docs in AccountManaager as well as the logic in
AccountManagerService.

MANAGE_ACCOUNTS, USE_CREDENTIALS, and AUTHENTCATE_ACCOUNTS are going
away. Where AUTHENTCATE_ACCOUNTS was required we now do signature
matching.

GET_ACCOUNTS is kept but has been grouped under contacts.

Bug: 20136477
Change-Id: Iabbb76dce8d1efc607c1f107911d7ddab598a481
/frameworks/base/core/res/AndroidManifest.xml
09ad6bfe9619ff7a61209131f1f3182d53d840d0 02-Jun-2015 Craig Lafayette <craiglafa@google.com> Remove FRP wipe support for device initializers

- Remove ManagedProvisioning NFC parameter key from
DevicePolicyManager
- Remove wipeIfAllowed from PersistentDataBlockManager

Bug: 21558883
Change-Id: I59354b7bb1ef7e0b0346ff9a7d1654780231dff0
/frameworks/base/core/res/AndroidManifest.xml
77b2d49abb38fafb91fb99ce603a92f189553cd7 11-Jun-2015 Craig Lafayette <craiglafa@google.com> Merge "Remove device initializer status messages" into mnc-dev
ee7fb4d6832e894dfc31db3ec977fda4df29cbaf 11-Jun-2015 Svet Ganov <svetoslavganov@google.com> Add new storage permission group

bug:21730509

Change-Id: If098def755417a90f50328f83d5b419d9e73f120
/frameworks/base/core/res/AndroidManifest.xml
3c0e6d9ebfb4406f421788ca3c33953f9ff242fe 11-Jun-2015 Svetoslav <svetoslavganov@google.com> am 47db7221: am 0525c07f: am 75a0ee08: Merge "Add system API to watch for permission changes" into mnc-dev

* commit '47db7221685aaa12926abc42198069c733491cfc':
Add system API to watch for permission changes
f7c06eb03ab4479b9d0656a23a4733d17e995183 11-Jun-2015 Svetoslav <svetoslavganov@google.com> Add system API to watch for permission changes

Change-Id: I1ce450a59fb326c14848f46732d877dea33f33c7
/frameworks/base/core/res/AndroidManifest.xml
6e48b76640a6c3eaa24c7b727f1e61387387936d 08-Jun-2015 Mike Lockwood <lockwood@google.com> am e89f9d8a: am ac4c704b: am 383ce580: Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev

* commit 'e89f9d8af721d2be7369f9c361cfa566f6a24757':
MidiManager: proxy all requests to open devices through MidiService
383ce580b1c9e706d1b06a23d81986f3b4ed83fb 08-Jun-2015 Mike Lockwood <lockwood@google.com> Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev
8a3188e8ea63ea646f43524c5b632e214da9c1c9 08-Jun-2015 John Spurlock <jspurlock@google.com> am 202dea41: am 5e73a085: am 20ac61b8: Merge "Zen: New user flow for requesting DND access." into mnc-dev

* commit '202dea4125f189e242da71c1378699321882671b':
Zen: New user flow for requesting DND access.
add777bd54575449587fcdee0db0cb832f4b6873 08-Jun-2015 Martijn Coenen <maco@google.com> am de6294b0: am 2812397f: am 6280481a: Merge "Remove NFC CardEmulation dynamic resource APIs." into mnc-dev

* commit 'de6294b0a20de4b4c0fcd20fc1a491c636e3462c':
Remove NFC CardEmulation dynamic resource APIs.
20ac61b8c0abd5af4ce32707e01cc1a501cbb7f0 08-Jun-2015 John Spurlock <jspurlock@google.com> Merge "Zen: New user flow for requesting DND access." into mnc-dev
7c74f78a85283912d7239214024ccca702622f21 04-Jun-2015 John Spurlock <jspurlock@google.com> Zen: New user flow for requesting DND access.

- User flow is now similar to requesting access to notification
content, namely prompting the user to visit a settings page
for enabling/disabling apps access.
- New ACTION_NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED intent
for apps to listen to this state change.
- Removed obsolete request method and associated internal callback
aidl.
- Added new android.permission.ACCESS_NOTIFICATION_POLICY permission
for apps to include as a signal that they want to request this access
(and therefore appear in the list on the settings page).
- Improve javadocs, outline the user flow in NotificationManager#isNotificationPolicyAccessGranted
and link to this method elsewhere.
- NoManService now persists the user-enabled package list across reboots
and does so per-user.
- Rename public settings intent to correspond with the noman api.

Bug: 21621663
Change-Id: I72cbc21cd736e6a157b6be5d1d0ba0b4a8e7ef4e
/frameworks/base/core/res/AndroidManifest.xml
a2344eac370b38263d7f17a7e9802cc9a017eb3a 05-Jun-2015 Martijn Coenen <maco@google.com> Remove NFC CardEmulation dynamic resource APIs.

No longer needed.

Bug: 21343778
Change-Id: I5188c4bc819146861d346f3f4339f002b7173027
/frameworks/base/core/res/AndroidManifest.xml
e0a6ca64fac5bd4f10139321604031816e90adb4 04-Jun-2015 Mike Lockwood <lockwood@google.com> MidiManager: proxy all requests to open devices through MidiService

Previously when a MidiManager client opened a virtual or Bluetooth device,
the client bound directly to the virtual device's MidiDeviceService
or BluetoothMidiDevice's IMidiDeviceServer for the given BluetoothDevice.
Only USB devices were opened in MidiService.

Now opening any type of MIDI device is done via IMidiManager.openDevice() or
IMidiManager.openBluetoothDevice(). MidiService tracks all connnections between
clients and devices.

Services that implement virtual devices must now require android.permission.BIND_MIDI_DEVICE_SERVICE
so only MidiService can bind to these services.

Bug: 21044677

Change-Id: I7172f7b1e0cbfe4a2a87dff376c32dc9b41aa563
/frameworks/base/core/res/AndroidManifest.xml
982c0d9d4d289b733d574b2b36e69a5858a090d5 02-Jun-2015 Amith Yamasani <yamasani@google.com> am 9984f181: am 52f26b63: am ff3b76d0: Merge "Temporarily whitelist an app for network during doze" into mnc-dev

* commit '9984f181c5d0ed933837e548a97729ae81b5e4dd':
Temporarily whitelist an app for network during doze
ff3b76d04672d09214cd0ceb29ec548c8abb2330 02-Jun-2015 Amith Yamasani <yamasani@google.com> Merge "Temporarily whitelist an app for network during doze" into mnc-dev
5288d74d4109d65ff90536fcd636b040596a45d8 02-Jun-2015 Svetoslav <svetoslavganov@google.com> am 5d8e4aba: am bbf5b460: am acbe426b: Merge "Add accidentally deleted strings." into mnc-dev

* commit '5d8e4abaf3775627cd8451254e56b0e439c291c2':
Add accidentally deleted strings.
af575b9f8e1b59be9c8862b6a65c0dcb88145a23 30-May-2015 Amith Yamasani <yamasani@google.com> Temporarily whitelist an app for network during doze

API to allow an app to be whitelisted for network and wakelock
access for a short period. So even if the device is in idle
mode, such apps can be given a chance to download the payload
related to a high priority cloud-to-device message.

This API is meant for system apps only.

A new permission CHANGE_DEVICE_IDLE_TEMP_WHITELIST is required
to make this call.

Bug: 21525864
Change-Id: Id7a761a664f21af5d7ff55aa56e8df98d15511ca
/frameworks/base/core/res/AndroidManifest.xml
240e64828f68064b2a1074a1dda1fc41fe19d711 02-Jun-2015 Craig Lafayette <craiglafa@google.com> Remove device initializer status messages

- Remove ManagedProvision Bluetooth extras from
DevicePolicyManager
- Remove ManagedProvisioning device initializer status
action and extras from DevicePolicyManager.
- Remove DIA status update protected-broadcast
and permission
- Remove DPM.sendDeviceInitializerStatus method

Bug: 21559093
Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/res/AndroidManifest.xml
5f79d8282d593daec7071765f7ca60a24a4ad3c5 02-Jun-2015 Svetoslav <svetoslavganov@google.com> Add accidentally deleted strings.

Change-Id: I16d7c151b46c076bfdccb1ff0b2bcb0934eedf93
/frameworks/base/core/res/AndroidManifest.xml
f4efdfc51f316049508c957ec54e81f7a3099297 28-May-2015 Brian Attwell <brianattwell@google.com> am 98bc46d1: am 701ea8b5: am 8d38a8d8: Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev

* commit '98bc46d13a523efaf06eae6ddaeb9100d15006a2':
Deprecate {READ,WRITE}_PROFILE permission
6f51e48dfb4777a31ca5bb1086a6070d573a53fe 28-May-2015 Svet Ganov <svetoslavganov@google.com> am 6e520470: am 73e74be1: am 63428ccd: Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev

* commit '6e5204701142b3e1281824ced1ab41813a8c4072':
Add a normal permission guarding the installer UI - used for stats tracking
8d38a8d84f3c6ee81db9e6aa38492a7ce7766206 28-May-2015 Brian Attwell <brianattwell@google.com> Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev
63428ccde7e925ceb94aa40e933b3d51954a7797 28-May-2015 Svet Ganov <svetoslavganov@google.com> Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev
86877e44f054facb535b29b8db7fda8c543bc245 28-May-2015 Svet Ganov <svetoslavganov@google.com> Add a normal permission guarding the installer UI - used for stats tracking

bug:2147009

Change-Id: Id020eaf7b852de43966f4ab8231e3f7046e66542
/frameworks/base/core/res/AndroidManifest.xml
b97df269b5c44dc6aed70bdff156cd70ee394fbb 28-May-2015 Brian Attwell <brianattwell@google.com> Deprecate {READ,WRITE}_PROFILE permission

Now that *_PROFILE permissions are in the same permission
group as *_CONTACTS, these permissions have no visible
impact on the user. However, they complicate developer's
lives and prevent us from using Context#grantUriRequest().

Bug: 21090207
Change-Id: I31e6ae7b0f49c3589071f6a95f8d69a9456c144d
/frameworks/base/core/res/AndroidManifest.xml
79965b35fdf832ed00c8fcd0029e3682adf6470f 28-May-2015 Svetoslav <svetoslavganov@google.com> am 28917b1e: am 713f4c32: am b2849d9a: Merge "Allow priv apps to get local mac address" into mnc-dev

* commit '28917b1e51049175f63b2084f4ec6b7e75a82f04':
Allow priv apps to get local mac address
59ffbc46f3274b7178d4c41f0060522e38152c28 27-May-2015 Svetoslav <svetoslavganov@google.com> Allow priv apps to get local mac address

Change-Id: I550847cedd5a407c9424778e483b525d4b97e46d
/frameworks/base/core/res/AndroidManifest.xml
854cf72d266cfa772d045edb44f17b8d054ea568 20-May-2015 Jorim Jaggi <jjaggi@google.com> am 9ae0100c: am b599c1ea: am d6bd9da8: Lower fingerprint permission protection level

* commit '9ae0100c767eac741de61b7dbce321108cec679e':
Lower fingerprint permission protection level
d6bd9da8efaae7bdf806dbe32bc711b0aed7f500 20-May-2015 Jorim Jaggi <jjaggi@google.com> Lower fingerprint permission protection level

Bug: 21307136
Change-Id: Iafdb42c6a82b27a5297ad14ffaa289b14fffad23
/frameworks/base/core/res/AndroidManifest.xml
a0a060dbc21e3ff93a7cebb51154d41af10a89cc 19-May-2015 Svet Ganov <svetoslavganov@google.com> am cbe0916e: am e7896371: am f7b541ff: Merge "Do not report WiFi and Bluetooth MAC addresses - framework." into mnc-dev

* commit 'cbe0916ebff2fc32d5a28fbd5bba9f0c3da1ae86':
Do not report WiFi and Bluetooth MAC addresses - framework.
408abf7f1bec3253675d0225300d7ee39481d286 13-May-2015 Svet Ganov <svetoslavganov@google.com> Do not report WiFi and Bluetooth MAC addresses - framework.

As a part of the new runtime permissions work we are limiting
the PII apps can access. BT and WiFi MAC addresses are PII and
based on our research there is no valid use case for app dev
to get these addresses aside of user tracking which we are
trying to limit.

bug:21078858

Change-Id: Ib48223b272c0fd4f5c36acc889d4f44df204b309
/frameworks/base/core/res/AndroidManifest.xml
86e86a77fc46ba08b8115058b16a4ff622e8bea6 17-May-2015 Svet Ganov <svetoslavganov@google.com> am 11fe86ae: am a4f7ea55: am 321f0157: Hide platform platform legacy permissions behind a menu option - framework.

* commit '11fe86ae6e30a4e642b9c7255af21c522334a147':
Hide platform platform legacy permissions behind a menu option - framework.
321f01574e523dd680090694ea22e38b83a7c2b3 17-May-2015 Svet Ganov <svetoslavganov@google.com> Hide platform platform legacy permissions behind a menu option - framework.

bug:21195624

Change-Id: I563c448e2abd7d33070ed2d8f62ba1b60a3744e8
/frameworks/base/core/res/AndroidManifest.xml
0bf27e9b0438a41c00a1713e0efb0f43dbfa0415 16-May-2015 Zach Johnson <zachoverflow@google.com> am 85f82784: am 4b197204: am a80282a7: Merge "Create unified BIND_CARRIER_SERVICES permission" into mnc-dev

* commit '85f82784f88a6bd2a94ee5bf44b8d105bcb1671b':
Create unified BIND_CARRIER_SERVICES permission
cdaaa91f7c67b2c56f17d5512f015c7c25c7c351 14-May-2015 Zach Johnson <zachoverflow@google.com> Create unified BIND_CARRIER_SERVICES permission

Replace BIND_CARRIER_MESSAGING_SERVICE and
BIND_CARRIER_CONFIG_SERVICE since we don't really
need one permission for each carrier service type.

Deprecate BIND_CARRIER_MESSAGING_SERVICE since it
already shipped, but remove BIND_CARRIER_CONFIG_SERVICE
since it hasn't.

b/21165906

Change-Id: I716f3f1c98a228afcfee84cf4a48911f0736ce8c
/frameworks/base/core/res/AndroidManifest.xml
fb8026a8d9b239fe168a62e832e959d538b7e69f 14-May-2015 Jaesung Chung <jaesung@google.com> am 614cb6f2: am 393fc7f0: am f5edb20a: Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev

* commit '614cb6f2f0f01a35cab72e29d8c361f92d3208f2':
TIF: Add DVB device handling to TvInputManagerService
4d78a792f636fa09f49e389965048c558ab14227 14-May-2015 Yorke Lee <yorkelee@google.com> am 0cc30270: am 606e9e1c: am ad0bfe3a: Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev

* commit '0cc30270274cfab889d0f710a426e95911824355':
Add BIND_TELECOM_CONNECTION_SERVICE permission
f5edb20ae90ab9a817c8cf23b5a0d21fe8c80e2a 14-May-2015 Jaesung Chung <jaesung@google.com> Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev
ad0bfe3ae2f056a568c6256614079e6f31f5d542 14-May-2015 Yorke Lee <yorkelee@google.com> Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev
58739e758428f3b880f8e67161f57c59aa06d496 24-Apr-2015 Jaesung Chung <jaesung@google.com> TIF: Add DVB device handling to TvInputManagerService

Added an API to pass an open file descriptor of DVB devices and
addressed the security issue of setting the permissions on DVB devices
to 0666.

Bug: 20436120
Change-Id: I4649e76084f3356ec22b7e776fb87c6a8fdc00d6
/frameworks/base/core/res/AndroidManifest.xml
4ec301faace5802797d860707d97cb29045a3ef4 14-May-2015 Svet Ganov <svetoslavganov@google.com> am 59a49c03: am a82e4878: am 67b7ec28: Merge "Access mock location is no longer a runtime permission - framework" into mnc-dev

* commit '59a49c0309e9cec01e33be07de74e3c530efa07f':
Access mock location is no longer a runtime permission - framework
249c12e7b88fc7799c1b5e1eaf72429fc6aa56a2 14-May-2015 Yorke Lee <yorkelee@google.com> Add BIND_TELECOM_CONNECTION_SERVICE permission

Bug: 21088342
Change-Id: I465307899d83c4a3ee5e88a28554c4b867c1f4ba
/frameworks/base/core/res/AndroidManifest.xml
f7e9cf4fb48ea80cbc5088204ac3f898109623f7 13-May-2015 Svet Ganov <svetoslavganov@google.com> Access mock location is no longer a runtime permission - framework

The access mock location is no longer a runtime permission. It is a
signature protected one that apps cannot get but the fact they request
it means they want to inject location into the system. Now the user
gets to choose the current mock location app in developer options from
the apps that request the mock location permission. The access to mock
location is no longer guarded by the permisson but from a new app op
which is off by default and the settiings UI sets it to enabled only
for the currently selected mock location app.

bug:21078873

Change-Id: I19e3f9dc7c7de82eab46b30fec1abfbca54a0e59
/frameworks/base/core/res/AndroidManifest.xml
a1948682df1115aaf84920e018c7ca7739f6368f 13-May-2015 Svet Ganov <svetoslavganov@google.com> am 129df089: am de69b559: am 20cb37c6: Merge "Lower protection level of permissions of permissions" into mnc-dev

* commit '129df08914de2678fd9381ebfb2e19796d4679d5':
Lower protection level of permissions of permissions
b467330b14fcd14f21e13c4dfeff97914e45cfbb 13-May-2015 Svet Ganov <svetoslavganov@google.com> Lower protection level of permissions of permissions

Permissions ACCESS_NETWORK_STATE, INTERNET, NFC, DISABLE_KEYGUARD
do not lead to unrecoverable damage and do not lead to PII leaks,
hence they do not meet the bar to be runtime permissions and we
are lowering their protection level.

bug:21078873

Change-Id: I30c8e742d6a69474171994b65ce070068402ae47
/frameworks/base/core/res/AndroidManifest.xml
6102ad4678b19b0e1a2900f8e421fb3a7890c8e3 11-May-2015 Zoltan Szatmary-Ban <szatmz@google.com> am 05f62d9d: am 50c21067: am 11a1086f: Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev

* commit '05f62d9d0b4055b6344ca8c11683e0d85cdc2247':
Improve javadoc on android.permission.PACKAGE_USAGE_STATS
11a1086f69abafc17e4fc6db38622d126a1a7ecc 11-May-2015 Zoltan Szatmary-Ban <szatmz@google.com> Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev
763e170f58fb2f2221f615c7802521f7627039df 06-May-2015 Zoltan Szatmary-Ban <szatmz@google.com> Improve javadoc on android.permission.PACKAGE_USAGE_STATS

Bug: 20642656
Change-Id: Ib0cedee487950dab16134edd383ce5bd5374ff65
/frameworks/base/core/res/AndroidManifest.xml
a39b5ff076523d216cde0d9faa801cefa6272039 09-May-2015 Fyodor Kupolov <fkupolov@google.com> am 8bc22f52: am 85dbc345: am 4f434a04: Merge "Remove restrictions PIN functionality" into mnc-dev

* commit '8bc22f521872d64af1c61c1d0845ae562cc5cb8f':
Remove restrictions PIN functionality
4f434a04708e7a254afe2e0d362f715229dc15d1 09-May-2015 Fyodor Kupolov <fkupolov@google.com> Merge "Remove restrictions PIN functionality" into mnc-dev
4cf355d209a2c159e2ab3e8e7405dec981ee5aa2 07-May-2015 Jeff Brown <jeffbrown@google.com> am 37d66f3b: am 8d605030: am ee2e8fbe: Merge changes from topic \'mr\' into mnc-dev

* commit '37d66f3bccdde61517308b8d034484abbe82c36b':
Replace WIFI_DISPLAY_SETTINGS with CAST_SETTINGS.
Revert "Initial draft of new MediaRouter APIs."
c05c1aeedf44b7019b6749758dffc03df7632225 05-May-2015 Jeff Brown <jeffbrown@google.com> Revert "Initial draft of new MediaRouter APIs."

This reverts commit 1a937b04e63539cb1fab1bde601031d415c7156f.

Bug: 20641986
Change-Id: I035d945d1561e5fc7c914aa9362635f763c83cfd
/frameworks/base/core/res/AndroidManifest.xml
ef24909d84db9d5aefb825ee1556089fcdcc1678 06-May-2015 Fyodor Kupolov <fkupolov@google.com> Remove restrictions PIN functionality

Bug: 20852231
Change-Id: I5666ee28ff1341ead9b258bc0852d8ba6d313c5e
/frameworks/base/core/res/AndroidManifest.xml
558283e606aada276958517cc96814dd8abb2f37 06-May-2015 Alan Viverette <alanv@google.com> am 52796c28: am 39a96908: am 809d5d7f: Merge "DayNight theme for framework packages" into mnc-dev

* commit '52796c28d580cfbbf398c90f48c1e06aca9ca7b1':
DayNight theme for framework packages
b9da280ac20091673878f3c4b04c65d0510ba23d 05-May-2015 Alan Viverette <alanv@google.com> DayNight theme for framework packages

Change-Id: I745f90561c957c83540e75a2886e294633c83be1
/frameworks/base/core/res/AndroidManifest.xml
b0a09de8192cce008daff192a18d68040bf1ddbc 05-May-2015 Svet Ganov <svetoslavganov@google.com> am 4e2029c0: am 2514a265: am 4a64b19f: Merge "Permission UI - legacy apps support" into mnc-dev

* commit '4e2029c058966f30a71b1bcea16aa65a5d7f85c4':
Permission UI - legacy apps support
019d2304998f3ed77c0a608df6cf4bea1138f8dc 04-May-2015 Svet Ganov <svetoslavganov@google.com> Permission UI - legacy apps support

Change-Id: Id3f98c138422d33868363d587dd196898b42a0d4
/frameworks/base/core/res/AndroidManifest.xml
37ba44112c519bb055fcac2efebfb0a6e16d5cc0 01-May-2015 Zheng Fu <zhengfu@google.com> Add permissions to read/write contacts metadata

Bug: 20537162
Change-Id: I5e12857e62635fccec52447404363bf0f1507594
/frameworks/base/core/res/AndroidManifest.xml
0b4daca9ba54b7252ea8c159218391380eb00c8a 27-Apr-2015 Dianne Hackborn <hackbod@google.com> Implement user-settable power save whitelist.

The whitelist is now maintained by DeviceIdleController,
which is moving out into its own independent system service.
Network stats now queries it for the whitelist, instead of
collecting that itself.

Also did a few improvements in alarm manager -- made the
code for moving alarms out of the pending list more robust,
and fixed the debug output to always print the contents of
the pending list even if we aren't in a pending state. (That
would have helped me identify the problem much earlier.)

Change-Id: I0f7119d4c553c3af4d77b2f71246fa6e2c13c561
/frameworks/base/core/res/AndroidManifest.xml
e9d766a312b766a16155872cfae796b4979dce9e 29-Apr-2015 Yorke Lee <yorkelee@google.com> Make BIND_INCALL_SERVICE and BIND_CONNECTION_SERVICE public

These system|signature only permissions must be required by
an InCallService and ConnectionService respectively.

Bug: 20304458
Change-Id: I26156afb610a7f549c0a1a7c01c2096928ef33a7
/frameworks/base/core/res/AndroidManifest.xml
cd895cdf4dd98b4271e24742a6a46be70cda6382 25-Apr-2015 Etan Cohen <etancohen@google.com> Merge changes from topic 'mwd-merge-042415'

* changes:
Rename removeVideoCallListener to unregisterCallback
Bluetooth document fix: remove reference from open API to hidden entities
Fix build due to merge of 7595842 and renaming due to 8eb87f0
Merge commit '052a0da' into merge2
Merge commit 'db1dbb8' into merge2
Merge commit '7e5e791' into merge2
Merge commit '170102d' into merge2
Merge commit '4cb5d80' into merge2
Merge commit '83cda00' into merge2
Merge commit 'c91bc62' into merge2
Merge commit 'cffc360' into merge2
Merge commit '7f61051' into merge2
Merge commit '167c3a7' into merge2
Merge commit '4467b98' into merge2
Merge commit '25a217c' into merge2
Merge commit '04b18ec' into merge2
Merge commit '7595842' into merge2
Merge commit '2bbd2b6' into merge2
Merge commit '4890351' into merge2
Merge commit 'cd405fe' into merge2
Merge commit '6ddbb5e' into merge2
Merge commit 'de93575' into merge2
Merge commit '9561e74' into merge2
a179962b61a9c41e8859ce642471928f1ad33c60 24-Apr-2015 Etan Cohen <etancohen@google.com> Merge commit '25a217c' into merge2

Change-Id: I116a9dbf19e95651a7c50393e4dcd7fb59ca3f3f
4bc704655abee70c1998b9a62777cdf643920467 24-Apr-2015 Amith Yamasani <yamasani@google.com> Merge "Add ability to get and set idle state of apps"
cf76872a62075abf9008e99ca08413fb70761dc2 24-Apr-2015 Amith Yamasani <yamasani@google.com> Add ability to get and set idle state of apps

Add am shell command to set and get idle
Add public API to check if an app is idle

Bug: 20534955
Bug: 20493806
Change-Id: Ib48b3fe847c71f05ef3905563f6e903cf060c498
/frameworks/base/core/res/AndroidManifest.xml
2806374f9531490296547d4e884ce9163f4ac867 08-Jan-2015 Nicolas Prevot <nprevot@google.com> Restrict setting the profile/device owner with a signature-level permission.

Create the new permission MANAGE_PROFILE_OWNERS to restrict setting
the profile/device owner.

BUG:19838376

Change-Id: Ib55a2db85fcb6f34e3b88c398683bddb0ad66868
/frameworks/base/core/res/AndroidManifest.xml
dc105cc91c63c27479d73a21702cd4ba0304acc4 15-Apr-2015 Rubin Xu <rubinxu@google.com> Enable system service to notify device owners about pending update

Create a DevicePolicyManager API which can be used by OTA subsystem
to tell device owners about pending updates. Device owners will get
a callback from its DeviceAdminReceiver when the update service sends
out such notifications.

Bug: 20213644
Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/res/AndroidManifest.xml
8abf680e007a378c2828fe43ed8d71131390ec2e 20-Apr-2015 Martijn Coenen <maco@google.com> Add NFC APIs for dynamic resources.

For new Tap & Pay settings UX.

Change-Id: I55ff4e4d4a4b6d26c3c88d96431c4f14d0963323
/frameworks/base/core/res/AndroidManifest.xml
4eb6a36922f5e98fe181c0326cc5721f0e7589ca 02-Apr-2015 Andrei Kapishnikov <kapishnikov@google.com> Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag

A new flag for DPM.resetPassword() method that specifies that the
device should be decrypted without asking for the password or pattern.

Bug 19250601

Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206

Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/res/AndroidManifest.xml
17e11fad0a6272dd750427e2e4cb9810e67b6dec 21-Apr-2015 Erik Kline <ek@google.com> Final removal of CONNECTIVITY_ACTION_IMMEDIATE.

Since the demise of the connectivity change delay,
CONNECTIVITY_ACTION_IMMEDIATE has been sent out back to back with
CONNECTIVITY_ACTION.

Interested parties should watch for CONNECTIVITY_ACTION.

Bug: 20013379
Change-Id: I072dddf95adb3bbd17fa1f7159d4ea848ade8f19
/frameworks/base/core/res/AndroidManifest.xml
97e2f7d5afebb107a8c2c65a094ae4426bbe701b 21-Apr-2015 Rubin Xu <rubinxu@google.com> Merge "Rename public OTA policy APIs in DevicePolicyManager"
5faad8e4cdf04211239f076b5d073e26d0ae3207 20-Apr-2015 Rubin Xu <rubinxu@google.com> Rename public OTA policy APIs in DevicePolicyManager

Use the term "SystemUpdate" instead of "OTA", in public
DevicePolicyManager APIs that handle OTA policies.

Bug: 19650524
Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/res/AndroidManifest.xml
6c589570c44752d96f35620de271ccae7d32502d 17-Apr-2015 Svetoslav <svetoslavganov@google.com> Remove unnecessary WRITE_SMS permission - framework

Currently only one app can write to the SMS provider and it has to
be set as the default SMS app by the user in the UI. The default
SMS app is set by enabling the write SMS app op for it and keeping
this op off for other SMS apps. Hence, this permission does not
guard anything and can be taken out. The API change is fine as if
an app refers to the permission in the manifest as string it will
be ignored and if it was referred in Java the value is statically
compiled in the source.

Change-Id: I1128c3b034e6c7dda4baa051500ac1ef46a53575
/frameworks/base/core/res/AndroidManifest.xml
8fcd5fee60b468c36aee337da0cadad3cd8cf4cd 16-Apr-2015 Svetoslav <svetoslavganov@google.com> Merge "Lower protection level of access mock location permission"
9a1c9b67c4b2426884deb60c1ff84130ab47333c 25-Feb-2015 Jonathan Basseri <misterikkit@google.com> Adding Carrier Config API.

UICC privileged carrier apps will extend CarrierConfigService to provide
carrier-specific configuration. Apps/services will use
CarrierConfigManager to read the current configuration.

CarrierConfigManager also defines the set of configuration variables and
their default values.

Bug: b/19483786
Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
25a217c0fbda9bbaf58ec08b91115e99f73b727f 28-Feb-2015 Paul Jensen <pauljensen@google.com> Add captive portal API.

This API allows apps other than the system's CaptivePortalLogin
to handle signing in to captive portals.

bug:19416463
Change-Id: I27fce5856b635233e6ff66396d50ccabedd76cf5
/frameworks/base/core/res/AndroidManifest.xml
3031bf961103ecc1caa32449a3cdb95575042278 25-Feb-2015 Jonathan Basseri <misterikkit@google.com> Adding Carrier Config API.

UICC privileged carrier apps will extend CarrierConfigService to provide
carrier-specific configuration. Apps/services will use
CarrierConfigManager to read the current configuration.

CarrierConfigManager also defines the set of configuration variables and
their default values.

Bug: b/19483786
Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
df0db7fe83bfab2926e098a5198f43be299d0632 15-Apr-2015 Ben Gruver <bgruv@google.com> Merge "Don't verify signatures in ConfigUpdateInstallReceiver"
7f24225e5e363613eb4f5027d07c32a9acf457f3 14-Apr-2015 Svetoslav <svetoslavganov@google.com> Lower protection level of access mock location permission

The ACCESS_MOCK_LOCATION permission is gated by a secure setting
toggled in developer options by the user. Hence, there is no need
for getting yet another consent from the user for accessing it.

Change-Id: Ica1a72f587a712d7da7c00cfc4a8ca228064286e
/frameworks/base/core/res/AndroidManifest.xml
1441fc73e87fed4d5df84e5e19c14c2a4307b23b 14-Apr-2015 Svetoslav <svetoslavganov@google.com> Mark the SUBSCRIBED_FEEDS_READ/WRITE permissions removed.

These permissions are definded by the platform to protect the
subscribed feeds provider which is not in the system, neither
is its contract specified in the system. Both the contract and
the implementation of the provider are in GmsCore. Hence, this
permissions shuld be declared by GmsCore, not the system. Until
GmsCore adds the permissions we have to keep this as removed
but present in the implementation to keep apps that use the
provider working.

bug:20192150

Change-Id: I3f38b01a159bb430c30948b14de7cdaf5cb50772
/frameworks/base/core/res/AndroidManifest.xml
8027a4ffc285ba39df3a262abfff1cfdd6dd31db 10-Mar-2015 Rubin Xu <rubinxu@google.com> Add setOtaPolicy/getOtaPolicy API in DPMS

Allow device owners to set OTA policy for automatically accept/postpone
incoming OTA system updates. This class only provides the setting
and getting of OTA policy, the actual OTA subsystem should handle
and respect the policy stored here.

Bug: 19650524
Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/res/AndroidManifest.xml
12964bf5dd36d13fc25efef7c7175a677f9490a5 06-Apr-2015 Ben Gruver <bgruv@google.com> Don't verify signatures in ConfigUpdateInstallReceiver

Instead, require the intent sender to hold the new system-or-signature
UPDATE_CONFIG permission. An application holding this permission is
now responsible for verifying the integrity/source of an update, before
sending it to one of the ConfigUpdateInstallReceiver subclasses.

Bug: 8949824
Change-Id: I0925051c1dcef312b8508fb34927150ffbc346f9
/frameworks/base/core/res/AndroidManifest.xml
ef8fcb52dc887603b8a08f9bd97c7d4917a00081 13-Apr-2015 Craig Lafayette <craiglafa@google.com> Merge "Send device initializer status."
dbe31a6616f2e8cb8436ea235149d076302fb793 02-Apr-2015 Craig Lafayette <craiglafa@google.com> Send device initializer status.

- Create method in DevicePolicyManager to send device
provisioning status to ManagedProvisioning.
- Define status updates used by ManagedProvisioning.

Bug: 20001077
Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/res/AndroidManifest.xml
61a4dd5c6677048fcbcbdf2de402649dba50bbeb 09-Apr-2015 Svetoslav <svetoslavganov@google.com> First pass on the new permission grouping.

1. Defining the new permission groups and moving relevant permissions
to these groups.

2. Removed some permissions that were guading ... nothing and old
permission groups.

3. Removing unnecessary comments for siganture and system permissions
as they are no surfaced to the user.

Change-Id: Ibd7e6bb22b3559a4febb37c39326350eeb4285bd
/frameworks/base/core/res/AndroidManifest.xml
caa41648f4e3cecc1996447396aabc4e394b8fd0 10-Apr-2015 Svetoslav <svetoslavganov@google.com> Merge "Allow only system signed apps to grant permissions at install"
805b63e253c139625f5a86d72ef7b31d6ec9f8e9 10-Apr-2015 Svetoslav <svetoslavganov@google.com> Allow only system signed apps to grant permissions at install

bug:20099946

Change-Id: Ifcc5c6638b4174ffb3ba452ae68a5a53b2d1ff0a
/frameworks/base/core/res/AndroidManifest.xml
2a91bbfb4d19c7262abc063b3c0c0349059311d5 10-Apr-2015 Craig Lafayette <craiglafa@google.com> Merge "Reset protection in PersistentDataBlockManager"
66445a639dc134d09393f5069b7683ec36d4cd07 27-Mar-2015 Craig Lafayette <craiglafa@google.com> Reset protection in PersistentDataBlockManager

Add method to allow authorized data block wipe in support of factory
reset protection. This will allow ManagedProvisioning to respond to
and pass factory reset protection challenges during automated device
setup.
- Adds the wipeIfAllowed method to clear the data block
- Creates a protected-broadcast to send to allowed package

Bug: 19792435
Change-Id: I897f2ea2afb1222a1fc8ac49290ee45ea4d3f2d7
/frameworks/base/core/res/AndroidManifest.xml
4870e9d5eba59fb257a87f97f1adf0b734cf48d3 09-Apr-2015 Dianne Hackborn <hackbod@google.com> More work on device idle mode and other power stuff.

Add idle mode support to the alarm manager. Introduce
a new concept of flags associated with alarms to tell
the alarm manager how to treat the alarm -- they allow
everything from the alarm that will bring us out of idle
mode, to alarms that are allowed when idle or should
also bring us out of idle. The standalone boolean is
now also a flag.

(Note there is currently no protection from user space
setting the flags however it wants; I will be working
on that in a follow-up change.)

When in idle mode, the alarm manager pushes all alarms
that shouldn't execute during that time over to a
separate list that is not executed until out of idle.
To help with this, I reworked a bit how Alarm objects
are managed, so that when rebatching or moving between
lists we don't have to allocated new objects but can
just use the same existing instance.

Also tweaked the sync manager to deal with idle mode,
which currently just means doing the same thing as when
low on storage -- turning off sync.

Add new ACTION_CHARGING and ACTION_DISCHARGING broadcasts
that apps can listen for to know when the device is actively
charging and discharging. These are better than the old
POWER_CONNECTED and POWER_DISCONNECTED ones because we only
report charging when we actually see that there is enough
power being provided to charge the battery (and will report
discharging if there is not enough power).

The job controller uses these new actions for scheduling
jobs that want to run while plugged in. Removed the
"stable charging" stuff while doing so, since the new
charging state serves as an even better signal for that.

Introduced two new process states: FOREGROUND_SERVICE and
TOP_SLEEPING. This will allow us to treat foreground services
specially (such as still allowing network access to them for
background music playback) while not mixing them together with
whatever happens to be the top activity while the device is
asleep.

Also some other small cleanup here and there.

Change-Id: I7a9808b578bad6f50deb8e1baf919298512a0d3a
/frameworks/base/core/res/AndroidManifest.xml
25e12abc5b8a4aa83cfa150094fd145b777e6e03 02-Apr-2015 Jorim Jaggi <jjaggi@google.com> Add ability to start voice interaction session directly

Add internal API's for SystemUI to start a voice interaction session
directly, without using an intent.

Make the assist gesture use that ability, if available.

Change-Id: I88ce3c7514714eb45666884847193585a07417a9
/frameworks/base/core/res/AndroidManifest.xml
885b3ef519e5b0b67a896fb6693925b9b2fd22c6 02-Apr-2015 Santos Cordon <santoscordon@google.com> Merge "New generic intent for SIM Activation"
15a13781ad17bbc7e8ddbbad4d0c208f0fae615e 01-Apr-2015 Santos Cordon <santoscordon@google.com> New generic intent for SIM Activation

New hidden intents and permissions for a generic SIM-activation
activity. New activity will handle generic SIM setup requests and then
delegate to the appropriate activation method (OTASP, HFA,
CARRIER_SETUP).

Change-Id: I1b22200544abefe486ec961b67a6e77b4d15aec3
/frameworks/base/core/res/AndroidManifest.xml
095d99904579a5231d974a2447661c10a8eb621b 01-Apr-2015 Ruben Brunk <rubenbrunk@google.com> Merge "Add CameraService to system server."
9d21ee5d7755755cc5695a9d7cea00a05a4b92aa 21-Mar-2015 Ruben Brunk <rubenbrunk@google.com> Add CameraService to system server.

- Adds a camera service to system server that forwards events to the
mediaserver camera service.
- Notify the camera service when the device user changes.

Bug: 19186859
Change-Id: I172a2ce46c8e8a131ae7e8dd99d60c5f4f0d6668
/frameworks/base/core/res/AndroidManifest.xml
cea283535cfecc81565c07597d8db2674e76578a 31-Mar-2015 Neil Fuller <nfuller@google.com> resolved conflicts for merge of 962a11ad to master

Change-Id: I8c6ac62d7267629c019997bb343d863aa56264eb
efd92907898161efe466889d2229e4acde2e973c 31-Mar-2015 Neil Fuller <nfuller@google.com> am 25c5296b: Merge "An updater for all timezone data on a device"

* commit '25c5296b0d85979ad216195000b857dce8127ab1':
An updater for all timezone data on a device
1c1b47125da018b44240739db75f8898e064a948 20-Nov-2014 Fabrice Di Meglio <fdimeglio@google.com> Add IntentFilter auto verification

The purpose of this feature is to prompt the Disambiguation dialog
to Users as less as possible.

- add the new "autoVerify" property to the IntentFilter class
- add new APIs to PackageManager:
verifyIntentFilter(int, int, List<String>),
getIntentVerificationStatus(String, int),
updateIntentVerificationStatus(String, int, int),
getIntentFilterVerifications(String)
for supporting IntentFilter verification
- add support for multi-user
- update PackageManager for IntentFilter verification:
basically when we are installing a new package, ask for verification
of all domains from the IntentFilters that have the "autoVerify" to true.
This means that the PackageManager will send a well defined protected
broadcast (with a new INTENT_FILTER_NEEDS_VERIFICATION action) to
an IntentFilter verifier to do the real job of verification.
We are passing in the broadcast Intent all the necessary data for
doing the verification. The PackageManager will receive as response
the result code of the domain verifications and, if needed, the list
of domains that have failed the verification.
- add a new INTENT_FILTER_VERIFICATION_AGENT permission that needs to
be set by an intent filter verifier to be considered as a trustable
party by the PackageManager.
- add also a new BIND_INTENT_FILTER_VERIFIER permission for securing
the binding between the PackageManager and a service doing the
intent filter verifications.
- add ResolveInfo filterNeedsVerification which is a boolean
to knows if the IntentFilter is of a type that needs a verification
(action VIEW, category BROWABLE, HTTP/HTTPS data URI)
- add new "domain-preferred-apps" / "d" dump command for listing the
prefered Apps for all domains
- add new "intent-filter-verifiers" / "ivf" command for listing the
IntentFilterVerifier used
- introduce the IntentVerificationService which is a basic service
for verifying IntentFilters. This service will send HTTPS requests
to the domain declared in the IntentFilter(s) for doing the
verification. This service has a low priority level so that it
can be replaced by a more sophisticated one if needed. This service
is updating the PackageManager intent verification states thru
the updateIntentVerificationStatus(...) API.
- update MockPackageManager

Change-Id: I0bfed193d0bf1f7c7ac79f6c1b160b7ab93b5fb5
/frameworks/base/core/res/AndroidManifest.xml
5a680f2e2738137f1566da57ac978b3ff33fb0da 13-Mar-2015 Neil Fuller <nfuller@google.com> An updater for all timezone data on a device

The existing one, being deleted here, did not work properly: it only
updated the file used by libcore and bionic, it did not update the ICU
data.

Most of the installation logic exists in code in libcore/tzdata that is
independent of the server code so that it can be tested.

Bug: 19941636
Change-Id: Id0985f8c5be2f12858ee8bf52acf52bdb2df8741
/frameworks/base/core/res/AndroidManifest.xml
a223d658306fea5c0a6d30c9850058d5afadb2d1 25-Mar-2015 Bryce Lee <brycelee@google.com> am 3309be5e: am 21b7e6de: am c831b978: Merge "Add isScreenBrightnessBoosted and a broadcast when underlying value changes." into lmp-mr1-modular-dev

* commit '3309be5e7bc782d89adaf4abca5f1f81649c655f':
Add isScreenBrightnessBoosted and a broadcast when underlying value changes.
9c5dfa5c79fff17f96bf977b86c0c9ceb8c3cf9b 23-Feb-2015 Zoltan Szatmary-Ban <szatmz@google.com> Data Usage public API

Added new API consisting of android.app.usage.NetworkUsageManager and
android.app.usage.NetworkUsageStats. Through them data usage on a
network interface can be programmatically queried. Both summary and
details are available.

Bug: 19208876
Change-Id: I0e0c4b37ae23ad1e589d4b0c955b93f28ba4333e
/frameworks/base/core/res/AndroidManifest.xml
84d6c0fbf6e513d68330234503b809751d0e3564 17-Mar-2015 Bryce Lee <brycelee@google.com> Add isScreenBrightnessBoosted and a broadcast when underlying
value changes.

Bug: 18334219
Change-Id: I20051e97633017711574a063b8061f95c3b616c5
/frameworks/base/core/res/AndroidManifest.xml
6597e3435f8abfedbb9a4f1bfb10cc17ea7f38bf 17-Feb-2015 Christopher Tate <ctate@google.com> Notification listener backup & restore

We now back up & restore the set of enabled notification listeners. Post-
restore, a listener that had been enabled on the ancestral device will be
enabled on the current device as soon as it's installed, matching the
user's previous configuration. After this has happened the enable/disable
state for that app is not "sticky"; disabling it again will work as
expected.

The infrastructure for accomplishing this is general: it can be leveraged
by any ManagedServices derivative. There's a bit of extra wiring in the
settings provider to support the restore-time information flow as well.
This is because ManagedServices -- like many other parts of the system --
monitors writes to the settings provider and does work in response to new
writes of the elements that it cares about. Unfortunately this means that
there is no way to use the BackupAgent's restoreFinished() hook to post-
process the restored data: by the time it is run, the ManagedService's
observers have already executed and culled any unknown components from
the description that was just pushed into settings.

As of this patch, the settings provider's restore logic knows that a
particular settings element will require a message to interested observers
about the restore-driven change. The message is delivered as a broadcast,
and is sent after the new value has been committed to the settings db.
Adding other system ManagedService handling that parallels this will only
require adding a new corresponding entry to the table of individual settings
for which the relevant "this settings element is being restored" broadcast
is sent, found in SettingsHelper.

(It isn't sent for all settings elements because very few settings elements
have semantics that require it; 3rd party code won't be running yet during
platform restore anyway; and sending up to hundreds of broadcasts during
setup & restore is far from ideal.)

Bug 19254153

Change-Id: Ib8268c6cb273862a3ee089d2764f3bff4a299103
/frameworks/base/core/res/AndroidManifest.xml
b9a5e4ad30c9add140fd13491419ae66e947809d 04-Mar-2015 Dianne Hackborn <hackbod@google.com> Add new debug feature to automatically create heap dumps.

