cba436b312f1bf6890be1366843109eebdc1d229 |
|
13-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow SetupWizard to do WiFi scans if location off" into nyc-mr1-dev
|
b2457c370451ca6eac9457369a30a43aa0179ee6 |
|
12-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off Location permission is needed for apps to do WiFi scans and if location is globally off no app can scan too. It is possible that an OEM does not want location to be on until the user agrees to that or a device owner can turn location off before setup. As a result setup wizard cannot show the WiFi networks preventing the user form logging in. This change allows the setup wizard component to perform WiFi scans even if location is globally off. bug:29577364 Change-Id: Ic56bfb7fb3818658a843d309b67ef37324045f67
/frameworks/base/core/res/AndroidManifest.xml
|
0bba1c620b2fc65f9809a619042e75597075d431 |
|
10-Oct-2016 |
Jack He <siyuanh@google.com> |
List HF_INDICATORS_VALUE_CHANGED broadcast as protected android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED notification should be protected. Bug: 32059227 Test: manual Change-Id: I06d4a7e3aa3a5586eb09d2538b4b526a5d073f9a (cherry picked from commit b798f79ba26e057531fb51e65824e0deee445f26)
/frameworks/base/core/res/AndroidManifest.xml
|
7e2657c30374dfc89993aa7cde8d96ae60a13d0a |
|
26-Sep-2016 |
Salvador Martinez <dehboxturtle@google.com> |
Changed themes for core activities Many activities in core were using the material theme which would result in teal colors on all devices. These themes have all been changed to DeviceDefault so that the color will be more suited to whatever device the user has. Test: Manual Inspection Bug: 31623421 Change-Id: I6847023c4fb57a1c3384a1f8e483cd740229458f
/frameworks/base/core/res/AndroidManifest.xml
|
234d1afd7913bebd936c33eba93041aebfd8ac70 |
|
27-Aug-2016 |
Sudheer Shanka <sudheersai@google.com> |
Allow apps with CREATE_USERS permission to create demo users. Bug: 31092477 Test: adb shell am create-user --ephemeral --demo <user-name> Change-Id: Ia08a50ec4371466c62cdc9f5391e298a666b5081
/frameworks/base/core/res/AndroidManifest.xml
|
5cb2973495084f8ce3433b579e4b4962ed9d7efc |
|
12-Jul-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Only sync adapters with access can see an account - framework It was possible for a sync adapter without accounts access to see the account which it is supposed to sync which can be used to identify the user. This change ensures that only sync adapters with account access can run (which results in seeing the account), otherwise we involve the user to approve access only to this account. A sync adapter can access an account if one of these is true: - it is signed as the authenticator for this account - has the GET_ACCOUNTS permission - has an auth token for the account - it is a preinstalled app (system or privileged) The main thing we need to figure out is if the extra prompts for giving access to a sync adapter to the account create too much friction. bug:28163381 Change-Id: Ie083bb681b5a2aed81ca5f6a062193a175fad77e
/frameworks/base/core/res/AndroidManifest.xml
|
9a236066dbf604edfd5f873b4a3b94a200efd628 |
|
18-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Protect various Bluetooth broadcasts Bug: 30832954 Change-Id: I37e0b2ffab65c0703244917a4ade9bb8afbb5e6f
/frameworks/base/core/res/AndroidManifest.xml
|
514da60fb6227de9700e145f03614c2081e8e5a5 |
|
19-Jul-2016 |
Hugo Benichi <hugobenichi@google.com> |
Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission This patch creates a new permission used by ConnectivityService to give access to restricted networks without the NET_CAPABILITY_NOT_RESTRICTED capability bit on. Bug: 24497316 Change-Id: I5b6c8a9ef14395b2f1ab26cb17b24d7876ec79f1
/frameworks/base/core/res/AndroidManifest.xml
|
1c9977b762b4bac46b4470f04c898bfd17da5d90 |
|
12-Jul-2016 |
Michael Wright <michaelwr@google.com> |
Rename color transform to color mode and persist the value. Also, standardize on a set of possible modes for the displays to enter and separate the configuration of the color mode from the configuration of the display mode. Bug: 29044347 Change-Id: I6af0a7d1f11bc72d4cefc380f115c1fb00788864
/frameworks/base/core/res/AndroidManifest.xml
|
1030520822c42cc7357b463d301c7e97e928ba22 |
|
15-Jul-2016 |
Makoto Onuki <omakoto@google.com> |
Cache the default launcher. Originally we always checked with PM for the default launcher, which would take ~2ms. Now we cache the result, and clears the cache when (any) preferred activities change. Bug 30126557 Change-Id: Iceef288cd372c8bb9b119aa493e5173d894f2302
/frameworks/base/core/res/AndroidManifest.xml
|
dbbc7af06363435492410227c3c2b703ebda80e4 |
|
07-Jul-2016 |
Suprabh Shukla <suprabh@google.com> |
Making timeouts configurable through Settings Adding a global setting for timeouts used in retail demo mode. Also renaming the protected intent ACTION_RESET_DEMO to reflect proper owner package. Bug: 29917613 Change-Id: I9a174503626ab28cceb5024a8e63d27612439b92
/frameworks/base/core/res/AndroidManifest.xml
|
58dd0cd65e7ac9ca0c9ccbf42087baf2df751c61 |
|
29-Jun-2016 |
Ajay Panicker <apanicke@google.com> |
Protect REFRESH_BATCHED_SCAN broadcast Bug: 29754520 Change-Id: Id3f43d36db2c5f026a5d3a94e7370051d2e23e37
/frameworks/base/core/res/AndroidManifest.xml
|
022b6fe928f51133166f09578335d7dcb7895d30 |
|
15-Jun-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Move IMS-related protected broadcasts to packages/services/Telephony Bug: 29228175 Change-Id: I03bf54dde0ae1a40eda7fde655124a1d2a901442
/frameworks/base/core/res/AndroidManifest.xml
|
84d2c0de2ec7ccc9fbbcf8e3357b0ac1eb5f9f56 |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
resolve merge conflicts of 6f1ed20 to nyc-mr1-dev Change-Id: I9fe1e50f99382cbd8cd90f77ef99d081b472bb81
|
6f1ed200b3aa01af88eb309a55a428ceac56a9a2 |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
Merge "Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked" into nyc-dev
|
a2ef5c89c0945960510716eebe7965002d535789 |
|
10-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge \"Reduce shell power over user management.\" into nyc-dev am: 1b4124fc95 Change-Id: Ia54f3ad9a8594e101407db6b52b378ae8bec72a2
|
1b4124fc954db07064e80d3e25c3549507c255ca |
|
10-Jun-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Reduce shell power over user management." into nyc-dev
|
f5cea03eb036c05cacc711ff90c97a48ffb2bc17 |
|
09-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Reduce shell power over user management. Remove MANAGE_USERS permission from shell and whitelist it for some specific functionality. Bug: 29189712 Change-Id: Ifb37448c091af91991964511e3efb1bb4dea1ff3
/frameworks/base/core/res/AndroidManifest.xml
|
08504b5e0dd4ee87cc47d8a977d47466923bfc4b |
|
10-Jun-2016 |
Svet Ganov <svetoslavganov@google.com> |
Merge \"Protect the android.intent.action.CALL_PRIVILEGED broadcast\" into nyc-dev am: c94872e940 Change-Id: I722d5bfbed781c28db5da59f303c2579123d8e6e
|
c94872e9403ba4b6e8d374c29f42aeefed610bb0 |
|
10-Jun-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Protect the android.intent.action.CALL_PRIVILEGED broadcast" into nyc-dev
|
aa587546ec8f9a3c1425106e83ece86e8437369f |
|
09-Jun-2016 |
Stuart Scott <stuartscott@google.com> |
Add UCE Service Down protected broadcast bug:29173516 Change-Id: I1c5743962dbca9c482ce7d87f6fe570a3249f3fe
/frameworks/base/core/res/AndroidManifest.xml
|
b1dd80bcfe8d495478d185a5d88fc2cb981e9c47 |
|
07-Jun-2016 |
Ricky Wai <rickywai@google.com> |
Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked Bug: 29150970 Change-Id: Ie04cec116564147272896e4a5ca076bbc08e60b1
/frameworks/base/core/res/AndroidManifest.xml
|
c69266dec6556c5f82d74819251130b2ca820cec |
|
09-Jun-2016 |
Svet Ganov <svetoslavganov@google.com> |
Protect the android.intent.action.CALL_PRIVILEGED broadcast bug:29178416 Change-Id: I5e8f1e5423d0dd59cc532a45142b2401f5e5a45b
/frameworks/base/core/res/AndroidManifest.xml
|
211b5b10f6baddc290f7f65c0ac70eed3b9913c8 |
|
08-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
resolve merge conflicts of 718f321 to nyc-mr1-dev Change-Id: I0021aa5be1822082d8ff026cafa8c8b6b56b90b5
|
d2b21047c8c133d99cbd4821a5dc88f60d933445 |
|
03-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
Add a separate read permission for oem unlock state New privileged permission READ_OEM_UNLOCK_STATE added for system privileged apps. Changing the unlock state still requires the old permission OEM_UNLOCK_STATE, which is signature protected. Bug: 28953956 Change-Id: Iedd2ad1d2d1dc3ae91122d7c406e3ee623a47d61
/frameworks/base/core/res/AndroidManifest.xml
|
4ec430e0623e808c3a0feb1602d48c2894b130f9 |
|
27-May-2016 |
Suprabh Shukla <suprabh@google.com> |
Adding Reset Demo Notification RetailDemoMOdeService adds a notification which allows user to wipe current session and start a fresh demo session. Bug: 27280140 Change-Id: I59dd82d236287206a2ca747210b3423fdc62c185
/frameworks/base/core/res/AndroidManifest.xml
|
a8e6f875bc07dc12d3c8284cef5b5d83d93ff743 |
|
24-May-2016 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #28931042: wtf in system server More broadcasts (from telephony) that should be protected. Also put a little more information in the wtf message to help determine where broadcasts from out of the system process are coming from. Change-Id: Ie3df25c883482ca54c7a7c5db57ca609950f5cbc
/frameworks/base/core/res/AndroidManifest.xml
|
0e351a945b55e106d26b1d32659358617eff0be5 |
|
10-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Update docs for DELETE_PACKAGES permission." into nyc-dev
|
eaa6c6b540431ba17f887d456cc1721ccf30c855 |
|
05-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Update docs for DELETE_PACKAGES permission. Bug: 28302564 Change-Id: I283b8a5490a189fc90f64aec3278b87a430c2623
/frameworks/base/core/res/AndroidManifest.xml
|
27d92e4e397728d56f4f951dd4ce99668c7c447b |
|
06-May-2016 |
Christopher Tate <ctate@google.com> |
Move the 'pretend idle jobs can run now' broadcast into AMS It's a protected broadcast, so sending it directly from 'am' is no longer an option. This is needed for CTS as well as being generally useful during app development. Bug 28406044 Change-Id: I101915a8c6f19454330a8db2079a75023c112582
/frameworks/base/core/res/AndroidManifest.xml
|
2759e429d1f5e18869de34e5f0e13257c269aff9 |
|
06-May-2016 |
Ajay Panicker <apanicke@google.com> |
Protect TRANSFER_COMPLETE broadcast Bug: 28621801 Change-Id: Ia90abd00694ae80000f59ee0a17826592fd2159b
/frameworks/base/core/res/AndroidManifest.xml
|
a75d4877af7fa045cc91b2d60d3801aa098608de |
|
05-May-2016 |
Adam Powell <adamp@google.com> |
Merge "Have the Resolver/Chooser activities handle resize config changes" into nyc-dev
|
46ef0579dddd6480306fa58553a6e3180aedf9c7 |
|
05-May-2016 |
Adam Powell <adamp@google.com> |
Have the Resolver/Chooser activities handle resize config changes Both of these activities do additional work and look janky when rebuilding for a config change, especially in the presence of multiwindow. As neither of them use layouts or other resources that vary based on configuration, mark them as handling the relevant config changes. Bug 27171954 Change-Id: I38df1d875bcb063d72316b586c4d3f8074c4fad9
/frameworks/base/core/res/AndroidManifest.xml
|
441da79d8aa7b873f23227d10ecd425671b85506 |
|
04-May-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Marking @SystemApi permissions @hide too." into nyc-dev
|
2f78bf96d20d81843a1b6013ee4d18e5ce58a206 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
List the CONNECTION_STATE_CHANGED broadcast for MAP as protected Bug: 28527879 Change-Id: Ifb2db87677e92022814bb9704c26009d249ac6ce
/frameworks/base/core/res/AndroidManifest.xml
|
65fad18461b64ac35bf65e463e7f792c6df72add |
|
19-Apr-2016 |
Ajay Panicker <apanicke@google.com> |
List the SDP_RECORD broadcast as protected Bug: 28257589 Change-Id: I97ef91fa3a7f7ef62fd96ca079e0a6d5a957bc71
/frameworks/base/core/res/AndroidManifest.xml
|
a895559a41930b6665d8e3056b463633f3096fbc |
|
02-May-2016 |
Amit Mahajan <amitmahajan@google.com> |
Marking @SystemApi permissions @hide too. Bug: 28287631 Change-Id: Ie0375620689263ebafd6850f2261e090f09521b1
/frameworks/base/core/res/AndroidManifest.xml
|
4d36b3a8c5ba1289d851ef337e46709bba333100 |
|
27-Apr-2016 |
Makoto Onuki <omakoto@google.com> |
ShortcutManager: finishing touches - Change back the throttling quota to 10 calls / day - Foreground apps are no longer throttled, and when an app comes to foreground the call counter will be reset. - When the system locale changes, reset throttling for all packages for all users. See LocalService.onSystemLocaleChangedNoLock() for how it's performed. Because the reset must happen before any other apps have a chance to publish shortcuts, the logic is not straightforward. - Added an internal API to reset the throttling upon inline-reply from a notification. - Stop supporting icons from "content:" URIs - Improved javadoc on several APIs. Also internal refactor needed to this: - ShortcutUser.getAllPackages()/getAllLaunchers() are no longer accessible to outer code to prevent accidentally adding/removing the content. Outer code should use forAllPackages() / forAllLaunchers(). Bug 27923857 Change-Id: I002511193d1d33718163bb1dabe77610bde58198
/frameworks/base/core/res/AndroidManifest.xml
|
dae6beda7b9037234e24a1986b4a69db52a7a31c |
|
25-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Add back protected profile availibility broadcasts. Bug: 27532254 Change-Id: Ifbf59f64358864cd1d48be5e797c45ec2744eac0
/frameworks/base/core/res/AndroidManifest.xml
|
ffcba67bf9d25d9b8131f0aab9d5c8a4df492b69 |
|
23-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Rename GET_PASSWORD_PRIVILEGED and make it signature." into nyc-dev
|
714bbd8539b73f9d8cf396b6e0edd03f968ebfbd |
|
22-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Rename GET_PASSWORD_PRIVILEGED and make it signature. Now named GET_PASSWORD. Now it is just a signature, not privileged. Bug: 28295831 Change-Id: Ice93b527edced9546639b6c7096aad933c517548
/frameworks/base/core/res/AndroidManifest.xml
|
ae0e03a9e03de34e37b768b971d7596d7220a053 |
|
26-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
Cleanup of the PackageInstaller API - Frameworks The PackageInstaller app manages side-loading apps as well as permission management. It should be updatable, hence should rely on system APIs to talk to the platform. This is the first step of defining an API boundary. Change-Id: I9814eafd0b22ae03b4b847a7007cdbf14c9e5466
/frameworks/base/core/res/AndroidManifest.xml
|
b5b86c11008422ac4bf5af5fed736f04ebbaa858 |
|
29-Jan-2016 |
Sujith Ramakrishnan <sujithrk@google.com> |
Unbundle RemoteService on TV - part 3 - New service TVRemoteService triggered by SystemServer - Provider service proxy and watcher for maintaining connections to unbundled services which have the BIND_TV_REMOTE_SERVICE permission. - Shared library to facilitate connections between unbundled service and TVRemoteService. - Unbundled service needs TV_VIRTUAL_REMOTE_CONTROLLER permission to be fully functional. b/23792608 Change-Id: Ief5c6995883d1f7268a73bdd0c920c4c3f42cddb
/frameworks/base/core/res/AndroidManifest.xml
|
b40667eccdd797d08560c33e696625509f90d52b |
|
22-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast" into nyc-dev
|
59c9a93fc268e226495d4ee8cf7c507c2ea2c433 |
|
20-Apr-2016 |
Trevor Johns <trevorjohns@google.com> |
Merge changes from topic 'merge_docs_nyc-dev' into nyc-dev * changes: Remove links to createAndInitializeUser() and createUser() Resolve merge conflicts of a5060ee to nyc-dev
|
682c24e22811d4ee17ae1cd61bf255c3f7e722b7 |
|
12-Apr-2016 |
Trevor Johns <trevorjohns@google.com> |
Resolve merge conflicts of a5060ee to nyc-dev This undoes the automerger skip which occured in commit e740c84dc32180214a7fd157105d6c18d30408ee and replays it as a standard (NOT -s ours) merge. Change-Id: If5a47be26f73d6a0735c425cd66310a3e2a89086
/frameworks/base/core/res/AndroidManifest.xml
|
19c2a57c24fa337030ff31867380b685e9a5b586 |
|
15-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast Bug: 27532254 Change-Id: Iaca17355d3ec75fa09c36a5353f40d678cc2c812
/frameworks/base/core/res/AndroidManifest.xml
|
732bd6cb2736c9ae091f2b5b136570fc5d579224 |
|
12-Apr-2016 |
Dan Sandler <dsandler@android.com> |
Allow system apps to substitute a different app name in notifications. This is a privileged permission and is only to be used by the core OS and related packages whose names are confusing or misleading when shown in notifications. The user will always be able to see the true package name by accessing the notification inspector (longpress or swipe gesture on the notification row in SystemUI). Fixes: 26517701 Change-Id: I2b021c9da0757b99df76399666af263668d88070
/frameworks/base/core/res/AndroidManifest.xml
|
e9c752aa37553cab4d27b1c63e6c58eebc87d4c0 |
|
12-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Another protected broadcast. Bug: 28133722 Change-Id: I5fe8158a3c66168e1c5482711a487eba55876b73
/frameworks/base/core/res/AndroidManifest.xml
|
50e229f1f45a1550ba13ec3f81e864630fc3dc1c |
|
06-Apr-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Merge "Add VrManager AIDL interface for use by system apps." into nyc-dev
|
c7be3beced4ade05466a4a77c003ea81c2429f74 |
|
02-Apr-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Add VrManager AIDL interface for use by system apps. Bug: 27884853 Change-Id: I6de0d291deafe5003070d60866c60d6599312e79
/frameworks/base/core/res/AndroidManifest.xml
|
f9324a8dd9556785c6918c079b9236bc1a28e145 |
|
06-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Protect more broadcasts. Bug: 28001192 Change-Id: I3a3a48ccfcd75bb91431988aa3495d091d5d00f4
/frameworks/base/core/res/AndroidManifest.xml
|
e95057ade126e9e159fe05b69c32f85f7891490f |
|
01-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Split ACTION_MANAGED_PROFILE_AVAILABILITY_CHANGED into two. Add more comment to EXTRA_QUIET_MODE Bug: 27532254 Change-Id: I68a217561afca8b87f523c62393cdad097d5b75d
/frameworks/base/core/res/AndroidManifest.xml
|
f3f7965eb38d05cf2f09e8b54105ac35e8855b38 |
|
01-Apr-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Merge "Change UCE permissions from dangerous to signatureOrSystem" into nyc-dev
|
d9855c797cebf279d45121e6ec52f025df4bd860 |
|
01-Apr-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Change UCE permissions from dangerous to signatureOrSystem Bug: 27812202 Change-Id: Icf9d97e4d3f802bc0b3ea26d61835e6471082118
/frameworks/base/core/res/AndroidManifest.xml
|
51b651aea178fcfca8a3219141f0ecfda1504887 |
|
30-Mar-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
introduce GET_PASSWORD_PRIVILEDGED permission. That will be used to filter in passwords for Session based AccountManager flows. Bug: 27590532 Change-Id: I4a6d0540bcff186e416351a6f719600ce35d86a0
/frameworks/base/core/res/AndroidManifest.xml
|
f8c07d68c1813c6d9a05eb05951a320ace866168 |
|
01-Apr-2016 |
Russell Brenner <russellbrenner@google.com> |
Merge "Add new permission for am.updateLockTaskPackages()" into nyc-dev
|
b3ad567624475d3ad33fa0007e5ec5967b879cec |
|
25-Mar-2016 |
Russell Brenner <russellbrenner@google.com> |
Add new permission for am.updateLockTaskPackages() Adds android.permission.UPDATE_LOCK_TASK_PACKAGES, available only to the system and setup wizard, providing access to updateLockTaskPackages() without registering with the device policy manager as a device owner. Bug: 20016740 Change-Id: I6eceb5cece9407c84eabf3a818bb908f95989b91
/frameworks/base/core/res/AndroidManifest.xml
|
ae4908f41c6e96c973a65effe1dfbb3d0fbbeba2 |
|
31-Mar-2016 |
Alan Viverette <alanv@google.com> |
Remove DayNight theme Bug: 21854466 Change-Id: I739872112d0ae457d0d4620f9222206072d54b4b
/frameworks/base/core/res/AndroidManifest.xml
|
9dcb86a48d73f399fb1b5c020005d76d350eeac2 |
|
14-Mar-2016 |
Philip P. Moltmann <moltmann@google.com> |
Add the print service recommendation service This service connects through the print manager to the print spooler: PrintSpooler.AddPrintersActivity <-> PrintManager <-> PrintManagerService <-> UserState <-> RemotePrintServiceRecommendationService <-> PrintRecommendationService <-> PrintRecommendationServiceImpl Hence there is a lot of mindless plumming. The actual changes are only in the AddPrintersActivity which is extended to show another list of services: The recommended services. The PrintServiceRecommendationService is based on the experimenal print service stubs provider. This provider was contributed the Android by Mopria. As this services uses Android own network discovery service most code from the experimental provider goes away. In fact the only logic left over is the selections of mdns-txt fields to look at and the printer vendor configuration. This relies on the Android MDNS to get fixed (Bug: 27696905). This also does not deal with how to update the recommendation service. Bug: 24533249 Change-Id: I6edc6e25fc08a50d478b61c71bb8ea158b08624c
/frameworks/base/core/res/AndroidManifest.xml
|
7700ee39ae624f02b03884d5caf60ad65ae4baa2 |
|
25-Mar-2016 |
Hall Liu <hallliu@google.com> |
Update documentation for the READ_PHONE_STATE permission Bug: 26413825 Change-Id: I58d21ddd6e2ad1cc724648db5839d711d96663fb
/frameworks/base/core/res/AndroidManifest.xml
|
029ae4dcbfbde25b02968538f75f5729b3fba196 |
|
22-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Make DISK_SCANNED a protected broadcast. Bug: 27763115 Change-Id: Ib8b40ff9f4c1f929ac4f07a9d5460a0a593ba080
/frameworks/base/core/res/AndroidManifest.xml
|
cfedd20d54687449bb6a6982085003cbf9a22bcb |
|
19-Mar-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
ims:rcs: Add UCE interface files for RCS. Bug: 23222011 Change-Id: I2ce9e60240740acfe70c4a239163fbdbedbd96e0
/frameworks/base/core/res/AndroidManifest.xml
|
8a372a0a280127743ce9a7ce4b6198c7a02d2a4f |
|
16-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Refactoring FBE APIs based on council feedback. Mostly consists of removing the word "encryption" from most APIs, since we can't actually make promises about the data being encrypted. Bug: 27531029 Change-Id: Iace9d7c4e64716abf86ed11847c40f3947e1d625
/frameworks/base/core/res/AndroidManifest.xml
|
440ef18fe7dcfaff28fad0137f4abe4235381e05 |
|
15-Mar-2016 |
Ian Pedowitz <ijpedowitz@google.com> |
Merge "Revert "Permissions: Get rid of GET_ACCOUNTS"" into nyc-dev
|
358e51f3d186719a6a5b1f346f55c5426925055f |
|
15-Mar-2016 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Permissions: Get rid of GET_ACCOUNTS" This reverts commit d39600585bcb720d739ef6f0091066e3d4f77765. Bug: 27665091 Change-Id: I7d017ba7062ac594225229436d2877c7d21fb065
/frameworks/base/core/res/AndroidManifest.xml
|
658e4c5eceefcb2f0d070d478fb1ab0af27a1bbe |
|
15-Mar-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Permissions: Get rid of GET_ACCOUNTS" into nyc-dev
|
8731408b11a24e3a92188653548f2c90bf866a32 |
|
12-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Offer to cache ContentResolver-related Bundles. There are a handful of core system services that collect data from third-party ContentProviders by spinning them up and then caching the results locally in memory. However, if those apps are killed due to low-memory pressure, they lose that cached data and have to collect it again from scratch. It's impossible for those apps to maintain a correct cache when not running, since they'll miss out on Uri change notifications. To work around this, this change introducing a narrowly-scoped caching mechanism that maps from Uris to Bundles. The cache is isolated per-user and per-calling-package, and internally it's optimized to keep the Uri notification flow as fast as possible. Each Bundle is invalidated whenever a notification event for a Uri key is sent, or when the package hosting the provider is changed. This change also wires up DocumentsUI to use this new mechanism, which improves cold-start performance from 3300ms to 1800ms. The more DocumentsProviders a system has, the more pronounced this benefit is. Use BOOT_COMPLETED to build the cache at boot. Add more permission docs, send a missing extra in DATA_CLEARED broadcast. Bug: 18406595 Change-Id: If3eae14bb3c69a8b83a65f530e081efc3b34d4bc
/frameworks/base/core/res/AndroidManifest.xml
|
d39600585bcb720d739ef6f0091066e3d4f77765 |
|
11-Feb-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Get rid of GET_ACCOUNTS Second attempt. Still need to add strict mode violation checks and logging. Bug: 21901286 This reverts commit bf33bd4d31cfec895c96990525b0cb856407c8d6. Change-Id: I5d73343544c32ce4fc4c377ba44db8e677a1287d
/frameworks/base/core/res/AndroidManifest.xml
|
be3696d42552ad55ae0a41e9dd9fe81f5b17d3e7 |
|
08-Mar-2016 |
Chris Wren <cwren@android.com> |
Merge "rename the asisstant service for the ranker" into nyc-dev
|
0f90653ca1d25a92e2a5c9864c1347254fe1f65d |
|
08-Mar-2016 |
Amit Mahajan <amitmahajan@google.com> |
Merge "New permission for bypassing premium short code check." into nyc-dev
|
e24b9a6cfa4d565d7f49c9ae8f3aeca737d93312 |
|
17-Feb-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Add a VR listener service. Bug: 22855417 Bug: 26724891 Bug: 27364145 - Add an API for VrListenerService, which is bound/unbound from the framework when the system VR mode changes. - Allow only a single bound VrListenerService at a time. - Monitor allowed VrListenerService implementations from VrManagerService and evict services as needed when packages, users, or settings change. - Remove previous VR functionality in NotificationListenerService. - Add component target to Activity#setVrMode to allow explicit selection of the running VrListenerService from the current VR activity. Change-Id: I776335f4441be0e793d3126f2d16faf86a8c621a
/frameworks/base/core/res/AndroidManifest.xml
|
e5cd9fa4398c2059dc635da5ffd9b9cee28f605b |
|
12-Feb-2016 |
Amit Mahajan <amitmahajan@google.com> |
New permission for bypassing premium short code check. Bug: 18326557 Change-Id: I1b05f73103183b851bbef1280d0785ce0a48159a
/frameworks/base/core/res/AndroidManifest.xml
|
e0ba7eb365ac19fdc11c3f820349f0352761b9f4 |
|
04-Mar-2016 |
Chris Wren <cwren@android.com> |
rename the asisstant service for the ranker Bug: 22960980 Change-Id: Ibe57933303a488b01c43a7621a488d425d6f707d
/frameworks/base/core/res/AndroidManifest.xml
|
925cc2a066889bb8b02493fafd5344bf8b2e9136 |
|
03-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
More protected broadcasts! Bug: 26144973 Change-Id: I56f047d7e4b9d7bcf1ac40c98ee381badd909057
/frameworks/base/core/res/AndroidManifest.xml
|
e5ad41bc022db99c4f6663da0a9e49356c006741 |
|
01-Mar-2016 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #27317952: PendingIntent.getIntent() should be protected Change-Id: Ib05135cd94f5251942a6fc6df542ed39083f7827
/frameworks/base/core/res/AndroidManifest.xml
|
bdb14a30d0ae0bd8fdaebf76b80f1ca92c42b8a6 |
|
26-Feb-2016 |
Makoto Onuki <omakoto@google.com> |
Remove READ_WRITE_CONTACT_METADATA, which is no longer used Bug 27365657 Change-Id: Iaf1b62991bbb0ccce9488e4e50bc49a12663a2d0
/frameworks/base/core/res/AndroidManifest.xml
|
5cd52bee32250e14f5eca14d9e82535a0f2f4f87 |
|
23-Feb-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Expose removed permissions flag as system API" into nyc-dev
|
2a1376d9dfb362a18ba110d8e172f96021f1d879 |
|
23-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
Expose removed permissions flag as system API There are some permissions that were removed from the platform and guard nothing but legacy apps may be checking them before calling APIs. Hence, these apps should get the permissions as expected despite them being a no-op. To address this the platform declares removed permissions as normal permissions that are hidden such that legacy apps can always get them. These permissions are not shown in the UI. Play needs a way to filter out these permissions like the platform as they have permissions UI too. bug:23361760 Change-Id: I10f442dfc09a299ddc5480d8bf2db0bd786aec62
/frameworks/base/core/res/AndroidManifest.xml
|
66d7588078fbdbdadf646577dce6b3821976d25c |
|
22-Feb-2016 |
Felipe Leme <felipeal@google.com> |
Removed bugreport intents from protected list. These intents are send by Shell, which is not a protected uid, and already required the android.permission.DUMP permission, hence they are protected by permission. BUG: 27287868 Change-Id: Ie7cfe20a119e8abe989186ca2e0ae16454b4cf22
/frameworks/base/core/res/AndroidManifest.xml
|
9cea80cdddbecadb304eb7c8373cf1ed397f433a |
|
16-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
No overlay when permissions shown - framework bug:26973205 Change-Id: I88395e47649191bb7db6dd8723c49e741ef4f1e4
/frameworks/base/core/res/AndroidManifest.xml
|
5dbd4aad809e6fec51df62280bcc1bfe05cc7df5 |
|
07-Feb-2016 |
Jason Monk <jmonk@google.com> |
SysUI Tuner: Night mode v3 TwilightService: - Add support for locking on/off twilight globally - Change twilight state to have float amount rather than having clients calculate it using the sunrise/set values - State controlled through secure setting - Override mode which locks to a state for a couple hours then resets - Add broadcast for SysUI to listen to Brightness/Power: - Updates to handle TwilightService changes - Added secure setting to control whether or not to use twilight when calculating brightness. Tuner: - UI Overhall - NightModeController will set the values of the custom color matrix taking into account the current twilight service state and any custom calibration set by the user. - Probably other stuff. Change-Id: I213f1f76a143e711c507b2ba7d784f581bfc32b4
/frameworks/base/core/res/AndroidManifest.xml
|
087fd6829da7f8ce29db207d134d3b40771af257 |
|
18-Feb-2016 |
Martijn Coenen <maco@google.com> |
Merge "Update protected broadcasts used by NFC." into nyc-dev
|
5e906f8829ce2e036361917dafa0ae674a88ec8f |
|
18-Feb-2016 |
Martijn Coenen <maco@google.com> |
Update protected broadcasts used by NFC. Change-Id: Ie7d062e83929e1058e19427f6ca624ab3f8ee472
/frameworks/base/core/res/AndroidManifest.xml
|
37fc7a7fc0aefc44162fa38d49d3079ced899f26 |
|
16-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
More protected broadcasts. These actions are owned by the system and should not be sent by third-party apps for security reasons. Bug: 27171917, 27169730, 27172357, 27163393 Change-Id: I3161cd3c1c37d26a92723b22878dc5aef6f30c47
/frameworks/base/core/res/AndroidManifest.xml
|
b5f0049f9841dfe877c070e4aba41516ed7df710 |
|
15-Feb-2016 |
Rubin Xu <rubinxu@google.com> |
Fix typo in filling ACTION_MANAGED_PROFILE_UNLOCKED extras. Change-Id: Ic949a0d7f72d46d7cc36018b4b0fc54024c3b180
/frameworks/base/core/res/AndroidManifest.xml
|
d820abddd255618e828f53040dc0bfcabe249412 |
|
01-Feb-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Make ACTION_RADIO_OFF protected Bug: 25113145 Change-Id: Idcb88cb1fd06d4761ef1f634136f8ec697bf0851 (cherry picked from commit ae6688ca5d2b506eff29ba27c7532513f2da7da8)
/frameworks/base/core/res/AndroidManifest.xml
|
901bbe066762a644ec0790de8b07199f4464bb4f |
|
08-Feb-2016 |
Abhijith Shastry <ashastry@google.com> |
Merge "Hidden permissions to access blocked numbers." into nyc-dev
|
c08268e647f89f8ddfd9c6fb1f6ac4f99b13b9cf |
|
05-Feb-2016 |
Amit Mahajan <amitmahajan@google.com> |
Make permission RECEIVE_EMERGENCY_BROADCAST public. It is required to receive intent SMS_EMERGENCY_CB_RECEIVED_ACTION which is already public. Bug: 24914029 Change-Id: I2d5461fcedb2cb347c818ab6f94577008f6af242 (cherry picked from commit 45d9b36fc6a609893022b812084987cda3e3717d)
/frameworks/base/core/res/AndroidManifest.xml
|
d6e1ed59067acdb1683c8916e798729065a546bb |
|
06-Feb-2016 |
Abhijith Shastry <ashastry@google.com> |
Hidden permissions to access blocked numbers. BUG: 26232372 Change-Id: I213622ef4623dadcf56745798fb3452c57fa4bd5
/frameworks/base/core/res/AndroidManifest.xml
|
10c63d8a12caf5117524799efea95120f8b0845b |
|
05-Feb-2016 |
Chris Wren <cwren@android.com> |
move assistant to system API Bug: 26693581 Change-Id: I7e29b8521e2c33683b8032e63da734cfde1dfcc9
/frameworks/base/core/res/AndroidManifest.xml
|
ee081d5bd0fdbe7224382da7ce388b9d21f21c78 |
|
04-Feb-2016 |
Steven Ng <stevenckng@google.com> |
Merge "Add new permission and action for managed provisioning (QR flow)"
|
4cf5a49e545ec67271452ce1215de86d28fc2087 |
|
04-Feb-2016 |
Christopher Tate <ctate@google.com> |
Mark the idle-maint trigger broadcast 'protected' Bug: 26942536 Change-Id: I52d6b304fc894cad7957f84946178378c309f621
/frameworks/base/core/res/AndroidManifest.xml
|
f933871976b4dc4c8e71a364b66f5208cefad3d3 |
|
03-Feb-2016 |
Felipe Leme <felipeal@google.com> |
Merge "Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent."
|
bf33bd4d31cfec895c96990525b0cb856407c8d6 |
|
02-Feb-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Permissions: Get rid of GET_ACCOUNTS" This reverts commit 918c55a67c2bf0cec79f75dec6ca468e914a5fd1. Change-Id: I995f134336bf61ac1f21052355900ae89d0d6694
/frameworks/base/core/res/AndroidManifest.xml
|
980a1b6fa872f82133a7421bcfe14e2b03a0745e |
|
02-Feb-2016 |
Steven Ng <stevenckng@google.com> |
Add new permission and action for managed provisioning (QR flow) + Instead of reusing NFC provisioning action, new action and permission are introduced for QR code provisioning Bug: 26240297 Change-Id: Id2632d6c6b9e62bf3cad5bc141430d49df4a2c5d
/frameworks/base/core/res/AndroidManifest.xml
|
a491c07f36350cbb13b0a3070508553ba6c96608 |
|
01-Feb-2016 |
Shreyas Basarge <snb@google.com> |
Merge "SyncManager on JobScheduler"
|
c3cd05f8a45ab789aae1cb553df86f94667d595a |
|
11-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Add DevicePolicyManager APIs for process logging. Add Device Owner APIs for controlling and retrieving the logs. Retrieving the logs should be rate limited unless we are at the risk of losing logs due to constrained buffer space. Bug: 22860162 Change-Id: I80658f5a14e86d7cfd42402fbc5e98dc11698c0e
/frameworks/base/core/res/AndroidManifest.xml
|
54fa566ab74368bd0f0a8e9da7c695b2d33d6124 |
|
30-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
Merge "PIP: Use StatusBarService to handle PIP key"
|
6c7185cd2086de86e51c47f99877a8159c1bab99 |
|
30-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Fix permission doc Bug 26406584 Change-Id: I2c443cc52c600edb1ad904e0eb013829caee9897
/frameworks/base/core/res/AndroidManifest.xml
|
8c834c07675052c984728cbf79f7c2e0d8246e43 |
|
07-Jan-2016 |
Shreyas Basarge <snb@google.com> |
SyncManager on JobScheduler SyncManager now uses JobScheduler for scheduling and persistence purposes. Change-Id: I38c92aedbf4d891ca297644d0b706835aaedfcd6
/frameworks/base/core/res/AndroidManifest.xml
|
c552b04cb4aac9d31dbaf9744f32ddc14886e222 |
|
18-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
PIP: Use StatusBarService to handle PIP key Bug: 26591829 Change-Id: I7051fab966e2fc0887b2a21ddbf11aff7e16804b
/frameworks/base/core/res/AndroidManifest.xml
|
9778f761237b2533903bacc091b1597990110a7e |
|
27-Jan-2016 |
Felipe Leme <felipeal@google.com> |
Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent. This intent will be broadcasted when: - Global restrict background setting is changed (sent to all packages) - An individual uid is added to or removed from the whitelist (sent just to the packages belonging to that uid). This intent is only sent to registered receivers. BUG: 26451391 Change-Id: Ic0a5771f88baa52076ad04764f29098a386463cc
/frameworks/base/core/res/AndroidManifest.xml
|
e7c74cc96eeecec52401d9bf720234d1421cfebc |
|
28-Jan-2016 |
Adam Powell <adamp@google.com> |
Revert "Pinning components in ChooserActivity" This reverts commit ec6bc41e1835804533fd21b3ef8047ecd893bcfd. Bug 26842512 Change-Id: I9fc775d21081885d0e26fca4ade412a18da45b7c
/frameworks/base/core/res/AndroidManifest.xml
|
ec6bc41e1835804533fd21b3ef8047ecd893bcfd |
|
27-Jan-2016 |
Adam Powell <adamp@google.com> |
Pinning components in ChooserActivity Move ChooserActivity to SystemUI. This is a safer place for it to live and still be able to persist data to storage. Add a context menu to long press for chooser targets allowing users to 'pin' a target component from an app. This causes it to sort to the front of the list so that a user's favorite apps are always available from share UIs, etc. Similarly, all ChooserTargets from a pinned component receive an impossibly large boost for sorting so that they will always appear first. Bug 26791843 Change-Id: Ib4e603d9d4263403e98ce619287452ddab593044
/frameworks/base/core/res/AndroidManifest.xml
|
a35b5539a95342799a18e95616c5e5751a198e4c |
|
20-Jan-2016 |
Peng Xu <pengxu@google.com> |
Dynamic Sensor Discovery Implementation Defined the dynamic sensor meta data type and UUID of sensor, as well as the broadcast intent that is related to dynamic sensor status change. Modify SensorManager, SystemSensorManager and the JNI layer to support dynamic sensor discovery. Added SensorNotificationService to notify apps that sensor connected or disconnected via broadcast. Change-Id: I28adfb005357d7e3983d65117d6865830c75027d
/frameworks/base/core/res/AndroidManifest.xml
|
4665f49b9ca404adbb9e1bb3053b5f75ed23f846 |
|
27-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Merge "Add new public API to allow call screening"
|
1bef339b88b3f760603dcc08d79a62647fc18296 |
|
25-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Add new public API to allow call screening This CL adds a new service that the default dialer can implement to screen incoming calls. If the service is implemented then Telecom uses it to decide if a call should be shown to the user or rejected. Note, I initially tried to simply extend InCallService instead of creating a whole new service. The problem with this approach is that: - this breaks some in call services which show UI as soon as they are bound to - the in call service lifecycle is tightly coupled to adding and removing calls. Call screening happens before a call is added which makes it a bad fit to in call service - call screening is a function of only the default dialer's in call service but the existing code also binds to "controller" call services For these reasons it seemed simpler to just create a new optional service. BUG: 22857261 Change-Id: I53f2ef93360e0af19b6ce45af21026be6cf3a7f3
/frameworks/base/core/res/AndroidManifest.xml
|
a772e5fc062c8de48cb9c1d61755110f6b2e189b |
|
25-Jan-2016 |
Arunesh Mishra <arunesh@google.com> |
SoundTrigger API improvements. This CL implements the SoundTrigger API improvements as given in b/22860713. Only the java-level parts are implemented in this CL. Key changes include: * Addition of a SoundTriggerManager/SoundTriggerDetector system API to manage the sound-trigger based sound models. * Addition of a SoundTriggerService service that manages all sound models including voice (keyphrase) and sound-trigger based models. * Includes logic to write sound-trigger based models to the database. * VoiceInteractionManager service now uses SoundTriggerService instead of SoundTriggerHelper. Bug: 22860713 Change-Id: I7b5c0ed80702527c4460372efeb5e542d3693a69
/frameworks/base/core/res/AndroidManifest.xml
|
3cdbc806ff52d02bf215a5aa696b670434d9f401 |
|
27-Jan-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Permissions: Get rid of GET_ACCOUNTS"
|
58941094d47deefffabc0222f96ca6e40148d83b |
|
26-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Merge "Mark mised call notification as protected"
|
e6e907ea090b3c6b7cd9b793ac5f4acbe326b003 |
|
25-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Show dialog when launching work apps is not possible."
|
f13c9801697ccac3171137df10dd15f491dd15bd |
|
21-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Turn off profile by stopping the user. Bug: 22541941 Change-Id: I713ab9b87f3dd1b7bd6206af137562d20a44d76d
/frameworks/base/core/res/AndroidManifest.xml
|
918c55a67c2bf0cec79f75dec6ca468e914a5fd1 |
|
14-Jan-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Get rid of GET_ACCOUNTS Bug: 21901286 Change-Id: Id2c42f4d449a32c88078d80dcf952d15e67d536c
/frameworks/base/core/res/AndroidManifest.xml
|
d1a28aa17bac68cb81336a847a62ac10e5295036 |
|
23-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Mark mised call notification as protected This CL marks the missed call notification as protected. This prevents other apps from being able to broadcast it. BUG: 22857261 Change-Id: I01ae992f2a5fe255f057c5aa28c5c47d34a0a093
/frameworks/base/core/res/AndroidManifest.xml
|
58d25998321d9f4b1b76d18a5af9d42cdbaad30d |
|
21-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Show dialog when launching work apps is not possible. There are two cases when this could happen. First is when the work profile is turned off by the user, and the second is when the profile owner has suspened the package. Bug: 22776761 Bug: 22541941 Change-Id: Ibc671e93f87dff0168bb7643494b9d6b45a1a7f9
/frameworks/base/core/res/AndroidManifest.xml
|
efd88c3bebca9ca24c8f56a77ac0975ad906632f |
|
21-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Merge "Add missing system broadcast actions to the protected list."
|
730a759254f7a24e77a063eccd1b32ff1bf839ac |
|
21-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Add missing system broadcast actions to the protected list. Bug 26697573 Change-Id: I39e6b90b38c6e1dbe4978be1cb2a10d72b015cba
/frameworks/base/core/res/AndroidManifest.xml
|
69d5ebc59e3cbc9c394906a95dc4b9bdc3355c08 |
|
14-Jan-2016 |
Andrei Stingaceanu <stg@google.com> |
Suspend apps - broadcast intent and API Send a protected broadcast to registered receivers only when packages get suspended. Bug: 22776761 Change-Id: I043053ed45bdc202ead18518a0c1e39cce47947c
/frameworks/base/core/res/AndroidManifest.xml
|
a8c8851caa0d1d44eccfcae2e01a2b6e7235d290 |
|
18-Jan-2016 |
Michal Karpinski <mkarpinski@google.com> |
Merge "DPM changes to support remote bugreports"
|
12747879b0204b9dfee997eddc981d09289e8b77 |
|
07-Dec-2015 |
Amith Yamasani <yamasani@google.com> |
User creation with an intent New API for an app to request creating a new user with a given user name and seed account information for the SetupWizard to use when that user is switched into. Also adds system APIs to read the seed account data from UserManager. Bug: 22776757 Change-Id: I0bc3f11ee19c15e0ee2a908c88d98b13296cc30d
/frameworks/base/core/res/AndroidManifest.xml
|
52632e21faf5aa63e53e5626046bc1742cba100c |
|
14-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
PIP: Use long press HOME for PIP on Android TV (2/2) Bug: 25580820 Change-Id: Ic269132ec7de1e725989ad57a1ee205b3334e3bb
/frameworks/base/core/res/AndroidManifest.xml
|
3fc437e89b018f258a3dee1a83014555aa156dc4 |
|
15-Dec-2015 |
Michal Karpinski <mkarpinski@google.com> |
DPM changes to support remote bugreports Bug: 22860136 Change-Id: If984318e421f511d9b0fc7138aacd36d5334698f
/frameworks/base/core/res/AndroidManifest.xml
|
ab064b3b3687424e14dccfd60ff9a8f93ec22c23 |
|
13-Jan-2016 |
Dongwon Kang <dwkang@google.com> |
Merge "Add a way for SystemUI to receive media resource (e.g. A/V codec) usage"
|
2034a4c4c5edd1516d03b73a8c8d8600eb3d4cbc |
|
14-Dec-2015 |
Dongwon Kang <dwkang@google.com> |
Add a way for SystemUI to receive media resource (e.g. A/V codec) usage Bug: 26175834 Change-Id: If506a533c5c7b567e770217a9430bf68b539677a
/frameworks/base/core/res/AndroidManifest.xml
|
502658dd9037be08b30ce45f4d201da02ba01d8a |
|
11-Jan-2016 |
Jeremy Klein <jlklein@google.com> |
Merge "Add a TETHER_PRIVILEGED permission and use it where needed."
|
ca8bce51f9f0e3ad0614d0d1e83da0ea6a7fd639 |
|
09-Jan-2016 |
Christopher Tate <ctate@google.com> |
Fix typo in protected broadcast decls Bug 26471149 Change-Id: I4332fd9adc52d3bd2f6ee0ce3718bf844f1f9843
/frameworks/base/core/res/AndroidManifest.xml
|
867b3396605421708dbcb0595b8954a3f96858ed |
|
09-Jan-2016 |
Andy Hung <hunga@google.com> |
Merge "Add setMasterMono and getMasterMono"
|
f04b84d4c66ea377ec6fe2b36f3a0994f3e94eba |
|
19-Dec-2015 |
Andy Hung <hunga@google.com> |
Add setMasterMono and getMasterMono Bug: 15283594 Bug: 22700363 Change-Id: I5d0552938ec2a54be4450512974d92ff8c77b1e9
/frameworks/base/core/res/AndroidManifest.xml
|
f3fa0f8fc689d644adc77e91c85e9311bc2f9c74 |
|
07-Jan-2016 |
Felipe Leme <felipeal@google.com> |
Added new API for URI permissions management. The new methods are: - getGrantedUriPermissions(String packageName) - clearGrantedUriPermissions(String packageName) These methods will be used by the Settings app to allow users to clear the URI permissions granted to an application. BUG: 26447975 Change-Id: I6867402e42b3d6fd03050ec57b73973ccd8a17af
/frameworks/base/core/res/AndroidManifest.xml
|
226940ed8550c02875a987f7e46699e6003ec1c0 |
|
15-Dec-2015 |
Michal Karpinski <mkarpinski@google.com> |
Modifying Shell to accomodate remote bugreports After receiving android.intent.action.REMOTE_BUGREPORT_FINISHED in newly created RemoteBugreportReceiver, Shell will generate URI to the bugreport zip file and send the broadcast android.intent.action.REMOTE_BUGREPORT_DISPATCH. Bug: 26152603 Change-Id: I058d626e021b488c9347b45467a4e3505134e79c
/frameworks/base/core/res/AndroidManifest.xml
|
d42209db964de5597b0846cf8175cee6001ec8d7 |
|
29-Dec-2015 |
Jeremy Klein <jlklein@google.com> |
Add a TETHER_PRIVILEGED permission and use it where needed. BUG: 26247383 Change-Id: I73f7227d77926faa9081e83eccb83c8ddee33e08
/frameworks/base/core/res/AndroidManifest.xml
|
9a25da192e12e3226e0b52dfc44bcac9a0283f73 |
|
06-Jan-2016 |
Julia Reynolds <juliacr@google.com> |
Send less unnecessary broadcasts. Protect the broadcasts we do send. Change-Id: I440a7accfc4509512063b663c0418a29f06ef09e
/frameworks/base/core/res/AndroidManifest.xml
|
a7ca3e73bfb9e95bd3e87c7d194f044bb16dd9e5 |
|
05-Jan-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Remove FLASHLIGHT permission"
|
09bc4e0b7eb9142663703212dc500ab5eb05ed14 |
|
29-Dec-2015 |
Andre Eisenbach <eisenbach@google.com> |
Protect android.bluetooth.intent.DISCOVERABLE_TIMEOUT Bug: 26347910 Change-Id: I61b211c3f32c9e79c40c2b07798dd9cb6d82df22
/frameworks/base/core/res/AndroidManifest.xml
|
1463cebd77f5ef7d165c5ca37b313b1ea2253847 |
|
04-Jan-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Remove FLASHLIGHT permission This permissions is not protecting access to the flashlight. Anyone can use the latter via CameraManager.setTorchMode(). bug:26383626 Change-Id: I44c6395b5a0f80c1c539cffe61715b29b401a775
/frameworks/base/core/res/AndroidManifest.xml
|
d5a204f16e7c71ffdbc6c8307a4134dcc1efd60d |
|
21-Dec-2015 |
Jason Monk <jmonk@google.com> |
Better service management for QS 3rd party tiles Better wrapper around the service that will handle rebinding when it dies, binding when it becomes available, and forwarding along all messages to the service once it binds. Also better handling of too many services at a time. Will only ever bind to at most 3 tiles and will manage which ones are most important to show based on pending clicks, last update, etc. Change-Id: I5f4da0bc751f7eb25baa32e5c0bb9f1bc418f5bb
/frameworks/base/core/res/AndroidManifest.xml
|
96e2035223638b6e161cdedb795681eee62fae6e |
|
16-Dec-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Roll back some broadcasts."
|
a050e127bbf4891d1e3c7199f56a4723af5fb90a |
|
16-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Roll back some broadcasts. Bug: 26219971, 26219772 Change-Id: Ic45691419f8fcd1b472a380f09408caf29d3c13d
/frameworks/base/core/res/AndroidManifest.xml
|
63b0318e4bd1fff25e6d434513488bb3bdca3097 |
|
15-Dec-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Protect some more broadcasts."
|
4267eacc3bd6c781423a871e135bac03cd93718a |
|
15-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Protect some more broadcasts. Bug: 26144973 Change-Id: Ic05bca52913ee5545719f0f24bed5b359f31259f
/frameworks/base/core/res/AndroidManifest.xml
|
edd137b9b98d6ed8fd3337ce91f529efe9d0aef5 |
|
14-Dec-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Change signature|system permissions to signature|privileged" am: cfed01af4b am: 3dee9db651 * commit '3dee9db6516fd97d7db3641fc81533cc3553fde8': Change signature|system permissions to signature|privileged
|
3dee9db6516fd97d7db3641fc81533cc3553fde8 |
|
14-Dec-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Change signature|system permissions to signature|privileged" am: cfed01af4b * commit 'cfed01af4bea6ff9025c31fbe3ed973f47529484': Change signature|system permissions to signature|privileged
|
381e0a4177c26c2e454a7eef2262d34104e1ea58 |
|
13-Dec-2015 |
Yury Zhauniarovich <y.zhalnerovich@gmail.com> |
Change signature|system permissions to signature|privileged Permission protection level changed from signature|system, which is deprecated to signature|privileged. Change-Id: I697723221617f8c12255d6911d34cd1bf96eff8b Signed-off-by: Yury Zhauniarovich <y.zhalnerovich@gmail.com>
/frameworks/base/core/res/AndroidManifest.xml
|
7fff4a1794a842e83e19371bbf7054aa1e02d666 |
|
09-Dec-2015 |
Felipe Leme <felipeal@google.com> |
Protect android.intent.action.BUGREPORT_STARTED. This intent is sent by dumpstate when launched with the -P (progress) option. BUG: 25794470 Change-Id: I6b6265f85f366db3dfca758d90be83c9e3736d7c
/frameworks/base/core/res/AndroidManifest.xml
|
2acf063da08dfff69f184c9a6a90a7a5fe60d818 |
|
25-Nov-2015 |
Svet Ganov <svetoslavganov@google.com> |
Ephemeral cookie API Add APIs for an ephemeral app to set a cookie which is a small peice of data cached longer than the app itself. This is useful for avoiding the user to login every time they use the ephemeral app. The cookie is stored after an ephemeral app is uninstalled. Normal apps or ephemeral apps upgraded to full apps can also use these APIs with the difference that once they are uninstalled the cookie is deleted. The cookie size defaults to 16KB and is configurable by a global settings which can be adjusted via gservices. Also eviction policy is time based with a default of one month and is configurable by a global setting which can be adjusted via gservices. If the cert of the app cahnges (when ephemeral is installed, uninstalled and installed again) the cooke is wiped to prevent data leaks. This cahange also adds an API for apps to know whether they run in an ephemeral mode since it this mode some APIs will not be available. Another API exposed by this change is private for the system and exposes all ephemeral apps - installed and uninstalled. Only the system can call this API. When an ephemeral app is uninstalled the system stores its name, icon, and permissions. When the app is reinstalled or a full version is installed the permissions are propagated. Change-Id: Id4a73a7750bfbabda0bfcb9bf9018d2062e94367
/frameworks/base/core/res/AndroidManifest.xml
|
39a275b3980b5ea75e060da540229b95a47333f7 |
|
04-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Better protection for system broadcast intents. When the system sends broadcast intents, it's in a very authoritative position, and many apps blindly trust the sender. This is why we've historically had the concept of "protected broadcasts" which can only be sent by the system. However, it's far too easy to send new broadcasts from the system without adding them to the protected list. This CL adds logic to help catch those cases. Currently it just logs the error and continues sending the broadcast. Based on boot analysis of a typical device, add 36 new protected broadcasts. Bug: 24571095 Change-Id: Ie2cc6b0b2026e67c64730af897e4eb3e0e8404f1
/frameworks/base/core/res/AndroidManifest.xml
|
0a29ecd8a53b5ac63b628e870a344650ff34c4b0 |
|
04-Nov-2015 |
Rubin Xu <rubinxu@google.com> |
Introduce quiet mode state to managed profile users Quiet mode means the user will be free from visual and audio interruptions from apps inside the managed profile, including notifications, widgets and others. This CL adds the underlying state bit to users and exposes various APIs to control and query the quiet mode state. Bug: 22541941 Change-Id: If5f8e5a897843050e83b6ec26cb39561098f12b9
/frameworks/base/core/res/AndroidManifest.xml
|
b88dd9412e5348f9fa7aca1cff9c1610e0c6668c |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "allow locking UI mode and block launching car dock for automotive"
|
a771049b2ef401ab911a9e0a277dbf9b475388a1 |
|
23-Sep-2015 |
keunyoung <keunyoung@google.com> |
allow locking UI mode and block launching car dock for automotive - add config to lock UI mode change: When this is enabled, request to change car mode will be ignored. Apps can check the config using UiModeManager.isUiModeLocked() - add config to lock day / night mode: When this is enabled, apps cannot change day / night mode without having MODIFY_DAY_NIGHT_MODE permission. Apps can check the config using UiModeManager.isNightModeLocked() - add config to disable car dock intent launch for home key and mode change - All new configs have default values which keeps the current behavior. Car products should override the configs to get desirable behavior. bug: 22700993 Change-Id: Ic0e58f3428151e0b1c19a2e9a7d6ded32ff962a6
/frameworks/base/core/res/AndroidManifest.xml
|
cf7021e827dde0047bd36d32b734893e98d988fe |
|
03-Dec-2015 |
Chris Wren <cwren@android.com> |
Merge "Notification Assistant API"
|
9fa689f8b614d32f36b5f2de2e3065f4ad6b2358 |
|
20-Nov-2015 |
Chris Wren <cwren@android.com> |
Notification Assistant API This API allows a single assistant on the device to help the user manage their notification stream by taking actions on individual notifications: - modifying their priority up or down when they are posted - possibly changing if and how the notification interrupts the user - adding annotations under notifications Bug: 22455414 Change-Id: Idf47972bb71c83f1dc1c9ec68a6fa92ac4fc522f
/frameworks/base/core/res/AndroidManifest.xml
|
568f4de11a87308cbcb888083f02818a8290a7d7 |
|
03-Dec-2015 |
Neil Fuller <nfuller@google.com> |
Merge "Fix @code escapes"
|
aa8b1c35add23922ff394e0193ba24cb15bd34f3 |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "Revert "allow locking UI mode and block launching car dock for automotive""
|
3b741e03b3eaa8a263f11cd1837091d3ac39483b |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Revert "allow locking UI mode and block launching car dock for automotive" This reverts commit 1746369a6bcd1a7219e94366b3774bfdfff08fc6. Change-Id: I4989e99b8f648145d0dbfe18e557102939e7d1e3
/frameworks/base/core/res/AndroidManifest.xml
|
ef3ca438c9b89949c020fecf13834851406f0482 |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "allow locking UI mode and block launching car dock for automotive"
|
8e4f4b3d9409c5a5329aaa4caf0102167d5e610d |
|
02-Dec-2015 |
Chong Zhang <chz@google.com> |
Add permission to prevent third-parth apps from querying OOM scores bug: 25853091 Change-Id: Ic1cdbf155e1e930405773fd078dfc57fda2d9afa
/frameworks/base/core/res/AndroidManifest.xml
|
71fbb81b14958b80fe55738607740c6630e4e9da |
|
30-Nov-2015 |
Neil Fuller <nfuller@google.com> |
Fix @code escapes The body of {@code} must not be HTML escaped. This is one of several changes that fix the source in conjunction with a doclava fix. Bug: 25757239 Change-Id: Ib38a0fa2dd2a3d68e467f78a812071e763d7e881
/frameworks/base/core/res/AndroidManifest.xml
|
64cdc1458bcf0d09781463a6e421b9b870b09687 |
|
30-Nov-2015 |
Filip Gruszczynski <gruszczy@google.com> |
Remove dock divider surface when it's not visible. We achieve the removal by notifying System UI about the visibility of the dock divider. This way System UI can change visibility of the root view, which in turn will cause the WMS to destroy or create the surface as necessary. Bug: 25844096 Bug: 25683717 Change-Id: Idbc33368db697a059af49106dfadb80c3d7d06c1
/frameworks/base/core/res/AndroidManifest.xml
|
a3ecf45fd93f3999e616a6b80d784144d5d6f44e |
|
25-Nov-2015 |
Nick Kralevich <nnk@google.com> |
AndroidManifest.xml: More protected broadcasts Make the following broadcasts protected: android.intent.action.PRE_BOOT_COMPLETED android.intent.action.USER_INITIALIZE Bug: 25022002 Change-Id: Ic36e29c51b930e4d7367688ab837c6a40d74ec23
/frameworks/base/core/res/AndroidManifest.xml
|
7f35036c95650ee5b66166ad4517f3cd352efdaa |
|
20-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Added a placeholder home activity for system user"
|
c40e244b4a5f224d749be62e8fd512fadb568a85 |
|
18-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Added a placeholder home activity for system user Standard launcher can be uninstalled for system user. A low priority placeholder home activity is used to make sure the system can always boot. By default the component is disabled for all users, and is only enabled for the system user at boot time. Bug: 25726710 Change-Id: I97eed02c9e2bbd69a737cc1d203110bed837b803
/frameworks/base/core/res/AndroidManifest.xml
|
bbadff8603ca6922a0ef89338bee5b59d6dcf641 |
|
06-Nov-2015 |
Jason Monk <jmonk@google.com> |
Add Quick Settings API It is a little bit limited right now, but it contains the lifecycle of a tile getting added/removed, and listening/not listening and clicks. SysUI side will need some cleanup later on. Change-Id: I4db803c8a271f8bf44f2ef710517969a84a95cf0
/frameworks/base/core/res/AndroidManifest.xml
|
1746369a6bcd1a7219e94366b3774bfdfff08fc6 |
|
23-Sep-2015 |
keunyoung <keunyoung@google.com> |
allow locking UI mode and block launching car dock for automotive - add config to lock UI mode change: When this is enabled, request to change car mode will be ignored. Apps can check the config using UiModeManager.isUiModeLocked() - add config to lock day / night mode: When this is enabled, apps cannot change day / night mode without having MODIFY_DAY_NIGHT_MODE permission. Apps can check the config using UiModeManager.isNightModeLocked() - add config to disable car dock intent launch for home key and mode change - All new configs have default values which keeps the current behavior. Car products should override the configs to get desirable behavior. bug: 22700993 Change-Id: I351fc53163575d2f523c2d6e886befdb69a5a0c6
/frameworks/base/core/res/AndroidManifest.xml
|
f9fc6d6cc05595241bc7ced6d4cab97b45f9b901 |
|
09-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
More file-based encryption work. Add granular StorageManager APIs for key creation/destruction and unlocking/locking. Start passing through an opaque token as part of the unlock command, but leave it empty for now. We now have a separate "prepare" method that sanity checks that user directories are correctly setup. Define a handful of system properties used for marking devices that should be operating in FBE mode, and if they're emulating FBE. Wire a command to "sm", but persisting will come later. Start using new "encryptionAware" flag on apps previously marked with coreApp flag, which were apps running in the legacy CryptKeeper model. Small tweaks to handle non-encryptionAware voice interaction services. Switch PackageManager to consult StorageManager about the unlocked state of a user. Bug: 22358539 Change-Id: Ic2865f9b81c10ea39369c441422f7427a3c3c3d6
/frameworks/base/core/res/AndroidManifest.xml
|
aad093b67574a6d28963d07befd67a2a45784074 |
|
02-Nov-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow verifier to grant permissions" into mnc-dr-dev am: cfa233eefb am: 22d7f4c2ed am: 6423c0a29b am: bd4168540f * commit 'bd4168540f009c71af1242e5b7866146c8724d6f': Allow verifier to grant permissions
|
22d7f4c2eddef09e0ceb16aadff2860a184a68d8 |
|
02-Nov-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow verifier to grant permissions" into mnc-dr-dev am: cfa233eefb * commit 'cfa233eefb5b77c96a3239a5a51f381a7f0722c9': Allow verifier to grant permissions
|
7bddf5aa06e11117c623a4a44eab88df80084607 |
|
30-Oct-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow verifier to grant permissions bug:25329324 Change-Id: I2ac01a983ad812df7725a0499a8d9b470a7ea481
/frameworks/base/core/res/AndroidManifest.xml
|
0529672a8cffd2abb749265ddeb703a179c34662 |
|
29-Oct-2015 |
John Reck <jreck@google.com> |
resolve merge conflicts of a1b8d77ca3 to master. Change-Id: Ia78c6d31687542dfaba20b177e774333cfb1edb5
|
35151fbc8b028f6633f477fd36044032a03b2bff |
|
29-Oct-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev am: 2658cb002a * commit '2658cb002abae9341c9a82bfeaed764ba5bf97c8': Make SYSTEM_ALERT_WINDOW development permission
|
2658cb002abae9341c9a82bfeaed764ba5bf97c8 |
|
29-Oct-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev
|
01af6a42a6a008d4b208a92510537791b261168c |
|
27-Oct-2015 |
Svetoslav <svetoslavganov@google.com> |
Make SYSTEM_ALERT_WINDOW development permission bug:25329324 Change-Id: I0086464846bab9424764dd0d726692d96a0f1207
/frameworks/base/core/res/AndroidManifest.xml
|
b6d8f81b10ba85651d2309afc665b9e9fc1ab955 |
|
26-Oct-2015 |
Paul Jensen <pauljensen@google.com> |
Merge "Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN"
|
67fb3d7358f01c1bea429b680db54629d6ff4a19 |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev am: 809dcade99 am: bdc458048a am: bb8f652372 am: 8ecad265b6 * commit '8ecad265b6db57f78dd142e974057c91f69489ed': Reinstate CHANGE_NETWORK_STATE as a normal permission.
|
bdc458048abee78a945a26cd13a71245e7d4a2e5 |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev am: 809dcade99 * commit '809dcade9906001f6aa51a68aa783e20bb1d7c0d': Reinstate CHANGE_NETWORK_STATE as a normal permission.
|
809dcade9906001f6aa51a68aa783e20bb1d7c0d |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev
|
d54270506669e474b5b8d1703212c77780a04ae9 |
|
15-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Reinstate CHANGE_NETWORK_STATE as a normal permission. This is a partial revert of http://ag/738523 , but not a full revert because M apps that have gone through the WRITE_SETTINGS route to obtain permission to change network state should continue to have permission to do so. Specifically: 1. Change the protection level of CHANGE_NETWORK_STATE back from "signature|preinstalled|appop|pre23" to "normal". This allows apps that declare CHANGE_NETWORK_STATE in their manifest to acquire it, even if they target the M SDK or above. 2. Change the ConnectivityManager permission checks so that they first check CHANGE_NETWORK_STATE, and then ask Settings if the app has the WRITE_SETTINGS runtime permission. 3. Slightly simplify the code in the Settings provider code that deals specifically with the ability to change network state. 4. Make the ConnectivityService permissions checks use the ConnectivityManager code to avoid code duplication. 5. Update the ConnectivityManager public Javadoc to list both CHANGE_NETWORK_STATE and WRITE_SETTINGS. Bug: 21588539 Bug: 23597341 Change-Id: Ic06a26517c95f9ad94183f6d126fd0de45de346e
/frameworks/base/core/res/AndroidManifest.xml
|
244f776855b2144a7fe16be09c67e5b189e8dcfd |
|
21-Oct-2015 |
Michael Wright <michaelwr@google.com> |
resolve merge conflicts of f013c3f111 to master. Change-Id: I2045187f8fa948a1733cb9a2cdc0a69ae97b5907
|
bab2b424453e556a2e7bb9470d70673793dd82df |
|
20-Oct-2015 |
Michael Wright <michaelwr@google.com> |
resolve merge conflicts of 57a5cba606 to cw-e-dev. Change-Id: Ib43f0cf0b285c9799239658859af735279f87fff
|
627bc36eb7827c5a72f5a8ecb085028fb485f72f |
|
15-Oct-2015 |
Paul Jensen <pauljensen@google.com> |
Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN I centralized all the provisioning APN logic in Telephony back in 89e0f09 so this intent is now unused. Bug:24451710 Change-Id: I401ac3e46442c8921545c88fee228873261ebd2b
/frameworks/base/core/res/AndroidManifest.xml
|
9209c9cd9a6f779d0d9d86f9b2e368df564fa6bb |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Add SystemUI component to watch for keyboard attachment. Add a new SystemUI component to watch for keyboard attachment / detachment. If the config specifies the name of a keyboard that is packaged with the device, then SystemUI will ask the user if they would like to enable BT (if disabled) and then attempt to pair to the device. Bug: 22876536 Change-Id: I786db35524d49706d5e61d8b8bc71194d50113f3
/frameworks/base/core/res/AndroidManifest.xml
|
41da2f777f3195a857d25834274a9e4850102b6c |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow signature apps to modify notification policies."
|
6ee2617832548bdbff7cc27a6b8b852516625eb1 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Allow signature apps to modify notification policies. Bug: 22977552 Change-Id: Ib2bc3a55a904011218bb3adb19998cc4a0b7e709
/frameworks/base/core/res/AndroidManifest.xml
|
7581121ba5736b1626109445c90cc1b65bf90da9 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Revert "Allow signature apps to modify notification policies.""
|
3a0ee8f9639bd3995bc50e7ecc666f3ca0350985 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Revert "Allow signature apps to modify notification policies." This reverts commit 39a8c353a8f723e5e67bc846f8fa96d580c4abbb. Change-Id: I9a9a5fcc76202f5d2b3b175e5d5b9361604285d8
/frameworks/base/core/res/AndroidManifest.xml
|
b487ffeef7e9e6cc2fae08c2ef7ac078cf626bd3 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow signature apps to modify notification policies."
|
39a8c353a8f723e5e67bc846f8fa96d580c4abbb |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Allow signature apps to modify notification policies. Bug: 22977552 Change-Id: I7bfd2fe7bcb2e14b9eb7281acbb8a35dbc2ec93e
/frameworks/base/core/res/AndroidManifest.xml
|
b4a6d9847b7677611efa6fc64c9d78d92b8229d7 |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am 337c069a: am 81451c1c: am cb4bafb4: am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit '337c069ac897db69f239c1927ddaf9225a7a6fef': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
cb4bafb4c97dc5e73b055ae1c0e4a548068062cd |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit '86e153d5f0614c9f3da137fd0b815a398598928b': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
86e153d5f0614c9f3da137fd0b815a398598928b |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit 'f360bbca969f60ee968240d22bc0b1f1e5e17218': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
535570a7ce8fac764a45a603856d664227dba8c1 |
|
27-Sep-2015 |
Bryce Lee <brycelee@google.com> |
am 979a22ea: am 6ad696c3: am f0740e0a: Merge "Add ThermalObserver system service to capture thermal state uevents." into cw-e-dev * commit '979a22eaf9c62637c02ebd6f92ef6ea2888aa5be': Add ThermalObserver system service to capture thermal state uevents.
|
bc58f59da6226c6f1d240c95d566186f679fc310 |
|
26-Sep-2015 |
Bryce Lee <brycelee@google.com> |
Add ThermalObserver system service to capture thermal state uevents. Bug: 21445745 Change-Id: I980d60b66ca51942a1fd62502d6cf1f09208fc3a
/frameworks/base/core/res/AndroidManifest.xml
|
a62e8a8d398f00332fa77bfe6be07cb6f5bf57ab |
|
21-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Make android.hardware.usb.action.USB_ACCESSORY_DETACHED... a protected broadcast. The broadcast "android.hardware.usb.action.USB_ACCESSORY_ATTACHED" was accidentally included twice, changed the extra copy to "android.hardware.usb.action.USB_ACCESSORY_DETACHED". Bug: 24188595 Change-Id: I8863c336f70796b2a15633595648b594864e84e2
/frameworks/base/core/res/AndroidManifest.xml
|
c0f2bc0f0e11da0fd59b146425764a162c932410 |
|
19-Sep-2015 |
Justin Harrison <astyrrian@google.com> |
am 46db0f22: am 08b00423: am 1f463957: am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev * commit '46db0f2215ad6e969418d1fedd1578445b46588f': Add support for setting color transforms
|
1f46395702f609d90909df39ab990844c0731952 |
|
19-Sep-2015 |
Justin Harrison <astyrrian@google.com> |
am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev * commit '91f2123b2a6d534372ab9b7c8e6ac0c62cf33ae6': Add support for setting color transforms
|
58e829f71d2c525309e5bb5a1c02dc64397df221 |
|
15-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Add support for setting color transforms Bug: 24038268 Change-Id: I05275c906e02eb9e67331f6f909166eb08ad5536
/frameworks/base/core/res/AndroidManifest.xml
|
369b7ca4fbe6a635344f43845a82da25ececa0e4 |
|
18-Sep-2015 |
Billy Lau <billylau@google.com> |
Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE Previously, when CHANGE_NETWORK_STATE's protection level was raised to signature from normal, the documentation was not changed. This CL addresses the documentation to reflect the correct protection level. Change-Id: I0a4d2fcef5f30c58b38250865543e72b5eb1ab06
/frameworks/base/core/res/AndroidManifest.xml
|
51c61ee23a55ccc75e0ddb3582720fc626607e42 |
|
09-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
am fd183706: am 22262f31: am 0bc35668: am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev * commit 'fd18370675f8794807747a18276dd7385e25f06e': Require the new PACKET_KEEPALIVE_OFFLOAD permission. Add an error code for generic hardware error. Fix bugs and crashes in PacketKeepalive API. Add tests for the PacketKeepalive API. Add a PACKET_KEEPALIVE_OFFLOAD permission. Use a CountDownLatch instead of sleep() in NetworkFactory tests. Get rid of shortSleep() in ConnectivityServiceTest. Make ConnectivityServiceTest a bit more readable.
|
0bc356687e022fa1ae611c4ebeb0e0622810d7e4 |
|
09-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev * commit '017223acda5bfe16cb87d0a33d72dd28d2fccd3b': Require the new PACKET_KEEPALIVE_OFFLOAD permission. Add an error code for generic hardware error. Fix bugs and crashes in PacketKeepalive API. Add tests for the PacketKeepalive API. Add a PACKET_KEEPALIVE_OFFLOAD permission. Use a CountDownLatch instead of sleep() in NetworkFactory tests. Get rid of shortSleep() in ConnectivityServiceTest. Make ConnectivityServiceTest a bit more readable.
|
7b70036abc4564b04251a979fe406f1d1d55d21b |
|
08-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Add a PACKET_KEEPALIVE_OFFLOAD permission. Bug: 23884210 Change-Id: I0f9207ac9b9c07c676f64f2748905e523e891501
/frameworks/base/core/res/AndroidManifest.xml
|
56dafdb5ae5f1618e3583c2835759108e8c0d99f |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
am 7f7ffa37: am 87e4c951: am 59c1a0e1: am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev * commit '7f7ffa3722ef90a7bf5611221c4a4c9d06823a38': Add TabletModeChangedListener for SystemUI.
|
59c1a0e1cb6cad46e30821e25f99c1ecce1227f0 |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev * commit '8ae90587a510f72a176119b1f23add8bc36285b9': Add TabletModeChangedListener for SystemUI.
|
8ae90587a510f72a176119b1f23add8bc36285b9 |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev
|
8ef94501f0adfdbcc18b6ed0e32673b3abf69a14 |
|
26-Aug-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow third party condition providers."
|
4f5de340c9c7b12d7d67ca53bac863976b36fd32 |
|
25-Aug-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Renamed primaryUserOnly to systemUserOnly In the split mode, broadcast receivers and activities marked as systemUserOnly will be running as system. This is a non-functional change for non-split system user mode. Bug: 22958572 Change-Id: I0f7d4f4a81275bc326bf630a776c695e8b5291a6
/frameworks/base/core/res/AndroidManifest.xml
|
b0a773f6b338f8ec35d9faaa3b566f482bdc2f92 |
|
25-Aug-2015 |
Julia Reynolds <juliacr@google.com> |
Allow third party condition providers. Bug: 22977552 Change-Id: I3d8689f52daa9376496e14997a6dd7862fb3ade6
/frameworks/base/core/res/AndroidManifest.xml
|
39e5e947447bc611205404ae6a4690656f1aa0f9 |
|
19-Aug-2015 |
Michael Wright <michaelwr@google.com> |
Add TabletModeChangedListener for SystemUI. Bug: 23256614 Change-Id: I6e5d636c24a84846cfad84da800911a469689dda
/frameworks/base/core/res/AndroidManifest.xml
|
dec9a216d24dabe168b60e460b6ab6a6026be0c0 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am f18cbd76: am c9dec164: am e96b80f3: am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit 'f18cbd760142e627ab6c9672e4aca3a29d05d9ee': Add missing removed permissions to the platform manifest
|
e96b80f3deb7a49225112d497dcf75cc4211b092 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit '446c00a2919da5b4ea0bdf08f72ac4f95125ea45': Add missing removed permissions to the platform manifest
|
446c00a2919da5b4ea0bdf08f72ac4f95125ea45 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit 'cb59747de7222bc7310162c4174f7b460c34adef': Add missing removed permissions to the platform manifest
|
f1418ae65be77a0d0fac1b616cc9901f9bceffc7 |
|
20-Aug-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add missing removed permissions to the platform manifest We need to keep in the manifest as normal hidden permissions all removed dangerous ones to ensure backwards compatibility as apps may be gating operations based on whether they have a removed permission. bug:23377184 Change-Id: I105bd646c4594d85c501f53a10ea393ee50046bc
/frameworks/base/core/res/AndroidManifest.xml
|
741abfc12074623d24297ebb67d98cb2d9126add |
|
11-Aug-2015 |
Nicolas Prevot <nprevot@google.com> |
Fix cross-profile intent filters with system-user split. Don't assume that the parent is always the user owner. BUG:23105562 Change-Id: Ia98ed608e2b6d1d82d95a73110134d85274c6abf
/frameworks/base/core/res/AndroidManifest.xml
|
4ea5152bd8b7f046562901b5dfc2ca917dbd987b |
|
19-Aug-2015 |
Jim Miller <jaggies@google.com> |
am 849b9e58: am ce6fb7bb: am 7ef77271: am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev * commit '849b9e58d6775a393f7d86a6305b658c6af9d16f': Reset fingerprint lockout timer when strong auth is used.
|
7ef772713fac5d7b69874f2b972cdec7a60f074b |
|
19-Aug-2015 |
Jim Miller <jaggies@google.com> |
am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev * commit 'bea9d7b94cfa16da8f257ed705e218b017d459a7': Reset fingerprint lockout timer when strong auth is used.
|
e0507bbbf95ae6d958c900f32122baf078d47d71 |
|
13-Aug-2015 |
Jim Miller <jaggies@google.com> |
Reset fingerprint lockout timer when strong auth is used. Fixes bug 22565462 Change-Id: I4842877839845e7fe103396d8ca8104928568c04
/frameworks/base/core/res/AndroidManifest.xml
|
9600b7fb406714ae26bce5e50e4ecd5e0c924f90 |
|
17-Aug-2015 |
Bryce Lee <brycelee@google.com> |
am de243eb2: am 55d39ecb: am d74a66bd: Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev * commit 'de243eb290c194b2204a27c0276bae5cd024797d': Introduce permission for updating the cell broadcast content provider.
|
d74a66bd97ed52fc985e9fa145072a9fc4e0a3e3 |
|
17-Aug-2015 |
Bryce Lee <brycelee@google.com> |
Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev
|
143ebdb94e13f7a9fee2c9f3801bda1df17844c1 |
|
11-Aug-2015 |
Zach Johnson <zachoverflow@google.com> |
DO NOT MERGE Allow a custom component to handle network policy notifications Broadcasts information about network policy notifications to a custom component, if specified, so it can handle them. Also exposes an API to snooze warning notifications. Change-Id: Ic89478fa437861e2d4b6a9443858bcaf12122fba
/frameworks/base/core/res/AndroidManifest.xml
|
60d18aba1d0ad32147367ab30313ca5b9f0645cb |
|
11-Aug-2015 |
Dianne Hackborn <hackbod@google.com> |
am b44cdfdd: am afacdbe1: am 09e77852: am 5cf89a01: am b2b02092: Merge "Fix issue #23037899: Support for Battery Optimization permission + Dialog" into mnc-dev * commit 'b44cdfdd10ffa861492d044a058cfbaa167d71db': Fix issue #23037899: Support for Battery Optimization permission + Dialog
|
c7b57b1e65b487defad4967cf42cf076b499cbee |
|
10-Aug-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #23037899: Support for Battery Optimization permission + Dialog New permission, new Intent action. Change-Id: I1d9ba55be8f72074e29d33ad7a0a12a820bbac39
/frameworks/base/core/res/AndroidManifest.xml
|
64b9b9ad9e5f10d7a4d31c5e393432b87afbd742 |
|
08-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 618e065c: am 546a3449: am e12a685c: am 02d6c013: am 90b030ba: Merge "Do not show removed permissions in the UI - framework" into mnc-dev * commit '618e065cc14b9069954e462fc25cdc934ee3300f': Do not show removed permissions in the UI - framework
|
3e0be7440bf40f5d81581077bc4f5f47e57b88b7 |
|
08-Aug-2015 |
Svet Ganov <svetoslavganov@google.com> |
Do not show removed permissions in the UI - framework bug:23043018 Change-Id: Ia5cf49f299eda627d9fde2b34498812afcb3a6d5
/frameworks/base/core/res/AndroidManifest.xml
|
e37acf3256c107da2a9c4892225aa7238d148669 |
|
08-Aug-2015 |
Billy Lau <billylau@google.com> |
am 4a10b66d: am 99271a39: am 9751afcf: am 26ab6ed3: am 70f998e5: Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev * commit '4a10b66df364092cdc42a3cfaa990c877b389624': Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS
|
70f998e57df2b3ed79331669a93a0ba314f25e7d |
|
08-Aug-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev
|
a7238a397d5c3431eeb19b5b77e8c7c2bf0e608f |
|
01-Aug-2015 |
Billy Lau <billylau@google.com> |
Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS Merge the CHANGE_NETWORK_STATE permission with WRITE_SETTINGS. AndroidManifest.xml: Raised the protection level of CHANGE_NETWORK_STATE permission from normal to signature|appops and pre23|preinstall for compatibility provider/Settings: Wrote new helper methods to check if app is allowed to change network state. ConnectivityManager.java & ConnectivityService.java: Replace enforcement checks for CHANGE_NETWORK_STATE with checkAndNoteChangeNetworkStateOperations instead. Change-Id: If8c2dd3c76a5324ca43f1d90fa17973216c2bcc5
/frameworks/base/core/res/AndroidManifest.xml
|
598b03d1008fb416a597ae4b2e037c4492bf696d |
|
07-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 9bf912c1: am 5ed03384: am 1f514608: am 5a624aad: am 38d30dc5: Merge "Immediately kill a shared user process on a permission revocation." into mnc-dev * commit '9bf912c1cf6941402dc0f8ef449f34787796875e': Immediately kill a shared user process on a permission revocation.
|
aa41add33b8d7d318387cc74c34e3d347d245211 |
|
07-Aug-2015 |
Svetoslav <svetoslavganov@google.com> |
Immediately kill a shared user process on a permission revocation. 1. When a permission is revoked we kill the app immediately but do not do an immediate kill for shared uid processes. This fixes it. 2. Remove system APIs that are used only by the package installer. bug:22984670 Change-Id: I3d4ae52ea8679f894aa7c5972941263903479183
/frameworks/base/core/res/AndroidManifest.xml
|
b66cec227739f328b7004a3bb71d4a97b98022af |
|
31-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
am 3c01ac0b: am fc0b2e98: am df961732: am f9fdb08c: am 4988378c: Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev * commit '3c01ac0b199d787f6a81b01ab3b6296421ea40a0': Introduced android.permission.PEERS_MAC_ADDRESS permission
|
4988378cd0f1bb6cdd83f797d10fd45105672296 |
|
30-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev
|
523d865d9f2853f26089cbbd2bd0dbb75804050d |
|
29-Jul-2015 |
Nicolas Prévot <nprevot@google.com> |
am 327046d0: am e1d51934: am 95c26295: am 2b0cd2c7: am 64ac302f: Merge "Send a public broadcast when the device owner is set." into mnc-dev * commit '327046d0e75c8917dc18cbc23b4aa72b1ba61034': Send a public broadcast when the device owner is set.
|
9069fab8bca535a33501a75bc8f61b23dcdcaffd |
|
01-May-2015 |
Amit Mahajan <amitmahajan@google.com> |
Changes to update APN db via Gservices and ConfigUpdater. - Adding settings that are updated by Gservices. - Changes to handle UPDATE_APN_DB intent. - UPDATE_APN_DB intent triggers update of apns-conf.xml and carriers db. Change-Id: I65a63f3015da1b827b974d17e48bee4c747544ff
/frameworks/base/core/res/AndroidManifest.xml
|
00799008832e11f06f9ddc0bf721799edee99f28 |
|
27-Jul-2015 |
Nicolas Prevot <nprevot@google.com> |
Send a public broadcast when the device owner is set. Make it a protected broadcast. BUG: 22623518 Change-Id: Ia36e8f0b80a6301d7d8e0461476842c78762b5e8
/frameworks/base/core/res/AndroidManifest.xml
|
136a2e7fc94098f762cd3d9bd092b4c4d5bf4c70 |
|
27-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Introduced android.permission.PEERS_MAC_ADDRESS permission Introduced signature-level permission android.permission.PEERS_MAC_ADDRESS. It allows access to MAC addresses of WiFi and Bluetooth peer devices, without having location permission or even if location is turned off. Bug: 21852542 Bug: 22728628 Change-Id: If0ff80636e57b38dbedc8fcf5f520a3a6d6f734e
/frameworks/base/core/res/AndroidManifest.xml
|
61fe8e010520d92362167556cff48c5052a0254f |
|
24-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 1298b1a0: am 1ad413c0: am af27474f: am cc3c6dbf: am 3d6f6060: Merge "Add a privileged permission to get user accounts" into mnc-dev * commit '1298b1a0a25a19559c81293ac87b31a4ffcbc973': Add a privileged permission to get user accounts
|
7b97b2332927d8a2aa1de2e2759123d576c9eec3 |
|
24-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 6ae3ec45: am d14cbeab: am 8276a97f: am 010b53c0: am bdb7d936: Merge "Update permission icons to final versions - framework" into mnc-dev * commit '6ae3ec45352b5ef54366150f68d1c44994f52657': Update permission icons to final versions - framework
|
3d6f606031da248a3b1fd6f0f569ac33a26c0b5e |
|
22-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Add a privileged permission to get user accounts" into mnc-dev
|
2062eeff0156bc4e119398f1736e699d90ad8345 |
|
22-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add a privileged permission to get user accounts bug:22602794 Change-Id: I6e5429f0eb5f2cb274d4740755070e588735e179
/frameworks/base/core/res/AndroidManifest.xml
|
39c8a08b5e673dbf1416543840854faae39e59d9 |
|
21-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Update permission icons to final versions - framework bug:22383613 Change-Id: I3f524fd0538a1b843b0394fa766f032835d1ecaa
/frameworks/base/core/res/AndroidManifest.xml
|
0269352160a8f1ed02189ba40481cb899e1616cf |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 6b2d1be6: am f4d5fa93: am 55596f85: am 098a88e6: am 2a500e32: Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev * commit '6b2d1be6628fa80a4e2c9f8c893606dc1030cf7f': Revert "Temporary lower GET_ACCOUNTS protection level"
|
4f4734ff0e8dfab7b5b04b94a2a6c91769b66f38 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 62237c4e: am 60584816: am e329ce0c: am 7a8f2006: am ecb88792: Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev * commit '62237c4ea09ab52db7176c838ca713ae3d87e933': Temporary lower GET_ACCOUNTS protection level
|
2a500e32169b53679db83077e57f3c9cd02cfd36 |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev
|
2c20277dd51e8aeeb10b800a67d97273dee0c5f2 |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Revert "Temporary lower GET_ACCOUNTS protection level" This reverts commit 6e20ac343c22ab27e5ac7471bc1219df6bf11282. Change-Id: I96b21bad9406abffa95c90abde509dc8dcf3eff5
/frameworks/base/core/res/AndroidManifest.xml
|
ecb887925a3ff3d54ecb6593932d4f866a6fe9e9 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev
|
6e20ac343c22ab27e5ac7471bc1219df6bf11282 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Temporary lower GET_ACCOUNTS protection level bug:22550851 Change-Id: If43f10639220f9a69d304b08def6d869658c2960
/frameworks/base/core/res/AndroidManifest.xml
|
28e7313992ba6efd94ddc16b45278863f84d7fcb |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 71d12704: am 475858c3: am b295963b: am c00e49b6: am d4b566bf: Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev * commit '71d12704f64eeace695a6b8e0cd8f36007b96270': Add APIs for verifier to grant at install and revoke permissions
|
d4b566bf56333de708908ce4accb5fb067be64f0 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev
|
f82631ff35e22f43ed7e79e9fbc75ca241aae70a |
|
30-Jun-2015 |
Bryce Lee <brycelee@google.com> |
Introduce permission for updating the cell broadcast content provider. Change-Id: I64a1001b6aaf7c0032cde01216abb240c54520f7
/frameworks/base/core/res/AndroidManifest.xml
|
7121e18595d4c559044e26bfe6035406a862f466 |
|
14-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add APIs for verifier to grant at install and revoke permissions bug:22231699 Change-Id: Ie0c758bf73699f50bf99ff5aa0bf98dcc9004e37
/frameworks/base/core/res/AndroidManifest.xml
|
4085a74b4c6b46c9a08a20b5d63d728713767db4 |
|
16-Jul-2015 |
Jeff Brown <jeffbrown@google.com> |
am 209c8ced: am 6e4997db: am 8bdd92d4: am 0cb1cfdc: am 76c4c666: Add USB port manager. * commit '209c8cedab87359564c032a3e56b3acd452e1ac9': Add USB port manager.
|
76c4c6668a1486bc003ab0c585bb1f41d16e27a7 |
|
07-Jul-2015 |
Jeff Brown <jeffbrown@google.com> |
Add USB port manager. Add some new internal APIs to enumerate USB Type C ports, query their status, determine whether they support changing power or data roles, and doing so. The API also adds a new ACTION_USB_PORT_CHANGED broadcast for port state changes. The implementation includes a mechanism for simulating the behavior of the USB stack. See 'adb shell dumpsys usb -h' for details. Note that the underlying kernel driver interface is still subject to change but its behavior has been encapsulated as much as possible. Bug: 21615151 Change-Id: I0c853ae179248a4550b3e60d02a7a7e65e4546b2
/frameworks/base/core/res/AndroidManifest.xml
|
db4f4b226ce1bad7d4d900d1396c598d8bf0ae92 |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
am 5edc6ffd: am a6fc7f96: am 779e5e0e: am d72fc63a: am 46d1864c: Merge "Make get_accounts a runtime permissions again" into mnc-dev * commit '5edc6ffda765c51bbd97bd7ae6f1bd2082309dd2': Make get_accounts a runtime permissions again
|
46d1864ceee7229cd7fe7bac80226c930539861d |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Make get_accounts a runtime permissions again" into mnc-dev
|
f07602bea9f964d03a009445ffe3a6172fa33432 |
|
14-Jul-2015 |
Jim Miller <jaggies@google.com> |
am c1aaa6ae: am 5ab70110: am a9845680: am a95d9f0b: am 16c1764c: Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev * commit 'c1aaa6ae49d6c1820472a2061ec8f6df08ffea50': Change MANAGE_FINGERPRINT permission to system|signature
|
949d16ebd5f4902db8fe79970479fcb1bee4a524 |
|
14-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
am 5571a986: am afe3c2b3: am 474f987d: am f5d6d432: am cf9aebf1: Merge "Remove ExternalStorageFormatter" into mnc-dev * commit '5571a986f0a2939248aefc584248d08732c761e4': Remove ExternalStorageFormatter
|
4c8d3126068334826e2a6f921799e2b86dba8916 |
|
14-Jul-2015 |
Billy Lau <billylau@google.com> |
am e385d26f: am cb2a7a2c: am 0be2efb2: am f028ba3d: am 96d00ab3: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev * commit 'e385d26fef2f62988c082ee8066f5d6715aa16c9': Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
|
4079c7ec6adb3fb4c6d1efd829c7a68f556c476d |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Make get_accounts a runtime permissions again The permission was lowered in protection level to normal allowing apps to assess migration strategy. This change makes the permission dangerous again allowing apps to implement this strategy. bug:22385299 Change-Id: I3694c06236a33b97f63761b48745b1df654a2bf4
/frameworks/base/core/res/AndroidManifest.xml
|
16c1764cf552432d304eaefd912d5aebe3192449 |
|
13-Jul-2015 |
Jim Miller <jaggies@google.com> |
Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev
|
cf9aebf138a3ec07277b1e5564751d2396a155c0 |
|
13-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove ExternalStorageFormatter" into mnc-dev
|
22b3f4cb15207239e203d5ec8b72ec6bc90fef35 |
|
08-Jul-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission Raised the protection level of WRITE_SETTINGS permission to appop and also allowed backwards compatibility with pre23 flag. Also made sure that this permission is not added as RuntimePermission in DefaultPermissionGrantPolicy as that breaks a lot of gmscore stuff. Introduced new action to manage write system settings as a new API and renamed the string that describes the managing of overlay permission. Change-Id: Ifd25a6ddc06de68ee37015cb9fb23452e4ef10f4
/frameworks/base/core/res/AndroidManifest.xml
|
9da440786d8001dbfddfcfc1a6b535f522ae06be |
|
11-Jul-2015 |
Jim Miller <jaggies@google.com> |
Change MANAGE_FINGERPRINT permission to system|signature This allows fingerprint enrollment to be done from system-installed apps, such as Setup Wizard. Fixes bug 21695577 Change-Id: I990912dcf229aa03f6350f96a09ff4588b20ca48
/frameworks/base/core/res/AndroidManifest.xml
|
cb746a860cc6830a1d7d1762a57a871b100ded77 |
|
09-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
Remove ExternalStorageFormatter Bug: 9433509 Change-Id: I815770e0e0314fc7012ebc213f2167a13d6f37d1
/frameworks/base/core/res/AndroidManifest.xml
|
8bc65585564b034af38031e52f50cb743d2dd953 |
|
08-Jul-2015 |
Etan Cohen <etancohen@google.com> |
am a8c58435: am e62c69ee: am 7fc77e60: am d453d7e4: am 3e639057: Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev * commit 'a8c5843591ab3f7cc1f62c5b1396ea38e506c140': Add ACCESS_IMS_CALL_SERVICE hidden permission.
|
3e639057b8d9c4287bc5e92ce29c122e805bbe17 |
|
08-Jul-2015 |
Etan Cohen <etancohen@google.com> |
Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev
|
ee94484303ebddbb5eb7cc7efa347240ad641bc7 |
|
08-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
am 7b3add61: am f368f6b9: am 6ee8a509: am c55c4a28: am b14dc048: Merge "Add new "preinstalled" permission flag." into mnc-dev * commit '7b3add61c9e47b708725147dffc23d396db37add': Add new "preinstalled" permission flag.
|
4e5dac3d6ef6f28aecb116b8dfd92ff31d49c926 |
|
08-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
am 3fd5ebfd: am 7cc8de60: am 0ce19f8e: am 240f8e5f: am 3e07ee07: Merge "Grant installer and verifier install permissions robustly" into mnc-dev * commit '3fd5ebfd778e540276fb5205a8ba3185e620647d': Grant installer and verifier install permissions robustly
|
a90c8def2c6762bc6e5396b78c43e65e4b05079d |
|
08-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Add new "preinstalled" permission flag. This allows you to specify that a permission can be granted to any pre-installed system app (not just privileged ones). And as long as I am doing this, clean up the old "system" permission flag, renaming it to "privileged" which is what it really is today, deprecating the old names. And switch the platform's permission declarations to use the new name. Change-Id: Iabf484746af232144786851ec7fe90e3de9dddb2
/frameworks/base/core/res/AndroidManifest.xml
|
3e7d977ff7c743713f0ad6336a039d7760ba47d1 |
|
07-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Grant installer and verifier install permissions robustly bug:22248271 Change-Id: I3a47ae9a112ba7d88b421fcb5f9651d1168ba7a5
/frameworks/base/core/res/AndroidManifest.xml
|
ecb7af7d10e10a3db3435057adcbfcf726af4aa5 |
|
07-Jul-2015 |
Ian Pedowitz <ijpedowitz@google.com> |
am 0a5e18bf: am a3599c78: am 8ea98a8a: am 13c2a4f5: am 937edac8: Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" * commit '0a5e18bfe23f4b256bbda995a1f3e383fa979ee3': Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission"
|
bbf40aeab3445dc81e37b1e47f25c8e47ae035d8 |
|
01-Jul-2015 |
Etan Cohen <etancohen@google.com> |
Add ACCESS_IMS_CALL_SERVICE hidden permission. Bug: 17361897 Change-Id: I2b3ef57c647204d981ada9c8bd4f92fbbd3fc748
/frameworks/base/core/res/AndroidManifest.xml
|
937edac8e8583023019b625dd426ebf65169e30d |
|
07-Jul-2015 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" This reverts commit d6b404c72da7e2475508c7d5948494b2e9b1a262. This CL seems to have broken the build, causing GMSCore to continuously crash. Bug: 22313634 Bug: 22312938 Bug: 22314605 Bug: 22308392 Bug: 22307889
/frameworks/base/core/res/AndroidManifest.xml
|
bfe288690a53560f500ada91c13acfc6fd78ccde |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
am 4ce9ebea: am bb1a1e5f: am e2835f9f: am 212c006e: am c81ecb6d: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev * commit '4ce9ebea91be2456f5958b86e1c7e36b800e8dde': Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
|
e35360d806d0858229ec8dde4929da0bdb93e7d3 |
|
07-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
am 67804838: am ccde254c: am 0cae3e9e: am 7dfe0f83: am 7fd3c296: Merge "Permission to view shared storage for all users." into mnc-dev * commit '67804838150fc85efb1bd27cc68422197976fe3f': Permission to view shared storage for all users.
|
c81ecb6d2c6badb5ddbf19f7c90e350cf24322ee |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev
|
d6b404c72da7e2475508c7d5948494b2e9b1a262 |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission Raised the protection level of WRITE_SETTINGS permission to appop and also allowed backwards compatibility with pre23 flag. Introduced new action to manage write system settings as a new API and renamed the string that describes the managing of overlay permission. Change-Id: I939a95b9a8b1ae75bf67aa6d8190c92a8d2001d3
/frameworks/base/core/res/AndroidManifest.xml
|
32e80d7588720bdc9f8a3e961ac4566d7c80b2b9 |
|
06-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
Permission to view shared storage for all users. Typical apps are restricted so they can only view shared storage belonging to the user they're running as. However, a handful of system components need access to shared storage across all users, such as DefaultContainerService and SystemUI. Since WRITE_MEDIA_STORAGE already offers this functionality by bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID which is no longer handed out to third-party apps. Then we change the FUSE daemon to allow the "sdcard_rw" GID to see shared storage of all users. Bug: 19995822 Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
/frameworks/base/core/res/AndroidManifest.xml
|
7e07288c7720001542182a4a70a5395015bcff1c |
|
04-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
am 0783b9a4: am ee987ce4: am 76664d9d: Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev * commit '0783b9a47ae682cc85a14284e79643b5087b8c9f': Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW...
|
fab8c63aa005af30fcb610d4f99c4ab3f7ac4876 |
|
03-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 5243632f: am 10f87f47: am 22233b51: Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev * commit '5243632f918169bd58e388db988454a16983e490': Remove the empty accounts group and not needed storage resources.
|
76664d9dcfbbe04c50a00ea1e268e80b9a9f6087 |
|
02-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev
|
de15edaa9bf486a4050bb067317d313fd807bb10 |
|
01-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW... ...to an explicit toggle to enable in Settings Add a new permission flag, saying the permission can be automatically granted to pre-api-23 apps. Apply this to SYSTEM_ALERT_WINDOW. Change-Id: I24a0ceabe7e9f5e458a864d30eda2696ad14a699
/frameworks/base/core/res/AndroidManifest.xml
|
22233b51c3c3e678571dbe5e6d1035b7e1440408 |
|
01-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev
|
28aad8efe60d7d7c59d748ef50d8fe0118b9c323 |
|
30-Jun-2015 |
Billy Lau <billylau@google.com> |
am 67dfa491: am e4c3fd72: am f62f4c94: Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev * commit '67dfa49194cf91241ff791730bacb71e07530ef3': Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings.
|
f62f4c94a36f5c2f7ad3c70316dc585ea3fd721a |
|
30-Jun-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev
|
ca2c590ba3d6de067c6b5cd820e6ee9319cbfeb7 |
|
29-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Remove the empty accounts group and not needed storage resources. bug:22044480 Change-Id: I76297f5540614301893871b3b41219002076b920
/frameworks/base/core/res/AndroidManifest.xml
|
2ce64b872d464209efefb6c74584d6ab1088d169 |
|
26-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 0678733a: am a9f79160: am 6cbf7928: Merge "Revert get accounts permission to normal for now" into mnc-dev * commit '0678733a525c6a785feb68a9a2004ff8c494c911': Revert get accounts permission to normal for now
|
a508bf8ba227c90e15fd7e6260264be4ccd1dcbd |
|
26-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Revert get accounts permission to normal for now Change-Id: I51efe557b69a50d85dc53ba7a1622b7bafc301e6
/frameworks/base/core/res/AndroidManifest.xml
|
cbe540f94691b595ca2eaede2871d885c38a845c |
|
25-Jun-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings. Raised the protection level of SYSTEM_ALERT_WINDOW from dangerous to system|signature|appop. Added a new API in Settings for developers to invoke the main configuration setting. Also added a new metrics in MetricsLogger. Finally, also made changes to PhoneWindowManager to check the permission to draw overlay properly. Change-Id: I4a073e6f038b8b8d2fa5bd6ad60abda496be9701
/frameworks/base/core/res/AndroidManifest.xml
|
e072d842ec16eb82d933ef04d01f2d9005892293 |
|
26-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am e7fe26c9: am f513006c: am e171899a: Merge "Add JavaDoc for permission protection level" into mnc-dev * commit 'e7fe26c94b46b6e8b4860ceaba46b95584e38914': Add JavaDoc for permission protection level
|
71b6ca6d4325d7851030486bb4a080ecbc18c9a5 |
|
26-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add JavaDoc for permission protection level 1. Add the permission protection level in the java doc 2. Make some system permissions that are not mean to be used by third-parties system API. bug:21402257 Change-Id: Ic0ae8d6ca44dbbbf12848a9164acc0e908c90402
/frameworks/base/core/res/AndroidManifest.xml
|
9c58c651ceef19d9bf6352c59b309158cfa65fd2 |
|
24-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 4074a871: am 338ac4ac: am c5e43c50: Only current IME and spell checker can access user dictionary * commit '4074a871cbc109d4fd518413fc4e43ba3eea41a5': Only current IME and spell checker can access user dictionary
|
c5e43c508f415a72a77825ed260df60bdb048218 |
|
24-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Only current IME and spell checker can access user dictionary Change-Id: I6c5716d4d6ea9d5f55a71b6268d34f4faa3ac043
/frameworks/base/core/res/AndroidManifest.xml
|
b96d1f1e6979a91b9e35657cbfbee6acff3330ed |
|
24-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 242c1f33: am 4475dbca: am 2c99ea35: Merge "Remove not needed contacts related permissions." into mnc-dev * commit '242c1f333431b32445336faed18feb1a90ebd6e4': Remove not needed contacts related permissions.
|
caef842f35dae5c3aa2f0af7a27b0fbeee400912 |
|
24-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
am c62dafdf: am 05feded4: am 8144aa2e: Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev * commit 'c62dafdffc5a382b47d47d5aad528d8500eafb3b': Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS
|
2c99ea3524bba58f87a9fefad79aa136538b6e0e |
|
24-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Remove not needed contacts related permissions." into mnc-dev
|
6d2c0e5ee2f717d4a5c00df08aca21c76eea8278 |
|
23-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Remove not needed contacts related permissions. This reverts commit ed5ff51b2ca7c051e2719dfc8a8a083e6208848e. Change-Id: If2407e4e474a438d95e1b7ad1aa6f441bb3ace08
/frameworks/base/core/res/AndroidManifest.xml
|
8144aa2e9a732be6ba66c385a590e07ec59c5f77 |
|
23-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev
|
f374a4bc2ad5c31f252c7d37104e1315a955daad |
|
23-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS Bug:22008542 Change-Id: Ifb4565ec8077e88596f0304328c083c7d1c9db04
/frameworks/base/core/res/AndroidManifest.xml
|
edfda6a1c8eed3be77b506ca84f045ae22ea465c |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
am 0623d635: am 2544da4c: am 1ef23ade: Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev * commit '0623d6359178df8861159f188df7645959866cd8': Revert "Remove not needed contacts related perissions."
|
1ef23adef84f8b0080f315aa9283a416737e2e34 |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev
|
ed5ff51b2ca7c051e2719dfc8a8a083e6208848e |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
Revert "Remove not needed contacts related perissions." Broke the build, reverting. This reverts commit a2991da0d671adf511ccb884cf25bf1241303f92. Change-Id: I2bdfa70fbd8a6c03e48426f85eeb63896762d5da
/frameworks/base/core/res/AndroidManifest.xml
|
46e28423030178711bcaa34ebc2ed2a840246ce6 |
|
23-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 8bf62c7d: am 477bb484: am 2b5bec93: Merge "Remove not needed contacts related perissions." into mnc-dev * commit '8bf62c7d0ccda08ae5982d3bbf39b72ba327b2fc': Remove not needed contacts related perissions.
|
8baaf220e4a4f979328a5fdc1e8a1765f7a5a95b |
|
23-Jun-2015 |
Adam Powell <adamp@google.com> |
am 04333109: am f66c97b5: am 9f49dcda: Merge "Add voice interaction support to ResolverActivity/ChooserActivity" into mnc-dev * commit '04333109ce6ea332a9136fbdd69ca83b8f8e56e5': Add voice interaction support to ResolverActivity/ChooserActivity
|
2b5bec9356de159a216e5aec8d553e6da7078b72 |
|
23-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Remove not needed contacts related perissions." into mnc-dev
|
4c470d641c6906a742b63273b305695ba575b3e1 |
|
20-Jun-2015 |
Adam Powell <adamp@google.com> |
Add voice interaction support to ResolverActivity/ChooserActivity All options are sent to the VoiceInteractor once ChooserTargetServices have reported in. We don't perform explicit progressive refinement or filtering, but an explicit option picked will be invoked. Also fix a lingering bug around being able to nested-fling the resolver drawer closed. Bug 21516866 Change-Id: I6b141f5fa87d74dccec9dcb88110630696e9c38e
/frameworks/base/core/res/AndroidManifest.xml
|
a2991da0d671adf511ccb884cf25bf1241303f92 |
|
22-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Remove not needed contacts related perissions. Removing the read/write profile/social stream permissions as they are not needed anymore. These permissions are for accessing data nested in the conacts provider which is already guaded by the read/write contacts runtime permissions. The removed permissions would be in the contacts group which means they would not provide more protection compated to read/write contacts. Also removing the permissions voids the need for app op support for legacy apps. Removed deprecated APIs for social streams as these were deprecated and will go away in the next release. We want apps targeting M to not be able to compile if still suing these APIs to help with migration. Change-Id: I26ed9055847af7f92c78eb0f4ac8f9f1aa616fcd
/frameworks/base/core/res/AndroidManifest.xml
|
c71c4d56c522b9511ee7695b0a881fafb7c134d4 |
|
22-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
am 57f605f8: am a136f8d7: am c54bcade: Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev * commit '57f605f82b6ebf87bd9e7f2def4a082ab06a4556': New internal permission to protect apps against rogue Nfc message.