Not yet working, unless you turn off SELinux enforcing.
We need to update SElinux to allow the system process
to give apps access to /data/system/heapdump/javaheap.bin.

Currently watching can only be enabled through the shell,
such as:

adb shell am set-watch-heap com.android.systemui 1024

The last number is the process pss size in bytes, so this is
asking us to warn if it goes about 1K which will be all the
time.

Change-Id: I2089e5db2927afca0bf01a363c6247ee5dcb26e8
/frameworks/base/core/res/AndroidManifest.xml
e30c9af3566cfa14796144b352230709c7b5647d 28-Feb-2015 Adam Powell <adamp@google.com> Add ChooserTargetService API

A ChooserTargetService can be implemented by apps that wish to offer
additional deep-link targets for the system intent chooser to in turn
offer to the user. This allows apps to create contextually relevant
shortcuts for UI flows that would otherwise require several steps of
explicit disambiguation. For example, a chat app might offer one-touch
access to recent conversations when sharing a photo to it from
elsewhere.

The chooser implementation must limit the number of
ChooserTargetServices it elects to query in order to respect available
system resources. Only the system chooser is permitted to bind to a
ChooserTargetService.

Change-Id: Ia7e075ee649c51cf2035f20aee166c5a27d91aeb
/frameworks/base/core/res/AndroidManifest.xml
73570db59f9178cf3a8affe943e96808ac404049 27-Feb-2015 Christopher Tate <ctate@google.com> Use scheduled job rather than periodic alarms for key/value backups

Instead of a runs-forever periodic alarm that drives key/value backup
passes, we instead schedule-on-demand a trigger job that will kick off
the pass after a batching interval. The key semantic change is that
we now never wake for key/value backup work unless we've been explicitly
asked to do so. We also use a rather longer batching interval than
was previously the case.

Bug 19536032

Change-Id: Ie377562b2812c9aeda0ee73770dfa94af6017778
/frameworks/base/core/res/AndroidManifest.xml
ba67aee02cf864793129976cd8a8a46e60c60577 21-Feb-2015 Jim Miller <jaggies@google.com> Add fingerprint settings support to the framework

- cleanup thread issue and simplify native FingerprintService methods
- add new permissions and enforce them
- add fingerprint hardware detection API

Change-Id: I87c2243ea2412061f1e85b044138480d0161bcdf
/frameworks/base/core/res/AndroidManifest.xml
cfb3185a27efeb9312ddf71f52f3a7039c4694df 25-Feb-2015 Filip Gruszczynski <gruszczy@google.com> am 0fbcc708: am 1e74b5d6: Merge "Burn in protection." into lmp-mr1-modular-dev

* commit '0fbcc7086fe742e641915ed5f097119d01613cb5':
Burn in protection.
d2e8640c2c1972d4f2e92d48660fa9e17d9291c4 19-Feb-2015 Filip Gruszczynski <gruszczy@google.com> Burn in protection.

Bug: 19373758
Change-Id: I7242f73acadd21bdee03262b4205c8af0734fccb
/frameworks/base/core/res/AndroidManifest.xml
98a0b38819acab3c6068663435cdaeed5a69d4db 27-Jan-2015 Mike Lockwood <lockwood@google.com> AndroidManifest.xml: Remove two obsolete protected broadcasts

android.media.action.USB_AUDIO_ACCESSORY_PLUG and android.media.action.USB_AUDIO_DEVICE_PLUG
were removed in a previous change.

Change-Id: I22d09b9a0eb4f6f29a31a50ed8bfa7e09c52b064
/frameworks/base/core/res/AndroidManifest.xml
5f86b66c9bd9276f31255fc372631e532dd5d974 06-Jan-2015 Dianne Hackborn <hackbod@google.com> am 24bc8d76: am 29807195: Merge "Fix issue #18901214: APR: Frequent crash in android" into lmp-mr1-dev
automerge: d17218e

* commit 'd17218e7df24da8a2bcf6e7714dc0151155c3286':
Fix issue #18901214: APR: Frequent crash in android
b182955a1eabc30d3cf70856f838b46a91c34569 05-Jan-2015 Dianne Hackborn <hackbod@google.com> Fix issue #18901214: APR: Frequent crash in android

The ShutdownActivity was implemented in the system server
code, which is no longer part of the boot class path. This would
work fine when requesting a shutdown from the primary user, since
in that case the activity would be loaded in to the main system
process which also has the system service code loaded.

However, when executed from a secondary user, we need to spin up
a new system process for it; that system process is just a regular
app process, without the system service code, so *boom*.

To fix this, move ShutdownActivity to the framework jar.

Change-Id: Icb831cd6ed619da5feede5605c45ef177a892fbc
/frameworks/base/core/res/AndroidManifest.xml
a0973778ca5d67e13149ee8ad46a916663fe3d48 09-Dec-2014 Jing Zhao <zhaojing@motorola.com> am 8d50d0fb: am 23ad6efb: am df1d07b4: Add checking to find AppDirectedSmsProxy for App Directed SMS feature

* commit '8d50d0fb27c1958dbd047bb8a46d7183d873f131':
Add checking to find AppDirectedSmsProxy for App Directed SMS feature
8b3f47b35a303ed21bf41162d2979843d50e6039 09-Dec-2014 Cheuksan Wang <edwang@google.com> am 673f443f: am 695b5d25: am 0752da22: Merge "add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE" into lmp-mr1-dev

* commit '673f443f7e92956399c322b31a14178436fa723b':
add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE
df1d07b4c77bcc8928b2e5360440aa9b69a6cd21 05-Dec-2014 Jing Zhao <zhaojing@motorola.com> Add checking to find AppDirectedSmsProxy for App Directed SMS feature

Adding new system permission android.permission.CARRIER_FILTER_SMS

Bug: 18609762
Change-Id: I80a133653101cd4ec1793e726faf3601e2970224
/frameworks/base/core/res/AndroidManifest.xml
981344861cdea72580964d6936dcf2e2dd9ff439 05-Dec-2014 Cheuksan Wang <edwang@google.com> add system|signature protection to
android.permission.BIND_CARRIER_MESSAGING_SERVICE

Bug: 18005911
Change-Id: Iacb16a20c5cef4a55be0187af0a47e0cb82b409b
/frameworks/base/core/res/AndroidManifest.xml
412766a7d6e7b208cd347f90a776d3aff2fd2e2f 04-Dec-2014 Cheuksan Wang <edwang@google.com> am 29ac679f: am dba26aa2: am 109ec376: Merge "new SMS/MMS carrier app API" into lmp-mr1-dev

* commit '29ac679f9f85a68eca03c262e740d62f8af66797':
new SMS/MMS carrier app API
109ec376da86de1275f73fa432d6344431a457e9 04-Dec-2014 Cheuksan Wang <edwang@google.com> Merge "new SMS/MMS carrier app API" into lmp-mr1-dev
008dfadb31f58efbd7bd99b3d3e5d6ee21d68c05 02-Dec-2014 Mike Lockwood <lockwood@google.com> Remove obsolete AudioManager audio dock plugged Intents

We have no code that listens for AudioManager.ACTION_ANALOG_AUDIO_DOCK_PLUG
and AudioManager.ACTION_DIGITAL_AUDIO_DOCK_PLUG

Change-Id: I96a746c84e5a4b17df1b9fbdbb5de77e6bc39714
/frameworks/base/core/res/AndroidManifest.xml
b72eb97e4bca1e4fd68e79f9d04e9a6a15aebd21 22-Nov-2014 Cheuksan Wang <edwang@google.com> new SMS/MMS carrier app API

Changes based on api council review

BUG: 18005911
Change-Id: I23bd207ce70f7fa201d6d964c1700cfc44cb009b
/frameworks/base/core/res/AndroidManifest.xml
8f70a2558b44f8ad56eb48eeadc4ec3ba698cd34 25-Nov-2014 Andres Morales <anmorales@google.com> am ffc71028: am 83f4847f: am 59093d92: Merge "Define permission for system apps to query size of block" into lmp-mr1-dev

* commit 'ffc710281c38aba9546d200a25d6b19b0f85470a':
Define permission for system apps to query size of block
6b0c7acd7f175552d90d1d73b9717ff347158e7d 24-Nov-2014 Andres Morales <anmorales@google.com> Define permission for system apps to query size of block

Allows ManagedProvisioning to determine whether there's a
challenge and thus whether to disable NFC provisioning.

Other implementation option: new hidden boolean API method.
Can't think of benefit of new API method "isBlockInUse", other
than doesn't leak PDB size and is more explicitly tied to the
use case. Open to either impl if anyone has opinions on the matter.

Bug: 18508767
Change-Id: I28d2eb5a0837ff85cb91f140b17ce1dd843fe9d6
/frameworks/base/core/res/AndroidManifest.xml
c79924f7412d527f640595bc2ad9f2ab631e83b7 18-Nov-2014 Jeff Davidson <jpd@google.com> am b431a198: am e6bc5adf: am e0cb56b0: Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev

* commit 'b431a198ec255be7efb30b4c81a779a4eb5009f6':
Enforce VPN control "permission" with an actual permission.
e0cb56b02eb2bb52a537b32c5d3f5360b9718c8a 17-Nov-2014 Jeff Davidson <jpd@google.com> Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev
e3435feed48ecd1f37904f48ebb7e39dc9456d03 14-Nov-2014 Abhijith Shastry <ashastry@google.com> am 0f064207: am 530f25d6: am fb8db1c8: Merge "new sms/mms carrier app API" into lmp-mr1-dev

* commit '0f0642075e42f415d7f5244c5d94fe726756afa0':
new sms/mms carrier app API
fb8db1c84b7fd59f596a6c090a8035fab08ef2f5 13-Nov-2014 Abhijith Shastry <ashastry@google.com> Merge "new sms/mms carrier app API" into lmp-mr1-dev
f9c50c45c615338bf9bfe57cd1ecff490051c997 22-Oct-2014 Cheuksan Wang <edwang@google.com> new sms/mms carrier app API

BUG: 18005911

Change-Id: Ib961badc1ccac270f1244f8d971d9abec324b73f
/frameworks/base/core/res/AndroidManifest.xml
bc19c181c8c058c824e4fee907a05129e142c388 11-Nov-2014 Jeff Davidson <jpd@google.com> Enforce VPN control "permission" with an actual permission.

The current implementation uses a whitelist of package names. Use a
system|signature permission instead of rolling our own security and
add that permission to the existing set of whitelisted packages
(SystemUI and VpnDialogs).

In addition to being less of a security risk (using well-known methods
like Context.enforceCallingPermission rather than manually querying
PackageManager and checking UIDs for package names), this enables
other system-privileged apps to control VPN as needed per the below
bug.

Bug: 18327583
Change-Id: I38617965c40d62cf1ac28e3cb382c0877fb1275d
/frameworks/base/core/res/AndroidManifest.xml
3b54b6d78ccb653bcb7a24f55cdf0ac1b999ead9 11-Nov-2014 Alan Viverette <alanv@google.com> am cf7f3b6b: am a9b503ae: Merge "Fix Material styling in remaining dialogs and layouts" into lmp-mr1-dev automerge: 0aaebd4

* commit 'cf7f3b6be252f313536e58cc62763075d4f45e5a':
Fix Material styling in remaining dialogs and layouts
f89b58ca834de833fe45130f49270b3743240b2e 11-Nov-2014 Alan Viverette <alanv@google.com> Fix Material styling in remaining dialogs and layouts

Also updates existing row and dialog layouts to use preferred list item
or dialog padding as appropriate, fixes incorrect activity themes, and
updates ChooseAccountActivity variants for Material.

BUG: 18314215
BUG: 18292562
Change-Id: I2fde4ba6db80d839104abdaa334a46ad1861600f
/frameworks/base/core/res/AndroidManifest.xml
12fc80b2b207612f58fa057b8372bef3f32c9d29 10-Nov-2014 Evan Charlton <evanc@google.com> am 13cf9cf1: am 3caf6fc7: Merge "Apply @hide / @SystemApi to android.telecom.*" into lmp-mr1-dev automerge: e2e649f

* commit '13cf9cf1d3f426d82a2af46c36bdf308ff43d428':
Apply @hide / @SystemApi to android.telecom.*
0e094d926c306c3667bcdf6f23c52cc7181f25f3 09-Nov-2014 Evan Charlton <evanc@google.com> Apply @hide / @SystemApi to android.telecom.*

Move the android.telecom.* namespace back to @hide, and also mark it
with @SystemApi so that system-privileged apps can use them.

Bug: 18302450
Change-Id: I33ae1b9b0dfdb1c5eff51ca3c829196bcfc9411c
/frameworks/base/core/res/AndroidManifest.xml
3527aa01cdb35f4bfad4e2f5b062c1a47838b224 05-Nov-2014 Jeff Davidson <jpd@google.com> am fb68a976: am dd40ccf3: am b42bdef5: Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev

* commit 'fb68a9762087a262146eec5d0e0d3fbdbdf25b6b':
Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED.
b42bdef51c5a4de44333ad268f25df1aac5ab880 05-Nov-2014 Jeff Davidson <jpd@google.com> Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev
161977998feebf0a855ea56558464470877040cf 04-Nov-2014 Jeff Davidson <jpd@google.com> Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED.

This is necessary/desired for two reasons:

1. UX around network scoring shipped with L despite lacking underlying
platform support. We do not want network scoring applications to
trigger this UX on L devices, and therefore we must break the contract
of what defines a network scorer so that apps build against the new
contract don't trigger the old UX.

2. As a start towards generalizing the term "score" for a potentially
broader role in the future, though that role is very much undefined.

Bug: 18160480
Change-Id: If228977513e32e45bc44dbeda24aa18436fdfca6
/frameworks/base/core/res/AndroidManifest.xml
71a4f2129f33df6a4ef1efeb00af0f449aae2d45 03-Nov-2014 Santos Cordon <santoscordon@google.com> am 082f4978: am 04f3eebe: am 27be7b35: Merge "Split Telecom PhoneAccount registration permissions." into lmp-mr1-dev

* commit '082f49786ec25b254992781a5ad3c67e75ceb8ee':
Split Telecom PhoneAccount registration permissions.
2ef87ee728e7ac76c9199f0b75c96835991c0ceb 31-Oct-2014 Santos Cordon <santoscordon@google.com> Split Telecom PhoneAccount registration permissions.

Bug: 18106506
Change-Id: Ic825b44c2dc42709073a3990f6a7ca8e372025e9
/frameworks/base/core/res/AndroidManifest.xml
b2dda6903131d7534fc2e92d0049f05821f36210 28-Oct-2014 Evan Charlton <evanc@google.com> am 4d4b2cfd: am 2ad5eb53: Merge "Move telecom permission to the public API" into lmp-mr1-dev automerge: 8e25057

* commit '4d4b2cfd4c611800787b71d0896c6d8781875732':
Move telecom permission to the public API
cef5a5404a7c61667883cc1fdff842355bc511e9 25-Oct-2014 Evan Charlton <evanc@google.com> Move telecom permission to the public API

Make REGISTER_PROVIDER_OR_SUBSCRIPTION and REGISTER_CONNECTION_MANAGER
part of the public API so that they can be used by third-party apps.

Bug: 18114695
Change-Id: I1b8578cbc82e95ea78b4a2166f4a23650a0c375f
/frameworks/base/core/res/AndroidManifest.xml
be11d12462c800d3a7770b2871b1c31128f688fd 20-Oct-2014 Wink Saville <wink@google.com> am f9bec04d: am f4d86a1d: am f44628e3: am 6bacccbf: Merge "Radio Capability Support." into lmp-sprout-dev

* commit 'f9bec04d89ce6270d71b738be341f3e443abcce5':
Radio Capability Support.
2af2d57d578e0c3a2740628e7c6336b19961cc49 18-Oct-2014 Wink Saville <wink@google.com> Radio Capability Support.

New design of capability switch for L.
Add new RIL requests:
RIL_REQUEST_GET_RADIO_CAPABILITY
RIL_REQUEST_SET_RADIO_CAPABILITY
RIL_UNSOL_RADIO_CAPABILITY

These commands allow the framework to communicate what the Radio
Capabilities for each logical modem has or should be using.

It can support 2/3/4G switch and has flexible architecture to support
future technology.

Change-Id: Iedf7f608d2ba3c06a883500f2d85abb98e69d9c1
/frameworks/base/core/res/AndroidManifest.xml
0e8b697f2348a317c5eeaee9b6342d6089c4675c 18-Oct-2014 Yorke Lee <yorkelee@google.com> am 76e3689b: am 438723e6: am a801d349: am 9621b793: am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev

* commit '76e3689b45189902a85b06de22053cfa5d25a1cd':
Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
9621b79396303037a86eb2639035b12080c858bf 18-Oct-2014 Yorke Lee <yorkelee@google.com> am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev

* commit 'e4e3fcec415cdc9739f32ce1eaaec67666e5454d':
Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
65d241b92db36e8f14d08efc6f35a91481b0d73d 17-Oct-2014 Yorke Lee <yorkelee@google.com> Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions

Bug: 18020724
Change-Id: I5a0e5ef8a1e40ee23f4b132f5877b63a738e776e
/frameworks/base/core/res/AndroidManifest.xml
fa72516ac9cf6eeb3a08711c7cf35e31479d5a7d 14-Oct-2014 Amit Mahajan <amitmahajan@google.com> am ed454542: am 38e48c2f: am 3547c13e: am 097c8d60: am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev

* commit 'ed4545423b0166f2436adee077d11b85b62ed07a':
Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
097c8d60115a9207ba4140ef99766741a2256361 14-Oct-2014 Amit Mahajan <amitmahajan@google.com> am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev

* commit '1901e175079e3b7242ace7d4b3ec38af3723f91b':
Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
1901e175079e3b7242ace7d4b3ec38af3723f91b 13-Oct-2014 Amit Mahajan <amitmahajan@google.com> Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev
59a24d6ca9a888b90a1b8ae348b79359d205da78 13-Oct-2014 Mike Lockwood <lockwood@google.com> am 4dd24730: am b3bab92e: am 0a4e2245: am 8ca4886e: am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev

* commit '4dd247305f4e4f3b3a7a9f52a8d1a9c6641391f3':
Change RECEIVE_BLUETOOTH_MAP permission to signature or system
8ca4886e439685fdcb1eff4c3552a62522ebeeb0 13-Oct-2014 Mike Lockwood <lockwood@google.com> am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev

* commit '317f9ce85a492a213b8f1dac477b1aefad55f621':
Change RECEIVE_BLUETOOTH_MAP permission to signature or system
5742335cbdb1c84a88a8ed12240316271fbb0f25 13-Oct-2014 Amit Mahajan <amitmahajan@google.com> Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to
signatureOrSystem.

Bug: 17952946
Change-Id: I4a75da11cb092ca795d0eacf824890eb12c7446a
/frameworks/base/core/res/AndroidManifest.xml
6e383350e4e06b31b885812c5d9df82761a41269 13-Oct-2014 Mike Lockwood <lockwood@google.com> Change RECEIVE_BLUETOOTH_MAP permission to signature or system

Bug: 17954105
Change-Id: I8b16cab7193c97e5f54d6e4ef33ebf8cda0da197
/frameworks/base/core/res/AndroidManifest.xml
a3bfb7808409d06182e8a4e0a9b3bb70da55bf8d 08-Oct-2014 Dan Sandler <dsandler@android.com> am d23fa0f6: am 97a7fbfb: am 621fa30c: am 9eef8749: am 2200f86f: All (er, L) is finally revealed.

* commit 'd23fa0f65077ba83d7b9b24805096f2b4532b9da':
All (er, L) is finally revealed.
9eef8749232c00afad5ca3c26736c0be785cb8c1 08-Oct-2014 Dan Sandler <dsandler@android.com> am 2200f86f: All (er, L) is finally revealed.

* commit '2200f86f800876d005f911e6864708fa9772d03a':
All (er, L) is finally revealed.
2200f86f800876d005f911e6864708fa9772d03a 06-Oct-2014 Dan Sandler <dsandler@android.com> All (er, L) is finally revealed.

If you exceed 20000 points, please send in a screenshot.

Bug: 15984887
Change-Id: I1164160bfa8e7dca3b9e7d7ca5d50ef9abd38b61
/frameworks/base/core/res/AndroidManifest.xml
22dbaddf58144ea847c9aa617be0e77114f3f7c3 06-Oct-2014 Dianne Hackborn <hackbod@google.com> am 8b718b80: am db75703b: am 2f577e83: am 90d557b7: am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev

* commit '8b718b80e0caf179a174f8417fe4f5b875297de6':
Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
90d557b7a68e64e049a44560b76b959ef87f13d7 06-Oct-2014 Dianne Hackborn <hackbod@google.com> am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev

* commit '7f7d240b13b96b617e298c6178af0425308f5ef9':
Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
2d7576b082b84068fb9d68419b710b9bec49139b 04-Oct-2014 Dianne Hackborn <hackbod@google.com> Fix issue #17752399: Multiple apps broken by GET_TASKS permission change

Keep around GET_TASKS as a permission available to apps, so apps still
think they have it and don't get all uppity because they don't.

Add a new REAL_GET_TASKS that is the actual permission now.

Plus some temporary compatibility code until everyone can transition
fromn GET_TASKS to REAL_GET_TASKS.

Change-Id: I12c1102eed24844685dcbd2fa3b612811603958f
/frameworks/base/core/res/AndroidManifest.xml
f75866cba095cfe8247e87aafa4162abba37fdbb 02-Oct-2014 Benson Huang <benson.huang@mediatek.com> am cea4f7ac: am 19766ff9: am 398de894: am 981258e5: [FM] Add FM permission to support FM radio app

* commit 'cea4f7acb40b495c137e1ac6c9eb57b3ddfa2c34':
[FM] Add FM permission to support FM radio app
981258e5f957899b034a98ebebade1f0366f506a 23-Sep-2014 Benson Huang <benson.huang@mediatek.com> [FM] Add FM permission to support FM radio app

Add FM permission like KK to support FM radio app.

Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9
Signed-off-by: Benson Huang <benson.huang@mediatek.com>

Conflicts:
data/etc/platform.xml
/frameworks/base/core/res/AndroidManifest.xml
3e3857c4f5d277c69bcb0ff3a581a176f3a84bf8 22-Sep-2014 Sky Faber <skyf@google.com> Separate wifi AP added by applications.
-Add field for tracking user approval of application added networks.
-Add WifiConfig fields for creating/updating application name
-Add permission to allow system apps to modify any network

Bug: 16953082

Change-Id: I12943563ef714c4287e13488578f020d136d006d
/frameworks/base/core/res/AndroidManifest.xml
4b4d68534155e6a2776e2cc7f2168307fd55cb1f 19-Sep-2014 Wink Saville <wink@google.com> am 1ddcdc2d: Merge commit \'e58e59cc\' into fix-merge-conflict

* commit '1ddcdc2d1cef6387612923ad3f9e73de12727dc1':
ksd to lmp-sprout-dev
f067f8fb16dd0778ef75b44d7323a07fe1ba52c3 16-Sep-2014 Edward Jee <edjee@google.com> am 84d05ed5: am 8a20c56f: am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev

* commit '84d05ed5a229186c7859013327887f6af7ef4a29':
Adds APIs for Bluetooth PBAP and MAP access permission.
d796159bbb14fce247177ad25aabd70038437181 16-Sep-2014 Edward Jee <edjee@google.com> am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev

* commit 'c172b2090317b158974bc73d8baa141449a1d784':
Adds APIs for Bluetooth PBAP and MAP access permission.
1bbfcc2fdcbe72a69477b0395ea92f777efb7c9d 16-Sep-2014 Edward Jee <edjee@google.com> Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev
02e3979d62bf4b85fe7dedeefa357748419db992 15-Sep-2014 Wink Saville <wink@google.com> Merge commit 'e58e59cc' into fix-merge-conflict

* commit 'e58e59cc':
ksd to lmp-sprout-dev

Conflicts:
core/java/android/provider/CallLog.java
telephony/java/android/telephony/SubInfoRecord.java
telephony/java/android/telephony/SubscriptionManager.java
telephony/java/android/telephony/TelephonyManager.java
telephony/java/com/android/internal/telephony/ISub.aidl
telephony/java/com/android/internal/telephony/TelephonyIntents.java

Change-Id: I2b892b692743a7ccde55185a2b90135bf28408cd
613d076fa58bc4d48d5e0e197300a1f1be7c3dbb 11-Sep-2014 John Spurlock <jspurlock@google.com> am 56e64b2a: am 88c61af5: am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev

* commit '56e64b2a589a09786caa1eb1d9bfa59292a227f2':
Zen: Make condition providers available via @SystemApi.
7456ae83e8ae6ad3081a4a31589c1569b985be93 10-Sep-2014 John Spurlock <jspurlock@google.com> am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev

* commit '3a972844e934b1031d73bfb114d84a7d2f8d4b19':
Zen: Make condition providers available via @SystemApi.
bf4e41747d138bf89c6c3fa5076a38334d3b45e1 10-Sep-2014 John Spurlock <jspurlock@google.com> Zen: Make condition providers available via @SystemApi.

Bug:16819503
Change-Id: Ibd7004f7a0928d3f14f9ccd55088cf645d5285e2
/frameworks/base/core/res/AndroidManifest.xml
0a2cfc629698e17657adaf58ad67aa8b58dda653 10-Sep-2014 Adam Lesinski <adamlesinski@google.com> am 2feb9c9a: am 2413aa58: am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev

* commit '2feb9c9a5153136d6d0f4d32859113fc1ebe6a4f':
Make UsageStats API default on only for the system
ActivityManager shouldn't return null for getCurrentUser
7137ee38cbfeb01b6e19b5e4b2588e765b5a56c6 10-Sep-2014 Adam Lesinski <adamlesinski@google.com> am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev

* commit '38bd55ffd7084d744e4e814593056e1e12ebfb00':
Make UsageStats API default on only for the system
ActivityManager shouldn't return null for getCurrentUser
8dd30aadaf133fe1b8974847efdd5b8cf285136d 05-Sep-2014 Edward Jee <edjee@google.com> Adds APIs for Bluetooth PBAP and MAP access permission.

Currently, users' preference in phonebook and call history or message
access per each Bluetooth-paired device is stored in Settings application's
shared preferences.

However, some privileged applications other than Settings need to access
such data. So we decided to migrate the data from Settings application's
shared preferences to Bluetooth application's.

Bug: 17158953
Change-Id: I3771f03eaea3f57cf60d93ab9fd41c9eb3e1e99c
/frameworks/base/core/res/AndroidManifest.xml
6590d7c75c1d706f70ebf6a5594d6a7601c080df 09-Sep-2014 Adam Lesinski <adamlesinski@google.com> Make UsageStats API default on only for the system

This changes the PACKAGE_USAGE_STATS permission to be
a signature only permission, meaning that only apps
signed with the system signature have access to the
UsageStats API enabled by default.

Bug:17428130
Change-Id: I79ba54d7102c770ea2490f014a1f6736f0f46b3a
/frameworks/base/core/res/AndroidManifest.xml
067a1780f56f6a883544fe3a9e93c590999d32d9 06-Sep-2014 Jean-Michel Trivi <jmtrivi@google.com> am c16a3a6c: am c256b10b: am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev

* commit 'c16a3a6ca2235554c4232651fca4c84af5ceded9':
Update the broadcasts reserved to the system
91488f464db3753d1534fb4d16cde2c90abd8126 05-Sep-2014 Jean-Michel Trivi <jmtrivi@google.com> am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev

* commit 'aa82a6c7adc6de4ec3f843328f7bb207aa6540ec':
Update the broadcasts reserved to the system
26d6ff0b2406d2917b6ad1f6dd7b35450b0044fc 03-Sep-2014 Jean-Michel Trivi <jmtrivi@google.com> Update the broadcasts reserved to the system

The action value for all AUDIO*PLUG broadcasts has been changed
from "android.intent" to "android.media". This value needs to
be updated in the core manifest too as part of the broadcasts
that only the system can send.

Bug 17289385

Change-Id: Ibc0f4139c28ce863f85efc24ff0fcb81ab12ce21
/frameworks/base/core/res/AndroidManifest.xml
05e6dde3a0b9ba1eb3d13d511fe2e27a0d10c851 01-Sep-2014 Wink Saville <wink@google.com> ksd to lmp-sprout-dev

Change-Id: I94eb65c62231b5831570bb0cbbbd9c916bee0a37
/frameworks/base/core/res/AndroidManifest.xml
070bf912a25b6cf3b7051b2b6710dc20a7386c4c 27-Aug-2014 Christofer Åkersten <akersten@google.com> am c957fa3b: am 8ddbb2cf: am e7a96447: Merge "Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS" into lmp-dev

* commit 'c957fa3bcc42ebed337582f98c8ebb8f2d1148e5':
Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS
9dd43afbb9f041e807d2051478e861c556f0771f 26-Aug-2014 Sungsoo Lim <sungsoo@google.com> Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS

Bug: 16948874
Change-Id: If44aaa7085705e8a2f55c71dae61bf6ac0cdfc09
/frameworks/base/core/res/AndroidManifest.xml
4b40c24877ce2074c03aeb23adade3756ff320a1 25-Aug-2014 Jeff Brown <jeffbrown@google.com> am d35615ce: am fdfd79f2: am 6a276cec: Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev

* commit 'd35615ce7a0ffd477d0dae8d098813d62e92a7db':
Poke interactive hint from userActivity and add @SystemApi.
d7761be23d30b5e9ca9c07998af27e704d2a7ae2 23-Aug-2014 Jeff Brown <jeffbrown@google.com> Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev
6be3d49339ba719e68cf44a16becb6866355238e 22-Aug-2014 Amith Yamasani <yamasani@google.com> am 21ecfce5: am 0c581229: am 654d72fd: Merge "Show a user switching dialog before starting the user switch" into lmp-dev

* commit '21ecfce5be747dd676cc0b5f0452408fd9280766':
Show a user switching dialog before starting the user switch
7805a10c86a2de9fb5ddf41d63075eef342a59ea 22-Aug-2014 Amith Yamasani <yamasani@google.com> Show a user switching dialog before starting the user switch

switchUser() now first shows a dialog and the dialog calls
startUserInForeground to do the actual switch.

Bug: 16661752
Change-Id: Ie4e2e9eec8bf7c2116694072ea8555b8254a0e13
/frameworks/base/core/res/AndroidManifest.xml
0a571123544058578b4ef1558c276a4050519652 22-Aug-2014 Jeff Brown <jeffbrown@google.com> Poke interactive hint from userActivity and add @SystemApi.

Previously we only poked the interactive hint for input events that
were dispatched through the regular input system. However, when
using a car dock in projection mode input events are directly
delivered to apps by other system components, bypassing user activity.
So now we poke the interactive hint on all user activity.

Added an @SystemApi version of userActivity.

Added a new signature|system permission called USER_ACTIVITY
to allow system apps to poke userActivity. For now it seems
prudent to keep DEVICE_POWER signature only.

Bug: 17043684
Change-Id: Ia84bd03083065b8938a9853c08901fbf71b2e56b
/frameworks/base/core/res/AndroidManifest.xml
369fcc5e79d24e8e56aed5c9b83e0a07039aff66 19-Aug-2014 Tyler Gunn <tgunn@google.com> am e4df8728: am 084c98b4: am d324e32f: Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev

* commit 'e4df8728312f9d289c096ba804816e3091c2a125':
Exposing in-call API to other implementing classes. (1/4)
198ca696fb318380dee5ae9f4f3e47114d74ed14 19-Aug-2014 Michael Wright <michaelwr@google.com> am 7814d9f0: am 4bbb811f: am 504960cb: Merge "Add callbacks for MediaProjection start / stop." into lmp-dev

* commit '7814d9f05d202625280210269c89655013dce3de':
Add callbacks for MediaProjection start / stop.
d86ecd26d78c7bcd7f820b9ef5e3f4c3eb037510 13-Aug-2014 Michael Wright <michaelwr@google.com> Add callbacks for MediaProjection start / stop.

Also, enforce that there is only one valid MediaProjection at a time.

Bug: 16488053
Change-Id: Id05445d798c98cb208bc4dab186296392e15d30b
/frameworks/base/core/res/AndroidManifest.xml
b135d06cb83db03b1328b7a82f064de7868fb16f 20-Aug-2014 Jeff Brown <jeffbrown@google.com> Remove incomplete media router API. (DO NOT MERGE)

Change-Id: I310fadafb5a6b8190a32e5d87f3e1823c87bcef7
/frameworks/base/core/res/AndroidManifest.xml
50cddeca1f6f66ccc3dbfd526aee621e1b87a516 19-Aug-2014 Tyler Gunn <tgunn@google.com> Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev
2ac401093e5ebb975f14e5108d457c148370f7de 19-Aug-2014 Tyler Gunn <tgunn@google.com> Exposing in-call API to other implementing classes. (1/4)

- Adding service_interface constant to InCallService.

Bug: 16133960
Change-Id: I4ace89bc3300428d2c56ed43e47ccd12a9f9748a
/frameworks/base/core/res/AndroidManifest.xml
19caa123d623fdfd55cba0ae8a2bcb519ce9e7e6 16-Aug-2014 Tyler Gunn <tgunn@google.com> am 3ec54522: am 5c0aa11d: am fbcb50db: Merge "Add BIND_CONNECTION_SERVICE permission." into lmp-dev

* commit '3ec545229af4be3a45583170a2509d9ad4161c04':
Add BIND_CONNECTION_SERVICE permission.
0dae9a4cfa9d51cadb0f731b65f742d48e9e893c 16-Aug-2014 Tyler Gunn <tgunn@google.com> Add BIND_CONNECTION_SERVICE permission.

- Added system permission.
- Added enforcement in ConnectionService API class.

Bug: 16171070
Change-Id: Idbd26a31e8f6bb59d3e881a1e5885a44026f2fbd
/frameworks/base/core/res/AndroidManifest.xml
af8b11ae2ad4e3de7641ecb61fc6fde691f6a105 15-Aug-2014 Doug Zongker <dougz@google.com> am 8c26c4c8: am a9c87471: am 2b13359a: Merge "@hide RECOVERY permission" into lmp-dev

* commit '8c26c4c8f4784e3f8acce3a97f36e8c136d48349':
@hide RECOVERY permission
183415e521d599ca5e33e5022fec5ec7dfe1c055 12-Aug-2014 Doug Zongker <dougz@google.com> @hide RECOVERY permission

Bug: 16959027
Change-Id: I99fbdf24d5e8bce4beb32fa872e0caa6bfdbe1e9
/frameworks/base/core/res/AndroidManifest.xml
c216c473eb50e16ab6c6361bd0c9232d5bfaeb39 07-Aug-2014 Chelsea Derrick <chelsead@google.com> Revert "Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE]"

This reverts commit 41158d90a69cae2a9c4ced0e04f235e8cfef5259.

Bug: 16871063
Change-Id: I93623be92f2de41789b16827867f3f95bf0480c5
/frameworks/base/core/res/AndroidManifest.xml
aac303d0a24294c1f9ac74a0e5e7b7fa77bb379f 11-Aug-2014 Nicolas Prevot <nprevot@google.com> Removing the personal icon, which was only a placeholder.

This icon should never show up: the avatar of the personal space should show up instead.

If something goes wrong and correct avatar fails to show, the systems falls back to the green android now, which is desired behaviour.

BUG: 15875652

Change-Id: I41beb4cbd5e707d27ef6d4cf35d02ec9cfa1b61d
/frameworks/base/core/res/AndroidManifest.xml
6b93229a211cd4b963dae0a46d6dde689beabb90 24-Jul-2014 Matthew Xie <mattx@google.com> Add BLUETOOTH_MAP permission to give Bluetooth app exclusive access to email access

The permission is hidden. It's for Bluetooth app only. We may unhide it in the future.
Change-Id: Ibc6f7b71f0c79dc282a8e5fdc786e1c16be7a892
/frameworks/base/core/res/AndroidManifest.xml
8694f2443230e74515e04e572d22406764746834 04-Aug-2014 Jeff Tinker <jtinker@google.com> Merge "Allow device to be unprovisioned" into lmp-dev
6bf5b600d6d1e98f7eabbbc884dd286b335acd66 30-Apr-2014 Jeff Tinker <jtinker@google.com> Allow device to be unprovisioned

bug: 12247651
Change-Id: Ie2e77566d2c65925091296da5bcbec327985c946
/frameworks/base/core/res/AndroidManifest.xml
1bb480a3a4ce2ce63c5d09fa7f5cc38ec160ebf4 02-Aug-2014 John Spurlock <jspurlock@google.com> Battery saver: new policy changes + SystemUI tweaks.

- Service policy changes: allow the user to turn off (snooze)
saver mode below the auto-trigger level. Plugging in the
device always exits saver mode.
- Default trigger level is now 0 (never) instead of 15.
- SystemUI now also listens to a new POWER_SAVE_MODE_CHANGING,
since waiting for _CHANGED can take seconds.
- Move shared feature description text into the framework so it
can be shared.
- Tweak dialog title + action strings.
- Remove trigger-level from SystemUI, it no longer needs it.
- Add the ability to turn off saver mode directly from the
notification.
- Migrate saver confirmation dialog to common system UI dialog
helper, and add a few convenience methods.
- Fix bug where the status bar area would be orange over the keyguard
in SHADE_LOCKED mode.

Bug:16214395
Change-Id: I3d1ded1eec9e63e7d97469486f6a320e1bebbccd
/frameworks/base/core/res/AndroidManifest.xml
783645e99f909ffc7a2d5d2fca9324cc0e9b7362 28-Jul-2014 Jae Seo <jaeseo@google.com> TIF: Merge TvParentalControlManager into TvInputManager

This change addresses the following API council feedback.

TvParentalControlManager:
-- Replace the listener interface with a broadcast Intent with well-known
action, something like ACTION_BLOCKED_RATINGS_CHANGED.
-- TvParentalControlManager goes away, and two remaining methods move to
TvInputManager.

== Implementation changes ==
-- The user-selected rating preferences should be stored in an XML file, and
loaded at boot by your internal system service. It should _not_ be stored in
a Secure/Global setting.

Bug: 16542165
Change-Id: I278df963576652ec9163a66c1ef99419fcdb36c2
/frameworks/base/core/res/AndroidManifest.xml
1f33d77f0430efb2d7eb532e360ba9a30004ffe7 25-Jul-2014 Alexandra Gherghina <alexgherghina@google.com> Rename work icon symbol to match the prefix used for badges.

Also renames the images for consistency.

Bug: 16369104
Change-Id: I19f97ae22cb2ee4f7db210f083badc1a30520b44
/frameworks/base/core/res/AndroidManifest.xml
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c 28-Jul-2014 Adrian Roos <roosa@google.com> Make TrustAgentService a SystemApi

Bug: 16401527
Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/res/AndroidManifest.xml
5eeb59cceb1f95813c548c1c5937f161c1ed3571 22-Jul-2014 Christopher Tate <ctate@google.com> Schedule full backups

Initial policy: at most daily; backups only run when the
device is idle + charging + on an unmetered network.

Bug 16485874

Change-Id: I5665d890a943bac765adcef14be79d7dba6ce078
/frameworks/base/core/res/AndroidManifest.xml
16c8e3f49497b6046972ae650772f65768366be8 25-Jul-2014 Jeff Sharkey <jsharkey@android.com> PackageInstaller changes based on feedback.

Mostly cosmetic changes from API council feedback.

Bug: 16543552
Change-Id: Ic926829b3f77c31f50a899c59b779353daf00d59
/frameworks/base/core/res/AndroidManifest.xml
c086a3df3b28996cd10ebe42c5f59035d054aa0d 18-Jun-2014 Terry Heo <terryheo@google.com> Add a frame capture API of TV input

- Added new permission CAPTURE_TV_INPUT

Bug: 15736756
Change-Id: I2ae8b2e3f5b1ad1d525854ed89ab2043cf66acbe
/frameworks/base/core/res/AndroidManifest.xml
193f049221dce7764d50293ac02255fd0223c538 10-Jun-2014 Jason Long <jasonlong@google.com> Switched Holo to Material for account chooser activities.

Change-Id: I6a44fb174eb4e981c37fca0836b103d7ee3f5ffe
/frameworks/base/core/res/AndroidManifest.xml
dc00cbe2c15eef5141656311a6d05c753d7c6db6 21-Jul-2014 Craig Mautner <cmautner@google.com> Create API for launching from recents

Relaunch apps from recents using the same uid and package as was used
in the original launch.

Fixes bug 16358208.

Change-Id: I340800bfee79926b197929360d69f1d570bbf1eb
/frameworks/base/core/res/AndroidManifest.xml
33f5ddd1bea21296938f2cba196f95d223aa247c 22-Jul-2014 Dianne Hackborn <hackbod@google.com> Add permissions associated with app ops.

Change-Id: I575ad7a3ceea59486ca601f69760b14f6269511d
/frameworks/base/core/res/AndroidManifest.xml
09a65601b24b77b7e5b3d2d4c7c30eded1ba1040 21-Jul-2014 Adam Powell <adamp@google.com> Sort ResolverActivity items based on UsageStats

Sort targets by the total amount of time the user has spent with their
containing package in the foreground.

Bug 15694906

Change-Id: I63c956424f78eb22911517674dfefd96901d19f8
/frameworks/base/core/res/AndroidManifest.xml
a19d7bfacf83837fab1f785ed1319d83a7f45675 19-Jul-2014 Yorke Lee <yorkelee@google.com> Rename voicemail permissions

Rename READ_ALL_VOICEMAIL to READ_VOICEMAIL, and MANAGE_VOICEMAIL
to WRITE_VOICEMAIL

Bug: 16400686
Change-Id: I4c87a7e2fb3aa71d7de3865301f110bcfb29221b
/frameworks/base/core/res/AndroidManifest.xml
891f5b2638f30479eb8d78ecb28ba0b39808fca4 18-Jul-2014 Brian Attwell <brianattwell@google.com> Merge "Mark social APIs stream APIs as deprecated" into lmp-dev
bdb13c8c07f07d405e74f479068eb972d509cea5 17-Jul-2014 Brian Attwell <brianattwell@google.com> Mark social APIs stream APIs as deprecated

Bug: 14490632
Change-Id: I6b54613514e52f34cfcc37d25493a7ea7d636a86
/frameworks/base/core/res/AndroidManifest.xml
c39d47a8e7c74bd539104b0efab898ef6fc43ddf 09-Jul-2014 Michael Wright <michaelwr@google.com> Add MediaProjection APIs.

The new MediaProjection infrastructure allows the system to hand out
tokens granting the ability to capture the screen's contents, audio,
etc. at a granular level. It's intended to be used both for screen
casting, via the cast APIs, as well as screen sharing via third party
applications.

The screen sharing case is implemented, but all of audio capturing
is still forthcoming.

Change-Id: I4b24669bed7083e11413c10ed8d6b025f5375316
/frameworks/base/core/res/AndroidManifest.xml
4bd7efbe982d26a68950f3c92bd0e7142c4ecbf7 17-Jul-2014 Jeff Davidson <jpd@google.com> Restrict SCORE_NETWORKS permission to signature|system.

As long as the APIs aren't ready to be un-hidden, there's no need to
allow non-system apps to access them. This can be reverted when the
APIs are finalized and we have mechanisms in place for selecting
between scorers installed on the device, rather than only a
preselected scorer bundled with the system.

Change-Id: I745b4c691eccfb526014d4cb71639db2119e4fdb
/frameworks/base/core/res/AndroidManifest.xml
58fba8b14b7e80dc2e7f676a32d1a69661fb13d4 17-Jul-2014 Jeff Davidson <jpd@google.com> Merge "Expose network scoring APIs to /system apps." into lmp-dev
7be8e9725f4a60f0d1a6cb175a05a320968d7439 17-Jul-2014 Jeff Davidson <jpd@google.com> Expose network scoring APIs to /system apps.

Ideally, we'd only expose the methods that we intend unbundled apps to
call (e.g. not NetworkScoreManager#setActiveScorer, which should only
be called by Settings), but this isn't harmful in terms of permissions
as the APIs still check security appropriately.

Bug: 15833200
Change-Id: I2047515b41c8be0cf7cb51dd495fe72309c05f68
/frameworks/base/core/res/AndroidManifest.xml
cdd5858e481fb0087c40c5997a9fa1446b326165 18-Jun-2014 Wenchao Tong <tongwenchao@google.com> Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE]

* Only allow system app to send/receive
WIFI_CREDENTIAL_CHANGE.
* Define constants in WifiManager.

Bug: 15703353
Change-Id: I4bcc6bc82ec01952500eef3965cf81116bba693d
(cherry picked from commit f4a43f196e1132968a8add60efa4ae4558f8b010)
/frameworks/base/core/res/AndroidManifest.xml
1a937b04e63539cb1fab1bde601031d415c7156f 02-Jul-2014 Jeff Brown <jeffbrown@google.com> Initial draft of new MediaRouter APIs.