|
c54bcade1b7ec7e044aca7fe9c60357ad957a8c2 |
|
22-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev
|
9fe6c3805607ae407fa9f7f05bf4a5cb81454052 |
|
20-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 07247e48: am af4ace3d: am d8e247db: Make READ_EXTERNAL_STORAGE dangerous * commit '07247e482e63984bdeac02a47a15c67b3a6a2eb0': Make READ_EXTERNAL_STORAGE dangerous
|
d8e247db8cabe209966f4bfcb550637b45f18441 |
|
20-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Make READ_EXTERNAL_STORAGE dangerous We have a new storage permission group that has read and write external storage. However, read external storage is (not a regression) a normal permission while write is a dangerous one. This leads to cases where the user disables the Storage permission and apps still read form it. This change makes read external storage a dangerous permission. bug:21949045 Change-Id: I7e28f629dda6e9c1f70cb20a3d5bea74fb109890
/frameworks/base/core/res/AndroidManifest.xml
|
b8c0e7a85b64b4328b503893730bd0b642a7592d |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
am 64dba615: am a0a5dc5e: am 95499dcb: Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev * commit '64dba6159f83c6b91d3aa418d4229c9d1f581ac0': Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit
|
95499dcbb404d8e4d5575be7d5568115c35a639a |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev
|
8a1533ed2ea77b9f68dae84759b3376eafdc2fc8 |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit b/21853008 Change-Id: If9c4e88fd2074de17814120d111546d6ecf58cf4
/frameworks/base/core/res/AndroidManifest.xml
|
1213487aa7dc32d392cb5f2489f0c76321f02430 |
|
19-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
New internal permission to protect apps against rogue Nfc message. Bug: 19838376 Change-Id: Id23f6d14ce8d93988e4382ea0d0dc5c586456bf7
/frameworks/base/core/res/AndroidManifest.xml
|
172671b349062b6958ad1a6de6d1232c92b9f9e8 |
|
19-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
am 8a55a5ad: am 7c74c944: am 0b00db8e: Merge "create Wifi PNO ALARM intent" into mnc-dev * commit '8a55a5ade28ac4622a4ca2b60106280c23cd66e7': create Wifi PNO ALARM intent
|
5297c2fb7f6cc3e6e3421297856ec1c9450d0b4f |
|
19-Jun-2015 |
Todd Kennedy <toddke@google.com> |
am bd626dd9: am 24cd7b03: am f29c4a07: Merge "Add getPackageImportance() system API" into mnc-dev * commit 'bd626dd96d25033812e7d3aa528d63fafc96cb0d': Add getPackageImportance() system API
|
0b00db8eebd3b677c1d9190061d0d97dd672976e |
|
19-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
Merge "create Wifi PNO ALARM intent" into mnc-dev
|
f29c4a07f42eecb77fbd9acdcf61a26d3480c047 |
|
19-Jun-2015 |
Todd Kennedy <toddke@google.com> |
Merge "Add getPackageImportance() system API" into mnc-dev
|
69810483c770e99b65f4fd01ad1973885969062c |
|
18-Jun-2015 |
Todd Kennedy <toddke@google.com> |
Add getPackageImportance() system API Callers must have the permission GET_PACKAGE_IMPORTANCE Bug: 20642684 Change-Id: I6f3ef2ec810c884e0dee239e5909bcb314957302
/frameworks/base/core/res/AndroidManifest.xml
|
15d48a16f645509cb0c6a1f3abf52ddd233cd8b5 |
|
19-Jun-2015 |
Alan Viverette <alanv@google.com> |
DO NOT MERGE: Remove DayNight theme Do not go gentle into that good night, Old age should burn and rave at close of day; Rage, rage against the dying of the light. Though wise men at their end know dark is right, Because their words had forked no lightning they Do not go gentle into that good night. Bug: 21854466 Change-Id: I0b7cd116c23f7df88e94f31b3aee7dd22a102804
/frameworks/base/core/res/AndroidManifest.xml
|
b6ca937abeb145ec0e39073aaa72bfb769160704 |
|
18-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
create Wifi PNO ALARM intent Change-Id: I9bdae8ae37e30d36bf82b731468b8a157bb2862b
/frameworks/base/core/res/AndroidManifest.xml
|
9faad27a1e4f4005ca0cc9f017a4e5f56de5146b |
|
18-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
am 2cabb0da: am a4e0fca0: am b4c46909: Merge "Remove FRP wipe support for device initializers" into mnc-dev * commit '2cabb0da0c5b09f3736c61a7eea74ee947182702': Remove FRP wipe support for device initializers
|
b4c469095f12972ef04558961ddbdbdfe8305ccb |
|
18-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove FRP wipe support for device initializers" into mnc-dev
|
e981e00b14fc0bdf4906303c66eef3a125f33037 |
|
16-Jun-2015 |
Yorke Lee <yorkelee@google.com> |
am fc86e40d: am 8d308309: am a5f59258: Merge "Send broadcast when default dialer changes" into mnc-dev * commit 'fc86e40d9632366d05af4db8b56d6a85f4502710': Send broadcast when default dialer changes
|
107c4ce2ac9b76e7b4ed251fff8929958c5d3e63 |
|
15-Jun-2015 |
Yorke Lee <yorkelee@google.com> |
Send broadcast when default dialer changes Add hidden TelecomManager.setDefaultDialer for system apps to set the default dialer and trigger the broadcast Bug: 21846308 Change-Id: Ifdd30cd1323ab0157edf7fd966173b6c52df6ba0
/frameworks/base/core/res/AndroidManifest.xml
|
f8d6ce6aab07a83d99b50147aac464205eddd528 |
|
14-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 13fb3353: am 281c8389: am 6d977832: Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev * commit '13fb33535f93c8cd49650b398f5728938f90933b': Remove bookmarks provider and associated permissions - framework
|
6d9778328a3c3c9da525870fff606af8ac5e9529 |
|
14-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev
|
b299f8d984548874493909b6623ec3bed6d95efd |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 986506c4: am f4c6f135: am 7f55b008: Merge "Revert write secure settings permission protection level." into mnc-dev * commit '986506c42a9565acd73d28020b461c0a95fddefd': Revert write secure settings permission protection level.
|
353d0ef9358df95ffe42afb591905347da48a4e2 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Revert write secure settings permission protection level. bug:21619456 Change-Id: I31212d3677b74fbf26b2d9eb222a2a8132de2271
/frameworks/base/core/res/AndroidManifest.xml
|
53e5a05378919c4b4ac04d9dee745ecfda008393 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am ede23cfe: am 9b53c26b: am 033a68fe: Lower protection level of WiFi state change permissions. * commit 'ede23cfe868641da64d91a9cd8cf940e07eab1c1': Lower protection level of WiFi state change permissions.
|
887b2d6989589bb83f3eb9929d32db14a137c442 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 5289bc37: am ab32fe21: am 6f918b2f: Merge "Add new storage permission group" into mnc-dev * commit '5289bc37688f4e0b570c197184feadd37d3d4deb': Add new storage permission group
|
32c00bbbdbbd633c2ea8834e3a2f8c6569251e1a |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am ea1ac5ea: am b4e3c87f: am 55fd0a70: Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev * commit 'ea1ac5ea97c188b59bf57100306da80e8d789b49': Bump up the protection level of the CLEAR_APP_CACHE permission
|
c27407e1adbd7ab8f34a6da4f9c85bb31370e514 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 1891eb8e: am cdf20eac: am 592d3d35: Merge changes Ic643bc07,I4bef927b into mnc-dev * commit '1891eb8e6a3eeb2394c6eb2343da42bb7e925606': Lower protection level of the dangerous Bluetooth permissions Update sensors permission group name string
|
033a68fe2739aac89bded94bb4ca99473050bcd7 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of WiFi state change permissions. bug:21724236 Change-Id: Ib2305bf8a6be62fe6b00d9bccc7685100edba9ba
/frameworks/base/core/res/AndroidManifest.xml
|
bfa216ac261dd3c5035ad38795650ce5f4ce6fb7 |
|
05-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Remove bookmarks provider and associated permissions - framework Change-Id: I7f5a2f14a12da473f05a5075d98e762f8f8ed970
/frameworks/base/core/res/AndroidManifest.xml
|
6f918b2f92ece0ba7904262fc1fd0b50cf746a6c |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add new storage permission group" into mnc-dev
|
55fd0a702d5bb346efb3a149b3cbaba4dc5952b2 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev
|
592d3d35a6ae4eee0645bf92bc8cf4ab9d0d9b7b |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge changes Ic643bc07,I4bef927b into mnc-dev * changes: Lower protection level of the dangerous Bluetooth permissions Update sensors permission group name string
|
a83d3eaf05dd7b29362aa7897628a67c4428eb65 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Bump up the protection level of the CLEAR_APP_CACHE permission This permission guards only hidden and system APIs, hance it should be signatureOrSystem protection level. Change-Id: I8d2b75167c6887a285af0b494c39b4ffea2f0cbf
/frameworks/base/core/res/AndroidManifest.xml
|
d81897d0232e4629340a541bf6ffb8dcfae0fd52 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of the dangerous Bluetooth permissions bug:21594947 Change-Id: Ic643bc0768b0fc9adcc3e07661ee34fa59f4ec35
/frameworks/base/core/res/AndroidManifest.xml
|
1d2bd010ecd0399fd1992c00fffd1b0ac1cbafaf |
|
12-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am e6f426a1: am fe216ddd: am b3c134e1: Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev * commit 'e6f426a109aff7b081f9dc59722cee80c1092e91': Revert "Revert "Permissions: Fix account related permissions.""
|
b44339776a434cbfd65f0c5b7186347fad37f2dd |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
am 7e2bbad7: am 486d4283: am 02184244: Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev * commit '7e2bbad7f9feac0a484bb59afcc711ddde3b314e': Change to add STK_PERMISSION for stk related commands.
|
6b4450bcf8ca2a7fddc3dfe4ecfd2fddad04bcf9 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am f68b581c: am 9c9ebccd: am d0041e5f: Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev * commit 'f68b581cb0687fb1b40258ea526d1154df311bee': Revert "Permissions: Fix account related permissions."
|
b3c134e1614e02471811a43d12bedcfc5778667b |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev
|
6eb73a577850a4b6ddb06fd746f09a6c1d124f34 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Revert "Permissions: Fix account related permissions."" This reverts commit dcddc476651deb72a27798de56eef584e5be5d32. Change-Id: Ie2402167fc7cd3d5e57bf2fba704fdf00cfcb4fe
/frameworks/base/core/res/AndroidManifest.xml
|
02184244dcd0149252676bbf24c6d9a5c9ebfd5b |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev
|
d0041e5f474f4e795d6bc9e5eeaec4098949897c |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev
|
dcddc476651deb72a27798de56eef584e5be5d32 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Permissions: Fix account related permissions." This reverts commit ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814. Change-Id: I4c62b1b5a5bd4e2a5fac76244a16730526ed67fc
/frameworks/base/core/res/AndroidManifest.xml
|
59acd140b6e3165767ec5a11a16779bc9e220def |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
Change to add STK_PERMISSION for stk related commands. Bug: 21697171 Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
/frameworks/base/core/res/AndroidManifest.xml
|
db6ac98ec375f388d4815fe405201e9649a003f8 |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885" into mnc-dev
|
9fb3c8826ceb2c1b7d93c7c151ec5f39f26c9e1d |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885 Instead, move it to GSF: ag/700092 SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider that stores sync feeds for 1p apps (Gmail, Claendar, etc). The sync feeds are used for delivering and processing GCM tickle-to-sync messages. These permissions should not be used by 3rd parties but if they were, this change will break them. I don't know the reason these were not in GSF and 'signature' to begin with. If someone does, please, comment. Change-Id: I6c4e4c774fea12c7fe7082477c210ad75f007c66
/frameworks/base/core/res/AndroidManifest.xml
|
afd71a8fb6cca37c8ba874b941be8944b0224e3f |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am 2e2d22a2: am e262829d: am ffb46022: Permissions: Fix account related permissions. * commit '2e2d22a20e7eb8216fa299a1b9b4f8ef98078021': Permissions: Fix account related permissions.
|
2e8beb5d40a7ed56ea4adb80b1a8b7efbf06567e |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
am 6c5acdbc: am 7ff09f2b: am 77b2d49a: Merge "Remove device initializer status messages" into mnc-dev * commit '6c5acdbc938bc9ee989fb36b8ace7f91b3bfbc1b': Remove device initializer status messages
|
79b71e71962a2993de517f8a9695e685cc7a7da5 |
|
29-May-2015 |
Georgi Nikolov <geonik@google.com> |
Remove SUBSCRIBED_FEEDS permissions from framework b/20220885 Instead, move it to GSF: ag/700092 SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider that stores sync feeds for 1p apps (Gmail, Claendar, etc). The sync feeds are used for delivering and processing GCM tickle-to-sync messages. These permissions should not be used by 3rd parties but if they were, this change will break them. I don't know the reason these were not in GSF and 'signature' to begin with. If someone does, please, comment. Change-Id: I22b5233893df7f0c6db41ed7d4e878722bd412f0
/frameworks/base/core/res/AndroidManifest.xml
|
ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814 |
|
09-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Fix account related permissions. Requires updating the docs in AccountManaager as well as the logic in AccountManagerService. MANAGE_ACCOUNTS, USE_CREDENTIALS, and AUTHENTCATE_ACCOUNTS are going away. Where AUTHENTCATE_ACCOUNTS was required we now do signature matching. GET_ACCOUNTS is kept but has been grouped under contacts. Bug: 20136477 Change-Id: Iabbb76dce8d1efc607c1f107911d7ddab598a481
/frameworks/base/core/res/AndroidManifest.xml
|
09ad6bfe9619ff7a61209131f1f3182d53d840d0 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove FRP wipe support for device initializers - Remove ManagedProvisioning NFC parameter key from DevicePolicyManager - Remove wipeIfAllowed from PersistentDataBlockManager Bug: 21558883 Change-Id: I59354b7bb1ef7e0b0346ff9a7d1654780231dff0
/frameworks/base/core/res/AndroidManifest.xml
|
77b2d49abb38fafb91fb99ce603a92f189553cd7 |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove device initializer status messages" into mnc-dev
|
ee7fb4d6832e894dfc31db3ec977fda4df29cbaf |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add new storage permission group bug:21730509 Change-Id: If098def755417a90f50328f83d5b419d9e73f120
/frameworks/base/core/res/AndroidManifest.xml
|
3c0e6d9ebfb4406f421788ca3c33953f9ff242fe |
|
11-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 47db7221: am 0525c07f: am 75a0ee08: Merge "Add system API to watch for permission changes" into mnc-dev * commit '47db7221685aaa12926abc42198069c733491cfc': Add system API to watch for permission changes
|
f7c06eb03ab4479b9d0656a23a4733d17e995183 |
|
11-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add system API to watch for permission changes Change-Id: I1ce450a59fb326c14848f46732d877dea33f33c7
/frameworks/base/core/res/AndroidManifest.xml
|
6e48b76640a6c3eaa24c7b727f1e61387387936d |
|
08-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
am e89f9d8a: am ac4c704b: am 383ce580: Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev * commit 'e89f9d8af721d2be7369f9c361cfa566f6a24757': MidiManager: proxy all requests to open devices through MidiService
|
383ce580b1c9e706d1b06a23d81986f3b4ed83fb |
|
08-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev
|
8a3188e8ea63ea646f43524c5b632e214da9c1c9 |
|
08-Jun-2015 |
John Spurlock <jspurlock@google.com> |
am 202dea41: am 5e73a085: am 20ac61b8: Merge "Zen: New user flow for requesting DND access." into mnc-dev * commit '202dea4125f189e242da71c1378699321882671b': Zen: New user flow for requesting DND access.
|
add777bd54575449587fcdee0db0cb832f4b6873 |
|
08-Jun-2015 |
Martijn Coenen <maco@google.com> |
am de6294b0: am 2812397f: am 6280481a: Merge "Remove NFC CardEmulation dynamic resource APIs." into mnc-dev * commit 'de6294b0a20de4b4c0fcd20fc1a491c636e3462c': Remove NFC CardEmulation dynamic resource APIs.
|
20ac61b8c0abd5af4ce32707e01cc1a501cbb7f0 |
|
08-Jun-2015 |
John Spurlock <jspurlock@google.com> |
Merge "Zen: New user flow for requesting DND access." into mnc-dev
|
7c74f78a85283912d7239214024ccca702622f21 |
|
04-Jun-2015 |
John Spurlock <jspurlock@google.com> |
Zen: New user flow for requesting DND access. - User flow is now similar to requesting access to notification content, namely prompting the user to visit a settings page for enabling/disabling apps access. - New ACTION_NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED intent for apps to listen to this state change. - Removed obsolete request method and associated internal callback aidl. - Added new android.permission.ACCESS_NOTIFICATION_POLICY permission for apps to include as a signal that they want to request this access (and therefore appear in the list on the settings page). - Improve javadocs, outline the user flow in NotificationManager#isNotificationPolicyAccessGranted and link to this method elsewhere. - NoManService now persists the user-enabled package list across reboots and does so per-user. - Rename public settings intent to correspond with the noman api. Bug: 21621663 Change-Id: I72cbc21cd736e6a157b6be5d1d0ba0b4a8e7ef4e
/frameworks/base/core/res/AndroidManifest.xml
|
a2344eac370b38263d7f17a7e9802cc9a017eb3a |
|
05-Jun-2015 |
Martijn Coenen <maco@google.com> |
Remove NFC CardEmulation dynamic resource APIs. No longer needed. Bug: 21343778 Change-Id: I5188c4bc819146861d346f3f4339f002b7173027
/frameworks/base/core/res/AndroidManifest.xml
|
e0a6ca64fac5bd4f10139321604031816e90adb4 |
|
04-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
MidiManager: proxy all requests to open devices through MidiService Previously when a MidiManager client opened a virtual or Bluetooth device, the client bound directly to the virtual device's MidiDeviceService or BluetoothMidiDevice's IMidiDeviceServer for the given BluetoothDevice. Only USB devices were opened in MidiService. Now opening any type of MIDI device is done via IMidiManager.openDevice() or IMidiManager.openBluetoothDevice(). MidiService tracks all connnections between clients and devices. Services that implement virtual devices must now require android.permission.BIND_MIDI_DEVICE_SERVICE so only MidiService can bind to these services. Bug: 21044677 Change-Id: I7172f7b1e0cbfe4a2a87dff376c32dc9b41aa563
/frameworks/base/core/res/AndroidManifest.xml
|
982c0d9d4d289b733d574b2b36e69a5858a090d5 |
|
02-Jun-2015 |
Amith Yamasani <yamasani@google.com> |
am 9984f181: am 52f26b63: am ff3b76d0: Merge "Temporarily whitelist an app for network during doze" into mnc-dev * commit '9984f181c5d0ed933837e548a97729ae81b5e4dd': Temporarily whitelist an app for network during doze
|
ff3b76d04672d09214cd0ceb29ec548c8abb2330 |
|
02-Jun-2015 |
Amith Yamasani <yamasani@google.com> |
Merge "Temporarily whitelist an app for network during doze" into mnc-dev
|
5288d74d4109d65ff90536fcd636b040596a45d8 |
|
02-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 5d8e4aba: am bbf5b460: am acbe426b: Merge "Add accidentally deleted strings." into mnc-dev * commit '5d8e4abaf3775627cd8451254e56b0e439c291c2': Add accidentally deleted strings.
|
af575b9f8e1b59be9c8862b6a65c0dcb88145a23 |
|
30-May-2015 |
Amith Yamasani <yamasani@google.com> |
Temporarily whitelist an app for network during doze API to allow an app to be whitelisted for network and wakelock access for a short period. So even if the device is in idle mode, such apps can be given a chance to download the payload related to a high priority cloud-to-device message. This API is meant for system apps only. A new permission CHANGE_DEVICE_IDLE_TEMP_WHITELIST is required to make this call. Bug: 21525864 Change-Id: Id7a761a664f21af5d7ff55aa56e8df98d15511ca
/frameworks/base/core/res/AndroidManifest.xml
|
240e64828f68064b2a1074a1dda1fc41fe19d711 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove device initializer status messages - Remove ManagedProvision Bluetooth extras from DevicePolicyManager - Remove ManagedProvisioning device initializer status action and extras from DevicePolicyManager. - Remove DIA status update protected-broadcast and permission - Remove DPM.sendDeviceInitializerStatus method Bug: 21559093 Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/res/AndroidManifest.xml
|
5f79d8282d593daec7071765f7ca60a24a4ad3c5 |
|
02-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add accidentally deleted strings. Change-Id: I16d7c151b46c076bfdccb1ff0b2bcb0934eedf93
/frameworks/base/core/res/AndroidManifest.xml
|
f4efdfc51f316049508c957ec54e81f7a3099297 |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
am 98bc46d1: am 701ea8b5: am 8d38a8d8: Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev * commit '98bc46d13a523efaf06eae6ddaeb9100d15006a2': Deprecate {READ,WRITE}_PROFILE permission
|
6f51e48dfb4777a31ca5bb1086a6070d573a53fe |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 6e520470: am 73e74be1: am 63428ccd: Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev * commit '6e5204701142b3e1281824ced1ab41813a8c4072': Add a normal permission guarding the installer UI - used for stats tracking
|
8d38a8d84f3c6ee81db9e6aa38492a7ce7766206 |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev
|
63428ccde7e925ceb94aa40e933b3d51954a7797 |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev
|
86877e44f054facb535b29b8db7fda8c543bc245 |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add a normal permission guarding the installer UI - used for stats tracking bug:2147009 Change-Id: Id020eaf7b852de43966f4ab8231e3f7046e66542
/frameworks/base/core/res/AndroidManifest.xml
|
b97df269b5c44dc6aed70bdff156cd70ee394fbb |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
Deprecate {READ,WRITE}_PROFILE permission Now that *_PROFILE permissions are in the same permission group as *_CONTACTS, these permissions have no visible impact on the user. However, they complicate developer's lives and prevent us from using Context#grantUriRequest(). Bug: 21090207 Change-Id: I31e6ae7b0f49c3589071f6a95f8d69a9456c144d
/frameworks/base/core/res/AndroidManifest.xml
|
79965b35fdf832ed00c8fcd0029e3682adf6470f |
|
28-May-2015 |
Svetoslav <svetoslavganov@google.com> |
am 28917b1e: am 713f4c32: am b2849d9a: Merge "Allow priv apps to get local mac address" into mnc-dev * commit '28917b1e51049175f63b2084f4ec6b7e75a82f04': Allow priv apps to get local mac address
|
59ffbc46f3274b7178d4c41f0060522e38152c28 |
|
27-May-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow priv apps to get local mac address Change-Id: I550847cedd5a407c9424778e483b525d4b97e46d
/frameworks/base/core/res/AndroidManifest.xml
|
854cf72d266cfa772d045edb44f17b8d054ea568 |
|
20-May-2015 |
Jorim Jaggi <jjaggi@google.com> |
am 9ae0100c: am b599c1ea: am d6bd9da8: Lower fingerprint permission protection level * commit '9ae0100c767eac741de61b7dbce321108cec679e': Lower fingerprint permission protection level
|
d6bd9da8efaae7bdf806dbe32bc711b0aed7f500 |
|
20-May-2015 |
Jorim Jaggi <jjaggi@google.com> |
Lower fingerprint permission protection level Bug: 21307136 Change-Id: Iafdb42c6a82b27a5297ad14ffaa289b14fffad23
/frameworks/base/core/res/AndroidManifest.xml
|
a0a060dbc21e3ff93a7cebb51154d41af10a89cc |
|
19-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am cbe0916e: am e7896371: am f7b541ff: Merge "Do not report WiFi and Bluetooth MAC addresses - framework." into mnc-dev * commit 'cbe0916ebff2fc32d5a28fbd5bba9f0c3da1ae86': Do not report WiFi and Bluetooth MAC addresses - framework.
|
408abf7f1bec3253675d0225300d7ee39481d286 |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Do not report WiFi and Bluetooth MAC addresses - framework. As a part of the new runtime permissions work we are limiting the PII apps can access. BT and WiFi MAC addresses are PII and based on our research there is no valid use case for app dev to get these addresses aside of user tracking which we are trying to limit. bug:21078858 Change-Id: Ib48223b272c0fd4f5c36acc889d4f44df204b309
/frameworks/base/core/res/AndroidManifest.xml
|
86e86a77fc46ba08b8115058b16a4ff622e8bea6 |
|
17-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 11fe86ae: am a4f7ea55: am 321f0157: Hide platform platform legacy permissions behind a menu option - framework. * commit '11fe86ae6e30a4e642b9c7255af21c522334a147': Hide platform platform legacy permissions behind a menu option - framework.
|
321f01574e523dd680090694ea22e38b83a7c2b3 |
|
17-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Hide platform platform legacy permissions behind a menu option - framework. bug:21195624 Change-Id: I563c448e2abd7d33070ed2d8f62ba1b60a3744e8
/frameworks/base/core/res/AndroidManifest.xml
|
0bf27e9b0438a41c00a1713e0efb0f43dbfa0415 |
|
16-May-2015 |
Zach Johnson <zachoverflow@google.com> |
am 85f82784: am 4b197204: am a80282a7: Merge "Create unified BIND_CARRIER_SERVICES permission" into mnc-dev * commit '85f82784f88a6bd2a94ee5bf44b8d105bcb1671b': Create unified BIND_CARRIER_SERVICES permission
|
cdaaa91f7c67b2c56f17d5512f015c7c25c7c351 |
|
14-May-2015 |
Zach Johnson <zachoverflow@google.com> |
Create unified BIND_CARRIER_SERVICES permission Replace BIND_CARRIER_MESSAGING_SERVICE and BIND_CARRIER_CONFIG_SERVICE since we don't really need one permission for each carrier service type. Deprecate BIND_CARRIER_MESSAGING_SERVICE since it already shipped, but remove BIND_CARRIER_CONFIG_SERVICE since it hasn't. b/21165906 Change-Id: I716f3f1c98a228afcfee84cf4a48911f0736ce8c
/frameworks/base/core/res/AndroidManifest.xml
|
fb8026a8d9b239fe168a62e832e959d538b7e69f |
|
14-May-2015 |
Jaesung Chung <jaesung@google.com> |
am 614cb6f2: am 393fc7f0: am f5edb20a: Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev * commit '614cb6f2f0f01a35cab72e29d8c361f92d3208f2': TIF: Add DVB device handling to TvInputManagerService
|
4d78a792f636fa09f49e389965048c558ab14227 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
am 0cc30270: am 606e9e1c: am ad0bfe3a: Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev * commit '0cc30270274cfab889d0f710a426e95911824355': Add BIND_TELECOM_CONNECTION_SERVICE permission
|
f5edb20ae90ab9a817c8cf23b5a0d21fe8c80e2a |
|
14-May-2015 |
Jaesung Chung <jaesung@google.com> |
Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev
|
ad0bfe3ae2f056a568c6256614079e6f31f5d542 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev
|
58739e758428f3b880f8e67161f57c59aa06d496 |
|
24-Apr-2015 |
Jaesung Chung <jaesung@google.com> |
TIF: Add DVB device handling to TvInputManagerService Added an API to pass an open file descriptor of DVB devices and addressed the security issue of setting the permissions on DVB devices to 0666. Bug: 20436120 Change-Id: I4649e76084f3356ec22b7e776fb87c6a8fdc00d6
/frameworks/base/core/res/AndroidManifest.xml
|
4ec301faace5802797d860707d97cb29045a3ef4 |
|
14-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 59a49c03: am a82e4878: am 67b7ec28: Merge "Access mock location is no longer a runtime permission - framework" into mnc-dev * commit '59a49c0309e9cec01e33be07de74e3c530efa07f': Access mock location is no longer a runtime permission - framework
|
249c12e7b88fc7799c1b5e1eaf72429fc6aa56a2 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
Add BIND_TELECOM_CONNECTION_SERVICE permission Bug: 21088342 Change-Id: I465307899d83c4a3ee5e88a28554c4b867c1f4ba
/frameworks/base/core/res/AndroidManifest.xml
|
f7e9cf4fb48ea80cbc5088204ac3f898109623f7 |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Access mock location is no longer a runtime permission - framework The access mock location is no longer a runtime permission. It is a signature protected one that apps cannot get but the fact they request it means they want to inject location into the system. Now the user gets to choose the current mock location app in developer options from the apps that request the mock location permission. The access to mock location is no longer guarded by the permisson but from a new app op which is off by default and the settiings UI sets it to enabled only for the currently selected mock location app. bug:21078873 Change-Id: I19e3f9dc7c7de82eab46b30fec1abfbca54a0e59
/frameworks/base/core/res/AndroidManifest.xml
|
a1948682df1115aaf84920e018c7ca7739f6368f |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 129df089: am de69b559: am 20cb37c6: Merge "Lower protection level of permissions of permissions" into mnc-dev * commit '129df08914de2678fd9381ebfb2e19796d4679d5': Lower protection level of permissions of permissions
|
b467330b14fcd14f21e13c4dfeff97914e45cfbb |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of permissions of permissions Permissions ACCESS_NETWORK_STATE, INTERNET, NFC, DISABLE_KEYGUARD do not lead to unrecoverable damage and do not lead to PII leaks, hence they do not meet the bar to be runtime permissions and we are lowering their protection level. bug:21078873 Change-Id: I30c8e742d6a69474171994b65ce070068402ae47
/frameworks/base/core/res/AndroidManifest.xml
|
6102ad4678b19b0e1a2900f8e421fb3a7890c8e3 |
|
11-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
am 05f62d9d: am 50c21067: am 11a1086f: Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev * commit '05f62d9d0b4055b6344ca8c11683e0d85cdc2247': Improve javadoc on android.permission.PACKAGE_USAGE_STATS
|
11a1086f69abafc17e4fc6db38622d126a1a7ecc |
|
11-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev
|
763e170f58fb2f2221f615c7802521f7627039df |
|
06-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Improve javadoc on android.permission.PACKAGE_USAGE_STATS Bug: 20642656 Change-Id: Ib0cedee487950dab16134edd383ce5bd5374ff65
/frameworks/base/core/res/AndroidManifest.xml
|
a39b5ff076523d216cde0d9faa801cefa6272039 |
|
09-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
am 8bc22f52: am 85dbc345: am 4f434a04: Merge "Remove restrictions PIN functionality" into mnc-dev * commit '8bc22f521872d64af1c61c1d0845ae562cc5cb8f': Remove restrictions PIN functionality
|
4f434a04708e7a254afe2e0d362f715229dc15d1 |
|
09-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Remove restrictions PIN functionality" into mnc-dev
|
4cf355d209a2c159e2ab3e8e7405dec981ee5aa2 |
|
07-May-2015 |
Jeff Brown <jeffbrown@google.com> |
am 37d66f3b: am 8d605030: am ee2e8fbe: Merge changes from topic \'mr\' into mnc-dev * commit '37d66f3bccdde61517308b8d034484abbe82c36b': Replace WIFI_DISPLAY_SETTINGS with CAST_SETTINGS. Revert "Initial draft of new MediaRouter APIs."
|
c05c1aeedf44b7019b6749758dffc03df7632225 |
|
05-May-2015 |
Jeff Brown <jeffbrown@google.com> |
Revert "Initial draft of new MediaRouter APIs." This reverts commit 1a937b04e63539cb1fab1bde601031d415c7156f. Bug: 20641986 Change-Id: I035d945d1561e5fc7c914aa9362635f763c83cfd
/frameworks/base/core/res/AndroidManifest.xml
|
ef24909d84db9d5aefb825ee1556089fcdcc1678 |
|
06-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Remove restrictions PIN functionality Bug: 20852231 Change-Id: I5666ee28ff1341ead9b258bc0852d8ba6d313c5e
/frameworks/base/core/res/AndroidManifest.xml
|
558283e606aada276958517cc96814dd8abb2f37 |
|
06-May-2015 |
Alan Viverette <alanv@google.com> |
am 52796c28: am 39a96908: am 809d5d7f: Merge "DayNight theme for framework packages" into mnc-dev * commit '52796c28d580cfbbf398c90f48c1e06aca9ca7b1': DayNight theme for framework packages
|
b9da280ac20091673878f3c4b04c65d0510ba23d |
|
05-May-2015 |
Alan Viverette <alanv@google.com> |
DayNight theme for framework packages Change-Id: I745f90561c957c83540e75a2886e294633c83be1
/frameworks/base/core/res/AndroidManifest.xml
|
b0a09de8192cce008daff192a18d68040bf1ddbc |
|
05-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 4e2029c0: am 2514a265: am 4a64b19f: Merge "Permission UI - legacy apps support" into mnc-dev * commit '4e2029c058966f30a71b1bcea16aa65a5d7f85c4': Permission UI - legacy apps support
|
019d2304998f3ed77c0a608df6cf4bea1138f8dc |
|
04-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Permission UI - legacy apps support Change-Id: Id3f98c138422d33868363d587dd196898b42a0d4
/frameworks/base/core/res/AndroidManifest.xml
|
37ba44112c519bb055fcac2efebfb0a6e16d5cc0 |
|
01-May-2015 |
Zheng Fu <zhengfu@google.com> |
Add permissions to read/write contacts metadata Bug: 20537162 Change-Id: I5e12857e62635fccec52447404363bf0f1507594
/frameworks/base/core/res/AndroidManifest.xml
|
0b4daca9ba54b7252ea8c159218391380eb00c8a |
|
27-Apr-2015 |
Dianne Hackborn <hackbod@google.com> |
Implement user-settable power save whitelist. The whitelist is now maintained by DeviceIdleController, which is moving out into its own independent system service. Network stats now queries it for the whitelist, instead of collecting that itself. Also did a few improvements in alarm manager -- made the code for moving alarms out of the pending list more robust, and fixed the debug output to always print the contents of the pending list even if we aren't in a pending state. (That would have helped me identify the problem much earlier.) Change-Id: I0f7119d4c553c3af4d77b2f71246fa6e2c13c561
/frameworks/base/core/res/AndroidManifest.xml
|
e9d766a312b766a16155872cfae796b4979dce9e |
|
29-Apr-2015 |
Yorke Lee <yorkelee@google.com> |
Make BIND_INCALL_SERVICE and BIND_CONNECTION_SERVICE public These system|signature only permissions must be required by an InCallService and ConnectionService respectively. Bug: 20304458 Change-Id: I26156afb610a7f549c0a1a7c01c2096928ef33a7
/frameworks/base/core/res/AndroidManifest.xml
|
cd895cdf4dd98b4271e24742a6a46be70cda6382 |
|
25-Apr-2015 |
Etan Cohen <etancohen@google.com> |
Merge changes from topic 'mwd-merge-042415' * changes: Rename removeVideoCallListener to unregisterCallback Bluetooth document fix: remove reference from open API to hidden entities Fix build due to merge of 7595842 and renaming due to 8eb87f0 Merge commit '052a0da' into merge2 Merge commit 'db1dbb8' into merge2 Merge commit '7e5e791' into merge2 Merge commit '170102d' into merge2 Merge commit '4cb5d80' into merge2 Merge commit '83cda00' into merge2 Merge commit 'c91bc62' into merge2 Merge commit 'cffc360' into merge2 Merge commit '7f61051' into merge2 Merge commit '167c3a7' into merge2 Merge commit '4467b98' into merge2 Merge commit '25a217c' into merge2 Merge commit '04b18ec' into merge2 Merge commit '7595842' into merge2 Merge commit '2bbd2b6' into merge2 Merge commit '4890351' into merge2 Merge commit 'cd405fe' into merge2 Merge commit '6ddbb5e' into merge2 Merge commit 'de93575' into merge2 Merge commit '9561e74' into merge2
|
a179962b61a9c41e8859ce642471928f1ad33c60 |
|
24-Apr-2015 |
Etan Cohen <etancohen@google.com> |
Merge commit '25a217c' into merge2 Change-Id: I116a9dbf19e95651a7c50393e4dcd7fb59ca3f3f
|
4bc704655abee70c1998b9a62777cdf643920467 |
|
24-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Merge "Add ability to get and set idle state of apps"
|
cf76872a62075abf9008e99ca08413fb70761dc2 |
|
24-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Add ability to get and set idle state of apps Add am shell command to set and get idle Add public API to check if an app is idle Bug: 20534955 Bug: 20493806 Change-Id: Ib48b3fe847c71f05ef3905563f6e903cf060c498
/frameworks/base/core/res/AndroidManifest.xml
|
2806374f9531490296547d4e884ce9163f4ac867 |
|
08-Jan-2015 |
Nicolas Prevot <nprevot@google.com> |
Restrict setting the profile/device owner with a signature-level permission. Create the new permission MANAGE_PROFILE_OWNERS to restrict setting the profile/device owner. BUG:19838376 Change-Id: Ib55a2db85fcb6f34e3b88c398683bddb0ad66868
/frameworks/base/core/res/AndroidManifest.xml
|
dc105cc91c63c27479d73a21702cd4ba0304acc4 |
|
15-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Enable system service to notify device owners about pending update Create a DevicePolicyManager API which can be used by OTA subsystem to tell device owners about pending updates. Device owners will get a callback from its DeviceAdminReceiver when the update service sends out such notifications. Bug: 20213644 Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/res/AndroidManifest.xml
|
8abf680e007a378c2828fe43ed8d71131390ec2e |
|
20-Apr-2015 |
Martijn Coenen <maco@google.com> |
Add NFC APIs for dynamic resources. For new Tap & Pay settings UX. Change-Id: I55ff4e4d4a4b6d26c3c88d96431c4f14d0963323
/frameworks/base/core/res/AndroidManifest.xml
|
4eb6a36922f5e98fe181c0326cc5721f0e7589ca |
|
02-Apr-2015 |
Andrei Kapishnikov <kapishnikov@google.com> |
Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag A new flag for DPM.resetPassword() method that specifies that the device should be decrypted without asking for the password or pattern. Bug 19250601 Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206 Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/res/AndroidManifest.xml
|
17e11fad0a6272dd750427e2e4cb9810e67b6dec |
|
21-Apr-2015 |
Erik Kline <ek@google.com> |
Final removal of CONNECTIVITY_ACTION_IMMEDIATE. Since the demise of the connectivity change delay, CONNECTIVITY_ACTION_IMMEDIATE has been sent out back to back with CONNECTIVITY_ACTION. Interested parties should watch for CONNECTIVITY_ACTION. Bug: 20013379 Change-Id: I072dddf95adb3bbd17fa1f7159d4ea848ade8f19
/frameworks/base/core/res/AndroidManifest.xml
|
97e2f7d5afebb107a8c2c65a094ae4426bbe701b |
|
21-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Rename public OTA policy APIs in DevicePolicyManager"
|
5faad8e4cdf04211239f076b5d073e26d0ae3207 |
|
20-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Rename public OTA policy APIs in DevicePolicyManager Use the term "SystemUpdate" instead of "OTA", in public DevicePolicyManager APIs that handle OTA policies. Bug: 19650524 Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/res/AndroidManifest.xml
|
6c589570c44752d96f35620de271ccae7d32502d |
|
17-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Remove unnecessary WRITE_SMS permission - framework Currently only one app can write to the SMS provider and it has to be set as the default SMS app by the user in the UI. The default SMS app is set by enabling the write SMS app op for it and keeping this op off for other SMS apps. Hence, this permission does not guard anything and can be taken out. The API change is fine as if an app refers to the permission in the manifest as string it will be ignored and if it was referred in Java the value is statically compiled in the source. Change-Id: I1128c3b034e6c7dda4baa051500ac1ef46a53575
/frameworks/base/core/res/AndroidManifest.xml
|
8fcd5fee60b468c36aee337da0cadad3cd8cf4cd |
|
16-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Lower protection level of access mock location permission"
|
9a1c9b67c4b2426884deb60c1ff84130ab47333c |
|
25-Feb-2015 |
Jonathan Basseri <misterikkit@google.com> |
Adding Carrier Config API. UICC privileged carrier apps will extend CarrierConfigService to provide carrier-specific configuration. Apps/services will use CarrierConfigManager to read the current configuration. CarrierConfigManager also defines the set of configuration variables and their default values. Bug: b/19483786 Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
|
25a217c0fbda9bbaf58ec08b91115e99f73b727f |
|
28-Feb-2015 |
Paul Jensen <pauljensen@google.com> |
Add captive portal API. This API allows apps other than the system's CaptivePortalLogin to handle signing in to captive portals. bug:19416463 Change-Id: I27fce5856b635233e6ff66396d50ccabedd76cf5
/frameworks/base/core/res/AndroidManifest.xml
|
3031bf961103ecc1caa32449a3cdb95575042278 |
|
25-Feb-2015 |
Jonathan Basseri <misterikkit@google.com> |
Adding Carrier Config API. UICC privileged carrier apps will extend CarrierConfigService to provide carrier-specific configuration. Apps/services will use CarrierConfigManager to read the current configuration. CarrierConfigManager also defines the set of configuration variables and their default values. Bug: b/19483786 Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
|
df0db7fe83bfab2926e098a5198f43be299d0632 |
|
15-Apr-2015 |
Ben Gruver <bgruv@google.com> |
Merge "Don't verify signatures in ConfigUpdateInstallReceiver"
|
7f24225e5e363613eb4f5027d07c32a9acf457f3 |
|
14-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Lower protection level of access mock location permission The ACCESS_MOCK_LOCATION permission is gated by a secure setting toggled in developer options by the user. Hence, there is no need for getting yet another consent from the user for accessing it. Change-Id: Ica1a72f587a712d7da7c00cfc4a8ca228064286e
/frameworks/base/core/res/AndroidManifest.xml
|
1441fc73e87fed4d5df84e5e19c14c2a4307b23b |
|
14-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Mark the SUBSCRIBED_FEEDS_READ/WRITE permissions removed. These permissions are definded by the platform to protect the subscribed feeds provider which is not in the system, neither is its contract specified in the system. Both the contract and the implementation of the provider are in GmsCore. Hence, this permissions shuld be declared by GmsCore, not the system. Until GmsCore adds the permissions we have to keep this as removed but present in the implementation to keep apps that use the provider working. bug:20192150 Change-Id: I3f38b01a159bb430c30948b14de7cdaf5cb50772
/frameworks/base/core/res/AndroidManifest.xml
|
8027a4ffc285ba39df3a262abfff1cfdd6dd31db |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add setOtaPolicy/getOtaPolicy API in DPMS Allow device owners to set OTA policy for automatically accept/postpone incoming OTA system updates. This class only provides the setting and getting of OTA policy, the actual OTA subsystem should handle and respect the policy stored here. Bug: 19650524 Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/res/AndroidManifest.xml
|
12964bf5dd36d13fc25efef7c7175a677f9490a5 |
|
06-Apr-2015 |
Ben Gruver <bgruv@google.com> |
Don't verify signatures in ConfigUpdateInstallReceiver Instead, require the intent sender to hold the new system-or-signature UPDATE_CONFIG permission. An application holding this permission is now responsible for verifying the integrity/source of an update, before sending it to one of the ConfigUpdateInstallReceiver subclasses. Bug: 8949824 Change-Id: I0925051c1dcef312b8508fb34927150ffbc346f9
/frameworks/base/core/res/AndroidManifest.xml
|
ef8fcb52dc887603b8a08f9bd97c7d4917a00081 |
|
13-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Send device initializer status."
|
dbe31a6616f2e8cb8436ea235149d076302fb793 |
|
02-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Send device initializer status. - Create method in DevicePolicyManager to send device provisioning status to ManagedProvisioning. - Define status updates used by ManagedProvisioning. Bug: 20001077 Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/res/AndroidManifest.xml
|
61a4dd5c6677048fcbcbdf2de402649dba50bbeb |
|
09-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
First pass on the new permission grouping. 1. Defining the new permission groups and moving relevant permissions to these groups. 2. Removed some permissions that were guading ... nothing and old permission groups. 3. Removing unnecessary comments for siganture and system permissions as they are no surfaced to the user. Change-Id: Ibd7e6bb22b3559a4febb37c39326350eeb4285bd
/frameworks/base/core/res/AndroidManifest.xml
|
caa41648f4e3cecc1996447396aabc4e394b8fd0 |
|
10-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Allow only system signed apps to grant permissions at install"
|
805b63e253c139625f5a86d72ef7b31d6ec9f8e9 |
|
10-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow only system signed apps to grant permissions at install bug:20099946 Change-Id: Ifcc5c6638b4174ffb3ba452ae68a5a53b2d1ff0a
/frameworks/base/core/res/AndroidManifest.xml
|
2a91bbfb4d19c7262abc063b3c0c0349059311d5 |
|
10-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Reset protection in PersistentDataBlockManager"
|
66445a639dc134d09393f5069b7683ec36d4cd07 |
|
27-Mar-2015 |
Craig Lafayette <craiglafa@google.com> |
Reset protection in PersistentDataBlockManager Add method to allow authorized data block wipe in support of factory reset protection. This will allow ManagedProvisioning to respond to and pass factory reset protection challenges during automated device setup. - Adds the wipeIfAllowed method to clear the data block - Creates a protected-broadcast to send to allowed package Bug: 19792435 Change-Id: I897f2ea2afb1222a1fc8ac49290ee45ea4d3f2d7
/frameworks/base/core/res/AndroidManifest.xml
|
4870e9d5eba59fb257a87f97f1adf0b734cf48d3 |
|
09-Apr-2015 |
Dianne Hackborn <hackbod@google.com> |
More work on device idle mode and other power stuff. Add idle mode support to the alarm manager. Introduce a new concept of flags associated with alarms to tell the alarm manager how to treat the alarm -- they allow everything from the alarm that will bring us out of idle mode, to alarms that are allowed when idle or should also bring us out of idle. The standalone boolean is now also a flag. (Note there is currently no protection from user space setting the flags however it wants; I will be working on that in a follow-up change.) When in idle mode, the alarm manager pushes all alarms that shouldn't execute during that time over to a separate list that is not executed until out of idle. To help with this, I reworked a bit how Alarm objects are managed, so that when rebatching or moving between lists we don't have to allocated new objects but can just use the same existing instance. Also tweaked the sync manager to deal with idle mode, which currently just means doing the same thing as when low on storage -- turning off sync. Add new ACTION_CHARGING and ACTION_DISCHARGING broadcasts that apps can listen for to know when the device is actively charging and discharging. These are better than the old POWER_CONNECTED and POWER_DISCONNECTED ones because we only report charging when we actually see that there is enough power being provided to charge the battery (and will report discharging if there is not enough power). The job controller uses these new actions for scheduling jobs that want to run while plugged in. Removed the "stable charging" stuff while doing so, since the new charging state serves as an even better signal for that. Introduced two new process states: FOREGROUND_SERVICE and TOP_SLEEPING. This will allow us to treat foreground services specially (such as still allowing network access to them for background music playback) while not mixing them together with whatever happens to be the top activity while the device is asleep. Also some other small cleanup here and there. Change-Id: I7a9808b578bad6f50deb8e1baf919298512a0d3a
/frameworks/base/core/res/AndroidManifest.xml
|
25e12abc5b8a4aa83cfa150094fd145b777e6e03 |
|
02-Apr-2015 |
Jorim Jaggi <jjaggi@google.com> |
Add ability to start voice interaction session directly Add internal API's for SystemUI to start a voice interaction session directly, without using an intent. Make the assist gesture use that ability, if available. Change-Id: I88ce3c7514714eb45666884847193585a07417a9
/frameworks/base/core/res/AndroidManifest.xml
|
885b3ef519e5b0b67a896fb6693925b9b2fd22c6 |
|
02-Apr-2015 |
Santos Cordon <santoscordon@google.com> |
Merge "New generic intent for SIM Activation"
|
15a13781ad17bbc7e8ddbbad4d0c208f0fae615e |
|
01-Apr-2015 |
Santos Cordon <santoscordon@google.com> |
New generic intent for SIM Activation New hidden intents and permissions for a generic SIM-activation activity. New activity will handle generic SIM setup requests and then delegate to the appropriate activation method (OTASP, HFA, CARRIER_SETUP). Change-Id: I1b22200544abefe486ec961b67a6e77b4d15aec3
/frameworks/base/core/res/AndroidManifest.xml
|
095d99904579a5231d974a2447661c10a8eb621b |
|
01-Apr-2015 |
Ruben Brunk <rubenbrunk@google.com> |
Merge "Add CameraService to system server."
|
9d21ee5d7755755cc5695a9d7cea00a05a4b92aa |
|
21-Mar-2015 |
Ruben Brunk <rubenbrunk@google.com> |
Add CameraService to system server. - Adds a camera service to system server that forwards events to the mediaserver camera service. - Notify the camera service when the device user changes. Bug: 19186859 Change-Id: I172a2ce46c8e8a131ae7e8dd99d60c5f4f0d6668
/frameworks/base/core/res/AndroidManifest.xml
|
cea283535cfecc81565c07597d8db2674e76578a |
|
31-Mar-2015 |
Neil Fuller <nfuller@google.com> |
resolved conflicts for merge of 962a11ad to master Change-Id: I8c6ac62d7267629c019997bb343d863aa56264eb
|
efd92907898161efe466889d2229e4acde2e973c |
|
31-Mar-2015 |
Neil Fuller <nfuller@google.com> |
am 25c5296b: Merge "An updater for all timezone data on a device" * commit '25c5296b0d85979ad216195000b857dce8127ab1': An updater for all timezone data on a device
|
1c1b47125da018b44240739db75f8898e064a948 |
|
20-Nov-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Add IntentFilter auto verification The purpose of this feature is to prompt the Disambiguation dialog to Users as less as possible. - add the new "autoVerify" property to the IntentFilter class - add new APIs to PackageManager: verifyIntentFilter(int, int, List<String>), getIntentVerificationStatus(String, int), updateIntentVerificationStatus(String, int, int), getIntentFilterVerifications(String) for supporting IntentFilter verification - add support for multi-user - update PackageManager for IntentFilter verification: basically when we are installing a new package, ask for verification of all domains from the IntentFilters that have the "autoVerify" to true. This means that the PackageManager will send a well defined protected broadcast (with a new INTENT_FILTER_NEEDS_VERIFICATION action) to an IntentFilter verifier to do the real job of verification. We are passing in the broadcast Intent all the necessary data for doing the verification. The PackageManager will receive as response the result code of the domain verifications and, if needed, the list of domains that have failed the verification. - add a new INTENT_FILTER_VERIFICATION_AGENT permission that needs to be set by an intent filter verifier to be considered as a trustable party by the PackageManager. - add also a new BIND_INTENT_FILTER_VERIFIER permission for securing the binding between the PackageManager and a service doing the intent filter verifications. - add ResolveInfo filterNeedsVerification which is a boolean to knows if the IntentFilter is of a type that needs a verification (action VIEW, category BROWABLE, HTTP/HTTPS data URI) - add new "domain-preferred-apps" / "d" dump command for listing the prefered Apps for all domains - add new "intent-filter-verifiers" / "ivf" command for listing the IntentFilterVerifier used - introduce the IntentVerificationService which is a basic service for verifying IntentFilters. This service will send HTTPS requests to the domain declared in the IntentFilter(s) for doing the verification. This service has a low priority level so that it can be replaced by a more sophisticated one if needed. This service is updating the PackageManager intent verification states thru the updateIntentVerificationStatus(...) API. - update MockPackageManager Change-Id: I0bfed193d0bf1f7c7ac79f6c1b160b7ab93b5fb5
/frameworks/base/core/res/AndroidManifest.xml
|
5a680f2e2738137f1566da57ac978b3ff33fb0da |
|
13-Mar-2015 |
Neil Fuller <nfuller@google.com> |
An updater for all timezone data on a device The existing one, being deleted here, did not work properly: it only updated the file used by libcore and bionic, it did not update the ICU data. Most of the installation logic exists in code in libcore/tzdata that is independent of the server code so that it can be tested. Bug: 19941636 Change-Id: Id0985f8c5be2f12858ee8bf52acf52bdb2df8741
/frameworks/base/core/res/AndroidManifest.xml
|
a223d658306fea5c0a6d30c9850058d5afadb2d1 |
|
25-Mar-2015 |
Bryce Lee <brycelee@google.com> |
am 3309be5e: am 21b7e6de: am c831b978: Merge "Add isScreenBrightnessBoosted and a broadcast when underlying value changes." into lmp-mr1-modular-dev * commit '3309be5e7bc782d89adaf4abca5f1f81649c655f': Add isScreenBrightnessBoosted and a broadcast when underlying value changes.
|
9c5dfa5c79fff17f96bf977b86c0c9ceb8c3cf9b |
|
23-Feb-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Data Usage public API Added new API consisting of android.app.usage.NetworkUsageManager and android.app.usage.NetworkUsageStats. Through them data usage on a network interface can be programmatically queried. Both summary and details are available. Bug: 19208876 Change-Id: I0e0c4b37ae23ad1e589d4b0c955b93f28ba4333e
/frameworks/base/core/res/AndroidManifest.xml
|
84d6c0fbf6e513d68330234503b809751d0e3564 |
|
17-Mar-2015 |
Bryce Lee <brycelee@google.com> |
Add isScreenBrightnessBoosted and a broadcast when underlying value changes. Bug: 18334219 Change-Id: I20051e97633017711574a063b8061f95c3b616c5
/frameworks/base/core/res/AndroidManifest.xml
|
6597e3435f8abfedbb9a4f1bfb10cc17ea7f38bf |
|
17-Feb-2015 |
Christopher Tate <ctate@google.com> |
Notification listener backup & restore We now back up & restore the set of enabled notification listeners. Post- restore, a listener that had been enabled on the ancestral device will be enabled on the current device as soon as it's installed, matching the user's previous configuration. After this has happened the enable/disable state for that app is not "sticky"; disabling it again will work as expected. The infrastructure for accomplishing this is general: it can be leveraged by any ManagedServices derivative. There's a bit of extra wiring in the settings provider to support the restore-time information flow as well. This is because ManagedServices -- like many other parts of the system -- monitors writes to the settings provider and does work in response to new writes of the elements that it cares about. Unfortunately this means that there is no way to use the BackupAgent's restoreFinished() hook to post- process the restored data: by the time it is run, the ManagedService's observers have already executed and culled any unknown components from the description that was just pushed into settings. As of this patch, the settings provider's restore logic knows that a particular settings element will require a message to interested observers about the restore-driven change. The message is delivered as a broadcast, and is sent after the new value has been committed to the settings db. Adding other system ManagedService handling that parallels this will only require adding a new corresponding entry to the table of individual settings for which the relevant "this settings element is being restored" broadcast is sent, found in SettingsHelper. (It isn't sent for all settings elements because very few settings elements have semantics that require it; 3rd party code won't be running yet during platform restore anyway; and sending up to hundreds of broadcasts during setup & restore is far from ideal.) Bug 19254153 Change-Id: Ib8268c6cb273862a3ee089d2764f3bff4a299103
/frameworks/base/core/res/AndroidManifest.xml
|
b9a5e4ad30c9add140fd13491419ae66e947809d |
|
04-Mar-2015 |
Dianne Hackborn <hackbod@google.com> |
Add new debug feature to automatically create heap dumps. Not yet working, unless you turn off SELinux enforcing. We need to update SElinux to allow the system process to give apps access to /data/system/heapdump/javaheap.bin. Currently watching can only be enabled through the shell, such as: adb shell am set-watch-heap com.android.systemui 1024 The last number is the process pss size in bytes, so this is asking us to warn if it goes about 1K which will be all the time. Change-Id: I2089e5db2927afca0bf01a363c6247ee5dcb26e8
/frameworks/base/core/res/AndroidManifest.xml
|
e30c9af3566cfa14796144b352230709c7b5647d |
|
28-Feb-2015 |
Adam Powell <adamp@google.com> |
Add ChooserTargetService API A ChooserTargetService can be implemented by apps that wish to offer additional deep-link targets for the system intent chooser to in turn offer to the user. This allows apps to create contextually relevant shortcuts for UI flows that would otherwise require several steps of explicit disambiguation. For example, a chat app might offer one-touch access to recent conversations when sharing a photo to it from elsewhere. The chooser implementation must limit the number of ChooserTargetServices it elects to query in order to respect available system resources. Only the system chooser is permitted to bind to a ChooserTargetService. Change-Id: Ia7e075ee649c51cf2035f20aee166c5a27d91aeb
/frameworks/base/core/res/AndroidManifest.xml
|
73570db59f9178cf3a8affe943e96808ac404049 |
|
27-Feb-2015 |
Christopher Tate <ctate@google.com> |
Use scheduled job rather than periodic alarms for key/value backups Instead of a runs-forever periodic alarm that drives key/value backup passes, we instead schedule-on-demand a trigger job that will kick off the pass after a batching interval. The key semantic change is that we now never wake for key/value backup work unless we've been explicitly asked to do so. We also use a rather longer batching interval than was previously the case. Bug 19536032 Change-Id: Ie377562b2812c9aeda0ee73770dfa94af6017778
/frameworks/base/core/res/AndroidManifest.xml
|
ba67aee02cf864793129976cd8a8a46e60c60577 |
|
21-Feb-2015 |
Jim Miller <jaggies@google.com> |
Add fingerprint settings support to the framework - cleanup thread issue and simplify native FingerprintService methods - add new permissions and enforce them - add fingerprint hardware detection API Change-Id: I87c2243ea2412061f1e85b044138480d0161bcdf
/frameworks/base/core/res/AndroidManifest.xml
|
cfb3185a27efeb9312ddf71f52f3a7039c4694df |
|
25-Feb-2015 |
Filip Gruszczynski <gruszczy@google.com> |
am 0fbcc708: am 1e74b5d6: Merge "Burn in protection." into lmp-mr1-modular-dev * commit '0fbcc7086fe742e641915ed5f097119d01613cb5': Burn in protection.
|
d2e8640c2c1972d4f2e92d48660fa9e17d9291c4 |
|
19-Feb-2015 |
Filip Gruszczynski <gruszczy@google.com> |
Burn in protection. Bug: 19373758 Change-Id: I7242f73acadd21bdee03262b4205c8af0734fccb
/frameworks/base/core/res/AndroidManifest.xml
|
98a0b38819acab3c6068663435cdaeed5a69d4db |
|
27-Jan-2015 |
Mike Lockwood <lockwood@google.com> |
AndroidManifest.xml: Remove two obsolete protected broadcasts android.media.action.USB_AUDIO_ACCESSORY_PLUG and android.media.action.USB_AUDIO_DEVICE_PLUG were removed in a previous change. Change-Id: I22d09b9a0eb4f6f29a31a50ed8bfa7e09c52b064
/frameworks/base/core/res/AndroidManifest.xml
|
5f86b66c9bd9276f31255fc372631e532dd5d974 |
|
06-Jan-2015 |
Dianne Hackborn <hackbod@google.com> |
am 24bc8d76: am 29807195: Merge "Fix issue #18901214: APR: Frequent crash in android" into lmp-mr1-dev automerge: d17218e * commit 'd17218e7df24da8a2bcf6e7714dc0151155c3286': Fix issue #18901214: APR: Frequent crash in android
|
b182955a1eabc30d3cf70856f838b46a91c34569 |
|
05-Jan-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #18901214: APR: Frequent crash in android The ShutdownActivity was implemented in the system server code, which is no longer part of the boot class path. This would work fine when requesting a shutdown from the primary user, since in that case the activity would be loaded in to the main system process which also has the system service code loaded. However, when executed from a secondary user, we need to spin up a new system process for it; that system process is just a regular app process, without the system service code, so *boom*. To fix this, move ShutdownActivity to the framework jar. Change-Id: Icb831cd6ed619da5feede5605c45ef177a892fbc
/frameworks/base/core/res/AndroidManifest.xml
|
a0973778ca5d67e13149ee8ad46a916663fe3d48 |
|
09-Dec-2014 |
Jing Zhao <zhaojing@motorola.com> |
am 8d50d0fb: am 23ad6efb: am df1d07b4: Add checking to find AppDirectedSmsProxy for App Directed SMS feature * commit '8d50d0fb27c1958dbd047bb8a46d7183d873f131': Add checking to find AppDirectedSmsProxy for App Directed SMS feature
|
8b3f47b35a303ed21bf41162d2979843d50e6039 |
|
09-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
am 673f443f: am 695b5d25: am 0752da22: Merge "add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE" into lmp-mr1-dev * commit '673f443f7e92956399c322b31a14178436fa723b': add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE
|
df1d07b4c77bcc8928b2e5360440aa9b69a6cd21 |
|
05-Dec-2014 |
Jing Zhao <zhaojing@motorola.com> |
Add checking to find AppDirectedSmsProxy for App Directed SMS feature Adding new system permission android.permission.CARRIER_FILTER_SMS Bug: 18609762 Change-Id: I80a133653101cd4ec1793e726faf3601e2970224
/frameworks/base/core/res/AndroidManifest.xml
|
981344861cdea72580964d6936dcf2e2dd9ff439 |
|
05-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE Bug: 18005911 Change-Id: Iacb16a20c5cef4a55be0187af0a47e0cb82b409b
/frameworks/base/core/res/AndroidManifest.xml
|
412766a7d6e7b208cd347f90a776d3aff2fd2e2f |
|
04-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
am 29ac679f: am dba26aa2: am 109ec376: Merge "new SMS/MMS carrier app API" into lmp-mr1-dev * commit '29ac679f9f85a68eca03c262e740d62f8af66797': new SMS/MMS carrier app API
|
109ec376da86de1275f73fa432d6344431a457e9 |
|
04-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
Merge "new SMS/MMS carrier app API" into lmp-mr1-dev
|
008dfadb31f58efbd7bd99b3d3e5d6ee21d68c05 |
|
02-Dec-2014 |
Mike Lockwood <lockwood@google.com> |
Remove obsolete AudioManager audio dock plugged Intents We have no code that listens for AudioManager.ACTION_ANALOG_AUDIO_DOCK_PLUG and AudioManager.ACTION_DIGITAL_AUDIO_DOCK_PLUG Change-Id: I96a746c84e5a4b17df1b9fbdbb5de77e6bc39714
/frameworks/base/core/res/AndroidManifest.xml
|
b72eb97e4bca1e4fd68e79f9d04e9a6a15aebd21 |
|
22-Nov-2014 |
Cheuksan Wang <edwang@google.com> |
new SMS/MMS carrier app API Changes based on api council review BUG: 18005911 Change-Id: I23bd207ce70f7fa201d6d964c1700cfc44cb009b
/frameworks/base/core/res/AndroidManifest.xml
|
8f70a2558b44f8ad56eb48eeadc4ec3ba698cd34 |
|
25-Nov-2014 |
Andres Morales <anmorales@google.com> |
am ffc71028: am 83f4847f: am 59093d92: Merge "Define permission for system apps to query size of block" into lmp-mr1-dev * commit 'ffc710281c38aba9546d200a25d6b19b0f85470a': Define permission for system apps to query size of block
|
6b0c7acd7f175552d90d1d73b9717ff347158e7d |
|
24-Nov-2014 |
Andres Morales <anmorales@google.com> |
Define permission for system apps to query size of block Allows ManagedProvisioning to determine whether there's a challenge and thus whether to disable NFC provisioning. Other implementation option: new hidden boolean API method. Can't think of benefit of new API method "isBlockInUse", other than doesn't leak PDB size and is more explicitly tied to the use case. Open to either impl if anyone has opinions on the matter. Bug: 18508767 Change-Id: I28d2eb5a0837ff85cb91f140b17ce1dd843fe9d6
/frameworks/base/core/res/AndroidManifest.xml
|
c79924f7412d527f640595bc2ad9f2ab631e83b7 |
|
18-Nov-2014 |
Jeff Davidson <jpd@google.com> |
am b431a198: am e6bc5adf: am e0cb56b0: Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev * commit 'b431a198ec255be7efb30b4c81a779a4eb5009f6': Enforce VPN control "permission" with an actual permission.
|
e0cb56b02eb2bb52a537b32c5d3f5360b9718c8a |
|
17-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev
|
e3435feed48ecd1f37904f48ebb7e39dc9456d03 |
|
14-Nov-2014 |
Abhijith Shastry <ashastry@google.com> |
am 0f064207: am 530f25d6: am fb8db1c8: Merge "new sms/mms carrier app API" into lmp-mr1-dev * commit '0f0642075e42f415d7f5244c5d94fe726756afa0': new sms/mms carrier app API
|
fb8db1c84b7fd59f596a6c090a8035fab08ef2f5 |
|
13-Nov-2014 |
Abhijith Shastry <ashastry@google.com> |
Merge "new sms/mms carrier app API" into lmp-mr1-dev
|
f9c50c45c615338bf9bfe57cd1ecff490051c997 |
|
22-Oct-2014 |
Cheuksan Wang <edwang@google.com> |
new sms/mms carrier app API BUG: 18005911 Change-Id: Ib961badc1ccac270f1244f8d971d9abec324b73f
/frameworks/base/core/res/AndroidManifest.xml
|
bc19c181c8c058c824e4fee907a05129e142c388 |
|
11-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Enforce VPN control "permission" with an actual permission. The current implementation uses a whitelist of package names. Use a system|signature permission instead of rolling our own security and add that permission to the existing set of whitelisted packages (SystemUI and VpnDialogs). In addition to being less of a security risk (using well-known methods like Context.enforceCallingPermission rather than manually querying PackageManager and checking UIDs for package names), this enables other system-privileged apps to control VPN as needed per the below bug. Bug: 18327583 Change-Id: I38617965c40d62cf1ac28e3cb382c0877fb1275d
/frameworks/base/core/res/AndroidManifest.xml
|
3b54b6d78ccb653bcb7a24f55cdf0ac1b999ead9 |
|
11-Nov-2014 |
Alan Viverette <alanv@google.com> |
am cf7f3b6b: am a9b503ae: Merge "Fix Material styling in remaining dialogs and layouts" into lmp-mr1-dev automerge: 0aaebd4 * commit 'cf7f3b6be252f313536e58cc62763075d4f45e5a': Fix Material styling in remaining dialogs and layouts
|
f89b58ca834de833fe45130f49270b3743240b2e |
|
11-Nov-2014 |
Alan Viverette <alanv@google.com> |
Fix Material styling in remaining dialogs and layouts Also updates existing row and dialog layouts to use preferred list item or dialog padding as appropriate, fixes incorrect activity themes, and updates ChooseAccountActivity variants for Material. BUG: 18314215 BUG: 18292562 Change-Id: I2fde4ba6db80d839104abdaa334a46ad1861600f
/frameworks/base/core/res/AndroidManifest.xml
|
12fc80b2b207612f58fa057b8372bef3f32c9d29 |
|
10-Nov-2014 |
Evan Charlton <evanc@google.com> |
am 13cf9cf1: am 3caf6fc7: Merge "Apply @hide / @SystemApi to android.telecom.*" into lmp-mr1-dev automerge: e2e649f * commit '13cf9cf1d3f426d82a2af46c36bdf308ff43d428': Apply @hide / @SystemApi to android.telecom.*
|
0e094d926c306c3667bcdf6f23c52cc7181f25f3 |
|
09-Nov-2014 |
Evan Charlton <evanc@google.com> |
Apply @hide / @SystemApi to android.telecom.* Move the android.telecom.* namespace back to @hide, and also mark it with @SystemApi so that system-privileged apps can use them. Bug: 18302450 Change-Id: I33ae1b9b0dfdb1c5eff51ca3c829196bcfc9411c
/frameworks/base/core/res/AndroidManifest.xml
|
3527aa01cdb35f4bfad4e2f5b062c1a47838b224 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
am fb68a976: am dd40ccf3: am b42bdef5: Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev * commit 'fb68a9762087a262146eec5d0e0d3fbdbdf25b6b': Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED.
|
b42bdef51c5a4de44333ad268f25df1aac5ab880 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev
|
161977998feebf0a855ea56558464470877040cf |
|
04-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED. This is necessary/desired for two reasons: 1. UX around network scoring shipped with L despite lacking underlying platform support. We do not want network scoring applications to trigger this UX on L devices, and therefore we must break the contract of what defines a network scorer so that apps build against the new contract don't trigger the old UX. 2. As a start towards generalizing the term "score" for a potentially broader role in the future, though that role is very much undefined. Bug: 18160480 Change-Id: If228977513e32e45bc44dbeda24aa18436fdfca6
/frameworks/base/core/res/AndroidManifest.xml
|
71a4f2129f33df6a4ef1efeb00af0f449aae2d45 |
|
03-Nov-2014 |
Santos Cordon <santoscordon@google.com> |
am 082f4978: am 04f3eebe: am 27be7b35: Merge "Split Telecom PhoneAccount registration permissions." into lmp-mr1-dev * commit '082f49786ec25b254992781a5ad3c67e75ceb8ee': Split Telecom PhoneAccount registration permissions.
|
2ef87ee728e7ac76c9199f0b75c96835991c0ceb |
|
31-Oct-2014 |
Santos Cordon <santoscordon@google.com> |
Split Telecom PhoneAccount registration permissions. Bug: 18106506 Change-Id: Ic825b44c2dc42709073a3990f6a7ca8e372025e9
/frameworks/base/core/res/AndroidManifest.xml
|
b2dda6903131d7534fc2e92d0049f05821f36210 |
|
28-Oct-2014 |
Evan Charlton <evanc@google.com> |
am 4d4b2cfd: am 2ad5eb53: Merge "Move telecom permission to the public API" into lmp-mr1-dev automerge: 8e25057 * commit '4d4b2cfd4c611800787b71d0896c6d8781875732': Move telecom permission to the public API
|
cef5a5404a7c61667883cc1fdff842355bc511e9 |
|
25-Oct-2014 |
Evan Charlton <evanc@google.com> |
Move telecom permission to the public API Make REGISTER_PROVIDER_OR_SUBSCRIPTION and REGISTER_CONNECTION_MANAGER part of the public API so that they can be used by third-party apps. Bug: 18114695 Change-Id: I1b8578cbc82e95ea78b4a2166f4a23650a0c375f
/frameworks/base/core/res/AndroidManifest.xml
|
be11d12462c800d3a7770b2871b1c31128f688fd |
|
20-Oct-2014 |
Wink Saville <wink@google.com> |
am f9bec04d: am f4d86a1d: am f44628e3: am 6bacccbf: Merge "Radio Capability Support." into lmp-sprout-dev * commit 'f9bec04d89ce6270d71b738be341f3e443abcce5': Radio Capability Support.
|
2af2d57d578e0c3a2740628e7c6336b19961cc49 |
|
18-Oct-2014 |
Wink Saville <wink@google.com> |
Radio Capability Support. New design of capability switch for L. Add new RIL requests: RIL_REQUEST_GET_RADIO_CAPABILITY RIL_REQUEST_SET_RADIO_CAPABILITY RIL_UNSOL_RADIO_CAPABILITY These commands allow the framework to communicate what the Radio Capabilities for each logical modem has or should be using. It can support 2/3/4G switch and has flexible architecture to support future technology. Change-Id: Iedf7f608d2ba3c06a883500f2d85abb98e69d9c1
/frameworks/base/core/res/AndroidManifest.xml
|
0e8b697f2348a317c5eeaee9b6342d6089c4675c |
|
18-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
am 76e3689b: am 438723e6: am a801d349: am 9621b793: am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev * commit '76e3689b45189902a85b06de22053cfa5d25a1cd': Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
|
9621b79396303037a86eb2639035b12080c858bf |
|
18-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev * commit 'e4e3fcec415cdc9739f32ce1eaaec67666e5454d': Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
|
65d241b92db36e8f14d08efc6f35a91481b0d73d |
|
17-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions Bug: 18020724 Change-Id: I5a0e5ef8a1e40ee23f4b132f5877b63a738e776e
/frameworks/base/core/res/AndroidManifest.xml
|
fa72516ac9cf6eeb3a08711c7cf35e31479d5a7d |
|
14-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
am ed454542: am 38e48c2f: am 3547c13e: am 097c8d60: am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev * commit 'ed4545423b0166f2436adee077d11b85b62ed07a': Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
|
097c8d60115a9207ba4140ef99766741a2256361 |
|
14-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev * commit '1901e175079e3b7242ace7d4b3ec38af3723f91b': Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
|
1901e175079e3b7242ace7d4b3ec38af3723f91b |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev
|
59a24d6ca9a888b90a1b8ae348b79359d205da78 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 4dd24730: am b3bab92e: am 0a4e2245: am 8ca4886e: am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev * commit '4dd247305f4e4f3b3a7a9f52a8d1a9c6641391f3': Change RECEIVE_BLUETOOTH_MAP permission to signature or system
|
8ca4886e439685fdcb1eff4c3552a62522ebeeb0 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev * commit '317f9ce85a492a213b8f1dac477b1aefad55f621': Change RECEIVE_BLUETOOTH_MAP permission to signature or system
|
5742335cbdb1c84a88a8ed12240316271fbb0f25 |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem. Bug: 17952946 Change-Id: I4a75da11cb092ca795d0eacf824890eb12c7446a
/frameworks/base/core/res/AndroidManifest.xml
|
6e383350e4e06b31b885812c5d9df82761a41269 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
Change RECEIVE_BLUETOOTH_MAP permission to signature or system Bug: 17954105 Change-Id: I8b16cab7193c97e5f54d6e4ef33ebf8cda0da197
/frameworks/base/core/res/AndroidManifest.xml
|
a3bfb7808409d06182e8a4e0a9b3bb70da55bf8d |
|
08-Oct-2014 |
Dan Sandler <dsandler@android.com> |
am d23fa0f6: am 97a7fbfb: am 621fa30c: am 9eef8749: am 2200f86f: All (er, L) is finally revealed. * commit 'd23fa0f65077ba83d7b9b24805096f2b4532b9da': All (er, L) is finally revealed.
|
9eef8749232c00afad5ca3c26736c0be785cb8c1 |
|
08-Oct-2014 |
Dan Sandler <dsandler@android.com> |
am 2200f86f: All (er, L) is finally revealed. * commit '2200f86f800876d005f911e6864708fa9772d03a': All (er, L) is finally revealed.
|
2200f86f800876d005f911e6864708fa9772d03a |
|
06-Oct-2014 |
Dan Sandler <dsandler@android.com> |
All (er, L) is finally revealed. If you exceed 20000 points, please send in a screenshot. Bug: 15984887 Change-Id: I1164160bfa8e7dca3b9e7d7ca5d50ef9abd38b61
/frameworks/base/core/res/AndroidManifest.xml
|
22dbaddf58144ea847c9aa617be0e77114f3f7c3 |
|
06-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
am 8b718b80: am db75703b: am 2f577e83: am 90d557b7: am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev * commit '8b718b80e0caf179a174f8417fe4f5b875297de6': Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
|
90d557b7a68e64e049a44560b76b959ef87f13d7 |
|
06-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev * commit '7f7d240b13b96b617e298c6178af0425308f5ef9': Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
|
2d7576b082b84068fb9d68419b710b9bec49139b |
|
04-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #17752399: Multiple apps broken by GET_TASKS permission change Keep around GET_TASKS as a permission available to apps, so apps still think they have it and don't get all uppity because they don't. Add a new REAL_GET_TASKS that is the actual permission now. Plus some temporary compatibility code until everyone can transition fromn GET_TASKS to REAL_GET_TASKS. Change-Id: I12c1102eed24844685dcbd2fa3b612811603958f
/frameworks/base/core/res/AndroidManifest.xml
|
f75866cba095cfe8247e87aafa4162abba37fdbb |
|
02-Oct-2014 |
Benson Huang <benson.huang@mediatek.com> |
am cea4f7ac: am 19766ff9: am 398de894: am 981258e5: [FM] Add FM permission to support FM radio app * commit 'cea4f7acb40b495c137e1ac6c9eb57b3ddfa2c34': [FM] Add FM permission to support FM radio app
|
981258e5f957899b034a98ebebade1f0366f506a |
|
23-Sep-2014 |
Benson Huang <benson.huang@mediatek.com> |
[FM] Add FM permission to support FM radio app Add FM permission like KK to support FM radio app. Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9 Signed-off-by: Benson Huang <benson.huang@mediatek.com> Conflicts: data/etc/platform.xml
/frameworks/base/core/res/AndroidManifest.xml
|
3e3857c4f5d277c69bcb0ff3a581a176f3a84bf8 |
|
22-Sep-2014 |
Sky Faber <skyf@google.com> |
Separate wifi AP added by applications. -Add field for tracking user approval of application added networks. -Add WifiConfig fields for creating/updating application name -Add permission to allow system apps to modify any network Bug: 16953082 Change-Id: I12943563ef714c4287e13488578f020d136d006d
/frameworks/base/core/res/AndroidManifest.xml
|
4b4d68534155e6a2776e2cc7f2168307fd55cb1f |
|
19-Sep-2014 |
Wink Saville <wink@google.com> |
am 1ddcdc2d: Merge commit \'e58e59cc\' into fix-merge-conflict * commit '1ddcdc2d1cef6387612923ad3f9e73de12727dc1': ksd to lmp-sprout-dev
|
f067f8fb16dd0778ef75b44d7323a07fe1ba52c3 |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
am 84d05ed5: am 8a20c56f: am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev * commit '84d05ed5a229186c7859013327887f6af7ef4a29': Adds APIs for Bluetooth PBAP and MAP access permission.
|
d796159bbb14fce247177ad25aabd70038437181 |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev * commit 'c172b2090317b158974bc73d8baa141449a1d784': Adds APIs for Bluetooth PBAP and MAP access permission.
|
1bbfcc2fdcbe72a69477b0395ea92f777efb7c9d |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev
|
02e3979d62bf4b85fe7dedeefa357748419db992 |
|
15-Sep-2014 |
Wink Saville <wink@google.com> |
Merge commit 'e58e59cc' into fix-merge-conflict * commit 'e58e59cc': ksd to lmp-sprout-dev Conflicts: core/java/android/provider/CallLog.java telephony/java/android/telephony/SubInfoRecord.java telephony/java/android/telephony/SubscriptionManager.java telephony/java/android/telephony/TelephonyManager.java telephony/java/com/android/internal/telephony/ISub.aidl telephony/java/com/android/internal/telephony/TelephonyIntents.java Change-Id: I2b892b692743a7ccde55185a2b90135bf28408cd
|
613d076fa58bc4d48d5e0e197300a1f1be7c3dbb |
|
11-Sep-2014 |
John Spurlock <jspurlock@google.com> |
am 56e64b2a: am 88c61af5: am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev * commit '56e64b2a589a09786caa1eb1d9bfa59292a227f2': Zen: Make condition providers available via @SystemApi.
|
7456ae83e8ae6ad3081a4a31589c1569b985be93 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev * commit '3a972844e934b1031d73bfb114d84a7d2f8d4b19': Zen: Make condition providers available via @SystemApi.
|
bf4e41747d138bf89c6c3fa5076a38334d3b45e1 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
Zen: Make condition providers available via @SystemApi. Bug:16819503 Change-Id: Ibd7004f7a0928d3f14f9ccd55088cf645d5285e2
/frameworks/base/core/res/AndroidManifest.xml
|
0a2cfc629698e17657adaf58ad67aa8b58dda653 |
|
10-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
am 2feb9c9a: am 2413aa58: am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev * commit '2feb9c9a5153136d6d0f4d32859113fc1ebe6a4f': Make UsageStats API default on only for the system ActivityManager shouldn't return null for getCurrentUser
|
7137ee38cbfeb01b6e19b5e4b2588e765b5a56c6 |
|
10-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev * commit '38bd55ffd7084d744e4e814593056e1e12ebfb00': Make UsageStats API default on only for the system ActivityManager shouldn't return null for getCurrentUser
|
8dd30aadaf133fe1b8974847efdd5b8cf285136d |
|
05-Sep-2014 |
Edward Jee <edjee@google.com> |
Adds APIs for Bluetooth PBAP and MAP access permission. Currently, users' preference in phonebook and call history or message access per each Bluetooth-paired device is stored in Settings application's shared preferences. However, some privileged applications other than Settings need to access such data. So we decided to migrate the data from Settings application's shared preferences to Bluetooth application's. Bug: 17158953 Change-Id: I3771f03eaea3f57cf60d93ab9fd41c9eb3e1e99c
/frameworks/base/core/res/AndroidManifest.xml
|
6590d7c75c1d706f70ebf6a5594d6a7601c080df |
|
09-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
Make UsageStats API default on only for the system This changes the PACKAGE_USAGE_STATS permission to be a signature only permission, meaning that only apps signed with the system signature have access to the UsageStats API enabled by default. Bug:17428130 Change-Id: I79ba54d7102c770ea2490f014a1f6736f0f46b3a
/frameworks/base/core/res/AndroidManifest.xml
|
067a1780f56f6a883544fe3a9e93c590999d32d9 |
|
06-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
am c16a3a6c: am c256b10b: am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev * commit 'c16a3a6ca2235554c4232651fca4c84af5ceded9': Update the broadcasts reserved to the system
|
91488f464db3753d1534fb4d16cde2c90abd8126 |
|
05-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev * commit 'aa82a6c7adc6de4ec3f843328f7bb207aa6540ec': Update the broadcasts reserved to the system
|
26d6ff0b2406d2917b6ad1f6dd7b35450b0044fc |
|
03-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
Update the broadcasts reserved to the system The action value for all AUDIO*PLUG broadcasts has been changed from "android.intent" to "android.media". This value needs to be updated in the core manifest too as part of the broadcasts that only the system can send. Bug 17289385 Change-Id: Ibc0f4139c28ce863f85efc24ff0fcb81ab12ce21
/frameworks/base/core/res/AndroidManifest.xml
|
05e6dde3a0b9ba1eb3d13d511fe2e27a0d10c851 |
|
01-Sep-2014 |
Wink Saville <wink@google.com> |
ksd to lmp-sprout-dev Change-Id: I94eb65c62231b5831570bb0cbbbd9c916bee0a37
/frameworks/base/core/res/AndroidManifest.xml
|
070bf912a25b6cf3b7051b2b6710dc20a7386c4c |
|
27-Aug-2014 |
Christofer Åkersten <akersten@google.com> |
am c957fa3b: am 8ddbb2cf: am e7a96447: Merge "Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS" into lmp-dev * commit 'c957fa3bcc42ebed337582f98c8ebb8f2d1148e5': Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS
|
9dd43afbb9f041e807d2051478e861c556f0771f |
|
26-Aug-2014 |
Sungsoo Lim <sungsoo@google.com> |
Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS Bug: 16948874 Change-Id: If44aaa7085705e8a2f55c71dae61bf6ac0cdfc09
/frameworks/base/core/res/AndroidManifest.xml
|
4b40c24877ce2074c03aeb23adade3756ff320a1 |
|
25-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
am d35615ce: am fdfd79f2: am 6a276cec: Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev * commit 'd35615ce7a0ffd477d0dae8d098813d62e92a7db': Poke interactive hint from userActivity and add @SystemApi.
|
d7761be23d30b5e9ca9c07998af27e704d2a7ae2 |
|
23-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev
|
6be3d49339ba719e68cf44a16becb6866355238e |
|
22-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
am 21ecfce5: am 0c581229: am 654d72fd: Merge "Show a user switching dialog before starting the user switch" into lmp-dev * commit '21ecfce5be747dd676cc0b5f0452408fd9280766': Show a user switching dialog before starting the user switch
|
7805a10c86a2de9fb5ddf41d63075eef342a59ea |
|
22-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
Show a user switching dialog before starting the user switch switchUser() now first shows a dialog and the dialog calls startUserInForeground to do the actual switch. Bug: 16661752 Change-Id: Ie4e2e9eec8bf7c2116694072ea8555b8254a0e13
/frameworks/base/core/res/AndroidManifest.xml
|
0a571123544058578b4ef1558c276a4050519652 |
|
22-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Poke interactive hint from userActivity and add @SystemApi. Previously we only poked the interactive hint for input events that were dispatched through the regular input system. However, when using a car dock in projection mode input events are directly delivered to apps by other system components, bypassing user activity. So now we poke the interactive hint on all user activity. Added an @SystemApi version of userActivity. Added a new signature|system permission called USER_ACTIVITY to allow system apps to poke userActivity. For now it seems prudent to keep DEVICE_POWER signature only. Bug: 17043684 Change-Id: Ia84bd03083065b8938a9853c08901fbf71b2e56b
/frameworks/base/core/res/AndroidManifest.xml
|
369fcc5e79d24e8e56aed5c9b83e0a07039aff66 |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
am e4df8728: am 084c98b4: am d324e32f: Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev * commit 'e4df8728312f9d289c096ba804816e3091c2a125': Exposing in-call API to other implementing classes. (1/4)
|
198ca696fb318380dee5ae9f4f3e47114d74ed14 |
|
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
am 7814d9f0: am 4bbb811f: am 504960cb: Merge "Add callbacks for MediaProjection start / stop." into lmp-dev * commit '7814d9f05d202625280210269c89655013dce3de': Add callbacks for MediaProjection start / stop.
|
d86ecd26d78c7bcd7f820b9ef5e3f4c3eb037510 |
|
13-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Add callbacks for MediaProjection start / stop. Also, enforce that there is only one valid MediaProjection at a time. Bug: 16488053 Change-Id: Id05445d798c98cb208bc4dab186296392e15d30b
/frameworks/base/core/res/AndroidManifest.xml
|
b135d06cb83db03b1328b7a82f064de7868fb16f |
|
20-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Remove incomplete media router API. (DO NOT MERGE) Change-Id: I310fadafb5a6b8190a32e5d87f3e1823c87bcef7
/frameworks/base/core/res/AndroidManifest.xml
|
50cddeca1f6f66ccc3dbfd526aee621e1b87a516 |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev
|
2ac401093e5ebb975f14e5108d457c148370f7de |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Exposing in-call API to other implementing classes. (1/4) - Adding service_interface constant to InCallService. Bug: 16133960 Change-Id: I4ace89bc3300428d2c56ed43e47ccd12a9f9748a
/frameworks/base/core/res/AndroidManifest.xml
|
19caa123d623fdfd55cba0ae8a2bcb519ce9e7e6 |
|
16-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
am 3ec54522: am 5c0aa11d: am fbcb50db: Merge "Add BIND_CONNECTION_SERVICE permission." into lmp-dev * commit '3ec545229af4be3a45583170a2509d9ad4161c04': Add BIND_CONNECTION_SERVICE permission.
|
0dae9a4cfa9d51cadb0f731b65f742d48e9e893c |
|
16-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Add BIND_CONNECTION_SERVICE permission. - Added system permission. - Added enforcement in ConnectionService API class. Bug: 16171070 Change-Id: Idbd26a31e8f6bb59d3e881a1e5885a44026f2fbd
/frameworks/base/core/res/AndroidManifest.xml
|
af8b11ae2ad4e3de7641ecb61fc6fde691f6a105 |
|
15-Aug-2014 |
Doug Zongker <dougz@google.com> |
am 8c26c4c8: am a9c87471: am 2b13359a: Merge "@hide RECOVERY permission" into lmp-dev * commit '8c26c4c8f4784e3f8acce3a97f36e8c136d48349': @hide RECOVERY permission
|
183415e521d599ca5e33e5022fec5ec7dfe1c055 |
|
12-Aug-2014 |
Doug Zongker <dougz@google.com> |
@hide RECOVERY permission Bug: 16959027 Change-Id: I99fbdf24d5e8bce4beb32fa872e0caa6bfdbe1e9
/frameworks/base/core/res/AndroidManifest.xml
|
c216c473eb50e16ab6c6361bd0c9232d5bfaeb39 |
|
07-Aug-2014 |
Chelsea Derrick <chelsead@google.com> |
Revert "Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE]" This reverts commit 41158d90a69cae2a9c4ced0e04f235e8cfef5259. Bug: 16871063 Change-Id: I93623be92f2de41789b16827867f3f95bf0480c5
/frameworks/base/core/res/AndroidManifest.xml
|
aac303d0a24294c1f9ac74a0e5e7b7fa77bb379f |
|
11-Aug-2014 |
Nicolas Prevot <nprevot@google.com> |
Removing the personal icon, which was only a placeholder. This icon should never show up: the avatar of the personal space should show up instead. If something goes wrong and correct avatar fails to show, the systems falls back to the green android now, which is desired behaviour. BUG: 15875652 Change-Id: I41beb4cbd5e707d27ef6d4cf35d02ec9cfa1b61d
/frameworks/base/core/res/AndroidManifest.xml
|
6b93229a211cd4b963dae0a46d6dde689beabb90 |
|
24-Jul-2014 |
Matthew Xie <mattx@google.com> |
Add BLUETOOTH_MAP permission to give Bluetooth app exclusive access to email access The permission is hidden. It's for Bluetooth app only. We may unhide it in the future. Change-Id: Ibc6f7b71f0c79dc282a8e5fdc786e1c16be7a892
/frameworks/base/core/res/AndroidManifest.xml
|
8694f2443230e74515e04e572d22406764746834 |
|
04-Aug-2014 |
Jeff Tinker <jtinker@google.com> |
Merge "Allow device to be unprovisioned" into lmp-dev
|
6bf5b600d6d1e98f7eabbbc884dd286b335acd66 |
|
30-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Allow device to be unprovisioned bug: 12247651 Change-Id: Ie2e77566d2c65925091296da5bcbec327985c946
/frameworks/base/core/res/AndroidManifest.xml
|
1bb480a3a4ce2ce63c5d09fa7f5cc38ec160ebf4 |
|
02-Aug-2014 |
John Spurlock <jspurlock@google.com> |
Battery saver: new policy changes + SystemUI tweaks. - Service policy changes: allow the user to turn off (snooze) saver mode below the auto-trigger level. Plugging in the device always exits saver mode. - Default trigger level is now 0 (never) instead of 15. - SystemUI now also listens to a new POWER_SAVE_MODE_CHANGING, since waiting for _CHANGED can take seconds. - Move shared feature description text into the framework so it can be shared. - Tweak dialog title + action strings. - Remove trigger-level from SystemUI, it no longer needs it. - Add the ability to turn off saver mode directly from the notification. - Migrate saver confirmation dialog to common system UI dialog helper, and add a few convenience methods. - Fix bug where the status bar area would be orange over the keyguard in SHADE_LOCKED mode. Bug:16214395 Change-Id: I3d1ded1eec9e63e7d97469486f6a320e1bebbccd
/frameworks/base/core/res/AndroidManifest.xml
|
783645e99f909ffc7a2d5d2fca9324cc0e9b7362 |
|
28-Jul-2014 |
Jae Seo <jaeseo@google.com> |
TIF: Merge TvParentalControlManager into TvInputManager This change addresses the following API council feedback. TvParentalControlManager: -- Replace the listener interface with a broadcast Intent with well-known action, something like ACTION_BLOCKED_RATINGS_CHANGED. -- TvParentalControlManager goes away, and two remaining methods move to TvInputManager. == Implementation changes == -- The user-selected rating preferences should be stored in an XML file, and loaded at boot by your internal system service. It should _not_ be stored in a Secure/Global setting. Bug: 16542165 Change-Id: I278df963576652ec9163a66c1ef99419fcdb36c2
/frameworks/base/core/res/AndroidManifest.xml
|
1f33d77f0430efb2d7eb532e360ba9a30004ffe7 |
|
25-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Rename work icon symbol to match the prefix used for badges. Also renames the images for consistency. Bug: 16369104 Change-Id: I19f97ae22cb2ee4f7db210f083badc1a30520b44
/frameworks/base/core/res/AndroidManifest.xml
|
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c |
|
28-Jul-2014 |
Adrian Roos <roosa@google.com> |
Make TrustAgentService a SystemApi Bug: 16401527 Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/res/AndroidManifest.xml
|
5eeb59cceb1f95813c548c1c5937f161c1ed3571 |
|
22-Jul-2014 |
Christopher Tate <ctate@google.com> |
Schedule full backups Initial policy: at most daily; backups only run when the device is idle + charging + on an unmetered network. Bug 16485874 Change-Id: I5665d890a943bac765adcef14be79d7dba6ce078
/frameworks/base/core/res/AndroidManifest.xml
|
16c8e3f49497b6046972ae650772f65768366be8 |
|
25-Jul-2014 |
Jeff Sharkey <jsharkey@android.com> |
PackageInstaller changes based on feedback. Mostly cosmetic changes from API council feedback. Bug: 16543552 Change-Id: Ic926829b3f77c31f50a899c59b779353daf00d59
/frameworks/base/core/res/AndroidManifest.xml
|
c086a3df3b28996cd10ebe42c5f59035d054aa0d |
|
18-Jun-2014 |
Terry Heo <terryheo@google.com> |
Add a frame capture API of TV input - Added new permission CAPTURE_TV_INPUT Bug: 15736756 Change-Id: I2ae8b2e3f5b1ad1d525854ed89ab2043cf66acbe
/frameworks/base/core/res/AndroidManifest.xml
|
193f049221dce7764d50293ac02255fd0223c538 |
|
10-Jun-2014 |
Jason Long <jasonlong@google.com> |
Switched Holo to Material for account chooser activities. Change-Id: I6a44fb174eb4e981c37fca0836b103d7ee3f5ffe
/frameworks/base/core/res/AndroidManifest.xml
|
dc00cbe2c15eef5141656311a6d05c753d7c6db6 |
|
21-Jul-2014 |
Craig Mautner <cmautner@google.com> |
Create API for launching from recents Relaunch apps from recents using the same uid and package as was used in the original launch. Fixes bug 16358208. Change-Id: I340800bfee79926b197929360d69f1d570bbf1eb
/frameworks/base/core/res/AndroidManifest.xml
|
33f5ddd1bea21296938f2cba196f95d223aa247c |
|
22-Jul-2014 |
Dianne Hackborn <hackbod@google.com> |
Add permissions associated with app ops. Change-Id: I575ad7a3ceea59486ca601f69760b14f6269511d
/frameworks/base/core/res/AndroidManifest.xml
|
09a65601b24b77b7e5b3d2d4c7c30eded1ba1040 |
|
21-Jul-2014 |
Adam Powell <adamp@google.com> |
Sort ResolverActivity items based on UsageStats Sort targets by the total amount of time the user has spent with their containing package in the foreground. Bug 15694906 Change-Id: I63c956424f78eb22911517674dfefd96901d19f8
/frameworks/base/core/res/AndroidManifest.xml
|
a19d7bfacf83837fab1f785ed1319d83a7f45675 |
|
19-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Rename voicemail permissions Rename READ_ALL_VOICEMAIL to READ_VOICEMAIL, and MANAGE_VOICEMAIL to WRITE_VOICEMAIL Bug: 16400686 Change-Id: I4c87a7e2fb3aa71d7de3865301f110bcfb29221b
/frameworks/base/core/res/AndroidManifest.xml
|
891f5b2638f30479eb8d78ecb28ba0b39808fca4 |
|
18-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Merge "Mark social APIs stream APIs as deprecated" into lmp-dev
|
bdb13c8c07f07d405e74f479068eb972d509cea5 |
|
17-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Mark social APIs stream APIs as deprecated Bug: 14490632 Change-Id: I6b54613514e52f34cfcc37d25493a7ea7d636a86
/frameworks/base/core/res/AndroidManifest.xml
|
c39d47a8e7c74bd539104b0efab898ef6fc43ddf |
|
09-Jul-2014 |
Michael Wright <michaelwr@google.com> |
Add MediaProjection APIs. The new MediaProjection infrastructure allows the system to hand out tokens granting the ability to capture the screen's contents, audio, etc. at a granular level. It's intended to be used both for screen casting, via the cast APIs, as well as screen sharing via third party applications. The screen sharing case is implemented, but all of audio capturing is still forthcoming. Change-Id: I4b24669bed7083e11413c10ed8d6b025f5375316
/frameworks/base/core/res/AndroidManifest.xml
|
4bd7efbe982d26a68950f3c92bd0e7142c4ecbf7 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Restrict SCORE_NETWORKS permission to signature|system. As long as the APIs aren't ready to be un-hidden, there's no need to allow non-system apps to access them. This can be reverted when the APIs are finalized and we have mechanisms in place for selecting between scorers installed on the device, rather than only a preselected scorer bundled with the system. Change-Id: I745b4c691eccfb526014d4cb71639db2119e4fdb
/frameworks/base/core/res/AndroidManifest.xml
|
58fba8b14b7e80dc2e7f676a32d1a69661fb13d4 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Expose network scoring APIs to /system apps." into lmp-dev
|
7be8e9725f4a60f0d1a6cb175a05a320968d7439 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Expose network scoring APIs to /system apps. Ideally, we'd only expose the methods that we intend unbundled apps to call (e.g. not NetworkScoreManager#setActiveScorer, which should only be called by Settings), but this isn't harmful in terms of permissions as the APIs still check security appropriately. Bug: 15833200 Change-Id: I2047515b41c8be0cf7cb51dd495fe72309c05f68
/frameworks/base/core/res/AndroidManifest.xml
|
cdd5858e481fb0087c40c5997a9fa1446b326165 |
|
18-Jun-2014 |
Wenchao Tong <tongwenchao@google.com> |
Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE] * Only allow system app to send/receive WIFI_CREDENTIAL_CHANGE. * Define constants in WifiManager. Bug: 15703353 Change-Id: I4bcc6bc82ec01952500eef3965cf81116bba693d (cherry picked from commit f4a43f196e1132968a8add60efa4ae4558f8b010)
/frameworks/base/core/res/AndroidManifest.xml
|
1a937b04e63539cb1fab1bde601031d415c7156f |
|
02-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Initial draft of new MediaRouter APIs. This patch introduces basic infrastructure for the new MediaRouter API. The code is fully documented but incompletely implemented. It is being submitted not to facilitate API reviews. MediaRouter is a new class that applications used to discovery, connect to, and control media devices as represented by media destinations and their routes. Routes may offer a variety of capabilities. This new class is a much more powerful replacement for the existing MediaRouter. MediaRouteService is a base class for creating media route services which third-parties can implement to make routes available to applications. It is analoguous to the MediaRouteProvider infrastructure of the old media router support library but it is designed to be integrated into the framework and enable a variety of new usages such as remote display projection. Stay tuned for more... Change-Id: I2c7c6013d9f751d71e83697e7fc9e49bf7751fef
/frameworks/base/core/res/AndroidManifest.xml
|
01a500ed1c6ae3fff66678144ae637aa8cad0ecc |
|
11-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Delete first draft of media routing APIs. The new APIs will not be as tightly integrated into MediaSession. Change-Id: I5cfd37d9d8d0c5d46c55edb5cf0772a8f1ef13ab
/frameworks/base/core/res/AndroidManifest.xml
|
06b6cdaed5c68816faac9d2354c6caf61e65e19d |
|
12-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Remove unnecessary code and APIs. This stuff has been replaced by setNetworkForUser() in NetdClient. Change-Id: If525ee259b74314191d1913f7c2a3e828e05c38f
/frameworks/base/core/res/AndroidManifest.xml
|
c42a1e1071937ae48b7aa5d6291a32c29078b74b |
|
07-Jul-2014 |
Adrian Roos <roosa@google.com> |
Add AlarmClock API to AlarmManager Adds a new kind of alarm that represents an alarm clock and a way to query the next scheduled alarm clock. Deprecates Settings.System.NEXT_ALARM_FORMATTED. Bug: 14589952 Change-Id: I297eeeff36d07adcda010afac183d0f5ee37dc99
/frameworks/base/core/res/AndroidManifest.xml
|
68d4acd205e8c2da524e62734ca42847306cc029 |
|
02-Jul-2014 |
Andres Morales <anmorales@google.com> |
Service for reading and writing blocks to PST partition Permits apps with permission android.permission.ACCESS_PERSISTENT_PARTITION to obtain a read and write data blocks to the PST partition. Only one block ever exists at one time in PST. When a client writes another block, the previous one is overwritten. This permits storing a block of data that will live across factory resets. Change-Id: I8f23df3531f3c0512118eb4b7530eff8a8e81c83
/frameworks/base/core/res/AndroidManifest.xml
|
99bd4eabd17c1211adcd8eb9afeb5e1c6077617c |
|
09-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Merge "Add manage voicemail permission (1/4)"
|
6752cba4642ea9103f3013336c005f06968fd442 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "ConfigUpdateInstallReceiver: pass content via content provider"
|
b708ce5f1a30a63ed79a86a23ead4e5ad972a48a |
|
08-Jul-2014 |
Shishir Agrawal <shishir@google.com> |
Remove permission SIM_COMMUNICATION. The permission is replaced by the MODIFY_PHONE_STATE permission which is System|Signature. Change-Id: I74dbd242fc0fdbb5884fdc7a5c3f0063424fbfcf
/frameworks/base/core/res/AndroidManifest.xml
|
103173e16da609bcf57a88961ca57a8de17e0ee7 |
|
28-Jun-2014 |
Nick Kralevich <nnk@google.com> |
ConfigUpdateInstallReceiver: pass content via content provider When receiving a request to update ConfigUpdater content, don't try to open by filename. Fetch the content via a file descriptor delivered from a content provider. This avoids the files needing to be marked world-readable, and resolves an SELinux violation. Bug: 14989241 Change-Id: I10ad0d710c9a833a45995c545ba585a533c35b0d
/frameworks/base/core/res/AndroidManifest.xml
|
b096bdceaf2a4becffd2d930a870ccb57bfbe99c |
|
01-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Add a SCORER_CHANGED broadcast. Sent whenever the active network scorer is changed. Bug: 16007033 Change-Id: Ib71e89e2cc98fa424db7e489445ec03edefb6880
/frameworks/base/core/res/AndroidManifest.xml
|
8949bfb90c415629dbd0e30d25003fb3e0375fb5 |
|
16-Aug-2013 |
Hemant Gupta <hemantg@codeaurora.org> |
Bluetooth: Support MAP Client role on Bluedroid. Implementation changes to support MAP client and PBAP client role on Bluedroid stack. Change-Id: I1733a67bf5256bd7b181bd5e68e40b476994ebfd
/frameworks/base/core/res/AndroidManifest.xml
|
5e4554351045776c1cf2da77375f0ca8363d647f |
|
25-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add manage voicemail permission (1/4) Bug: 6948882 Change-Id: I3367c20721b6e9572e79c7b4f42758b8c4e30372
/frameworks/base/core/res/AndroidManifest.xml
|
eb8d1be6acad180eabde84f19196b9ecaba81353 |
|
25-Jun-2014 |
John Spurlock <jspurlock@google.com> |
Add a BIND_DREAM_SERVICE signature-level permission. Starting in api 21, will be required to bind to a declared dream or doze service. Also added to aapt dump badging output. Bug:15862654 Change-Id: Ifa0a594eeecf21e6146176c7810a847e1d08fe3b
/frameworks/base/core/res/AndroidManifest.xml
|
d96e4948daf687f3f631ba8d93c89026fd3ce272 |
|
26-Jun-2014 |
Andres Morales <anmorales@google.com> |
Merge "interface for nfc handover supplicant commands"
|
5a2f488b70c9f9a712be7bcdbd9ec893c38670c2 |
|
24-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add REMOVE_VOICEMAIL permission to system Add a permission that will allow any app that has this permission to remove any voicemails in the user's call log, even those that don't belong to it. This will be needed for the unbundled dialer to be able to manage the user's voicemails. Bug: 6948882 Change-Id: Idca23ee83e541ba8aef24d6cb7fe09d5adac1e10
/frameworks/base/core/res/AndroidManifest.xml
|
9d4e9bcebbd97ad51daa0ef15cfba5aabb399bbb |
|
19-Jun-2014 |
Craig Mautner <cmautner@google.com> |
Allow a root activity to relinquish task identity If a an acitivty with attribute android:relinquishTaskIdentity true is the root activity of a task then the intent of that task will be that of the first activity in the stack with android:relinquishTaskIdentity set false. The ability to set intent also includes the ability to set the TaskDescription of the task. Fixes bug 15675610. Fixes bug 10428661. Change-Id: Ib28a9eae3b9832eeeef9106adbebe344184ee5ae
/frameworks/base/core/res/AndroidManifest.xml
|
5834ee75038e9095cefe089cdb26795b3ffe9e38 |
|
18-Jun-2014 |
fafaisland <fafaisland@google.com> |
Merge "Add READ_ALL_VOICEMAIL permission in the core"
|
88fb96505ce7587b23479d07ed77412f69a84ce8 |
|
17-Jun-2014 |
fafaisland <fafaisland@google.com> |
Add READ_ALL_VOICEMAIL permission in the core Bug:15695227 Change-Id: I96bebcd949293679d938b2ec290820d4ed9035fa
/frameworks/base/core/res/AndroidManifest.xml
|
cf1a2f73fc102be2ac7060ac97d4682bb2565ca5 |
|
17-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch everything to scheduled jobs Everything that used the IdleMaintenance APIs/broadcasts gets to use the spiffy new JobScheduler instead. Hooray! On top of that, the now-obsolete "idle maintenance" APIs are now gone entirely. Double hooray! Bug 14993295 Change-Id: I5fb67c296ca8cd0ba8a2c8760a0f0d9d962d813b
/frameworks/base/core/res/AndroidManifest.xml
|
9740e468bc895cbc08c71aecc35fc56c3faafa06 |
|
08-Feb-2014 |
Andres Morales <anmorales@google.com> |
interface for nfc handover supplicant commands expose: NFC_GET_HANDOVER_SEL NFC_GET_HANDOVER_REQ NFC_REPORT_HANDOVER These are used in for setting up WFD with NFC and are only accessible given the CONNECTIVITY_INTERNAL permission. Change-Id: Ia43afc137d474822cad896d335530654081a808c
/frameworks/base/core/res/AndroidManifest.xml
|
29372ab484c916c0774c976d5b896a7cf19a2b91 |
|
04-Jun-2014 |
Ido Ofir <iofir@google.com> |
Adding permission for launching the trust agent settings. Change-Id: Iac5bde57ca8d465fdf0fa5848d6716fc88801aeb
/frameworks/base/core/res/AndroidManifest.xml
|
94b59de852df7b6ce16aef73a9b2c11be8f3102d |
|
03-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothAvrcpController: Move AVRCP controller support to new BluetoothProfile subclass Change-Id: Id988040a7ce623ed68e0349920301ff48db1fbce
/frameworks/base/core/res/AndroidManifest.xml
|
2263dd1ddd1a8ac828c25d34000c85165cad21ef |
|
14-May-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothA2dpSink: Add new BluetoothProfile subclass for A2DP sink Change-Id: I09d5cb8fdaea4c4828f333949b7c18deffd22722
/frameworks/base/core/res/AndroidManifest.xml
|
cf916d34671f0ab6aad8de24c18e4dc96fb21941 |
|
12-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
Rename BluetoothHandsfreeClient to BluetoothHeadsetClient This makes our terminology consistent with the existing BluetoothHeadset profile Also updated arguments to Context.bindService() Change-Id: I27cc5a6fde256b1f5dccca53a7a15ec8f58691c2
/frameworks/base/core/res/AndroidManifest.xml
|
104e14531ca2212117540d8b6abc06ab67564ebc |
|
12-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am f894cad0: Merge "Some tweaks to improve document task creation." into lmp-preview-dev * commit 'f894cad093c1a3083f4aca099babc4677977a12f': Some tweaks to improve document task creation.