This patch introduces basic infrastructure for the new MediaRouter
API. The code is fully documented but incompletely implemented.
It is being submitted not to facilitate API reviews.

MediaRouter is a new class that applications used to discovery,
connect to, and control media devices as represented by media
destinations and their routes. Routes may offer a variety of
capabilities. This new class is a much more powerful replacement
for the existing MediaRouter.

MediaRouteService is a base class for creating media route services
which third-parties can implement to make routes available to
applications. It is analoguous to the MediaRouteProvider
infrastructure of the old media router support library but it
is designed to be integrated into the framework and enable a
variety of new usages such as remote display projection.

Stay tuned for more...

Change-Id: I2c7c6013d9f751d71e83697e7fc9e49bf7751fef
/frameworks/base/core/res/AndroidManifest.xml
01a500ed1c6ae3fff66678144ae637aa8cad0ecc 11-Jul-2014 Jeff Brown <jeffbrown@google.com> Delete first draft of media routing APIs.

The new APIs will not be as tightly integrated into MediaSession.

Change-Id: I5cfd37d9d8d0c5d46c55edb5cf0772a8f1ef13ab
/frameworks/base/core/res/AndroidManifest.xml
06b6cdaed5c68816faac9d2354c6caf61e65e19d 12-Jul-2014 Sreeram Ramachandran <sreeram@google.com> Remove unnecessary code and APIs.

This stuff has been replaced by setNetworkForUser() in NetdClient.

Change-Id: If525ee259b74314191d1913f7c2a3e828e05c38f
/frameworks/base/core/res/AndroidManifest.xml
c42a1e1071937ae48b7aa5d6291a32c29078b74b 07-Jul-2014 Adrian Roos <roosa@google.com> Add AlarmClock API to AlarmManager

Adds a new kind of alarm that represents an alarm clock and
a way to query the next scheduled alarm clock.

Deprecates Settings.System.NEXT_ALARM_FORMATTED.

Bug: 14589952
Change-Id: I297eeeff36d07adcda010afac183d0f5ee37dc99
/frameworks/base/core/res/AndroidManifest.xml
68d4acd205e8c2da524e62734ca42847306cc029 02-Jul-2014 Andres Morales <anmorales@google.com> Service for reading and writing blocks to PST partition

Permits apps with permission
android.permission.ACCESS_PERSISTENT_PARTITION to obtain
a read and write data blocks to the PST partition.

Only one block ever exists at one time in PST. When
a client writes another block, the previous one is
overwritten.

This permits storing a block of data that will live
across factory resets.

Change-Id: I8f23df3531f3c0512118eb4b7530eff8a8e81c83
/frameworks/base/core/res/AndroidManifest.xml
99bd4eabd17c1211adcd8eb9afeb5e1c6077617c 09-Jul-2014 Yorke Lee <yorkelee@google.com> Merge "Add manage voicemail permission (1/4)"
6752cba4642ea9103f3013336c005f06968fd442 09-Jul-2014 Nick Kralevich <nnk@google.com> Merge "ConfigUpdateInstallReceiver: pass content via content provider"
b708ce5f1a30a63ed79a86a23ead4e5ad972a48a 08-Jul-2014 Shishir Agrawal <shishir@google.com> Remove permission SIM_COMMUNICATION.

The permission is replaced by the MODIFY_PHONE_STATE permission which is
System|Signature.

Change-Id: I74dbd242fc0fdbb5884fdc7a5c3f0063424fbfcf
/frameworks/base/core/res/AndroidManifest.xml
103173e16da609bcf57a88961ca57a8de17e0ee7 28-Jun-2014 Nick Kralevich <nnk@google.com> ConfigUpdateInstallReceiver: pass content via content provider

When receiving a request to update ConfigUpdater content, don't
try to open by filename. Fetch the content via a file descriptor
delivered from a content provider. This avoids the files needing to
be marked world-readable, and resolves an SELinux violation.

Bug: 14989241
Change-Id: I10ad0d710c9a833a45995c545ba585a533c35b0d
/frameworks/base/core/res/AndroidManifest.xml
b096bdceaf2a4becffd2d930a870ccb57bfbe99c 01-Jul-2014 Jeff Davidson <jpd@google.com> Add a SCORER_CHANGED broadcast.

Sent whenever the active network scorer is changed.

Bug: 16007033
Change-Id: Ib71e89e2cc98fa424db7e489445ec03edefb6880
/frameworks/base/core/res/AndroidManifest.xml
8949bfb90c415629dbd0e30d25003fb3e0375fb5 16-Aug-2013 Hemant Gupta <hemantg@codeaurora.org> Bluetooth: Support MAP Client role on Bluedroid.

Implementation changes to support MAP client and PBAP client
role on Bluedroid stack.

Change-Id: I1733a67bf5256bd7b181bd5e68e40b476994ebfd
/frameworks/base/core/res/AndroidManifest.xml
5e4554351045776c1cf2da77375f0ca8363d647f 25-Jun-2014 Yorke Lee <yorkelee@google.com> Add manage voicemail permission (1/4)

Bug: 6948882

Change-Id: I3367c20721b6e9572e79c7b4f42758b8c4e30372
/frameworks/base/core/res/AndroidManifest.xml
eb8d1be6acad180eabde84f19196b9ecaba81353 25-Jun-2014 John Spurlock <jspurlock@google.com> Add a BIND_DREAM_SERVICE signature-level permission.

Starting in api 21, will be required to bind to a
declared dream or doze service.

Also added to aapt dump badging output.

Bug:15862654
Change-Id: Ifa0a594eeecf21e6146176c7810a847e1d08fe3b
/frameworks/base/core/res/AndroidManifest.xml
d96e4948daf687f3f631ba8d93c89026fd3ce272 26-Jun-2014 Andres Morales <anmorales@google.com> Merge "interface for nfc handover supplicant commands"
5a2f488b70c9f9a712be7bcdbd9ec893c38670c2 24-Jun-2014 Yorke Lee <yorkelee@google.com> Add REMOVE_VOICEMAIL permission to system

Add a permission that will allow any app that has this permission
to remove any voicemails in the user's call log, even those that
don't belong to it.

This will be needed for the unbundled dialer to be able to manage
the user's voicemails.

Bug: 6948882
Change-Id: Idca23ee83e541ba8aef24d6cb7fe09d5adac1e10
/frameworks/base/core/res/AndroidManifest.xml
9d4e9bcebbd97ad51daa0ef15cfba5aabb399bbb 19-Jun-2014 Craig Mautner <cmautner@google.com> Allow a root activity to relinquish task identity

If a an acitivty with attribute android:relinquishTaskIdentity true
is the root activity of a task then the intent of that task will
be that of the first activity in the stack with
android:relinquishTaskIdentity set false.

The ability to set intent also includes the ability to set the
TaskDescription of the task.

Fixes bug 15675610.
Fixes bug 10428661.

Change-Id: Ib28a9eae3b9832eeeef9106adbebe344184ee5ae
/frameworks/base/core/res/AndroidManifest.xml
5834ee75038e9095cefe089cdb26795b3ffe9e38 18-Jun-2014 fafaisland <fafaisland@google.com> Merge "Add READ_ALL_VOICEMAIL permission in the core"
88fb96505ce7587b23479d07ed77412f69a84ce8 17-Jun-2014 fafaisland <fafaisland@google.com> Add READ_ALL_VOICEMAIL permission in the core

Bug:15695227

Change-Id: I96bebcd949293679d938b2ec290820d4ed9035fa
/frameworks/base/core/res/AndroidManifest.xml
cf1a2f73fc102be2ac7060ac97d4682bb2565ca5 17-Jun-2014 Christopher Tate <ctate@google.com> Switch everything to scheduled jobs

Everything that used the IdleMaintenance APIs/broadcasts gets to use the
spiffy new JobScheduler instead. Hooray!

On top of that, the now-obsolete "idle maintenance" APIs are now gone
entirely. Double hooray!

Bug 14993295

Change-Id: I5fb67c296ca8cd0ba8a2c8760a0f0d9d962d813b
/frameworks/base/core/res/AndroidManifest.xml
9740e468bc895cbc08c71aecc35fc56c3faafa06 08-Feb-2014 Andres Morales <anmorales@google.com> interface for nfc handover supplicant commands

expose:
NFC_GET_HANDOVER_SEL
NFC_GET_HANDOVER_REQ
NFC_REPORT_HANDOVER

These are used in for setting up WFD with NFC and
are only accessible given the CONNECTIVITY_INTERNAL
permission.

Change-Id: Ia43afc137d474822cad896d335530654081a808c
/frameworks/base/core/res/AndroidManifest.xml
29372ab484c916c0774c976d5b896a7cf19a2b91 04-Jun-2014 Ido Ofir <iofir@google.com> Adding permission for launching the trust agent settings.

Change-Id: Iac5bde57ca8d465fdf0fa5848d6716fc88801aeb
/frameworks/base/core/res/AndroidManifest.xml
94b59de852df7b6ce16aef73a9b2c11be8f3102d 03-Jun-2014 Mike Lockwood <lockwood@google.com> BluetoothAvrcpController: Move AVRCP controller support to new BluetoothProfile subclass

Change-Id: Id988040a7ce623ed68e0349920301ff48db1fbce
/frameworks/base/core/res/AndroidManifest.xml
2263dd1ddd1a8ac828c25d34000c85165cad21ef 14-May-2014 Mike Lockwood <lockwood@google.com> BluetoothA2dpSink: Add new BluetoothProfile subclass for A2DP sink

Change-Id: I09d5cb8fdaea4c4828f333949b7c18deffd22722
/frameworks/base/core/res/AndroidManifest.xml
cf916d34671f0ab6aad8de24c18e4dc96fb21941 12-Jun-2014 Mike Lockwood <lockwood@google.com> Rename BluetoothHandsfreeClient to BluetoothHeadsetClient

This makes our terminology consistent with the existing BluetoothHeadset profile

Also updated arguments to Context.bindService()

Change-Id: I27cc5a6fde256b1f5dccca53a7a15ec8f58691c2
/frameworks/base/core/res/AndroidManifest.xml
104e14531ca2212117540d8b6abc06ab67564ebc 12-Jun-2014 Dianne Hackborn <hackbod@google.com> am f894cad0: Merge "Some tweaks to improve document task creation." into lmp-preview-dev

* commit 'f894cad093c1a3083f4aca099babc4677977a12f':
Some tweaks to improve document task creation.
d38aed81420d7d992f65ef2efb5f69c1900fc61d 11-Jun-2014 Dianne Hackborn <hackbod@google.com> Some tweaks to improve document task creation.

- Mark the chooser activity as never launching in to a new
task, even if the caller asks for it. These are dialogs
so don't make sense as stand-alone tasks. (Maybe later
the policy should be to not launch into a new task in any
case that the activity is a dialog or even transparent at all.)

- Keep track in the task record of whether any activities in
it have been shown to the user, and use this to automatically
remove the task when all activities finish. This leans up
cases where apps are launching stub activities that get turned
in to tasks but are never seen by the user because they
immediately launch another activity in another task and
then finish.

Change-Id: I00b641c80aa96bd5071479f36ee2e4d8e3a81aeb
/frameworks/base/core/res/AndroidManifest.xml
5833bbe2d6a38244e48dd793d2d0872321535f57 12-Jun-2014 Sandeep Siddhartha <sansid@google.com> Merge "Initial support for reading the enrollment metadata"
e5706787599f8397e19e66afa70753ba350cc91b 30-May-2014 Sandeep Siddhartha <sansid@google.com> Initial support for reading the enrollment metadata

- Defines schema for enrollment apps to publish metadata for the search
keyphrase. This metadata consists of an ID, a user visible keyphrase,
and the target package to handle the keyphrase, when it triggers.
- Reads the metadata and populates the KeyphraseInfo object for access via
the VoiceInteractionService
- Adds permission and intent action for the enrollment app.
The enrollment app needs to be a system app protected with the
MANAGE_VOICE_KEYPHRASES permission and the activity performing the
enrollment needs to handle the ACTION_MANAGE_VOICE_KEYPHRASES
- The keyphrase info currently stores an ID - that's for internal
bookkeeping only, a keyphrase text - that's used by the public APIs,
and a list of supported locales, which isn't exposed but is used while
indicating if hardware hotword is available for a particular keyphrase
in a language or not.

Change-Id: Ibe6c52a5a3eecfd74c4a8382713a35eb88d38df9
/frameworks/base/core/res/AndroidManifest.xml
0188bee2c526270c178a0b1f918b2a09999de25f 11-Jun-2014 Christopher Tate <ctate@google.com> am d8f71d34: Merge "Out with the old; in with the new" into lmp-preview-dev

* commit 'd8f71d34c3c7fb161a1586de8edb52161c32d672':
Out with the old; in with the new
1b8aef2be7a467672b3ffdc37039b9233ece0fbc 11-Jun-2014 Julia Reynolds <juliacr@google.com> Merge "Material-ize the restrictions pin challenge."
fe1de89fe91a099dd535acd3df0845839baf4232 11-Jun-2014 Jessica Hummel <jhummel@google.com> am 3d5066de: Merge "Add different resolutions of afw icons" into lmp-preview-dev

* commit '3d5066de154193cc3a08a7be168aa5e31bfe0359':
Add different resolutions of afw icons
7060b04f6d92351b67222e636ab378a0273bf3e7 10-Jun-2014 Christopher Tate <ctate@google.com> Out with the old; in with the new

Switch to the official "JobScheduler" etc naming.

Bug 14997851

Change-Id: I73a61aaa9af0740c114d08188bd97c52f3ac86b7
/frameworks/base/core/res/AndroidManifest.xml
40e53cdc944472cf2417c069a7a4514c9e37911b 10-Jun-2014 Doug Zongker <dougz@google.com> Merge "hide RECOVERY permission from L preview -- DO NOT MERGE" into lmp-preview-dev
085a1e793382580811798cbdd7e354cc755fc3ed 10-Jun-2014 Jeff Brown <jeffbrown@google.com> am af0c2ebf: @hide ACCESS_INPUT_FLINGER permission.

* commit 'af0c2ebfc71f6106656eb17345e122ea7ac8cf2a':
@hide ACCESS_INPUT_FLINGER permission.
4a1c0bd20b317fbc48efc35f986b9a7f5cef128e 10-Jun-2014 Christopher Tate <ctate@google.com> am 2099866f: Merge "Switch framework to using new scheduled-work API" into lmp-preview-dev

* commit '2099866f0d9ae5692e6edfc053aebe7f93a21618':
Switch framework to using new scheduled-work API
b19fd00c51855954366a288cc4838327cb5d83a4 10-Jun-2014 Jessica Hummel <jhummel@google.com> Add different resolutions of afw icons

Also update the name of the icon so that it is consistent with other namings in the framework and in managed provisioning.

bug: 15538051
Change-Id: I9e8e680eb1c654d9f5d94ce27775687b3dc92a22
/frameworks/base/core/res/AndroidManifest.xml
465c5de4ee3df861dd1ad0b71ca40f3daeb9cbee 10-Jun-2014 Jeff Brown <jeffbrown@google.com> @hide ACCESS_INPUT_FLINGER permission.

Bug: 15516225
Change-Id: Ief70650d956a7161153e283c24f553fcfa7996b1
/frameworks/base/core/res/AndroidManifest.xml
115afdadb5863a02f0b0daefcc0511bfd35b531e 07-Jun-2014 Christopher Tate <ctate@google.com> Switch framework to using new scheduled-work API

Also add the intended permission-use enforcement to said API.

Bug 14994893
Bug 14993295

Change-Id: I5a3ffd32d0702c68f4ef6da68f7fa6e9de674380
/frameworks/base/core/res/AndroidManifest.xml
c302e4d32f97c21400b3ab76911cad8984eff20e 10-Jun-2014 Doug Zongker <dougz@google.com> hide RECOVERY permission from L preview -- DO NOT MERGE

Bug: 15516323
Change-Id: I16a6355f631523919607bd111e5ebfe16fa4506e
/frameworks/base/core/res/AndroidManifest.xml
238fd930fc0131044d317d7c5ead756be89d1299 07-Jun-2014 Jeff Brown <jeffbrown@google.com> Add @SystemApi annotation to internal permissions. (DO NOT MERGE)

This is a first pass at annotating permissions that should not be
granted or used by to third-party apps but that may be required by
privileged system applications. For this patch, the annotation was
only added to permissions that have a protection level of at least
system. Signature-only permissions were left alone since they only
need to be visible to built-in components.

Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
bbf4270a6c8c6441dfb9b22f3cc5394d42cdada8 09-Jun-2014 Julia Reynolds <juliacr@google.com> Material-ize the restrictions pin challenge.

Change-Id: I90be6d2e1b1043f45a8067561a0d5ce56cc02dd6
/frameworks/base/core/res/AndroidManifest.xml
b61eaaac59298afafa973ee739a072290e000348 07-Jun-2014 Jeff Brown <jeffbrown@google.com> Add @SystemApi annotation to internal permissions.

This is a first pass at annotating permissions that should not be
granted or used by to third-party apps but that may be required by
privileged system applications. For this patch, the annotation was
only added to permissions that have a protection level of at least
system. Signature-only permissions were left alone since they only
need to be visible to built-in components.

Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
d8883df650b77dba3be38fb2ca8980594b901461 06-Jun-2014 Dianne Hackborn <hackbod@google.com> am 87bc3c25: Merge "Improvements to low power mode." into lmp-preview-dev

* commit '87bc3c258d8be516bc0fcedeb6eec34088582061':
Improvements to low power mode.
eb94fa7975b1e8742f3b00cec6bd4f9d6b329e3a 04-Jun-2014 Dianne Hackborn <hackbod@google.com> Improvements to low power mode.

Add new public API for monitoring low power mode.

BatteryService now puts device in to low power mode when
battery level is low.

Window manager now watches low power mode to turn off
animations.

Modifying the animator scale now gets propagated to all
processes.

Change-Id: I8fa566994764ddd4e1977631e28381ab9409f8ee
/frameworks/base/core/res/AndroidManifest.xml
aaa688972a682a42c3ee207538f3e6b204748151 04-Jun-2014 Eric Laurent <elaurent@google.com> am 25d7a394: Merge "add permission for AudioManager routing APIs." into lmp-preview-dev

* commit '25d7a394c0cf91d9e9711d3f36913f4ed8aa91d8':
add permission for AudioManager routing APIs.
b4df2f586ad7b5a0387489401de0c83203610ba9 04-Jun-2014 Adrian Roos <roosa@google.com> am b2302d43: Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev

* commit 'b2302d437fd636d9973f466062cfad145cdd042d':
Ensure trust agents are only provided by platform packages
94236c56ddef7f0a3db010c38940f6eae75f67b4 04-Jun-2014 Eric Laurent <elaurent@google.com> Merge "add permission for AudioManager routing APIs." into lmp-preview-dev
b803ad3c2cefaba57063385ecab1be27dd2636b0 04-Jun-2014 Adrian Roos <roosa@google.com> Hide TrustAgentService in lmp-preview - DO NOT MERGE

Bug: 15287044
Change-Id: Iba0d53b87bcb4bddccec89cf943ed65491aa9d76
/frameworks/base/core/res/AndroidManifest.xml
1e9021aef89d53eb08d0e8a4e017c9e79d260241 04-Jun-2014 Adrian Roos <roosa@google.com> Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev
01fae55d175eea6e723d6fa8729bbe868d05cfc2 29-May-2014 Eric Laurent <elaurent@google.com> add permission for AudioManager routing APIs.

Add signature or system permission
"android.permission.MODIFY_AUDIO_ROUTING" for AudioManager APIs
allowing system services and applications to modify audio routing.

Bug: 14815883.
Change-Id: If09f6f3a166a6b2f3761b65dbde0c86873850f07
/frameworks/base/core/res/AndroidManifest.xml
4c9e57f156d3cbd86b38e9897dfdab81964efe90 03-Jun-2014 Jae Seo <jaeseo@google.com> resolved conflicts for merge of ebe661c4 to master

Change-Id: Ic25dc762ee43654b439de3ec237ead007bee3df4
18ea893a2319e2a192188d2288bb881149c9b06e 28-May-2014 Adrian Roos <roosa@google.com> Ensure trust agents are only provided by platform packages

Prevents the TrustManagerService from binding to any non-platform
trust agents and updates the SampleTrustAgent to use the new
permission.

Bug: 15287044
Change-Id: I38c3deebd5ad359075e68f52d19417bab5ab43db
/frameworks/base/core/res/AndroidManifest.xml
faa3ff9ba89486aad83eab0526aea46ea7bbcfe6 03-Jun-2014 Evan Charlton <evanc@google.com> Merge "Revert sendEnvelope changes [DO NOT MERGE]" into lmp-preview-dev
d5cc4a281e7ce29d1e8687ff3394b57a3a549260 31-May-2014 Jae Seo <jaeseo@google.com> Put TV Input Framework under android.media.tv, including TvContract

Bug: 15345342
Change-Id: I665ca23f0f074ce29cb2e047109b209178532107
/frameworks/base/core/res/AndroidManifest.xml
f20d640fa2b155a971ddfe0965fc803a73b5e53c 25-May-2014 Amith Yamasani <yamasani@google.com> Restrictions Manager

Mechanism to register a provider for requesting an
administrator to respond to permission requests.

Request format and response format constants.

Description of manifest template for static restrictions.
Int type introduced in RestrictionEntry.

Needs more javadoc and better description of manifest templates,
including specifying the XML attributes.

Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/res/AndroidManifest.xml
fda1855eaa61daad528cb444e99d0fc5195a7bd1 28-May-2014 Evan Charlton <evanc@google.com> Revert sendEnvelope changes [DO NOT MERGE]

Revert the following changes from the I/O preview. This reverts the
following changes:

Revert "Revert "Revert "Modify TelephonyManager to expose sendEnvelopeWithStatus instead of sendEnvelope."""

This reverts commit 452e185fb6df92358701fb68d4fe6c65f172cc29.

Change-Id: I6bbff508b2f542d6ef3d372956db53d63a9165eb

Revert "Revert "Revert "Expose sendEnvelope."""

This reverts commit 0d5e5b9cce8af40494f72ff9decc169f99780254.

Revert "Adding support for SIM communication from Android over logical channels."

This reverts commit 57f656b9f6271cf857b5ecec5f8c7eacb321ec0b.

Change-Id: I975eb468841e85d63e506f68a5d8c879e110d9f6
/frameworks/base/core/res/AndroidManifest.xml
c22dbb69194c8e8fe2a32326d1f37a738cad0904 26-May-2014 Wonsik Kim <wonsik@google.com> Revert "Revert "Add physical TV input handling to TvInputManagerService""

This reverts commit 1940e197a8de186df5edf0b78e0907ae539bd215.

Bug: 14118245, Bug: 15197740
Change-Id: Ia308f16d2ed8ec55112a4d21c180ccb97e8d7c6a
/frameworks/base/core/res/AndroidManifest.xml
fb052926b84d69fdc4bebcb0373e33388c7bcbb7 21-May-2014 Dianne Hackborn <hackbod@google.com> Revert "Hide voice interaction APIs."

This reverts commit a677a9b9367bcf8c81c36dc59b53554cb347b438.
/frameworks/base/core/res/AndroidManifest.xml
62b25a5bf0750483f36ac79c88177ee2ab630f8e 20-May-2014 Andres Morales <anmorales@google.com> Revert "Adding INfcUnlockSettings and NfcUnlock interface class."

This will be re-added as a Trustlet in a subsequent CL.

This reverts commit 38a7ed05f8fed0aa81f7214d827875f9876ffbe1.

Change-Id: I5aa36df42a7751f165b4ef184e0cda57e5568b59
/frameworks/base/core/res/AndroidManifest.xml
b19c19265448a6252b1c14f3da85d52e50be34c3 19-May-2014 RoboErik <epastern@google.com> Merge "Rename session classes to have media prefix, hide routes"
42ea7eecd149161ed192d3029f0d77d1d08a4aa5 17-May-2014 RoboErik <epastern@google.com> Rename session classes to have media prefix, hide routes

This renames several of the core session classes to be prefixed
with Media. It also adds @hide to all route references for now.

Change-Id: Idb42897d490cf24626e4e93ca975b2cb93ec054c
/frameworks/base/core/res/AndroidManifest.xml
dcff99598f16737e75278e8ea9dbfe92579ea234 16-May-2014 Dianne Hackborn <hackbod@google.com> Hide voice interaction APIs.

Change-Id: I961b6399a6edca239caaba9bbd1dd5e03bc612bd
/frameworks/base/core/res/AndroidManifest.xml
7e03dfcb796ef1a6000a5fd5fda03c9e15ea62e1 16-May-2014 Adrian Roos <roosa@google.com> Apply revised TrustAgent API

Bug: 14997466
Change-Id: I81042e058a20f28603a11471882f3dcfc4f8b13c
/frameworks/base/core/res/AndroidManifest.xml
fbf53d042d68d1b0f9fefbcb1e819f25bd385f89 08-May-2014 Jessica Hummel <jhummel@google.com> Merge "Disallow the INTERACT_ACROSS_USERS permission for system apps"
96599a05acd7559464d527d819eaf4571129eb77 06-May-2014 Jessica Hummel <jhummel@google.com> Disallow the INTERACT_ACROSS_USERS permission for system apps

This reverts a temporary hack which was required for a temporary launcher version to work for development purposes.

Change-Id: Ifd17447076bf5c67ad2ce8df8f184fe6f12baad3
/frameworks/base/core/res/AndroidManifest.xml
d83a096f299abd9c7fe5e441ef1bb169c314b575 03-May-2014 Dianne Hackborn <hackbod@google.com> Bump up priority of system receiving BOOT_COMPLETED.

Change-Id: I5166f88f11f781914312e867cb653c8ecbefa705
/frameworks/base/core/res/AndroidManifest.xml
09233289624a85093b1d99e4a6a149bf09059d8d 30-Apr-2014 Dianne Hackborn <hackbod@google.com> Make GET_TASKS signature|system.

Normal apps can't hold it now. If they try to use
getRecentTasks() or getRunningTasks() without the permission,
they will only see their own tasks and home in the list.

Also took this opportunity to eradicate all of the old pending
thumbnail stuff.

Change-Id: I6dc52a06221c78097162e4a8b482027b798bf3ee
/frameworks/base/core/res/AndroidManifest.xml
10fa67c77e11699391e27975fc2d276a0b8c7cbb 24-Mar-2014 Nicolas Prevot <nprevot@google.com> Introduce forwarding intents across profiles.

The package manager service maintains, for some user ids, a list of forwarding intent filters.
A forwarding intent filter is an intent filter with a destination (a user id).
If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent.

When the package manager service is asked for components that resolve an intent:
If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent:
The package manager service also returns the IntentForwarderActivity.
This activity will forward the intent to the destination.

Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/res/AndroidManifest.xml
b22aabbbd2801db0be526a64badf2efa208f19f1 25-Apr-2014 John Spurlock <jspurlock@google.com> Merge "Introduce condition provider services."
7340fc8665ae3f9f1978f42aa0e5e1da85036158 25-Apr-2014 John Spurlock <jspurlock@google.com> Introduce condition provider services.

Add the condition provider interface, base class, and associated
system metadata.

Pull out common service management code into a reusable helper,
used by notification listeners and condition providers. The
helper, ManagedServices, is now completely self-contained - it
has no dependencies on NoMan or NoMan abstractions.

Bug:13743109
Change-Id: I6856d40f0a2ead78ac9b5707568559a57e7eb009
/frameworks/base/core/res/AndroidManifest.xml
91097de49b0f683b00e26a75dbc0ac6082344137 05-Apr-2014 Dianne Hackborn <hackbod@google.com> Initial implementation of new voice interaction API.

This gives a basic working implementation of a persist
running service that can start a voice interaction when
it wants, with the target activity(s) able to go through
the protocol to interact with it. It may even work when
the screen is off by putting the activity manager in the
correct state to act like the screen is on.

Includes a sample app that is a voice interation service
and also has an activity it can launch.

Now that I have this initial implementation, I think I
want to rework some aspects of the API.

Change-Id: I7646d0af8fb4ac768c63a18fe3de43f8091f60e9
/frameworks/base/core/res/AndroidManifest.xml
0a57a1112ff45507ef6361aabf42c97460405f47 18-Apr-2014 RoboErik <epastern@google.com> Merge "Add RouteProviders to the new Media APIs"
07c7077c54717dbbf2c401ea32d00fa6df6d77c6 20-Mar-2014 RoboErik <epastern@google.com> Add RouteProviders to the new Media APIs

Compiles and works with OneMedia. This currently is a rough test of
the system for finding, connecting to, and sending messages to routes.
This will just connect to the first route it finds when a request to
open the route picker is made (and disconnect when another request is
made).

Change-Id: I5de5521a079471b9e02664be4654c0591dfd9a6d
/frameworks/base/core/res/AndroidManifest.xml
66e5d96cf9e689148b202787bdc269519c4b6f8f 09-Apr-2014 Robin Lee <rgl@google.com> Allow ProfileOwner apps to manage app restrictions

Simple wrapper around the UserManager.{get|set}ApplicationRestrictions
APIs. Also added a new Intent to signal to running apps that the set
of restrictions has changed since startup.

Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/res/AndroidManifest.xml
b51e0a6c4b249e0d6f404fafef007645221be0d3 09-Apr-2014 Jeff Davidson <jpd@google.com> Stub APIs for network scoring.

NetworkScoreManager defines all interactions between the framework and
the scorer app. An ACTION_SCORE_NETWORKS broadcast is sent to the
default scorer with any unscored networks, which responds by calling
updateScores() with scores for those networks. An app may also check
whether they are currently the default scorer with
getDefaultScorerPackage() and request to become the default via the
ACTION_CHANGE_DEFAULT broadcast.

Bug: 13786258
Change-Id: Id3dc0f7c1109f0e3afd73356e2475b7f34167419
/frameworks/base/core/res/AndroidManifest.xml
d951ab230d80631731ef12b5d76c678c30165d6a 11-Apr-2014 Aravind Akella <aakella@google.com> am 8ebd66c2: am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev

* commit '8ebd66c259602f6b0be26fdfd3fe2f55538f6424':
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
8ebd66c259602f6b0be26fdfd3fe2f55538f6424 11-Apr-2014 Aravind Akella <aakella@google.com> am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev

* commit 'cd4c1c714c37a1bc7ba35ebd2509eca4f0f6a314':
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
cd9a7bb3ba742606f93dcbd549d6d6eeb1cb5247 08-Apr-2014 Aravind Akella <aakella@google.com> Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor

This reverts commit 819239e5bec90ee3c861ac45fffac4a832a183a1.

Change-Id: I4bbb222e5c9dc65aed03aa28fd9e0f00fe335819
/frameworks/base/core/res/AndroidManifest.xml
6be2f95202237b7284542e692273d13a5bd26913 10-Apr-2014 Svetoslav <svetoslavganov@google.com> Merge "Adding render stats APIs to UiAutomation (framework)."
3957091ba8f08c02b5e781098cb955a5f697a1ff 21-Feb-2014 Jae Seo <jaeseo@google.com> Initial round of Television Input Framework

This provides APIs to control and create individual television inputs on
the system which will later be hosted by television applications.

Change-Id: I6866d28e78175a1bff2c32a85c5d77e94d0cd60c
/frameworks/base/core/res/AndroidManifest.xml
1376d600d8e0eefdbc0aa11d398cf7517fc77129 13-Mar-2014 Svetoslav <svetoslavganov@google.com> Adding render stats APIs to UiAutomation (framework).

bug:12927198

Change-Id: Iae21481c75ae58dcdab3731bf5f1e2844e29d434
/frameworks/base/core/res/AndroidManifest.xml
acf395fd9441bce9fbe68c1b7efbf824570284bc 05-Apr-2014 Etienne Le Grand <etn@google.com> am 819239e5: Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"

* commit '819239e5bec90ee3c861ac45fffac4a832a183a1':
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"
fa1d2417d296e28a48a8c4a5cfb932172edbdd65 05-Apr-2014 Etienne Le Grand <etn@google.com> Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"

This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3.

Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61
(cherry picked from commit 819239e5bec90ee3c861ac45fffac4a832a183a1)
/frameworks/base/core/res/AndroidManifest.xml
819239e5bec90ee3c861ac45fffac4a832a183a1 05-Apr-2014 Etienne Le Grand <etn@google.com> Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"

This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3.

Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61
/frameworks/base/core/res/AndroidManifest.xml
ded264733036bb566c54da5b771d63f57213c84e 05-Apr-2014 Etienne Le Grand <etn@google.com> am bdfe3841: am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor

* commit 'bdfe384106de364ea2effac6ab80108556d11649':
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
bdfe384106de364ea2effac6ab80108556d11649 05-Apr-2014 Etienne Le Grand <etn@google.com> am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor

* commit 'fd53d8352a4617941b0a0449390aa562a01ea1d3':
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
fd53d8352a4617941b0a0449390aa562a01ea1d3 25-Mar-2014 Etienne Le Grand <etn@google.com> Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor

Change-Id: I16e5da68f860494e24cca64075be76fad02617bc
/frameworks/base/core/res/AndroidManifest.xml
9de8c1d82b6bf2b70e854a3349c9f1da60a23e83 03-Apr-2014 Jeff Tinker <jtinker@google.com> resolved conflicts for merge of 4f342e87 to master

Change-Id: I2cdb238759beb49fede2de703df8defee92d316f
/frameworks/base/core/res/AndroidManifest.xml
4f342e878d88b1f75a9b487e2aa0582b59e29083 03-Apr-2014 Jeff Tinker <jtinker@google.com> am 4995d725: Merge "Add signature|system permission to MediaDrm signer APIs" into klp-modular-dev

* commit '4995d72520d16302fca13bc4614d1dd3c0d1c17c':
Add signature|system permission to MediaDrm signer APIs
65c94e695929ffa1aaa49d7b5938b34aaf078b6c 02-Apr-2014 Jeff Tinker <jtinker@google.com> Add signature|system permission to MediaDrm signer APIs

Also addresses style issues noted in post-submit review from
https://googleplex-android-review.git.corp.google.com/#/c/439054/

Change-Id: If177b11dbcc049bc271529c119bc5c36ae0107b5
related-to-bug: 12702350
/frameworks/base/core/res/AndroidManifest.xml
82142c21dd333307682d5f4bb09de3ab3ccfa06c 27-Mar-2014 Adrian Roos <roosa@google.com> Define trust agent framework components

Adds the TrustManager system service that allows
registering for changes to the trust status and
reporting events that are important to trust agents.

Bug: 13723878
Change-Id: I7d0d2ea86fd755702d31aa5d49cac038a6cd4301
/frameworks/base/core/res/AndroidManifest.xml
ff2144ccb4215acf4587fc628493b3d49dca6043 28-Mar-2014 Adrian Roos <roosa@google.com> Define initial trust agent API

Adds the minimal API needed to define a useful trust agent.

Bug: 13723878
Change-Id: Ib24440bab7b16d0b656bde8b059e7d42cab2c7dc
/frameworks/base/core/res/AndroidManifest.xml
a42cb8b0e2b8fdfbac1a6590d6b60814caa01088 21-Mar-2014 Colin Cross <ccross@android.com> resolved conflicts for merge of a67e34c8 to master

Change-Id: I597525886260884c9b2dfc7945e01eb8138a58c2
cf0c4a59b6d6c7d0abe6b643e200af2eb9f0d6b2 21-Mar-2014 Jeff Sharkey <jsharkey@android.com> am 4868da52: am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev

* commit '4868da52450d3e5456b3567c228967539144d108':
Lock down MANAGE_DOCUMENTS permission.
4868da52450d3e5456b3567c228967539144d108 21-Mar-2014 Jeff Sharkey <jsharkey@android.com> am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev

* commit 'c620ec3614c8737b87d60efa9db96c288bcad794':
Lock down MANAGE_DOCUMENTS permission.
f2fecf48f740a079cf9015ea8c2695039ca11d81 21-Mar-2014 Jinsuk Kim <jinsukkim@google.com> am c61f4dd7: Merge "Add HDMI-CEC service" into klp-modular-dev

* commit 'c61f4dd744b1b0396703aa58eb22fc31d2b7050e':
Add HDMI-CEC service
adfe8b86e9178a553b6db9722340fa4ff5201cf1 05-Feb-2014 Christopher Tate <ctate@google.com> App widget backup/restore infrastructure

Backup/restore now supports app widgets.

An application involved with app widgets, either hosting or publishing,
now has associated data in its backup dataset related to the state of
widget instantiation on the ancestral device. That data is processed
by the OS during restore so that the matching widget instances can be
"automatically" regenerated.

To take advantage of this facility, widget-using apps need to do two
things: first, implement a backup agent and store whatever widget
state they need to properly deal with them post-restore (e.g. the
widget instance size & location, for a host); and second, implement
handlers for new AppWidgetManager broadcasts that describe how to
translate ancestral-dataset widget id numbers to the post-restore
world. Note that a host or provider doesn't technically need to
store *any* data on its own via its agent; it just needs to opt in
to the backup/restore process by publishing an agent. The OS will
then store a small amount of data on behalf of each widget-savvy
app within the backup dataset, and act on that data at restore time.

The broadcasts are AppWidgetManager.ACTION_APPWIDGET_RESTORED and
ACTION_APPWIDGET_HOST_RESTORED, and have three associated extras:

EXTRA_APPWIDGET_OLD_IDS
EXTRA_APPWIDGET_IDS
EXTRA_HOST_ID [for the host-side broadcast]

The first two are same-sized arrays of integer widget IDs. The
_OLD_IDS values are the widget IDs as known to the ancestral device.
The _IDS array holds the corresponding widget IDs in the new post-
restore environment. The app should simply update the stored
widget IDs in its bookkeeping to the new values, and things are
off and running. The HOST_ID extra, as one might expect, is the
app-defined host ID value of the particular host instance which
has just been restored.

The broadcasts are sent following the conclusion of the overall
restore pass. This is because the restore might have occurred in a
tightly restricted lifecycle environment without content providers
or the package's custom Application class. The _RESTORED broadcast,
however, is always delivered into a normal application environment,
so that the app can use its content provider etc as expected.

*All* widget instances that were processed over the course of the
system restore are indicated in the _RESTORED broadcast, even if
the backing provider or host is not yet installed. The widget
participant is responsible for understanding that these are
promises that might be fulfilled later rather than necessarily
reflecting the immediate presentable widget state. (Remember
that following a cloud restore, apps may be installed piecemeal
over a lengthy period of time.) Telling the hosts up front
about all intended widget instances allows them to show placeholder
UI or similarly useful information rather than surprising the user
with piecemeal unexpected appearances.

The AppWidgetProvider helper class has been updated to add a new
callback, onRestored(...), invoked when the _RESTORED broadcast
is received. The call to onRestored() is immediately followed by
an invocation of onUpdate() for the affected widgets because
they will need to have their RemoteViews regenerated under the
new ID values.

Bug 10622506
Bug 10707117

Change-Id: Ie0007cdf809600b880d91989c00c3c3b8a4f988b
/frameworks/base/core/res/AndroidManifest.xml
8e3feb15c5aec2c72b0ef120a1da325e1e8f0dda 24-Feb-2014 Svetoslav <svetoslavganov@google.com> Added accessibility APIs for introspecting interactive windows.

1. The old introspection model was allowing querying only the active window
which is the one the user is touching or the focused one if no window is
touched. This was limiting as auto completion drop downs were not inspectable,
there was not way to know when the IME toggles, non-focusable windows were
not inspectable if the user taps them as until a screen-reader starts
introspecting the users finger is up, accessibility focus was limited to
only one window and the user couldn't use gestures to visit the whole UI,
and other things I can't remember right now.

The new APIs allow getting all interactive windows, i.e. ones that a
sighted user can interact with. This prevents an accessibility service
from interacting with content a sighter user cannot. The list of windows
can be obtained from an accessibility service or the host window from an
accessibility node info. Introspecting windows obey the same rules for
introspecting node, i.e. the service has to declare this capability
in its manifest.

When some windows change accessibility services receive a new type
of event. Initially the types of windows is very limited. We provide
the bounds in screen, layer, and some other properties which are
enough for a client to determined the spacial and hierarchical
relationship of the windows.

2. Update the documentation in AccessibilityService for newer event types.

3. LongArray was not removing elements properly.

4. Composite accessibility node ids were not properly constructed as they
are composed of two ints, each taking 32 bits. However, the values for
undefined were -1 so composing a 64 long from -1, -1 prevents from getting
back these values when unpacking.

5. Some apps were generating inconsistent AccessibilityNodeInfo tree. Added
a check that enforces such trees to be well formed on dev builds.

6. Removed an necessary code for piping the touch exploration state to
the policy as it should just use the AccessibilityManager from context.

7. When view's visibility changed it was not firing an event to notify
clients it disappeared/appeared. Also ViewGroup was sending accessibility
events for changes if the view is included for accessibility but this is
wrong as there may be a service that want all nodes, hence events from them.
The accessibility manager service takes care of delivering events from
not important for accessibility nodes only to services that want such.

8. Several places were asking for prefetching of sibling but not predecessor
nodes which resulted in prefetching of unconnected subtrees.

9. The local AccessibilityManager implementation was relying on the backing
service being ready when it is created but it can be fetched from a context
before that. If that happens the local manager was in a broken state forever.
Now it is more robust and starts working properly once the backing service
is up. Several places were lacking locking.

bug:13331285

Change-Id: Ie51166d4875d5f3def8d29d77973da4b9251f5c8
/frameworks/base/core/res/AndroidManifest.xml
4f512fb451c8ddcea852645c5c24314c20c0974b 28-Feb-2014 Jinsuk Kim <jinsukkim@google.com> Add HDMI-CEC service

This CL adds a system service handling HDMI-CEC protocol. The service
is equipped with the capability sending/receiving HDMI-CEC messages

Not all the messages are in place. Currently it has messages to support
a few features only, as follows:

- One touch play
- System information
- Routing control (partially - active source status maintenance only)
- Device OSD transfer
- Power status

It will be extended to cover the wider usages in the follow up CLs.

The CEC standard version referenced in the implementation is 1.3a.

Change-Id: Ifed0b02f52ebf098eddb3bd0987efbf353b7e8fe
/frameworks/base/core/res/AndroidManifest.xml
d0abcedece5c749129af89cf096534c98a716d89 20-Mar-2014 Fabrice Di Meglio <fdimeglio@google.com> Merge "Introduce the SearchIndexablesProvider and its friends"
b49995d4d997bf086c2f3214ca410b2a30861b13 15-Mar-2014 Fabrice Di Meglio <fdimeglio@google.com> Introduce the SearchIndexablesProvider and its friends

- enable retrieval of search data to be indexed

Change-Id: I4a16408dec3d3305bf20107fb11eb2d1aee7fad5
/frameworks/base/core/res/AndroidManifest.xml
42c32c0c88e4049a358b0a2bf6e6a5881ee206b8 18-Feb-2014 Jeff Sharkey <jsharkey@android.com> Lock down MANAGE_DOCUMENTS permission.

MANAGE_DOCUMENTS is a very broad permission, since it allows full
access to all DocumentsProviders. DocumentsUI should really be the
only app holding this permission; everyone else should rely on Uri
permission grants for access.

Bug: 12958298
Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
b4ca2639e4fddaaf7ff72ec7322929d6397e66b7 13-Mar-2014 Jessica Hummel <jhummel@google.com> Temporarily allow system apps to fully act across users.

This is to allow launcher to start activities across users
and will be reverted when an alternative API is provided.

Change-Id: I67ec3e9d419afffbadce37d6e9958e2dfc096fb2
/frameworks/base/core/res/AndroidManifest.xml
d6396d67201fb2b64d13070324bb115c9c23b08a 28-Jan-2014 Jason Gerecke <killertofu@gmail.com> Allow persistence of input device calibration

This patch extends the PersistentDataStore store to read and write
input device calibration data. A new SET_INPUT_CALIBRATION permission
grants apps the ability to update this information, and a new
TouchCalibration class is used to wrap the raw calibration data.

Change-Id: I4daac2b15ef03616ea5b068c1e77bebd0ce7b8c1
/frameworks/base/core/res/AndroidManifest.xml
4c8c27ed7360abe3cd91a281e40d4e21948abc2a 04-Mar-2014 Santos Cordon <santoscordon@google.com> Updating wording around PROCESS_INCOMING_CALL. DO NOT MERGE.

bug: 12175514

Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa
(cherry picked from commit b4aeac730503eb4b9db7d2dcece48e1ca13b4b30)
/frameworks/base/core/res/AndroidManifest.xml
f55616cd8b78ed55148ee2dcfcf59cd34cdb4a96 03-Mar-2014 Dirk Dougherty <ddougherty@google.com> Update permission description string.

Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978
(cherry picked from commit 08d7c2861fee205a314c3847ab5f5894617a233b)
/frameworks/base/core/res/AndroidManifest.xml
b4aeac730503eb4b9db7d2dcece48e1ca13b4b30 04-Mar-2014 Santos Cordon <santoscordon@google.com> Updating wording around PROCESS_INCOMING_CALL.

bug: 12175514

Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa
/frameworks/base/core/res/AndroidManifest.xml
a4eeb0dca0108ac5b2c0f0dc044c9104ba1db302 04-Mar-2014 Dirk Dougherty <ddougherty@google.com> am bc8301df: am 0054ed81: am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs

* commit 'bc8301dfa3fc2789c4bf8dc82784075980b6329f':
Update permission description string.
0054ed815a3db340a27d8a179d3b748bf3eeaaf0 03-Mar-2014 Dirk Dougherty <ddougherty@google.com> am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs

* commit '8bb3b8f805658ecf9106778992dceea9a05dcc4c':
Update permission description string.
8bb3b8f805658ecf9106778992dceea9a05dcc4c 03-Mar-2014 Dirk Dougherty <ddougherty@google.com> am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs

* commit '95cf532fe389713ff1fb33810012586fd460e223':
Update permission description string.
26de0b7118e188bac5a30d9562418fa09be3826a 03-Mar-2014 Dirk Dougherty <ddougherty@google.com> am cce121fb: Merge "Update permission description string." into klp-docs

* commit 'cce121fb7504fbc460b85564735ff5d8a1ed4d55':
Update permission description string.
08d7c2861fee205a314c3847ab5f5894617a233b 03-Mar-2014 Dirk Dougherty <ddougherty@google.com> Update permission description string.

Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978
/frameworks/base/core/res/AndroidManifest.xml
3cff34742aa4f4b305b2edc462a369355b2e75da 03-Mar-2014 rich cannings <richc@google.com> am 341e6b73: am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev

* commit '341e6b73e6362f8757717a2518b370724c3a3913':
Make FORCE_STOP_PACKAGES "signature|system"
341e6b73e6362f8757717a2518b370724c3a3913 03-Mar-2014 rich cannings <richc@google.com> am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev

* commit 'fd6d8a8b736568ccb61af10dec04a99a8c36f29a':
Make FORCE_STOP_PACKAGES "signature|system"
0c9bd3ed4da14fbfe7f9cab872b94ed2be436cc2 12-Feb-2014 rich cannings <richc@google.com> Make FORCE_STOP_PACKAGES "signature|system"

Bug: 12992556
Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b
(cherry picked from commit 4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e)
/frameworks/base/core/res/AndroidManifest.xml
89f545a4ebd96b7d36b00eafa43db8ea70ed21f9 18-Feb-2014 Jeff Sharkey <jsharkey@android.com> Lock down MANAGE_DOCUMENTS permission.

MANAGE_DOCUMENTS is a very broad permission, since it allows full
access to all DocumentsProviders. DocumentsUI should really be the
only app holding this permission; everyone else should rely on Uri
permission grants for access.

Bug: 12958298
Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
5a92fec650447baddff3c85aaa83c6fc805880bf 14-Feb-2014 rich cannings <richc@google.com> Merge "Make FORCE_STOP_PACKAGES "signature|system""
005151484546fb0bf7f83c5a6ee065715230bf26 13-Feb-2014 Narayan Kamath <narayan@google.com> resolved conflicts for merge of 396b9e79 to master

Change-Id: Ie71a79699be57f5af6069559068bf6253835d805
27bf55c8159e7f883ddc839453d5a12374ddc50a 13-Feb-2014 Wink Saville <wink@google.com> am 16c0b295: am bba3a694: Merge "Telephony API extension v2"

* commit '16c0b295ef069e128a4e01fd2f72da06784950a1':
Telephony API extension v2
4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e 12-Feb-2014 rich cannings <richc@google.com> Make FORCE_STOP_PACKAGES "signature|system"

Bug: 12992556
Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b
/frameworks/base/core/res/AndroidManifest.xml
8f9b33e77686de8e917ba61c5e2f2e31a1e0e49b 15-Jan-2014 Jake Hamby <jhamby@google.com> Add new RIL commands to read/write NV items and reset NV config.

Add new RIL commands and generic code cleanups.

The only changes required for OMA DM support are the
addition of five new methods in ITelephony.aidl for
reading/writing NV items and performing NV config and
radio resets (requires MODIFY_PHONE_STATE), along with
the new RIL request IDs in RILConstants.java.

Bug: 12864208
Change-Id: I958d2571580d98a49936ef2e6822e5ac086acbe2
/frameworks/base/core/res/AndroidManifest.xml
31b4834b6d5eb1e5156950930b69221819a84766 03-Feb-2014 Christopher Tate <ctate@google.com> Merge "Introduce "IdleService" API to expose idle-time maintenance to apps"
d417d625d244356bc770e2692fd59e754a72f59f 20-Aug-2013 Christopher Tate <ctate@google.com> Introduce "IdleService" API to expose idle-time maintenance to apps

When an application wishes to do low-priority background work when the
device is otherwise idle (e.g. in a desk dock overnight), it declares
a service in its manifest that requires this permission:

android:permission="android.permission.BIND_IDLE_SERVICE

to launch, and which publishes this intent filter:

<intent-filter>
<action android:name="android.service.idle.IdleService" />
</intent-filter>

This string is declared in the API as IdleService.SERVICE_INTERFACE.

The service must be implemented by extending the new "IdleService"
class, which provides the API through which the system will communicate
with the app.

IdleService declares three methods, two of which are lifecycle callbacks
to the service, and the third of which is for the service itself to
invoke when appropriate. The lifecycle callbacks are

public abstract boolean onIdleStart();
public abstract void onIdleStop();

The first of these is a notification to the service that an idle
maintenance interval has begun. The service can then spin off
whatever non-UI work it wishes. When the interval is over, or if
the OS determines that idle services should be shut down immediately,
the onIdleStop() method will be invoked. The service must shut down
any background processing immediately when this method is called.

Both of these methods must return immediately. However, the OS
holds a wakelock on the application's behalf for the entire period
between the onIdleStart() and onIdleStop() callbacks. This means
that for system-arbitrated idle-time operation, the application does
not need to do any of its own wakelock management, and does not need
to hold any wakelock permissions.

The third method in IdleService is

public final void finishIdle();

Calling this method notifies the OS that the application has finished
whatever idle-time operation it needed to perform, and the OS is thus
free to release the wakelock and return to normal operation (or to
allow other apps to run their own idle services).

Currently the idle window granted to each idle service is ten minutes.
The OS is rather conservative about when these services are run; low
battery or any user activity will suppress them, and the OS will not
choose to run them particularly often.

Idle services are granted their execution windows in round-robin
fashion.

Bug 9680213

Change-Id: Idd6f35940c938c31b94aa4269a67870abf7125b6
/frameworks/base/core/res/AndroidManifest.xml
17b79985f4e5e6b696320e29f665adb796a2aef5 31-Jan-2014 John Spurlock <jspurlock@google.com> am 47e276db: am cbd156c1: Merge "Update READ&WRITE_DREAM_STATE to signature|system." into klp-modular-dev

* commit '47e276db2a938ca4ff9767cba28062b892e81629':
Update READ&WRITE_DREAM_STATE to signature|system.
4fda2d5ab7a3faf782c78e2f1ac4a54201ab8dff 31-Jan-2014 John Spurlock <jspurlock@google.com> Update READ&WRITE_DREAM_STATE to signature|system.

Change-Id: Ic3c4c5445384712571e7a1188ed9e2ab6ceb4bde
/frameworks/base/core/res/AndroidManifest.xml
bca57ee556c26cd3eaeccab43ec3ddda39d287fa 27-Jan-2014 Griff Hazen <griff@google.com> am e2bb257c: Merge "Make MANAGE_ACTIVITY_STACKS a signature|system permission." into klp-modular-dev

* commit 'e2bb257c349b21f68e3b9b87eb7cabd205380082':
Make MANAGE_ACTIVITY_STACKS a signature|system permission.
9e24357ddb504e575ce86207355811bfc9008088 27-Jan-2014 Griff Hazen <griff@google.com> Make MANAGE_ACTIVITY_STACKS a signature|system permission.

To allow ActivityView support within privileged apps.

Change-Id: Ic0246939bf71c52ca9415149415a976537c8270b
/frameworks/base/core/res/AndroidManifest.xml
3b0218b0ae1fad67f539ff3c10d6d2f3abec1a11 14-Jan-2014 Doug Zongker <dougz@android.com> boot into recovery via the pre-recovery service

Change PowerManagerService to start the pre-recovery service rather
than rebooting directly, when requested to reboot into recovery. Add
a new RECOVERY permission which a caller needs (in addition to REBOOT)
in order to go to recovery.

Bug: 12188746
Change-Id: I39121b701c4724558fe751adfbad79f8567faa43
/frameworks/base/core/res/AndroidManifest.xml
c5ac15a3e11c03951e269b243674858411204b67 27-May-2013 Antonio Marín Cerezuela <amarin@swissms.ch> Telephony API extension v2

Added new AndroidManifest permission:

android.permission.READ_PRECISE_PHONE_STATE

Added the following PhoneStateListeners and corresponding broadcast intents:

onPreciseCallStateChanged(PreciseCallState callState);
onPreciseDataConnectionStateChanged(PreciseDataConnectionState dataConnectionState);

broadcastPreciseCallStateChanged(int ringingCallState, int foregroundCallState, int backgroundCallState,
int disconnectCause, int preciseDisconnectCause)
broadcastPreciseDataConnectionStateChanged(int state, int networkType, String apnType, String apn,
String reason, LinkProperties linkProperties, String failCause)

Added TelephonyManager intent actions with their extras and constants:

public static final String ACTION_PRECISE_CALL_STATE_CHANGED = "android.intent.action.PRECISE_CALL_STATE";
public static final String ACTION_PRECISE_DATA_CONNECTION_STATE_CHANGED = "android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED";

public static final int PRECISE_CALL_STATE_*

Moved public static final int DISCONNECT_CAUSE_* from PreciseCallState.java to a new class DisconnectCause.java

Moved public static final int PRECISE_DISCONNECT_CAUSE_* from PreciseCallState.java to a new class PreciseDisconnectCause.java

Change-Id: If3b88c679507c529b746046c4a17cf6d9974bd09
/frameworks/base/core/res/AndroidManifest.xml
c4d41755d73ffe85d179d42a4f0c993b49303145 17-Dec-2013 Shishir Agrawal <shishir@google.com> Merge "Adding support for SIM communication from Android over logical channels."
57f656b9f6271cf857b5ecec5f8c7eacb321ec0b 28-Oct-2013 Shishir Agrawal <shishir@google.com> Adding support for SIM communication from Android over logical channels.

Expose the folowing commands in ITelephony.aidl and TelephonyManager:
- iccOpenLogicalChannel
- iccCloseLogicalChannel
- iccTransmitApduLogicalChannel

Also add a new SIM_COMMUNICATION permission (maked as dangerous) to control
access to the above commands.

Change-Id: I89c08adc6f9738907e3b547c749f3cc61f300710
/frameworks/base/core/res/AndroidManifest.xml
09e9cdceceb722643e2c80c6544d44a43d7f95f0 06-Nov-2013 Amith Yamasani <yamasani@google.com> DO NOT MERGE : Move some system services to their own sub package.

(Cherry pick from master)

As a next step they can be moved into separate directories to be
built as separate modules that may or may not be included in a
particular configuration.

Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS,
and WallpaperMS.

Change-Id: Idd92871c1828bdde81d85fe99a9c87a22d53169d
/frameworks/base/core/res/AndroidManifest.xml
38a7ed05f8fed0aa81f7214d827875f9876ffbe1 15-Nov-2013 Andres Morales <anmorales@google.com> Adding INfcUnlockSettings and NfcUnlock interface class.

Change-Id: Ie55a5d4bb58c2944952fc84cce32d3573a3a1a22
/frameworks/base/core/res/AndroidManifest.xml
84e0747552cfaa0546822df221e3dece7481c4b1 15-Nov-2013 Christopher Tate <ctate@google.com> am 461febad: am 64397749: am 22010817: Merge "Handle backup transport registration dynamically" into klp-dev

* commit '461febadc44190bf19e870a0bc1a706ec3667212':
Handle backup transport registration dynamically
cefba58d14f9669b57c16b4ea493779d882c43bd 15-Nov-2013 Christopher Tate <ctate@google.com> Handle backup transport registration dynamically

Bug 11369873

Change-Id: I9bbdcc21ce25159c6645690123b5d03c553b0ddc
/frameworks/base/core/res/AndroidManifest.xml
30f8eb472e44228069c2ffb8bd0b43213edbf04e 06-Nov-2013 Amith Yamasani <yamasani@google.com> Move some system services to their own sub package.

As a next step they can be moved into separate directories to be
built as separate modules that may or may not be included in a
particular configuration.

Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS,
and WallpaperMS.

Change-Id: I33e48d070f38186819d3a1d7a4dc3984b75a9eda
/frameworks/base/core/res/AndroidManifest.xml
6c58d890f3a6993a3bcf413b84ba6fba875832f8 08-Nov-2013 Jeff Brown <jeffbrown@google.com> am 84d76025: am eb223425: am 1f7a8a06: Merge "Add a platform library for remote display providers." into klp-dev

* commit '84d760257f46232601e5f47411fb4e59f57f1872':
Add a platform library for remote display providers.
1f7a8a06256907e03405f89108f081289c23e97a 08-Nov-2013 Jeff Brown <jeffbrown@google.com> Merge "Add a platform library for remote display providers." into klp-dev
f3c99e883f46c56e5e2877e844b902b6eb45545b 06-Nov-2013 Jeff Brown <jeffbrown@google.com> Add a platform library for remote display providers.

This interface allows applications to register services that offer
remote displays to the system. The system will then provide UI
to allow user to connect to these displays and enable mirroring.

Bug: 11257292
Change-Id: I34da5b9dfdaf71267bd3450c505bc1b7368d1b40
/frameworks/base/core/res/AndroidManifest.xml
99543e03b87899ac5de4f7f2dc388e5c9f546d04 30-Oct-2013 Jeff Sharkey <jsharkey@android.com> am 8f4797d1: am 35c94390: am 7ce4381a: Merge "Move READ_EXTERNAL_STORAGE to storage group." into klp-dev

* commit '8f4797d111cf3dd83fdda69bdbe2a7dcef1888d9':
Move READ_EXTERNAL_STORAGE to storage group.
eaa9780fd64f122df8a306562786e106ae228ceb 30-Oct-2013 Jeff Sharkey <jsharkey@android.com> Move READ_EXTERNAL_STORAGE to storage group.

Bug: 11437351
Change-Id: I460a3ee7860e8591e601eec7d390c3ca7eed1be6
/frameworks/base/core/res/AndroidManifest.xml
3aab4962513bc61ea75ac1e4cc239a97ee5f1860 23-Oct-2013 Martijn Coenen <maco@google.com> am 41fab0a1: am fa191d5a: am d9e98a4b: Merge "Unhide BIND_NFC_SERVICE permission." into klp-dev

* commit '41fab0a19caeb8077171f0eb605f416cbc4a0ef0':
Unhide BIND_NFC_SERVICE permission.
8c99ab849e7d9c87bae3b20377af66ad266eba99 23-Oct-2013 Martijn Coenen <maco@google.com> Unhide BIND_NFC_SERVICE permission.

Needs to be held by host-based card emulation
apps in order to work.

Bug: 11352063
Change-Id: I8ba42446cd3066b38309d8e9cbc51d140a023547
/frameworks/base/core/res/AndroidManifest.xml
ad9739cdbeb09f672304a0812c6c5fef5733e1c2 14-Oct-2013 Jeff Sharkey <jsharkey@android.com> am 5f7f97e0: am 2dbe1627: am 12ad9ce2: Merge "Fix spelling." into klp-dev

* commit '5f7f97e01507c6d5860388dfea860e05c2a3616e':
Fix spelling.
ed74f8eda220445a09f4b49b66de73da2f71c3eb 11-Oct-2013 Jeff Sharkey <jsharkey@android.com> Fix spelling.

Change-Id: Ibcc5a5b976e185c4a6605b18b645b05a5c00f3ec
/frameworks/base/core/res/AndroidManifest.xml
0fae349f19e2f4738c12f4849054c72a007770b0 10-Oct-2013 Dianne Hackborn <hackbod@google.com> am 353ec474: am 8029493f: am f012b777: Merge "Fix some doc issues." into klp-dev

* commit '353ec47422cbd1bb40f19e7ec9ec6b4f300ee3ab':
Fix some doc issues.
ebc15ef80ff1b4354be99a45d348537f094d6b59 10-Oct-2013 Dianne Hackborn <hackbod@google.com> Fix some doc issues.

Bug: 11079621
Bug: 10461610
Bug: 10461369
Bug: 10461417
Change-Id: I7fd966f3cda0660ba20fa15d7164dcac95efadd3
/frameworks/base/core/res/AndroidManifest.xml
b8aa12273f91b4b2689ceca5029da58d8f307bee 02-Oct-2013 Dianne Hackborn <hackbod@google.com> am af85c03d: am b9edb3a2: Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev

* commit 'af85c03deb3506cebebd1719df4bfb844505fc9d':
Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature.
3d2a664a426be706d293e895493ee96376b1de30 02-Oct-2013 Matthew Xie <mattx@google.com> am 9eb9ebb2: am 0e772b22: Merge "Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields" into klp-dev

* commit '9eb9ebb2fbbe1135919cf685d84eba18cfecdf01':
Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields
b9edb3a22b3342912bb9eef79aee0bfcb6be1675 01-Oct-2013 Dianne Hackborn <hackbod@google.com> Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev
3714141d287c965ea3451831dd5167f63f8db87b 30-Sep-2013 Dianne Hackborn <hackbod@google.com> Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature.

Change-Id: I432a2ddbd2fe1d095bb3895c5c122acf465d0c9b
/frameworks/base/core/res/AndroidManifest.xml
091fc2ba7a4441b9985dfd9ebe25cb7c99a7324b 24-Sep-2013 Matthew Xie <mattx@google.com> Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields

bug 9987787

Change-Id: Id1c149964137e35703310e2f2893c8830aacddea
/frameworks/base/core/res/AndroidManifest.xml
e5a8b028c3bccc5eb72c5d23c8a43eecee9740a7 26-Sep-2013 Winson Chung <winsonc@google.com> am 54e3e7b5: am 92baafb4: Merge "Moving Launcher permission to Framework. (Bug 10343529)" into klp-dev

* commit '54e3e7b5d43b87bddabfb2e312becb33a8c46582':
Moving Launcher permission to Framework. (Bug 10343529)
4516798862bf46d12b3f1130b8480e8c804146d0 26-Sep-2013 Winson Chung <winsonc@google.com> Moving Launcher permission to Framework. (Bug 10343529)

Change-Id: Ic48c254c844e65171b5f92d81272962cdc673acc
/frameworks/base/core/res/AndroidManifest.xml
80326646b79538178c3115a4bf2d89b9616c50be 19-Sep-2013 Jean-Michel Trivi <jmtrivi@google.com> am 58910a74: am 1608f496: Merge "Public API for RemoteController" into klp-dev

* commit '58910a746ebf915264b87536ab25148a94714ca2':
Public API for RemoteController
a83487e8c618f3c267c3fe3a72d4eb9f1388d07e 18-Sep-2013 Jean-Michel Trivi <jmtrivi@google.com> Public API for RemoteController

Public API, under system|signature permission for access to
currently playing metadata and playback state.
Public API for sending media key events.

Bug 8209392

Change-Id: I39b9309ca3fb1bc305492bad98740df0ae0842b2
/frameworks/base/core/res/AndroidManifest.xml
cac8a1c08ce5c07e5d5a4ab4314fa46ddf52c983 18-Sep-2013 Jean-Michel Trivi <jmtrivi@google.com> am f54f7d70: am 15bcc323: Merge "RemoteController class to expose IRemoteControlDisplay features" into klp-dev

* commit 'f54f7d707546a99ffc5345591f2c9488e6149e84':
RemoteController class to expose IRemoteControlDisplay features
7ddd226e7c6e759feaf2747a90be1cc06acf37a3 02-Sep-2013 Jean-Michel Trivi <jmtrivi@google.com> RemoteController class to expose IRemoteControlDisplay features

Wrap all the features of IRemoteControlDisplay.aidl in a
new class, RemoteController, that implements the
IRemoteControlDisplay interface.

The API functions to expose in the SDK are tagged with
"CANDIDATE FOR API"

Bug 8209392

Change-Id: I597bcd503ac93e73889c9ae8b47b16c4fcb363bc
/frameworks/base/core/res/AndroidManifest.xml
8a4577a1697f053f94527fc2dfa89209284d8d71 17-Sep-2013 Santos Cordon <santoscordon@google.com> am deae1e11: am b00e5cc6: Merge "Add permissions for the InCallUI Split." into klp-dev

* commit 'deae1e11bf9d6ee40e70bee62d24dbcb01ef1b60':
Add permissions for the InCallUI Split.
b00e5cc610f24aca7e989db0ca552c952d2a924f 17-Sep-2013 Santos Cordon <santoscordon@google.com> Merge "Add permissions for the InCallUI Split." into klp-dev
798363894d21cf87bf1915372f9dcc4605b3d4ac 13-Aug-2013 Santos Cordon <santoscordon@google.com> Add permissions for the InCallUI Split.

Change-Id: Ic1023adba939c82e9bce844c104f85821f21f43c
/frameworks/base/core/res/AndroidManifest.xml
dde1f8b01b02b6227444d9096e106b93615bb83f 12-Sep-2013 Selim Gurun <sgurun@google.com> am 1e763fd2: am e4fdc847: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev

* commit '1e763fd280b3dc555e6a0a3a6458fbdb9a43e096':
Revert "Add permissions for the InCallUI Split."
e4fdc84794923f9408fc400ed9177178329a08cd 12-Sep-2013 Selim Gurun <sgurun@google.com> Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
41b9ef9c4e175770e4ccef3d83d117f404915b48 12-Sep-2013 Selim Gurun <sgurun@google.com> Revert "Add permissions for the InCallUI Split."

This reverts commit 4f7ffa90d117e499786c77bccefdef88c1714668.

Change-Id: If07f7dd0b416c070398593e2d5a15b3557c1f323
/frameworks/base/core/res/AndroidManifest.xml
835b5f344ba63a6c0ac9c8a7cc40052134d59b8c 12-Sep-2013 Eric Laurent <elaurent@google.com> am e33b79ef: am 95a18139: Merge "Add HOTWORD as an AudioSource" into klp-dev

* commit 'e33b79ef373fd3db9de035b5ecf2137a0684a441':
Add HOTWORD as an AudioSource
e7f6bfbc51365f40185f53027c7dd5a07e162924 12-Sep-2013 Santos Cordon <santoscordon@google.com> am 07d545e0: am e0b7e4cf: Merge "Add permissions for the InCallUI Split." into klp-dev

* commit '07d545e08d615865860a0f73b7eabfd149754893':
Add permissions for the InCallUI Split.
4c980cc6aede622b165d7936a89aae507a317cd3 12-Sep-2013 Alexander Ray <aray@google.com> am b0049151: am 7563d423: Merge "Add consumer IR framework" into klp-dev

* commit 'b0049151f7c1f2ffa7481ac7c6f6baf7a548c5e8':
Add consumer IR framework
6f64688bc8c1fc01b632dadfe4f75587f446e626 12-Sep-2013 Sandeep Siddhartha <sansid@google.com> am 6c5e9fb4: am f702286c: Merge "Remove HotwordRecognition APIs" into klp-dev

* commit '6c5e9fb4c4215f76a8a1fd8d72eee1154deb1039':
Remove HotwordRecognition APIs
95a181397dad3113b96e3cc7392a5b0f5d742f39 12-Sep-2013 Eric Laurent <elaurent@google.com> Merge "Add HOTWORD as an AudioSource" into klp-dev
e0b7e4cf455b21316661b158edee12ac5467995c 11-Sep-2013 Santos Cordon <santoscordon@google.com> Merge "Add permissions for the InCallUI Split." into klp-dev
7563d42331ed7df7f026c8921ae990ce2fca9efd 11-Sep-2013 Alexander Ray <aray@google.com> Merge "Add consumer IR framework" into klp-dev
65a6ba347848069b198869a7500d07a419aaf15d 11-Sep-2013 Sandeep Siddhartha <sansid@google.com> Remove HotwordRecognition APIs

- and its usage from Keyguard

Bug: 10708010
Change-Id: Ic4a695a1d0e9312706a3b4ff01e59e2567b6ad9c
/frameworks/base/core/res/AndroidManifest.xml
51e95df8f24e9ea30775686b9e324b9a671213dc 26-Jun-2013 Erik Gilling <konkers@android.com> Add consumer IR framework

Change-Id: I786c00db0cce61ef75e4edc24e90f2cdcba6dbfb
/frameworks/base/core/res/AndroidManifest.xml
357263da0ec2bc2be9d48c1becc3d94288c2f3ed 09-Sep-2013 Eric Laurent <elaurent@google.com> Add HOTWORD as an AudioSource

- This is a low-priority source that can be preempted by others
- This is required for scenarios where someone wants an alway-on
graceful microphone

Bug: 10640877.

Change-Id: Idb3577541103717cb713a7a93d3762ad2c2f4710
/frameworks/base/core/res/AndroidManifest.xml
4f7ffa90d117e499786c77bccefdef88c1714668 13-Aug-2013 Santos Cordon <santoscordon@google.com> Add permissions for the InCallUI Split.

Change-Id: I7e45aeebbe8873f99fe897272390fb06f1840d2d
/frameworks/base/core/res/AndroidManifest.xml
bc7d392ef1fb7f7cf12a518b20d6e8f59e092c51 07-Sep-2013 Sandeep Siddhartha <sansid@google.com> am c3360d2a: am b05b4086: Merge "Add permission checks and unhide the Hotword recognition APIs" into klp-dev

* commit 'c3360d2a8b6d7b8e820c99844364be4f1fc83824':
Add permission checks and unhide the Hotword recognition APIs
c73c1783744baeeabc620ecede545e0ffbd034d4 06-Sep-2013 Sandeep Siddhartha <sansid@google.com> Add permission checks and unhide the Hotword recognition APIs

- Also tweak the API a little to send an intent on hotword being
recognized.

Change-Id: I8a3fedaec4e1db595ed058089734d25c7957111e
/frameworks/base/core/res/AndroidManifest.xml
cd57b4950f5df4c3c435ec3995d730ad98b525dc 06-Sep-2013 Amith Yamasani <yamasani@google.com> am 3d27c9f9: am f1eebfc2: Merge "Remove unused APIs and rename others based on API review" into klp-dev

* commit '3d27c9f973b1dd35ed457785b452851316cdca8a':
Remove unused APIs and rename others based on API review
d304af69891483aad808356af1ac5f00e90c8edf 05-Sep-2013 Amith Yamasani <yamasani@google.com> Remove unused APIs and rename others based on API review

Restrictions challenge is only to be used by device admins.

Bug: 10461761
Change-Id: I3db1249e2ce99f386602de59ed930302bb0a97fb
/frameworks/base/core/res/AndroidManifest.xml
7275ecc5094f119be35f485ebad9ef1c858d8206 04-Sep-2013 Tom O'Neill <tomo@google.com> am 70c2dd93: am 2cf8138b: Merge "Add LocationManager.MODE_CHANGED_ACTION broadcast" into klp-dev

* commit '70c2dd932bd585ed578ea684db06f17c4e5d24d3':
Add LocationManager.MODE_CHANGED_ACTION broadcast
40a86c24d2601df4966c57573a5bf58b30a41990 04-Sep-2013 Tom O'Neill <tomo@google.com> Add LocationManager.MODE_CHANGED_ACTION broadcast

- Currently redundant with PROVIDERS_CHANGED_ACTION, but that may
change in the future

- Part of fix for b/10409275

Change-Id: I12daaf20e6546fd9e9dc71c599967fa0ad95e27f
/frameworks/base/core/res/AndroidManifest.xml
92774a9f9739da20a47ea576f91777e656106db9 03-Sep-2013 Santos Cordon <santoscordon@google.com> am 8bd2eb31: am 90a5df1e: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev

* commit '8bd2eb314bf923f556fda0229a1ef44392c4ec00':
Revert "Add permissions for the InCallUI Split."
90a5df1ee8c89ca17df93d9ecf95652b2ae619f4 03-Sep-2013 Santos Cordon <santoscordon@google.com> Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
b6c46d2381e707f0b55b193636fc515ba3129d7a 03-Sep-2013 Santos Cordon <santoscordon@google.com> Revert "Add permissions for the InCallUI Split."

This reverts commit bf84eb5ed579d13b74c97b995299ca61cafedea6.

Change-Id: I40e311174898a741f5053501290833420355ad03
/frameworks/base/core/res/AndroidManifest.xml
42d1cd25be5865fa2f50948e71fd50cd74ba18c6 03-Sep-2013 Santos Cordon <santoscordon@google.com> am 8fab063a: am 7f60dc57: Merge "Add permissions for the InCallUI Split." into klp-dev

* commit '8fab063abcfef648bef9232dad62c8b8cea251d5':
Add permissions for the InCallUI Split.
7f60dc57780281030f26a2109a64d0260e976af7 03-Sep-2013 Santos Cordon <santoscordon@google.com> Merge "Add permissions for the InCallUI Split." into klp-dev
bf84eb5ed579d13b74c97b995299ca61cafedea6 13-Aug-2013 Santos Cordon <santoscordon@google.com> Add permissions for the InCallUI Split.

Change-Id: Ic759d14acefcea746e0d8e86c0f006d4bc462386
/frameworks/base/core/res/AndroidManifest.xml
4b905b6195443acb2e16f234f4cb24318b9a3458 30-Aug-2013 Svetoslav Ganov <svetoslavganov@google.com> am 97c61ab7: am 86d2db97: Merge "Print spooler security and some new print service facing APIs." into klp-dev

* commit '97c61ab7c02c24c485acf5775310a304730dfeea':
Print spooler security and some new print service facing APIs.
86d2db9750657401deadea6766c94300c3bfc7cd 30-Aug-2013 Svetoslav Ganov <svetoslavganov@google.com> Merge "Print spooler security and some new print service facing APIs." into klp-dev
d26d4898fcc9b78f4b66118895c375384098205e 28-Aug-2013 Svetoslav Ganov <svetoslavganov@google.com> Print spooler security and some new print service facing APIs.

1. Updated the security mode of the print spooler. Now the spooler
is not signed with the system key, it is not a privileged app so if
it gets compromised (PDF rendering is a potential attack vector)
it cannot access dangerous permissions. Also only the system
can bind to the spooler.

2. Added APIs for asking a print service to start and stop tracking
a given printer. This is need for the case when the user selects
the printer and the print service should do a best effort to keep
the system updated for the current state of the printer.

3. Added APIs for putting a print job in a blocked state. A print
service would report the print job as blocked if for some reason
the printer cannot proceed, e.g. 99 pages are printed but there
is no paper for the last one. The user has to add more paper
and the print service can resume the job.

4. Changed the read/write APIs to use ParcelFileDescriptor instead
of FileDescriptor since the latter does not have a clean API for
detaching the wrapped Linux file descriptor when one wants to
push it to native.

5. Added API for getting the size of the printed document so the
print service can avoid handling big filed over cellular network
or ask the user if needed.

6. Now the print services that are preinstalled on the system image
are automatically enabled.

Change-Id: Ia06c311d3d21cabb9e1368f13928e11cd0030918
/frameworks/base/core/res/AndroidManifest.xml
ae1fda5aa3979445153d84f418092cc2473b3c24 30-Aug-2013 Wink Saville <wink@google.com> am d2f41b3d: am 35bd30b1: Merge "Merge commit \'270226b0\' into manualmerge" into klp-dev

* commit 'd2f41b3dc692e2c9a0c2f60bdf0730d9b52b6df3':
Add support for handling mobile provisioning networks.
7788c61af5927a0fac612ea94d5205eeec2f507f 29-Aug-2013 Wink Saville <wink@google.com> Merge commit '270226b0' into manualmerge

* commit '270226b0':
Add support for handling mobile provisioning networks.

Conflicts:
core/java/android/net/CaptivePortalTracker.java
core/java/android/net/ConnectivityManager.java
core/java/android/net/IConnectivityManager.aidl
core/java/android/net/MobileDataStateTracker.java
core/res/AndroidManifest.xml
services/java/com/android/server/ConnectivityService.java

Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
948282b0e6cf5310f09db97a4ae939db7c1cef72 29-Aug-2013 Wink Saville <wink@google.com> Add support for handling mobile provisioning networks.

When a sim is new or it has expired it needs to be provisioned
with the carrier. Basically provisioning is associating a sim with
a user account. When a sim isn't provisioned then operators will
restrict access to the network and only allow certain addresses
or services to be used.

This set of changes allows two types of provisioning networks to be
recognized. The first is a network that causes all DNS lookups to be
redirected to a different address than was intended. This is exemplified
by how T-Mobile works.

The second technique uses a special apn for provisioning. An example is
AT&T where lwaactivate is the provisioning apn and broadband is the
normal apn. We first try broadband and if we are unable to connect we
try lwaactivate. When we see the activate we identify it as special and
the ApnContext.isProvisioningApn will return true.

In the future our plan is to create a new network type that can be added
to the apn list, but for now it identified by name.

Here is a list of significant changes:

- CaptivePortalTracker now only test WiFi networks instead of all networks
- checkMobileProvisioning checks for provisioning networks and doesn't
try to ping.
- IConnectivityManager.aidl changes:
* getProvisioningOrActiveNetworkInfo was added to and used by Manage
mobile plan in WirelessSettings so even when there is no active
network it will still allow provisioning. Otherwise it would report
no internet connection.
* setSignInErrorNotificationVisible is used by both
CaptiviePortalTracker and checkMobileProvisioning so they use the
same code for the notifications.
* checkMobileProvisioning was simplified to have only a timeout as
returning the result is now harder as we abort simultaneous call
otherwise we'd could get into loops because we now check every time
we connect to mobile.
- Enhanced MDST to handle the provisioning network.
- Added CONNECTED_TO_PROVISIONING_NETWORK to NetworkInfo to make a new
state so we don't announce to the world we're connected.
- TelephonyIntents.ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN
is sent by the low level data connection code to notify Connectivity
Service that a provisioning apn has connected. This allows CS to
handle the connection differently than a normal connection.

Bug: 10328264
Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
/frameworks/base/core/res/AndroidManifest.xml
18643b58eec84c0ce5a10ced66c93e95fbb41cb4 27-Aug-2013 Jeff Brown <jeffbrown@google.com> am 2517d08b: am 61d806c7: Merge "Docs changes pursuant to API review feedback." into klp-dev

* commit '2517d08b9a09d123729b01d34840e96f099ea704':
Docs changes pursuant to API review feedback.
511cd35fcc0b8ab048f284a6af374de8ccc69865 24-Aug-2013 Jeff Brown <jeffbrown@google.com> Docs changes pursuant to API review feedback.

Change-Id: I74c51791192f7fefad4e299d25c91438cbf6ab73
/frameworks/base/core/res/AndroidManifest.xml
7e458235ac2f2522bea07aa24423b39d1729d2e3 23-Aug-2013 Jeff Brown <jeffbrown@google.com> Remove input flinger stubs. (DO NOT MERGE)

Bug: 10446930
Change-Id: I6c9fd490f2efd9c359c598eb2a18c4150b446564
/frameworks/base/core/res/AndroidManifest.xml
e2a6d3df1257c1c04b1a14777bb7ee65f634bdc3 22-Aug-2013 Vinit Deshapnde <vinitd@google.com> Merge "Introduce network link quality statistics" into klp-dev
1f12cb52a494a3eaefc62d03a8d2fdf47a5535e9 21-Aug-2013 Vinit Deshapnde <vinitd@google.com> Introduce network link quality statistics

This change starts tracking traffic quality data for WiFi and mobile
networks. The quality is tracked based on incidental traffic, and not
on specific measurements. Theoretical bandwidths are hard-coded, as
well as sampling interval; although sampling interval can be changed
by setting a system policy.

Bugs filed to remove shortcomings of this change -

10342372 Change LinkInfo name to something better
10342318 Move hardcoded values of MobileLinkInfo to resources
so they can be updated without changing code

Bug: 10006249

Change-Id: I83d8c7594da20fe53abbd5e1f909b1f606b035bb
/frameworks/base/core/res/AndroidManifest.xml
e530c41b57514d419cdc7a7b14802b6954d3293c 21-Aug-2013 Matthew Xie <mattx@google.com> Merge "Protect a bunch of broadcast intents" into klp-dev
6b8a6a6e056c0f639220c4bfdf044d5f04bc593e 21-Aug-2013 Matthew Xie <mattx@google.com> Protect a bunch of broadcast intents

All the changed intents are restricted. Only Bluetooth Process can
broadcast/send them.
bug 7622253

Change-Id: I098664bf266ac44b7904f8f79b1804d5130f5cd5
/frameworks/base/core/res/AndroidManifest.xml
ff796e5a24481febd8c07b1a6a3c3eda0e3fd88b 21-Aug-2013 Jason Monk <jmonk@google.com> Merge "Change PacProcessor to Android Service" into klp-dev
9ced3cd9d6ea414523051ec872fffc68f5fdbf08 12-Aug-2013 Jason Monk <jmonk@google.com> Change PacProcessor to Android Service

This switches the PacProcessor over to an Android Service. The service
is bound and unbound by the PacManager, which also adds it to the
ServiceManager, allowing for Context-Free access by the PacProxySelector
in all DVMs.

bug:10182711
Change-Id: Id1ff7660be56e8976cdcccd76e041feb47a17a61
/frameworks/base/core/res/AndroidManifest.xml
da51e68e582ffa017543982297c831680d201a91 09-Aug-2013 Maggie Benthall <mbenthall@google.com> Add methods for managing CAs to DevicePolicyManager(Service)

Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES.
Also include API methods for asking whether there are any User CA certs
installed, or if one by a particular name is installed in the keystore.

CA certs will be installed via KeyChain into the TrustedCertificateStore.

Bug: 8232670

Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/res/AndroidManifest.xml
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 13-Aug-2013 Jeff Sharkey <jsharkey@android.com> Add GIDs to packages.list, update SD card perms.

Write supplementary GIDs to packages.list for lower-level system
components to parse.

WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always
enforce READ_EXTERNAL_STORAGE permission. Update permission docs to
mention new behavior.

Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/core/res/AndroidManifest.xml
1ed51627d94b140e8893b8e1dcde9bf37e2adca7 01-Aug-2013 Brian Williammee <bwill@google.com> Track latency of captive portal checks

When captive portal check occurs, track its latency, whether or not
we received a response, and whether or not the response was a captive
portal. Pair with information identifying the access point / base
station, and broadcast it (with a system|signature-protected
permission).

Broadcast only occurs if user has consented to
Settings.Global.WIFI_SCAN_ALWAYS_AVAILABLE.

Change-Id: I6fd59954a7ee2cc7acedf064a1465882653b2173
/frameworks/base/core/res/AndroidManifest.xml
7d00affce6e25b22fd8fc135933b3bf6b547a0dc 03-Aug-2013 Jeff Brown <jeffbrown@google.com> Support public virtual displays.

Refactor the new private virtual display API to also support
creating public virtual displays with various characteristics.
This feature requires special permissions and is only intended
for use by the system.

Change-Id: I44dd19f37cf76ea6d6e313afe42f4a412bd96663
/frameworks/base/core/res/AndroidManifest.xml
a7397883de67d674970d91f86d46ccf637e5e543 31-Jul-2013 Martijn Coenen <maco@google.com> NFC: Host-based card emulation APIs.

- New INfcCardEmulation interface to allow apps to interface
with card emulation system.
- New BIND_NFC_SERVICE permission to prevent malicious apps
from binding to card emulation services.
- ApduServiceInfo is now in the framework.
- Added constants to Settings.Secure for storing defaults.
- Modified XML grammar a bit.

Change-Id: I56b3fa6b42eb5dc132c91c1386ab1e6bac779059
/frameworks/base/core/res/AndroidManifest.xml
a418cf21c9d03c1435e9adec3e025387b6345cd9 19-Jul-2013 Amith Yamasani <yamasani@google.com> New permission to manage device admins

The previously used permission was doing double duty as the permission
that device admins to check for to ensure that calls are coming from valid
system components.

MANAGE_DEVICE_ADMINS is system|signature and is now required to add/remove
device admins.

Required for:
Bug: 9856348

Change-Id: I64385d2ec734c3957af21b5a5d9cffd8a3bcd299
/frameworks/base/core/res/AndroidManifest.xml
538cdb98ef06a1768c582df28e8cc0e4335dd216 19-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> resolved conflicts for merge of 85b5e4c4 to master

Change-Id: Idd0ad9b1504fddf68c4c4cc04731de1eddd204b3
e182bfe398a132236f723a76522bacd4d6d4c0a4 16-Jul-2013 Robert Greenwalt <rgreenwalt@google.com> Add gservices updater for carrier provisioning url

bug:9623159
Change-Id: I36697ed341353b7a3dbec5afe20241102e76f6f1
/frameworks/base/core/res/AndroidManifest.xml
6c1c0b6cbecf0cd0486a9a781da5e6f9bd2c0eaa 13-Jul-2013 Jeff Brown <jeffbrown@google.com> Declare permission for accessing input flinger.

Change-Id: I2914b301b74e0d310a9e95e2d6fb5cb72d3e3703
/frameworks/base/core/res/AndroidManifest.xml
10dd2b6464c0d9b78ae16cf19e62df947299c408 15-Jul-2013 Evan Charlton <evanc@google.com> Merge "Add carrier setup app integration"
1df62d27838657a0988f38883f906be024af7d87 12-Jul-2013 Geremy Condra <gcondra@google.com> Merge "Permissions to protect socket marking settings"
f11e5d34766a589af46ffc47e461b0103250fd69 09-Jul-2013 Chad Brubaker <cbrubaker@google.com> Permissions to protect socket marking settings

Add the manifest entries for the net_mark group that protects marking
traffic as from another user in per user routing.

Change-Id: I97932a9e407467a7adc733caea8746a712bc6b68
/frameworks/base/core/res/AndroidManifest.xml
843d5ea5ec965c17de525b3a9f52c8cb9d352c3c 13-May-2013 Evan Charlton <evanc@google.com> Add carrier setup app integration

Add an intent to invoke a native carrier setup app. This is paired
with the INVOKE_CARRIER_SETUP permission, though it is up to the app
to enforce that callers hold this permission.

Change-Id: I317a40675de7e9587de23c028459be2331a2f8a2
/frameworks/base/core/res/AndroidManifest.xml
053f61d6a6e23825e680dc49982e55c5b4299d61 27-Jun-2013 Dianne Hackborn <hackbod@google.com> Work on issue #9586838: Crash after waking up Hammerhead device

I made the power manager more rigid, not allowing different uids
to use the same wake lock. This never should happen. I would
guess there is somewhere that the activity manager is acquiring
the wake lock without clearing the calling identity... but it is
hard to follow all the paths this may happen in. So here we add
some checks when acquiring/releasing the wake lock to make sure
it is being done as the system uid.

Also:

- Protect the new activity stack calls with a permission, and
make sure to clear the calling uid once past that.
- Collect uid data from process stats so we can correctly
associate CPU use with a uid even if we don't know about the
pid for some reason.
- Fix battery stats dump commands to clear calling uid before
executing so they aren't broken.

Change-Id: I0030d4f7b614e3270d794ecfc3669139a5703ce9
/frameworks/base/core/res/AndroidManifest.xml
5fa9f2b127c2d7c40da419540f3425ac45a89439 27-Jun-2013 Amith Yamasani <yamasani@google.com> Merge "Single-user restrictions"
505e35bca9e19773e42cb8771fcf36158208b8ab 26-Jun-2013 Robert Greenwalt <rgreenwalt@google.com> am c869696e: am 65f7a95f: am 2f50097a: Merge "Fix power issues around wifi scans." into jb-mr2-dev

* commit 'c869696ef3c1dca3efbc6ce8ab804e8a1b117900':
Fix power issues around wifi scans.
89710842585404ea33f941afeb2c321e706005e9 25-Jun-2013 Robert Greenwalt <rgreenwalt@google.com> Fix power issues around wifi scans.

- Sending a broadcast indicating when scan requests could be serviced so that
apps don't request scans we won't do anything with.
- Fix our batt stats accounting so we only count it if we send the request to
the driver.

bug: 8868201
bug: 9496690
Change-Id: I64a4f1c294c848ac64c50d8854ed4a6a1a47f603
/frameworks/base/core/res/AndroidManifest.xml
655d0e2029e6ae77a47e922dce4c4989818b8dd1 12-Jun-2013 Amith Yamasani <yamasani@google.com> Single-user restrictions

Introduces a new "blocked" state for each package. This is used to temporarily
disable an app via Settings->Restrictions.