|
d38aed81420d7d992f65ef2efb5f69c1900fc61d |
|
11-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Some tweaks to improve document task creation. - Mark the chooser activity as never launching in to a new task, even if the caller asks for it. These are dialogs so don't make sense as stand-alone tasks. (Maybe later the policy should be to not launch into a new task in any case that the activity is a dialog or even transparent at all.) - Keep track in the task record of whether any activities in it have been shown to the user, and use this to automatically remove the task when all activities finish. This leans up cases where apps are launching stub activities that get turned in to tasks but are never seen by the user because they immediately launch another activity in another task and then finish. Change-Id: I00b641c80aa96bd5071479f36ee2e4d8e3a81aeb
/frameworks/base/core/res/AndroidManifest.xml
|
5833bbe2d6a38244e48dd793d2d0872321535f57 |
|
12-Jun-2014 |
Sandeep Siddhartha <sansid@google.com> |
Merge "Initial support for reading the enrollment metadata"
|
e5706787599f8397e19e66afa70753ba350cc91b |
|
30-May-2014 |
Sandeep Siddhartha <sansid@google.com> |
Initial support for reading the enrollment metadata - Defines schema for enrollment apps to publish metadata for the search keyphrase. This metadata consists of an ID, a user visible keyphrase, and the target package to handle the keyphrase, when it triggers. - Reads the metadata and populates the KeyphraseInfo object for access via the VoiceInteractionService - Adds permission and intent action for the enrollment app. The enrollment app needs to be a system app protected with the MANAGE_VOICE_KEYPHRASES permission and the activity performing the enrollment needs to handle the ACTION_MANAGE_VOICE_KEYPHRASES - The keyphrase info currently stores an ID - that's for internal bookkeeping only, a keyphrase text - that's used by the public APIs, and a list of supported locales, which isn't exposed but is used while indicating if hardware hotword is available for a particular keyphrase in a language or not. Change-Id: Ibe6c52a5a3eecfd74c4a8382713a35eb88d38df9
/frameworks/base/core/res/AndroidManifest.xml
|
0188bee2c526270c178a0b1f918b2a09999de25f |
|
11-Jun-2014 |
Christopher Tate <ctate@google.com> |
am d8f71d34: Merge "Out with the old; in with the new" into lmp-preview-dev * commit 'd8f71d34c3c7fb161a1586de8edb52161c32d672': Out with the old; in with the new
|
1b8aef2be7a467672b3ffdc37039b9233ece0fbc |
|
11-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Material-ize the restrictions pin challenge."
|
fe1de89fe91a099dd535acd3df0845839baf4232 |
|
11-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
am 3d5066de: Merge "Add different resolutions of afw icons" into lmp-preview-dev * commit '3d5066de154193cc3a08a7be168aa5e31bfe0359': Add different resolutions of afw icons
|
7060b04f6d92351b67222e636ab378a0273bf3e7 |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
Out with the old; in with the new Switch to the official "JobScheduler" etc naming. Bug 14997851 Change-Id: I73a61aaa9af0740c114d08188bd97c52f3ac86b7
/frameworks/base/core/res/AndroidManifest.xml
|
40e53cdc944472cf2417c069a7a4514c9e37911b |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
Merge "hide RECOVERY permission from L preview -- DO NOT MERGE" into lmp-preview-dev
|
085a1e793382580811798cbdd7e354cc755fc3ed |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
am af0c2ebf: @hide ACCESS_INPUT_FLINGER permission. * commit 'af0c2ebfc71f6106656eb17345e122ea7ac8cf2a': @hide ACCESS_INPUT_FLINGER permission.
|
4a1c0bd20b317fbc48efc35f986b9a7f5cef128e |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
am 2099866f: Merge "Switch framework to using new scheduled-work API" into lmp-preview-dev * commit '2099866f0d9ae5692e6edfc053aebe7f93a21618': Switch framework to using new scheduled-work API
|
b19fd00c51855954366a288cc4838327cb5d83a4 |
|
10-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Add different resolutions of afw icons Also update the name of the icon so that it is consistent with other namings in the framework and in managed provisioning. bug: 15538051 Change-Id: I9e8e680eb1c654d9f5d94ce27775687b3dc92a22
/frameworks/base/core/res/AndroidManifest.xml
|
465c5de4ee3df861dd1ad0b71ca40f3daeb9cbee |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_INPUT_FLINGER permission. Bug: 15516225 Change-Id: Ief70650d956a7161153e283c24f553fcfa7996b1
/frameworks/base/core/res/AndroidManifest.xml
|
115afdadb5863a02f0b0daefcc0511bfd35b531e |
|
07-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch framework to using new scheduled-work API Also add the intended permission-use enforcement to said API. Bug 14994893 Bug 14993295 Change-Id: I5a3ffd32d0702c68f4ef6da68f7fa6e9de674380
/frameworks/base/core/res/AndroidManifest.xml
|
c302e4d32f97c21400b3ab76911cad8984eff20e |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
hide RECOVERY permission from L preview -- DO NOT MERGE Bug: 15516323 Change-Id: I16a6355f631523919607bd111e5ebfe16fa4506e
/frameworks/base/core/res/AndroidManifest.xml
|
238fd930fc0131044d317d7c5ead756be89d1299 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. (DO NOT MERGE) This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
bbf4270a6c8c6441dfb9b22f3cc5394d42cdada8 |
|
09-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Material-ize the restrictions pin challenge. Change-Id: I90be6d2e1b1043f45a8067561a0d5ce56cc02dd6
/frameworks/base/core/res/AndroidManifest.xml
|
b61eaaac59298afafa973ee739a072290e000348 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
d8883df650b77dba3be38fb2ca8980594b901461 |
|
06-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am 87bc3c25: Merge "Improvements to low power mode." into lmp-preview-dev * commit '87bc3c258d8be516bc0fcedeb6eec34088582061': Improvements to low power mode.
|
eb94fa7975b1e8742f3b00cec6bd4f9d6b329e3a |
|
04-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Improvements to low power mode. Add new public API for monitoring low power mode. BatteryService now puts device in to low power mode when battery level is low. Window manager now watches low power mode to turn off animations. Modifying the animator scale now gets propagated to all processes. Change-Id: I8fa566994764ddd4e1977631e28381ab9409f8ee
/frameworks/base/core/res/AndroidManifest.xml
|
aaa688972a682a42c3ee207538f3e6b204748151 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
am 25d7a394: Merge "add permission for AudioManager routing APIs." into lmp-preview-dev * commit '25d7a394c0cf91d9e9711d3f36913f4ed8aa91d8': add permission for AudioManager routing APIs.
|
b4df2f586ad7b5a0387489401de0c83203610ba9 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
am b2302d43: Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev * commit 'b2302d437fd636d9973f466062cfad145cdd042d': Ensure trust agents are only provided by platform packages
|
94236c56ddef7f0a3db010c38940f6eae75f67b4 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
Merge "add permission for AudioManager routing APIs." into lmp-preview-dev
|
b803ad3c2cefaba57063385ecab1be27dd2636b0 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Hide TrustAgentService in lmp-preview - DO NOT MERGE Bug: 15287044 Change-Id: Iba0d53b87bcb4bddccec89cf943ed65491aa9d76
/frameworks/base/core/res/AndroidManifest.xml
|
1e9021aef89d53eb08d0e8a4e017c9e79d260241 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev
|
01fae55d175eea6e723d6fa8729bbe868d05cfc2 |
|
29-May-2014 |
Eric Laurent <elaurent@google.com> |
add permission for AudioManager routing APIs. Add signature or system permission "android.permission.MODIFY_AUDIO_ROUTING" for AudioManager APIs allowing system services and applications to modify audio routing. Bug: 14815883. Change-Id: If09f6f3a166a6b2f3761b65dbde0c86873850f07
/frameworks/base/core/res/AndroidManifest.xml
|
4c9e57f156d3cbd86b38e9897dfdab81964efe90 |
|
03-Jun-2014 |
Jae Seo <jaeseo@google.com> |
resolved conflicts for merge of ebe661c4 to master Change-Id: Ic25dc762ee43654b439de3ec237ead007bee3df4
|
18ea893a2319e2a192188d2288bb881149c9b06e |
|
28-May-2014 |
Adrian Roos <roosa@google.com> |
Ensure trust agents are only provided by platform packages Prevents the TrustManagerService from binding to any non-platform trust agents and updates the SampleTrustAgent to use the new permission. Bug: 15287044 Change-Id: I38c3deebd5ad359075e68f52d19417bab5ab43db
/frameworks/base/core/res/AndroidManifest.xml
|
faa3ff9ba89486aad83eab0526aea46ea7bbcfe6 |
|
03-Jun-2014 |
Evan Charlton <evanc@google.com> |
Merge "Revert sendEnvelope changes [DO NOT MERGE]" into lmp-preview-dev
|
d5cc4a281e7ce29d1e8687ff3394b57a3a549260 |
|
31-May-2014 |
Jae Seo <jaeseo@google.com> |
Put TV Input Framework under android.media.tv, including TvContract Bug: 15345342 Change-Id: I665ca23f0f074ce29cb2e047109b209178532107
/frameworks/base/core/res/AndroidManifest.xml
|
f20d640fa2b155a971ddfe0965fc803a73b5e53c |
|
25-May-2014 |
Amith Yamasani <yamasani@google.com> |
Restrictions Manager Mechanism to register a provider for requesting an administrator to respond to permission requests. Request format and response format constants. Description of manifest template for static restrictions. Int type introduced in RestrictionEntry. Needs more javadoc and better description of manifest templates, including specifying the XML attributes. Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/res/AndroidManifest.xml
|
fda1855eaa61daad528cb444e99d0fc5195a7bd1 |
|
28-May-2014 |
Evan Charlton <evanc@google.com> |
Revert sendEnvelope changes [DO NOT MERGE] Revert the following changes from the I/O preview. This reverts the following changes: Revert "Revert "Revert "Modify TelephonyManager to expose sendEnvelopeWithStatus instead of sendEnvelope.""" This reverts commit 452e185fb6df92358701fb68d4fe6c65f172cc29. Change-Id: I6bbff508b2f542d6ef3d372956db53d63a9165eb Revert "Revert "Revert "Expose sendEnvelope.""" This reverts commit 0d5e5b9cce8af40494f72ff9decc169f99780254. Revert "Adding support for SIM communication from Android over logical channels." This reverts commit 57f656b9f6271cf857b5ecec5f8c7eacb321ec0b. Change-Id: I975eb468841e85d63e506f68a5d8c879e110d9f6
/frameworks/base/core/res/AndroidManifest.xml
|
c22dbb69194c8e8fe2a32326d1f37a738cad0904 |
|
26-May-2014 |
Wonsik Kim <wonsik@google.com> |
Revert "Revert "Add physical TV input handling to TvInputManagerService"" This reverts commit 1940e197a8de186df5edf0b78e0907ae539bd215. Bug: 14118245, Bug: 15197740 Change-Id: Ia308f16d2ed8ec55112a4d21c180ccb97e8d7c6a
/frameworks/base/core/res/AndroidManifest.xml
|
fb052926b84d69fdc4bebcb0373e33388c7bcbb7 |
|
21-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Revert "Hide voice interaction APIs." This reverts commit a677a9b9367bcf8c81c36dc59b53554cb347b438.
/frameworks/base/core/res/AndroidManifest.xml
|
62b25a5bf0750483f36ac79c88177ee2ab630f8e |
|
20-May-2014 |
Andres Morales <anmorales@google.com> |
Revert "Adding INfcUnlockSettings and NfcUnlock interface class." This will be re-added as a Trustlet in a subsequent CL. This reverts commit 38a7ed05f8fed0aa81f7214d827875f9876ffbe1. Change-Id: I5aa36df42a7751f165b4ef184e0cda57e5568b59
/frameworks/base/core/res/AndroidManifest.xml
|
b19c19265448a6252b1c14f3da85d52e50be34c3 |
|
19-May-2014 |
RoboErik <epastern@google.com> |
Merge "Rename session classes to have media prefix, hide routes"
|
42ea7eecd149161ed192d3029f0d77d1d08a4aa5 |
|
17-May-2014 |
RoboErik <epastern@google.com> |
Rename session classes to have media prefix, hide routes This renames several of the core session classes to be prefixed with Media. It also adds @hide to all route references for now. Change-Id: Idb42897d490cf24626e4e93ca975b2cb93ec054c
/frameworks/base/core/res/AndroidManifest.xml
|
dcff99598f16737e75278e8ea9dbfe92579ea234 |
|
16-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Hide voice interaction APIs. Change-Id: I961b6399a6edca239caaba9bbd1dd5e03bc612bd
/frameworks/base/core/res/AndroidManifest.xml
|
7e03dfcb796ef1a6000a5fd5fda03c9e15ea62e1 |
|
16-May-2014 |
Adrian Roos <roosa@google.com> |
Apply revised TrustAgent API Bug: 14997466 Change-Id: I81042e058a20f28603a11471882f3dcfc4f8b13c
/frameworks/base/core/res/AndroidManifest.xml
|
fbf53d042d68d1b0f9fefbcb1e819f25bd385f89 |
|
08-May-2014 |
Jessica Hummel <jhummel@google.com> |
Merge "Disallow the INTERACT_ACROSS_USERS permission for system apps"
|
96599a05acd7559464d527d819eaf4571129eb77 |
|
06-May-2014 |
Jessica Hummel <jhummel@google.com> |
Disallow the INTERACT_ACROSS_USERS permission for system apps This reverts a temporary hack which was required for a temporary launcher version to work for development purposes. Change-Id: Ifd17447076bf5c67ad2ce8df8f184fe6f12baad3
/frameworks/base/core/res/AndroidManifest.xml
|
d83a096f299abd9c7fe5e441ef1bb169c314b575 |
|
03-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Bump up priority of system receiving BOOT_COMPLETED. Change-Id: I5166f88f11f781914312e867cb653c8ecbefa705
/frameworks/base/core/res/AndroidManifest.xml
|
09233289624a85093b1d99e4a6a149bf09059d8d |
|
30-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Make GET_TASKS signature|system. Normal apps can't hold it now. If they try to use getRecentTasks() or getRunningTasks() without the permission, they will only see their own tasks and home in the list. Also took this opportunity to eradicate all of the old pending thumbnail stuff. Change-Id: I6dc52a06221c78097162e4a8b482027b798bf3ee
/frameworks/base/core/res/AndroidManifest.xml
|
10fa67c77e11699391e27975fc2d276a0b8c7cbb |
|
24-Mar-2014 |
Nicolas Prevot <nprevot@google.com> |
Introduce forwarding intents across profiles. The package manager service maintains, for some user ids, a list of forwarding intent filters. A forwarding intent filter is an intent filter with a destination (a user id). If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent. When the package manager service is asked for components that resolve an intent: If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent: The package manager service also returns the IntentForwarderActivity. This activity will forward the intent to the destination. Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/res/AndroidManifest.xml
|
b22aabbbd2801db0be526a64badf2efa208f19f1 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Merge "Introduce condition provider services."
|
7340fc8665ae3f9f1978f42aa0e5e1da85036158 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Introduce condition provider services. Add the condition provider interface, base class, and associated system metadata. Pull out common service management code into a reusable helper, used by notification listeners and condition providers. The helper, ManagedServices, is now completely self-contained - it has no dependencies on NoMan or NoMan abstractions. Bug:13743109 Change-Id: I6856d40f0a2ead78ac9b5707568559a57e7eb009
/frameworks/base/core/res/AndroidManifest.xml
|
91097de49b0f683b00e26a75dbc0ac6082344137 |
|
05-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Initial implementation of new voice interaction API. This gives a basic working implementation of a persist running service that can start a voice interaction when it wants, with the target activity(s) able to go through the protocol to interact with it. It may even work when the screen is off by putting the activity manager in the correct state to act like the screen is on. Includes a sample app that is a voice interation service and also has an activity it can launch. Now that I have this initial implementation, I think I want to rework some aspects of the API. Change-Id: I7646d0af8fb4ac768c63a18fe3de43f8091f60e9
/frameworks/base/core/res/AndroidManifest.xml
|
0a57a1112ff45507ef6361aabf42c97460405f47 |
|
18-Apr-2014 |
RoboErik <epastern@google.com> |
Merge "Add RouteProviders to the new Media APIs"
|
07c7077c54717dbbf2c401ea32d00fa6df6d77c6 |
|
20-Mar-2014 |
RoboErik <epastern@google.com> |
Add RouteProviders to the new Media APIs Compiles and works with OneMedia. This currently is a rough test of the system for finding, connecting to, and sending messages to routes. This will just connect to the first route it finds when a request to open the route picker is made (and disconnect when another request is made). Change-Id: I5de5521a079471b9e02664be4654c0591dfd9a6d
/frameworks/base/core/res/AndroidManifest.xml
|
66e5d96cf9e689148b202787bdc269519c4b6f8f |
|
09-Apr-2014 |
Robin Lee <rgl@google.com> |
Allow ProfileOwner apps to manage app restrictions Simple wrapper around the UserManager.{get|set}ApplicationRestrictions APIs. Also added a new Intent to signal to running apps that the set of restrictions has changed since startup. Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/res/AndroidManifest.xml
|
b51e0a6c4b249e0d6f404fafef007645221be0d3 |
|
09-Apr-2014 |
Jeff Davidson <jpd@google.com> |
Stub APIs for network scoring. NetworkScoreManager defines all interactions between the framework and the scorer app. An ACTION_SCORE_NETWORKS broadcast is sent to the default scorer with any unscored networks, which responds by calling updateScores() with scores for those networks. An app may also check whether they are currently the default scorer with getDefaultScorerPackage() and request to become the default via the ACTION_CHANGE_DEFAULT broadcast. Bug: 13786258 Change-Id: Id3dc0f7c1109f0e3afd73356e2475b7f34167419
/frameworks/base/core/res/AndroidManifest.xml
|
d951ab230d80631731ef12b5d76c678c30165d6a |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am 8ebd66c2: am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit '8ebd66c259602f6b0be26fdfd3fe2f55538f6424': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
8ebd66c259602f6b0be26fdfd3fe2f55538f6424 |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit 'cd4c1c714c37a1bc7ba35ebd2509eca4f0f6a314': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
cd9a7bb3ba742606f93dcbd549d6d6eeb1cb5247 |
|
08-Apr-2014 |
Aravind Akella <aakella@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor This reverts commit 819239e5bec90ee3c861ac45fffac4a832a183a1. Change-Id: I4bbb222e5c9dc65aed03aa28fd9e0f00fe335819
/frameworks/base/core/res/AndroidManifest.xml
|
6be2f95202237b7284542e692273d13a5bd26913 |
|
10-Apr-2014 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding render stats APIs to UiAutomation (framework)."
|
3957091ba8f08c02b5e781098cb955a5f697a1ff |
|
21-Feb-2014 |
Jae Seo <jaeseo@google.com> |
Initial round of Television Input Framework This provides APIs to control and create individual television inputs on the system which will later be hosted by television applications. Change-Id: I6866d28e78175a1bff2c32a85c5d77e94d0cd60c
/frameworks/base/core/res/AndroidManifest.xml
|
1376d600d8e0eefdbc0aa11d398cf7517fc77129 |
|
13-Mar-2014 |
Svetoslav <svetoslavganov@google.com> |
Adding render stats APIs to UiAutomation (framework). bug:12927198 Change-Id: Iae21481c75ae58dcdab3731bf5f1e2844e29d434
/frameworks/base/core/res/AndroidManifest.xml
|
acf395fd9441bce9fbe68c1b7efbf824570284bc |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am 819239e5: Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" * commit '819239e5bec90ee3c861ac45fffac4a832a183a1': Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"
|
fa1d2417d296e28a48a8c4a5cfb932172edbdd65 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61 (cherry picked from commit 819239e5bec90ee3c861ac45fffac4a832a183a1)
/frameworks/base/core/res/AndroidManifest.xml
|
819239e5bec90ee3c861ac45fffac4a832a183a1 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61
/frameworks/base/core/res/AndroidManifest.xml
|
ded264733036bb566c54da5b771d63f57213c84e |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am bdfe3841: am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'bdfe384106de364ea2effac6ab80108556d11649': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
bdfe384106de364ea2effac6ab80108556d11649 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'fd53d8352a4617941b0a0449390aa562a01ea1d3': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
fd53d8352a4617941b0a0449390aa562a01ea1d3 |
|
25-Mar-2014 |
Etienne Le Grand <etn@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor Change-Id: I16e5da68f860494e24cca64075be76fad02617bc
/frameworks/base/core/res/AndroidManifest.xml
|
9de8c1d82b6bf2b70e854a3349c9f1da60a23e83 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
resolved conflicts for merge of 4f342e87 to master Change-Id: I2cdb238759beb49fede2de703df8defee92d316f
/frameworks/base/core/res/AndroidManifest.xml
|
4f342e878d88b1f75a9b487e2aa0582b59e29083 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
am 4995d725: Merge "Add signature|system permission to MediaDrm signer APIs" into klp-modular-dev * commit '4995d72520d16302fca13bc4614d1dd3c0d1c17c': Add signature|system permission to MediaDrm signer APIs
|
65c94e695929ffa1aaa49d7b5938b34aaf078b6c |
|
02-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Add signature|system permission to MediaDrm signer APIs Also addresses style issues noted in post-submit review from https://googleplex-android-review.git.corp.google.com/#/c/439054/ Change-Id: If177b11dbcc049bc271529c119bc5c36ae0107b5 related-to-bug: 12702350
/frameworks/base/core/res/AndroidManifest.xml
|
82142c21dd333307682d5f4bb09de3ab3ccfa06c |
|
27-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define trust agent framework components Adds the TrustManager system service that allows registering for changes to the trust status and reporting events that are important to trust agents. Bug: 13723878 Change-Id: I7d0d2ea86fd755702d31aa5d49cac038a6cd4301
/frameworks/base/core/res/AndroidManifest.xml
|
ff2144ccb4215acf4587fc628493b3d49dca6043 |
|
28-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define initial trust agent API Adds the minimal API needed to define a useful trust agent. Bug: 13723878 Change-Id: Ib24440bab7b16d0b656bde8b059e7d42cab2c7dc
/frameworks/base/core/res/AndroidManifest.xml
|
a42cb8b0e2b8fdfbac1a6590d6b60814caa01088 |
|
21-Mar-2014 |
Colin Cross <ccross@android.com> |
resolved conflicts for merge of a67e34c8 to master Change-Id: I597525886260884c9b2dfc7945e01eb8138a58c2
|
cf0c4a59b6d6c7d0abe6b643e200af2eb9f0d6b2 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am 4868da52: am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit '4868da52450d3e5456b3567c228967539144d108': Lock down MANAGE_DOCUMENTS permission.
|
4868da52450d3e5456b3567c228967539144d108 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit 'c620ec3614c8737b87d60efa9db96c288bcad794': Lock down MANAGE_DOCUMENTS permission.
|
f2fecf48f740a079cf9015ea8c2695039ca11d81 |
|
21-Mar-2014 |
Jinsuk Kim <jinsukkim@google.com> |
am c61f4dd7: Merge "Add HDMI-CEC service" into klp-modular-dev * commit 'c61f4dd744b1b0396703aa58eb22fc31d2b7050e': Add HDMI-CEC service
|
adfe8b86e9178a553b6db9722340fa4ff5201cf1 |
|
05-Feb-2014 |
Christopher Tate <ctate@google.com> |
App widget backup/restore infrastructure Backup/restore now supports app widgets. An application involved with app widgets, either hosting or publishing, now has associated data in its backup dataset related to the state of widget instantiation on the ancestral device. That data is processed by the OS during restore so that the matching widget instances can be "automatically" regenerated. To take advantage of this facility, widget-using apps need to do two things: first, implement a backup agent and store whatever widget state they need to properly deal with them post-restore (e.g. the widget instance size & location, for a host); and second, implement handlers for new AppWidgetManager broadcasts that describe how to translate ancestral-dataset widget id numbers to the post-restore world. Note that a host or provider doesn't technically need to store *any* data on its own via its agent; it just needs to opt in to the backup/restore process by publishing an agent. The OS will then store a small amount of data on behalf of each widget-savvy app within the backup dataset, and act on that data at restore time. The broadcasts are AppWidgetManager.ACTION_APPWIDGET_RESTORED and ACTION_APPWIDGET_HOST_RESTORED, and have three associated extras: EXTRA_APPWIDGET_OLD_IDS EXTRA_APPWIDGET_IDS EXTRA_HOST_ID [for the host-side broadcast] The first two are same-sized arrays of integer widget IDs. The _OLD_IDS values are the widget IDs as known to the ancestral device. The _IDS array holds the corresponding widget IDs in the new post- restore environment. The app should simply update the stored widget IDs in its bookkeeping to the new values, and things are off and running. The HOST_ID extra, as one might expect, is the app-defined host ID value of the particular host instance which has just been restored. The broadcasts are sent following the conclusion of the overall restore pass. This is because the restore might have occurred in a tightly restricted lifecycle environment without content providers or the package's custom Application class. The _RESTORED broadcast, however, is always delivered into a normal application environment, so that the app can use its content provider etc as expected. *All* widget instances that were processed over the course of the system restore are indicated in the _RESTORED broadcast, even if the backing provider or host is not yet installed. The widget participant is responsible for understanding that these are promises that might be fulfilled later rather than necessarily reflecting the immediate presentable widget state. (Remember that following a cloud restore, apps may be installed piecemeal over a lengthy period of time.) Telling the hosts up front about all intended widget instances allows them to show placeholder UI or similarly useful information rather than surprising the user with piecemeal unexpected appearances. The AppWidgetProvider helper class has been updated to add a new callback, onRestored(...), invoked when the _RESTORED broadcast is received. The call to onRestored() is immediately followed by an invocation of onUpdate() for the affected widgets because they will need to have their RemoteViews regenerated under the new ID values. Bug 10622506 Bug 10707117 Change-Id: Ie0007cdf809600b880d91989c00c3c3b8a4f988b
/frameworks/base/core/res/AndroidManifest.xml
|
8e3feb15c5aec2c72b0ef120a1da325e1e8f0dda |
|
24-Feb-2014 |
Svetoslav <svetoslavganov@google.com> |
Added accessibility APIs for introspecting interactive windows. 1. The old introspection model was allowing querying only the active window which is the one the user is touching or the focused one if no window is touched. This was limiting as auto completion drop downs were not inspectable, there was not way to know when the IME toggles, non-focusable windows were not inspectable if the user taps them as until a screen-reader starts introspecting the users finger is up, accessibility focus was limited to only one window and the user couldn't use gestures to visit the whole UI, and other things I can't remember right now. The new APIs allow getting all interactive windows, i.e. ones that a sighted user can interact with. This prevents an accessibility service from interacting with content a sighter user cannot. The list of windows can be obtained from an accessibility service or the host window from an accessibility node info. Introspecting windows obey the same rules for introspecting node, i.e. the service has to declare this capability in its manifest. When some windows change accessibility services receive a new type of event. Initially the types of windows is very limited. We provide the bounds in screen, layer, and some other properties which are enough for a client to determined the spacial and hierarchical relationship of the windows. 2. Update the documentation in AccessibilityService for newer event types. 3. LongArray was not removing elements properly. 4. Composite accessibility node ids were not properly constructed as they are composed of two ints, each taking 32 bits. However, the values for undefined were -1 so composing a 64 long from -1, -1 prevents from getting back these values when unpacking. 5. Some apps were generating inconsistent AccessibilityNodeInfo tree. Added a check that enforces such trees to be well formed on dev builds. 6. Removed an necessary code for piping the touch exploration state to the policy as it should just use the AccessibilityManager from context. 7. When view's visibility changed it was not firing an event to notify clients it disappeared/appeared. Also ViewGroup was sending accessibility events for changes if the view is included for accessibility but this is wrong as there may be a service that want all nodes, hence events from them. The accessibility manager service takes care of delivering events from not important for accessibility nodes only to services that want such. 8. Several places were asking for prefetching of sibling but not predecessor nodes which resulted in prefetching of unconnected subtrees. 9. The local AccessibilityManager implementation was relying on the backing service being ready when it is created but it can be fetched from a context before that. If that happens the local manager was in a broken state forever. Now it is more robust and starts working properly once the backing service is up. Several places were lacking locking. bug:13331285 Change-Id: Ie51166d4875d5f3def8d29d77973da4b9251f5c8
/frameworks/base/core/res/AndroidManifest.xml
|
4f512fb451c8ddcea852645c5c24314c20c0974b |
|
28-Feb-2014 |
Jinsuk Kim <jinsukkim@google.com> |
Add HDMI-CEC service This CL adds a system service handling HDMI-CEC protocol. The service is equipped with the capability sending/receiving HDMI-CEC messages Not all the messages are in place. Currently it has messages to support a few features only, as follows: - One touch play - System information - Routing control (partially - active source status maintenance only) - Device OSD transfer - Power status It will be extended to cover the wider usages in the follow up CLs. The CEC standard version referenced in the implementation is 1.3a. Change-Id: Ifed0b02f52ebf098eddb3bd0987efbf353b7e8fe
/frameworks/base/core/res/AndroidManifest.xml
|
d0abcedece5c749129af89cf096534c98a716d89 |
|
20-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Introduce the SearchIndexablesProvider and its friends"
|
b49995d4d997bf086c2f3214ca410b2a30861b13 |
|
15-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Introduce the SearchIndexablesProvider and its friends - enable retrieval of search data to be indexed Change-Id: I4a16408dec3d3305bf20107fb11eb2d1aee7fad5
/frameworks/base/core/res/AndroidManifest.xml
|
42c32c0c88e4049a358b0a2bf6e6a5881ee206b8 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
b4ca2639e4fddaaf7ff72ec7322929d6397e66b7 |
|
13-Mar-2014 |
Jessica Hummel <jhummel@google.com> |
Temporarily allow system apps to fully act across users. This is to allow launcher to start activities across users and will be reverted when an alternative API is provided. Change-Id: I67ec3e9d419afffbadce37d6e9958e2dfc096fb2
/frameworks/base/core/res/AndroidManifest.xml
|
d6396d67201fb2b64d13070324bb115c9c23b08a |
|
28-Jan-2014 |
Jason Gerecke <killertofu@gmail.com> |
Allow persistence of input device calibration This patch extends the PersistentDataStore store to read and write input device calibration data. A new SET_INPUT_CALIBRATION permission grants apps the ability to update this information, and a new TouchCalibration class is used to wrap the raw calibration data. Change-Id: I4daac2b15ef03616ea5b068c1e77bebd0ce7b8c1
/frameworks/base/core/res/AndroidManifest.xml
|
4c8c27ed7360abe3cd91a281e40d4e21948abc2a |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. DO NOT MERGE. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa (cherry picked from commit b4aeac730503eb4b9db7d2dcece48e1ca13b4b30)
/frameworks/base/core/res/AndroidManifest.xml
|
f55616cd8b78ed55148ee2dcfcf59cd34cdb4a96 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978 (cherry picked from commit 08d7c2861fee205a314c3847ab5f5894617a233b)
/frameworks/base/core/res/AndroidManifest.xml
|
b4aeac730503eb4b9db7d2dcece48e1ca13b4b30 |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa
/frameworks/base/core/res/AndroidManifest.xml
|
a4eeb0dca0108ac5b2c0f0dc044c9104ba1db302 |
|
04-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am bc8301df: am 0054ed81: am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit 'bc8301dfa3fc2789c4bf8dc82784075980b6329f': Update permission description string.
|
0054ed815a3db340a27d8a179d3b748bf3eeaaf0 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '8bb3b8f805658ecf9106778992dceea9a05dcc4c': Update permission description string.
|
8bb3b8f805658ecf9106778992dceea9a05dcc4c |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '95cf532fe389713ff1fb33810012586fd460e223': Update permission description string.
|
26de0b7118e188bac5a30d9562418fa09be3826a |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am cce121fb: Merge "Update permission description string." into klp-docs * commit 'cce121fb7504fbc460b85564735ff5d8a1ed4d55': Update permission description string.
|
08d7c2861fee205a314c3847ab5f5894617a233b |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978
/frameworks/base/core/res/AndroidManifest.xml
|
3cff34742aa4f4b305b2edc462a369355b2e75da |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am 341e6b73: am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit '341e6b73e6362f8757717a2518b370724c3a3913': Make FORCE_STOP_PACKAGES "signature|system"
|
341e6b73e6362f8757717a2518b370724c3a3913 |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit 'fd6d8a8b736568ccb61af10dec04a99a8c36f29a': Make FORCE_STOP_PACKAGES "signature|system"
|
0c9bd3ed4da14fbfe7f9cab872b94ed2be436cc2 |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b (cherry picked from commit 4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e)
/frameworks/base/core/res/AndroidManifest.xml
|
89f545a4ebd96b7d36b00eafa43db8ea70ed21f9 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
5a92fec650447baddff3c85aaa83c6fc805880bf |
|
14-Feb-2014 |
rich cannings <richc@google.com> |
Merge "Make FORCE_STOP_PACKAGES "signature|system""
|
005151484546fb0bf7f83c5a6ee065715230bf26 |
|
13-Feb-2014 |
Narayan Kamath <narayan@google.com> |
resolved conflicts for merge of 396b9e79 to master Change-Id: Ie71a79699be57f5af6069559068bf6253835d805
|
27bf55c8159e7f883ddc839453d5a12374ddc50a |
|
13-Feb-2014 |
Wink Saville <wink@google.com> |
am 16c0b295: am bba3a694: Merge "Telephony API extension v2" * commit '16c0b295ef069e128a4e01fd2f72da06784950a1': Telephony API extension v2
|
4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b
/frameworks/base/core/res/AndroidManifest.xml
|
8f9b33e77686de8e917ba61c5e2f2e31a1e0e49b |
|
15-Jan-2014 |
Jake Hamby <jhamby@google.com> |
Add new RIL commands to read/write NV items and reset NV config. Add new RIL commands and generic code cleanups. The only changes required for OMA DM support are the addition of five new methods in ITelephony.aidl for reading/writing NV items and performing NV config and radio resets (requires MODIFY_PHONE_STATE), along with the new RIL request IDs in RILConstants.java. Bug: 12864208 Change-Id: I958d2571580d98a49936ef2e6822e5ac086acbe2
/frameworks/base/core/res/AndroidManifest.xml
|
31b4834b6d5eb1e5156950930b69221819a84766 |
|
03-Feb-2014 |
Christopher Tate <ctate@google.com> |
Merge "Introduce "IdleService" API to expose idle-time maintenance to apps"
|
d417d625d244356bc770e2692fd59e754a72f59f |
|
20-Aug-2013 |
Christopher Tate <ctate@google.com> |
Introduce "IdleService" API to expose idle-time maintenance to apps When an application wishes to do low-priority background work when the device is otherwise idle (e.g. in a desk dock overnight), it declares a service in its manifest that requires this permission: android:permission="android.permission.BIND_IDLE_SERVICE to launch, and which publishes this intent filter: <intent-filter> <action android:name="android.service.idle.IdleService" /> </intent-filter> This string is declared in the API as IdleService.SERVICE_INTERFACE. The service must be implemented by extending the new "IdleService" class, which provides the API through which the system will communicate with the app. IdleService declares three methods, two of which are lifecycle callbacks to the service, and the third of which is for the service itself to invoke when appropriate. The lifecycle callbacks are public abstract boolean onIdleStart(); public abstract void onIdleStop(); The first of these is a notification to the service that an idle maintenance interval has begun. The service can then spin off whatever non-UI work it wishes. When the interval is over, or if the OS determines that idle services should be shut down immediately, the onIdleStop() method will be invoked. The service must shut down any background processing immediately when this method is called. Both of these methods must return immediately. However, the OS holds a wakelock on the application's behalf for the entire period between the onIdleStart() and onIdleStop() callbacks. This means that for system-arbitrated idle-time operation, the application does not need to do any of its own wakelock management, and does not need to hold any wakelock permissions. The third method in IdleService is public final void finishIdle(); Calling this method notifies the OS that the application has finished whatever idle-time operation it needed to perform, and the OS is thus free to release the wakelock and return to normal operation (or to allow other apps to run their own idle services). Currently the idle window granted to each idle service is ten minutes. The OS is rather conservative about when these services are run; low battery or any user activity will suppress them, and the OS will not choose to run them particularly often. Idle services are granted their execution windows in round-robin fashion. Bug 9680213 Change-Id: Idd6f35940c938c31b94aa4269a67870abf7125b6
/frameworks/base/core/res/AndroidManifest.xml
|
17b79985f4e5e6b696320e29f665adb796a2aef5 |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
am 47e276db: am cbd156c1: Merge "Update READ&WRITE_DREAM_STATE to signature|system." into klp-modular-dev * commit '47e276db2a938ca4ff9767cba28062b892e81629': Update READ&WRITE_DREAM_STATE to signature|system.
|
4fda2d5ab7a3faf782c78e2f1ac4a54201ab8dff |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
Update READ&WRITE_DREAM_STATE to signature|system. Change-Id: Ic3c4c5445384712571e7a1188ed9e2ab6ceb4bde
/frameworks/base/core/res/AndroidManifest.xml
|
bca57ee556c26cd3eaeccab43ec3ddda39d287fa |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
am e2bb257c: Merge "Make MANAGE_ACTIVITY_STACKS a signature|system permission." into klp-modular-dev * commit 'e2bb257c349b21f68e3b9b87eb7cabd205380082': Make MANAGE_ACTIVITY_STACKS a signature|system permission.
|
9e24357ddb504e575ce86207355811bfc9008088 |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
Make MANAGE_ACTIVITY_STACKS a signature|system permission. To allow ActivityView support within privileged apps. Change-Id: Ic0246939bf71c52ca9415149415a976537c8270b
/frameworks/base/core/res/AndroidManifest.xml
|
3b0218b0ae1fad67f539ff3c10d6d2f3abec1a11 |
|
14-Jan-2014 |
Doug Zongker <dougz@android.com> |
boot into recovery via the pre-recovery service Change PowerManagerService to start the pre-recovery service rather than rebooting directly, when requested to reboot into recovery. Add a new RECOVERY permission which a caller needs (in addition to REBOOT) in order to go to recovery. Bug: 12188746 Change-Id: I39121b701c4724558fe751adfbad79f8567faa43
/frameworks/base/core/res/AndroidManifest.xml
|
c5ac15a3e11c03951e269b243674858411204b67 |
|
27-May-2013 |
Antonio Marín Cerezuela <amarin@swissms.ch> |
Telephony API extension v2 Added new AndroidManifest permission: android.permission.READ_PRECISE_PHONE_STATE Added the following PhoneStateListeners and corresponding broadcast intents: onPreciseCallStateChanged(PreciseCallState callState); onPreciseDataConnectionStateChanged(PreciseDataConnectionState dataConnectionState); broadcastPreciseCallStateChanged(int ringingCallState, int foregroundCallState, int backgroundCallState, int disconnectCause, int preciseDisconnectCause) broadcastPreciseDataConnectionStateChanged(int state, int networkType, String apnType, String apn, String reason, LinkProperties linkProperties, String failCause) Added TelephonyManager intent actions with their extras and constants: public static final String ACTION_PRECISE_CALL_STATE_CHANGED = "android.intent.action.PRECISE_CALL_STATE"; public static final String ACTION_PRECISE_DATA_CONNECTION_STATE_CHANGED = "android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED"; public static final int PRECISE_CALL_STATE_* Moved public static final int DISCONNECT_CAUSE_* from PreciseCallState.java to a new class DisconnectCause.java Moved public static final int PRECISE_DISCONNECT_CAUSE_* from PreciseCallState.java to a new class PreciseDisconnectCause.java Change-Id: If3b88c679507c529b746046c4a17cf6d9974bd09
/frameworks/base/core/res/AndroidManifest.xml
|
c4d41755d73ffe85d179d42a4f0c993b49303145 |
|
17-Dec-2013 |
Shishir Agrawal <shishir@google.com> |
Merge "Adding support for SIM communication from Android over logical channels."
|
57f656b9f6271cf857b5ecec5f8c7eacb321ec0b |
|
28-Oct-2013 |
Shishir Agrawal <shishir@google.com> |
Adding support for SIM communication from Android over logical channels. Expose the folowing commands in ITelephony.aidl and TelephonyManager: - iccOpenLogicalChannel - iccCloseLogicalChannel - iccTransmitApduLogicalChannel Also add a new SIM_COMMUNICATION permission (maked as dangerous) to control access to the above commands. Change-Id: I89c08adc6f9738907e3b547c749f3cc61f300710
/frameworks/base/core/res/AndroidManifest.xml
|
09e9cdceceb722643e2c80c6544d44a43d7f95f0 |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
DO NOT MERGE : Move some system services to their own sub package. (Cherry pick from master) As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: Idd92871c1828bdde81d85fe99a9c87a22d53169d
/frameworks/base/core/res/AndroidManifest.xml
|
38a7ed05f8fed0aa81f7214d827875f9876ffbe1 |
|
15-Nov-2013 |
Andres Morales <anmorales@google.com> |
Adding INfcUnlockSettings and NfcUnlock interface class. Change-Id: Ie55a5d4bb58c2944952fc84cce32d3573a3a1a22
/frameworks/base/core/res/AndroidManifest.xml
|
84e0747552cfaa0546822df221e3dece7481c4b1 |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
am 461febad: am 64397749: am 22010817: Merge "Handle backup transport registration dynamically" into klp-dev * commit '461febadc44190bf19e870a0bc1a706ec3667212': Handle backup transport registration dynamically
|
cefba58d14f9669b57c16b4ea493779d882c43bd |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
Handle backup transport registration dynamically Bug 11369873 Change-Id: I9bbdcc21ce25159c6645690123b5d03c553b0ddc
/frameworks/base/core/res/AndroidManifest.xml
|
30f8eb472e44228069c2ffb8bd0b43213edbf04e |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
Move some system services to their own sub package. As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: I33e48d070f38186819d3a1d7a4dc3984b75a9eda
/frameworks/base/core/res/AndroidManifest.xml
|
6c58d890f3a6993a3bcf413b84ba6fba875832f8 |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
am 84d76025: am eb223425: am 1f7a8a06: Merge "Add a platform library for remote display providers." into klp-dev * commit '84d760257f46232601e5f47411fb4e59f57f1872': Add a platform library for remote display providers.
|
1f7a8a06256907e03405f89108f081289c23e97a |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Merge "Add a platform library for remote display providers." into klp-dev
|
f3c99e883f46c56e5e2877e844b902b6eb45545b |
|
06-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Add a platform library for remote display providers. This interface allows applications to register services that offer remote displays to the system. The system will then provide UI to allow user to connect to these displays and enable mirroring. Bug: 11257292 Change-Id: I34da5b9dfdaf71267bd3450c505bc1b7368d1b40
/frameworks/base/core/res/AndroidManifest.xml
|
99543e03b87899ac5de4f7f2dc388e5c9f546d04 |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 8f4797d1: am 35c94390: am 7ce4381a: Merge "Move READ_EXTERNAL_STORAGE to storage group." into klp-dev * commit '8f4797d111cf3dd83fdda69bdbe2a7dcef1888d9': Move READ_EXTERNAL_STORAGE to storage group.
|
eaa9780fd64f122df8a306562786e106ae228ceb |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Move READ_EXTERNAL_STORAGE to storage group. Bug: 11437351 Change-Id: I460a3ee7860e8591e601eec7d390c3ca7eed1be6
/frameworks/base/core/res/AndroidManifest.xml
|
3aab4962513bc61ea75ac1e4cc239a97ee5f1860 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
am 41fab0a1: am fa191d5a: am d9e98a4b: Merge "Unhide BIND_NFC_SERVICE permission." into klp-dev * commit '41fab0a19caeb8077171f0eb605f416cbc4a0ef0': Unhide BIND_NFC_SERVICE permission.
|
8c99ab849e7d9c87bae3b20377af66ad266eba99 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
Unhide BIND_NFC_SERVICE permission. Needs to be held by host-based card emulation apps in order to work. Bug: 11352063 Change-Id: I8ba42446cd3066b38309d8e9cbc51d140a023547
/frameworks/base/core/res/AndroidManifest.xml
|
ad9739cdbeb09f672304a0812c6c5fef5733e1c2 |
|
14-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5f7f97e0: am 2dbe1627: am 12ad9ce2: Merge "Fix spelling." into klp-dev * commit '5f7f97e01507c6d5860388dfea860e05c2a3616e': Fix spelling.
|
ed74f8eda220445a09f4b49b66de73da2f71c3eb |
|
11-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Fix spelling. Change-Id: Ibcc5a5b976e185c4a6605b18b645b05a5c00f3ec
/frameworks/base/core/res/AndroidManifest.xml
|
0fae349f19e2f4738c12f4849054c72a007770b0 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am 353ec474: am 8029493f: am f012b777: Merge "Fix some doc issues." into klp-dev * commit '353ec47422cbd1bb40f19e7ec9ec6b4f300ee3ab': Fix some doc issues.
|
ebc15ef80ff1b4354be99a45d348537f094d6b59 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix some doc issues. Bug: 11079621 Bug: 10461610 Bug: 10461369 Bug: 10461417 Change-Id: I7fd966f3cda0660ba20fa15d7164dcac95efadd3
/frameworks/base/core/res/AndroidManifest.xml
|
b8aa12273f91b4b2689ceca5029da58d8f307bee |
|
02-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am af85c03d: am b9edb3a2: Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev * commit 'af85c03deb3506cebebd1719df4bfb844505fc9d': Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature.
|
3d2a664a426be706d293e895493ee96376b1de30 |
|
02-Oct-2013 |
Matthew Xie <mattx@google.com> |
am 9eb9ebb2: am 0e772b22: Merge "Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields" into klp-dev * commit '9eb9ebb2fbbe1135919cf685d84eba18cfecdf01': Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields
|
b9edb3a22b3342912bb9eef79aee0bfcb6be1675 |
|
01-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev
|
3714141d287c965ea3451831dd5167f63f8db87b |
|
30-Sep-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature. Change-Id: I432a2ddbd2fe1d095bb3895c5c122acf465d0c9b
/frameworks/base/core/res/AndroidManifest.xml
|
091fc2ba7a4441b9985dfd9ebe25cb7c99a7324b |
|
24-Sep-2013 |
Matthew Xie <mattx@google.com> |
Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields bug 9987787 Change-Id: Id1c149964137e35703310e2f2893c8830aacddea
/frameworks/base/core/res/AndroidManifest.xml
|
e5a8b028c3bccc5eb72c5d23c8a43eecee9740a7 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
am 54e3e7b5: am 92baafb4: Merge "Moving Launcher permission to Framework. (Bug 10343529)" into klp-dev * commit '54e3e7b5d43b87bddabfb2e312becb33a8c46582': Moving Launcher permission to Framework. (Bug 10343529)
|
4516798862bf46d12b3f1130b8480e8c804146d0 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
Moving Launcher permission to Framework. (Bug 10343529) Change-Id: Ic48c254c844e65171b5f92d81272962cdc673acc
/frameworks/base/core/res/AndroidManifest.xml
|
80326646b79538178c3115a4bf2d89b9616c50be |
|
19-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am 58910a74: am 1608f496: Merge "Public API for RemoteController" into klp-dev * commit '58910a746ebf915264b87536ab25148a94714ca2': Public API for RemoteController
|
a83487e8c618f3c267c3fe3a72d4eb9f1388d07e |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
Public API for RemoteController Public API, under system|signature permission for access to currently playing metadata and playback state. Public API for sending media key events. Bug 8209392 Change-Id: I39b9309ca3fb1bc305492bad98740df0ae0842b2
/frameworks/base/core/res/AndroidManifest.xml
|
cac8a1c08ce5c07e5d5a4ab4314fa46ddf52c983 |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am f54f7d70: am 15bcc323: Merge "RemoteController class to expose IRemoteControlDisplay features" into klp-dev * commit 'f54f7d707546a99ffc5345591f2c9488e6149e84': RemoteController class to expose IRemoteControlDisplay features
|
7ddd226e7c6e759feaf2747a90be1cc06acf37a3 |
|
02-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
RemoteController class to expose IRemoteControlDisplay features Wrap all the features of IRemoteControlDisplay.aidl in a new class, RemoteController, that implements the IRemoteControlDisplay interface. The API functions to expose in the SDK are tagged with "CANDIDATE FOR API" Bug 8209392 Change-Id: I597bcd503ac93e73889c9ae8b47b16c4fcb363bc
/frameworks/base/core/res/AndroidManifest.xml
|
8a4577a1697f053f94527fc2dfa89209284d8d71 |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am deae1e11: am b00e5cc6: Merge "Add permissions for the InCallUI Split." into klp-dev * commit 'deae1e11bf9d6ee40e70bee62d24dbcb01ef1b60': Add permissions for the InCallUI Split.
|
b00e5cc610f24aca7e989db0ca552c952d2a924f |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
798363894d21cf87bf1915372f9dcc4605b3d4ac |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic1023adba939c82e9bce844c104f85821f21f43c
/frameworks/base/core/res/AndroidManifest.xml
|
dde1f8b01b02b6227444d9096e106b93615bb83f |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
am 1e763fd2: am e4fdc847: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '1e763fd280b3dc555e6a0a3a6458fbdb9a43e096': Revert "Add permissions for the InCallUI Split."
|
e4fdc84794923f9408fc400ed9177178329a08cd |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
41b9ef9c4e175770e4ccef3d83d117f404915b48 |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit 4f7ffa90d117e499786c77bccefdef88c1714668. Change-Id: If07f7dd0b416c070398593e2d5a15b3557c1f323
/frameworks/base/core/res/AndroidManifest.xml
|
835b5f344ba63a6c0ac9c8a7cc40052134d59b8c |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
am e33b79ef: am 95a18139: Merge "Add HOTWORD as an AudioSource" into klp-dev * commit 'e33b79ef373fd3db9de035b5ecf2137a0684a441': Add HOTWORD as an AudioSource
|
e7f6bfbc51365f40185f53027c7dd5a07e162924 |
|
12-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 07d545e0: am e0b7e4cf: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '07d545e08d615865860a0f73b7eabfd149754893': Add permissions for the InCallUI Split.
|
4c980cc6aede622b165d7936a89aae507a317cd3 |
|
12-Sep-2013 |
Alexander Ray <aray@google.com> |
am b0049151: am 7563d423: Merge "Add consumer IR framework" into klp-dev * commit 'b0049151f7c1f2ffa7481ac7c6f6baf7a548c5e8': Add consumer IR framework
|
6f64688bc8c1fc01b632dadfe4f75587f446e626 |
|
12-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am 6c5e9fb4: am f702286c: Merge "Remove HotwordRecognition APIs" into klp-dev * commit '6c5e9fb4c4215f76a8a1fd8d72eee1154deb1039': Remove HotwordRecognition APIs
|
95a181397dad3113b96e3cc7392a5b0f5d742f39 |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Merge "Add HOTWORD as an AudioSource" into klp-dev
|
e0b7e4cf455b21316661b158edee12ac5467995c |
|
11-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
7563d42331ed7df7f026c8921ae990ce2fca9efd |
|
11-Sep-2013 |
Alexander Ray <aray@google.com> |
Merge "Add consumer IR framework" into klp-dev
|
65a6ba347848069b198869a7500d07a419aaf15d |
|
11-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Remove HotwordRecognition APIs - and its usage from Keyguard Bug: 10708010 Change-Id: Ic4a695a1d0e9312706a3b4ff01e59e2567b6ad9c
/frameworks/base/core/res/AndroidManifest.xml
|
51e95df8f24e9ea30775686b9e324b9a671213dc |
|
26-Jun-2013 |
Erik Gilling <konkers@android.com> |
Add consumer IR framework Change-Id: I786c00db0cce61ef75e4edc24e90f2cdcba6dbfb
/frameworks/base/core/res/AndroidManifest.xml
|
357263da0ec2bc2be9d48c1becc3d94288c2f3ed |
|
09-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Add HOTWORD as an AudioSource - This is a low-priority source that can be preempted by others - This is required for scenarios where someone wants an alway-on graceful microphone Bug: 10640877. Change-Id: Idb3577541103717cb713a7a93d3762ad2c2f4710
/frameworks/base/core/res/AndroidManifest.xml
|
4f7ffa90d117e499786c77bccefdef88c1714668 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: I7e45aeebbe8873f99fe897272390fb06f1840d2d
/frameworks/base/core/res/AndroidManifest.xml
|
bc7d392ef1fb7f7cf12a518b20d6e8f59e092c51 |
|
07-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am c3360d2a: am b05b4086: Merge "Add permission checks and unhide the Hotword recognition APIs" into klp-dev * commit 'c3360d2a8b6d7b8e820c99844364be4f1fc83824': Add permission checks and unhide the Hotword recognition APIs
|
c73c1783744baeeabc620ecede545e0ffbd034d4 |
|
06-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Add permission checks and unhide the Hotword recognition APIs - Also tweak the API a little to send an intent on hotword being recognized. Change-Id: I8a3fedaec4e1db595ed058089734d25c7957111e
/frameworks/base/core/res/AndroidManifest.xml
|
cd57b4950f5df4c3c435ec3995d730ad98b525dc |
|
06-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
am 3d27c9f9: am f1eebfc2: Merge "Remove unused APIs and rename others based on API review" into klp-dev * commit '3d27c9f973b1dd35ed457785b452851316cdca8a': Remove unused APIs and rename others based on API review
|
d304af69891483aad808356af1ac5f00e90c8edf |
|
05-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
Remove unused APIs and rename others based on API review Restrictions challenge is only to be used by device admins. Bug: 10461761 Change-Id: I3db1249e2ce99f386602de59ed930302bb0a97fb
/frameworks/base/core/res/AndroidManifest.xml
|
7275ecc5094f119be35f485ebad9ef1c858d8206 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
am 70c2dd93: am 2cf8138b: Merge "Add LocationManager.MODE_CHANGED_ACTION broadcast" into klp-dev * commit '70c2dd932bd585ed578ea684db06f17c4e5d24d3': Add LocationManager.MODE_CHANGED_ACTION broadcast
|
40a86c24d2601df4966c57573a5bf58b30a41990 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
Add LocationManager.MODE_CHANGED_ACTION broadcast - Currently redundant with PROVIDERS_CHANGED_ACTION, but that may change in the future - Part of fix for b/10409275 Change-Id: I12daaf20e6546fd9e9dc71c599967fa0ad95e27f
/frameworks/base/core/res/AndroidManifest.xml
|
92774a9f9739da20a47ea576f91777e656106db9 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8bd2eb31: am 90a5df1e: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '8bd2eb314bf923f556fda0229a1ef44392c4ec00': Revert "Add permissions for the InCallUI Split."
|
90a5df1ee8c89ca17df93d9ecf95652b2ae619f4 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
b6c46d2381e707f0b55b193636fc515ba3129d7a |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit bf84eb5ed579d13b74c97b995299ca61cafedea6. Change-Id: I40e311174898a741f5053501290833420355ad03
/frameworks/base/core/res/AndroidManifest.xml
|
42d1cd25be5865fa2f50948e71fd50cd74ba18c6 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8fab063a: am 7f60dc57: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '8fab063abcfef648bef9232dad62c8b8cea251d5': Add permissions for the InCallUI Split.
|
7f60dc57780281030f26a2109a64d0260e976af7 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
bf84eb5ed579d13b74c97b995299ca61cafedea6 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic759d14acefcea746e0d8e86c0f006d4bc462386
/frameworks/base/core/res/AndroidManifest.xml
|
4b905b6195443acb2e16f234f4cb24318b9a3458 |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 97c61ab7: am 86d2db97: Merge "Print spooler security and some new print service facing APIs." into klp-dev * commit '97c61ab7c02c24c485acf5775310a304730dfeea': Print spooler security and some new print service facing APIs.
|
86d2db9750657401deadea6766c94300c3bfc7cd |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Print spooler security and some new print service facing APIs." into klp-dev
|
d26d4898fcc9b78f4b66118895c375384098205e |
|
28-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print spooler security and some new print service facing APIs. 1. Updated the security mode of the print spooler. Now the spooler is not signed with the system key, it is not a privileged app so if it gets compromised (PDF rendering is a potential attack vector) it cannot access dangerous permissions. Also only the system can bind to the spooler. 2. Added APIs for asking a print service to start and stop tracking a given printer. This is need for the case when the user selects the printer and the print service should do a best effort to keep the system updated for the current state of the printer. 3. Added APIs for putting a print job in a blocked state. A print service would report the print job as blocked if for some reason the printer cannot proceed, e.g. 99 pages are printed but there is no paper for the last one. The user has to add more paper and the print service can resume the job. 4. Changed the read/write APIs to use ParcelFileDescriptor instead of FileDescriptor since the latter does not have a clean API for detaching the wrapped Linux file descriptor when one wants to push it to native. 5. Added API for getting the size of the printed document so the print service can avoid handling big filed over cellular network or ask the user if needed. 6. Now the print services that are preinstalled on the system image are automatically enabled. Change-Id: Ia06c311d3d21cabb9e1368f13928e11cd0030918
/frameworks/base/core/res/AndroidManifest.xml
|
ae1fda5aa3979445153d84f418092cc2473b3c24 |
|
30-Aug-2013 |
Wink Saville <wink@google.com> |
am d2f41b3d: am 35bd30b1: Merge "Merge commit \'270226b0\' into manualmerge" into klp-dev * commit 'd2f41b3dc692e2c9a0c2f60bdf0730d9b52b6df3': Add support for handling mobile provisioning networks.
|
7788c61af5927a0fac612ea94d5205eeec2f507f |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Merge commit '270226b0' into manualmerge * commit '270226b0': Add support for handling mobile provisioning networks. Conflicts: core/java/android/net/CaptivePortalTracker.java core/java/android/net/ConnectivityManager.java core/java/android/net/IConnectivityManager.aidl core/java/android/net/MobileDataStateTracker.java core/res/AndroidManifest.xml services/java/com/android/server/ConnectivityService.java Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
|
948282b0e6cf5310f09db97a4ae939db7c1cef72 |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Add support for handling mobile provisioning networks. When a sim is new or it has expired it needs to be provisioned with the carrier. Basically provisioning is associating a sim with a user account. When a sim isn't provisioned then operators will restrict access to the network and only allow certain addresses or services to be used. This set of changes allows two types of provisioning networks to be recognized. The first is a network that causes all DNS lookups to be redirected to a different address than was intended. This is exemplified by how T-Mobile works. The second technique uses a special apn for provisioning. An example is AT&T where lwaactivate is the provisioning apn and broadband is the normal apn. We first try broadband and if we are unable to connect we try lwaactivate. When we see the activate we identify it as special and the ApnContext.isProvisioningApn will return true. In the future our plan is to create a new network type that can be added to the apn list, but for now it identified by name. Here is a list of significant changes: - CaptivePortalTracker now only test WiFi networks instead of all networks - checkMobileProvisioning checks for provisioning networks and doesn't try to ping. - IConnectivityManager.aidl changes: * getProvisioningOrActiveNetworkInfo was added to and used by Manage mobile plan in WirelessSettings so even when there is no active network it will still allow provisioning. Otherwise it would report no internet connection. * setSignInErrorNotificationVisible is used by both CaptiviePortalTracker and checkMobileProvisioning so they use the same code for the notifications. * checkMobileProvisioning was simplified to have only a timeout as returning the result is now harder as we abort simultaneous call otherwise we'd could get into loops because we now check every time we connect to mobile. - Enhanced MDST to handle the provisioning network. - Added CONNECTED_TO_PROVISIONING_NETWORK to NetworkInfo to make a new state so we don't announce to the world we're connected. - TelephonyIntents.ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN is sent by the low level data connection code to notify Connectivity Service that a provisioning apn has connected. This allows CS to handle the connection differently than a normal connection. Bug: 10328264 Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
/frameworks/base/core/res/AndroidManifest.xml
|
18643b58eec84c0ce5a10ced66c93e95fbb41cb4 |
|
27-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
am 2517d08b: am 61d806c7: Merge "Docs changes pursuant to API review feedback." into klp-dev * commit '2517d08b9a09d123729b01d34840e96f099ea704': Docs changes pursuant to API review feedback.
|
511cd35fcc0b8ab048f284a6af374de8ccc69865 |
|
24-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Docs changes pursuant to API review feedback. Change-Id: I74c51791192f7fefad4e299d25c91438cbf6ab73
/frameworks/base/core/res/AndroidManifest.xml
|
7e458235ac2f2522bea07aa24423b39d1729d2e3 |
|
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I6c9fd490f2efd9c359c598eb2a18c4150b446564
/frameworks/base/core/res/AndroidManifest.xml
|
e2a6d3df1257c1c04b1a14777bb7ee65f634bdc3 |
|
22-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Merge "Introduce network link quality statistics" into klp-dev
|
1f12cb52a494a3eaefc62d03a8d2fdf47a5535e9 |
|
21-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Introduce network link quality statistics This change starts tracking traffic quality data for WiFi and mobile networks. The quality is tracked based on incidental traffic, and not on specific measurements. Theoretical bandwidths are hard-coded, as well as sampling interval; although sampling interval can be changed by setting a system policy. Bugs filed to remove shortcomings of this change - 10342372 Change LinkInfo name to something better 10342318 Move hardcoded values of MobileLinkInfo to resources so they can be updated without changing code Bug: 10006249 Change-Id: I83d8c7594da20fe53abbd5e1f909b1f606b035bb
/frameworks/base/core/res/AndroidManifest.xml
|
e530c41b57514d419cdc7a7b14802b6954d3293c |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Merge "Protect a bunch of broadcast intents" into klp-dev
|
6b8a6a6e056c0f639220c4bfdf044d5f04bc593e |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Protect a bunch of broadcast intents All the changed intents are restricted. Only Bluetooth Process can broadcast/send them. bug 7622253 Change-Id: I098664bf266ac44b7904f8f79b1804d5130f5cd5
/frameworks/base/core/res/AndroidManifest.xml
|
ff796e5a24481febd8c07b1a6a3c3eda0e3fd88b |
|
21-Aug-2013 |
Jason Monk <jmonk@google.com> |
Merge "Change PacProcessor to Android Service" into klp-dev
|
9ced3cd9d6ea414523051ec872fffc68f5fdbf08 |
|
12-Aug-2013 |
Jason Monk <jmonk@google.com> |
Change PacProcessor to Android Service This switches the PacProcessor over to an Android Service. The service is bound and unbound by the PacManager, which also adds it to the ServiceManager, allowing for Context-Free access by the PacProxySelector in all DVMs. bug:10182711 Change-Id: Id1ff7660be56e8976cdcccd76e041feb47a17a61
/frameworks/base/core/res/AndroidManifest.xml
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/res/AndroidManifest.xml
|
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 |
|
13-Aug-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add GIDs to packages.list, update SD card perms. Write supplementary GIDs to packages.list for lower-level system components to parse. WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always enforce READ_EXTERNAL_STORAGE permission. Update permission docs to mention new behavior. Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/core/res/AndroidManifest.xml
|
1ed51627d94b140e8893b8e1dcde9bf37e2adca7 |
|
01-Aug-2013 |
Brian Williammee <bwill@google.com> |
Track latency of captive portal checks When captive portal check occurs, track its latency, whether or not we received a response, and whether or not the response was a captive portal. Pair with information identifying the access point / base station, and broadcast it (with a system|signature-protected permission). Broadcast only occurs if user has consented to Settings.Global.WIFI_SCAN_ALWAYS_AVAILABLE. Change-Id: I6fd59954a7ee2cc7acedf064a1465882653b2173
/frameworks/base/core/res/AndroidManifest.xml
|
7d00affce6e25b22fd8fc135933b3bf6b547a0dc |
|
03-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Support public virtual displays. Refactor the new private virtual display API to also support creating public virtual displays with various characteristics. This feature requires special permissions and is only intended for use by the system. Change-Id: I44dd19f37cf76ea6d6e313afe42f4a412bd96663
/frameworks/base/core/res/AndroidManifest.xml
|
a7397883de67d674970d91f86d46ccf637e5e543 |
|
31-Jul-2013 |
Martijn Coenen <maco@google.com> |
NFC: Host-based card emulation APIs. - New INfcCardEmulation interface to allow apps to interface with card emulation system. - New BIND_NFC_SERVICE permission to prevent malicious apps from binding to card emulation services. - ApduServiceInfo is now in the framework. - Added constants to Settings.Secure for storing defaults. - Modified XML grammar a bit. Change-Id: I56b3fa6b42eb5dc132c91c1386ab1e6bac779059
/frameworks/base/core/res/AndroidManifest.xml
|
a418cf21c9d03c1435e9adec3e025387b6345cd9 |
|
19-Jul-2013 |
Amith Yamasani <yamasani@google.com> |
New permission to manage device admins The previously used permission was doing double duty as the permission that device admins to check for to ensure that calls are coming from valid system components. MANAGE_DEVICE_ADMINS is system|signature and is now required to add/remove device admins. Required for: Bug: 9856348 Change-Id: I64385d2ec734c3957af21b5a5d9cffd8a3bcd299
/frameworks/base/core/res/AndroidManifest.xml
|
538cdb98ef06a1768c582df28e8cc0e4335dd216 |
|
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
resolved conflicts for merge of 85b5e4c4 to master Change-Id: Idd0ad9b1504fddf68c4c4cc04731de1eddd204b3
|
e182bfe398a132236f723a76522bacd4d6d4c0a4 |
|
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add gservices updater for carrier provisioning url bug:9623159 Change-Id: I36697ed341353b7a3dbec5afe20241102e76f6f1
/frameworks/base/core/res/AndroidManifest.xml
|
6c1c0b6cbecf0cd0486a9a781da5e6f9bd2c0eaa |
|
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Declare permission for accessing input flinger. Change-Id: I2914b301b74e0d310a9e95e2d6fb5cb72d3e3703
/frameworks/base/core/res/AndroidManifest.xml
|
10dd2b6464c0d9b78ae16cf19e62df947299c408 |
|
15-Jul-2013 |
Evan Charlton <evanc@google.com> |
Merge "Add carrier setup app integration"
|
1df62d27838657a0988f38883f906be024af7d87 |
|
12-Jul-2013 |
Geremy Condra <gcondra@google.com> |
Merge "Permissions to protect socket marking settings"
|
f11e5d34766a589af46ffc47e461b0103250fd69 |
|
09-Jul-2013 |
Chad Brubaker <cbrubaker@google.com> |
Permissions to protect socket marking settings Add the manifest entries for the net_mark group that protects marking traffic as from another user in per user routing. Change-Id: I97932a9e407467a7adc733caea8746a712bc6b68
/frameworks/base/core/res/AndroidManifest.xml
|
843d5ea5ec965c17de525b3a9f52c8cb9d352c3c |
|
13-May-2013 |
Evan Charlton <evanc@google.com> |
Add carrier setup app integration Add an intent to invoke a native carrier setup app. This is paired with the INVOKE_CARRIER_SETUP permission, though it is up to the app to enforce that callers hold this permission. Change-Id: I317a40675de7e9587de23c028459be2331a2f8a2
/frameworks/base/core/res/AndroidManifest.xml
|
053f61d6a6e23825e680dc49982e55c5b4299d61 |
|
27-Jun-2013 |
Dianne Hackborn <hackbod@google.com> |
Work on issue #9586838: Crash after waking up Hammerhead device I made the power manager more rigid, not allowing different uids to use the same wake lock. This never should happen. I would guess there is somewhere that the activity manager is acquiring the wake lock without clearing the calling identity... but it is hard to follow all the paths this may happen in. So here we add some checks when acquiring/releasing the wake lock to make sure it is being done as the system uid. Also: - Protect the new activity stack calls with a permission, and make sure to clear the calling uid once past that. - Collect uid data from process stats so we can correctly associate CPU use with a uid even if we don't know about the pid for some reason. - Fix battery stats dump commands to clear calling uid before executing so they aren't broken. Change-Id: I0030d4f7b614e3270d794ecfc3669139a5703ce9
/frameworks/base/core/res/AndroidManifest.xml
|
5fa9f2b127c2d7c40da419540f3425ac45a89439 |
|
27-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Single-user restrictions"
|
505e35bca9e19773e42cb8771fcf36158208b8ab |
|
26-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am c869696e: am 65f7a95f: am 2f50097a: Merge "Fix power issues around wifi scans." into jb-mr2-dev * commit 'c869696ef3c1dca3efbc6ce8ab804e8a1b117900': Fix power issues around wifi scans.
|
89710842585404ea33f941afeb2c321e706005e9 |
|
25-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix power issues around wifi scans. - Sending a broadcast indicating when scan requests could be serviced so that apps don't request scans we won't do anything with. - Fix our batt stats accounting so we only count it if we send the request to the driver. bug: 8868201 bug: 9496690 Change-Id: I64a4f1c294c848ac64c50d8854ed4a6a1a47f603
/frameworks/base/core/res/AndroidManifest.xml
|
655d0e2029e6ae77a47e922dce4c4989818b8dd1 |
|
12-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Single-user restrictions Introduces a new "blocked" state for each package. This is used to temporarily disable an app via Settings->Restrictions. PIN creation and challenge activities for use by Settings and other apps. PIN is stored by the User Manager and it manages the interval for retry attempts across reboots. Change-Id: I4915329d1f72399bbcaf93a9ca9c0d2e69d098dd
/frameworks/base/core/res/AndroidManifest.xml
|
4b9a4d16872bbb50712e007b419ac0b35ff1582d |
|
12-Jun-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print - platform APIs Related changes: Skia (inlcude PDF APIs): https://googleplex-android-review.googlesource.com/#/c/305814/ Canvas to PDF: https://googleplex-android-review.googlesource.com/#/c/319367/ Settings (initial version): https://googleplex-android-review.googlesource.com/#/c/306077/ Build: https://googleplex-android-review.googlesource.com/#/c/292437/ Sample print services: https://googleplex-android-review.googlesource.com/#/c/281785/ Change-Id: I104d12efd12577f05c7b9b2a5e5e49125c0f09da
/frameworks/base/core/res/AndroidManifest.xml
|
6fbb5553a5b2d7c19ea411ace9a46e18262698c4 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Protect more system broadcasts."
|
61277dfcd9479cfaca0fce00f00a79a2e51083a2 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Protect more system broadcasts. Bug: 8877514 Change-Id: Iaff8a5fbfab2c48bf26ce611fe2caff4f22d9152
/frameworks/base/core/res/AndroidManifest.xml
|
81888d56610bd4771e61b47c2c57a62966c11385 |
|
11-Jun-2013 |
Scott Main <smain@google.com> |
am 26bc073d: am fe7c2220: Merge "add NA message for any "signature" level permissions" into jb-mr2-dev * commit '26bc073dfa32c8122ce194cfc39e2dfc44370fcd': add NA message for any "signature" level permissions
|
93e60b5b2618c65b9494c474fd09563f8b6e42f3 |
|
10-Jun-2013 |
Scott Main <smain@google.com> |
add NA message for any "signature" level permissions Change-Id: If76e9e3b7ffc5d97422321db312a03869c407f08
/frameworks/base/core/res/AndroidManifest.xml
|
5a3915b06bf1e82cda024945d3b71b51b470b809 |
|
24-May-2013 |
Amith Yamasani <yamasani@google.com> |
UX compliance for error messages Bug: 9122154 Change-Id: I4a64750f11845a230321450bc6a2955cb73e3b6d
/frameworks/base/core/res/AndroidManifest.xml
|
049219925fc2fb3adee803731a2ccd1c6c7c580a |
|
21-May-2013 |
Jay Shrauner <shrauner@google.com> |
am 66d67241: am 34bed420: Merge "Update CALL_PRIVILEGED docs" into jb-mr2-dev * commit '66d67241205e857e434bacf1a1e8fb8e3100018d': Update CALL_PRIVILEGED docs
|
592c9fc3122eb86cc66f18de4cc29dadb7a12c8c |
|
17-May-2013 |
Jay Shrauner <shrauner@google.com> |
Update CALL_PRIVILEGED docs Add usage restriction note to CALL_PRIVILEGED permission doc. Bug:8987211 Change-Id: I3545e2ae30464680e533e3eea0ff9ae913e20ef6
/frameworks/base/core/res/AndroidManifest.xml
|
9ecfee03fa188aebfbd9778b4e020323903495ee |
|
19-Apr-2013 |
Jeff Sharkey <jsharkey@android.com> |
Start fleshing out new storage APIs. Introduces new DocumentsContract which storage backends must implement. Backends surface a simple directory-like organizational structure that enables a document to appear at multiple locations in that hierarchy. Querying a document or the contents of a directory will return a Cursor populated with DocumentColumns, which includes simple metadata. Adds new OPEN_DOC and CREATE_DOC Intents, and permission to protect storage backends. Change-Id: Ib4984bc980182b2cedbe552908e5be94604ef085
/frameworks/base/core/res/AndroidManifest.xml
|
c0b676dcc23baedb12946c3470d9fa9b02cb39e0 |
|
23-Mar-2013 |
Jim Miller <jaggies@google.com> |
Add keyguard background scrim and protection around keyguard APIs With this change, the system process will put up a scrim in the event keyguard crashes to protect underlying content. It also adds permission checks to prevent unathorized access through the binder APIs. Cleaned up KeyguardTestActivity to build separately. Removed unused resources. Change-Id: I9e370c6bfb7dca68eae9eae304c815fb84a753d2
/frameworks/base/core/res/AndroidManifest.xml
|
2d0ed28ff65ad110c875a61cb3c20ca922640bd6 |
|
26-Apr-2013 |
Igor Murashkin <iam@google.com> |
am 10ce90ad: am eaebe4c1: Merge "Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED" into jb-mr2-dev * commit '10ce90adfafa25e417fdefa7510e53bc70bccd7b': Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED
|
f640bb9bbbe104fd08c98df240f1aeea0cacdbab |
|
23-Apr-2013 |
Igor Murashkin <iam@google.com> |
Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED This system-only permission allows a service to disable the transmit LED when a camera is in use. Bug: 8554573 Change-Id: I64f7e3fcdc8ded8be3904650bd0c91d3b8f10dd4
/frameworks/base/core/res/AndroidManifest.xml
|
5c0bd520b8095a12c6cd0c8cf0a6837b2addf520 |
|
19-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
am ab3f5903: am 688a6977: Replacing accessibility service permissions with capability attributes. * commit 'ab3f5903fc4cefbaed6c5cf2242703d56f80028e': Replacing accessibility service permissions with capability attributes.
|
688a6977cf7673ed0542ab3d839053c4e38a4dbd |
|
17-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
Replacing accessibility service permissions with capability attributes. Accessibility services can perform special operations such as retrieve the screen content, enable explore by touch, etc. To ensure the user is aware that the service will perform special operations we were using permissions. However, the special operations cannot be performed unless the service is really enabled by the user and it is at this point that we want to notify the user about the service capabilities. This change adds capability attributes to the accessibility service's meta-data XML file. The service has to declare the capability and when it is enabled we show the user the capabilities in the warining dialog. bug:8633951 Change-Id: Id3442dc71dad018e606888afdc40834682fdb037
/frameworks/base/core/res/AndroidManifest.xml
|
6c5a2e72bd2f9a83fef7abc1441d58212da48211 |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
am e0495912: am 5a02663d: Merge "Doc change: Eat some permissions group comments." into jb-mr2-dev * commit 'e0495912246495d784736cad7d5e4fa87ed788d8': Doc change: Eat some permissions group comments.
|
f6878b009ad680630577ed45207d064bc99059ad |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
Doc change: Eat some permissions group comments. Change-Id: I6db06ed80fbc9e3d71c2a029cc50a6fa954d35b9
/frameworks/base/core/res/AndroidManifest.xml
|
63e7dcf9cf190e1286003b4b3674e94b0d8c2dca |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am e3e55f2a: am 5d1a182a: Merge "Secure broadcasts." into jb-mr2-dev * commit 'e3e55f2a1943a296472d91680a385ea5dc288a31': Secure broadcasts.
|
5d1a182a8a2dd9613ef3b1f2de7b6a3d690ae890 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Secure broadcasts." into jb-mr2-dev
|
68b13ba12f2096cd69824187f9b744cbd651bc38 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure broadcasts. Prevents 3rd party spoofing. bug:7622253 Change-Id: I1e1a9887afe009d060205e349c31e3aefba2ea5b
/frameworks/base/core/res/AndroidManifest.xml
|
2590a8b341a176672474e67a7b322f82bcc93795 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
am bc463ea1: am e8d12dd6: Merge "Fix issue #8032572: Android app permission help text "null"..." into jb-mr2-dev * commit 'bc463ea1c5fa9c80fa06183a82fdd1acfb5289e5': Fix issue #8032572: Android app permission help text "null"...
|
84c7111c4ba2f2f956103e0a7dcc03664b8d6f23 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8032572: Android app permission help text "null"... ...for "Microphone / Record audio" Change-Id: Ie839b055771950e1078fa66506a007203338cfb5
/frameworks/base/core/res/AndroidManifest.xml
|
18a21459729ba6fd40545ee7ed2128dcb83eb23f |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
am 399a2977: am b3a98725: Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev * commit '399a2977a5067e4ea562ad4d74aaa0f1bffe4c53': Show an error dialog when account type is requested on a limited user
|
b3a9872549137f6c3983609e48e5b2d4fc94a3d4 |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev
|
a934b7c99ac558ba45a2a6fb8c6e3769cdd3db4b |
|
11-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
am 7228e1ae: am 8ce470dd: GPS Hardware geofencing. * commit '7228e1aeb9a2af8fad410749e2adc61266b2649a': GPS Hardware geofencing.
|
23c8b96a7e5c3f4c169bf65ae3886357943bb7b0 |
|
10-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Show an error dialog when account type is requested on a limited user This covers the scenario where an app doesn't find an account of the required type and requests the account manager to add one of that type. Bug: 8537648 Change-Id: I4d9c8842c2d90aa668f16034d3db007dc61714b8
/frameworks/base/core/res/AndroidManifest.xml
|
8ce470dd4ba0608abb6b5eae117cefca927af96b |
|
03-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
GPS Hardware geofencing. Add support for doing geofencing in hardware. Change-Id: I6d5015190e8d84e1f4beb1010ed977a71c1622d0
/frameworks/base/core/res/AndroidManifest.xml
|
8740cb1da6adb71a4e195774801c97db5853b097 |
|
05-Apr-2013 |
John Spurlock <jspurlock@google.com> |
resolved conflicts for merge of 29211d3a to master Change-Id: I9691f41b12fbf52d0ef35a9bf5223edef7afdfd2
|
5feceebb892d4cb5777cea3c6174b206705d456b |
|
23-Mar-2013 |
Daniel Sandler <dsandler@android.com> |
New NotificationListenerService. This is the best and only way for apps to listen for notifications: create a NotificationListenerService, wait for the NoMan to bind to you (as a result of the user checking a box somewhere in Settings and agreeing to a scary dialog box), and you'll start receiving notification posted and dismissed callbacks. Your service, while enabled, will also be able to clear one or all notifications. Use this power wisely. This change moves StatusBarNotification out of com.android.internal into android.service.notification. [Internal customers, including System UI and early users of the system-only listener binder API, will need to be updated.] Bug: 8199624 Change-Id: I1be46f823d4b3ddc901109ec1e085cd6deb740c2
/frameworks/base/core/res/AndroidManifest.xml
|
60765b285da48e7362b935105036efefbd1d5e58 |
|
05-Apr-2013 |
Ben Gruver <bgruv@google.com> |
am a1607a8c: am 65f420ec: Merge "Add a config updater component for the intent firewall" into jb-mr2-dev * commit 'a1607a8c62a630150b4e96ec1148e90dc40ab984': Add a config updater component for the intent firewall
|
633dc9bcef0935931781d7e4554566271fe9f2c5 |
|
04-Apr-2013 |
Ben Gruver <bgruv@google.com> |
Add a config updater component for the intent firewall Change-Id: I43f6defa16691099592bf87e75f2d1a732135cf3
/frameworks/base/core/res/AndroidManifest.xml
|
77118fb55eb3a0dcccbb8cf7861a96416f552390 |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
4e7f7e839e6adb8986114ee5b619030696f910ca |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
1a95a42c8984aa9012a9d9ea24fc54a7b09e6148 |
|
27-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am 177543db: am 3bcc2fba: Merge "Fix issue #8470131: Process thrash kills battery" into jb-mr2-dev * commit '177543db55f88f060d9a43df79afd6733cd565da': Fix issue #8470131: Process thrash kills battery
|
a40cfeb55f6caa35fee894b86175b7d916520c80 |
|
26-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8470131: Process thrash kills battery Protect app widget broadcasts from abuse. In this case the app was sending an APPWIDGET_UPDATE broadcast without specifying a target, which (a) should not be allowed (you should not be able to send updates to other apps), and (b) resulted in every single potential app widget in the system being launched... which was about 75 of them. Change-Id: I9d48733610ce6d5a7c32e69a3e06b9f33bd79a34
/frameworks/base/core/res/AndroidManifest.xml
|
c42a44931f75076d93860de2a7d2caa38a553b88 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am b2bf4ecd: am 71b00177: Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev * commit 'b2bf4ecd4ab7c2182c2a6611ff6dead67e712a80': Fix issue #8410116: "Disable your screen lock" permission...
|
71b0017759b825f8bddcdda7425afc802e8918c9 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev
|
3ad2769ba5215bdc1f777b27bfe99d5cce982095 |
|
18-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8410116: "Disable your screen lock" permission... ...appears under "Storage" section Change-Id: I55673c559551797aae3a0dd80e90c573a028b4b0
/frameworks/base/core/res/AndroidManifest.xml
|
2044158fe12fada339762825d0b4ec3961a14d34 |
|
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5d7b4a44: am 34f37e74: Merge "Handle finished bugreports, share from private." into jb-mr2-dev * commit '5d7b4a4448e0f29f36ba27aee2de06ce25ff2ee1': Handle finished bugreports, share from private.
|
02ffba940ca96988ed3e7774c606b43c58373b5e |
|
09-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Handle finished bugreports, share from private. Show notification when a bugreport is finished, letting the user launch a SEND_MULTIPLE intent to share them. Add dialog that warns user about contents before sharing. Since bugreports are now stored in private app data of the Shell app, use FileProvider to build Uris that we can grant others access to. Define BUGREPORT_FINISHED as being a protected broadcast. Delete older bugreports automatically to reclaim disk space. Migrate any Intent extras to ClipData when building PendingIntents. Add --receiver-permission support to am shell command. Bug: 7005318 Change-Id: If6c607dbcf137362d5887eac482ff7391563890f
/frameworks/base/core/res/AndroidManifest.xml
|
5ecd81154fa039961f65bb4e36d18ac555b0d1d6 |
|
10-Jan-2013 |
Jim Miller <jaggies@google.com> |
Move keyguard to its own process. This is in preparation to moving keyguard into its own process. Moved keyguard source and resources into new .apk. Got basic test app working. Still need to implement MockPatternUtils and means to pass it into KeyguardService with local binder interface. Added new ACCESS_KEYGUARD_SECURE_STORAGE permission. Temporarily disabled USER_PRESENT broadcast. Remove unintentional whitespace changes in PhoneWindowManager, etc. Checkpoint basic working version. Move to systemui process. Synchronize with TOT. Sync with recent user API changes. Fix bug with returing interface instead of stub for IKeyguardResult. Create KeyguardServiceDelegate to allow for runtime-selectable local or remote interface. More keyguard crash robustness. Keyguard crash recovery working. Currently fails safe (locked). Fix selector view which was still using frameworks resources. Remove more references to internal framework variables. Use aliases for those we should move but currently have dependencies. Allow runtime switching between service and local mode. Fix layout issue on tablets where orientation was reading the incorrect constant from the framework. Remove more framework dependencies. Fix PIN keyboard input. Remove unnecessary copy of orientation attrs. Remove unused user selector widget and attempt to get multi user working again. Fix multi-user avatar icon by grabbing it from UserManager rather than directly since keyguard can no longer read it. Merge with AppWidget userId changes in master. Change-Id: I254d6fc6423ae40f6d7fef50aead4caa701e5ad2
/frameworks/base/core/res/AndroidManifest.xml
|
aa7cc1e2ab9856e9c57c1664020df60afaae3d72 |
|
20-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding idle maintenance service."
|
b3038ec7cfc5d26eb0be18ae65c62825556bca0f |
|
13-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Adding idle maintenance service. It is beneficial that there is a mechanism on the platform to notify applications whether it is safe to perform somehow expensive operations while the user is not using the device. Thus, user experience will not be degraded. An example is discarding of unused blocks on a mounted file system instead of doing this on every write operation. bug:8056794 Change-Id: I708bad9d3ce6c8f1d5a1c05c0abf46f81a3d464b
/frameworks/base/core/res/AndroidManifest.xml
|
108da0cfa4a2f59cc953a4ec61314e69b61d6777 |
|
12-Feb-2013 |
Russell Brenner <russellbrenner@google.com> |
Adjust captive portal test for setup wizard During setup wizard, perform captive portal test without the typical delays. Change-Id: If596948e732966817aae6201440e87e19be0c2f8
/frameworks/base/core/res/AndroidManifest.xml
|
fde19b106b2b77bc3540b04445357870caf878b5 |
|
17-Jan-2013 |
Daniel Sandler <dsandler@android.com> |
New API to request a list of current notifications. The ACCESS_NOTIFICATIONS permission is signature|system only. Change-Id: I41338230aee9611117cbdac251c1b6b6c3cebf00
/frameworks/base/core/res/AndroidManifest.xml
|
3b53da493440efbacd147d1aedcea8679c3a642b |
|
04-Feb-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Sort out permission around "instant text response""
|
d4b1d9cf9cee4bd4f234e30069996dc7e449f0e7 |
|
31-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Merge changes I4859c8db,I7643024d * changes: Add the TZInfo updater and relevant intent. Fix ConfigUpdater for binary files.
|
ec695824af7ab263eaae613b87f2c0b24f176f91 |
|
31-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Remove "enhance web scripts" from settings and make it requested by plug-ins."
|
78a4c718e30b6af69fafa6c017af3b2719868631 |
|
30-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Add the TZInfo updater and relevant intent. Also add a hook for ConfigUpdateInstallReciever subclasses to change the delivery of data- in this case, from raw text to b64 encoded binary. Change-Id: I4859c8db1cc97c2427310a108b2fef03975df2b4
/frameworks/base/core/res/AndroidManifest.xml
|
58395e71ce7e99f8149eebbf39db77798165a539 |
|
30-Jan-2013 |
Doug Zongker <dougz@android.com> |
am 9c4ba4fe: am b616f0c2: add android.permission.LOOP_RADIO for access to loop radio device # Via Android Git Automerger (1) and Doug Zongker (1) * commit '9c4ba4fe752b131b01aa402389c96eb8f24764b8': add android.permission.LOOP_RADIO for access to loop radio device
|
3822896e226567c6cd3ef84518d318abd33a7624 |
|
29-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Remove "enhance web scripts" from settings and make it requested by plug-ins. Currently we have an "enhance web accessibility" setting that has to be enabled to make sure web content is accessible. We added the setting to get user consent because we are injecting JavaScript-based screen-reader pulled from the Google infrastructure. However, many users do not know that and (as expected) do not read the user documentation, resulting in critique for lacking accessibility support in WebViews with JavaScript enabled (Browser, Gmail, etc). To smoothen the user experience now "enhance web accessibility" is a feature an accessibility plug-in can request, similarly to explore by touch. Now a user does not need to know that she has to explicitly enable the setting and web accessibility will work out-of-the-box. Before we were showing a dialog when a plug-in tries to put the device in a touch exploration mode. However, now that we have one more feature a plug-in can request, showing two dialogs (assume a plug-in wants both features) will mean that a user should potentially deal with three dialogs, one for enabling the service, and one for each feature. We could merge the dialogs but still the user has to poke two dialogs. It seems that the permission mechanism is a perfect fit for getting user permission for an app to do something, in this case to enable an accessibility feature. We need a separate permission for explore by touch and enhance web accessibility since the former changes the interaction model and the latter injects JavaScript in web pages. It is critical to get user consent for the script injection part so we need a well-documented permission rather a vague umbrella permission for poking accessibility features. To allow better grouping of the accessibility permissions this patch adds a permission group as well. bug:8089372 Change-Id: Ic125514c34f191aea0416a469e4b3481ab3200b9
/frameworks/base/core/res/AndroidManifest.xml
|
b616f0c239ad61f818741909821b86aceff60b60 |
|
29-Jan-2013 |
Doug Zongker <dougz@android.com> |
add android.permission.LOOP_RADIO for access to loop radio device Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/core/res/AndroidManifest.xml
|
f9c5e0fe837a3090820da502ecaabc5accc00ace |
|
23-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
Add new API to propagate contextual data to the assist action When launching an assist, we have a new API allowing the current foreground activity/application to provide additional arbitrary contextual information that is stuffed in the assist intent before it is launched. Change-Id: I0b2a6f5a266dc42cc0175327fa76774f814af3b4
/frameworks/base/core/res/AndroidManifest.xml
|
35654b61e8fe7bc85afcb076ddbb590d51c5865f |
|
15-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
More work on App Ops service. Implemented reading and writing state to retain information across boots, API to retrieve state from it, improved location manager interaction to monitor both coarse and fine access and only note operations when location data is being delivered back to app (not when it is just registering to get the data at some time in the future). Also implement tracking of read/write ops on contacts and the call log. This involved tweaking the content provider protocol to pass over the name of the calling package, and some infrastructure in the ContentProvider transport to note incoming calls with the app ops service. The contacts provider and call log provider turn this on for themselves. This also implements some of the mechanics of being able to ignore incoming provider calls... all that is left are some new APIs for the real content provider implementation to be involved with providing the correct behavior for query() (return an empty cursor with the right columns) and insert() (need to figure out what URI to return). Change-Id: I36ebbcd63dee58264a480f3d3786891ca7cbdb4c
/frameworks/base/core/res/AndroidManifest.xml
|
a06de0f29b58df9246779cc4bfd8f06f7205ddb6 |
|
12-Dec-2012 |
Dianne Hackborn <hackbod@google.com> |
New "app ops" service. Initial implementation, tracking use of the vibrator, GPS, and location reports. Also includes an update to battery stats to also keep track of vibrator usage (since I had to be in the vibrator code anyway to instrument it). The service itself is only half-done. Currently no API to retrieve the data (which once there will allow us to show you which apps are currently causing the GPS to run and who has recently accessed your location), it doesn't persist its data like it should, and no way to tell it to reject app requests for various operations. But hey, it's a start! Change-Id: I05b8d76cc4a4f7f37bc758c1701f51f9e0550e15
/frameworks/base/core/res/AndroidManifest.xml
|
149ceec6ebac9dd000c213fc91ee8e5c08522cc6 |
|
26-Mar-2012 |
Daisuke Miyakawa <dmiyakawa@google.com> |
Sort out permission around "instant text response" - Remove SEND_SMS_NO_CONFIRMATION - Add SEND_RESPOND_VIA_MESSAGE Permission This permission is held by the phone and applications that want to handle respond-via-message should require this permission of the sender. This permission is signature/system and currently only held by the Phone app. Bug: 5108429 Change-Id: Ib611368d488de2f8e1e853f550eb2c654305eda4
/frameworks/base/core/res/AndroidManifest.xml
|
a4405ba6ea56cd1a13c45bf8e37f7b44f7d038b0 |
|
07-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Add new protected broadcasts According to the javadocs for these intents, they are all protected intents. It appears the original author forgot to add them to this file. Change-Id: I025061716d5707f10939019f2bc5bc3d4d23b04f
/frameworks/base/core/res/AndroidManifest.xml
|
a170bb81d5953c1f0aa0f5f49bd72eb43c50e233 |
|
06-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Remove duplicate AndroidManifest.xml entries. The automerger added the entries twice... Change-Id: I7910cb2126b339b0c8aee11051db1a2de8ae26ae
/frameworks/base/core/res/AndroidManifest.xml
|
849f5188e34ea667b689e795d88411a2412db2e8 |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
am 6643ea82: resolved conflicts for merge of 011132a7 to jb-mr1-dev * commit '6643ea823bf8b0726da0518ffecfcc7a9f60f87d': Secure a handful of framework broadcasts
|
6643ea823bf8b0726da0518ffecfcc7a9f60f87d |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
resolved conflicts for merge of 011132a7 to jb-mr1-dev Change-Id: I304ef91eef99526dec348a59b12c0934173bcfcb
|
b8da0376f2d50fdb2ee58deacc6d2041689e36d1 |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 (cherry picked from commit 47918ae3b4e7ebb54711884e9ff9d0300591ab8b) Conflicts: core/res/AndroidManifest.xml Change-Id: I118b31489fe7add5b8d69289cab9f4e8ab269495
/frameworks/base/core/res/AndroidManifest.xml
|
47918ae3b4e7ebb54711884e9ff9d0300591ab8b |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 Change-Id: Id8ec2778b15fe001e6fd0d5a010181bb21c52ad8
/frameworks/base/core/res/AndroidManifest.xml
|
2681faafae03548ab6fc09307215d7f2b279ab5c |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: explain implicit permissions applied by sdk versions bug: 7453055 Change-Id: I59ba2de6108b5209ff0db6b084fc0a887c5f2cce
/frameworks/base/core/res/AndroidManifest.xml
|
7dcacd559a85c2b567690fd5f3f1a8050ef6c35b |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
277b352d9f9002eb63541c86ea9388be3d7c0e16 |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: update description for location permissions bug: 6996667 Change-Id: I3b5d706d98b56386a88b33a343721ff7432063b9
/frameworks/base/core/res/AndroidManifest.xml
|
fc753c0cf676000b1c2d3cb2728af85a9b49f795 |
|
31-Oct-2012 |
Michael Jurka <mikejurka@google.com> |
Use new keyguard appwidget picker Also, remove ability to filter widgets by feature in appwidget picker in anticipation of api change Change-Id: I325de0b98f03d3a250758d504229ea27794b5330
/frameworks/base/core/res/AndroidManifest.xml
|
a1f739ea83b6d770b8469ae1c2c4161f6fe96334 |
|
19-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Merge "Change android.permission.SERIAL_PORT to signature|system." into jb-mr1-dev
|
c29f35b8f4610677d8fd9ae1816b39ef4b5f9983 |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
fca9d63635d9603c318a089397b23c17682453e3 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Add multi user support for bluetooth Create a BLUETOOTH_STACK permission to share between all users of Bluetooth apk. Bluetooth Manager binds to apk of current user bug 6925422 Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/core/res/AndroidManifest.xml
|
7c3586c576c7f7238274f1ffbc4577a57be0d1f1 |
|
29-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Merge "Make the theme for choose account and choose account type dialogs same." into jb-mr1-dev
|
3ff8e1a80058e5557d13693d3223e1aa011c0038 |
|
29-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #7211769 and #7244492, thrash around on #7226656." into jb-mr1-dev
|
d4ac8d7b3de27a9f0e4c6af2496ca71d794e42d1 |
|
28-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7211769 and #7244492, thrash around on #7226656. Issue #7211769: Crash dialog from background user has non-working "report" The report button now launches the issue reporter for the correct user. Also for crashes on background users, either disable the report button, or simply don't show the dialog depending on the build config. Issue #7244492: Bugreport button in Quick Settings doesn't actually do anything Now they do. Issue #7226656: second user seeing primary user's apps I haven't had any success at reproducing this. I have tried to tighten up the path where we create the user to ensure nothing could cause the user's applications to be accessed before the user it fully created and thus make them installed... but I can't convince myself that is the actual problem. Also tightened up the user switch code to use forground broadcasts for all of the updates about the switch (since this is really a foreground operation), added a facility to have BOOT_COMPELTED broadcasts not get launched for secondary users and use that on a few key system receivers, fixed some debug output. Change-Id: Iadf8f8e4878a86def2e495e9d0dc40c4fb347021
/frameworks/base/core/res/AndroidManifest.xml
|
856b01e7e41c6800c81d04f001e5dd4f7ae05a57 |
|
28-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Make the theme for choose account and choose account type dialogs same. Contacts app uses a custom account picker which calls the system account picker when an account needs to be added. The system accout picker invokes choose accout type dialog which overlays over the system acccount picker. Because these two dialog boxes use different themes, he one behind is wider than the one in foreground and ends up looking like a thin black strip protruding from the two sides. Bug: 6980517 Change-Id: Ia8b23767d995dcbe1a58087cb4bfbee140c2c744
/frameworks/base/core/res/AndroidManifest.xml
|
c6fa237daeaae6107174a9b9d4f591ea8cd26d86 |
|
24-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Use updatable file for premium-sms filter The data is really to big for a gservices-driven secure setting. bug:7221402 Change-Id: Ie3d4a1a0aeb69b9ef8fad360fa7ec32e927644e8
/frameworks/base/core/res/AndroidManifest.xml
|
7befb7deb2ac15134b3bb190520cba19165d16dd |
|
28-Sep-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Global gesture to toggle Accessibility system-wide. 1. This change adds a global gesture for enabling accessibility. To enable this gesture the user has to allow it from the accessibility settings or use the setup wizard to enable accessibility. When the global gesture is enabled the user can long press on power to bring the global actions dialog and then hold with two fingers for a few seconds to enable accessibility. The appropriate feedback is also provided. 2. The global gesture is writing directly into the settings for the current user if performed when the keyguard is not on. If the keygaurd is on and the current user has no accessibility enabled, the gesture will temporary enable accessibility for the current user, i.e. no settings are changed, to allow the blind user to log into his account. As soon as a user switch happens the new user settings are inherited. If no user change happens after temporary enabling accessibility the temporary changes will be undone when the keyguard goes away and the device will works as expected by the current user. bug:6171929 3. The initialization code for the owner was not executed due to a redundant check, thus putting the accessibility layer in an inconsistent state which breaks pretty much everything. bug:7240414 Change-Id: Ie7d7aba80f5867b7f88d5893b848b53fb02a7537
/frameworks/base/core/res/AndroidManifest.xml
|
52c62344c585662d6b441a08c2a69a5732255a6f |
|
21-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7213113: Remove old intent resolver Also make the query package restart broadcast protected like the documentation says it should be. Change-Id: I445166111318a02f2f2b1ab0dff9c641a441c20b
/frameworks/base/core/res/AndroidManifest.xml
|
f4f6b4c8b0fcf77d46567f13b409255948fe107b |
|
25-Aug-2012 |
John Spurlock <jspurlock@google.com> |
Fire "dreaming started" and "dreaming stopped" broadcasts. Dream manager now fires broadcast intents when entering + exiting dreamland (except when testing). Power manager can now listen for dreams ending, using polling only as a backstop. Also: - Bullet-proof dream-manager/dream against known failure modes - Add new read/write dream permissions - Refactor dream-manager to delegate work + state management into a new DreamController class, via a handler Bug:6999949 Bug:7152024 Change-Id: I986bb7812209d8c95ae1d660a5eee5998a7b08b1
/frameworks/base/core/res/AndroidManifest.xml
|
8832c18d8b63367929c2d394c9c508f56003d400 |
|
18-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix API review bugs. 7173152 API REVIEW: android.content.pm.PackageUserState 7172969 API REVIEW: android.app.PendingIntent 7172730 API REVIEW: android.content.Context 7172726 API REVIEW: android.manifest.permission Change-Id: Iad470256d3b5ca5596487f6a699ec1871457c3b5
/frameworks/base/core/res/AndroidManifest.xml
|
2ca2c8787130506d350d997c18bbc274faf88e37 |
|
17-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More adjustments to permissions. - New "cost money" flag can be put on a permission to have this emphasized in the UI. - Some further re-organization of permissions to better match UX spec. Change-Id: I450ac739eff6b90e7c7fc39589d68db82b61f897
/frameworks/base/core/res/AndroidManifest.xml
|
5dc5a00e7ebadc085ded7e29feacd17e53698486 |
|
16-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More multi-user stuff. - New public APIs to find out when a user goes to the foreground, background, and is first initializing. - New activity manager callback to be involved in the user switch process, allowing other services to let it know when it is safe to stop freezing the screen. - Wallpaper service now implements this to handle its user switch, telling the activity manager when it is done. (Currently this is only handling the old wallpaper going away, we need a little more work to correctly wait for the new wallpaper to get added.) - Lock screen now implements the callback to do its user switch. It also now locks itself when this happens, instead of relying on some other entity making sure it is locked. - Pre-boot broadcasts now go to all users. - WallpaperManager now has an API to find out if a named wallpaper is in use by any users. Change-Id: I27877aef1d82126c0a1428c3d1861619ee5f8653
/frameworks/base/core/res/AndroidManifest.xml
|
f60921d921947d7d40285f471a09b0478044c29c |
|
13-Sep-2012 |
Geremy Condra <gcondra@google.com> |
Merge changes I69689a73,Iaaef6d41,I7e3cb47a,I42307f58 into jb-mr1-dev * changes: DO NOT MERGE Push event logging down into libcore.EventLogger DO NOT MERGE Added event logging for config installation failures. DO NOT MERGE Create intermediate directories when installing config data. DO NOT MERGE Add components for the Android Config Updater to system server.