PIN creation and challenge activities for use by Settings and other apps. PIN
is stored by the User Manager and it manages the interval for retry attempts
across reboots.

Change-Id: I4915329d1f72399bbcaf93a9ca9c0d2e69d098dd
/frameworks/base/core/res/AndroidManifest.xml
4b9a4d16872bbb50712e007b419ac0b35ff1582d 12-Jun-2013 Svetoslav Ganov <svetoslavganov@google.com> Print - platform APIs

Related changes:
Skia (inlcude PDF APIs): https://googleplex-android-review.googlesource.com/#/c/305814/
Canvas to PDF: https://googleplex-android-review.googlesource.com/#/c/319367/
Settings (initial version): https://googleplex-android-review.googlesource.com/#/c/306077/
Build: https://googleplex-android-review.googlesource.com/#/c/292437/
Sample print services: https://googleplex-android-review.googlesource.com/#/c/281785/

Change-Id: I104d12efd12577f05c7b9b2a5e5e49125c0f09da
/frameworks/base/core/res/AndroidManifest.xml
6fbb5553a5b2d7c19ea411ace9a46e18262698c4 13-Jun-2013 Jeff Sharkey <jsharkey@android.com> Merge "Protect more system broadcasts."
61277dfcd9479cfaca0fce00f00a79a2e51083a2 13-Jun-2013 Jeff Sharkey <jsharkey@android.com> Protect more system broadcasts.

Bug: 8877514
Change-Id: Iaff8a5fbfab2c48bf26ce611fe2caff4f22d9152
/frameworks/base/core/res/AndroidManifest.xml
81888d56610bd4771e61b47c2c57a62966c11385 11-Jun-2013 Scott Main <smain@google.com> am 26bc073d: am fe7c2220: Merge "add NA message for any "signature" level permissions" into jb-mr2-dev

* commit '26bc073dfa32c8122ce194cfc39e2dfc44370fcd':
add NA message for any "signature" level permissions
93e60b5b2618c65b9494c474fd09563f8b6e42f3 10-Jun-2013 Scott Main <smain@google.com> add NA message for any "signature" level permissions

Change-Id: If76e9e3b7ffc5d97422321db312a03869c407f08
/frameworks/base/core/res/AndroidManifest.xml
5a3915b06bf1e82cda024945d3b71b51b470b809 24-May-2013 Amith Yamasani <yamasani@google.com> UX compliance for error messages

Bug: 9122154
Change-Id: I4a64750f11845a230321450bc6a2955cb73e3b6d
/frameworks/base/core/res/AndroidManifest.xml
049219925fc2fb3adee803731a2ccd1c6c7c580a 21-May-2013 Jay Shrauner <shrauner@google.com> am 66d67241: am 34bed420: Merge "Update CALL_PRIVILEGED docs" into jb-mr2-dev

* commit '66d67241205e857e434bacf1a1e8fb8e3100018d':
Update CALL_PRIVILEGED docs
592c9fc3122eb86cc66f18de4cc29dadb7a12c8c 17-May-2013 Jay Shrauner <shrauner@google.com> Update CALL_PRIVILEGED docs

Add usage restriction note to CALL_PRIVILEGED permission doc.

Bug:8987211
Change-Id: I3545e2ae30464680e533e3eea0ff9ae913e20ef6
/frameworks/base/core/res/AndroidManifest.xml
9ecfee03fa188aebfbd9778b4e020323903495ee 19-Apr-2013 Jeff Sharkey <jsharkey@android.com> Start fleshing out new storage APIs.

Introduces new DocumentsContract which storage backends must
implement. Backends surface a simple directory-like organizational
structure that enables a document to appear at multiple locations in
that hierarchy. Querying a document or the contents of a directory
will return a Cursor populated with DocumentColumns, which includes
simple metadata.

Adds new OPEN_DOC and CREATE_DOC Intents, and permission to protect
storage backends.

Change-Id: Ib4984bc980182b2cedbe552908e5be94604ef085
/frameworks/base/core/res/AndroidManifest.xml
c0b676dcc23baedb12946c3470d9fa9b02cb39e0 23-Mar-2013 Jim Miller <jaggies@google.com> Add keyguard background scrim and protection around keyguard APIs

With this change, the system process will put up a scrim in the
event keyguard crashes to protect underlying content.

It also adds permission checks to prevent unathorized access
through the binder APIs.

Cleaned up KeyguardTestActivity to build separately.

Removed unused resources.

Change-Id: I9e370c6bfb7dca68eae9eae304c815fb84a753d2
/frameworks/base/core/res/AndroidManifest.xml
2d0ed28ff65ad110c875a61cb3c20ca922640bd6 26-Apr-2013 Igor Murashkin <iam@google.com> am 10ce90ad: am eaebe4c1: Merge "Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED" into jb-mr2-dev

* commit '10ce90adfafa25e417fdefa7510e53bc70bccd7b':
Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED
f640bb9bbbe104fd08c98df240f1aeea0cacdbab 23-Apr-2013 Igor Murashkin <iam@google.com> Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED

This system-only permission allows a service to disable the transmit LED
when a camera is in use.

Bug: 8554573
Change-Id: I64f7e3fcdc8ded8be3904650bd0c91d3b8f10dd4
/frameworks/base/core/res/AndroidManifest.xml
5c0bd520b8095a12c6cd0c8cf0a6837b2addf520 19-Apr-2013 Svetoslav <svetoslavganov@google.com> am ab3f5903: am 688a6977: Replacing accessibility service permissions with capability attributes.

* commit 'ab3f5903fc4cefbaed6c5cf2242703d56f80028e':
Replacing accessibility service permissions with capability attributes.
688a6977cf7673ed0542ab3d839053c4e38a4dbd 17-Apr-2013 Svetoslav <svetoslavganov@google.com> Replacing accessibility service permissions with capability attributes.

Accessibility services can perform special operations such as retrieve
the screen content, enable explore by touch, etc. To ensure the user
is aware that the service will perform special operations we were using
permissions. However, the special operations cannot be performed unless
the service is really enabled by the user and it is at this point that
we want to notify the user about the service capabilities.

This change adds capability attributes to the accessibility service's
meta-data XML file. The service has to declare the capability and when
it is enabled we show the user the capabilities in the warining dialog.

bug:8633951

Change-Id: Id3442dc71dad018e606888afdc40834682fdb037
/frameworks/base/core/res/AndroidManifest.xml
6c5a2e72bd2f9a83fef7abc1441d58212da48211 19-Apr-2013 Dirk Dougherty <ddougherty@google.com> am e0495912: am 5a02663d: Merge "Doc change: Eat some permissions group comments." into jb-mr2-dev

* commit 'e0495912246495d784736cad7d5e4fa87ed788d8':
Doc change: Eat some permissions group comments.
f6878b009ad680630577ed45207d064bc99059ad 19-Apr-2013 Dirk Dougherty <ddougherty@google.com> Doc change: Eat some permissions group comments.

Change-Id: I6db06ed80fbc9e3d71c2a029cc50a6fa954d35b9
/frameworks/base/core/res/AndroidManifest.xml
63e7dcf9cf190e1286003b4b3674e94b0d8c2dca 18-Apr-2013 Robert Greenwalt <rgreenwalt@google.com> am e3e55f2a: am 5d1a182a: Merge "Secure broadcasts." into jb-mr2-dev

* commit 'e3e55f2a1943a296472d91680a385ea5dc288a31':
Secure broadcasts.
5d1a182a8a2dd9613ef3b1f2de7b6a3d690ae890 18-Apr-2013 Robert Greenwalt <rgreenwalt@google.com> Merge "Secure broadcasts." into jb-mr2-dev
68b13ba12f2096cd69824187f9b744cbd651bc38 18-Apr-2013 Robert Greenwalt <rgreenwalt@google.com> Secure broadcasts.

Prevents 3rd party spoofing.

bug:7622253
Change-Id: I1e1a9887afe009d060205e349c31e3aefba2ea5b
/frameworks/base/core/res/AndroidManifest.xml
2590a8b341a176672474e67a7b322f82bcc93795 17-Apr-2013 Dianne Hackborn <hackbod@google.com> am bc463ea1: am e8d12dd6: Merge "Fix issue #8032572: Android app permission help text "null"..." into jb-mr2-dev

* commit 'bc463ea1c5fa9c80fa06183a82fdd1acfb5289e5':
Fix issue #8032572: Android app permission help text "null"...
84c7111c4ba2f2f956103e0a7dcc03664b8d6f23 17-Apr-2013 Dianne Hackborn <hackbod@google.com> Fix issue #8032572: Android app permission help text "null"...

...for "Microphone / Record audio"

Change-Id: Ie839b055771950e1078fa66506a007203338cfb5
/frameworks/base/core/res/AndroidManifest.xml
18a21459729ba6fd40545ee7ed2128dcb83eb23f 11-Apr-2013 Amith Yamasani <yamasani@google.com> am 399a2977: am b3a98725: Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev

* commit '399a2977a5067e4ea562ad4d74aaa0f1bffe4c53':
Show an error dialog when account type is requested on a limited user
b3a9872549137f6c3983609e48e5b2d4fc94a3d4 11-Apr-2013 Amith Yamasani <yamasani@google.com> Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev
a934b7c99ac558ba45a2a6fb8c6e3769cdd3db4b 11-Apr-2013 Jaikumar Ganesh <jaikumar@google.com> am 7228e1ae: am 8ce470dd: GPS Hardware geofencing.

* commit '7228e1aeb9a2af8fad410749e2adc61266b2649a':
GPS Hardware geofencing.
23c8b96a7e5c3f4c169bf65ae3886357943bb7b0 10-Apr-2013 Amith Yamasani <yamasani@google.com> Show an error dialog when account type is requested on a limited user

This covers the scenario where an app doesn't find an account of the
required type and requests the account manager to add one of that
type.

Bug: 8537648
Change-Id: I4d9c8842c2d90aa668f16034d3db007dc61714b8
/frameworks/base/core/res/AndroidManifest.xml
8ce470dd4ba0608abb6b5eae117cefca927af96b 03-Apr-2013 Jaikumar Ganesh <jaikumar@google.com> GPS Hardware geofencing.

Add support for doing geofencing in hardware.

Change-Id: I6d5015190e8d84e1f4beb1010ed977a71c1622d0
/frameworks/base/core/res/AndroidManifest.xml
8740cb1da6adb71a4e195774801c97db5853b097 05-Apr-2013 John Spurlock <jspurlock@google.com> resolved conflicts for merge of 29211d3a to master

Change-Id: I9691f41b12fbf52d0ef35a9bf5223edef7afdfd2
5feceebb892d4cb5777cea3c6174b206705d456b 23-Mar-2013 Daniel Sandler <dsandler@android.com> New NotificationListenerService.

This is the best and only way for apps to listen for
notifications: create a NotificationListenerService, wait
for the NoMan to bind to you (as a result of the user
checking a box somewhere in Settings and agreeing to a
scary dialog box), and you'll start receiving notification
posted and dismissed callbacks. Your service, while enabled,
will also be able to clear one or all notifications.

Use this power wisely.

This change moves StatusBarNotification out of
com.android.internal into android.service.notification.
[Internal customers, including System UI and early users of
the system-only listener binder API, will need to be
updated.]

Bug: 8199624
Change-Id: I1be46f823d4b3ddc901109ec1e085cd6deb740c2
/frameworks/base/core/res/AndroidManifest.xml
60765b285da48e7362b935105036efefbd1d5e58 05-Apr-2013 Ben Gruver <bgruv@google.com> am a1607a8c: am 65f420ec: Merge "Add a config updater component for the intent firewall" into jb-mr2-dev

* commit 'a1607a8c62a630150b4e96ec1148e90dc40ab984':
Add a config updater component for the intent firewall
633dc9bcef0935931781d7e4554566271fe9f2c5 04-Apr-2013 Ben Gruver <bgruv@google.com> Add a config updater component for the intent firewall

Change-Id: I43f6defa16691099592bf87e75f2d1a732135cf3
/frameworks/base/core/res/AndroidManifest.xml
77118fb55eb3a0dcccbb8cf7861a96416f552390 27-Mar-2013 Geremy Condra <gcondra@google.com> Add SELinux updater and Settings-based enforcement switch.

Bug: 8116902
Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
4e7f7e839e6adb8986114ee5b619030696f910ca 27-Mar-2013 Geremy Condra <gcondra@google.com> Add SELinux updater and Settings-based enforcement switch.

Bug: 8116902
Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
1a95a42c8984aa9012a9d9ea24fc54a7b09e6148 27-Mar-2013 Dianne Hackborn <hackbod@google.com> am 177543db: am 3bcc2fba: Merge "Fix issue #8470131: Process thrash kills battery" into jb-mr2-dev

* commit '177543db55f88f060d9a43df79afd6733cd565da':
Fix issue #8470131: Process thrash kills battery
a40cfeb55f6caa35fee894b86175b7d916520c80 26-Mar-2013 Dianne Hackborn <hackbod@google.com> Fix issue #8470131: Process thrash kills battery

Protect app widget broadcasts from abuse.

In this case the app was sending an APPWIDGET_UPDATE broadcast
without specifying a target, which (a) should not be allowed (you
should not be able to send updates to other apps), and (b) resulted
in every single potential app widget in the system being launched...
which was about 75 of them.

Change-Id: I9d48733610ce6d5a7c32e69a3e06b9f33bd79a34
/frameworks/base/core/res/AndroidManifest.xml
c42a44931f75076d93860de2a7d2caa38a553b88 21-Mar-2013 Dianne Hackborn <hackbod@google.com> am b2bf4ecd: am 71b00177: Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev

* commit 'b2bf4ecd4ab7c2182c2a6611ff6dead67e712a80':
Fix issue #8410116: "Disable your screen lock" permission...
71b0017759b825f8bddcdda7425afc802e8918c9 21-Mar-2013 Dianne Hackborn <hackbod@google.com> Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev
3ad2769ba5215bdc1f777b27bfe99d5cce982095 18-Mar-2013 Dianne Hackborn <hackbod@google.com> Fix issue #8410116: "Disable your screen lock" permission...

...appears under "Storage" section

Change-Id: I55673c559551797aae3a0dd80e90c573a028b4b0
/frameworks/base/core/res/AndroidManifest.xml
2044158fe12fada339762825d0b4ec3961a14d34 14-Mar-2013 Jeff Sharkey <jsharkey@android.com> am 5d7b4a44: am 34f37e74: Merge "Handle finished bugreports, share from private." into jb-mr2-dev

* commit '5d7b4a4448e0f29f36ba27aee2de06ce25ff2ee1':
Handle finished bugreports, share from private.
02ffba940ca96988ed3e7774c606b43c58373b5e 09-Mar-2013 Jeff Sharkey <jsharkey@android.com> Handle finished bugreports, share from private.

Show notification when a bugreport is finished, letting the user
launch a SEND_MULTIPLE intent to share them. Add dialog that warns
user about contents before sharing. Since bugreports are now stored
in private app data of the Shell app, use FileProvider to build Uris
that we can grant others access to.

Define BUGREPORT_FINISHED as being a protected broadcast. Delete
older bugreports automatically to reclaim disk space. Migrate any
Intent extras to ClipData when building PendingIntents.

Add --receiver-permission support to am shell command.

Bug: 7005318
Change-Id: If6c607dbcf137362d5887eac482ff7391563890f
/frameworks/base/core/res/AndroidManifest.xml
5ecd81154fa039961f65bb4e36d18ac555b0d1d6 10-Jan-2013 Jim Miller <jaggies@google.com> Move keyguard to its own process.

This is in preparation to moving keyguard into its own process.

Moved keyguard source and resources into new .apk.

Got basic test app working. Still need to implement MockPatternUtils
and means to pass it into KeyguardService with local binder interface.

Added new ACCESS_KEYGUARD_SECURE_STORAGE permission.

Temporarily disabled USER_PRESENT broadcast.

Remove unintentional whitespace changes in PhoneWindowManager, etc.

Checkpoint basic working version.

Move to systemui process.

Synchronize with TOT.

Sync with recent user API changes.

Fix bug with returing interface instead of stub for IKeyguardResult. Create KeyguardServiceDelegate to allow
for runtime-selectable local or remote interface.

More keyguard crash robustness.

Keyguard crash recovery working. Currently fails safe (locked).

Fix selector view which was still using frameworks resources.

Remove more references to internal framework variables. Use aliases for those we should move but
currently have dependencies.

Allow runtime switching between service and local mode.

Fix layout issue on tablets where orientation was reading the incorrect constant
from the framework. Remove more framework dependencies.

Fix PIN keyboard input.

Remove unnecessary copy of orientation attrs.

Remove unused user selector widget and attempt to get multi user working again.

Fix multi-user avatar icon by grabbing it from UserManager rather than directly since
keyguard can no longer read it.

Merge with AppWidget userId changes in master.

Change-Id: I254d6fc6423ae40f6d7fef50aead4caa701e5ad2
/frameworks/base/core/res/AndroidManifest.xml
aa7cc1e2ab9856e9c57c1664020df60afaae3d72 20-Feb-2013 Svetoslav <svetoslavganov@google.com> Merge "Adding idle maintenance service."
b3038ec7cfc5d26eb0be18ae65c62825556bca0f 13-Feb-2013 Svetoslav <svetoslavganov@google.com> Adding idle maintenance service.

It is beneficial that there is a mechanism on the platform
to notify applications whether it is safe to perform somehow
expensive operations while the user is not using the device.
Thus, user experience will not be degraded. An example is
discarding of unused blocks on a mounted file system instead
of doing this on every write operation.

bug:8056794

Change-Id: I708bad9d3ce6c8f1d5a1c05c0abf46f81a3d464b
/frameworks/base/core/res/AndroidManifest.xml
108da0cfa4a2f59cc953a4ec61314e69b61d6777 12-Feb-2013 Russell Brenner <russellbrenner@google.com> Adjust captive portal test for setup wizard

During setup wizard, perform captive portal test without the typical
delays.

Change-Id: If596948e732966817aae6201440e87e19be0c2f8
/frameworks/base/core/res/AndroidManifest.xml
fde19b106b2b77bc3540b04445357870caf878b5 17-Jan-2013 Daniel Sandler <dsandler@android.com> New API to request a list of current notifications.

The ACCESS_NOTIFICATIONS permission is signature|system only.

Change-Id: I41338230aee9611117cbdac251c1b6b6c3cebf00
/frameworks/base/core/res/AndroidManifest.xml
3b53da493440efbacd147d1aedcea8679c3a642b 04-Feb-2013 Santos Cordon <santoscordon@google.com> Merge "Sort out permission around "instant text response""
d4b1d9cf9cee4bd4f234e30069996dc7e449f0e7 31-Jan-2013 Geremy Condra <gcondra@google.com> Merge changes I4859c8db,I7643024d

* changes:
Add the TZInfo updater and relevant intent.
Fix ConfigUpdater for binary files.
ec695824af7ab263eaae613b87f2c0b24f176f91 31-Jan-2013 Svetoslav <svetoslavganov@google.com> Merge "Remove "enhance web scripts" from settings and make it requested by plug-ins."
78a4c718e30b6af69fafa6c017af3b2719868631 30-Jan-2013 Geremy Condra <gcondra@google.com> Add the TZInfo updater and relevant intent.

Also add a hook for ConfigUpdateInstallReciever subclasses to
change the delivery of data- in this case, from raw text to
b64 encoded binary.

Change-Id: I4859c8db1cc97c2427310a108b2fef03975df2b4
/frameworks/base/core/res/AndroidManifest.xml
58395e71ce7e99f8149eebbf39db77798165a539 30-Jan-2013 Doug Zongker <dougz@android.com> am 9c4ba4fe: am b616f0c2: add android.permission.LOOP_RADIO for access to loop radio device

# Via Android Git Automerger (1) and Doug Zongker (1)
* commit '9c4ba4fe752b131b01aa402389c96eb8f24764b8':
add android.permission.LOOP_RADIO for access to loop radio device
3822896e226567c6cd3ef84518d318abd33a7624 29-Jan-2013 Svetoslav <svetoslavganov@google.com> Remove "enhance web scripts" from settings and make it requested by plug-ins.

Currently we have an "enhance web accessibility" setting that has to be
enabled to make sure web content is accessible. We added the setting to
get user consent because we are injecting JavaScript-based screen-reader
pulled from the Google infrastructure. However, many users do not know
that and (as expected) do not read the user documentation, resulting in
critique for lacking accessibility support in WebViews with JavaScript
enabled (Browser, Gmail, etc).

To smoothen the user experience now "enhance web accessibility" is a
feature an accessibility plug-in can request, similarly to explore by
touch. Now a user does not need to know that she has to explicitly
enable the setting and web accessibility will work out-of-the-box.

Before we were showing a dialog when a plug-in tries to put the device
in a touch exploration mode. However, now that we have one more feature
a plug-in can request, showing two dialogs (assume a plug-in wants both
features) will mean that a user should potentially deal with three
dialogs, one for enabling the service, and one for each feature. We
could merge the dialogs but still the user has to poke two dialogs.

It seems that the permission mechanism is a perfect fit for getting
user permission for an app to do something, in this case to enable
an accessibility feature. We need a separate permission for explore
by touch and enhance web accessibility since the former changes the
interaction model and the latter injects JavaScript in web pages. It
is critical to get user consent for the script injection part so we
need a well-documented permission rather a vague umbrella permission
for poking accessibility features. To allow better grouping of the
accessibility permissions this patch adds a permission group as well.

bug:8089372

Change-Id: Ic125514c34f191aea0416a469e4b3481ab3200b9
/frameworks/base/core/res/AndroidManifest.xml
b616f0c239ad61f818741909821b86aceff60b60 29-Jan-2013 Doug Zongker <dougz@android.com> add android.permission.LOOP_RADIO for access to loop radio device

Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/core/res/AndroidManifest.xml
f9c5e0fe837a3090820da502ecaabc5accc00ace 23-Jan-2013 Dianne Hackborn <hackbod@google.com> Add new API to propagate contextual data to the assist action

When launching an assist, we have a new API allowing the
current foreground activity/application to provide additional
arbitrary contextual information that is stuffed in the
assist intent before it is launched.

Change-Id: I0b2a6f5a266dc42cc0175327fa76774f814af3b4
/frameworks/base/core/res/AndroidManifest.xml
35654b61e8fe7bc85afcb076ddbb590d51c5865f 15-Jan-2013 Dianne Hackborn <hackbod@google.com> More work on App Ops service.

Implemented reading and writing state to retain information
across boots, API to retrieve state from it, improved location
manager interaction to monitor both coarse and fine access
and only note operations when location data is being delivered
back to app (not when it is just registering to get the data at
some time in the future).

Also implement tracking of read/write ops on contacts and the
call log. This involved tweaking the content provider protocol
to pass over the name of the calling package, and some
infrastructure in the ContentProvider transport to note incoming
calls with the app ops service. The contacts provider and call
log provider turn this on for themselves.

This also implements some of the mechanics of being able to ignore
incoming provider calls... all that is left are some new APIs for
the real content provider implementation to be involved with
providing the correct behavior for query() (return an empty
cursor with the right columns) and insert() (need to figure out
what URI to return).

Change-Id: I36ebbcd63dee58264a480f3d3786891ca7cbdb4c
/frameworks/base/core/res/AndroidManifest.xml
a06de0f29b58df9246779cc4bfd8f06f7205ddb6 12-Dec-2012 Dianne Hackborn <hackbod@google.com> New "app ops" service.

Initial implementation, tracking use of the vibrator, GPS,
and location reports.

Also includes an update to battery stats to also keep track of
vibrator usage (since I had to be in the vibrator code anyway
to instrument it).

The service itself is only half-done. Currently no API to
retrieve the data (which once there will allow us to show you
which apps are currently causing the GPS to run and who has
recently accessed your location), it doesn't persist its data
like it should, and no way to tell it to reject app requests
for various operations.

But hey, it's a start!

Change-Id: I05b8d76cc4a4f7f37bc758c1701f51f9e0550e15
/frameworks/base/core/res/AndroidManifest.xml
149ceec6ebac9dd000c213fc91ee8e5c08522cc6 26-Mar-2012 Daisuke Miyakawa <dmiyakawa@google.com> Sort out permission around "instant text response"

- Remove SEND_SMS_NO_CONFIRMATION

- Add SEND_RESPOND_VIA_MESSAGE Permission
This permission is held by the phone and applications that want to
handle respond-via-message should require this permission of the
sender. This permission is signature/system and currently only held
by the Phone app.

Bug: 5108429
Change-Id: Ib611368d488de2f8e1e853f550eb2c654305eda4
/frameworks/base/core/res/AndroidManifest.xml
a4405ba6ea56cd1a13c45bf8e37f7b44f7d038b0 07-Dec-2012 Nick Kralevich <nnk@google.com> Add new protected broadcasts

According to the javadocs for these intents, they are all
protected intents. It appears the original author forgot
to add them to this file.

Change-Id: I025061716d5707f10939019f2bc5bc3d4d23b04f
/frameworks/base/core/res/AndroidManifest.xml
a170bb81d5953c1f0aa0f5f49bd72eb43c50e233 06-Dec-2012 Nick Kralevich <nnk@google.com> Remove duplicate AndroidManifest.xml entries.

The automerger added the entries twice...

Change-Id: I7910cb2126b339b0c8aee11051db1a2de8ae26ae
/frameworks/base/core/res/AndroidManifest.xml
849f5188e34ea667b689e795d88411a2412db2e8 30-Nov-2012 Nick Kralevich <nnk@google.com> am 6643ea82: resolved conflicts for merge of 011132a7 to jb-mr1-dev

* commit '6643ea823bf8b0726da0518ffecfcc7a9f60f87d':
Secure a handful of framework broadcasts
6643ea823bf8b0726da0518ffecfcc7a9f60f87d 30-Nov-2012 Nick Kralevich <nnk@google.com> resolved conflicts for merge of 011132a7 to jb-mr1-dev

Change-Id: I304ef91eef99526dec348a59b12c0934173bcfcb
b8da0376f2d50fdb2ee58deacc6d2041689e36d1 29-Nov-2012 Robert Greenwalt <rgreenwalt@google.com> Secure a handful of framework broadcasts

At least one of these was getting spoofed in the wild.
We don't want to go too far this late in the game, but this is a good start.

bug:7622253
(cherry picked from commit 47918ae3b4e7ebb54711884e9ff9d0300591ab8b)

Conflicts:

core/res/AndroidManifest.xml

Change-Id: I118b31489fe7add5b8d69289cab9f4e8ab269495
/frameworks/base/core/res/AndroidManifest.xml
47918ae3b4e7ebb54711884e9ff9d0300591ab8b 29-Nov-2012 Robert Greenwalt <rgreenwalt@google.com> Secure a handful of framework broadcasts

At least one of these was getting spoofed in the wild.
We don't want to go too far this late in the game, but this is a good start.

bug:7622253
Change-Id: Id8ec2778b15fe001e6fd0d5a010181bb21c52ad8
/frameworks/base/core/res/AndroidManifest.xml
2681faafae03548ab6fc09307215d7f2b279ab5c 01-Nov-2012 Scott Main <smain@google.com> docs: explain implicit permissions applied by sdk versions
bug: 7453055

Change-Id: I59ba2de6108b5209ff0db6b084fc0a887c5f2cce
/frameworks/base/core/res/AndroidManifest.xml
7dcacd559a85c2b567690fd5f3f1a8050ef6c35b 17-Oct-2012 Geremy Condra <gcondra@google.com> Change android.permission.SERIAL_PORT to signature|system.

Bug: 7367956
Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
277b352d9f9002eb63541c86ea9388be3d7c0e16 01-Nov-2012 Scott Main <smain@google.com> docs: update description for location permissions
bug: 6996667

Change-Id: I3b5d706d98b56386a88b33a343721ff7432063b9
/frameworks/base/core/res/AndroidManifest.xml
fc753c0cf676000b1c2d3cb2728af85a9b49f795 31-Oct-2012 Michael Jurka <mikejurka@google.com> Use new keyguard appwidget picker

Also, remove ability to filter widgets by feature
in appwidget picker in anticipation of api change

Change-Id: I325de0b98f03d3a250758d504229ea27794b5330
/frameworks/base/core/res/AndroidManifest.xml
a1f739ea83b6d770b8469ae1c2c4161f6fe96334 19-Oct-2012 Geremy Condra <gcondra@google.com> Merge "Change android.permission.SERIAL_PORT to signature|system." into jb-mr1-dev
c29f35b8f4610677d8fd9ae1816b39ef4b5f9983 17-Oct-2012 Geremy Condra <gcondra@google.com> Change android.permission.SERIAL_PORT to signature|system.

Bug: 7367956
Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
fca9d63635d9603c318a089397b23c17682453e3 04-Oct-2012 Matthew Xie <mattx@google.com> Add multi user support for bluetooth

Create a BLUETOOTH_STACK permission to share between all users of
Bluetooth apk. Bluetooth Manager binds to apk of current user
bug 6925422

Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/core/res/AndroidManifest.xml
7c3586c576c7f7238274f1ffbc4577a57be0d1f1 29-Sep-2012 Jatin Lodhia <jlodhia@google.com> Merge "Make the theme for choose account and choose account type dialogs same." into jb-mr1-dev
3ff8e1a80058e5557d13693d3223e1aa011c0038 29-Sep-2012 Dianne Hackborn <hackbod@google.com> Merge "Fix issue #7211769 and #7244492, thrash around on #7226656." into jb-mr1-dev
d4ac8d7b3de27a9f0e4c6af2496ca71d794e42d1 28-Sep-2012 Dianne Hackborn <hackbod@google.com> Fix issue #7211769 and #7244492, thrash around on #7226656.

Issue #7211769: Crash dialog from background user has non-working "report"

The report button now launches the issue reporter for the correct user.
Also for crashes on background users, either disable the report button,
or simply don't show the dialog depending on the build config.

Issue #7244492: Bugreport button in Quick Settings doesn't actually do anything

Now they do.

Issue #7226656: second user seeing primary user's apps

I haven't had any success at reproducing this. I have tried to tighten up
the path where we create the user to ensure nothing could cause the
user's applications to be accessed before the user it fully created and thus
make them installed... but I can't convince myself that is the actual problem.

Also tightened up the user switch code to use forground broadcasts for all
of the updates about the switch (since this is really a foreground operation),
added a facility to have BOOT_COMPELTED broadcasts not get launched for
secondary users and use that on a few key system receivers, fixed some debug
output.

Change-Id: Iadf8f8e4878a86def2e495e9d0dc40c4fb347021
/frameworks/base/core/res/AndroidManifest.xml
856b01e7e41c6800c81d04f001e5dd4f7ae05a57 28-Sep-2012 Jatin Lodhia <jlodhia@google.com> Make the theme for choose account and choose account type dialogs same.

Contacts app uses a custom account picker which calls the system account picker
when an account needs to be added. The system accout picker invokes choose
accout type dialog which overlays over the system acccount picker. Because these
two dialog boxes use different themes, he one behind is wider than the one in
foreground and ends up looking like a thin black strip protruding from the two
sides.
Bug: 6980517

Change-Id: Ia8b23767d995dcbe1a58087cb4bfbee140c2c744
/frameworks/base/core/res/AndroidManifest.xml
c6fa237daeaae6107174a9b9d4f591ea8cd26d86 24-Sep-2012 Robert Greenwalt <rgreenwalt@google.com> Use updatable file for premium-sms filter

The data is really to big for a gservices-driven secure setting.

bug:7221402
Change-Id: Ie3d4a1a0aeb69b9ef8fad360fa7ec32e927644e8
/frameworks/base/core/res/AndroidManifest.xml
7befb7deb2ac15134b3bb190520cba19165d16dd 28-Sep-2012 Svetoslav Ganov <svetoslavganov@google.com> Global gesture to toggle Accessibility system-wide.

1. This change adds a global gesture for enabling accessibility.
To enable this gesture the user has to allow it from the
accessibility settings or use the setup wizard to enable
accessibility. When the global gesture is enabled the user
can long press on power to bring the global actions dialog
and then hold with two fingers for a few seconds to enable
accessibility. The appropriate feedback is also provided.

2. The global gesture is writing directly into the settings for
the current user if performed when the keyguard is not on. If
the keygaurd is on and the current user has no accessibility
enabled, the gesture will temporary enable accessibility
for the current user, i.e. no settings are changed, to allow
the blind user to log into his account. As soon as a user
switch happens the new user settings are inherited. If no
user change happens after temporary enabling accessibility
the temporary changes will be undone when the keyguard goes
away and the device will works as expected by the current user.

bug:6171929

3. The initialization code for the owner was not executed due
to a redundant check, thus putting the accessibility layer in
an inconsistent state which breaks pretty much everything.

bug:7240414

Change-Id: Ie7d7aba80f5867b7f88d5893b848b53fb02a7537
/frameworks/base/core/res/AndroidManifest.xml
52c62344c585662d6b441a08c2a69a5732255a6f 21-Sep-2012 Dianne Hackborn <hackbod@google.com> Fix issue #7213113: Remove old intent resolver

Also make the query package restart broadcast protected like the
documentation says it should be.

Change-Id: I445166111318a02f2f2b1ab0dff9c641a441c20b
/frameworks/base/core/res/AndroidManifest.xml
f4f6b4c8b0fcf77d46567f13b409255948fe107b 25-Aug-2012 John Spurlock <jspurlock@google.com> Fire "dreaming started" and "dreaming stopped" broadcasts.

Dream manager now fires broadcast intents when entering + exiting
dreamland (except when testing).

Power manager can now listen for dreams ending, using polling only
as a backstop.

Also:
- Bullet-proof dream-manager/dream against known failure modes
- Add new read/write dream permissions
- Refactor dream-manager to delegate work + state management into
a new DreamController class, via a handler

Bug:6999949
Bug:7152024
Change-Id: I986bb7812209d8c95ae1d660a5eee5998a7b08b1
/frameworks/base/core/res/AndroidManifest.xml
8832c18d8b63367929c2d394c9c508f56003d400 18-Sep-2012 Dianne Hackborn <hackbod@google.com> Fix API review bugs.

7173152 API REVIEW: android.content.pm.PackageUserState
7172969 API REVIEW: android.app.PendingIntent
7172730 API REVIEW: android.content.Context
7172726 API REVIEW: android.manifest.permission

Change-Id: Iad470256d3b5ca5596487f6a699ec1871457c3b5
/frameworks/base/core/res/AndroidManifest.xml
2ca2c8787130506d350d997c18bbc274faf88e37 17-Sep-2012 Dianne Hackborn <hackbod@google.com> More adjustments to permissions.

- New "cost money" flag can be put on a permission to
have this emphasized in the UI.
- Some further re-organization of permissions to better
match UX spec.

Change-Id: I450ac739eff6b90e7c7fc39589d68db82b61f897
/frameworks/base/core/res/AndroidManifest.xml
5dc5a00e7ebadc085ded7e29feacd17e53698486 16-Sep-2012 Dianne Hackborn <hackbod@google.com> More multi-user stuff.

- New public APIs to find out when a user goes to the foreground,
background, and is first initializing.
- New activity manager callback to be involved in the user switch
process, allowing other services to let it know when it is safe
to stop freezing the screen.
- Wallpaper service now implements this to handle its user switch,
telling the activity manager when it is done. (Currently this is
only handling the old wallpaper going away, we need a little more
work to correctly wait for the new wallpaper to get added.)
- Lock screen now implements the callback to do its user switch. It
also now locks itself when this happens, instead of relying on
some other entity making sure it is locked.
- Pre-boot broadcasts now go to all users.
- WallpaperManager now has an API to find out if a named wallpaper is
in use by any users.

Change-Id: I27877aef1d82126c0a1428c3d1861619ee5f8653
/frameworks/base/core/res/AndroidManifest.xml
f60921d921947d7d40285f471a09b0478044c29c 13-Sep-2012 Geremy Condra <gcondra@google.com> Merge changes I69689a73,Iaaef6d41,I7e3cb47a,I42307f58 into jb-mr1-dev

* changes:
DO NOT MERGE Push event logging down into libcore.EventLogger
DO NOT MERGE Added event logging for config installation failures.
DO NOT MERGE Create intermediate directories when installing config data.
DO NOT MERGE Add components for the Android Config Updater to system server.
cd403fc0318684cb7c6c38987d3e0dd0fb8a55bd 13-Sep-2012 Dianne Hackborn <hackbod@google.com> Bring back new permission organization.

Change-Id: I83e7dd06989ab7b0116bcff5ad52d36e01b851d1
/frameworks/base/core/res/AndroidManifest.xml
b631084613e12e1c6a0ae2ad9446e1284b650ccb 24-Aug-2012 Geremy Condra <gcondra@google.com> DO NOT MERGE Add components for the Android Config Updater to system server.

This adds the necessary bits to verify and install configuration
updates using system server. It also includes the cert pinning
updater as the first user.

Change-Id: I42307f58074157b33b6e01216aab10022340d449
/frameworks/base/core/res/AndroidManifest.xml
5cf8bd79bbdef0185574f0e3514124583ad537cd 11-Sep-2012 Fabrice Di Meglio <fdimeglio@google.com> Merge "Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware" into jb-mr1-dev
4497e0c3c672e507b4fd1ff1debefaf76c52ec28 11-Sep-2012 Fabrice Di Meglio <fdimeglio@google.com> Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware

- add android:supportsRtl="true" to the manifest for system_process

Change-Id: I9794f6880c883d91751d0037646253810b086d46
/frameworks/base/core/res/AndroidManifest.xml
9d9ece3c1e16001b63244459cdf4b428f4272d2e 11-Sep-2012 Dianne Hackborn <hackbod@google.com> Animations for user switching.

The window manager now has a facility to provide a full-screen
animation, which the activity manager uses every time a user
switch happens.

The current animation is just a simple dumb slide until we get
a design from UX.

Also some cleanup: moved the portrait task animations to the
default config so we always have an animation for them, and finally
got the java symbol stuff out of public.xml.

Change-Id: I726f77422b2ef5f2d98f961f8da003e045f0ebe8
/frameworks/base/core/res/AndroidManifest.xml
e08ae388d63c4db8f9d9a7ecd634f9a51f6e91b9 08-Sep-2012 Jeff Brown <jeffbrown@google.com> Add new wifi display discovery API.

The API is quite simple. There are a few extra functions
on DisplayManager to scan, connect and disconnect from
wifi displays and get status, and a single protected
broadcast sent when the status changes.

Change-Id: Ic91dbab5ee818e790b27fa32e1a1e93788793be0
/frameworks/base/core/res/AndroidManifest.xml
4b71e4e66cd12d581d4939bab86ec624d27eb570 08-Sep-2012 Jeff Brown <jeffbrown@google.com> Add permissions to control and configure wifi display.

Change-Id: I54af6da53b7243516becd6a3d5985c0feda6c225
/frameworks/base/core/res/AndroidManifest.xml
1cf70bbf96930662cab0e699d70b62865766ff52 06-Aug-2012 Svetoslav Ganov <svetoslavganov@google.com> Screen magnification - feature - framework.

This change is the initial check in of the screen magnification
feature. This feature enables magnification of the screen via
global gestures (assuming it has been enabled from settings)
to allow a low vision user to efficiently use an Android device.

Interaction model:

1. Triple tap toggles permanent screen magnification which is magnifying
the area around the location of the triple tap. One can think of the
location of the triple tap as the center of the magnified viewport.
For example, a triple tap when not magnified would magnify the screen
and leave it in a magnified state. A triple tapping when magnified would
clear magnification and leave the screen in a not magnified state.

2. Triple tap and hold would magnify the screen if not magnified and enable
viewport dragging mode until the finger goes up. One can think of this
mode as a way to move the magnified viewport since the area around the
moving finger will be magnified to fit the screen. For example, if the
screen was not magnified and the user triple taps and holds the screen
would magnify and the viewport will follow the user's finger. When the
finger goes up the screen will clear zoom out. If the same user interaction
is performed when the screen is magnified, the viewport movement will
be the same but when the finger goes up the screen will stay magnified.
In other words, the initial magnified state is sticky.

3. Pinching with any number of additional fingers when viewport dragging
is enabled, i.e. the user triple tapped and holds, would adjust the
magnification scale which will become the current default magnification
scale. The next time the user magnifies the same magnification scale
would be used.

4. When in a permanent magnified state the user can use two or more fingers
to pan the viewport. Note that in this mode the content is panned as
opposed to the viewport dragging mode in which the viewport is moved.

5. When in a permanent magnified state the user can use three or more
fingers to change the magnification scale which will become the current
default magnification scale. The next time the user magnifies the same
magnification scale would be used.

6. The magnification scale will be persisted in settings and in the cloud.

Note: Since two fingers are used to pan the content in a permanently magnified
state no other two finger gestures in touch exploration or applications
will work unless the uses zooms out to normal state where all gestures
works as expected. This is an intentional tradeoff to allow efficient
panning since in a permanently magnified state this would be the dominant
action to be performed.

Design:

1. The window manager exposes APIs for setting accessibility transformation
which is a scale and offsets for X and Y axis. The window manager queries
the window policy for which windows will not be magnified. For example,
the IME windows and the navigation bar are not magnified including windows
that are attached to them.

2. The accessibility features such a screen magnification and touch
exploration are now impemented as a sequence of transformations on the
event stream. The accessibility manager service may request each
of these features or both. The behavior of the features is not changed
based on the fact that another one is enabled.

3. The screen magnifier keeps a viewport of the content that is magnified
which is surrounded by a glow in a magnified state. Interactions outside
of the viewport are delegated directly to the application without
interpretation. For example, a triple tap on the letter 'a' of the IME
would type three letters instead of toggling magnified state. The viewport
is updated on screen rotation and on window transitions. For example,
when the IME pops up the viewport shrinks.

4. The glow around the viewport is implemented as a special type of window
that does not take input focus, cannot be touched, is laid out in the
screen coordiates with width and height matching these of the screen.
When the magnified region changes the root view of the window draws the
hightlight but the size of the window does not change - unless a rotation
happens. All changes in the viewport size or showing or hiding it are
animated.

5. The viewport is encapsulated in a class that knows how to show,
hide, and resize the viewport - potentially animating that.
This class uses the new animation framework for animations.

6. The magnification is handled by a magnification controller that
keeps track of the current trnasformation to be applied to the screen
content and the desired such. If these two are not the same it is
responsibility of the magnification controller to reconcile them by
potentially animating the transition from one to the other.

7. A dipslay content observer wathces for winodw transitions, screen
rotations, and when a rectange on the screen has been reqeusted. This
class is responsible for handling interesting state changes such
as changing the viewport bounds on IME pop up or screen rotation,
panning the content to make a requested rectangle visible on the
screen, etc.

8. To implement viewport updates the window manger was updated with APIs
to watch for window transitions and when a rectangle has been requested
on the screen. These APIs are protected by a signature level permission.
Also a parcelable and poolable window info class has been added with
APIs for getting the window info given the window token. This enables
getting some useful information about a window. There APIs are also
signature protected.

bug:6795382

Change-Id: Iec93da8bf6376beebbd4f5167ab7723dc7d9bd00
/frameworks/base/core/res/AndroidManifest.xml
d1b5cfc94ae940f42be352e7ed98c21c973471b2 29-Aug-2012 rich cannings <richc@google.com> Notify verifiers that verification is complete

Send the Intent.ACTION_PACKAGE_VERIFIED to all verifiers when
verification is complete (either one verifier verified the package or a
timeout occurred). Details of what occurred is in a new extra,
PackageManager.EXTRA_VERIFICATION_RESULT.

Bug: 7048930
Change-Id: I4f9855a29b0eb6d77f469891402c69e2e8922945
/frameworks/base/core/res/AndroidManifest.xml
e217ee4d7a8223289a1af7363627c69956c46d41 29-Aug-2012 Jeff Sharkey <jsharkey@android.com> Access to all users' external storage.

System services holding this permission have external storage bound
one level higher, giving them access to all users' files.

Bug: 7003520
Change-Id: Ib2bcb8455740c713ebd01f71c9a2b89b4e642832
/frameworks/base/core/res/AndroidManifest.xml
80a4af2bbc6af42ae605e454bf89558e564f5244 28-Aug-2012 Dianne Hackborn <hackbod@google.com> Start implementing concept of "running" users.

The activity manager now keeps track of which users are running.

Initially, only user 0 is running.

When you switch to another user, that user is started so it is
running. It is only at this point that BOOT_COMPLETED is sent
for that user and it is allowed to execute anything.

You can stop any user except user 0, which brings it back to the
same state as when you first boot the device. This is also used
to be able to more cleaning delete a user, by first stopping it
before removing its data.

There is a new broadcast ACTION_USER_STOPPED sent when a user is
stopped; system services need to handle this like they currently
handle ACTION_PACKAGE_RESTARTED when individual packages are
restarted.

Change-Id: I89adbd7cbaf4a0bb72ea201385f93477f40a4119
/frameworks/base/core/res/AndroidManifest.xml
7e67151b912622f8a279ab1523a9bcf26ebaff3d 27-Aug-2012 rich cannings <richc@google.com> Add permission checks for Verification API calls

Ensure that only applications with
android.Manifest.permission.PACKAGE_VERIFICATION_AGENT can call application
verification APIs, like PackageManager.verifyPendingInstall and
PackageManager.extendVerificationTimeout

Bug: 7049083
Change-Id: I5fc28b37e864d67cd319a1ed9d03a90dd15ad052
/frameworks/base/core/res/AndroidManifest.xml
1952637425eece18aa1ce3d80d4b49086ef3bcf7 22-Aug-2012 Amith Yamasani <yamasani@google.com> Remove permission requirement for some UserManager calls

Update javadocs to be explicit about permissions.
Minor fixes in UserManagerService

Change-Id: I0d355e0a60e5dbdb49ed06091111d480ff249f3d
/frameworks/base/core/res/AndroidManifest.xml
2a00329c6d55c6cd9166e01963d7410e95d80d21 15-Aug-2012 Amith Yamasani <yamasani@google.com> UserHandle to UserSerialNo mapping

Use AtomicFile for usermanager files.

Added a MANAGE_USERS permission that apps (signature permission) can use
to create/query/modify/remove users.

Change-Id: I5cf232232d0539e7508df8ec9b216e29c2351cd9
/frameworks/base/core/res/AndroidManifest.xml
0224ccab3c7121aeafe7d491042dd38c3a2bb9d3 17-Aug-2012 Subir Jhanb <subir@google.com> Change directory permission to "signature|system"

Change-Id: I53dea6984b4577803fdead5caad0112503d2b4e5
/frameworks/base/core/res/AndroidManifest.xml
603af61a7cd49f214743b286520419a3fe460774 07-Aug-2012 Subir Jhanb <subir@google.com> Add a new permission to have access to Gal Provider
BUG:6897999

Change-Id: Ie60963b7f3911b402b971e794178754e1b4f0a43
/frameworks/base/core/res/AndroidManifest.xml
b4163a6e12ee7100c758c6d3d062ade1f2843fce 03-Aug-2012 Dianne Hackborn <hackbod@google.com> Add APIs for interacting across users.

- Expose the existing Context.sendBroadcast() as
Context.sendBroadcastAsUser().
- Add new android:singleUser attribute for services.
- Add new INTERACT_ACROSS_USERS_FULL permission for full
system-level access to cross-user interface (allows
sendBroadcastAsUser() to send to any receiver).
- Add new INTERACT_ACROSS_USERS_FULL permission for
more restricted cross-user interaction: this is required
for android:singleUser, and allows you to use
sendBroadcastAsUser() but only to send to your own
receivers.

Change-Id: I0de88f6718e9505f4de72e3f45d29c0f503b76e9
/frameworks/base/core/res/AndroidManifest.xml
db3c8678e5cbdfec011afaf25bde2091152c30ad 20-Jun-2012 Haoyu Bai <bhy@google.com> Network data activity change intent for network interfaces.

The activity notification is received from netd, an intent
DATA_ACTIVITY_CHANGE is then raised for other part of the system to
consume.

Change-Id: Idfcc4763c51c5b314c57f546c12557082f06bebf
/frameworks/base/core/res/AndroidManifest.xml
0f42037eb7b5118015c2caca635538324ccf0ccf 12-Apr-2012 fredc <fredc@broadcom.com> Non persistent adapter service

Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5

Conflicts:

core/java/android/bluetooth/BluetoothInputDevice.java

Conflicts:

core/java/com/android/internal/app/ShutdownThread.java
services/java/com/android/server/SystemServer.java

Conflicts:

services/java/com/android/server/SystemServer.java
services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/core/res/AndroidManifest.xml
c9c9a48e7bafae63cb35a9aa69255e80aba83988 16-Jul-2012 Svetoslav Ganov <svetoslavganov@google.com> Removing a workaround for incorrect window position on window move.

1. The window manager was not notifying a window when the latter
has been moved. This was causing incorrect coordinates of the
nodes reported to accessibility services. To workaround that
we have carried the correct window location when making a
call from the accessibility layer into a window. Now the
window manager notifies the window when it is moved and the
workaround is no longer needed. This change takes it out.

2. The left and right in the attach info were not updated properly
after a report that the window has moved.

3. The accessibility manager service was calling directly methods
on the window manager service without going through the interface
of the latter. This leads to unnecessary coupling and in the
long rung increases system complexity and reduces maintability.

bug:6623031

Change-Id: Iacb734b1bf337a47fad02c827ece45bb2f53a79d
/frameworks/base/core/res/AndroidManifest.xml
d0d2cda9d414da73773285d7fee9e13aef3495e9 08-Jun-2012 Adam Powell <adamp@google.com> Further work on MediaRouter

Remove volume control and tracking. This will be handled by extensions
to existing audio and media APIs for now.

Tweak/refine other aspects of the API. Pass the router to callbacks for
easier future-proofing. Add group/ungroup callback methods.

Change-Id: Ib69e76e5f46280a9002b545bcf4cbc7b839844ee
/frameworks/base/core/res/AndroidManifest.xml
636fd528f7ad51f565a390226d9f469f8c675ccf 06-Jun-2012 Dianne Hackborn <hackbod@google.com> Docs (mostly): enumerate JELLY_BEAN target SDK changes.

Okay this isn't entirely docs. I have un-hidden the new permission
for binding to accessibility services; we were going to go out with
it hidden since it didn't go into factory ROM, but now that we are
doing other things we might as well expose it.

Also changed a log from E to W, since it is not an error.

Change-Id: I9226c95e3b63e12218fe41dc3f4290d9824a9e5c
/frameworks/base/core/res/AndroidManifest.xml
7c86958d73e7216a92bdfd84fce4440e1def7eaa 03-Jun-2012 Adam Powell <adamp@google.com> Merge "Add MediaRouter API." into jb-dev
361dfebc943fa53f2a2e3fe0b3429ea5d2530ad0 02-Jun-2012 Adrian Ludwig <aludwig@google.com> For JB, the READ_EXTERNAL_STORAGE permission is not enforced by default. It may be enforced by default in future releases. Developers have the option of enabling enforcement to test their application and some may begin to include this permission on applications. To avoid user confusion, the permission is placed in the development tools group.

Change-Id: Id27ba241db0253eac774401aaaa6e5c4340588d7
/frameworks/base/core/res/AndroidManifest.xml
9a1de308cea2d160778fd977825f10a07b49d738 22-May-2012 Adam Powell <adamp@google.com> Add MediaRouter API.

This is just the initial state tracking. Still to go is
actually triggering Bluetooth A2DP correctly and tracking
process state in the system server.

Change-Id: I33031d52799d6e2d7208910da833831085cc3677
/frameworks/base/core/res/AndroidManifest.xml
4c52235fbc257bc3d73459e61c2d595a539271ba 01-Jun-2012 Adrian Ludwig <aludwig@google.com> Revert "Make the protectionLevel of framework permissions consistent and related to sensitive user data. Dangerous permissions are applied only where sensitive user data may be exposed."

This reverts commit a8a200278dcc232eabd4550f814439c94857c47c.

Conflicts:

core/res/AndroidManifest.xml
core/res/res/values/strings.xml

Change-Id: I3f76d93a6ffde031bf82c2afea315ebcdbc179e3
/frameworks/base/core/res/AndroidManifest.xml
727c599454b1e280a237b10fea4dd7f7cb1096e0 29-May-2012 Alice Yang <alice@google.com> New UI for account picker

- Added radio buttons to indicate the selected item
- "Add account" is one of the list options instead of a button
- Removed icons
- Added "Cancel" and "OK" buttons
- Use dialog theme
- Omit description text by default

Bug 6505441

Change-Id: I672a11481ee99e183142142bddf8f97b7b149d37
/frameworks/base/core/res/AndroidManifest.xml
1e7456ba74f93cdf80dc430aa082cc3c271b30b1 17-May-2012 Svetoslav Ganov <svetoslavganov@google.com> Fixing the build for real.

Change-Id: I792d029c7fff4d96fbe238ff4b3f268cb8603b95
/frameworks/base/core/res/AndroidManifest.xml
e63049b838e94379ba1dae3137198bc3ddf5f19d 17-May-2012 Svetoslav Ganov <svetoslavganov@google.com> Adding some missing files.

Change-Id: I991d8bf815a7e57dc1cbad384e15aa21bef0c7c7
/frameworks/base/core/res/AndroidManifest.xml
507f5586fb48f59f7b4f2fa0ca5387e4d4f2bd8d 08-May-2012 Jeff Brown <jeffbrown@google.com> Hide SET_KEYBOARD_LAYOUT permissions.

Bug: 6427036
Change-Id: Idbb442ad8071b2ca4acf247b135c7aba0830cf70
/frameworks/base/core/res/AndroidManifest.xml
99222d212f9ff5081d4ce6eef09dbe8eff85b83a 07-May-2012 Dianne Hackborn <hackbod@google.com> Finish up issue #6249094: Display permissions based on relevance to private data

Added bitmaps for permission group icons. We had to pick either
icons for a dark or light background, and it had to be light for
settings, so the installer theme has gone back to dark.

Tweaked the permission groups to match the icons.

Redid the group priorities to make them correct (they were written
with higher priorities being less important).

Fixed bug where priority was not being used for system apps.

Change-Id: Ia3d3f0c1614a11b4cfd11682ce9e6c9f87d75c06
/frameworks/base/core/res/AndroidManifest.xml
dc410cb3499683509770bb88cb771a91acd16bd2 13-Apr-2012 Adrian Ludwig <aludwig@google.com> Reorganizing permissions into groups oriented around user-understandable concepts.

These groups are assigned priority for sort-order when displayed to users, and use
the new permissionGroupFlags to indicate whether they contain personalInfo.

Change-Id: I27e81912e08b8d7766b8ce449b4b3bd6473d8f07
/frameworks/base/core/res/AndroidManifest.xml
fd5015be41080970c9a992a8ef17a1deefb57478 01-May-2012 Dianne Hackborn <hackbod@google.com> Add new APIs for permission group flags and priorities.

Change-Id: I2d476c6aa9dbd05407ec49be45986f42d2acf9e7
/frameworks/base/core/res/AndroidManifest.xml
098d580cc2bb6c0891c756a4e5230c6c6b0d2376 27-Apr-2012 Jeff Sharkey <jsharkey@android.com> Migrate ringtone playback to SystemUI.

Introduce IRingtonePlayer, which handles playback for both Ringtone
objects and Notifications. SystemUI now hosts this player, which it
registers with AudioService. It also keeps MediaPlayer instances
warm, and cleans them up after stop() or Binder death.

Move both Ringtone and NotificationManagerService to play back audio
through this new interface.

Bug: 6376128, 6350773
Change-Id: I1dcb86d16ee3c4f07cdb2248d33dcff4ead3609a
/frameworks/base/core/res/AndroidManifest.xml
8f014059d3084fcce9e82b4b1f8b8323744ac52d 26-Apr-2012 Mike Lockwood <lockwood@google.com> Make audio routing Intents protected

These intents should only be sent by the system:

android.intent.action.HEADSET_PLUG
android.intent.action.ANALOG_AUDIO_DOCK_PLUG
android.intent.action.DIGITAL_AUDIO_DOCK_PLUG
android.intent.action.HDMI_AUDIO_PLUG
android.intent.action.USB_AUDIO_ACCESSORY_PLUG
android.intent.action.USB_AUDIO_DEVICE_PLUG

Change-Id: I7be41892a9c4e619ca3e1c892fad6f1f2714c74f
Signed-off-by: Mike Lockwood <lockwood@google.com>
/frameworks/base/core/res/AndroidManifest.xml
6dcf382b1b1dde5e6303a51a27f8d3b928072415 18-Apr-2012 Jeff Sharkey <jsharkey@android.com> Move RINGTONE_PICKER to handle external storage.

To give RINGTONE_PICKER external storage access, move it from system
to MediaProvider. Fix OOBE when getRingtoneUri() kicked requery().

Bug: 6346701
Change-Id: I837002eef0580b8cdd8920a27b068c745995a8a3
/frameworks/base/core/res/AndroidManifest.xml
2c8e19e81fb930fbb4d353c91ca0852fe91d8166 25-Apr-2012 Michael Jurka <mikejurka@google.com> Merge "New API to allow third-party apps to bind widgets"
61a5b0160d9f2e53ef4d4b451212a63032dad32d 13-Apr-2012 Michael Jurka <mikejurka@google.com> New API to allow third-party apps to bind widgets

Change-Id: I1a3761c1a0f557a32d4d3bdd0207567fec918ba7
/frameworks/base/core/res/AndroidManifest.xml
8238e717df4bc5eebf15f97172d68af3599a95bb 24-Apr-2012 Dianne Hackborn <hackbod@google.com> Add new signature-level permission to get details of tasks.

Third party apps now can't get access to the extras of the
intents associated with tasks, to keep private data in them
from leaking out.

Change-Id: I95af9e181ac42557bc8b981807e7ddd266a88d0e
/frameworks/base/core/res/AndroidManifest.xml
d65c2be5485143a0d489c6dfa24276ae834ccffc 20-Apr-2012 Jake Hamby <jhamby@google.com> Merge "Add ContentProvider for apps to read received SMS cell broadcasts."
35be7560300a97fc3675bdd325910f28827d9508 19-Apr-2012 Jeff Sharkey <jsharkey@android.com> Move SystemUI out of system UID.

Add permissions for various things it pokes. Create new permission
to control launching non-exported activities from recents. Hidden
API to relax WallpaperService checks.

Change-Id: I547fdcd7c213dd153ae101533ce7c56cd8f86a0d
/frameworks/base/core/res/AndroidManifest.xml
c3296ffdfc70c6778b6ae760b812b4e53e335f97 18-Apr-2012 Jake Hamby <jhamby@google.com> Add ContentProvider for apps to read received SMS cell broadcasts.

The CellBroadcastReceiver app will allow apps with the new permission
"android.permission.READ_CELL_BROADCASTS" to read previously received
cell broadcast messages from a new ContentProvider database at URI
"content://cellbroadcasts". This will enable third parties to provide
additional information to users in the event of emergencies without
delaying or interfering with the initial system alert dialog to warn
the user when the alert is received.

Includes a new android.telephony.CellBroadcastMessage class which
can be instantiated from the Cursor retrieved from the ContentProvider.
This was previously a part of the CellBroadcastReceiver app, but can now
be used by third party apps with read permission on the ContentProvider.

Change-Id: I2c31f62b63c050c7946de2d81c28a5f4dc6f00b0
/frameworks/base/core/res/AndroidManifest.xml
9f25b7fdf216c9ef0bd2322cd223eeaf0d60f77f 10-Apr-2012 Jeff Brown <jeffbrown@google.com> Request key maps from input manager service.

Instead of each application loading the KeyCharacterMap from
the file system, get them from the input manager service as
part of the InputDevice object.

Refactored InputManager to be a proper singleton instead of
having a bunch of static methods.

InputManager now maintains a cache of all InputDevice objects
that it has loaded. Currently we never invalidate the cache
which can cause InputDevice to return stale motion ranges if
the device is reconfigured. This will be fixed in a future change.

Added a fake InputDevice with ID -1 to represent the virtual keyboard.

Change-Id: If7a695839ad0972317a5aab89e9d1e42ace28eb7
/frameworks/base/core/res/AndroidManifest.xml
e824120016248bcfe3962883fe9f3b0481dd1c3d 06-Apr-2012 Dianne Hackborn <hackbod@google.com> Hide the optional permission stuff, not making it in to JB.

Also lock down the rest of the development tools permissions to
be development permissions that must be granted through an
explicit shell command.

Change-Id: I1ba216fffe1aab4bb9f83fcef108efc504f892f4
/frameworks/base/core/res/AndroidManifest.xml
ac14351e16e1258f1cb54e2bf772b8be004eb2b8 06-Apr-2012 Jeff Brown <jeffbrown@google.com> Move some APIs from window manager to input manager.

Simplified input injection API down to just one call.

Removed all input state reading API. It was only used by the
window manager policy and required a permission that applications
could not obtain. READ_INPUT_STATE is now unused and deprecated.

Change-Id: I41278141586ddee9468cae0fb59ff0dced6cbc00
/frameworks/base/core/res/AndroidManifest.xml
5b8fd25029e8b53353f4cdcb7c0dacea294a6b44 27-Mar-2012 Nick Kralevich <nnk@google.com> Merge "Make READ_LOGS signature|system|development"
135936072b24b090fb63940aea41b408d855a4f3 23-Mar-2012 Amith Yamasani <yamasani@google.com> User management and switching

Broadcast intents that get sent out when users are added/removed/switched.

More work on generating user-specific information in package manager queries.
APIs to update user name and query a user by id.
Removed Package.mSetStopped and mSetEnabled, since they're not user specific.

User removal:
- Cleanup ActivityManager, PackageManager, WallpaperManager, AppWidgetService
and AccountManager.
- Shutdown processes belonging to the user.

Don't show vibrate option in long-press power if there's no vibrator.

Lock the screen when switching users, to force unlocking.

Change-Id: Ib23a721cb75285eef5fd6ba8c7272462764038fa
/frameworks/base/core/res/AndroidManifest.xml
cb5863e022938fe98e0ddbfe1700082750a8761f 23-Mar-2012 Nick Kralevich <nnk@google.com> Make READ_LOGS signature|system|development

Change-Id: I387d53ac4b7fd3d65891145985e4cd272dffddcf
/frameworks/base/core/res/AndroidManifest.xml
53567a756e34706edbeae7217ad4205c55bb76b6 13-Mar-2012 Daniel Lehmann <lehmannd@google.com> Merge "Introduce READ_CALL_LOG and WRITE_CALL_LOG"
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 12-Mar-2012 Dianne Hackborn <hackbod@google.com> Add new READ_EXTERNAL_STORAGE permission.

Also adds some initial compatibility code for dealing with it.

Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/core/res/AndroidManifest.xml
f06d9497afe01896b52e0cb5e5ff38fd49ef6eef 12-Mar-2012 Daniel Lehmann <lehmannd@google.com> Introduce READ_CALL_LOG and WRITE_CALL_LOG

Bug:6141864

Change-Id: I66fcab2a35b8c1c73bac7cfffb9f008c82ed51e8
/frameworks/base/core/res/AndroidManifest.xml
8662cab5c6a01ea5c426512e6f6d2cf3e158aea0 23-Feb-2012 Christopher Tate <ctate@google.com> Merge: Introduce UpdateLocks

An "UpdateLock" works similarly to a wake lock in API: the caller is
providing a hint to the OS that now is not a good time to interrupt
the user/device in order to do intrusive work like applying OTAs.
This is particularly important for headless or kiosk-like products
where ordinarily the update process will be automatically scheduled
and proceed without user or administrator intervention.

UpdateLocks require that the caller hold the new signatureOrSystem
permission android.permission.UPDATE_LOCK. acquire() and release()
will throw security exceptions if this is not the case.

The "is now convenient?" state is expressed to interested parties
by way of a sticky broadcast sent only to registered listeners. The
broadcast is protected; only the system can send it, so listeners
can trust it to be accurate. The broadcast intent also includes a
timestamp (System.currentTimeMillis()) to help inform listeners that
wish to implement scheduling policies based on when the device became
idle.

The API change here is a tiny one: a dump(PrintWriter) method has been
added to the TokenWatcher class to facilitate getting information out
of it for dumpsys purposes. UpdateLock itself is still @hide.

Bug 5543442

Change-Id: I3709c831fc1883d7cb753cd2d3ee8e10a61e7e48
/frameworks/base/core/res/AndroidManifest.xml
e639da7baa23121e35aa06d6e182558e0e755696 22-Feb-2012 Dianne Hackborn <hackbod@google.com> New development permissions.

These are permissions that an application can request, but won't
normally be granted. To have the permission granted, the user
must explicitly do so through a new "adb shell pm grant" command.

I put these permissions in the "development tools" permission
group. Looking at the stuff there, I think all of the permissions
we already had in that group should be turned to development
permissions; I don't think any of them are protecting public APIs,
and they are really not things normal applications should use.

The support this, the protectionLevel of a permission has been
modified to consist of a base protection type with additional
flags. The signatureOrSystem permission has thus been converted
to a signature base type with a new "system" flag; you can use
"system" and/or "dangerous" flags with signature permissions as
desired.

The permissions UI has been updated to understand these new types
of permissions and know when to display them. Along with doing
that, it also now shows you which permissions are new when updating
an existing application.

This also starts laying the ground-work for "optional" permissions
(which development permissions are a certain specialized form of).
Completing that work requires some more features in the package
manager to understand generic optional permissions (having a
facility to not apply them when installing), along with the
appropriate UI for the app and user to manage those permissions.

Change-Id: I6571785c6bb5f6b291862b7a9be584885f88f3a5
/frameworks/base/core/res/AndroidManifest.xml
25872aa3ef189ae5506a923398af11ce5eb1a9b9 04-Feb-2012 Svetoslav Ganov <svetoslavganov@google.com> Adding shell commands for modifying content.

1. Added methods to the ActivityManagerService remote interface
that allow accessing content providers outside of an application.
These methods are guarded by an internal signature protected
permission which is given to the shell user. This enables a
shell program to access content providers.

2. Implemented a shell command that takes as input as standart
fagls with values and manipulates content via the content provider
mechanism.

Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/core/res/AndroidManifest.xml
b01e8bf57b7492b77e3445db51471edcbadda75e 30-Aug-2011 Mike Lockwood <lockwood@android.com> New Serial Manager API:

SerialManager: provides access to serial ports
SerialPort: for reading and writing data to and from serial ports

IO with both array based and direct ByteBuffers is supported.

Accessing serial ports requires android.permission.SERIAL_PORT permission

Each platform must configure list of supported serial ports in the
config_serialPorts resource overlay
(this is needed to prevent apps from accidentally accessing the bluetooth
or other system UARTs).

In addition, the platform uevent.rc file must set the owner to the
/dev/tty* files to "system" so the framework can access the port.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
a573f6a1d9b12393fbdfd2c0850499973849854b 10-Feb-2012 Dianne Hackborn <hackbod@google.com> Some hardening of isolated processes by restricting access to services.

Services now must explicitly opt in to being accessed by isolated
processes. Currently only the activity manager and surface flinger
allow this. Activity manager is needed so that we can actually
bring up the process; SurfaceFlinger is needed to be able to get the
display information for creating the Configuration. The SurfaceFlinger
should be safe because the app doesn't have access to the window
manager so can't actually get a surface to do anything with.

The activity manager now protects most of its entry points against
isolated processes.

Change-Id: I0dad8cb2c873575c4c7659c3c2a7eda8e98f46b0
/frameworks/base/core/res/AndroidManifest.xml
9be4962060ca67c4fe9bfc391043f6d2829cf720 17-Nov-2011 Dave Santoro <dsantoro@google.com> Merge "Unhide social stream permissions." into ics-mr1
098d466a25cf294487188b34dfa95575911a37cf 17-Nov-2011 Dave Santoro <dsantoro@google.com> Unhide social stream permissions.

Bug 5569021

Change-Id: I35ee70418be0e0286294fef54e194831b5fa3b2c
/frameworks/base/core/res/AndroidManifest.xml
20cf0916cc6a4920b1d882a9478615a15fe6b3b0 09-Nov-2011 Jean-Michel Trivi <jmtrivi@google.com> Merge "Bug 5585323 New system permission for media decode" into ics-mr1
4ba27fe702580a90c6e9c1861d4ea2da6fc3b029 07-Nov-2011 Jean-Michel Trivi <jmtrivi@google.com> Bug 5585323 New system permission for media decode

Add a system permission to enable the use of any installed
media decoder when decoding for playback (as opposed to transcode).

Change-Id: Ifb10a5fa8d5663a78ccbb5fa8266ad6535c234f2
/frameworks/base/core/res/AndroidManifest.xml
8588e47358878b7a1add2bd1df2ade95091cdb8d 08-Nov-2011 Robert Greenwalt <rgreenwalt@google.com> Fix build.

Missed a commit that fixed some issues.
bug:5237167

Change-Id: I61e44831e2c3f1cf613ca1387aa95d712b7d2ded
/frameworks/base/core/res/AndroidManifest.xml
148c7d0de720a92632aa6ed10a39bfc38b427239 13-Oct-2011 tk.mun <tk.mun@samsung.com> Wimax : wimax framework related open source.

Integrate wimax network related changes into Android Framework.
- In Connectivity service, start wimax service.
- 4G icon display in StatusBarPolicy.
- DHCP renew add.
- Add radio for wiamx

Change-Id: I2d9012247edfdf49d71ca7e1414afd0006f330ca
Signed-off-by: tk.mun <tk.mun@samsung.com>
bug:5237167
/frameworks/base/core/res/AndroidManifest.xml
0b61f59d77153e7d63a33fc5d47805feb99d918b 04-Oct-2011 Dave Santoro <dsantoro@google.com> Add new permissions for read/write social stream.

This is a manual merge of a change going in to ICS-FactoryROM.

These permissions are needed to separate the (potentially invasive)
access to the user's social stream from the existing read/write
contacts permission.

Per discussion with Android release team, we are also hiding the
stream item API until we figure out a better way to guard the data.

Bug 5406886

Change-Id: I8339d743c3ebe8923c7ee47f2900444efcf82a52
/frameworks/base/core/res/AndroidManifest.xml
b04fe4e82abb073b4e5d82563b0882cea0dcc139 17-Sep-2011 Fred Quintana <fredq@google.com> Continuation of the unified account chooser flow.

- made the UI match the spec
- added ability to force the account chooser to appear
- added ability to pass in a description that will override the stock one
- added ability to pass in requiredFeatures for addAccount
- added ability to pass in an authTokenType for addAccount

Bug: 5293377
Change-Id: I243c0fd6598c943b1f65753e1f5d3c86629f64f5
/frameworks/base/core/res/AndroidManifest.xml
1121bb5e6ff20a2c694225300507ed486e04fea2 15-Sep-2011 Fred Quintana <fredq@google.com> Add a generic account chooser/add account flow for apps.

The activity is launched as follows:
Account account1 = new Account("account1@gmail.com", "com.google")
Account account2 = new Account("account2@gmail.com", "com.google")
ArrayList<Account> accounts = new ArrayList<Account>();
accounts.add(account1);
accounts.add(account2);
String[] accountTypes = new String[]{"com.google", "com.android.exchange"};
Bundle addAccountOptions = null;
Intent intent = AccountManager.newChooseAccountIntent(account1, accounts,
accountTypes, addAccountOptions);
startActivityForResult(intent, 0);

Change-Id: I05a467bdc3552a2e39397b0182879351f4324389
/frameworks/base/core/res/AndroidManifest.xml
d2509fd83597595914ef0627685e917380863eb6 12-Sep-2011 Dianne Hackborn <hackbod@google.com> Add boot mode where only "core apps" are started.

A core app is one that has coreApp="true" in its manifest tag.

The system can successfully boot (though a little painfully) with
only framework-res.apk, SettingsProvider.apk, SystemUI.apk,
DefaultContainerService.apk, and Launcher2.apk set as core apps.

Currently this boot mode is always turned off.

Change-Id: Ieaa4a8031c2c391a12996aa8d8b1d65fc2b09d6b
/frameworks/base/core/res/AndroidManifest.xml
905577f6345c014fc2489a8068ea967ba8c18012 08-Sep-2011 Dianne Hackborn <hackbod@google.com> Fix issue #5263361: Browser instance not created in application picker

The resolver activity was hiding the following activity from recents.

Also some other fixes: a little better memory use debugging, removed
some unneeded code from window manager, moved some system activities
into their own process, added some more running process information for
manage apps.

Change-Id: I66687d16989ff965d524b92dc360f37c19199717
/frameworks/base/core/res/AndroidManifest.xml
b6ae19a96d05546fca61cadcab5c39996d68c9ba 08-Sep-2011 Jaikumar Ganesh <jaikumar@google.com> Remove connection access intents from protected broadcasts.

These intents are sent by Bluetooth-Pbap app which doesn't
have the system uuid. Instead protect with admin permission
on the reciever side.

Change-Id: Ibb788e1526108909b5a3b15462ac3a008b041613
/frameworks/base/core/res/AndroidManifest.xml
81e23acb0b2ffc8962a9b3ff40da328d2bfa401b 06-Sep-2011 Jaikumar Ganesh <jaikumar@google.com> Add Bluetooth intents to protected broadcasts.

Change-Id: I3734a4ff7d964c64ce39ec3f897d3799aa9653f7
/frameworks/base/core/res/AndroidManifest.xml
cccdd721e95bff5f964ea6fdf389c1f740a03702 01-Sep-2011 Robert Greenwalt <rgreenwalt@google.com> Make WRITE_APN_SETTINGS a system-only permission.

Protects us from apps getting packet snooping ability
(ie, routing all your traffic through their server by
modifing your APN settings). We may eventually revert this
if/when we have time to provide a proper API and scary UI
like VPN has.

bug:5242750
Change-Id: I71d73807ca5268c6aacc2156839b4d11427048c4
/frameworks/base/core/res/AndroidManifest.xml
961e30458319cfd50e1892ba7dd14a1d0ebe4cc7 30-Aug-2011 Jeff Sharkey <jsharkey@android.com> Introduce immediate CONNECTIVITY_ACTION variant.

New broadcast that is dispatched immediately after connectivity
changes have been handled by ConnectivityService, bypassing any
applicable CONNECTIVITY_CHANGE_DELAY.

Also protect CONNECTIVITY_CHANGE broadcasts, since they should only
be sent by system.

Bug: 5198167
Change-Id: I75f1fb44b21da1879f0ab960bcaa481126d70fde
/frameworks/base/core/res/AndroidManifest.xml
463f22114587344c96460179069a08d7381fbfd6 22-Jul-2011 Jake Hamby <jhamby@google.com> Add ISIM application support for LTE devices.

- Add methods to TelephonyManager to provide access to IMS records on
the ISIM application of the UICC, as well as access to the ISIM
AKA authentication algorithm.

- Add support for the new IMS methods to CDMALTEPhone, using the helper class
ImsUiccRecords to load the IMS records from the ISIM. The same approach
can be used to implement IMS support for UMTS/LTE devices.

- There is a new RIL request, RIL_REQUEST_ISIM_AUTHENTICATION, which is
used to perform IMS AKA authentication using the algorithm on the ISIM
application of the UICC. The challenge nonce and response are both encoded
as Base64 strings.

Change-Id: I73367c7d9bc573d0d883d68adf09891de1319129
/frameworks/base/core/res/AndroidManifest.xml
5ab2157bf1f105b02d3e2913cd3a33f9765b74ca 27-Jul-2011 Kenny Root <kroot@google.com> Infrastructure to support package verifier

Allow a package verifier to approve or disapprove of a package being
installed.

Change-Id: Ibfea0f2b1aaa4ab1589a4e59f96144702b9bf94b
/frameworks/base/core/res/AndroidManifest.xml
b0381688b8556f4f0a86bb534c8bc52275f16d12 11-Aug-2011 Tom Taylor <tomtaylor@google.com> Add private permission for sending SMS via Messaging app

When the phone dialer sends an sms, it will use the Messaging app.
That way the sent messages will end up in the messaging provider db
and sending will be more reliable. Currently, the phone dialer
uses the SmsManager directly. For now, the feature is only
available to system apps and the permission is private. Bug 4563486

Change-Id: I10f7e1042683164ee61d01a2aaf738d19084da72
/frameworks/base/core/res/AndroidManifest.xml
e09cd7914c117e84bf78676d0e760c51aa147eb8 11-Aug-2011 Dianne Hackborn <hackbod@google.com> Merge "New broadcast telling when an app is fully removed."
f9abb405903cab1fcd379388a96925524840c607 11-Aug-2011 Dianne Hackborn <hackbod@google.com> New broadcast telling when an app is fully removed.

Change-Id: Ia516d826f302a01881fa92d9ffdc0adfbf669a4b
/frameworks/base/core/res/AndroidManifest.xml
d0d85f26cb7287c63adf95bace098bc1af3fe4e8 09-Aug-2011 Chia-chi Yeh <chiachi@android.com> Unhide APIs for user space VPN.

Change-Id: I6f9ddb3fffe9e10cc2d34dda3ae8700b1af7e470
/frameworks/base/core/res/AndroidManifest.xml
89c95a0da87fc85a86a7341f60decf7e50609a18 09-Aug-2011 Chia-chi Yeh <chiachi@android.com> VPN: remove unused protected intent.

Change-Id: Id58f81d5f50a13a1fb422eafe66fa512047f9b05
/frameworks/base/core/res/AndroidManifest.xml
880f64ac1080ccec111de91a4af026cca3d1bb25 08-Aug-2011 Chia-chi Yeh <chiachi@android.com> Merge "VPN: introduce VpnService as the base class for user space VPN."
199ed6ef89bd356895534ba09ac43ed340cd9a1a 04-Aug-2011 Chia-chi Yeh <chiachi@android.com> VPN: introduce VpnService as the base class for user space VPN.

Change-Id: I4793a6eb51b33f669fc6d39e1a16cf5eb9e3d851
/frameworks/base/core/res/AndroidManifest.xml
b234636105317942bdf2daf4f5581c2218847084 04-Aug-2011 Chia-chi Yeh <chiachi@android.com> Merge "VPN: move away from the VPN permission."
e53eba0470b7578def756cd22952d447776ba141 04-Aug-2011 Debashish Chatterjee <debashishc@google.com> Removed permission READ_WRITE_OWN_VOICEMAIL from framework/base.

This permission has now been replaced by ADD_VOICEMAIL.

Bug: 5098551
Change-Id: Idc993f1674a66f0df3ec699ed14b2e5cfedfe3e8
/frameworks/base/core/res/AndroidManifest.xml
fcc1b41b663c1a0cb551344c4a16a5ad9ce36d60 04-Aug-2011 Chia-chi Yeh <chiachi@android.com> VPN: move away from the VPN permission.

VpnBuilder will be replaced by VpnService in the next change.

Change-Id: I2dea67a1616b74d17b372f7b214d207f1617198e
/frameworks/base/core/res/AndroidManifest.xml
766839cb6f2aac8c802ec1de9f3cc12fcb9eabad 02-Aug-2011 Debashish Chatterjee <debashishc@google.com> Step1 of renaming READ_WRITE_OWN_VOICEMAIL to ADD_VOICEMAILS.

READ_WRITE_OWN_VOICEMAIL sounds a confusing name. Dianne recommened to
rename it to ADD_VOICEMAILS as this simply allows 3rd party apps to add
new voicemails to the system. The fact that we allow the app to acces
only its own voicemail is implicit and need not be highlighted in the
permission name. See bug: 5098551 for more details

This CL implements the 1st step of this change by adding the permission
ADD_VOICEMAILS. A follow up CL will remove READ_WRITE_OWN_VOICEMAIL once
content provider and contacts app have been modified to start using the
new ADD_VOICEMAILS permission instead.

Bug: 5098551
Change-Id: I515e7967bdb0e8498a60a32983f9122ce10dcc4a
/frameworks/base/core/res/AndroidManifest.xml
ba39839444532af0ed3766f736582413f6d7a40b 02-Aug-2011 Dianne Hackborn <hackbod@google.com> Move ImageWallpaper to SystemUI process.

Nice to not load 4MB bitmaps in the system process.

Also, hey, with how we are now scrolling the surface instead of
the bitmap, there is no reason to keep that 4MB bitmap loaded in
to memory. So don't.

Unfortunately it looks like for some reason the VM is still
holding on to the bitmap. I'll need to figure out why. Later.

Change-Id: Ib3503756144502fc5c8d5e294248c2417c4fe8c8
/frameworks/base/core/res/AndroidManifest.xml
e1538f05587386bbba8dac0b4b4a6c1059947429 01-Aug-2011 Chia-chi Yeh <chiachi@android.com> Revert "Unhide APIs for user space VPN."

This reverts commit 3c2529c717cda3df321c1d0d6abe23ac1f298ac9.

Change-Id: I37d4ea6c1079d337ede7ac567d88414a41fc1e11
/frameworks/base/core/res/AndroidManifest.xml
24a12104fd09ad8658b8d8af1f8efce4ec1c6701 30-Jul-2011 Dianne Hackborn <hackbod@google.com> Hide permissions that are not available to apps.

Change-Id: I5f3bc72114b780fffe218a5600bfd011ede029d3
/frameworks/base/core/res/AndroidManifest.xml
fcbb4924864976339d5ad8b7adb925d7a050df6a 28-Jul-2011 Chia-chi Yeh <chiachi@android.com> Merge "Unhide APIs for user space VPN."
988323c57bd25a58f05dfa492d9b9c8ab62c5153 22-Jun-2011 satok <satok@google.com> Create TextServiceManager and SpellCheckerService

Bug: 4176026

This CL inherits https://android-git.corp.google.com/g/112600

Spec of TextServiceManager
- Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..)
for each locale

Spec of SpellCheckerService
- Returns whether the given string is a correct word or not
- Returns Suggestions for the given string

Change-Id: Iaa425c7915fe70767ad0b17bf6c6fbcd2a1200b2
/frameworks/base/core/res/AndroidManifest.xml
3c2529c717cda3df321c1d0d6abe23ac1f298ac9 22-Jul-2011 Chia-chi Yeh <chiachi@android.com> Unhide APIs for user space VPN.

Change-Id: I2d9e5a8a3ee8556626e373bfdc93c809dad40bff
/frameworks/base/core/res/AndroidManifest.xml
0bc369ee66df6dc4c126f1991af591ea6a2c0fd0 21-Jul-2011 Jeff Hamilton <jham@android.com> Make READ_FRAME_BUFFER signatureOrSystem.

Bug: 4941390
Change-Id: I6d38b2d5ca2ed3bbf9ec0561659a486a99cbc024
/frameworks/base/core/res/AndroidManifest.xml
cdf95e31024d235b51c7e6076ea2afc990f460cd 20-Jul-2011 Debashish Chatterjee <debashishc@google.com> Removed READ_WRITE_ALL_VOICEMAILS permission from framework.

This permission is meant to be a 'signature' permission and to be used
only by the contacts app. We recently moved it to framework/base as part
of opening up voicemail api into the SDK. However, the signature of
framework is different from contacts app. Consequently the contacts app
is not granted READ_WRITE_ALL_VOICEMAILS permission. This makes the
contacts app crash on start.

This fix removes the READ_WRITE_ALL_iVOICEMAILS from framework/base so
that the one defined in contacts provider is then used by the system.

Bug: 5054221

Change-Id: Iaa7a23fe95b0142978eff124e25fe2291dc7d212
/frameworks/base/core/res/AndroidManifest.xml
5521e892f8b5b2313619405684d426309f66ade4 07-Jul-2011 Debashish Chatterjee <debashishc@google.com> Voicemail content provider API for api council review.

This is a new content provider implemented to add visual voicemail
support in android.

Voicemail content provider is the central repository for storing
voicemails inserted by various voicemail sources. The content provider
also exposes a status table to let the voicemail source application
convey its current status to the system.

The primary application that reads from this content provider is the phone app.
The phone app shows voicemails along with other call entries within the
call log and optionally any relevent message about the voicemail source
status.

The implementation of this content provider can be found at
https://android-git.corp.google.com/w/?p=platform/packages/providers/ContactsProvider.git;a=blob;f=src/com/android/providers/contacts/VoicemailContentProvider.java

Change-Id: I8ad46aec20c70684f7bfa45530bbb90dd841d81a
/frameworks/base/core/res/AndroidManifest.xml
45ce864ef41ce90938cc34d42a8e1075f69e7a61 15-Jul-2011 Dianne Hackborn <hackbod@google.com> Move LoadAverageService to the SystemUI apk.

Change-Id: I442e264802d1e35cd7d27bae121ae75f932595b6
/frameworks/base/core/res/AndroidManifest.xml
79ec80db70d788f35aa13346e4684ecbd401bd84 24-Jun-2011 Christopher Tate <ctate@google.com> Make full backup API available to apps

New methods for full backup/restore have been added to BackupAgent
(still hidden): onFullBackup() and onRestoreFile(). The former is the
entry point for a full app backup to adb/socket/etc: the app then writes
all of its files, entire, to the output. During restore, the latter
new callback is invoked, once for each file being restored.

The full backup/restore interface does not use the previously-defined
BackupDataInput / BackupDataOutput classes, because those classes
provide an API designed for incremental key/value data structuring.
Instead, a new FullBackupDataOutput class has been introduced, through
which we restrict apps' abilities to write data during a full backup
operation to *only* writing entire on-disk files via a new BackupAgent
method called fullBackupFile().

"FullBackupAgent" exists now solely as a concrete shell class that
can be instantiated in the case of apps that do not have their own
BackupAgent implementations.

Along with the API change, responsibility for backing up the .apk
file and OBB container has been moved into the framework rather than
have the application side of the transaction do it.

Change-Id: I12849b06b1a6e4c44d080587c1e9828a52b70dae
/frameworks/base/core/res/AndroidManifest.xml
428e84388af3695cb19549bdb107e2b88afd3708 30-Jun-2011 Jeff Sharkey <jsharkey@android.com> Extend network stats to signatureOrSystem.

Change-Id: I82cc99797b5d5bc3bb9a876b67f311643174da33
/frameworks/base/core/res/AndroidManifest.xml
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 03-May-2011 Jeff Sharkey <jsharkey@android.com> Permissions to protect bandwidth statistics.

Introduces new "net_bw_stats" group which will protect reading
detailed bandwidth statistics from the kernel. Also introduce
"net_bw_acct" group which will enable specific applications to
request that their network traffic be counted against other UIDs.

This change associates manifest permissions with the low-level GIDs.

Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/core/res/AndroidManifest.xml
8969d9924c662ab4cdacc342bbdc33756db730be 22-Jun-2011 satok <satok@google.com> Revert "Create TextServiceManager and SpellCheckerService"

This reverts commit eaddb894865a804279659b4aad6364a34ab50beb.
/frameworks/base/core/res/AndroidManifest.xml
eaddb894865a804279659b4aad6364a34ab50beb 01-Jun-2011 satok <satok@google.com> Create TextServiceManager and SpellCheckerService

Bug: 4176026

Spec of TextServiceManager
- Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..)
for each locale

Spec of SpellCheckerService
- Returns whether the given string is a correct word or not
- Returns Suggestions for the given string

Change-Id: Ia25e7b4f308778891929e31b8cbd741f6848cce4
/frameworks/base/core/res/AndroidManifest.xml
3f3337a662e9916bbf14502ef3b32dedaa7adfa4 18-Jun-2011 Chia-chi Yeh <chiachi@android.com> VPN: avoid leaking file descriptors.

Change-Id: If70f5af3529d79bddb9d72675cf6eb038ff3ff70
/frameworks/base/core/res/AndroidManifest.xml
21c9c45e5caf62b935354b74392fb40c4bf18529 07-Jun-2011 Jeff Sharkey <jsharkey@android.com> Interface-level network policy, persist policies.

Define NetworkPolicy as cycle-reset day and warning/limit values, and
set/get through NetworkPolicyManager. Watch ConnectivityManager for
network connection events, and apply quota rules based on matching
interfaces. Policy service matches based on strong identity to support
IMSI-specific policy values.

Calculates remaining quota based on current stats recorded since the
last reset cycle day. Tests to verify edge cases around February.

Persist network and UID policies in XML, and restore on boot.

Change-Id: Id40ba7d6eed6094fbd5e18e6331286c606880d80
/frameworks/base/core/res/AndroidManifest.xml
432513380e8ea8f4c70853190bfd55a9186407f4 11-May-2011 Dave Santoro <dsantoro@google.com> API modifications to handle profiles in Contacts.

The user's profile is represented as a single Contact, comprised of
Raw Contacts which may be contributed from any accounts the user has on the
system.

Two new permissions have been added: READ_PROFILE and WRITE_PROFILE. These are
required for reading or writing any contact data that is designated as part of
the user's profile.

Contact queries can include the user's profile data by setting the
include_profile URI parameter to 1 (this requires READ_PROFILE access). By
default, the user's profile data will not be included in any Contact queries.

Change-Id: I25616f59622dbb157032c9c435064eb36af6e8e1
/frameworks/base/core/res/AndroidManifest.xml
d4f1bacca50a74a74a02bf6a242bb22c495e4034 09-Jun-2011 Jake Hamby <jhamby@google.com> resolved conflicts for merge of 7ca13deb to master

Change-Id: If34814d6c70cf63eca9bd816845389f6785518ae
7d259626d009a45195ec341646ce06658b842e40 08-Jun-2011 Jake Hamby <jhamby@google.com> resolved conflicts for merge of 0cb17a52 to honeycomb-plus-aosp

Change-Id: I784e6d1946fa708f63becece070c7090cec6f1e2
8643aa0179e598e78d938c59035389054535a229 20-Apr-2011 Svetoslav Ganov <svetoslavganov@google.com> Interrogation of the view hierarchy from an AccessibilityService.