|
cd403fc0318684cb7c6c38987d3e0dd0fb8a55bd |
|
13-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Bring back new permission organization. Change-Id: I83e7dd06989ab7b0116bcff5ad52d36e01b851d1
/frameworks/base/core/res/AndroidManifest.xml
|
b631084613e12e1c6a0ae2ad9446e1284b650ccb |
|
24-Aug-2012 |
Geremy Condra <gcondra@google.com> |
DO NOT MERGE Add components for the Android Config Updater to system server. This adds the necessary bits to verify and install configuration updates using system server. It also includes the cert pinning updater as the first user. Change-Id: I42307f58074157b33b6e01216aab10022340d449
/frameworks/base/core/res/AndroidManifest.xml
|
5cf8bd79bbdef0185574f0e3514124583ad537cd |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware" into jb-mr1-dev
|
4497e0c3c672e507b4fd1ff1debefaf76c52ec28 |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware - add android:supportsRtl="true" to the manifest for system_process Change-Id: I9794f6880c883d91751d0037646253810b086d46
/frameworks/base/core/res/AndroidManifest.xml
|
9d9ece3c1e16001b63244459cdf4b428f4272d2e |
|
11-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Animations for user switching. The window manager now has a facility to provide a full-screen animation, which the activity manager uses every time a user switch happens. The current animation is just a simple dumb slide until we get a design from UX. Also some cleanup: moved the portrait task animations to the default config so we always have an animation for them, and finally got the java symbol stuff out of public.xml. Change-Id: I726f77422b2ef5f2d98f961f8da003e045f0ebe8
/frameworks/base/core/res/AndroidManifest.xml
|
e08ae388d63c4db8f9d9a7ecd634f9a51f6e91b9 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add new wifi display discovery API. The API is quite simple. There are a few extra functions on DisplayManager to scan, connect and disconnect from wifi displays and get status, and a single protected broadcast sent when the status changes. Change-Id: Ic91dbab5ee818e790b27fa32e1a1e93788793be0
/frameworks/base/core/res/AndroidManifest.xml
|
4b71e4e66cd12d581d4939bab86ec624d27eb570 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add permissions to control and configure wifi display. Change-Id: I54af6da53b7243516becd6a3d5985c0feda6c225
/frameworks/base/core/res/AndroidManifest.xml
|
1cf70bbf96930662cab0e699d70b62865766ff52 |
|
06-Aug-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Screen magnification - feature - framework. This change is the initial check in of the screen magnification feature. This feature enables magnification of the screen via global gestures (assuming it has been enabled from settings) to allow a low vision user to efficiently use an Android device. Interaction model: 1. Triple tap toggles permanent screen magnification which is magnifying the area around the location of the triple tap. One can think of the location of the triple tap as the center of the magnified viewport. For example, a triple tap when not magnified would magnify the screen and leave it in a magnified state. A triple tapping when magnified would clear magnification and leave the screen in a not magnified state. 2. Triple tap and hold would magnify the screen if not magnified and enable viewport dragging mode until the finger goes up. One can think of this mode as a way to move the magnified viewport since the area around the moving finger will be magnified to fit the screen. For example, if the screen was not magnified and the user triple taps and holds the screen would magnify and the viewport will follow the user's finger. When the finger goes up the screen will clear zoom out. If the same user interaction is performed when the screen is magnified, the viewport movement will be the same but when the finger goes up the screen will stay magnified. In other words, the initial magnified state is sticky. 3. Pinching with any number of additional fingers when viewport dragging is enabled, i.e. the user triple tapped and holds, would adjust the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 4. When in a permanent magnified state the user can use two or more fingers to pan the viewport. Note that in this mode the content is panned as opposed to the viewport dragging mode in which the viewport is moved. 5. When in a permanent magnified state the user can use three or more fingers to change the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 6. The magnification scale will be persisted in settings and in the cloud. Note: Since two fingers are used to pan the content in a permanently magnified state no other two finger gestures in touch exploration or applications will work unless the uses zooms out to normal state where all gestures works as expected. This is an intentional tradeoff to allow efficient panning since in a permanently magnified state this would be the dominant action to be performed. Design: 1. The window manager exposes APIs for setting accessibility transformation which is a scale and offsets for X and Y axis. The window manager queries the window policy for which windows will not be magnified. For example, the IME windows and the navigation bar are not magnified including windows that are attached to them. 2. The accessibility features such a screen magnification and touch exploration are now impemented as a sequence of transformations on the event stream. The accessibility manager service may request each of these features or both. The behavior of the features is not changed based on the fact that another one is enabled. 3. The screen magnifier keeps a viewport of the content that is magnified which is surrounded by a glow in a magnified state. Interactions outside of the viewport are delegated directly to the application without interpretation. For example, a triple tap on the letter 'a' of the IME would type three letters instead of toggling magnified state. The viewport is updated on screen rotation and on window transitions. For example, when the IME pops up the viewport shrinks. 4. The glow around the viewport is implemented as a special type of window that does not take input focus, cannot be touched, is laid out in the screen coordiates with width and height matching these of the screen. When the magnified region changes the root view of the window draws the hightlight but the size of the window does not change - unless a rotation happens. All changes in the viewport size or showing or hiding it are animated. 5. The viewport is encapsulated in a class that knows how to show, hide, and resize the viewport - potentially animating that. This class uses the new animation framework for animations. 6. The magnification is handled by a magnification controller that keeps track of the current trnasformation to be applied to the screen content and the desired such. If these two are not the same it is responsibility of the magnification controller to reconcile them by potentially animating the transition from one to the other. 7. A dipslay content observer wathces for winodw transitions, screen rotations, and when a rectange on the screen has been reqeusted. This class is responsible for handling interesting state changes such as changing the viewport bounds on IME pop up or screen rotation, panning the content to make a requested rectangle visible on the screen, etc. 8. To implement viewport updates the window manger was updated with APIs to watch for window transitions and when a rectangle has been requested on the screen. These APIs are protected by a signature level permission. Also a parcelable and poolable window info class has been added with APIs for getting the window info given the window token. This enables getting some useful information about a window. There APIs are also signature protected. bug:6795382 Change-Id: Iec93da8bf6376beebbd4f5167ab7723dc7d9bd00
/frameworks/base/core/res/AndroidManifest.xml
|
d1b5cfc94ae940f42be352e7ed98c21c973471b2 |
|
29-Aug-2012 |
rich cannings <richc@google.com> |
Notify verifiers that verification is complete Send the Intent.ACTION_PACKAGE_VERIFIED to all verifiers when verification is complete (either one verifier verified the package or a timeout occurred). Details of what occurred is in a new extra, PackageManager.EXTRA_VERIFICATION_RESULT. Bug: 7048930 Change-Id: I4f9855a29b0eb6d77f469891402c69e2e8922945
/frameworks/base/core/res/AndroidManifest.xml
|
e217ee4d7a8223289a1af7363627c69956c46d41 |
|
29-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Access to all users' external storage. System services holding this permission have external storage bound one level higher, giving them access to all users' files. Bug: 7003520 Change-Id: Ib2bcb8455740c713ebd01f71c9a2b89b4e642832
/frameworks/base/core/res/AndroidManifest.xml
|
80a4af2bbc6af42ae605e454bf89558e564f5244 |
|
28-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Start implementing concept of "running" users. The activity manager now keeps track of which users are running. Initially, only user 0 is running. When you switch to another user, that user is started so it is running. It is only at this point that BOOT_COMPLETED is sent for that user and it is allowed to execute anything. You can stop any user except user 0, which brings it back to the same state as when you first boot the device. This is also used to be able to more cleaning delete a user, by first stopping it before removing its data. There is a new broadcast ACTION_USER_STOPPED sent when a user is stopped; system services need to handle this like they currently handle ACTION_PACKAGE_RESTARTED when individual packages are restarted. Change-Id: I89adbd7cbaf4a0bb72ea201385f93477f40a4119
/frameworks/base/core/res/AndroidManifest.xml
|
7e67151b912622f8a279ab1523a9bcf26ebaff3d |
|
27-Aug-2012 |
rich cannings <richc@google.com> |
Add permission checks for Verification API calls Ensure that only applications with android.Manifest.permission.PACKAGE_VERIFICATION_AGENT can call application verification APIs, like PackageManager.verifyPendingInstall and PackageManager.extendVerificationTimeout Bug: 7049083 Change-Id: I5fc28b37e864d67cd319a1ed9d03a90dd15ad052
/frameworks/base/core/res/AndroidManifest.xml
|
1952637425eece18aa1ce3d80d4b49086ef3bcf7 |
|
22-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
Remove permission requirement for some UserManager calls Update javadocs to be explicit about permissions. Minor fixes in UserManagerService Change-Id: I0d355e0a60e5dbdb49ed06091111d480ff249f3d
/frameworks/base/core/res/AndroidManifest.xml
|
2a00329c6d55c6cd9166e01963d7410e95d80d21 |
|
15-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
UserHandle to UserSerialNo mapping Use AtomicFile for usermanager files. Added a MANAGE_USERS permission that apps (signature permission) can use to create/query/modify/remove users. Change-Id: I5cf232232d0539e7508df8ec9b216e29c2351cd9
/frameworks/base/core/res/AndroidManifest.xml
|
0224ccab3c7121aeafe7d491042dd38c3a2bb9d3 |
|
17-Aug-2012 |
Subir Jhanb <subir@google.com> |
Change directory permission to "signature|system" Change-Id: I53dea6984b4577803fdead5caad0112503d2b4e5
/frameworks/base/core/res/AndroidManifest.xml
|
603af61a7cd49f214743b286520419a3fe460774 |
|
07-Aug-2012 |
Subir Jhanb <subir@google.com> |
Add a new permission to have access to Gal Provider BUG:6897999 Change-Id: Ie60963b7f3911b402b971e794178754e1b4f0a43
/frameworks/base/core/res/AndroidManifest.xml
|
b4163a6e12ee7100c758c6d3d062ade1f2843fce |
|
03-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Add APIs for interacting across users. - Expose the existing Context.sendBroadcast() as Context.sendBroadcastAsUser(). - Add new android:singleUser attribute for services. - Add new INTERACT_ACROSS_USERS_FULL permission for full system-level access to cross-user interface (allows sendBroadcastAsUser() to send to any receiver). - Add new INTERACT_ACROSS_USERS_FULL permission for more restricted cross-user interaction: this is required for android:singleUser, and allows you to use sendBroadcastAsUser() but only to send to your own receivers. Change-Id: I0de88f6718e9505f4de72e3f45d29c0f503b76e9
/frameworks/base/core/res/AndroidManifest.xml
|
db3c8678e5cbdfec011afaf25bde2091152c30ad |
|
20-Jun-2012 |
Haoyu Bai <bhy@google.com> |
Network data activity change intent for network interfaces. The activity notification is received from netd, an intent DATA_ACTIVITY_CHANGE is then raised for other part of the system to consume. Change-Id: Idfcc4763c51c5b314c57f546c12557082f06bebf
/frameworks/base/core/res/AndroidManifest.xml
|
0f42037eb7b5118015c2caca635538324ccf0ccf |
|
12-Apr-2012 |
fredc <fredc@broadcom.com> |
Non persistent adapter service Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5 Conflicts: core/java/android/bluetooth/BluetoothInputDevice.java Conflicts: core/java/com/android/internal/app/ShutdownThread.java services/java/com/android/server/SystemServer.java Conflicts: services/java/com/android/server/SystemServer.java services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/core/res/AndroidManifest.xml
|
c9c9a48e7bafae63cb35a9aa69255e80aba83988 |
|
16-Jul-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Removing a workaround for incorrect window position on window move. 1. The window manager was not notifying a window when the latter has been moved. This was causing incorrect coordinates of the nodes reported to accessibility services. To workaround that we have carried the correct window location when making a call from the accessibility layer into a window. Now the window manager notifies the window when it is moved and the workaround is no longer needed. This change takes it out. 2. The left and right in the attach info were not updated properly after a report that the window has moved. 3. The accessibility manager service was calling directly methods on the window manager service without going through the interface of the latter. This leads to unnecessary coupling and in the long rung increases system complexity and reduces maintability. bug:6623031 Change-Id: Iacb734b1bf337a47fad02c827ece45bb2f53a79d
/frameworks/base/core/res/AndroidManifest.xml
|
d0d2cda9d414da73773285d7fee9e13aef3495e9 |
|
08-Jun-2012 |
Adam Powell <adamp@google.com> |
Further work on MediaRouter Remove volume control and tracking. This will be handled by extensions to existing audio and media APIs for now. Tweak/refine other aspects of the API. Pass the router to callbacks for easier future-proofing. Add group/ungroup callback methods. Change-Id: Ib69e76e5f46280a9002b545bcf4cbc7b839844ee
/frameworks/base/core/res/AndroidManifest.xml
|
636fd528f7ad51f565a390226d9f469f8c675ccf |
|
06-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
Docs (mostly): enumerate JELLY_BEAN target SDK changes. Okay this isn't entirely docs. I have un-hidden the new permission for binding to accessibility services; we were going to go out with it hidden since it didn't go into factory ROM, but now that we are doing other things we might as well expose it. Also changed a log from E to W, since it is not an error. Change-Id: I9226c95e3b63e12218fe41dc3f4290d9824a9e5c
/frameworks/base/core/res/AndroidManifest.xml
|
7c86958d73e7216a92bdfd84fce4440e1def7eaa |
|
03-Jun-2012 |
Adam Powell <adamp@google.com> |
Merge "Add MediaRouter API." into jb-dev
|
361dfebc943fa53f2a2e3fe0b3429ea5d2530ad0 |
|
02-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
For JB, the READ_EXTERNAL_STORAGE permission is not enforced by default. It may be enforced by default in future releases. Developers have the option of enabling enforcement to test their application and some may begin to include this permission on applications. To avoid user confusion, the permission is placed in the development tools group. Change-Id: Id27ba241db0253eac774401aaaa6e5c4340588d7
/frameworks/base/core/res/AndroidManifest.xml
|
9a1de308cea2d160778fd977825f10a07b49d738 |
|
22-May-2012 |
Adam Powell <adamp@google.com> |
Add MediaRouter API. This is just the initial state tracking. Still to go is actually triggering Bluetooth A2DP correctly and tracking process state in the system server. Change-Id: I33031d52799d6e2d7208910da833831085cc3677
/frameworks/base/core/res/AndroidManifest.xml
|
4c52235fbc257bc3d73459e61c2d595a539271ba |
|
01-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
Revert "Make the protectionLevel of framework permissions consistent and related to sensitive user data. Dangerous permissions are applied only where sensitive user data may be exposed." This reverts commit a8a200278dcc232eabd4550f814439c94857c47c. Conflicts: core/res/AndroidManifest.xml core/res/res/values/strings.xml Change-Id: I3f76d93a6ffde031bf82c2afea315ebcdbc179e3
/frameworks/base/core/res/AndroidManifest.xml
|
727c599454b1e280a237b10fea4dd7f7cb1096e0 |
|
29-May-2012 |
Alice Yang <alice@google.com> |
New UI for account picker - Added radio buttons to indicate the selected item - "Add account" is one of the list options instead of a button - Removed icons - Added "Cancel" and "OK" buttons - Use dialog theme - Omit description text by default Bug 6505441 Change-Id: I672a11481ee99e183142142bddf8f97b7b149d37
/frameworks/base/core/res/AndroidManifest.xml
|
1e7456ba74f93cdf80dc430aa082cc3c271b30b1 |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Fixing the build for real. Change-Id: I792d029c7fff4d96fbe238ff4b3f268cb8603b95
/frameworks/base/core/res/AndroidManifest.xml
|
e63049b838e94379ba1dae3137198bc3ddf5f19d |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding some missing files. Change-Id: I991d8bf815a7e57dc1cbad384e15aa21bef0c7c7
/frameworks/base/core/res/AndroidManifest.xml
|
507f5586fb48f59f7b4f2fa0ca5387e4d4f2bd8d |
|
08-May-2012 |
Jeff Brown <jeffbrown@google.com> |
Hide SET_KEYBOARD_LAYOUT permissions. Bug: 6427036 Change-Id: Idbb442ad8071b2ca4acf247b135c7aba0830cf70
/frameworks/base/core/res/AndroidManifest.xml
|
99222d212f9ff5081d4ce6eef09dbe8eff85b83a |
|
07-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Finish up issue #6249094: Display permissions based on relevance to private data Added bitmaps for permission group icons. We had to pick either icons for a dark or light background, and it had to be light for settings, so the installer theme has gone back to dark. Tweaked the permission groups to match the icons. Redid the group priorities to make them correct (they were written with higher priorities being less important). Fixed bug where priority was not being used for system apps. Change-Id: Ia3d3f0c1614a11b4cfd11682ce9e6c9f87d75c06
/frameworks/base/core/res/AndroidManifest.xml
|
dc410cb3499683509770bb88cb771a91acd16bd2 |
|
13-Apr-2012 |
Adrian Ludwig <aludwig@google.com> |
Reorganizing permissions into groups oriented around user-understandable concepts. These groups are assigned priority for sort-order when displayed to users, and use the new permissionGroupFlags to indicate whether they contain personalInfo. Change-Id: I27e81912e08b8d7766b8ce449b4b3bd6473d8f07
/frameworks/base/core/res/AndroidManifest.xml
|
fd5015be41080970c9a992a8ef17a1deefb57478 |
|
01-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new APIs for permission group flags and priorities. Change-Id: I2d476c6aa9dbd05407ec49be45986f42d2acf9e7
/frameworks/base/core/res/AndroidManifest.xml
|
098d580cc2bb6c0891c756a4e5230c6c6b0d2376 |
|
27-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate ringtone playback to SystemUI. Introduce IRingtonePlayer, which handles playback for both Ringtone objects and Notifications. SystemUI now hosts this player, which it registers with AudioService. It also keeps MediaPlayer instances warm, and cleans them up after stop() or Binder death. Move both Ringtone and NotificationManagerService to play back audio through this new interface. Bug: 6376128, 6350773 Change-Id: I1dcb86d16ee3c4f07cdb2248d33dcff4ead3609a
/frameworks/base/core/res/AndroidManifest.xml
|
8f014059d3084fcce9e82b4b1f8b8323744ac52d |
|
26-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Make audio routing Intents protected These intents should only be sent by the system: android.intent.action.HEADSET_PLUG android.intent.action.ANALOG_AUDIO_DOCK_PLUG android.intent.action.DIGITAL_AUDIO_DOCK_PLUG android.intent.action.HDMI_AUDIO_PLUG android.intent.action.USB_AUDIO_ACCESSORY_PLUG android.intent.action.USB_AUDIO_DEVICE_PLUG Change-Id: I7be41892a9c4e619ca3e1c892fad6f1f2714c74f Signed-off-by: Mike Lockwood <lockwood@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
6dcf382b1b1dde5e6303a51a27f8d3b928072415 |
|
18-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move RINGTONE_PICKER to handle external storage. To give RINGTONE_PICKER external storage access, move it from system to MediaProvider. Fix OOBE when getRingtoneUri() kicked requery(). Bug: 6346701 Change-Id: I837002eef0580b8cdd8920a27b068c745995a8a3
/frameworks/base/core/res/AndroidManifest.xml
|
2c8e19e81fb930fbb4d353c91ca0852fe91d8166 |
|
25-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
Merge "New API to allow third-party apps to bind widgets"
|
61a5b0160d9f2e53ef4d4b451212a63032dad32d |
|
13-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
New API to allow third-party apps to bind widgets Change-Id: I1a3761c1a0f557a32d4d3bdd0207567fec918ba7
/frameworks/base/core/res/AndroidManifest.xml
|
8238e717df4bc5eebf15f97172d68af3599a95bb |
|
24-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new signature-level permission to get details of tasks. Third party apps now can't get access to the extras of the intents associated with tasks, to keep private data in them from leaking out. Change-Id: I95af9e181ac42557bc8b981807e7ddd266a88d0e
/frameworks/base/core/res/AndroidManifest.xml
|
d65c2be5485143a0d489c6dfa24276ae834ccffc |
|
20-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Merge "Add ContentProvider for apps to read received SMS cell broadcasts."
|
35be7560300a97fc3675bdd325910f28827d9508 |
|
19-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move SystemUI out of system UID. Add permissions for various things it pokes. Create new permission to control launching non-exported activities from recents. Hidden API to relax WallpaperService checks. Change-Id: I547fdcd7c213dd153ae101533ce7c56cd8f86a0d
/frameworks/base/core/res/AndroidManifest.xml
|
c3296ffdfc70c6778b6ae760b812b4e53e335f97 |
|
18-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Add ContentProvider for apps to read received SMS cell broadcasts. The CellBroadcastReceiver app will allow apps with the new permission "android.permission.READ_CELL_BROADCASTS" to read previously received cell broadcast messages from a new ContentProvider database at URI "content://cellbroadcasts". This will enable third parties to provide additional information to users in the event of emergencies without delaying or interfering with the initial system alert dialog to warn the user when the alert is received. Includes a new android.telephony.CellBroadcastMessage class which can be instantiated from the Cursor retrieved from the ContentProvider. This was previously a part of the CellBroadcastReceiver app, but can now be used by third party apps with read permission on the ContentProvider. Change-Id: I2c31f62b63c050c7946de2d81c28a5f4dc6f00b0
/frameworks/base/core/res/AndroidManifest.xml
|
9f25b7fdf216c9ef0bd2322cd223eeaf0d60f77f |
|
10-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Request key maps from input manager service. Instead of each application loading the KeyCharacterMap from the file system, get them from the input manager service as part of the InputDevice object. Refactored InputManager to be a proper singleton instead of having a bunch of static methods. InputManager now maintains a cache of all InputDevice objects that it has loaded. Currently we never invalidate the cache which can cause InputDevice to return stale motion ranges if the device is reconfigured. This will be fixed in a future change. Added a fake InputDevice with ID -1 to represent the virtual keyboard. Change-Id: If7a695839ad0972317a5aab89e9d1e42ace28eb7
/frameworks/base/core/res/AndroidManifest.xml
|
e824120016248bcfe3962883fe9f3b0481dd1c3d |
|
06-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Hide the optional permission stuff, not making it in to JB. Also lock down the rest of the development tools permissions to be development permissions that must be granted through an explicit shell command. Change-Id: I1ba216fffe1aab4bb9f83fcef108efc504f892f4
/frameworks/base/core/res/AndroidManifest.xml
|
ac14351e16e1258f1cb54e2bf772b8be004eb2b8 |
|
06-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Move some APIs from window manager to input manager. Simplified input injection API down to just one call. Removed all input state reading API. It was only used by the window manager policy and required a permission that applications could not obtain. READ_INPUT_STATE is now unused and deprecated. Change-Id: I41278141586ddee9468cae0fb59ff0dced6cbc00
/frameworks/base/core/res/AndroidManifest.xml
|
5b8fd25029e8b53353f4cdcb7c0dacea294a6b44 |
|
27-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "Make READ_LOGS signature|system|development"
|
135936072b24b090fb63940aea41b408d855a4f3 |
|
23-Mar-2012 |
Amith Yamasani <yamasani@google.com> |
User management and switching Broadcast intents that get sent out when users are added/removed/switched. More work on generating user-specific information in package manager queries. APIs to update user name and query a user by id. Removed Package.mSetStopped and mSetEnabled, since they're not user specific. User removal: - Cleanup ActivityManager, PackageManager, WallpaperManager, AppWidgetService and AccountManager. - Shutdown processes belonging to the user. Don't show vibrate option in long-press power if there's no vibrator. Lock the screen when switching users, to force unlocking. Change-Id: Ib23a721cb75285eef5fd6ba8c7272462764038fa
/frameworks/base/core/res/AndroidManifest.xml
|
cb5863e022938fe98e0ddbfe1700082750a8761f |
|
23-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Make READ_LOGS signature|system|development Change-Id: I387d53ac4b7fd3d65891145985e4cd272dffddcf
/frameworks/base/core/res/AndroidManifest.xml
|
53567a756e34706edbeae7217ad4205c55bb76b6 |
|
13-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Merge "Introduce READ_CALL_LOG and WRITE_CALL_LOG"
|
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 |
|
12-Mar-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new READ_EXTERNAL_STORAGE permission. Also adds some initial compatibility code for dealing with it. Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/core/res/AndroidManifest.xml
|
f06d9497afe01896b52e0cb5e5ff38fd49ef6eef |
|
12-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Introduce READ_CALL_LOG and WRITE_CALL_LOG Bug:6141864 Change-Id: I66fcab2a35b8c1c73bac7cfffb9f008c82ed51e8
/frameworks/base/core/res/AndroidManifest.xml
|
8662cab5c6a01ea5c426512e6f6d2cf3e158aea0 |
|
23-Feb-2012 |
Christopher Tate <ctate@google.com> |
Merge: Introduce UpdateLocks An "UpdateLock" works similarly to a wake lock in API: the caller is providing a hint to the OS that now is not a good time to interrupt the user/device in order to do intrusive work like applying OTAs. This is particularly important for headless or kiosk-like products where ordinarily the update process will be automatically scheduled and proceed without user or administrator intervention. UpdateLocks require that the caller hold the new signatureOrSystem permission android.permission.UPDATE_LOCK. acquire() and release() will throw security exceptions if this is not the case. The "is now convenient?" state is expressed to interested parties by way of a sticky broadcast sent only to registered listeners. The broadcast is protected; only the system can send it, so listeners can trust it to be accurate. The broadcast intent also includes a timestamp (System.currentTimeMillis()) to help inform listeners that wish to implement scheduling policies based on when the device became idle. The API change here is a tiny one: a dump(PrintWriter) method has been added to the TokenWatcher class to facilitate getting information out of it for dumpsys purposes. UpdateLock itself is still @hide. Bug 5543442 Change-Id: I3709c831fc1883d7cb753cd2d3ee8e10a61e7e48
/frameworks/base/core/res/AndroidManifest.xml
|
e639da7baa23121e35aa06d6e182558e0e755696 |
|
22-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
New development permissions. These are permissions that an application can request, but won't normally be granted. To have the permission granted, the user must explicitly do so through a new "adb shell pm grant" command. I put these permissions in the "development tools" permission group. Looking at the stuff there, I think all of the permissions we already had in that group should be turned to development permissions; I don't think any of them are protecting public APIs, and they are really not things normal applications should use. The support this, the protectionLevel of a permission has been modified to consist of a base protection type with additional flags. The signatureOrSystem permission has thus been converted to a signature base type with a new "system" flag; you can use "system" and/or "dangerous" flags with signature permissions as desired. The permissions UI has been updated to understand these new types of permissions and know when to display them. Along with doing that, it also now shows you which permissions are new when updating an existing application. This also starts laying the ground-work for "optional" permissions (which development permissions are a certain specialized form of). Completing that work requires some more features in the package manager to understand generic optional permissions (having a facility to not apply them when installing), along with the appropriate UI for the app and user to manage those permissions. Change-Id: I6571785c6bb5f6b291862b7a9be584885f88f3a5
/frameworks/base/core/res/AndroidManifest.xml
|
25872aa3ef189ae5506a923398af11ce5eb1a9b9 |
|
04-Feb-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding shell commands for modifying content. 1. Added methods to the ActivityManagerService remote interface that allow accessing content providers outside of an application. These methods are guarded by an internal signature protected permission which is given to the shell user. This enables a shell program to access content providers. 2. Implemented a shell command that takes as input as standart fagls with values and manipulates content via the content provider mechanism. Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/core/res/AndroidManifest.xml
|
b01e8bf57b7492b77e3445db51471edcbadda75e |
|
30-Aug-2011 |
Mike Lockwood <lockwood@android.com> |
New Serial Manager API: SerialManager: provides access to serial ports SerialPort: for reading and writing data to and from serial ports IO with both array based and direct ByteBuffers is supported. Accessing serial ports requires android.permission.SERIAL_PORT permission Each platform must configure list of supported serial ports in the config_serialPorts resource overlay (this is needed to prevent apps from accidentally accessing the bluetooth or other system UARTs). In addition, the platform uevent.rc file must set the owner to the /dev/tty* files to "system" so the framework can access the port. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a573f6a1d9b12393fbdfd2c0850499973849854b |
|
10-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
Some hardening of isolated processes by restricting access to services. Services now must explicitly opt in to being accessed by isolated processes. Currently only the activity manager and surface flinger allow this. Activity manager is needed so that we can actually bring up the process; SurfaceFlinger is needed to be able to get the display information for creating the Configuration. The SurfaceFlinger should be safe because the app doesn't have access to the window manager so can't actually get a surface to do anything with. The activity manager now protects most of its entry points against isolated processes. Change-Id: I0dad8cb2c873575c4c7659c3c2a7eda8e98f46b0
/frameworks/base/core/res/AndroidManifest.xml
|
9be4962060ca67c4fe9bfc391043f6d2829cf720 |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Merge "Unhide social stream permissions." into ics-mr1
|
098d466a25cf294487188b34dfa95575911a37cf |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Unhide social stream permissions. Bug 5569021 Change-Id: I35ee70418be0e0286294fef54e194831b5fa3b2c
/frameworks/base/core/res/AndroidManifest.xml
|
20cf0916cc6a4920b1d882a9478615a15fe6b3b0 |
|
09-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Merge "Bug 5585323 New system permission for media decode" into ics-mr1
|
4ba27fe702580a90c6e9c1861d4ea2da6fc3b029 |
|
07-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Bug 5585323 New system permission for media decode Add a system permission to enable the use of any installed media decoder when decoding for playback (as opposed to transcode). Change-Id: Ifb10a5fa8d5663a78ccbb5fa8266ad6535c234f2
/frameworks/base/core/res/AndroidManifest.xml
|
8588e47358878b7a1add2bd1df2ade95091cdb8d |
|
08-Nov-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix build. Missed a commit that fixed some issues. bug:5237167 Change-Id: I61e44831e2c3f1cf613ca1387aa95d712b7d2ded
/frameworks/base/core/res/AndroidManifest.xml
|
148c7d0de720a92632aa6ed10a39bfc38b427239 |
|
13-Oct-2011 |
tk.mun <tk.mun@samsung.com> |
Wimax : wimax framework related open source. Integrate wimax network related changes into Android Framework. - In Connectivity service, start wimax service. - 4G icon display in StatusBarPolicy. - DHCP renew add. - Add radio for wiamx Change-Id: I2d9012247edfdf49d71ca7e1414afd0006f330ca Signed-off-by: tk.mun <tk.mun@samsung.com> bug:5237167
/frameworks/base/core/res/AndroidManifest.xml
|
0b61f59d77153e7d63a33fc5d47805feb99d918b |
|
04-Oct-2011 |
Dave Santoro <dsantoro@google.com> |
Add new permissions for read/write social stream. This is a manual merge of a change going in to ICS-FactoryROM. These permissions are needed to separate the (potentially invasive) access to the user's social stream from the existing read/write contacts permission. Per discussion with Android release team, we are also hiding the stream item API until we figure out a better way to guard the data. Bug 5406886 Change-Id: I8339d743c3ebe8923c7ee47f2900444efcf82a52
/frameworks/base/core/res/AndroidManifest.xml
|
b04fe4e82abb073b4e5d82563b0882cea0dcc139 |
|
17-Sep-2011 |
Fred Quintana <fredq@google.com> |
Continuation of the unified account chooser flow. - made the UI match the spec - added ability to force the account chooser to appear - added ability to pass in a description that will override the stock one - added ability to pass in requiredFeatures for addAccount - added ability to pass in an authTokenType for addAccount Bug: 5293377 Change-Id: I243c0fd6598c943b1f65753e1f5d3c86629f64f5
/frameworks/base/core/res/AndroidManifest.xml
|
1121bb5e6ff20a2c694225300507ed486e04fea2 |
|
15-Sep-2011 |
Fred Quintana <fredq@google.com> |
Add a generic account chooser/add account flow for apps. The activity is launched as follows: Account account1 = new Account("account1@gmail.com", "com.google") Account account2 = new Account("account2@gmail.com", "com.google") ArrayList<Account> accounts = new ArrayList<Account>(); accounts.add(account1); accounts.add(account2); String[] accountTypes = new String[]{"com.google", "com.android.exchange"}; Bundle addAccountOptions = null; Intent intent = AccountManager.newChooseAccountIntent(account1, accounts, accountTypes, addAccountOptions); startActivityForResult(intent, 0); Change-Id: I05a467bdc3552a2e39397b0182879351f4324389
/frameworks/base/core/res/AndroidManifest.xml
|
d2509fd83597595914ef0627685e917380863eb6 |
|
12-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Add boot mode where only "core apps" are started. A core app is one that has coreApp="true" in its manifest tag. The system can successfully boot (though a little painfully) with only framework-res.apk, SettingsProvider.apk, SystemUI.apk, DefaultContainerService.apk, and Launcher2.apk set as core apps. Currently this boot mode is always turned off. Change-Id: Ieaa4a8031c2c391a12996aa8d8b1d65fc2b09d6b
/frameworks/base/core/res/AndroidManifest.xml
|
905577f6345c014fc2489a8068ea967ba8c18012 |
|
08-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #5263361: Browser instance not created in application picker The resolver activity was hiding the following activity from recents. Also some other fixes: a little better memory use debugging, removed some unneeded code from window manager, moved some system activities into their own process, added some more running process information for manage apps. Change-Id: I66687d16989ff965d524b92dc360f37c19199717
/frameworks/base/core/res/AndroidManifest.xml
|
b6ae19a96d05546fca61cadcab5c39996d68c9ba |
|
08-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove connection access intents from protected broadcasts. These intents are sent by Bluetooth-Pbap app which doesn't have the system uuid. Instead protect with admin permission on the reciever side. Change-Id: Ibb788e1526108909b5a3b15462ac3a008b041613
/frameworks/base/core/res/AndroidManifest.xml
|
81e23acb0b2ffc8962a9b3ff40da328d2bfa401b |
|
06-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth intents to protected broadcasts. Change-Id: I3734a4ff7d964c64ce39ec3f897d3799aa9653f7
/frameworks/base/core/res/AndroidManifest.xml
|
cccdd721e95bff5f964ea6fdf389c1f740a03702 |
|
01-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Make WRITE_APN_SETTINGS a system-only permission. Protects us from apps getting packet snooping ability (ie, routing all your traffic through their server by modifing your APN settings). We may eventually revert this if/when we have time to provide a proper API and scary UI like VPN has. bug:5242750 Change-Id: I71d73807ca5268c6aacc2156839b4d11427048c4
/frameworks/base/core/res/AndroidManifest.xml
|
961e30458319cfd50e1892ba7dd14a1d0ebe4cc7 |
|
30-Aug-2011 |
Jeff Sharkey <jsharkey@android.com> |
Introduce immediate CONNECTIVITY_ACTION variant. New broadcast that is dispatched immediately after connectivity changes have been handled by ConnectivityService, bypassing any applicable CONNECTIVITY_CHANGE_DELAY. Also protect CONNECTIVITY_CHANGE broadcasts, since they should only be sent by system. Bug: 5198167 Change-Id: I75f1fb44b21da1879f0ab960bcaa481126d70fde
/frameworks/base/core/res/AndroidManifest.xml
|
463f22114587344c96460179069a08d7381fbfd6 |
|
22-Jul-2011 |
Jake Hamby <jhamby@google.com> |
Add ISIM application support for LTE devices. - Add methods to TelephonyManager to provide access to IMS records on the ISIM application of the UICC, as well as access to the ISIM AKA authentication algorithm. - Add support for the new IMS methods to CDMALTEPhone, using the helper class ImsUiccRecords to load the IMS records from the ISIM. The same approach can be used to implement IMS support for UMTS/LTE devices. - There is a new RIL request, RIL_REQUEST_ISIM_AUTHENTICATION, which is used to perform IMS AKA authentication using the algorithm on the ISIM application of the UICC. The challenge nonce and response are both encoded as Base64 strings. Change-Id: I73367c7d9bc573d0d883d68adf09891de1319129
/frameworks/base/core/res/AndroidManifest.xml
|
5ab2157bf1f105b02d3e2913cd3a33f9765b74ca |
|
27-Jul-2011 |
Kenny Root <kroot@google.com> |
Infrastructure to support package verifier Allow a package verifier to approve or disapprove of a package being installed. Change-Id: Ibfea0f2b1aaa4ab1589a4e59f96144702b9bf94b
/frameworks/base/core/res/AndroidManifest.xml
|
b0381688b8556f4f0a86bb534c8bc52275f16d12 |
|
11-Aug-2011 |
Tom Taylor <tomtaylor@google.com> |
Add private permission for sending SMS via Messaging app When the phone dialer sends an sms, it will use the Messaging app. That way the sent messages will end up in the messaging provider db and sending will be more reliable. Currently, the phone dialer uses the SmsManager directly. For now, the feature is only available to system apps and the permission is private. Bug 4563486 Change-Id: I10f7e1042683164ee61d01a2aaf738d19084da72
/frameworks/base/core/res/AndroidManifest.xml
|
e09cd7914c117e84bf78676d0e760c51aa147eb8 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "New broadcast telling when an app is fully removed."
|
f9abb405903cab1fcd379388a96925524840c607 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
New broadcast telling when an app is fully removed. Change-Id: Ia516d826f302a01881fa92d9ffdc0adfbf669a4b
/frameworks/base/core/res/AndroidManifest.xml
|
d0d85f26cb7287c63adf95bace098bc1af3fe4e8 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I6f9ddb3fffe9e10cc2d34dda3ae8700b1af7e470
/frameworks/base/core/res/AndroidManifest.xml
|
89c95a0da87fc85a86a7341f60decf7e50609a18 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: remove unused protected intent. Change-Id: Id58f81d5f50a13a1fb422eafe66fa512047f9b05
/frameworks/base/core/res/AndroidManifest.xml
|
880f64ac1080ccec111de91a4af026cca3d1bb25 |
|
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: introduce VpnService as the base class for user space VPN."
|
199ed6ef89bd356895534ba09ac43ed340cd9a1a |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: introduce VpnService as the base class for user space VPN. Change-Id: I4793a6eb51b33f669fc6d39e1a16cf5eb9e3d851
/frameworks/base/core/res/AndroidManifest.xml
|
b234636105317942bdf2daf4f5581c2218847084 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: move away from the VPN permission."
|
e53eba0470b7578def756cd22952d447776ba141 |
|
04-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed permission READ_WRITE_OWN_VOICEMAIL from framework/base. This permission has now been replaced by ADD_VOICEMAIL. Bug: 5098551 Change-Id: Idc993f1674a66f0df3ec699ed14b2e5cfedfe3e8
/frameworks/base/core/res/AndroidManifest.xml
|
fcc1b41b663c1a0cb551344c4a16a5ad9ce36d60 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: move away from the VPN permission. VpnBuilder will be replaced by VpnService in the next change. Change-Id: I2dea67a1616b74d17b372f7b214d207f1617198e
/frameworks/base/core/res/AndroidManifest.xml
|
766839cb6f2aac8c802ec1de9f3cc12fcb9eabad |
|
02-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Step1 of renaming READ_WRITE_OWN_VOICEMAIL to ADD_VOICEMAILS. READ_WRITE_OWN_VOICEMAIL sounds a confusing name. Dianne recommened to rename it to ADD_VOICEMAILS as this simply allows 3rd party apps to add new voicemails to the system. The fact that we allow the app to acces only its own voicemail is implicit and need not be highlighted in the permission name. See bug: 5098551 for more details This CL implements the 1st step of this change by adding the permission ADD_VOICEMAILS. A follow up CL will remove READ_WRITE_OWN_VOICEMAIL once content provider and contacts app have been modified to start using the new ADD_VOICEMAILS permission instead. Bug: 5098551 Change-Id: I515e7967bdb0e8498a60a32983f9122ce10dcc4a
/frameworks/base/core/res/AndroidManifest.xml
|
ba39839444532af0ed3766f736582413f6d7a40b |
|
02-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Move ImageWallpaper to SystemUI process. Nice to not load 4MB bitmaps in the system process. Also, hey, with how we are now scrolling the surface instead of the bitmap, there is no reason to keep that 4MB bitmap loaded in to memory. So don't. Unfortunately it looks like for some reason the VM is still holding on to the bitmap. I'll need to figure out why. Later. Change-Id: Ib3503756144502fc5c8d5e294248c2417c4fe8c8
/frameworks/base/core/res/AndroidManifest.xml
|
e1538f05587386bbba8dac0b4b4a6c1059947429 |
|
01-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Revert "Unhide APIs for user space VPN." This reverts commit 3c2529c717cda3df321c1d0d6abe23ac1f298ac9. Change-Id: I37d4ea6c1079d337ede7ac567d88414a41fc1e11
/frameworks/base/core/res/AndroidManifest.xml
|
24a12104fd09ad8658b8d8af1f8efce4ec1c6701 |
|
30-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Hide permissions that are not available to apps. Change-Id: I5f3bc72114b780fffe218a5600bfd011ede029d3
/frameworks/base/core/res/AndroidManifest.xml
|
fcbb4924864976339d5ad8b7adb925d7a050df6a |
|
28-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "Unhide APIs for user space VPN."
|
988323c57bd25a58f05dfa492d9b9c8ab62c5153 |
|
22-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 This CL inherits https://android-git.corp.google.com/g/112600 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Iaa425c7915fe70767ad0b17bf6c6fbcd2a1200b2
/frameworks/base/core/res/AndroidManifest.xml
|
3c2529c717cda3df321c1d0d6abe23ac1f298ac9 |
|
22-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I2d9e5a8a3ee8556626e373bfdc93c809dad40bff
/frameworks/base/core/res/AndroidManifest.xml
|
0bc369ee66df6dc4c126f1991af591ea6a2c0fd0 |
|
21-Jul-2011 |
Jeff Hamilton <jham@android.com> |
Make READ_FRAME_BUFFER signatureOrSystem. Bug: 4941390 Change-Id: I6d38b2d5ca2ed3bbf9ec0561659a486a99cbc024
/frameworks/base/core/res/AndroidManifest.xml
|
cdf95e31024d235b51c7e6076ea2afc990f460cd |
|
20-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed READ_WRITE_ALL_VOICEMAILS permission from framework. This permission is meant to be a 'signature' permission and to be used only by the contacts app. We recently moved it to framework/base as part of opening up voicemail api into the SDK. However, the signature of framework is different from contacts app. Consequently the contacts app is not granted READ_WRITE_ALL_VOICEMAILS permission. This makes the contacts app crash on start. This fix removes the READ_WRITE_ALL_iVOICEMAILS from framework/base so that the one defined in contacts provider is then used by the system. Bug: 5054221 Change-Id: Iaa7a23fe95b0142978eff124e25fe2291dc7d212
/frameworks/base/core/res/AndroidManifest.xml
|
5521e892f8b5b2313619405684d426309f66ade4 |
|
07-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Voicemail content provider API for api council review. This is a new content provider implemented to add visual voicemail support in android. Voicemail content provider is the central repository for storing voicemails inserted by various voicemail sources. The content provider also exposes a status table to let the voicemail source application convey its current status to the system. The primary application that reads from this content provider is the phone app. The phone app shows voicemails along with other call entries within the call log and optionally any relevent message about the voicemail source status. The implementation of this content provider can be found at https://android-git.corp.google.com/w/?p=platform/packages/providers/ContactsProvider.git;a=blob;f=src/com/android/providers/contacts/VoicemailContentProvider.java Change-Id: I8ad46aec20c70684f7bfa45530bbb90dd841d81a
/frameworks/base/core/res/AndroidManifest.xml
|
45ce864ef41ce90938cc34d42a8e1075f69e7a61 |
|
15-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Move LoadAverageService to the SystemUI apk. Change-Id: I442e264802d1e35cd7d27bae121ae75f932595b6
/frameworks/base/core/res/AndroidManifest.xml
|
79ec80db70d788f35aa13346e4684ecbd401bd84 |
|
24-Jun-2011 |
Christopher Tate <ctate@google.com> |
Make full backup API available to apps New methods for full backup/restore have been added to BackupAgent (still hidden): onFullBackup() and onRestoreFile(). The former is the entry point for a full app backup to adb/socket/etc: the app then writes all of its files, entire, to the output. During restore, the latter new callback is invoked, once for each file being restored. The full backup/restore interface does not use the previously-defined BackupDataInput / BackupDataOutput classes, because those classes provide an API designed for incremental key/value data structuring. Instead, a new FullBackupDataOutput class has been introduced, through which we restrict apps' abilities to write data during a full backup operation to *only* writing entire on-disk files via a new BackupAgent method called fullBackupFile(). "FullBackupAgent" exists now solely as a concrete shell class that can be instantiated in the case of apps that do not have their own BackupAgent implementations. Along with the API change, responsibility for backing up the .apk file and OBB container has been moved into the framework rather than have the application side of the transaction do it. Change-Id: I12849b06b1a6e4c44d080587c1e9828a52b70dae
/frameworks/base/core/res/AndroidManifest.xml
|
428e84388af3695cb19549bdb107e2b88afd3708 |
|
30-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Extend network stats to signatureOrSystem. Change-Id: I82cc99797b5d5bc3bb9a876b67f311643174da33
/frameworks/base/core/res/AndroidManifest.xml
|
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 |
|
03-May-2011 |
Jeff Sharkey <jsharkey@android.com> |
Permissions to protect bandwidth statistics. Introduces new "net_bw_stats" group which will protect reading detailed bandwidth statistics from the kernel. Also introduce "net_bw_acct" group which will enable specific applications to request that their network traffic be counted against other UIDs. This change associates manifest permissions with the low-level GIDs. Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/core/res/AndroidManifest.xml
|
8969d9924c662ab4cdacc342bbdc33756db730be |
|
22-Jun-2011 |
satok <satok@google.com> |
Revert "Create TextServiceManager and SpellCheckerService" This reverts commit eaddb894865a804279659b4aad6364a34ab50beb.
/frameworks/base/core/res/AndroidManifest.xml
|
eaddb894865a804279659b4aad6364a34ab50beb |
|
01-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Ia25e7b4f308778891929e31b8cbd741f6848cce4
/frameworks/base/core/res/AndroidManifest.xml
|
3f3337a662e9916bbf14502ef3b32dedaa7adfa4 |
|
18-Jun-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: avoid leaking file descriptors. Change-Id: If70f5af3529d79bddb9d72675cf6eb038ff3ff70
/frameworks/base/core/res/AndroidManifest.xml
|
21c9c45e5caf62b935354b74392fb40c4bf18529 |
|
07-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Interface-level network policy, persist policies. Define NetworkPolicy as cycle-reset day and warning/limit values, and set/get through NetworkPolicyManager. Watch ConnectivityManager for network connection events, and apply quota rules based on matching interfaces. Policy service matches based on strong identity to support IMSI-specific policy values. Calculates remaining quota based on current stats recorded since the last reset cycle day. Tests to verify edge cases around February. Persist network and UID policies in XML, and restore on boot. Change-Id: Id40ba7d6eed6094fbd5e18e6331286c606880d80
/frameworks/base/core/res/AndroidManifest.xml
|
432513380e8ea8f4c70853190bfd55a9186407f4 |
|
11-May-2011 |
Dave Santoro <dsantoro@google.com> |
API modifications to handle profiles in Contacts. The user's profile is represented as a single Contact, comprised of Raw Contacts which may be contributed from any accounts the user has on the system. Two new permissions have been added: READ_PROFILE and WRITE_PROFILE. These are required for reading or writing any contact data that is designated as part of the user's profile. Contact queries can include the user's profile data by setting the include_profile URI parameter to 1 (this requires READ_PROFILE access). By default, the user's profile data will not be included in any Contact queries. Change-Id: I25616f59622dbb157032c9c435064eb36af6e8e1
/frameworks/base/core/res/AndroidManifest.xml
|
d4f1bacca50a74a74a02bf6a242bb22c495e4034 |
|
09-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 7ca13deb to master Change-Id: If34814d6c70cf63eca9bd816845389f6785518ae
|
7d259626d009a45195ec341646ce06658b842e40 |
|
08-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 0cb17a52 to honeycomb-plus-aosp Change-Id: I784e6d1946fa708f63becece070c7090cec6f1e2
|
8643aa0179e598e78d938c59035389054535a229 |
|
20-Apr-2011 |
Svetoslav Ganov <svetoslavganov@google.com> |
Interrogation of the view hierarchy from an AccessibilityService. 1. Views are represented as AccessibilityNodeInfos to AccessibilityServices. 2. An accessibility service receives AccessibilityEvents and can ask for its source and gets an AccessibilityNodeInfo which can be used to get its parent and children infos and so on. 3. AccessibilityNodeInfo contains some attributes and actions that can be performed on the source. 4. AccessibilityService can request the system to preform an action on the source of an AccessibilityNodeInfo. 5. ViewAncestor provides an interaction connection to the AccessibiltyManagerService and an accessibility service uses its connection to the latter to interact with screen content. 6. AccessibilityService can interact ONLY with the focused window and all calls are routed through the AccessibilityManagerService which imposes security. 7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos based on some criteria. These API go through the AccessibilityManagerServcie for security check. 8. Some actions are hidden and are exposes only to eng builds for UI testing. Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/core/res/AndroidManifest.xml
|
7218d830e27d81141588cd6e37f206d141a18f62 |
|
04-Jun-2011 |
Jeff Brown <jeffbrown@google.com> |
resolved conflicts for merge of ca2b552d to master Change-Id: I2f3693a59042ac5aa2d7bcdc3a504c78dc99a18b
|
ca2b552d981239043a575dfc9db86966492d0f9e |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am c8812761: am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'c8812761609e532cceb400b112ed9982149c2490': Add a preference panel for mouse speed.
|
c8812761609e532cceb400b112ed9982149c2490 |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'e1718de61c20c8d401633f83589f18d2c0c652db': Add a preference panel for mouse speed.
|
1a84fd1fb7a51f3fe4f8865e1cdd09f3490f696c |
|
02-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
Add a preference panel for mouse speed. Bug: 4124987 Change-Id: I3ce175d268a1d043cf5878481261b1049a15a149
/frameworks/base/core/res/AndroidManifest.xml
|
ab79ee4adcbc6eb9fb9c509766753f65d3857739 |
|
27-Apr-2011 |
Jake Hamby <jhamby@google.com> |
Enable full support for SMS Cell Broadcast. Implement full support for SMS Cell Broadcast (3GPP TS 23.041). Includes support for ETWS and CMAS emergency message types. Includes GSM and UMTS support (CDMA will be added later). Note: the change to GsmAlphabet.java is only necessary if the SMS national languages support patch has been applied. If that change has not been applied, then the changes to GsmAlphabet.java in this patch set can safely be ignored. Change-Id: Ia0362c53695b8ef9a0982f558f1cffa912def34b
/frameworks/base/core/res/AndroidManifest.xml
|
9f67adfc2d33ef63960d2e528ccbcbdea621f969 |
|
14-May-2011 |
Chia-chi Yeh <chiachi@android.com> |
Add a new permission for user space VPN applications. Change-Id: I2b87ef34db01209dac45fbceccafd865840830d5
/frameworks/base/core/res/AndroidManifest.xml
|
4a627c71ff53a4fca1f961f4b1dcc0461df18a06 |
|
01-Apr-2011 |
Christopher Tate <ctate@google.com> |
Full local backup infrastructure This is the basic infrastructure for pulling a full(*) backup of the device's data over an adb(**) connection to the local device. The basic process consists of these interacting pieces: 1. The framework's BackupManagerService, which coordinates the collection of app data and routing to the destination. 2. A new framework-provided BackupAgent implementation called FullBackupAgent, which is instantiated in the target applications' processes in turn, and knows how to emit a datastream that contains all of the app's saved data files. 3. A new shell-level program called "bu" that is used to bridge from adb to the framework's Backup Manager. 4. adb itself, which now knows how to use 'bu' to kick off a backup operation and pull the resulting data stream to the desktop host. 5. A system-provided application that verifies with the user that an attempted backup/restore operation is in fact expected and to be allowed. The full agent implementation is not used during normal operation of the delta-based app-customized remote backup process. Instead it's used during user-confirmed *full* backup of applications and all their data to a local destination, e.g. via the adb connection. The output format is 'tar'. This makes it very easy for the end user to examine the resulting dataset, e.g. for purpose of extracting files for debug purposes; as well as making it easy to contemplate adding things like a direct gzip stage to the data pipeline during backup/restore. It also makes it convenient to construct and maintain synthetic backup datasets for testing purposes. Within the tar format, certain artificial conventions are used. All files are stored within top-level directories according to their semantic origin: apps/pkgname/a/ : Application .apk file itself apps/pkgname/obb/: The application's associated .obb containers apps/pkgname/f/ : The subtree rooted at the getFilesDir() location apps/pkgname/db/ : The subtree rooted at the getDatabasePath() parent apps/pkgname/sp/ : The subtree rooted at the getSharedPrefsFile() parent apps/pkgname/r/ : Files stored relative to the root of the app's file tree apps/pkgname/c/ : Reserved for the app's getCacheDir() tree; not stored. For each package, the first entry in the tar stream is a file called "_manifest", nominally rooted at apps/pkgname. This file contains some metadata about the package whose data is stored in the archive. The contents of shared storage can optionally be included in the tar stream. It is placed in the synthetic location: shared/... uid/gid are ignored; app uids are assigned at install time, and the app's data is handled from within its own execution environment, so will automatically have the app's correct uid. Forward-locked .apk files are never backed up. System-partition .apk files are not backed up unless they have been overridden by a post-factory upgrade, in which case the current .apk *is* backed up -- i.e. the .apk that matches the on-disk data. The manifest preceding each application's portion of the tar stream provides version numbers and signature blocks for version checking, as well as an indication of whether the restore logic should expect to install the .apk before extracting the data. System packages can designate their own full backup agents. This is to manage things like the settings provider which (a) cannot be shut down on the fly in order to do a clean snapshot of their file trees, and (b) manage data that is not only irrelevant but actively hostile to non-identical devices -- CDMA telephony settings would seriously mess up a GSM device if emplaced there blind, for example. When a full backup or restore is initiated from adb, the system will present a confirmation UI that the user must explicitly respond to within a short [~ 30 seconds] timeout. This is to avoid the possibility of malicious desktop-side software secretly grabbing a copy of all the user's data for nefarious purposes. (*) The backup is not strictly a full mirror. In particular, the settings database is not cloned; it is handled the same way that it is in cloud backup/restore. This is because some settings are actively destructive if cloned onto a different (or especially a different-model) device: telephony settings and AndroidID are good examples of this. (**) On the framework side it doesn't care that it's adb; it just sends the tar stream to a file descriptor. This can easily be retargeted around whatever transport we might decide to use in the future. KNOWN ISSUES: * the security UI is desperately ugly; no proper designs have yet been done for it * restore is not yet implemented * shared storage backup is not yet implemented * symlinks aren't yet handled, though some infrastructure for dealing with them has been put in place. Change-Id: Ia8347611e23b398af36ea22c36dff0a276b1ce91
/frameworks/base/core/res/AndroidManifest.xml
|
4397c3240240080cf17a1cd4dcaff87ab7cacb3a |
|
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am c535f7f2: DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" * commit 'c535f7f291f0bda688efcee62f21cf44d0ebe38e': DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"
|
c535f7f291f0bda688efcee62f21cf44d0ebe38e |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: Iaf9cf120217e8417d328a51db0d82be6835b0ff0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f60ba87f075eb7bd278bc14af77ba41c70b2f8b0 |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I0b139a0f3b369c1080831a5b3a48f5d9a330b1bb Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ec9b5d17af1199e418b7352313575f0f7288b550 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit 'ee081bf5ee936396a89d5bd2b29487047b260f49': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
ee081bf5ee936396a89d5bd2b29487047b260f49 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit '3ed0a1ec7aa6364c236721a1bd29fd196f259cba': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 |
|
28-Mar-2011 |
Ramesh Sudini <ramesh.sudini@motorola.com> |
IMS: Provide net_admin permission so that IPSec could be configured/used. IMS configures the security database in kernel with keys generated from ISIM. Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/core/res/AndroidManifest.xml
|
1e23db4c2f5a6eba37a786e4390d52fe2012bfae |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0c5001d776d56bae02a5cc2663286a125d99bc5e |
|
13-Apr-2011 |
Dianne Hackborn <hackbod@google.com> |
Add APIs to remove tasks. You can remove sub-tasks inside of a task, or an entire task. When removing an entire task, you can have its process killed as well. When the process is killed, any running services will get an onTaskRemoved() callback for them to do cleanup before their process is killed (and the service possibly restarted). Or they can set a new android:stopWithTask attribute to just have the service automatically (cleanly) stopped at this point. Change-Id: I1891bc2da006fa53b99c52f9040f1145650e6808
/frameworks/base/core/res/AndroidManifest.xml
|
5ee250aa744720c90b264966f9721cfb9d256e96 |
|
05-Apr-2011 |
Jason parks <jparks@google.com> |
am 1d733625: am cca2f2f9: Merge "Send out a broadcast that the system is being factory reset." into gingerbread * commit '1d73362597c49f4692a580460bc8697a8f1d0efa': Send out a broadcast that the system is being factory reset.
|
016f8847471a9d4ffe6a03c29e0600529d51d929 |
|
31-Mar-2011 |
Jeff Hamilton <jham@android.com> |
am b9896794: am 96cf34d3: Merge "Make STOP_APP_SWITCHES signatureOrSystem." into gingerbread * commit 'b98967942e9a764b80abc8ff1c6f6f2d620c0f7a': Make STOP_APP_SWITCHES signatureOrSystem.