1. Views are represented as AccessibilityNodeInfos to AccessibilityServices.

2. An accessibility service receives AccessibilityEvents and can ask
for its source and gets an AccessibilityNodeInfo which can be used
to get its parent and children infos and so on.

3. AccessibilityNodeInfo contains some attributes and actions that
can be performed on the source.

4. AccessibilityService can request the system to preform an action
on the source of an AccessibilityNodeInfo.

5. ViewAncestor provides an interaction connection to the
AccessibiltyManagerService and an accessibility service uses
its connection to the latter to interact with screen content.

6. AccessibilityService can interact ONLY with the focused window
and all calls are routed through the AccessibilityManagerService
which imposes security.

7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos
based on some criteria. These API go through the AccessibilityManagerServcie
for security check.

8. Some actions are hidden and are exposes only to eng builds for UI testing.

Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/core/res/AndroidManifest.xml
7218d830e27d81141588cd6e37f206d141a18f62 04-Jun-2011 Jeff Brown <jeffbrown@google.com> resolved conflicts for merge of ca2b552d to master

Change-Id: I2f3693a59042ac5aa2d7bcdc3a504c78dc99a18b
ca2b552d981239043a575dfc9db86966492d0f9e 03-Jun-2011 Jeff Brown <jeffbrown@android.com> am c8812761: am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2

* commit 'c8812761609e532cceb400b112ed9982149c2490':
Add a preference panel for mouse speed.
c8812761609e532cceb400b112ed9982149c2490 03-Jun-2011 Jeff Brown <jeffbrown@android.com> am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2

* commit 'e1718de61c20c8d401633f83589f18d2c0c652db':
Add a preference panel for mouse speed.
1a84fd1fb7a51f3fe4f8865e1cdd09f3490f696c 02-Jun-2011 Jeff Brown <jeffbrown@android.com> Add a preference panel for mouse speed.

Bug: 4124987
Change-Id: I3ce175d268a1d043cf5878481261b1049a15a149
/frameworks/base/core/res/AndroidManifest.xml
ab79ee4adcbc6eb9fb9c509766753f65d3857739 27-Apr-2011 Jake Hamby <jhamby@google.com> Enable full support for SMS Cell Broadcast.

Implement full support for SMS Cell Broadcast (3GPP TS 23.041).
Includes support for ETWS and CMAS emergency message types.
Includes GSM and UMTS support (CDMA will be added later).

Note: the change to GsmAlphabet.java is only necessary if the
SMS national languages support patch has been applied. If that
change has not been applied, then the changes to GsmAlphabet.java
in this patch set can safely be ignored.

Change-Id: Ia0362c53695b8ef9a0982f558f1cffa912def34b
/frameworks/base/core/res/AndroidManifest.xml
9f67adfc2d33ef63960d2e528ccbcbdea621f969 14-May-2011 Chia-chi Yeh <chiachi@android.com> Add a new permission for user space VPN applications.

Change-Id: I2b87ef34db01209dac45fbceccafd865840830d5
/frameworks/base/core/res/AndroidManifest.xml
4a627c71ff53a4fca1f961f4b1dcc0461df18a06 01-Apr-2011 Christopher Tate <ctate@google.com> Full local backup infrastructure

This is the basic infrastructure for pulling a full(*) backup of the
device's data over an adb(**) connection to the local device. The
basic process consists of these interacting pieces:

1. The framework's BackupManagerService, which coordinates the
collection of app data and routing to the destination.

2. A new framework-provided BackupAgent implementation called
FullBackupAgent, which is instantiated in the target applications'
processes in turn, and knows how to emit a datastream that contains
all of the app's saved data files.

3. A new shell-level program called "bu" that is used to bridge from
adb to the framework's Backup Manager.

4. adb itself, which now knows how to use 'bu' to kick off a backup
operation and pull the resulting data stream to the desktop host.

5. A system-provided application that verifies with the user that
an attempted backup/restore operation is in fact expected and to
be allowed.

The full agent implementation is not used during normal operation of
the delta-based app-customized remote backup process. Instead it's
used during user-confirmed *full* backup of applications and all their
data to a local destination, e.g. via the adb connection.

The output format is 'tar'. This makes it very easy for the end
user to examine the resulting dataset, e.g. for purpose of extracting
files for debug purposes; as well as making it easy to contemplate
adding things like a direct gzip stage to the data pipeline during
backup/restore. It also makes it convenient to construct and maintain
synthetic backup datasets for testing purposes.

Within the tar format, certain artificial conventions are used.
All files are stored within top-level directories according to
their semantic origin:

apps/pkgname/a/ : Application .apk file itself
apps/pkgname/obb/: The application's associated .obb containers
apps/pkgname/f/ : The subtree rooted at the getFilesDir() location
apps/pkgname/db/ : The subtree rooted at the getDatabasePath() parent
apps/pkgname/sp/ : The subtree rooted at the getSharedPrefsFile() parent
apps/pkgname/r/ : Files stored relative to the root of the app's file tree
apps/pkgname/c/ : Reserved for the app's getCacheDir() tree; not stored.

For each package, the first entry in the tar stream is a file called
"_manifest", nominally rooted at apps/pkgname. This file contains some
metadata about the package whose data is stored in the archive.

The contents of shared storage can optionally be included in the tar
stream. It is placed in the synthetic location:

shared/...

uid/gid are ignored; app uids are assigned at install time, and the
app's data is handled from within its own execution environment, so
will automatically have the app's correct uid.

Forward-locked .apk files are never backed up. System-partition
.apk files are not backed up unless they have been overridden by a
post-factory upgrade, in which case the current .apk *is* backed up --
i.e. the .apk that matches the on-disk data. The manifest preceding
each application's portion of the tar stream provides version numbers
and signature blocks for version checking, as well as an indication
of whether the restore logic should expect to install the .apk before
extracting the data.

System packages can designate their own full backup agents. This is
to manage things like the settings provider which (a) cannot be shut
down on the fly in order to do a clean snapshot of their file trees,
and (b) manage data that is not only irrelevant but actively hostile
to non-identical devices -- CDMA telephony settings would seriously
mess up a GSM device if emplaced there blind, for example.

When a full backup or restore is initiated from adb, the system will
present a confirmation UI that the user must explicitly respond to
within a short [~ 30 seconds] timeout. This is to avoid the
possibility of malicious desktop-side software secretly grabbing a copy
of all the user's data for nefarious purposes.

(*) The backup is not strictly a full mirror. In particular, the
settings database is not cloned; it is handled the same way that
it is in cloud backup/restore. This is because some settings
are actively destructive if cloned onto a different (or
especially a different-model) device: telephony settings and
AndroidID are good examples of this.

(**) On the framework side it doesn't care that it's adb; it just
sends the tar stream to a file descriptor. This can easily be
retargeted around whatever transport we might decide to use
in the future.

KNOWN ISSUES:

* the security UI is desperately ugly; no proper designs have yet
been done for it
* restore is not yet implemented
* shared storage backup is not yet implemented
* symlinks aren't yet handled, though some infrastructure for
dealing with them has been put in place.

Change-Id: Ia8347611e23b398af36ea22c36dff0a276b1ce91
/frameworks/base/core/res/AndroidManifest.xml
4397c3240240080cf17a1cd4dcaff87ab7cacb3a 04-May-2011 Mike Lockwood <lockwood@android.com> am c535f7f2: DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"

* commit 'c535f7f291f0bda688efcee62f21cf44d0ebe38e':
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"
c535f7f291f0bda688efcee62f21cf44d0ebe38e 22-Apr-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"

We need this to allow MTP to access secondary external storage devices

This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4.

Conflicts:

data/etc/platform.xml

Change-Id: Iaf9cf120217e8417d328a51db0d82be6835b0ff0
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
f60ba87f075eb7bd278bc14af77ba41c70b2f8b0 22-Apr-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"

We need this to allow MTP to access secondary external storage devices

This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4.

Conflicts:

data/etc/platform.xml

Change-Id: I0b139a0f3b369c1080831a5b3a48f5d9a330b1bb
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
ec9b5d17af1199e418b7352313575f0f7288b550 04-May-2011 Wink Saville <wink@google.com> am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE

* commit 'ee081bf5ee936396a89d5bd2b29487047b260f49':
IMS: Provide net_admin permission so that IPSec could be configured/used.
ee081bf5ee936396a89d5bd2b29487047b260f49 04-May-2011 Wink Saville <wink@google.com> am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE

* commit '3ed0a1ec7aa6364c236721a1bd29fd196f259cba':
IMS: Provide net_admin permission so that IPSec could be configured/used.
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 28-Mar-2011 Ramesh Sudini <ramesh.sudini@motorola.com> IMS: Provide net_admin permission so that IPSec could be configured/used.

IMS configures the security database in kernel with keys generated from ISIM.

Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/core/res/AndroidManifest.xml
1e23db4c2f5a6eba37a786e4390d52fe2012bfae 22-Apr-2011 Mike Lockwood <lockwood@android.com> Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"

We need this to allow MTP to access secondary external storage devices

This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4.

Conflicts:

data/etc/platform.xml

Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
0c5001d776d56bae02a5cc2663286a125d99bc5e 13-Apr-2011 Dianne Hackborn <hackbod@google.com> Add APIs to remove tasks.

You can remove sub-tasks inside of a task, or an entire task.

When removing an entire task, you can have its process killed
as well.

When the process is killed, any running services will get an
onTaskRemoved() callback for them to do cleanup before their
process is killed (and the service possibly restarted).

Or they can set a new android:stopWithTask attribute to just
have the service automatically (cleanly) stopped at this point.

Change-Id: I1891bc2da006fa53b99c52f9040f1145650e6808
/frameworks/base/core/res/AndroidManifest.xml
5ee250aa744720c90b264966f9721cfb9d256e96 05-Apr-2011 Jason parks <jparks@google.com> am 1d733625: am cca2f2f9: Merge "Send out a broadcast that the system is being factory reset." into gingerbread

* commit '1d73362597c49f4692a580460bc8697a8f1d0efa':
Send out a broadcast that the system is being factory reset.
016f8847471a9d4ffe6a03c29e0600529d51d929 31-Mar-2011 Jeff Hamilton <jham@android.com> am b9896794: am 96cf34d3: Merge "Make STOP_APP_SWITCHES signatureOrSystem." into gingerbread

* commit 'b98967942e9a764b80abc8ff1c6f6f2d620c0f7a':
Make STOP_APP_SWITCHES signatureOrSystem.
cca2f2f987ab772a4bae3176df7259f59d6502ce 30-Mar-2011 Jason parks <jparks@google.com> Merge "Send out a broadcast that the system is being factory reset." into gingerbread
10de0b31df14a2f3337bbfc824419f8e4a246f52 25-Mar-2011 Jeff Hamilton <jham@android.com> Make STOP_APP_SWITCHES signatureOrSystem.

The NFC service relies on this permission
for it's dispatching mechanism and it is
no longer signed with the platform cert.

Bug: 4173610
Change-Id: I598ad2889c4af307f04433093923255fe7daedbb
/frameworks/base/core/res/AndroidManifest.xml
4ca74dc4c2e0c68803e777cf47ed8e01b8e8444e 14-Mar-2011 Jason parks <jparks@google.com> Send out a broadcast that the system is being
factory reset.

Change-Id: I339b7ce58cb3f48316103be49b582d4f7e9b63bf
/frameworks/base/core/res/AndroidManifest.xml
a64e2ad4da3612586594a19489a2b5d44f3f23a0 14-Mar-2011 Nick Pelly <npelly@google.com> resolved conflicts for merge of 38d0d562 to honeycomb-plus-aosp

Change-Id: Iff9ea08b810b0d142a9227272492c0305a9bcf42
367f41f8f61126c2ab34a34cc676756a9fc23ac2 08-Mar-2011 Nick Pelly <npelly@google.com> Implement new NFC-EE API's as shared library (frameworks/base).

Change-Id: I45c4eaf59ec78167fc236fdd59676465a5e1bcb7
/frameworks/base/core/res/AndroidManifest.xml
4bdab1751f0db3b2f03e8c58ef5c11a543dfa3c7 23-Feb-2011 TK MUN <tk.mun@samsung.com> DO NOT MERGE WiMAX support

- In Connectivity service, start WiMAX service
- 4G icon display in StatusBarPolicy
- Add DHCP renew
- Add radio for WiMAX

Change-Id: Iffff012b270d80e84ec8fbd4486921a8adb847dd
Signed-off-by: TK MUN <tk.mun@samsung.com>
/frameworks/base/core/res/AndroidManifest.xml
3a68b8338b431eb15d28e92f06452efbbda9493e 08-Mar-2011 Mike Lockwood <lockwood@android.com> USB: Add API and dialog for apps to request permissions for USB devices and accessories

New APIs:

UsbManager.hasPermission returns true if the caller has permission
for the given device or accessory

UsbManager.requestPermission poses a dialog to allow the user to give the caller
permission for the device or accessory.
Result is returned via a PendingIntent.
No dialog is displayed if the caller already has permission.

Also moved UsbResolverActivity to SystemUI package

BUG: 4069037

Change-Id: I93be769501a8776b49ac26e468af19f8fa2114c9
/frameworks/base/core/res/AndroidManifest.xml
40bbf9295d5245d3917629ce15f7b37670aef1ac 01-Mar-2011 Mike Lockwood <lockwood@android.com> DO NOT MERGE: Backport USB accessory support to gingerbread

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
c4308f01c965571dc2354107c3574df113e397ee 01-Mar-2011 Mike Lockwood <lockwood@android.com> Move USB framework support from android.hardware to android.hardware.usb package

Change-Id: I00fd4f0caaa4aebe48f71c576bb211b5f38bf88d
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
02eb8746de2d60563ec2751a34d20923192e4293 27-Feb-2011 Mike Lockwood <lockwood@android.com> UsbManager: Enhancements for managing USB devices and accessories

When a USB device or accessory is connected, the UsbService now asks the
user which application to associate with the device or accessory.
Applications interested in devices or accessories must specify the
devices they work with via meta-data attached to their manifest.
Permission to communicate with the device is assigned when the user chooses
the activity to use for the device.
The user has the option of clicking the "always use this application" checkbox
to make the assignment automatic in the future.
The user may later clear this preference and revoke permission for an application
to have permission to communicate with the device by clicking the "Clear defaults"
button for the activity in the Manage Applications panel in Settings.

Added class UsbResolveActivity (a subclass or ResolveActivity for choosing
an activity for a USB device or accessory)

Added UsbDeviceManager, which manages the mapping between USB devices/accessories
and applications, including default applications for devices and accessories,
and manages application permissions.

Add interface to allow Settings to clear device and accessory
preferences and permissions for an application.

Remove obsolete ACCESS_USB permission.

Add new signatureOrSystem MANAGE_USB permission to allow administrating
preferences and permissions.

Moved UsbService.java to a "usb" subdirectory, along with new classes
UsbResolveActivity and UsbDeviceManager.

Change-Id: I92554381e9779e68ce380daaee4e1401fb875703
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
e7f972122db87dc54e41ed1a6e417534d43bca3a 24-Feb-2011 Dianne Hackborn <hackbod@google.com> Implement issue #3426299: Introduce application "stopped" state

The package manager now keeps track of whether an application is
stopped. There are new intent flags to control whether intent
filters in a stopped application will match the intent. This is
currently used in one place, sending broadcasts, so that stopped
apps can not be launched due to background processes.

The package manager during first init makes sure no applications
are in the stopped state. When new applications are installed,
that begin in the stopped state. When the activity manager is
launching a component of an application, it ensures the application
is taken out of the stopped state.

The "force stop" button in manage applications will now put an
application back in to the stopped state; it can't go back out
of the stopped state until one of its components is launched by
the activity manager.

There will probably be a few more places where we need to filter
stopped applications out of intent matches, but doing this for
broadcast is a very big first step.

This also introduces a new broadcast that is sent to an application
after it is replaced with a new .apk. But only if the app is not
in the stopped state. This makes it a lot easier for developers to
implement code to get their application back in proper running shape
after an upgrade.

Finally another new broadcast is added that is sent to a package's
installer at the first time it is launched. This allows the installer
to tell the package about it being installed only when it is first
actually used.

Change-Id: I589c53ff0e0ece868fe734ace4439c0d202dca2d
/frameworks/base/core/res/AndroidManifest.xml
8d224caf989b212f8e633cc1a8b0db453300a742 18-Feb-2011 Peter Visontay <pvisontay@google.com> ActivityManager exposes launch count API.

Bug: 3431684
Change-Id: I49d4fb0b1620aafaf251d77700bc017859328968
/frameworks/base/core/res/AndroidManifest.xml
984dd8a206e782027c2b0c866aa845e6d236f218 16-Feb-2011 Mike Lockwood <lockwood@android.com> Merge "UsbManager: New APIs for USB accessories"
ef12256ca500bb0c16af51e5a923b70e9adabd34 16-Feb-2011 Nick Pelly <npelly@google.com> am d8d51fed: am 8c8e9d9a: am 1df862a4: Minor doc update.

* commit 'd8d51fed861cd36f57f1eb2542def23322379d7c':
Minor doc update.
d8d51fed861cd36f57f1eb2542def23322379d7c 16-Feb-2011 Nick Pelly <npelly@google.com> am 8c8e9d9a: am 1df862a4: Minor doc update.

* commit '8c8e9d9a7f1bddbc995a5c088f19a0a3be1f6a5b':
Minor doc update.
1df862a4656bb0d7a3329311b1e243fc6db32448 15-Feb-2011 Nick Pelly <npelly@google.com> Minor doc update.

Change-Id: I1d29adfccbdc196a145a2c2a044d63b00e5f788b
/frameworks/base/core/res/AndroidManifest.xml
9182d3c4eb1f9065cb33df5a3594969dd0d42acc 15-Feb-2011 Mike Lockwood <lockwood@android.com> UsbManager: New APIs for USB accessories

USB accessories are peripherals that connect to android devices as a USB host.

When connected, the accessory will first identify itself to the android device
by sending manufacturer, product, accessory type and version strings
to the device, and then request the device to enter USB accessory mode.
The device will then enable the USB accessory kernel driver and disable
all other USB functionality except possibly adb
(adb can be used while the android device is connected to the PC
and the PC is running software that emulates a USB accessory)

The class android.hardware.UsbAccessory is used to describe the
currently attached USB accessory.
UsbAccessory contains the manufacturer, product, accessory type
and version strings to identify the accessory.
The accessory can be opened as a ParcelFileDescriptor, which can be used
to communicate with the accessory over two bulk endpoints.

The Intents UsbManager.USB_ACCESSORY_ATTACHED and
UsbManager.USB_ACCESSORY_DETACHED are broadcast when accessories are
connected and disconnected to the device. The USB_ACCESSORY_ATTACHED
contains a UsbAccessory object for the attached accessory as an extra.
The Intent also contains string extras for the manufacturer, product,
accessory type and version strings to allow filtering on these strings.

Change-Id: Ie77cbf51814a4aa44a6b1e62673bfe4c6aa81755
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
3a40182c77b9cfb608d1f9a17c3ed7d9a6a56efa 26-Jan-2011 Dianne Hackborn <hackbod@google.com> am 49295e53: am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread

* commit '49295e5379472c22af8975e32271f9659c016531':
Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
49295e5379472c22af8975e32271f9659c016531 26-Jan-2011 Dianne Hackborn <hackbod@google.com> am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread

* commit 'ccd79399cc2a28d79287fd1558c5f5a530356003':
Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
f5e4f208b9ed73ff9c8d74d9c2e75a95ec1014b4 26-Jan-2011 Dianne Hackborn <hackbod@google.com> Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.

Change-Id: I53a6671d5478e7dbca44b17d90f1edfa8e3420bc
/frameworks/base/core/res/AndroidManifest.xml
7df04fb2a02515edb1398b891d857b27f348fd83 25-Jan-2011 Adam Powell <adamp@google.com> am 41cd1ce1: am f72a13ec: Merge "Fix bug 3378333 - Holo-style layout for granting permissions" into honeycomb

* commit '41cd1ce1b97e48190b47447555560702d0843aba':
Fix bug 3378333 - Holo-style layout for granting permissions
c91466f56a777ab44a9a025e9d51f576e21dcce9 22-Jan-2011 Adam Powell <adamp@google.com> Fix bug 3378333 - Holo-style layout for granting permissions

Change-Id: Ie1bb925db3ddd8343c9756e220a0d821f4d31c6d
/frameworks/base/core/res/AndroidManifest.xml
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 07-Jan-2011 Mike Lockwood <lockwood@android.com> Make ACCESS_USB permission for applications to access USB devices:

- change from signatureOrSystem to normal
- no longer associate this permission with the "usb" unix group
- add to public API

Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
e7d511e148bc901ef41ac44d7b3593e5d803f72f 30-Dec-2010 Mike Lockwood <lockwood@android.com> New APIs for USB host support:

UsbManager:
- is now a service retrievable via Context.getSystemService(Context.USB_SERVICE).
- provides support for returning a list all connected USB devices
- broadcasts ACTION_USB_DEVICE_ATTACHED and USB_DEVICE_DETACHED when devices
are added and removed from the USB host bus

UsbDevice:
- represents an attached USB device.

UsbInterface:
- represents an interface on a USB device
- devices may have multiple interfaces if they provide multiple
sets of functionality (for example, android phones typically have interfaces
for both USB mass storage and adb)

UsbEndpoint:
- represents an endpoint on a USB interface
- endpoints are used for sending or receiving data
(only in one or the other direction)

UsbRequest:
- encapsulates a send or receive request to be sent over an endpoint

Change-Id: Ieef3e434c62760770ea839070cf5eba1a705967a
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
795f135a08b6db7372935fa15874723307748fec 21-Jan-2011 Fabrice Di Meglio <fdimeglio@google.com> Fix bug #3338957 (Account Picker and Account type picker need love)

- update UI to match design requirements

Change-Id: Idb5dbea876eb7170a8c1f077a99cfe168d41f1e1
/frameworks/base/core/res/AndroidManifest.xml
8888c597c4bc3002e48738b6aea6fd43f69c0f78 21-Jan-2011 Jason parks <jparks@google.com> Add and enforce the permission for encrypting/decrypting.

Change-Id: Ia292d8a5981266c2703743beb79fd786d77b375d
/frameworks/base/core/res/AndroidManifest.xml
81f39eb6e76d0be1dd341af835e8002a0f80524e 12-Jan-2011 Winson Chung <winsonc@google.com> Refactoring app widgets to address security/performance issues.

- Moving the service binding to AppWidgetService to prevent arbitrary apps from binding to widget services
- Requiring RemoteViewsServices to require android.permission.BIND_REMOTEVIEWS permission

Change-Id: Id135bafba998299eb278067712b8a5d8487cfd04
/frameworks/base/core/res/AndroidManifest.xml
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 12-Jan-2011 Mike Lockwood <lockwood@android.com> Remove permission android.permission.WRITE_MEDIA_STORAGE

Access to the /data/media directory is now restricted exclusively to the
sdcard daemon, so there is no longer a need for this permission.

Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
f9a04233c1db22a6ddd989b55db725badeae7539 11-Jan-2011 Mike Lockwood <lockwood@android.com> @hide android.permission.WRITE_MEDIA_STORAGE

This permission is not needed for non-system or unbundled apps,
so we don't need it in the public API

Change-Id: I1a2a0349c6c5b7b5dc3104d69f4e39e95b878db9
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
10bc1114f37d9edb3f153ec209745dd476530325 10-Jan-2011 Mike Lockwood <lockwood@android.com> Add separate permission and group for access to the MTP USB driver

Since the "usb" group and ACCESS_USB permission will be used by regular apps
to access USB devices in host mode, we need a separate permission for the
device side MTP driver.

Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
3f182381e1279874148f619c6ad2f76840ab3990 10-Jan-2011 Mike Lockwood <lockwood@android.com> Framework manifest: Remove USB_CAMERA_ATTACHED and USB_CAMERA_DETACHED broadcasts

These broadcasts no longer exist, so remove their <protected-broadcast> elements from the manifest.
Signed-off-by: Mike Lockwood <lockwood@android.com>

Change-Id: I4a724509d3058f16283870f02e5e1b51dfb21a43
/frameworks/base/core/res/AndroidManifest.xml
b19e62add0a747127952862bb7bea0b73379edcc 16-Dec-2010 Fred Quintana <fredq@google.com> fix the TooManyDeletes to show up again

It was moved so it was no longer in the location that
SyncManager expected. I fixed it by (a) moving it to the
SyncManager directory and by (b) changing the SyncManager to
refer to it by class rather than by class name, which means
it will now check for it at compile time, not run time.
Bug: 3289922

Change-Id: I24f8bac371a16c62c2a38ed1024702c6d0913b93
/frameworks/base/core/res/AndroidManifest.xml
7458091ffc7c5b3ff9220351bb9e55da5d87f545 07-Dec-2010 Nick Pelly <npelly@google.com> am ea294903: am eba947a3: Merge "Remove ACTION_TAG_DISCOVERED from protected broadcast list." into gingerbread

* commit 'ea294903ca4c298c44b50b473b9b10ae2b77c9e3':
Remove ACTION_TAG_DISCOVERED from protected broadcast list.
35042f1f58663fd00a08e4a8dd51c59bfeddda78 07-Dec-2010 Nick Pelly <npelly@google.com> Remove ACTION_TAG_DISCOVERED from protected broadcast list.

ACTION_TAG_DISCOVERED is a start activity intent, not a broadcast intent, so
its presence in this list is redundant.

Change-Id: I05419ec9c4471b7b11c9ae50a02e5ac3d9e572d2
/frameworks/base/core/res/AndroidManifest.xml
addfc766d535aa2cde76caa9b3049e311f656b5f 02-Dec-2010 Freeman Ng <tenorslowworm@google.com> change SHUTDOWN permission to signatureOrSystem
so setup wizard can start ACTION_REQUEST_SHUTDOWN
bug: 3201638

Change-Id: I0d422667fa27df5df2fadbf27d4e3677a70db8f1
/frameworks/base/core/res/AndroidManifest.xml
fa04b8de117a017818761623a961426b03af2914 30-Nov-2010 Costin Manolache <costin@google.com> Revert "Merge "Fix permission."" It breaks apps that rely on the wrong permission.

This reverts commit 974ab30569f9543c897047972260887cb33f8827, reversing
changes made to 8b780ec773b2d1765f3ce932ee8f86c9048fdb85.
/frameworks/base/core/res/AndroidManifest.xml
e4e6efa46b8d324ddcf506649e349406aafd8052 23-Nov-2010 Costin Manolache <costin@google.com> Fix permission.

Change-Id: Ifb545e8fb1a312f0fecb9aed35027c0cb98fab65
/frameworks/base/core/res/AndroidManifest.xml
434203a277cd2f237a71508a3d5a7d1602126cd5 12-Oct-2010 Robert Greenwalt <rgreenwalt@google.com> Notify all VMs when proxy changes.

bug:2700664
Change-Id: I74cc6e0bd6e66847bf18f524ce851e3e9d2c4e87
/frameworks/base/core/res/AndroidManifest.xml
a4eb4c3a207c4d1b0e72bad332c3e6b928a77738 08-Nov-2010 Joe Onorato <joeo@google.com> Make all the activities in the framework use the holo theme.

Change-Id: I18b669923fcd52e3bbb82b63e491d46cdb4bf4be
/frameworks/base/core/res/AndroidManifest.xml
03595d01188d88c169e8c9dd51b357fd545e69cc 02-Nov-2010 Robert Greenwalt <rgreenwalt@google.com> Tell each VM to flush their DNS cache.

bug:3095357
Change-Id: I93de24e3e5a7d8b94d55f4facfffc863a2b8c202
/frameworks/base/core/res/AndroidManifest.xml
482c9332972b928938e681d4553356896eb9b61c 02-Nov-2010 Amith Yamasani <yamasani@google.com> Use Holo theme for Ringtone picker.

Bug: 3148863
/frameworks/base/core/res/AndroidManifest.xml
3f425a6be47b706349f17679ed2b6877179df1cc 29-Oct-2010 Mike Lockwood <lockwood@android.com> Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media

BUG: 3113970

Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
4611bb1814afc7dcc3177cbb248bfb5ee1662ba0 29-Oct-2010 Nick Pelly <npelly@google.com> am ba1664b3: am 4bf4b491: Merge "Hide some NFC API\'s." into gingerbread

* commit 'ba1664b34cc33ebb6b45fccedb35298ff8b1d998':
Hide some NFC API's.
11b075e218b9921a953eeebe73fcd1a8a81f764b 28-Oct-2010 Nick Pelly <npelly@google.com> Hide some NFC API's.

We are leaving enough API so that you can see when any Tag is discovered,
get its ID, and get its NDEF messages.

But for advanced use - creating tag connections and writing messages - we have
2 problems. Firstly a lot of the code is untested
(RawTagConnection.transceive()), or in some cases known not to work
(NdefTagConnection.write()). Secondly, there is still debate about how to
best expose information about Tags.

The set of data/methods exposed for a Tag changes completely depending on the
tag technology. There may be multiple sets of technology implemented in a
single tag. Tag A may have technology X and Y, Tag B may have technology Y
and Z. Furthermore, some NFC controllers will be not be able to use all
technologies, and so Android Device 1 may see technology X and Y on Tag A but
Android device 2 may only see technology X. So we have a pretty challenging
set of constraints to work under, and we are not convinced the current Tag and
NdefTag class is the best approach going forwards.

The Tag application should be able to remain unbundled, since it just needs to
get incoming NDEF Messages.

Change-Id: Ic09f094f33794e10f8d730fffe011c9a5957e0ac
Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
86417ea3f8041481a085823a1aa9f66d747231e8 27-Oct-2010 satok <satok@google.com> Remove InputMethodAndSubtypeEnabler and call intent of Settings.ACTION_INPUT_METHOD_AND_SUBTYPE_ENABLER

Change-Id: I467cfba9644ec266f6a98f7aec0886ad205fef4f
/frameworks/base/core/res/AndroidManifest.xml
54770496d393385408cfba3198f87e139712ed94 19-Oct-2010 Nick Pelly <npelly@google.com> am 6b09a90a: am e47150e9: Fix up NFC permissions.

Merge commit '6b09a90a818137de52a0c7325339849ccf584b9e'

* commit '6b09a90a818137de52a0c7325339849ccf584b9e':
Fix up NFC permissions.
027610a76e67f39e3a435d68ec785a1cf09dcf9c 18-Oct-2010 Kenny Root <kroot@google.com> resolved conflicts for merge of 964eb438 to master

Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
e47150e933e6f610546f57183477f324566e521e 18-Oct-2010 Nick Pelly <npelly@google.com> Fix up NFC permissions.

The initial (vendor) implementation had 4 perms, replace with 1.

Requires no permissions:
- Viewing UID, type of discovered tags and cards.
- Viewing the NDEF message contents of NDEF formatted tags and cards.

Requires android.permission.NFC
- Get/Set the local tag "MyTag"
- Creating or using a RawTagConnection (transceive())
- Creating or using a NdefTagConnection (write()/read())

Change-Id: I1b585c7d91738bed6261277061a48cf7c939482a
Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 16-Oct-2010 Dianne Hackborn <hackbod@google.com> Implement issue #3094621 and #3094609 - wipe sd card

3094621: add "wipe sd card" option to factory data reset
3094609: collapse unmount/format into one command

Also since we have decided that it is important to consider
the Crespo storage as internal storage, DevicePolicyManager
gets a new API to be able to wipe it. (No big deal, since
all of the work for this is now done in the implementation
of the new UI.)

Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/res/AndroidManifest.xml
f36c6db108364dea89b1e3c27c0b15103e560d87 15-Oct-2010 Nick Pelly <npelly@google.com> NFC API revision round 2.

- Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag,
RawTagConnection, NdefTagConnection.
- Add implementations for all of the new NFC API.

Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6
Signed-off-by: Nick Pelly <npelly@google.com>

Conflicts:

Android.mk
CleanSpec.mk
core/java/android/app/ContextImpl.java
/frameworks/base/core/res/AndroidManifest.xml
bc931eaf154b8f196fd15983b1d0603e12dae890 14-Oct-2010 Dianne Hackborn <hackbod@google.com> am a007ab29: am ffbc4b94: Merge "Fix SD card mounting issues #3074555 and #3072332" into gingerbread

Merge commit 'a007ab294d83db987b05b49ab869566978a87494'

* commit 'a007ab294d83db987b05b49ab869566978a87494':
Fix SD card mounting issues #3074555 and #3072332
590b73bc5b8e5f7b59bff1d9264a52388a5162e6 12-Oct-2010 Nick Pelly <npelly@google.com> NFC API revision round 2.

- Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag,
RawTagConnection, NdefTagConnection.
- Add implementations for all of the new NFC API.

Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6
Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
d39d515b9110d7405d0f03dbf612ba5c9b8ac566 12-Oct-2010 Dianne Hackborn <hackbod@google.com> Fix SD card mounting issues #3074555 and #3072332

Change-Id: I79572bb4e92d2546abd97512a119ae74f0d72019
3074555: Kill "Shared storage safe to remove" notification
3072332: "blank shared storage" notification doesn't go anywhere
/frameworks/base/core/res/AndroidManifest.xml
3d59480dc201c893c6da5c3934b14a2d95a1bef9 10-Oct-2010 Hung-ying Tyan <tyanh@google.com> am ea445758: am 08faac3c: Unhide SIP API.

Merge commit 'ea445758efba6b728d5e597402e9d9538f3ef451'

* commit 'ea445758efba6b728d5e597402e9d9538f3ef451':
Unhide SIP API.
08faac3c26e12863858e1534985dd950193f755f 15-Sep-2010 Hung-ying Tyan <tyanh@google.com> Unhide SIP API.

Change-Id: I09468e3149a242a3b1e085ad220eb74f84ac6c68
/frameworks/base/core/res/AndroidManifest.xml
47a44916e2fb33cf4751906386d5f5c903b28d8b 06-Oct-2010 satok <satok@google.com> Add InputMethodEnabler for enabling input methods and subtypes

- Copyed functionarity from LanguageSettings.java

TODO: Save enabled InputMethodSubtypes

Change-Id: I7b4fb1a79cb8b3229f88773d261430e23ba7aae2
/frameworks/base/core/res/AndroidManifest.xml
4715bd91f5949a1919156a5a5cb50f0cccda645e 29-Sep-2010 Nick Pelly <npelly@google.com> resolved conflicts for merge of f4c3b7e9 to master

Change-Id: Idcdc521144f3072058b2bb6cb383e42c852e64f4
038cabe0247ee46df62f9363f1a303bc5b9c1028 24-Sep-2010 Nick Pelly <npelly@google.com> NFC integration

Source: Trusted_NFC_Device_Host_AA03.01e02_google.zip code drop (23-Sep-2010)

Conflicts:

core/java/android/app/ApplicationContext.java
core/java/android/provider/Settings.java
core/jni/Android.mk
core/jni/AndroidRuntime.cpp
core/res/AndroidManifest.xml
include/utils/Asset.h

Change-Id: I62c92f4c79f5ee65126c97602f6bc1c15794e573
Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
a0b49cfc0c68bafb0bd7826f3b4096f30148824a 25-Sep-2010 Patrick Scott <phanna@android.com> am 888bcdbe: am 3ae249dc: Merge "Add new Alarm provider class for setting an alarm." into gingerbread

Merge commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0'

* commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0':
Add new Alarm provider class for setting an alarm.
a73c4b082c2ab38831fc57c6bfb425d32ffe2aa4 22-Sep-2010 Patrick Scott <phanna@android.com> Add new Alarm provider class for setting an alarm.

The new class provides static variables for creating an intent to broadcast to
applications implementing the alarm clock. A new permission has been added and
applications are recommended to require this permission if accepting the set
alarm broadcast.

Change-Id: I7b1014acdc54371cbda19bcf9b5c395b647aa413
/frameworks/base/core/res/AndroidManifest.xml
4e0bfd70d090b5653dd00c5a671db0519086dcfe 16-Sep-2010 Chris Palmer <palmer@google.com> am 1b60963c: am b8dbdc29: Clarify the danger of READ_LOGS and DUMP permissions.

Merge commit '1b60963c42e159aacc52d688defcac206e5ecec0'

* commit '1b60963c42e159aacc52d688defcac206e5ecec0':
Clarify the danger of READ_LOGS and DUMP permissions.
b6f8989385bd69e3b6fc56f5a095917f8624ed7e 16-Sep-2010 David Brown <dab@google.com> am 0237cf2e: am 8626d1a3: Merge "Mark MODIFY_PHONE_STATE permission as signatureOrSystem" into gingerbread

Merge commit '0237cf2eace5d35410e95f586fd40c3068c94582'

* commit '0237cf2eace5d35410e95f586fd40c3068c94582':
Mark MODIFY_PHONE_STATE permission as signatureOrSystem
b8dbdc293a8495a873a9c36353d6a9408c698256 15-Sep-2010 Chris Palmer <palmer@google.com> Clarify the danger of READ_LOGS and DUMP permissions.

The logs inevitably contain PII, so now we are making that clear in user
strings and developer docs. Moving DUMP and READ_LOGS into the PERSONAL_INFO
group.

Note that this means we need string translations.

Change-Id: I1b5bf9d2d827ab1a31dedbdb30d0906a87c26a32
/frameworks/base/core/res/AndroidManifest.xml
f4ece2086f3b7060edc4b93a12f04c9af648867a 15-Sep-2010 David Brown <dab@google.com> Mark MODIFY_PHONE_STATE permission as signatureOrSystem

This permission isn't needed right now, since there aren't actually any
public APIs that require it. (There are a few calls in the ITelephony
interface that do, but they're all hidden.)

Since there's no good reason for 3rd party apps to declare it, let's
mark it signatureOrSystem for now. We can bring it back -- and probably
split it apart into multiple finer-grained permissions -- once we
finally expose full telephony APIs to 3rd party apps (see bug 1043005).

Bug: 2989096
Change-Id: Idf898d5e12d648a959f622cd815e75597195aa82
/frameworks/base/core/res/AndroidManifest.xml
e746f03c6c8b8d0897d322ab524d545ace200fcd 14-Sep-2010 Dianne Hackborn <hackbod@google.com> resolved conflicts for merge of 53686433 to master

Change-Id: I27004dc464f5771d3205ae5757c6eccc5b16854d
7e9f4eb2608148436cef36c9969bf8a599b39e72 11-Sep-2010 Dianne Hackborn <hackbod@google.com> Track client requests through location manager.

This fixes a problem where applications could ask the location
manager to do very heavy-weight things (like... say... update
location every minute), which would get accounted against the
system instead of the application because ultimately it is the
system making the heavy calls (wake locks, etc).

To solve this, we introduce a new class WorkSource representing
the source of some work. Wake locks and Wifi locks allow you
to set the source to use (but only if you are system code and thus
can get the permission to do so), which is what will be reported
to the battery stats until the actual caller.

For the initial implementation, the location manager keeps track
of all clients requesting periodic updates, and tells its providers
about them as a WorkSource param when setting their min update time.
The network location provider uses this to set the source on the
wake and wifi locks it acquires, when doing work because of the
update period.

This should also be used elsewhere, such as in the GPS provider,
but this is a good start.

Change-Id: I2b6ffafad9e90ecf15d7c502e2db675fd52ae3cf
/frameworks/base/core/res/AndroidManifest.xml
94bf9431e5464c7757890abfe0716997151f153f 08-Sep-2010 Jake Hamby <jhamby@google.com> am e7578344: am 5872e9d7: Merge "Allow incoming SMS until internal storage is almost full." into gingerbread

Merge commit 'e75783440a55fb0a5ef75066be94a11898f652f0'

* commit 'e75783440a55fb0a5ef75066be94a11898f652f0':
Allow incoming SMS until internal storage is almost full.
bb3716332321e22537a5015be13e2229fb9b90bc 24-Aug-2010 Jake Hamby <jhamby@google.com> Allow incoming SMS until internal storage is almost full.

Fix for bug 2382830: new incoming SMS should not be rejected when
running low on internal phone storage.

Testing revealed that the /data partition should have at least 256 KiB
available in order to prevent random app crashes (including system apps)
due to SQLite transaction failures. With 256 KiB free, the device should
safely boot without storage full errors. This takes into account the
36-40 KiB that the YAFFS2 filesystem reports as available even after
the partition has been completely filled. I've set the default full
threshold to 1 MiB to provide a generous safety margin.

For this bug, I changed the DeviceStorageMonitorService demon to send
two new hidden notifications for device storage "full" and "not full",
when the free space falls below the full threshold (default 1 MiB,
but configurable as a system setting), in addition to the existing
storage low/okay notifications sent when the storage crosses the threshold
of 90% full (also configurable).

The SMS code was changed to use these new notifications so that it can
accept messages until the data partition has been filled to the maximum
safe capacity rather than stopping when it hits 90% full. There should
be no negative impact on battery life because the additional check in
the storage polling service should be offset by an optimization to cache
the free threshold values which were previously being computed every time
through the loop.

While testing this change, I discovered that SMSDispatcher was being
instantiated twice, the first time in GSMPhone/CDMAPhone, and the second
time in SimSmsInterfaceManager / RuimSmsInterfaceManager. Changed the code
to pass the original SMSDispatcher to the Sim/RuimSmsInterfaceManager
constructor.

Change-Id: Ie0c6d05294778ab6ee42e0fa01313af96d824c77
/frameworks/base/core/res/AndroidManifest.xml
b8a8a578c2483d84ef96fd7050bbbcbc48d49a37 08-Sep-2010 Mike Lockwood <lockwood@android.com> Fix Intent.ACTION_REBOOT

Turns out this would be useful for automated testing.

Change-Id: Idd5e35a8d4a354447b17a77fe0b606f78df844d0
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
44434f002aadb4e234a963ba9317a3c79d431d97 03-Sep-2010 Daniel Sandler <dsandler@google.com> Don't get stung!

Change-Id: I8211675e619bcc31c991296387513d07ad53ff10
/frameworks/base/core/res/AndroidManifest.xml
8f5edc93b622bbdc33db24d348480fd7d55afb41 02-Sep-2010 Dianne Hackborn <hackbod@google.com> am 840f0fec: am d3efa392: Clean up some permissions.

Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729'

* commit '840f0fecd87357cadf4b2a0ae96d30b457f89729':
Clean up some permissions.
d3efa3924407da6d38aa5931ac29aa088d9eb986 02-Sep-2010 Dianne Hackborn <hackbod@google.com> Clean up some permissions.

Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear
to be associated with anything or used by anyone, so they are just
deleted.

Also deprecate the activity API to go in the foreground. I didn't
realize that was released in the SDK. It needs to go away.

Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/core/res/AndroidManifest.xml
7b6d0d99b6904b511996267efae215fe9cb5e98f 11-Aug-2010 Dianne Hackborn <hackbod@google.com> am 679ac09a: am a5ae50cd: Merge "More native work." into gingerbread

Merge commit '679ac09a5c22175354f3a04b28456b323839530e'

* commit '679ac09a5c22175354f3a04b28456b323839530e':
More native work.
08d5b8fad8d46ccb64db2fdcb4d66972ec87bf48 04-Aug-2010 Dianne Hackborn <hackbod@google.com> More native work.

Implement save/restore of state, and add native APIs for
configuration information.

Change-Id: I2a3ddc2ba605db58d7c8b2b31b9215fb323f90b5
/frameworks/base/core/res/AndroidManifest.xml
da39f0e87814c5acb8b6319a1877b93197fb910e 28-Jul-2010 Mike Lockwood <lockwood@android.com> Send Intents when PTP compatible devices are connected/disconnected to USB

Usb.ACTION_USB_CAMERA_ATTACHED and Usb.ACTION_USB_CAMERA_DETACHED are sent
when cameras are connected and disconnected.
The data field of the intent contains a Uri for the camera in the Mtp content provider.

Change-Id: I814221b4f0507b309997c71edb5a041e8efc54f7
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
dad497e598de663c742289fe10dfa65c0cb154e9 29-Jun-2010 Mike Lockwood <lockwood@android.com> am 0d929d7f: am 059f009d: Make android.hardware.action.USB_STATE a protected broadcast.

Merge commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757'

* commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757':
Make android.hardware.action.USB_STATE a protected broadcast.
059f009d970fb37ac4e408dcf8e1d2d2cdcf0a84 29-Jun-2010 Mike Lockwood <lockwood@android.com> Make android.hardware.action.USB_STATE a protected broadcast.

Change-Id: I84160e9342025228c1f810077f5aa25f5cc83023
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
57c798ade1a30c5587269519dd9f55b87c3b3be7 23-Jun-2010 Mike Lockwood <lockwood@android.com> Add a new UEventObserver subclass to broadcast an Intent whe USB state changes.

We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED
when USB is connected or disconnected.
The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of
all USB functions.

Change-Id: I919fcd5aa8d640d051cec87053f474a9843ed545
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
2423607a32d63a0c646b17758ebeb4dc1d0b791f 23-Jun-2010 Mike Lockwood <lockwood@android.com> Add a new UEventObserver subclass to broadcast an Intent whe USB state changes.

We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED
when USB is connected or disconnected.
The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of
all USB functions.

Change-Id: I11495d039429dbe22bd738067296e39ae415befa
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
9163d42a50076c2a77694ff394363264d862c7bf 11-May-2010 Mike Lockwood <lockwood@android.com> DO NOT MERGE Add new permission to allow access to USB devices

Adds permission android.permission.ACCESS_USB.
This is a partial cherry pick of a change from master.
It adds the permission, but not the support for associating it
the AID_USB group.

Change-Id: If5816721a4fc88bf444141a7b717da65ea37d5f4
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
14f2ef4c9da27a3d58d65dc9f684c5f764ee279a 15-Jun-2010 Robert Greenwalt <robdroid@android.com> Move the net transition wakelock to ConnService.

When the default network goes down we lose the wake-on-incoming-data capability
until the new net is brought up and apps rebuild their connections. We fixed this
in Wifi, but it's a general connectivity issue, not a wifi issue so moving the
mechanism to connecitivty so other networks can use it.

bug:2734419
Change-Id: I39b5d825eb6b548bd9bb8f179b89254f4db53147
/frameworks/base/core/res/AndroidManifest.xml
8a5f10b30dae663eb01372490df3497e8a2ad56a 10-Jun-2010 Joe Onorato <joeo@android.com> resolved conflicts for merge of f7b79151 to master

Change-Id: Ia4538f73d8bade9e6565835d484dcb650830feca
1d46191d88ee9262ea05b868d2db5b44ad85fa43 09-Jun-2010 Joe Onorato <joeo@android.com> am b5f9b4f1: am 302759c1: Merge changes I4a11f027,Ib2c4abf6,Id0c7ef9f,I839d7771 into kraken
8bc6c5141974dbc36a6fe416853f558921be9f24 04-Jun-2010 Joe Onorato <joeo@android.com> Require the STATUS_BAR_SERVICE permission for something to be the status bar.

Change-Id: I57b2d296e0d0cef0d256ae6697fffc47188d14df
/frameworks/base/core/res/AndroidManifest.xml
fe4f3ae33c8da86585399b4167fd7987c8a16066 04-Jun-2010 Joe Onorato <joeo@android.com> Move the usb mass storage notification & activity into SystemUI.apk.

Also fix the notification to show properly when the runtime is restarted.

Change-Id: Id0c7ef9f9dc9c9df18428cbaa7db1703f085137e
/frameworks/base/core/res/AndroidManifest.xml
d0b15cecc63b03ca4e42549ed3a54ae2c7e31866 04-Jun-2010 Dianne Hackborn <hackbod@google.com> resolved conflicts for merge of f3307ae8 to master

Change-Id: Ic59db363391f73343eba32894113914ceea5a963
860755faa6bdd3c2aeae49c05b87b5bc080ae60c 04-Jun-2010 Dianne Hackborn <hackbod@google.com> Add support for heavy-weight applications.

Only one can be running at a time, their process can not be killed,
and a notification is posted while it is running.

Change-Id: I843015723947e0c934ae63a1aeee139327c0bc01
/frameworks/base/core/res/AndroidManifest.xml
2b6b8351961d627be87396bbeb3e0ab811747bf3 13-May-2010 Costin Manolache <costin@google.com> am 0c6028c1: am c1959658: am fa2e3dcd: am 8ea9f130: Merge "Bug 2680071: Rename the Cloud to Device" into froyo
8d83f9e31bfff0281b522c53e035dffc7dd00ba9 13-May-2010 Costin Manolache <costin@google.com> Bug 2680071: Rename the Cloud to Device

Change-Id: I12ab32de393e44a499e3f9e3a0b38f4682156ff5
/frameworks/base/core/res/AndroidManifest.xml
3a17fbb757576ab52ff1ec5fcd54101f33977099 12-May-2010 Costin Manolache <costin@google.com> am b20842c7: am 8579a4d7: am 625de488: am e2055fe4: Merge "Bug 2673557: rename datamessaging" into froyo
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf 11-May-2010 Mike Lockwood <lockwood@android.com> Add new permission android.permission.ACCESS_USB to allow access to USB devices

Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
161c75a0f3ca5255001f7d737a02a4f9d728f1f4 11-May-2010 Costin Manolache <costin@google.com> Bug 2673557: rename datamessaging

Change-Id: I583ac61c7b8fce69d60801dc76aeca9f13d250b2
/frameworks/base/core/res/AndroidManifest.xml
ec7c78fbf526816cd361fd482bdf3792ecfd9a9f 31-Mar-2010 Jeff Brown <jeffbrown@google.com> @hide ACCESS_CACHE_FILESYSTEM and MOVE_PACKAGE

Bug: b/2553489
Change-Id: I681b3f9a243777b931298cc93c9d34c8d7eae0f2
/frameworks/base/core/res/AndroidManifest.xml
9c9c532d3625ba2485eb4ea6924ed0a0163fd958 31-Mar-2010 Dianne Hackborn <hackbod@google.com> Fix issue #2560791: Expose API to go in to car mode.

Also fix bug where night mode was being used in desk dock.

Change-Id: I56c1cf3d6fe800a4f986d40cc4cb2e70b76ac261
/frameworks/base/core/res/AndroidManifest.xml
98bfa39596448504f58f6dfe1b8bd2d31f25367b 24-Mar-2010 Bjorn Bringert <bringert@android.com> Use a secure setting for default browser geolocation permissions

Partly reverts I6308b476ad18b1d71d7438b936c592a45365c9f0

Bug: http://b/issue?id=2535598

Change-Id: Ib488c6d4f10a87b714ecb78eef6fe58f572907c6
/frameworks/base/core/res/AndroidManifest.xml
cbf953ed09b036441d90e14b0723a2ea417b3f35 22-Mar-2010 San Mehat <san@google.com> Permissions: Change ASEC permissions from 'dangerous' -> 'signature'

Change-Id: I5e495332c45f718178486f2e07d37031e6fa5afc
Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
2ee89ea2887252053c31541c54126a8b084c9bca 11-Mar-2010 Dianne Hackborn <hackbod@google.com> Applications should -not- be able to set preferred activities.

I can't believe I let this slip through. And in the SDK no less. :(

The APIs for setting preferred activities will now throw a security
exception when used. This may break some apps, we'll see how it
goes. If it is too bad we can just make these log and not throw
anything, but I would much prefer they throw an exception.

Change-Id: I3aed434750eef8b202aa9d5bd774a0121be521c6
/frameworks/base/core/res/AndroidManifest.xml
7299c41630935a2b106e73e5603579a7747f7535 05-Mar-2010 Dianne Hackborn <hackbod@google.com> Refactor car mode.

Extract all UI behavior from dock observer and ACTION_DOCK_EVENT.

Also introduce a desk type to go along with the car type all through
the resource system, since we now need to have corresponding high-level
broadcasts for desk dock mode. As part of that I also reworked some
of the logic for switching modes to all funnel through a single
update() call that looks all of the current state to decide what to
do next, and fixed various locking issues.

In addition I found there were bugs in the configuration change
handling causing us to only switch into the car mode config and
then never get out of it. Unfortunately now that we are actually
changing the configuration for each mode change, the transitions
between them are really crummy as we restart all kinds of
activities. :(
/frameworks/base/core/res/AndroidManifest.xml
e7085e909d0c7f58a160b2730ff06aca085dfd6b 04-Mar-2010 Robert Greenwalt <robdroid@android.com> Update framework tethering UI

Getting rid of notification dialog - maybe the entire TetherActivity.
Also getting rid of toasts - to ephemeral.
/frameworks/base/core/res/AndroidManifest.xml
8946dd3355fc1dcbad872c0546e356474d4cc5de 19-Feb-2010 Suchi Amalapurapu <asuchitra@google.com> Move package from internal to external and vice versa.
/frameworks/base/core/res/AndroidManifest.xml
154f7a1cc2d4f0468a7cc8dfa36e837c84cd9f7e 17-Feb-2010 Tobias Haamel <haamel@google.com> Show car mode notification in status bar.

The notification is an ongoing event and can be used to get out of car mode.
/frameworks/base/core/res/AndroidManifest.xml
63cfebf2dbe628508cccc10f47754fdacd48c1a0 05-Feb-2010 Costin Manolache <costin@google.com> Switch from REMOTE_INTENT to the new push messaging, add the required permission.
/frameworks/base/core/res/AndroidManifest.xml
a87240c2270e83c3e865ffa1e56f79bfa74daffc 12-Feb-2010 Christopher Tate <ctate@google.com> Remove BACKUP_DATA permission and associated checks

Any package can now participate in backup/restore, without requiring any
manifest-declared permission. *Control* of the backup manager is still
guarded by the BACKUP permission, which is signatureOrSystem.

Change-Id: I116fcfcd4cd255e3c976330da1c4dea7d4faae9d
/frameworks/base/core/res/AndroidManifest.xml
27b28b3f62bd3b54fa13acd5d035940b9be464f3 09-Feb-2010 Tobias Haamel <haamel@google.com> Introduce special UI modes for night and car usage.

The device mode is now called ui mode. Furthermore is the order of
precedence for the resources now in such a way that the ui mode needs
to be specified after the orientation and before the density.

The ui mode can be set, like it is done for the locale, as follows:

IActivityManager am = ActivityManagerNative.getDefault();
Configuration config = am.getConfiguration();
config.uiMode = Configuration.UI_MODE_TYPE_CAR | Configuration.UI_MODE_NIGHT_ANY;
am.updateConfiguration(config);

To allow users to disable the car mode and set the night mode the IUiModeManager
interface is used.

The automatic night mode switching will be added in a separate change.
/frameworks/base/core/res/AndroidManifest.xml
18e939623556928f73fcc7511c85a537929a4a7e 11-Feb-2010 Dan Egnor <egnor@google.com> Eliminate dependencies on Checkin, replacing checkin events with EventLog
events (and in one case, a DropBox entry).

Add a simple intent that triggers master-clear (and toggle EFS), given the
right permissions.

Bug: 2264596
Bug: 2350452
Bug: 2264596
/frameworks/base/core/res/AndroidManifest.xml
91f2a20a5957095a6cba9f97326ea0f1eab17195 09-Feb-2010 Bjorn Bringert <bringert@android.com> Add content provider for browser geolocation permissions

This replaces the old Google-specific geolocation setting.

Fixes http://b/issue?id=2428694
Part of http://b/issue?id=2383870

Change-Id: I6308b476ad18b1d71d7438b936c592a45365c9f0
/frameworks/base/core/res/AndroidManifest.xml
4154c07c5cabc74029a2df379075391d782a682c 10-Feb-2010 San Mehat <san@google.com> StorageNotification: Move notification / usb storage activity into StatusBarPolicy

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
97e44947282b3918ee0bed2d16b33b983f882580 05-Feb-2010 Dan Egnor <egnor@google.com> Add an AlarmManager API to set the system time (with the proper permissions).
/frameworks/base/core/res/AndroidManifest.xml
d0e18ffb82b59d38aeaf0e552f48e734202719ab 26-Jan-2010 Robert Greenwalt <robdroid@android.com> First pass at USB Tethering.

bug:2281900
/frameworks/base/core/res/AndroidManifest.xml
b94f795c257e32a1d7be1115568b5b6f576dec37 28-Jan-2010 Daniel Sandler <dsandler@google.com> New full-screen activity for USB mass storage interaction.

Still TODO: patch into forthcoming callbacks from
MountService so the USB storage activity always shows the
correct state of the device. (Right now it only refreshes
its display onResume.)

Bug: 2299129
/frameworks/base/core/res/AndroidManifest.xml
c028be4f3b8c7476b46859f66c3f33d528adf181 25-Jan-2010 Suchi Amalapurapu <asuchitra@google.com> AppsOnSd feature - Add default container

Add new remote interface to do temporary copies. The new
remote stub handling is done on mHandler thread and doesn't need locking
for now.
Add new InstallArgs class and subclasses to isolate cases for installation.
Move resource deletion for failed installs/upgrades to later on in installation
cycle.
Fix code path for forward locked apps when using scanPackageLI

TODO's
Fix installation paths to completely use InstallArgs based design later on.
Get rid of using flags in various install/uninstall code paths.
Ideally InstallArgs should be created using these flags and used in the
rest of the code.
Function renames.
Revisit mount api's.
/frameworks/base/core/res/AndroidManifest.xml
02735bc9b7686e56957cdec9c10660c4a6dd1090 27-Jan-2010 San Mehat <san@google.com> MountService: Introduce new @hide permissions to protect secure containers.

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
d68478467e3f837511196c80891d7245d0e163df 13-Jan-2010 Dianne Hackborn <hackbod@google.com> First pass at new device policy and administration APIs.

This adds new DevicAdmin, DevicePolicyManager, and DeviceAdminInfo classes.
See the java docs for each on documentation on them. Basically: a DeviceAdmin
is what you derive from to administer a device; DevicePolicyManager is what you
use to apply and check your policy requirements and perform other administration
tasks.
/frameworks/base/core/res/AndroidManifest.xml
6e99b7a3b29fbb1936463a3a48fe693dae909c8f 07-Jan-2010 Doug Zongker <dougz@android.com> add ACCESS_CACHE_FILESYSTEM permission to core manifest

All of the permissions in data/etc/platform.xml are defined in
core/res/AndroidManifest.xml, except for ACCESS_CACHE_FILESYSTEM. Add
it.

Change-Id: If7906bc0007484cc21196fb1c0593b967fd79920
/frameworks/base/core/res/AndroidManifest.xml
03abb8179f0d912e6dabfc0e2b0f129d85066d17 05-Jan-2010 Dianne Hackborn <hackbod@google.com> Kill the task killers.

The ActivityManager.restartPackage() API is now deprecated, and no longer
allows applications to mess up the state of other applications. This was
being abused by task killers, causing users to think their other applications
had bugs.

A new API is introduced for task killers,
ActivityManager.killBackgroundProcesses(), which allows these applications
to kill processes but only the same amount that the out of memory
killer does, thus causing no permanent damage. The old restartPackage()
API is now a wrapper for calling this new API.

There is also a new private forceStopPackage() API that is used for the
system's force stop UI which does what the old restartPackage() API did.
/frameworks/base/core/res/AndroidManifest.xml
9256bb08d22b0dad73bdc3f14929dc519dc02414 19-Dec-2009 Scott Main <smain@google.com> am 9a6c8168: am 77fa05a4: Merge change Iab5952e1 into eclair

Merge commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd'

* commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd':
docs: add "required" attribute to the <uses-feature> docs
0b91635caf91b76d304e80997c82fe582b636428 18-Dec-2009 Scott Main <smain@google.com> docs: add "required" attribute to the <uses-feature> docs
and add a note to the CAMERA permission stating that it enables
the <uses-feature> for camera.
This is an incrimental update for the 2.0.1 docs. More changes
to come for the 2.1 docs to include more features
/frameworks/base/core/res/AndroidManifest.xml
9ed7dc10d263a505da32522139098f085fee811a 02-Dec-2009 Dianne Hackborn <hackbod@google.com> am 5886050f: Merge change I0d8f7593 into eclair

Merge commit '5886050fad97923c33cbc831fe07a5b1746b2b58' into eclair-mr2

* commit '5886050fad97923c33cbc831fe07a5b1746b2b58':
Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op
a7ca0e5e320bbb643f8bc9feb4717dbc5e78e0b9 01-Dec-2009 Dianne Hackborn <hackbod@google.com> Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op

Change-Id: I0d8f75938226e1bb49cf7b1154445631b0bb0bc9
/frameworks/base/core/res/AndroidManifest.xml
50a21f4d3b70360b36acad20e234c380654fd59f 19-Nov-2009 Doug Zongker <dougz@android.com> add reboot() method to PowerManager

In order to unbundle System Update, we need some to expose in the SDK
some way to reboot the device into recovery. Add a reboot() method to
PowerManager, protected by the android.permission.REBOOT permission.
/frameworks/base/core/res/AndroidManifest.xml
ac63ebc82433347e6c8e74e26fa670717acffac7 13-Nov-2009 Dan Egnor <egnor@google.com> Make WRITE_GSERVICES into system-or-signature (instead of just signature),
as a temporary measure so unbundled Google components (GSF, etc.) can hold
it. (In the longer term, WRITE_GSERVICES won't be a system permission at
all, but it or something like it will be defined directly by GSF.)
/frameworks/base/core/res/AndroidManifest.xml
362d5b9b6429a2766f5b980d2010262135788ad8 12-Nov-2009 Dianne Hackborn <hackbod@google.com> Fix issue #2256032: Change CONFIGURATION_CHANGED and add a locale changed broadcast

You can no longer receive CONFIGURATION_CHANGED in a manifest, which is really really
bad (launching apps every time the screen is rotated!). A new LOCALE_CHANGED broadcast
is sent that you can receive in a manifest.

Change-Id: I80022375f0716db2e672382a29db3cea1af74702
/frameworks/base/core/res/AndroidManifest.xml
f7ae77cd67f1a3993b8e56c1af4720a7adf4e69d 03-Oct-2009 Fred Quintana <fredq@google.com> account manager api review changes
/frameworks/base/core/res/AndroidManifest.xml
29e4a3c566f435c32f0b95e4ac8e8b33cac6faba 01-Oct-2009 Dianne Hackborn <hackbod@google.com> Update from API review.

Change-Id: I16b1c566f91167aac9615ac59dd297a154c828ea
/frameworks/base/core/res/AndroidManifest.xml
96cb8d0b94b5737d0a06088bff3bf409ced3cd3d 30-Sep-2009 Debajit Ghosh <debajit@google.com> fix account permission strings. this permission is used to protect more than just Google accounts.
/frameworks/base/core/res/AndroidManifest.xml
aef405d82931a08a7683cf0f58b5e74dbe268d45 28-Sep-2009 Dianne Hackborn <hackbod@google.com> Allow wallpaper picker to work.

Change-Id: I379f25e0e8e372d72c0a89e71ccd584a5dbb3648
/frameworks/base/core/res/AndroidManifest.xml
4cc86e1ae80eb1938500fe5fa06bbdf8b4b7b50d 22-Sep-2009 Christopher Tate <ctate@android.com> Clear the device's data from the transport when backup is disabled

Turning off backup in the Settings UI constitutes an opt-out of the whole
mechanism. For privacy reasons we instruct the backend to wipe all of the data
belonging to this device when the user does this. If the attempt fails it is
rescheduled in the future based on the transport's requestBackupTime()
suggestion. If network connectivity changes prompt the transport to indicate a
backup pass is appropriate "now," any pending init operation is processed before
the backup schedule is resumed.

The broadcasts used internally to the backup manager are now fully protected;
third party apps can neither send nor receive them.

(Also a minor logging change; don't log 'appropriate' EOF encountered during
parsing of a backup data stream.)
/frameworks/base/core/res/AndroidManifest.xml
ffa424800d0338b8b894aef2ea1e3e3344cbda7a 24-Sep-2009 Dianne Hackborn <hackbod@google.com> Fix issue #2133206: dialogs/menus should auto-dismiss when screen turns off

Lot of infrastructure for more things to go away when "clear system dialogs"
happens, and now do this when we turn on the lock screen.

Change-Id: I567130296fe47ce82df065ed58ef21b37416ceaf
/frameworks/base/core/res/AndroidManifest.xml
72440a0e2c8f73240e0dcee36e58b1840ffbb5fd 16-Sep-2009 Nick Pelly <npelly@google.com> Allow only System Service to send most Bluetooth intents.

Change-Id: I9f63425995f12741b60b85cdffe5a94e97ca03f1
/frameworks/base/core/res/AndroidManifest.xml
5e1ab335e6e8fbfa19c64d53880a22f472010953 02-Sep-2009 Christopher Tate <ctate@android.com> Expand apps' control over the settings restore process

Applications can now specify two more aspects of the restore process: whether
they need to run with their own custom Application subclass rather than being
launched in the usual restricted mode during restore, and whether it's okay for
the backup manager to kill the app process once restore has completed. The new
manifest attributes for these are, respectively, android:restoreNeedsApplication
and android:killAfterRestore.

If unspecified in the manifest, restoreNeedsApplication is false, and
killAfterRestore is true.

In order to support kill-after-restore cleanly, this change also adds a new
system-process-only interface to the Activity Manager, which will schedule a
"commit suicide" event on the target app's main thread looper.

The framework backup agents have been given the appropriate new backup
attributes as well.
/frameworks/base/core/res/AndroidManifest.xml
284ac93aa30642fda87d5c40263a1263677c21cd 28-Aug-2009 Dianne Hackborn <hackbod@google.com> More work on wallpapers: animations, lifecycle, scaling, etc.

Yet more work on improving the behavior of wallpapers. This fixes a few
problems in their lifecycle (corresponding change in the picker also
required for this), makes their animations better for hardware that supports
alpha fades, adds animations for the wallpapers themselves, eliminates
fixed size wallpapers, and adjusts the API for retrieving a wallpaper
bitmap to take care of scaling the raw wallpaper image to match the current
desired width and height.

Change-Id: If1c0aaceba4ea4e175dcb7a8416ca7ddbb9bfa6f
/frameworks/base/core/res/AndroidManifest.xml
22d1f9fb23015471de6af1a70e40fb5c82ecb665 19-Aug-2009 Danke Xie <dankex@qualcomm.com> gps: Network initiated SUPL

Initial contribution from Qualcomm.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
767be5f0b929cc1eeb8a7d5aa7a02e228053e9bb 26-Aug-2009 Jim Miller <jaggies@google.com> Integrate CDMA provisioning into SetupWizard
/frameworks/base/core/res/AndroidManifest.xml
edc5ff862877d679578cbe9ecbbc806782620968 18-Aug-2009 Dianne Hackborn <hackbod@google.com> am c678a93a: Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode

Merge commit 'c678a93a73c83e841032874bee9c202936da73c0' into eclair

* commit 'c678a93a73c83e841032874bee9c202936da73c0':
Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
c678a93a73c83e841032874bee9c202936da73c0 17-Aug-2009 Dianne Hackborn <hackbod@google.com> Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
/frameworks/base/core/res/AndroidManifest.xml
f21adf6fc19bc9c6908c6f1aaae203389f104bfa 13-Aug-2009 Dianne Hackborn <hackbod@google.com> Always have a wallpaper service running.
/frameworks/base/core/res/AndroidManifest.xml
0749dcd19301fe4093f9cf8677c722d17bceabfb 14-Aug-2009 Christopher Tate <ctate@android.com> Backup participants must now hold the BACKUP_DATA permission

Packages that do not use android.permission.BACKUP_DATA will neither be backed
up nor restored. That permission is currently signature-only. In the future if
access to the backup/restore infrastructure is made available to arbitrary 3rd
party applications, the permission checks (and indeed, the permission itself)
can simply be removed.
/frameworks/base/core/res/AndroidManifest.xml
4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 09-Aug-2009 Dianne Hackborn <hackbod@google.com> Very primitive wallpapers in a surface.

This is all of the basic pieces:

- The WallpaperService now creates a surface with the window manager for its
contents.
- There is a simple service that displays a bitmap.
- The wallpaper manager takes care of starting and stopping the service.
- The window manager knows about wallpaper windows and how to layer them with
the windows that want to be shown on top of wallpaper.

Lots and lots of issues remain, but at this point you can actually write a
wallpaper service, select it in the UI, and see it behind an activity.
/frameworks/base/core/res/AndroidManifest.xml
49f746823eafabbf251f27a059ddd8c94ada04f1 31-Jul-2009 Mike Lockwood <lockwood@android.com> Remove android:multiprocess from ShutdownActivity to ensure it runs in the system process.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
bad80e0dccdeaeea97991f7d092678ff0df1bc84 30-Jul-2009 Mike Lockwood <lockwood@android.com> Add Activity Intent.ACTION_REQUEST_SHUTDOWN for requesting a system shutdown.

The Intent.EXTRA_KEY_CONFIRM extra can be set to require user confirmation before shutting down.
The ACTION_REQUEST_SHUTDOWN Intent is protected by android.permission.SHUTDOWN.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
9bb8fd77c8dc177aab9ac96bed4f55972dcda70a 29-Jul-2009 Joe Onorato <joeo@android.com> Only restore the bits for wallpapers that aren't built in.
/frameworks/base/core/res/AndroidManifest.xml
02f5228c3c224dc8804cbedd40899fa0c42bfd4a 29-Jul-2009 Dianne Hackborn <hackbod@google.com> resolved conflicts for merge of f0d83fd9 to master
7f2054392e9957d3ba8579ef08c29cfb27df564e 28-Jul-2009 Dianne Hackborn <hackbod@google.com> Updates from API review.

* AccessibilityService -- document onBind() to not be implemented.
* GestureLibrary.getLearner() -- needs to be hidden.
* IntentSender -- remove protected constructors, document that it is retrieved from a PendingIntent.
* Hide permissions: SHUTDOWN, STOP_APP_SWITCHES.
* Context -- hide BACKUP_SERVICE.
* ContextWrapper -- hide getSharedPrefs bla h blah
* Intent.parseUri() -- fix docs.
* ApplicationInfo.FLAG_TEST_ONLY?!?
* Hide MockContext.getSharedPrefs blah blah
/frameworks/base/core/res/AndroidManifest.xml
143a2ce1ea33aeba81cff26f66144065d379dc64 27-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am ba989ad0: Merge change 8648 into donut

Merge commit 'ba989ad0ed91beda010d44945fa015d75d99cf67'

* commit 'ba989ad0ed91beda010d44945fa015d75d99cf67':
Use the old string for bookmarks permissions.
e7d1c8f3777375468de2e5932a691ef388ee2e75 27-Jul-2009 Leon Scroggins <scroggo@google.com> Use the old string for bookmarks permissions.

When we made the bookmark permissions public, we also changed their
names, which might break existing apps. Change them back. Depends
on a change in packages/apps/Browser
/frameworks/base/core/res/AndroidManifest.xml
d4a1d2e14297a3387fdb5761090961e714370492 17-Jul-2009 Fred Quintana <fredq@google.com> add account manager permission checking
/frameworks/base/core/res/AndroidManifest.xml
602bee5bf2a4f688b050077291288b473a7cc6db 13-Jul-2009 Android (Google) Code Review <android-gerrit@google.com> am cf29e116: Merge change 6867 into donut

Merge commit 'cf29e116129f38309c18ba14b9893b079a712289'

* commit 'cf29e116129f38309c18ba14b9893b079a712289':
CLOSE_SYSTEM_DIALOGS can't be protected.
4554f30c834723db6946400bf1827be4419a3134 11-Jul-2009 Dianne Hackborn <hackbod@google.com> CLOSE_SYSTEM_DIALOGS can't be protected.
/frameworks/base/core/res/AndroidManifest.xml
54a26bc85f4fe972e929e42b986c65a710a229b3 11-Jul-2009 Dianne Hackborn <hackbod@google.com> resolved conflicts for merge of 889c2d37 to master
854060af30f928c0a65591e9c8314ae17056e6b8 10-Jul-2009 Dianne Hackborn <hackbod@google.com> Fix bug #1873249i: Apps can DoS/brick device

This is the problem where various things are listening for broadcasts
(such as battery status, PIN/PUK/Network) that an application can send
to cause harm to the system.

Solving this is tricky because many of these broadcasts are sticky,
and I have never figured out how to do permissions with sticky
broadcasts in a sane way. So instead, I am going to punt on the
general problem and just brute force it:

There is new a way for system components to declare specific
broadcast actions to be protected, which means that only the system
and the phone can send them. This is good enough for now. None
of it is exposed in the public API so we can make something a little
less stupid in the future if we ever need to.
/frameworks/base/core/res/AndroidManifest.xml
e3f054411b9f025848f68389c4e2c325e76b3826 09-Jul-2009 Dianne Hackborn <hackbod@google.com> resolved conflicts for merge of 2af632f8 to master
2af632f87d487deaa5b2eb71341cfc4f0c0d1173 08-Jul-2009 Dianne Hackborn <hackbod@google.com> Add new <path-permission tag for use by global search.

This adds a new <path-permission> tag you can use inside of a <provide>
to define additional path-based permissions that broaden the global
read and write permissions. The initial use for this will be global
search, so that a content provider that is protected by permissions
can make a part of itself available to global search under another
permission. This addresses the issue with global search not being able
to request permissions it would need of providers it doesn't know
about at build time.
/frameworks/base/core/res/AndroidManifest.xml
5ad2f1c05ed69176849f535e4a8ab02e50e8e048 30-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am dbcd9c34: Merge change 5654 into donut

Merge commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4'

* commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4':
The BACKUP permission should have the signatureOrSystem protectionLevel,
8aeaf2e079a1776c5b17f95bf7ad401966f2beef 29-Jun-2009 Joe Onorato <joeo@android.com> The BACKUP permission should have the signatureOrSystem protectionLevel,
because the setup wizard isn't signed by the same cert as the framework.
/frameworks/base/core/res/AndroidManifest.xml
cc79800a741e4ee55ecfa7ec236b0087d83e41e4 25-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am 5416d7c9: Merge change 5317 into donut

Merge commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2'

* commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2':
Start backing up wallpaper
111bd4acdb378266221b430a284f88a3990a3958 25-Jun-2009 Christopher Tate <ctate@google.com> Start backing up wallpaper

This CL does the following:
+ adds an AbsoluteFileBackupHelper class for managing backup of files
known by absolute path, not based off of the app's getFilesDir() root
+ bumps up the collection interval from its testing-only default of 1 second
to 3 minutes
+ adds a SystemBackupAgent class to the main system package and names it as
the android:backupAgent for the main OS package. Right now this agent
only backs up & restores the wallpaper file.
+ amend the Wallpaper Service to inform the Backup Manager when the wallpaper
changes.

On the subject of the 3-minute collection interval before the backup actually
occurs: this can be short-circuited from an adb shell. Running the command
'bmgr run' will cause the Backup Manager to kick off any pending backup
operations immediately.
/frameworks/base/core/res/AndroidManifest.xml
d6377fbe7eb570b880ce5f1fcc71a556a24961ba 22-Jun-2009 Leon Scroggins <scroggo@google.com> resolved conflicts for merge of 9336f5d9 to master
9ce4c6c5cfc111a73e0cfc3c94daa50346c56867 19-Jun-2009 Leon Scroggins <scroggo@google.com> Make browser bookmarks permissions part of the public API.
/frameworks/base/core/res/AndroidManifest.xml
3c3d3081aad5d3a0cadd18c7764974060c1a5274 16-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am 727f36c6: Merge change 4265 into donut

Merge commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef'

* commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef':
process: Fix bug where if a thread exited while we were changing its control
Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally
29930a1cb884885f92c72a76e42e795ac948edc3 16-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am 3dcea047: Merge change 4237 into donut

Merge commit '3dcea047c5c7a61a56f618815e298d7bd38e2678'

* commit '3dcea047c5c7a61a56f618815e298d7bd38e2678':
Remove obsolete FOTA_UPDATE permission (which should never have been
48f72206dc4215ea2eb3898043eb713b5b72e135 16-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am aa67df9f: Merge change 4248 into donut

Merge commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3'

* commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3':
Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions.
cb05cc4acba4724d06120d2c606d955751bd0d11 16-Jun-2009 Dan Egnor <egnor@google.com> Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally
reintroduced in an errant and clumsy git merge operation.

Also remove permission label and description strings for now-deleted
permissions FOTA_UPDATE and (within the SettingsProvider package)
WRITE_GSERVICES.
/frameworks/base/core/res/AndroidManifest.xml
2d4b6ad9d4c7e3e2dbb6a127f37271686253d71f 15-Jun-2009 Dan Egnor <egnor@google.com> Remove obsolete FOTA_UPDATE permission (which should never have been
made public, and wouldn't be used by any third party applications,
and no longer does anything regardless).

Also remove the WRITE_GSERVICES permission from the SettingsProvider
package's manifest (the declaration there was redundant with the one
in the core manifest, where all the other settings-related permissions
live -- no other core package includes its own permission definitions).
/frameworks/base/core/res/AndroidManifest.xml
29148f90cd9fb34ff64f76936347547885906eb9 16-Jun-2009 Dianne Hackborn <hackbod@google.com> Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions.

These are no longer used.
/frameworks/base/core/res/AndroidManifest.xml
7c49790cde0acb494b6e8980662842c95dd8859a 01-Jun-2009 Android (Google) Code Review <android-gerrit@google.com> am 162c9d0e: Merge change 2805 into donut

Merge commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47'

* commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47':
base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE
5a3a77dabd744d5be79d7745c2a977c108a9ad98 01-Jun-2009 San Mehat <san@google.com> base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
ad6042aa2342d0a869f84772774b47ae87346ccf 01-Jun-2009 Christopher Tate <ctate@google.com> am 181fafaf: Retool the backup process to use a new \'BackupAgent\' class

Merge commit '181fafaf48208978b8ba2022683ffa78aaeddde1'

* commit '181fafaf48208978b8ba2022683ffa78aaeddde1':
Retool the backup process to use a new 'BackupAgent' class
181fafaf48208978b8ba2022683ffa78aaeddde1 14-May-2009 Christopher Tate <ctate@google.com> Retool the backup process to use a new 'BackupAgent' class

Backups will be handled by launching the application in a special
mode under which no activities or services will be started, only
the BackupAgent subclass named in the app's android:backupAgent
manifest property. This takes the place of the BackupService class
used earlier during development.

In the cases of *full* backup or restore, an application that does
not supply its own BackupAgent will be launched in a restricted
manner; in particular, it will be using the default Application
class rather than any manifest-declared one. This ensures that the
app is not running any code that may try to manipulate its data
while the backup system reads/writes its data set.
/frameworks/base/core/res/AndroidManifest.xml
96cdc61c69aa735e65295a50e3e2922425b3c877 28-May-2009 Android (Google) Code Review <android-gerrit@google.com> am 1e2e44e9: Merge change 2365 into donut

Merge commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc'

* commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc':
Fix wifi multicast API for public use.
Revert "Bug fixes and performance improvements"
fc1b15cfbfc5f69235ec1f367abd7a909381cd05 23-May-2009 Robert Greenwalt <robdroid@android.com> Fix wifi multicast API for public use.

Applying API review comments and taking it public.
/frameworks/base/core/res/AndroidManifest.xml
9b1e1400df4c6c4b69985f164097f0c842dd796f 21-May-2009 Android (Google) Code Review <android-gerrit@google.com> am 8c690ea9: Merge change 2182 into donut

Merge commit '8c690ea9976d644db3c96eddbbbd2d50eac56913'

* commit '8c690ea9976d644db3c96eddbbbd2d50eac56913':
location: Replace ILocationCollector interface with new ILocationProvider method
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 21-May-2009 Mike Lockwood <lockwood@android.com> location: Replace ILocationCollector interface with new ILocationProvider method

This change replaces ILocationCollector with a more general mechanism that
passes locations received from a provider to all other providers.
The network location provider now uses this to implement the location collector.
In the future, this could be used to inject network locations to the GPS
as aiding data.

This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
0bcad89a58ad49a0a836902ad41584777ca1f3f3 20-May-2009 Dianne Hackborn <hackbod@google.com> am 95fc68f2: Fix issue where apps could prevent the user from going home.

Merge commit '95fc68f24a2a93e5664e2234abcfe479d385cc05'

* commit '95fc68f24a2a93e5664e2234abcfe479d385cc05':
Fix issue where apps could prevent the user from going home.
95fc68f24a2a93e5664e2234abcfe479d385cc05 20-May-2009 Dianne Hackborn <hackbod@google.com> Fix issue where apps could prevent the user from going home.

Now we have a 5-second time after home is pressed, during which
only the home app (and the status bar) can switch to another app.
After that time, any start activity requests that occurred will
be executed, to allow things like alarms to be displayed. Also
if during that time the user launches another app, the pending
starts will be executed without resuming their activities and
the one they started placed at the top and executed.
/frameworks/base/core/res/AndroidManifest.xml
470c1a8f394597329b400874f0b3afb58e558a1a 19-May-2009 Jeff Sharkey <jsharkey@android.com> am af999280: Change BIND_APPWIDGET to be signatureOrSystem.

Merge commit 'af9992802992aaccfe1fb5893448939f215dd607'

* commit 'af9992802992aaccfe1fb5893448939f215dd607':
Change BIND_APPWIDGET to be signatureOrSystem.
af9992802992aaccfe1fb5893448939f215dd607 18-May-2009 Jeff Sharkey <jsharkey@android.com> Change BIND_APPWIDGET to be signatureOrSystem.

See http://b/issue?id=1839074 for more details.
/frameworks/base/core/res/AndroidManifest.xml
62da8461ed5317fe78ae5e3793662694e7fc99a3 14-May-2009 Dianne Hackborn <hackbod@google.com> Implement compatibility support for WRITE_SDCARD permission.

Now old applications will automatically be granted it. Also renamed it from
SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions,
and re-arranged how we do targetSdkVersion to actually be usuable for this
kind of stuff.

Note that right now this results in basically all apps being given the
WRITE_SDCARD permission, because their targetSdkVersion is not set. I will
be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d 14-May-2009 Dianne Hackborn <hackbod@google.com> Implement compatibility support for WRITE_SDCARD permission.

Now old applications will automatically be granted it. Also renamed it from
SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions,
and re-arranged how we do targetSdkVersion to actually be usuable for this
kind of stuff.

Note that right now this results in basically all apps being given the
WRITE_SDCARD permission, because their targetSdkVersion is not set. I will
be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
97ecc9cbe7eccafc0923d7655daf07f4c2ea9791 12-May-2009 Wei Huang <weih@google.com> define Intent.ACTION_REMOTE_INTENT, which replaces the old GTalk data messaging intent "android.intent.action.GTALK_DATA_MESSAGE_RECEIVED".

The remote intent concept shouldn't be limited to Google or GTalkService. It should be owned by the Android platform.
/frameworks/base/core/res/AndroidManifest.xml
3531fdb1d9a0ca536bd7a7a27d35b3e62c318ad9 08-May-2009 The Android Open Source Project <initial-contribution@android.com> merge 55280a9

Merge commit '55280a9'
55280a91884b9256e8db6af6a09f28b3feeaa9d8 08-May-2009 Dianne Hackborn <hackbod@google.com> Improve shutdown process to send broadcast for applications.

This introduces a new class in the base platform for performing a clean
shutdown (which was copied from the classes in the policies). It
includes new features to send a shutdown broadcast for applications
to do cleanup, and ot have the activity manager pause the current
activity before proceeding with the shutdown. These facilities are
also use to write at the most recent stat files for sync, battery
and user activity.
/frameworks/base/core/res/AndroidManifest.xml
7a1355950172b7a549820e9a2cd4a9b2099ec32f 06-May-2009 Dianne Hackborn <hackbod@google.com> merged 231cc608d06ffc31c24bf8aa8c8275bdd2636581
231cc608d06ffc31c24bf8aa8c8275bdd2636581 28-Apr-2009 Dianne Hackborn <hackbod@google.com> Rewrite SyncStorageEngine to use flat files and in-memory data structures.

The previous implementation used a database for storing all of its state, which could cause
a significant amount of IO activity as its tables were updated through the stages of a sync.
This new implementation replaces that in-memory data structures, with hand-written code
for writing them to persistent storage.

There are now 4 files associated with this class, holding various pieces of its state that
should be consistent. These are everything from a main XML file of account information that
must always be retained, to a binary file of per-day statistics that can be thrown away at
any time. Writes of these files as scheduled at various times based on their importance of
the frequency at which they change.

Because the database no longer exists, there needs to be a new explicit interface for
interacting with the sync manager database. This is provided by new APIs on IContentService,
with a hidden method on ContentResolver to retrieve the IContentService so that various
system entities can use it. Other changes in other projects are required to update to the
new API.

The goal here is to have as little an impact on the code and functionality outside of
SyncStorageEngine, though due to the necessary change in API it is still somewhat extensive.
/frameworks/base/core/res/AndroidManifest.xml
e90c0da675a945a86ac06098c1f5694ddc4efb23 01-May-2009 Mike Lockwood <lockwood@android.com> am 275555c: location: Add support for location providers outside of the

Merge commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e'

* commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e':
location: Add support for location providers outside of the system process.
275555c8eb3fb5df6e7320873b88b77cdde85a9e 01-May-2009 Mike Lockwood <lockwood@android.com> location: Add support for location providers outside of the system process.

Also added new permissions android.permission.INSTALL_LOCATION_PROVIDER
and android.permission.INSTALL_LOCATION_COLLECTOR to the public API.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
1e89ef82b1cb06034c30f9772f936a8a0cf4a7df 29-Apr-2009 Android (Google) Code Review <android-gerrit@google.com> am 947fe79: Merge change 483 into donut

Merge commit '947fe79e99d5536a10c5b81946d20e69d0e9d479'

* commit '947fe79e99d5536a10c5b81946d20e69d0e9d479':
API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings
29b57e63e54321f99ff086bb25439098d83292f6 23-Apr-2009 San Mehat <san@google.com> API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
3326920329cecb57c7ff1fc5c6add5c98aab9ed9 21-Apr-2009 Fred Quintana <fredq@google.com> adding concept of features to accounts
/frameworks/base/core/res/AndroidManifest.xml
935ae463d495d41155e27feb849768ad2b8b16db 14-Apr-2009 Dianne Hackborn <> AI 145994: Integrate #145778 from Donut.

Automated import of CL 145994
/frameworks/base/core/res/AndroidManifest.xml
f8a7ceaef2e7d5cd530c9426bde91b6fa9a40b75 11-Apr-2009 Andy Stadler <> AI 145778: Manual merge changes 145382-145384 from cupcake.

Automated import of CL 145778
/frameworks/base/core/res/AndroidManifest.xml
15ba27802eb23e01f4fada11f3fa1f35925eab49 25-Mar-2009 Dianne Hackborn <> Automated import from //branches/master/...@142576,142576
/frameworks/base/core/res/AndroidManifest.xml
603073430bbcb1bd29db7afb9b14e2732ad589fb 25-Mar-2009 Fred Quintana <> Automated import from //branches/master/...@142414,142414
/frameworks/base/core/res/AndroidManifest.xml
7d1e577d5f7ae96bfc533e1c73a3a6a272a4a16d 25-Mar-2009 Dianne Hackborn <> Automated import from //branches/donutburger/...@142472,142472
/frameworks/base/core/res/AndroidManifest.xml
246924180995326ed368dadbc59772b41095d6e6 25-Mar-2009 Jasper Lin <> Automated import from //branches/master/...@140750,140750
/frameworks/base/core/res/AndroidManifest.xml
77323363091b42060bfd697ffb33ce6b3696ad6f 25-Mar-2009 Jasper Lin <> Automated import from //branches/donutburger/...@140749,140749
/frameworks/base/core/res/AndroidManifest.xml
c39a6e0c51e182338deb8b63d07933b585134929 11-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@137873
/frameworks/base/core/res/AndroidManifest.xml
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
076357b8567458d4b6dfdcf839ef751634cd2bfb 03-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@132589
/frameworks/base/core/res/AndroidManifest.xml
3dec7d563a2f3e1eb967ce2054a00b6620e3558c 03-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@137055
/frameworks/base/core/res/AndroidManifest.xml
3001a035439d8134a7d70d796376d1dfbff3cdcd 19-Feb-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@132276
/frameworks/base/core/res/AndroidManifest.xml
d24b8183b93e781080b2c16c487e60d51c12da31 11-Feb-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@130745
/frameworks/base/core/res/AndroidManifest.xml
22f7dfd23490a3de2f21ff96949ba47003aac8f8 20-Jan-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@127101
/frameworks/base/core/res/AndroidManifest.xml
b798689749c64baba81f02e10cf2157c747d6b46 10-Jan-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@125939
/frameworks/base/core/res/AndroidManifest.xml
f013e1afd1e68af5e3b868c26a653bbfb39538f8 18-Dec-2008 The Android Open Source Project <initial-contribution@android.com> Code drop from //branches/cupcake/...@124589
/frameworks/base/core/res/AndroidManifest.xml
54b6cfa9a9e5b861a9930af873580d6dc20f773c 21-Oct-2008 The Android Open Source Project <initial-contribution@android.com> Initial Contribution
/frameworks/base/core/res/AndroidManifest.xml