|
cca2f2f987ab772a4bae3176df7259f59d6502ce |
|
30-Mar-2011 |
Jason parks <jparks@google.com> |
Merge "Send out a broadcast that the system is being factory reset." into gingerbread
|
10de0b31df14a2f3337bbfc824419f8e4a246f52 |
|
25-Mar-2011 |
Jeff Hamilton <jham@android.com> |
Make STOP_APP_SWITCHES signatureOrSystem. The NFC service relies on this permission for it's dispatching mechanism and it is no longer signed with the platform cert. Bug: 4173610 Change-Id: I598ad2889c4af307f04433093923255fe7daedbb
/frameworks/base/core/res/AndroidManifest.xml
|
4ca74dc4c2e0c68803e777cf47ed8e01b8e8444e |
|
14-Mar-2011 |
Jason parks <jparks@google.com> |
Send out a broadcast that the system is being factory reset. Change-Id: I339b7ce58cb3f48316103be49b582d4f7e9b63bf
/frameworks/base/core/res/AndroidManifest.xml
|
a64e2ad4da3612586594a19489a2b5d44f3f23a0 |
|
14-Mar-2011 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of 38d0d562 to honeycomb-plus-aosp Change-Id: Iff9ea08b810b0d142a9227272492c0305a9bcf42
|
367f41f8f61126c2ab34a34cc676756a9fc23ac2 |
|
08-Mar-2011 |
Nick Pelly <npelly@google.com> |
Implement new NFC-EE API's as shared library (frameworks/base). Change-Id: I45c4eaf59ec78167fc236fdd59676465a5e1bcb7
/frameworks/base/core/res/AndroidManifest.xml
|
4bdab1751f0db3b2f03e8c58ef5c11a543dfa3c7 |
|
23-Feb-2011 |
TK MUN <tk.mun@samsung.com> |
DO NOT MERGE WiMAX support - In Connectivity service, start WiMAX service - 4G icon display in StatusBarPolicy - Add DHCP renew - Add radio for WiMAX Change-Id: Iffff012b270d80e84ec8fbd4486921a8adb847dd Signed-off-by: TK MUN <tk.mun@samsung.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a68b8338b431eb15d28e92f06452efbbda9493e |
|
08-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
USB: Add API and dialog for apps to request permissions for USB devices and accessories New APIs: UsbManager.hasPermission returns true if the caller has permission for the given device or accessory UsbManager.requestPermission poses a dialog to allow the user to give the caller permission for the device or accessory. Result is returned via a PendingIntent. No dialog is displayed if the caller already has permission. Also moved UsbResolverActivity to SystemUI package BUG: 4069037 Change-Id: I93be769501a8776b49ac26e468af19f8fa2114c9
/frameworks/base/core/res/AndroidManifest.xml
|
40bbf9295d5245d3917629ce15f7b37670aef1ac |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE: Backport USB accessory support to gingerbread Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
c4308f01c965571dc2354107c3574df113e397ee |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
Move USB framework support from android.hardware to android.hardware.usb package Change-Id: I00fd4f0caaa4aebe48f71c576bb211b5f38bf88d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
02eb8746de2d60563ec2751a34d20923192e4293 |
|
27-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: Enhancements for managing USB devices and accessories When a USB device or accessory is connected, the UsbService now asks the user which application to associate with the device or accessory. Applications interested in devices or accessories must specify the devices they work with via meta-data attached to their manifest. Permission to communicate with the device is assigned when the user chooses the activity to use for the device. The user has the option of clicking the "always use this application" checkbox to make the assignment automatic in the future. The user may later clear this preference and revoke permission for an application to have permission to communicate with the device by clicking the "Clear defaults" button for the activity in the Manage Applications panel in Settings. Added class UsbResolveActivity (a subclass or ResolveActivity for choosing an activity for a USB device or accessory) Added UsbDeviceManager, which manages the mapping between USB devices/accessories and applications, including default applications for devices and accessories, and manages application permissions. Add interface to allow Settings to clear device and accessory preferences and permissions for an application. Remove obsolete ACCESS_USB permission. Add new signatureOrSystem MANAGE_USB permission to allow administrating preferences and permissions. Moved UsbService.java to a "usb" subdirectory, along with new classes UsbResolveActivity and UsbDeviceManager. Change-Id: I92554381e9779e68ce380daaee4e1401fb875703 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7f972122db87dc54e41ed1a6e417534d43bca3a |
|
24-Feb-2011 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3426299: Introduce application "stopped" state The package manager now keeps track of whether an application is stopped. There are new intent flags to control whether intent filters in a stopped application will match the intent. This is currently used in one place, sending broadcasts, so that stopped apps can not be launched due to background processes. The package manager during first init makes sure no applications are in the stopped state. When new applications are installed, that begin in the stopped state. When the activity manager is launching a component of an application, it ensures the application is taken out of the stopped state. The "force stop" button in manage applications will now put an application back in to the stopped state; it can't go back out of the stopped state until one of its components is launched by the activity manager. There will probably be a few more places where we need to filter stopped applications out of intent matches, but doing this for broadcast is a very big first step. This also introduces a new broadcast that is sent to an application after it is replaced with a new .apk. But only if the app is not in the stopped state. This makes it a lot easier for developers to implement code to get their application back in proper running shape after an upgrade. Finally another new broadcast is added that is sent to a package's installer at the first time it is launched. This allows the installer to tell the package about it being installed only when it is first actually used. Change-Id: I589c53ff0e0ece868fe734ace4439c0d202dca2d
/frameworks/base/core/res/AndroidManifest.xml
|
8d224caf989b212f8e633cc1a8b0db453300a742 |
|
18-Feb-2011 |
Peter Visontay <pvisontay@google.com> |
ActivityManager exposes launch count API. Bug: 3431684 Change-Id: I49d4fb0b1620aafaf251d77700bc017859328968
/frameworks/base/core/res/AndroidManifest.xml
|
984dd8a206e782027c2b0c866aa845e6d236f218 |
|
16-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "UsbManager: New APIs for USB accessories"
|
ef12256ca500bb0c16af51e5a923b70e9adabd34 |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am d8d51fed: am 8c8e9d9a: am 1df862a4: Minor doc update. * commit 'd8d51fed861cd36f57f1eb2542def23322379d7c': Minor doc update.
|
d8d51fed861cd36f57f1eb2542def23322379d7c |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am 8c8e9d9a: am 1df862a4: Minor doc update. * commit '8c8e9d9a7f1bddbc995a5c088f19a0a3be1f6a5b': Minor doc update.
|
1df862a4656bb0d7a3329311b1e243fc6db32448 |
|
15-Feb-2011 |
Nick Pelly <npelly@google.com> |
Minor doc update. Change-Id: I1d29adfccbdc196a145a2c2a044d63b00e5f788b
/frameworks/base/core/res/AndroidManifest.xml
|
9182d3c4eb1f9065cb33df5a3594969dd0d42acc |
|
15-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: New APIs for USB accessories USB accessories are peripherals that connect to android devices as a USB host. When connected, the accessory will first identify itself to the android device by sending manufacturer, product, accessory type and version strings to the device, and then request the device to enter USB accessory mode. The device will then enable the USB accessory kernel driver and disable all other USB functionality except possibly adb (adb can be used while the android device is connected to the PC and the PC is running software that emulates a USB accessory) The class android.hardware.UsbAccessory is used to describe the currently attached USB accessory. UsbAccessory contains the manufacturer, product, accessory type and version strings to identify the accessory. The accessory can be opened as a ParcelFileDescriptor, which can be used to communicate with the accessory over two bulk endpoints. The Intents UsbManager.USB_ACCESSORY_ATTACHED and UsbManager.USB_ACCESSORY_DETACHED are broadcast when accessories are connected and disconnected to the device. The USB_ACCESSORY_ATTACHED contains a UsbAccessory object for the attached accessory as an extra. The Intent also contains string extras for the manufacturer, product, accessory type and version strings to allow filtering on these strings. Change-Id: Ie77cbf51814a4aa44a6b1e62673bfe4c6aa81755 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a40182c77b9cfb608d1f9a17c3ed7d9a6a56efa |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am 49295e53: am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit '49295e5379472c22af8975e32271f9659c016531': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
49295e5379472c22af8975e32271f9659c016531 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit 'ccd79399cc2a28d79287fd1558c5f5a530356003': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
f5e4f208b9ed73ff9c8d74d9c2e75a95ec1014b4 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm. Change-Id: I53a6671d5478e7dbca44b17d90f1edfa8e3420bc
/frameworks/base/core/res/AndroidManifest.xml
|
7df04fb2a02515edb1398b891d857b27f348fd83 |
|
25-Jan-2011 |
Adam Powell <adamp@google.com> |
am 41cd1ce1: am f72a13ec: Merge "Fix bug 3378333 - Holo-style layout for granting permissions" into honeycomb * commit '41cd1ce1b97e48190b47447555560702d0843aba': Fix bug 3378333 - Holo-style layout for granting permissions
|
c91466f56a777ab44a9a025e9d51f576e21dcce9 |
|
22-Jan-2011 |
Adam Powell <adamp@google.com> |
Fix bug 3378333 - Holo-style layout for granting permissions Change-Id: Ie1bb925db3ddd8343c9756e220a0d821f4d31c6d
/frameworks/base/core/res/AndroidManifest.xml
|
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 |
|
07-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Make ACCESS_USB permission for applications to access USB devices: - change from signatureOrSystem to normal - no longer associate this permission with the "usb" unix group - add to public API Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7d511e148bc901ef41ac44d7b3593e5d803f72f |
|
30-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
New APIs for USB host support: UsbManager: - is now a service retrievable via Context.getSystemService(Context.USB_SERVICE). - provides support for returning a list all connected USB devices - broadcasts ACTION_USB_DEVICE_ATTACHED and USB_DEVICE_DETACHED when devices are added and removed from the USB host bus UsbDevice: - represents an attached USB device. UsbInterface: - represents an interface on a USB device - devices may have multiple interfaces if they provide multiple sets of functionality (for example, android phones typically have interfaces for both USB mass storage and adb) UsbEndpoint: - represents an endpoint on a USB interface - endpoints are used for sending or receiving data (only in one or the other direction) UsbRequest: - encapsulates a send or receive request to be sent over an endpoint Change-Id: Ieef3e434c62760770ea839070cf5eba1a705967a Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
795f135a08b6db7372935fa15874723307748fec |
|
21-Jan-2011 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #3338957 (Account Picker and Account type picker need love) - update UI to match design requirements Change-Id: Idb5dbea876eb7170a8c1f077a99cfe168d41f1e1
/frameworks/base/core/res/AndroidManifest.xml
|
8888c597c4bc3002e48738b6aea6fd43f69c0f78 |
|
21-Jan-2011 |
Jason parks <jparks@google.com> |
Add and enforce the permission for encrypting/decrypting. Change-Id: Ia292d8a5981266c2703743beb79fd786d77b375d
/frameworks/base/core/res/AndroidManifest.xml
|
81f39eb6e76d0be1dd341af835e8002a0f80524e |
|
12-Jan-2011 |
Winson Chung <winsonc@google.com> |
Refactoring app widgets to address security/performance issues. - Moving the service binding to AppWidgetService to prevent arbitrary apps from binding to widget services - Requiring RemoteViewsServices to require android.permission.BIND_REMOTEVIEWS permission Change-Id: Id135bafba998299eb278067712b8a5d8487cfd04
/frameworks/base/core/res/AndroidManifest.xml
|
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 |
|
12-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Remove permission android.permission.WRITE_MEDIA_STORAGE Access to the /data/media directory is now restricted exclusively to the sdcard daemon, so there is no longer a need for this permission. Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f9a04233c1db22a6ddd989b55db725badeae7539 |
|
11-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
@hide android.permission.WRITE_MEDIA_STORAGE This permission is not needed for non-system or unbundled apps, so we don't need it in the public API Change-Id: I1a2a0349c6c5b7b5dc3104d69f4e39e95b878db9 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
10bc1114f37d9edb3f153ec209745dd476530325 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to the MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3f182381e1279874148f619c6ad2f76840ab3990 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Framework manifest: Remove USB_CAMERA_ATTACHED and USB_CAMERA_DETACHED broadcasts These broadcasts no longer exist, so remove their <protected-broadcast> elements from the manifest. Signed-off-by: Mike Lockwood <lockwood@android.com> Change-Id: I4a724509d3058f16283870f02e5e1b51dfb21a43
/frameworks/base/core/res/AndroidManifest.xml
|
b19e62add0a747127952862bb7bea0b73379edcc |
|
16-Dec-2010 |
Fred Quintana <fredq@google.com> |
fix the TooManyDeletes to show up again It was moved so it was no longer in the location that SyncManager expected. I fixed it by (a) moving it to the SyncManager directory and by (b) changing the SyncManager to refer to it by class rather than by class name, which means it will now check for it at compile time, not run time. Bug: 3289922 Change-Id: I24f8bac371a16c62c2a38ed1024702c6d0913b93
/frameworks/base/core/res/AndroidManifest.xml
|
7458091ffc7c5b3ff9220351bb9e55da5d87f545 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
am ea294903: am eba947a3: Merge "Remove ACTION_TAG_DISCOVERED from protected broadcast list." into gingerbread * commit 'ea294903ca4c298c44b50b473b9b10ae2b77c9e3': Remove ACTION_TAG_DISCOVERED from protected broadcast list.
|
35042f1f58663fd00a08e4a8dd51c59bfeddda78 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
Remove ACTION_TAG_DISCOVERED from protected broadcast list. ACTION_TAG_DISCOVERED is a start activity intent, not a broadcast intent, so its presence in this list is redundant. Change-Id: I05419ec9c4471b7b11c9ae50a02e5ac3d9e572d2
/frameworks/base/core/res/AndroidManifest.xml
|
addfc766d535aa2cde76caa9b3049e311f656b5f |
|
02-Dec-2010 |
Freeman Ng <tenorslowworm@google.com> |
change SHUTDOWN permission to signatureOrSystem so setup wizard can start ACTION_REQUEST_SHUTDOWN bug: 3201638 Change-Id: I0d422667fa27df5df2fadbf27d4e3677a70db8f1
/frameworks/base/core/res/AndroidManifest.xml
|
fa04b8de117a017818761623a961426b03af2914 |
|
30-Nov-2010 |
Costin Manolache <costin@google.com> |
Revert "Merge "Fix permission."" It breaks apps that rely on the wrong permission. This reverts commit 974ab30569f9543c897047972260887cb33f8827, reversing changes made to 8b780ec773b2d1765f3ce932ee8f86c9048fdb85.
/frameworks/base/core/res/AndroidManifest.xml
|
e4e6efa46b8d324ddcf506649e349406aafd8052 |
|
23-Nov-2010 |
Costin Manolache <costin@google.com> |
Fix permission. Change-Id: Ifb545e8fb1a312f0fecb9aed35027c0cb98fab65
/frameworks/base/core/res/AndroidManifest.xml
|
434203a277cd2f237a71508a3d5a7d1602126cd5 |
|
12-Oct-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Notify all VMs when proxy changes. bug:2700664 Change-Id: I74cc6e0bd6e66847bf18f524ce851e3e9d2c4e87
/frameworks/base/core/res/AndroidManifest.xml
|
a4eb4c3a207c4d1b0e72bad332c3e6b928a77738 |
|
08-Nov-2010 |
Joe Onorato <joeo@google.com> |
Make all the activities in the framework use the holo theme. Change-Id: I18b669923fcd52e3bbb82b63e491d46cdb4bf4be
/frameworks/base/core/res/AndroidManifest.xml
|
03595d01188d88c169e8c9dd51b357fd545e69cc |
|
02-Nov-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Tell each VM to flush their DNS cache. bug:3095357 Change-Id: I93de24e3e5a7d8b94d55f4facfffc863a2b8c202
/frameworks/base/core/res/AndroidManifest.xml
|
482c9332972b928938e681d4553356896eb9b61c |
|
02-Nov-2010 |
Amith Yamasani <yamasani@google.com> |
Use Holo theme for Ringtone picker. Bug: 3148863
/frameworks/base/core/res/AndroidManifest.xml
|
3f425a6be47b706349f17679ed2b6877179df1cc |
|
29-Oct-2010 |
Mike Lockwood <lockwood@android.com> |
Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media BUG: 3113970 Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
4611bb1814afc7dcc3177cbb248bfb5ee1662ba0 |
|
29-Oct-2010 |
Nick Pelly <npelly@google.com> |
am ba1664b3: am 4bf4b491: Merge "Hide some NFC API\'s." into gingerbread * commit 'ba1664b34cc33ebb6b45fccedb35298ff8b1d998': Hide some NFC API's.
|
11b075e218b9921a953eeebe73fcd1a8a81f764b |
|
28-Oct-2010 |
Nick Pelly <npelly@google.com> |
Hide some NFC API's. We are leaving enough API so that you can see when any Tag is discovered, get its ID, and get its NDEF messages. But for advanced use - creating tag connections and writing messages - we have 2 problems. Firstly a lot of the code is untested (RawTagConnection.transceive()), or in some cases known not to work (NdefTagConnection.write()). Secondly, there is still debate about how to best expose information about Tags. The set of data/methods exposed for a Tag changes completely depending on the tag technology. There may be multiple sets of technology implemented in a single tag. Tag A may have technology X and Y, Tag B may have technology Y and Z. Furthermore, some NFC controllers will be not be able to use all technologies, and so Android Device 1 may see technology X and Y on Tag A but Android device 2 may only see technology X. So we have a pretty challenging set of constraints to work under, and we are not convinced the current Tag and NdefTag class is the best approach going forwards. The Tag application should be able to remain unbundled, since it just needs to get incoming NDEF Messages. Change-Id: Ic09f094f33794e10f8d730fffe011c9a5957e0ac Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
86417ea3f8041481a085823a1aa9f66d747231e8 |
|
27-Oct-2010 |
satok <satok@google.com> |
Remove InputMethodAndSubtypeEnabler and call intent of Settings.ACTION_INPUT_METHOD_AND_SUBTYPE_ENABLER Change-Id: I467cfba9644ec266f6a98f7aec0886ad205fef4f
/frameworks/base/core/res/AndroidManifest.xml
|
54770496d393385408cfba3198f87e139712ed94 |
|
19-Oct-2010 |
Nick Pelly <npelly@google.com> |
am 6b09a90a: am e47150e9: Fix up NFC permissions. Merge commit '6b09a90a818137de52a0c7325339849ccf584b9e' * commit '6b09a90a818137de52a0c7325339849ccf584b9e': Fix up NFC permissions.
|
027610a76e67f39e3a435d68ec785a1cf09dcf9c |
|
18-Oct-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 964eb438 to master Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
|
e47150e933e6f610546f57183477f324566e521e |
|
18-Oct-2010 |
Nick Pelly <npelly@google.com> |
Fix up NFC permissions. The initial (vendor) implementation had 4 perms, replace with 1. Requires no permissions: - Viewing UID, type of discovered tags and cards. - Viewing the NDEF message contents of NDEF formatted tags and cards. Requires android.permission.NFC - Get/Set the local tag "MyTag" - Creating or using a RawTagConnection (transceive()) - Creating or using a NdefTagConnection (write()/read()) Change-Id: I1b585c7d91738bed6261277061a48cf7c939482a Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 |
|
16-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3094621 and #3094609 - wipe sd card 3094621: add "wipe sd card" option to factory data reset 3094609: collapse unmount/format into one command Also since we have decided that it is important to consider the Crespo storage as internal storage, DevicePolicyManager gets a new API to be able to wipe it. (No big deal, since all of the work for this is now done in the implementation of the new UI.) Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/res/AndroidManifest.xml
|
f36c6db108364dea89b1e3c27c0b15103e560d87 |
|
15-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com> Conflicts: Android.mk CleanSpec.mk core/java/android/app/ContextImpl.java
/frameworks/base/core/res/AndroidManifest.xml
|
bc931eaf154b8f196fd15983b1d0603e12dae890 |
|
14-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am a007ab29: am ffbc4b94: Merge "Fix SD card mounting issues #3074555 and #3072332" into gingerbread Merge commit 'a007ab294d83db987b05b49ab869566978a87494' * commit 'a007ab294d83db987b05b49ab869566978a87494': Fix SD card mounting issues #3074555 and #3072332
|
590b73bc5b8e5f7b59bff1d9264a52388a5162e6 |
|
12-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d39d515b9110d7405d0f03dbf612ba5c9b8ac566 |
|
12-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix SD card mounting issues #3074555 and #3072332 Change-Id: I79572bb4e92d2546abd97512a119ae74f0d72019 3074555: Kill "Shared storage safe to remove" notification 3072332: "blank shared storage" notification doesn't go anywhere
/frameworks/base/core/res/AndroidManifest.xml
|
3d59480dc201c893c6da5c3934b14a2d95a1bef9 |
|
10-Oct-2010 |
Hung-ying Tyan <tyanh@google.com> |
am ea445758: am 08faac3c: Unhide SIP API. Merge commit 'ea445758efba6b728d5e597402e9d9538f3ef451' * commit 'ea445758efba6b728d5e597402e9d9538f3ef451': Unhide SIP API.
|
08faac3c26e12863858e1534985dd950193f755f |
|
15-Sep-2010 |
Hung-ying Tyan <tyanh@google.com> |
Unhide SIP API. Change-Id: I09468e3149a242a3b1e085ad220eb74f84ac6c68
/frameworks/base/core/res/AndroidManifest.xml
|
47a44916e2fb33cf4751906386d5f5c903b28d8b |
|
06-Oct-2010 |
satok <satok@google.com> |
Add InputMethodEnabler for enabling input methods and subtypes - Copyed functionarity from LanguageSettings.java TODO: Save enabled InputMethodSubtypes Change-Id: I7b4fb1a79cb8b3229f88773d261430e23ba7aae2
/frameworks/base/core/res/AndroidManifest.xml
|
4715bd91f5949a1919156a5a5cb50f0cccda645e |
|
29-Sep-2010 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of f4c3b7e9 to master Change-Id: Idcdc521144f3072058b2bb6cb383e42c852e64f4
|
038cabe0247ee46df62f9363f1a303bc5b9c1028 |
|
24-Sep-2010 |
Nick Pelly <npelly@google.com> |
NFC integration Source: Trusted_NFC_Device_Host_AA03.01e02_google.zip code drop (23-Sep-2010) Conflicts: core/java/android/app/ApplicationContext.java core/java/android/provider/Settings.java core/jni/Android.mk core/jni/AndroidRuntime.cpp core/res/AndroidManifest.xml include/utils/Asset.h Change-Id: I62c92f4c79f5ee65126c97602f6bc1c15794e573 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a0b49cfc0c68bafb0bd7826f3b4096f30148824a |
|
25-Sep-2010 |
Patrick Scott <phanna@android.com> |
am 888bcdbe: am 3ae249dc: Merge "Add new Alarm provider class for setting an alarm." into gingerbread Merge commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0' * commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0': Add new Alarm provider class for setting an alarm.
|
a73c4b082c2ab38831fc57c6bfb425d32ffe2aa4 |
|
22-Sep-2010 |
Patrick Scott <phanna@android.com> |
Add new Alarm provider class for setting an alarm. The new class provides static variables for creating an intent to broadcast to applications implementing the alarm clock. A new permission has been added and applications are recommended to require this permission if accepting the set alarm broadcast. Change-Id: I7b1014acdc54371cbda19bcf9b5c395b647aa413
/frameworks/base/core/res/AndroidManifest.xml
|
4e0bfd70d090b5653dd00c5a671db0519086dcfe |
|
16-Sep-2010 |
Chris Palmer <palmer@google.com> |
am 1b60963c: am b8dbdc29: Clarify the danger of READ_LOGS and DUMP permissions. Merge commit '1b60963c42e159aacc52d688defcac206e5ecec0' * commit '1b60963c42e159aacc52d688defcac206e5ecec0': Clarify the danger of READ_LOGS and DUMP permissions.
|
b6f8989385bd69e3b6fc56f5a095917f8624ed7e |
|
16-Sep-2010 |
David Brown <dab@google.com> |
am 0237cf2e: am 8626d1a3: Merge "Mark MODIFY_PHONE_STATE permission as signatureOrSystem" into gingerbread Merge commit '0237cf2eace5d35410e95f586fd40c3068c94582' * commit '0237cf2eace5d35410e95f586fd40c3068c94582': Mark MODIFY_PHONE_STATE permission as signatureOrSystem
|
b8dbdc293a8495a873a9c36353d6a9408c698256 |
|
15-Sep-2010 |
Chris Palmer <palmer@google.com> |
Clarify the danger of READ_LOGS and DUMP permissions. The logs inevitably contain PII, so now we are making that clear in user strings and developer docs. Moving DUMP and READ_LOGS into the PERSONAL_INFO group. Note that this means we need string translations. Change-Id: I1b5bf9d2d827ab1a31dedbdb30d0906a87c26a32
/frameworks/base/core/res/AndroidManifest.xml
|
f4ece2086f3b7060edc4b93a12f04c9af648867a |
|
15-Sep-2010 |
David Brown <dab@google.com> |
Mark MODIFY_PHONE_STATE permission as signatureOrSystem This permission isn't needed right now, since there aren't actually any public APIs that require it. (There are a few calls in the ITelephony interface that do, but they're all hidden.) Since there's no good reason for 3rd party apps to declare it, let's mark it signatureOrSystem for now. We can bring it back -- and probably split it apart into multiple finer-grained permissions -- once we finally expose full telephony APIs to 3rd party apps (see bug 1043005). Bug: 2989096 Change-Id: Idf898d5e12d648a959f622cd815e75597195aa82
/frameworks/base/core/res/AndroidManifest.xml
|
e746f03c6c8b8d0897d322ab524d545ace200fcd |
|
14-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 53686433 to master Change-Id: I27004dc464f5771d3205ae5757c6eccc5b16854d
|
7e9f4eb2608148436cef36c9969bf8a599b39e72 |
|
11-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Track client requests through location manager. This fixes a problem where applications could ask the location manager to do very heavy-weight things (like... say... update location every minute), which would get accounted against the system instead of the application because ultimately it is the system making the heavy calls (wake locks, etc). To solve this, we introduce a new class WorkSource representing the source of some work. Wake locks and Wifi locks allow you to set the source to use (but only if you are system code and thus can get the permission to do so), which is what will be reported to the battery stats until the actual caller. For the initial implementation, the location manager keeps track of all clients requesting periodic updates, and tells its providers about them as a WorkSource param when setting their min update time. The network location provider uses this to set the source on the wake and wifi locks it acquires, when doing work because of the update period. This should also be used elsewhere, such as in the GPS provider, but this is a good start. Change-Id: I2b6ffafad9e90ecf15d7c502e2db675fd52ae3cf
/frameworks/base/core/res/AndroidManifest.xml
|
94bf9431e5464c7757890abfe0716997151f153f |
|
08-Sep-2010 |
Jake Hamby <jhamby@google.com> |
am e7578344: am 5872e9d7: Merge "Allow incoming SMS until internal storage is almost full." into gingerbread Merge commit 'e75783440a55fb0a5ef75066be94a11898f652f0' * commit 'e75783440a55fb0a5ef75066be94a11898f652f0': Allow incoming SMS until internal storage is almost full.
|
bb3716332321e22537a5015be13e2229fb9b90bc |
|
24-Aug-2010 |
Jake Hamby <jhamby@google.com> |
Allow incoming SMS until internal storage is almost full. Fix for bug 2382830: new incoming SMS should not be rejected when running low on internal phone storage. Testing revealed that the /data partition should have at least 256 KiB available in order to prevent random app crashes (including system apps) due to SQLite transaction failures. With 256 KiB free, the device should safely boot without storage full errors. This takes into account the 36-40 KiB that the YAFFS2 filesystem reports as available even after the partition has been completely filled. I've set the default full threshold to 1 MiB to provide a generous safety margin. For this bug, I changed the DeviceStorageMonitorService demon to send two new hidden notifications for device storage "full" and "not full", when the free space falls below the full threshold (default 1 MiB, but configurable as a system setting), in addition to the existing storage low/okay notifications sent when the storage crosses the threshold of 90% full (also configurable). The SMS code was changed to use these new notifications so that it can accept messages until the data partition has been filled to the maximum safe capacity rather than stopping when it hits 90% full. There should be no negative impact on battery life because the additional check in the storage polling service should be offset by an optimization to cache the free threshold values which were previously being computed every time through the loop. While testing this change, I discovered that SMSDispatcher was being instantiated twice, the first time in GSMPhone/CDMAPhone, and the second time in SimSmsInterfaceManager / RuimSmsInterfaceManager. Changed the code to pass the original SMSDispatcher to the Sim/RuimSmsInterfaceManager constructor. Change-Id: Ie0c6d05294778ab6ee42e0fa01313af96d824c77
/frameworks/base/core/res/AndroidManifest.xml
|
b8a8a578c2483d84ef96fd7050bbbcbc48d49a37 |
|
08-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
Fix Intent.ACTION_REBOOT Turns out this would be useful for automated testing. Change-Id: Idd5e35a8d4a354447b17a77fe0b606f78df844d0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
44434f002aadb4e234a963ba9317a3c79d431d97 |
|
03-Sep-2010 |
Daniel Sandler <dsandler@google.com> |
Don't get stung! Change-Id: I8211675e619bcc31c991296387513d07ad53ff10
/frameworks/base/core/res/AndroidManifest.xml
|
8f5edc93b622bbdc33db24d348480fd7d55afb41 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
am 840f0fec: am d3efa392: Clean up some permissions. Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729' * commit '840f0fecd87357cadf4b2a0ae96d30b457f89729': Clean up some permissions.
|
d3efa3924407da6d38aa5931ac29aa088d9eb986 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Clean up some permissions. Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear to be associated with anything or used by anyone, so they are just deleted. Also deprecate the activity API to go in the foreground. I didn't realize that was released in the SDK. It needs to go away. Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/core/res/AndroidManifest.xml
|
7b6d0d99b6904b511996267efae215fe9cb5e98f |
|
11-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
am 679ac09a: am a5ae50cd: Merge "More native work." into gingerbread Merge commit '679ac09a5c22175354f3a04b28456b323839530e' * commit '679ac09a5c22175354f3a04b28456b323839530e': More native work.
|
08d5b8fad8d46ccb64db2fdcb4d66972ec87bf48 |
|
04-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
More native work. Implement save/restore of state, and add native APIs for configuration information. Change-Id: I2a3ddc2ba605db58d7c8b2b31b9215fb323f90b5
/frameworks/base/core/res/AndroidManifest.xml
|
da39f0e87814c5acb8b6319a1877b93197fb910e |
|
28-Jul-2010 |
Mike Lockwood <lockwood@android.com> |
Send Intents when PTP compatible devices are connected/disconnected to USB Usb.ACTION_USB_CAMERA_ATTACHED and Usb.ACTION_USB_CAMERA_DETACHED are sent when cameras are connected and disconnected. The data field of the intent contains a Uri for the camera in the Mtp content provider. Change-Id: I814221b4f0507b309997c71edb5a041e8efc54f7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
dad497e598de663c742289fe10dfa65c0cb154e9 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
am 0d929d7f: am 059f009d: Make android.hardware.action.USB_STATE a protected broadcast. Merge commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757' * commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757': Make android.hardware.action.USB_STATE a protected broadcast.
|
059f009d970fb37ac4e408dcf8e1d2d2cdcf0a84 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Make android.hardware.action.USB_STATE a protected broadcast. Change-Id: I84160e9342025228c1f810077f5aa25f5cc83023 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
57c798ade1a30c5587269519dd9f55b87c3b3be7 |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I919fcd5aa8d640d051cec87053f474a9843ed545 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2423607a32d63a0c646b17758ebeb4dc1d0b791f |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I11495d039429dbe22bd738067296e39ae415befa Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9163d42a50076c2a77694ff394363264d862c7bf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Add new permission to allow access to USB devices Adds permission android.permission.ACCESS_USB. This is a partial cherry pick of a change from master. It adds the permission, but not the support for associating it the AID_USB group. Change-Id: If5816721a4fc88bf444141a7b717da65ea37d5f4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
14f2ef4c9da27a3d58d65dc9f684c5f764ee279a |
|
15-Jun-2010 |
Robert Greenwalt <robdroid@android.com> |
Move the net transition wakelock to ConnService. When the default network goes down we lose the wake-on-incoming-data capability until the new net is brought up and apps rebuild their connections. We fixed this in Wifi, but it's a general connectivity issue, not a wifi issue so moving the mechanism to connecitivty so other networks can use it. bug:2734419 Change-Id: I39b5d825eb6b548bd9bb8f179b89254f4db53147
/frameworks/base/core/res/AndroidManifest.xml
|
8a5f10b30dae663eb01372490df3497e8a2ad56a |
|
10-Jun-2010 |
Joe Onorato <joeo@android.com> |
resolved conflicts for merge of f7b79151 to master Change-Id: Ia4538f73d8bade9e6565835d484dcb650830feca
|
1d46191d88ee9262ea05b868d2db5b44ad85fa43 |
|
09-Jun-2010 |
Joe Onorato <joeo@android.com> |
am b5f9b4f1: am 302759c1: Merge changes I4a11f027,Ib2c4abf6,Id0c7ef9f,I839d7771 into kraken
|
8bc6c5141974dbc36a6fe416853f558921be9f24 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Require the STATUS_BAR_SERVICE permission for something to be the status bar. Change-Id: I57b2d296e0d0cef0d256ae6697fffc47188d14df
/frameworks/base/core/res/AndroidManifest.xml
|
fe4f3ae33c8da86585399b4167fd7987c8a16066 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Move the usb mass storage notification & activity into SystemUI.apk. Also fix the notification to show properly when the runtime is restarted. Change-Id: Id0c7ef9f9dc9c9df18428cbaa7db1703f085137e
/frameworks/base/core/res/AndroidManifest.xml
|
d0b15cecc63b03ca4e42549ed3a54ae2c7e31866 |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f3307ae8 to master Change-Id: Ic59db363391f73343eba32894113914ceea5a963
|
860755faa6bdd3c2aeae49c05b87b5bc080ae60c |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Add support for heavy-weight applications. Only one can be running at a time, their process can not be killed, and a notification is posted while it is running. Change-Id: I843015723947e0c934ae63a1aeee139327c0bc01
/frameworks/base/core/res/AndroidManifest.xml
|
2b6b8351961d627be87396bbeb3e0ab811747bf3 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
am 0c6028c1: am c1959658: am fa2e3dcd: am 8ea9f130: Merge "Bug 2680071: Rename the Cloud to Device" into froyo
|
8d83f9e31bfff0281b522c53e035dffc7dd00ba9 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2680071: Rename the Cloud to Device Change-Id: I12ab32de393e44a499e3f9e3a0b38f4682156ff5
/frameworks/base/core/res/AndroidManifest.xml
|
3a17fbb757576ab52ff1ec5fcd54101f33977099 |
|
12-May-2010 |
Costin Manolache <costin@google.com> |
am b20842c7: am 8579a4d7: am 625de488: am e2055fe4: Merge "Bug 2673557: rename datamessaging" into froyo
|
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
Add new permission android.permission.ACCESS_USB to allow access to USB devices Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
161c75a0f3ca5255001f7d737a02a4f9d728f1f4 |
|
11-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2673557: rename datamessaging Change-Id: I583ac61c7b8fce69d60801dc76aeca9f13d250b2
/frameworks/base/core/res/AndroidManifest.xml
|
ec7c78fbf526816cd361fd482bdf3792ecfd9a9f |
|
31-Mar-2010 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_CACHE_FILESYSTEM and MOVE_PACKAGE Bug: b/2553489 Change-Id: I681b3f9a243777b931298cc93c9d34c8d7eae0f2
/frameworks/base/core/res/AndroidManifest.xml
|
9c9c532d3625ba2485eb4ea6924ed0a0163fd958 |
|
31-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2560791: Expose API to go in to car mode. Also fix bug where night mode was being used in desk dock. Change-Id: I56c1cf3d6fe800a4f986d40cc4cb2e70b76ac261
/frameworks/base/core/res/AndroidManifest.xml
|
98bfa39596448504f58f6dfe1b8bd2d31f25367b |
|
24-Mar-2010 |
Bjorn Bringert <bringert@android.com> |
Use a secure setting for default browser geolocation permissions Partly reverts I6308b476ad18b1d71d7438b936c592a45365c9f0 Bug: http://b/issue?id=2535598 Change-Id: Ib488c6d4f10a87b714ecb78eef6fe58f572907c6
/frameworks/base/core/res/AndroidManifest.xml
|
cbf953ed09b036441d90e14b0723a2ea417b3f35 |
|
22-Mar-2010 |
San Mehat <san@google.com> |
Permissions: Change ASEC permissions from 'dangerous' -> 'signature' Change-Id: I5e495332c45f718178486f2e07d37031e6fa5afc Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2ee89ea2887252053c31541c54126a8b084c9bca |
|
11-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Applications should -not- be able to set preferred activities. I can't believe I let this slip through. And in the SDK no less. :( The APIs for setting preferred activities will now throw a security exception when used. This may break some apps, we'll see how it goes. If it is too bad we can just make these log and not throw anything, but I would much prefer they throw an exception. Change-Id: I3aed434750eef8b202aa9d5bd774a0121be521c6
/frameworks/base/core/res/AndroidManifest.xml
|
7299c41630935a2b106e73e5603579a7747f7535 |
|
05-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Refactor car mode. Extract all UI behavior from dock observer and ACTION_DOCK_EVENT. Also introduce a desk type to go along with the car type all through the resource system, since we now need to have corresponding high-level broadcasts for desk dock mode. As part of that I also reworked some of the logic for switching modes to all funnel through a single update() call that looks all of the current state to decide what to do next, and fixed various locking issues. In addition I found there were bugs in the configuration change handling causing us to only switch into the car mode config and then never get out of it. Unfortunately now that we are actually changing the configuration for each mode change, the transitions between them are really crummy as we restart all kinds of activities. :(
/frameworks/base/core/res/AndroidManifest.xml
|
e7085e909d0c7f58a160b2730ff06aca085dfd6b |
|
04-Mar-2010 |
Robert Greenwalt <robdroid@android.com> |
Update framework tethering UI Getting rid of notification dialog - maybe the entire TetherActivity. Also getting rid of toasts - to ephemeral.
/frameworks/base/core/res/AndroidManifest.xml
|
8946dd3355fc1dcbad872c0546e356474d4cc5de |
|
19-Feb-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
Move package from internal to external and vice versa.
/frameworks/base/core/res/AndroidManifest.xml
|
154f7a1cc2d4f0468a7cc8dfa36e837c84cd9f7e |
|
17-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Show car mode notification in status bar. The notification is an ongoing event and can be used to get out of car mode.
/frameworks/base/core/res/AndroidManifest.xml
|
63cfebf2dbe628508cccc10f47754fdacd48c1a0 |
|
05-Feb-2010 |
Costin Manolache <costin@google.com> |
Switch from REMOTE_INTENT to the new push messaging, add the required permission.
/frameworks/base/core/res/AndroidManifest.xml
|
a87240c2270e83c3e865ffa1e56f79bfa74daffc |
|
12-Feb-2010 |
Christopher Tate <ctate@google.com> |
Remove BACKUP_DATA permission and associated checks Any package can now participate in backup/restore, without requiring any manifest-declared permission. *Control* of the backup manager is still guarded by the BACKUP permission, which is signatureOrSystem. Change-Id: I116fcfcd4cd255e3c976330da1c4dea7d4faae9d
/frameworks/base/core/res/AndroidManifest.xml
|
27b28b3f62bd3b54fa13acd5d035940b9be464f3 |
|
09-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Introduce special UI modes for night and car usage. The device mode is now called ui mode. Furthermore is the order of precedence for the resources now in such a way that the ui mode needs to be specified after the orientation and before the density. The ui mode can be set, like it is done for the locale, as follows: IActivityManager am = ActivityManagerNative.getDefault(); Configuration config = am.getConfiguration(); config.uiMode = Configuration.UI_MODE_TYPE_CAR | Configuration.UI_MODE_NIGHT_ANY; am.updateConfiguration(config); To allow users to disable the car mode and set the night mode the IUiModeManager interface is used. The automatic night mode switching will be added in a separate change.
/frameworks/base/core/res/AndroidManifest.xml
|
18e939623556928f73fcc7511c85a537929a4a7e |
|
11-Feb-2010 |
Dan Egnor <egnor@google.com> |
Eliminate dependencies on Checkin, replacing checkin events with EventLog events (and in one case, a DropBox entry). Add a simple intent that triggers master-clear (and toggle EFS), given the right permissions. Bug: 2264596 Bug: 2350452 Bug: 2264596
/frameworks/base/core/res/AndroidManifest.xml
|
91f2a20a5957095a6cba9f97326ea0f1eab17195 |
|
09-Feb-2010 |
Bjorn Bringert <bringert@android.com> |
Add content provider for browser geolocation permissions This replaces the old Google-specific geolocation setting. Fixes http://b/issue?id=2428694 Part of http://b/issue?id=2383870 Change-Id: I6308b476ad18b1d71d7438b936c592a45365c9f0
/frameworks/base/core/res/AndroidManifest.xml
|
4154c07c5cabc74029a2df379075391d782a682c |
|
10-Feb-2010 |
San Mehat <san@google.com> |
StorageNotification: Move notification / usb storage activity into StatusBarPolicy Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
97e44947282b3918ee0bed2d16b33b983f882580 |
|
05-Feb-2010 |
Dan Egnor <egnor@google.com> |
Add an AlarmManager API to set the system time (with the proper permissions).
/frameworks/base/core/res/AndroidManifest.xml
|
d0e18ffb82b59d38aeaf0e552f48e734202719ab |
|
26-Jan-2010 |
Robert Greenwalt <robdroid@android.com> |
First pass at USB Tethering. bug:2281900
/frameworks/base/core/res/AndroidManifest.xml
|
b94f795c257e32a1d7be1115568b5b6f576dec37 |
|
28-Jan-2010 |
Daniel Sandler <dsandler@google.com> |
New full-screen activity for USB mass storage interaction. Still TODO: patch into forthcoming callbacks from MountService so the USB storage activity always shows the correct state of the device. (Right now it only refreshes its display onResume.) Bug: 2299129
/frameworks/base/core/res/AndroidManifest.xml
|
c028be4f3b8c7476b46859f66c3f33d528adf181 |
|
25-Jan-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
AppsOnSd feature - Add default container Add new remote interface to do temporary copies. The new remote stub handling is done on mHandler thread and doesn't need locking for now. Add new InstallArgs class and subclasses to isolate cases for installation. Move resource deletion for failed installs/upgrades to later on in installation cycle. Fix code path for forward locked apps when using scanPackageLI TODO's Fix installation paths to completely use InstallArgs based design later on. Get rid of using flags in various install/uninstall code paths. Ideally InstallArgs should be created using these flags and used in the rest of the code. Function renames. Revisit mount api's.
/frameworks/base/core/res/AndroidManifest.xml
|
02735bc9b7686e56957cdec9c10660c4a6dd1090 |
|
27-Jan-2010 |
San Mehat <san@google.com> |
MountService: Introduce new @hide permissions to protect secure containers. Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d68478467e3f837511196c80891d7245d0e163df |
|
13-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
First pass at new device policy and administration APIs. This adds new DevicAdmin, DevicePolicyManager, and DeviceAdminInfo classes. See the java docs for each on documentation on them. Basically: a DeviceAdmin is what you derive from to administer a device; DevicePolicyManager is what you use to apply and check your policy requirements and perform other administration tasks.
/frameworks/base/core/res/AndroidManifest.xml
|
6e99b7a3b29fbb1936463a3a48fe693dae909c8f |
|
07-Jan-2010 |
Doug Zongker <dougz@android.com> |
add ACCESS_CACHE_FILESYSTEM permission to core manifest All of the permissions in data/etc/platform.xml are defined in core/res/AndroidManifest.xml, except for ACCESS_CACHE_FILESYSTEM. Add it. Change-Id: If7906bc0007484cc21196fb1c0593b967fd79920
/frameworks/base/core/res/AndroidManifest.xml
|
03abb8179f0d912e6dabfc0e2b0f129d85066d17 |
|
05-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
Kill the task killers. The ActivityManager.restartPackage() API is now deprecated, and no longer allows applications to mess up the state of other applications. This was being abused by task killers, causing users to think their other applications had bugs. A new API is introduced for task killers, ActivityManager.killBackgroundProcesses(), which allows these applications to kill processes but only the same amount that the out of memory killer does, thus causing no permanent damage. The old restartPackage() API is now a wrapper for calling this new API. There is also a new private forceStopPackage() API that is used for the system's force stop UI which does what the old restartPackage() API did.
/frameworks/base/core/res/AndroidManifest.xml
|
9256bb08d22b0dad73bdc3f14929dc519dc02414 |
|
19-Dec-2009 |
Scott Main <smain@google.com> |
am 9a6c8168: am 77fa05a4: Merge change Iab5952e1 into eclair Merge commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd' * commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd': docs: add "required" attribute to the <uses-feature> docs
|
0b91635caf91b76d304e80997c82fe582b636428 |
|
18-Dec-2009 |
Scott Main <smain@google.com> |
docs: add "required" attribute to the <uses-feature> docs and add a note to the CAMERA permission stating that it enables the <uses-feature> for camera. This is an incrimental update for the 2.0.1 docs. More changes to come for the 2.1 docs to include more features
/frameworks/base/core/res/AndroidManifest.xml
|
9ed7dc10d263a505da32522139098f085fee811a |
|
02-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
am 5886050f: Merge change I0d8f7593 into eclair Merge commit '5886050fad97923c33cbc831fe07a5b1746b2b58' into eclair-mr2 * commit '5886050fad97923c33cbc831fe07a5b1746b2b58': Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op
|
a7ca0e5e320bbb643f8bc9feb4717dbc5e78e0b9 |
|
01-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op Change-Id: I0d8f75938226e1bb49cf7b1154445631b0bb0bc9
/frameworks/base/core/res/AndroidManifest.xml
|
50a21f4d3b70360b36acad20e234c380654fd59f |
|
19-Nov-2009 |
Doug Zongker <dougz@android.com> |
add reboot() method to PowerManager In order to unbundle System Update, we need some to expose in the SDK some way to reboot the device into recovery. Add a reboot() method to PowerManager, protected by the android.permission.REBOOT permission.
/frameworks/base/core/res/AndroidManifest.xml
|
ac63ebc82433347e6c8e74e26fa670717acffac7 |
|
13-Nov-2009 |
Dan Egnor <egnor@google.com> |
Make WRITE_GSERVICES into system-or-signature (instead of just signature), as a temporary measure so unbundled Google components (GSF, etc.) can hold it. (In the longer term, WRITE_GSERVICES won't be a system permission at all, but it or something like it will be defined directly by GSF.)
/frameworks/base/core/res/AndroidManifest.xml
|
362d5b9b6429a2766f5b980d2010262135788ad8 |
|
12-Nov-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2256032: Change CONFIGURATION_CHANGED and add a locale changed broadcast You can no longer receive CONFIGURATION_CHANGED in a manifest, which is really really bad (launching apps every time the screen is rotated!). A new LOCALE_CHANGED broadcast is sent that you can receive in a manifest. Change-Id: I80022375f0716db2e672382a29db3cea1af74702
/frameworks/base/core/res/AndroidManifest.xml
|
f7ae77cd67f1a3993b8e56c1af4720a7adf4e69d |
|
03-Oct-2009 |
Fred Quintana <fredq@google.com> |
account manager api review changes
/frameworks/base/core/res/AndroidManifest.xml
|
29e4a3c566f435c32f0b95e4ac8e8b33cac6faba |
|
01-Oct-2009 |
Dianne Hackborn <hackbod@google.com> |
Update from API review. Change-Id: I16b1c566f91167aac9615ac59dd297a154c828ea
/frameworks/base/core/res/AndroidManifest.xml
|
96cb8d0b94b5737d0a06088bff3bf409ced3cd3d |
|
30-Sep-2009 |
Debajit Ghosh <debajit@google.com> |
fix account permission strings. this permission is used to protect more than just Google accounts.
/frameworks/base/core/res/AndroidManifest.xml
|
aef405d82931a08a7683cf0f58b5e74dbe268d45 |
|
28-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Allow wallpaper picker to work. Change-Id: I379f25e0e8e372d72c0a89e71ccd584a5dbb3648
/frameworks/base/core/res/AndroidManifest.xml
|
4cc86e1ae80eb1938500fe5fa06bbdf8b4b7b50d |
|
22-Sep-2009 |
Christopher Tate <ctate@android.com> |
Clear the device's data from the transport when backup is disabled Turning off backup in the Settings UI constitutes an opt-out of the whole mechanism. For privacy reasons we instruct the backend to wipe all of the data belonging to this device when the user does this. If the attempt fails it is rescheduled in the future based on the transport's requestBackupTime() suggestion. If network connectivity changes prompt the transport to indicate a backup pass is appropriate "now," any pending init operation is processed before the backup schedule is resumed. The broadcasts used internally to the backup manager are now fully protected; third party apps can neither send nor receive them. (Also a minor logging change; don't log 'appropriate' EOF encountered during parsing of a backup data stream.)
/frameworks/base/core/res/AndroidManifest.xml
|
ffa424800d0338b8b894aef2ea1e3e3344cbda7a |
|
24-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2133206: dialogs/menus should auto-dismiss when screen turns off Lot of infrastructure for more things to go away when "clear system dialogs" happens, and now do this when we turn on the lock screen. Change-Id: I567130296fe47ce82df065ed58ef21b37416ceaf
/frameworks/base/core/res/AndroidManifest.xml
|
72440a0e2c8f73240e0dcee36e58b1840ffbb5fd |
|
16-Sep-2009 |
Nick Pelly <npelly@google.com> |
Allow only System Service to send most Bluetooth intents. Change-Id: I9f63425995f12741b60b85cdffe5a94e97ca03f1
/frameworks/base/core/res/AndroidManifest.xml
|
5e1ab335e6e8fbfa19c64d53880a22f472010953 |
|
02-Sep-2009 |
Christopher Tate <ctate@android.com> |
Expand apps' control over the settings restore process Applications can now specify two more aspects of the restore process: whether they need to run with their own custom Application subclass rather than being launched in the usual restricted mode during restore, and whether it's okay for the backup manager to kill the app process once restore has completed. The new manifest attributes for these are, respectively, android:restoreNeedsApplication and android:killAfterRestore. If unspecified in the manifest, restoreNeedsApplication is false, and killAfterRestore is true. In order to support kill-after-restore cleanly, this change also adds a new system-process-only interface to the Activity Manager, which will schedule a "commit suicide" event on the target app's main thread looper. The framework backup agents have been given the appropriate new backup attributes as well.
/frameworks/base/core/res/AndroidManifest.xml
|
284ac93aa30642fda87d5c40263a1263677c21cd |
|
28-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
More work on wallpapers: animations, lifecycle, scaling, etc. Yet more work on improving the behavior of wallpapers. This fixes a few problems in their lifecycle (corresponding change in the picker also required for this), makes their animations better for hardware that supports alpha fades, adds animations for the wallpapers themselves, eliminates fixed size wallpapers, and adjusts the API for retrieving a wallpaper bitmap to take care of scaling the raw wallpaper image to match the current desired width and height. Change-Id: If1c0aaceba4ea4e175dcb7a8416ca7ddbb9bfa6f
/frameworks/base/core/res/AndroidManifest.xml
|
22d1f9fb23015471de6af1a70e40fb5c82ecb665 |
|
19-Aug-2009 |
Danke Xie <dankex@qualcomm.com> |
gps: Network initiated SUPL Initial contribution from Qualcomm. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
767be5f0b929cc1eeb8a7d5aa7a02e228053e9bb |
|
26-Aug-2009 |
Jim Miller <jaggies@google.com> |
Integrate CDMA provisioning into SetupWizard
/frameworks/base/core/res/AndroidManifest.xml
|
edc5ff862877d679578cbe9ecbbc806782620968 |
|
18-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
am c678a93a: Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode Merge commit 'c678a93a73c83e841032874bee9c202936da73c0' into eclair * commit 'c678a93a73c83e841032874bee9c202936da73c0': Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
|
c678a93a73c83e841032874bee9c202936da73c0 |
|
17-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
/frameworks/base/core/res/AndroidManifest.xml
|
f21adf6fc19bc9c6908c6f1aaae203389f104bfa |
|
13-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Always have a wallpaper service running.
/frameworks/base/core/res/AndroidManifest.xml
|
0749dcd19301fe4093f9cf8677c722d17bceabfb |
|
14-Aug-2009 |
Christopher Tate <ctate@android.com> |
Backup participants must now hold the BACKUP_DATA permission Packages that do not use android.permission.BACKUP_DATA will neither be backed up nor restored. That permission is currently signature-only. In the future if access to the backup/restore infrastructure is made available to arbitrary 3rd party applications, the permission checks (and indeed, the permission itself) can simply be removed.
/frameworks/base/core/res/AndroidManifest.xml
|
4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 |
|
09-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Very primitive wallpapers in a surface. This is all of the basic pieces: - The WallpaperService now creates a surface with the window manager for its contents. - There is a simple service that displays a bitmap. - The wallpaper manager takes care of starting and stopping the service. - The window manager knows about wallpaper windows and how to layer them with the windows that want to be shown on top of wallpaper. Lots and lots of issues remain, but at this point you can actually write a wallpaper service, select it in the UI, and see it behind an activity.
/frameworks/base/core/res/AndroidManifest.xml
|
49f746823eafabbf251f27a059ddd8c94ada04f1 |
|
31-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Remove android:multiprocess from ShutdownActivity to ensure it runs in the system process. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
bad80e0dccdeaeea97991f7d092678ff0df1bc84 |
|
30-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Add Activity Intent.ACTION_REQUEST_SHUTDOWN for requesting a system shutdown. The Intent.EXTRA_KEY_CONFIRM extra can be set to require user confirmation before shutting down. The ACTION_REQUEST_SHUTDOWN Intent is protected by android.permission.SHUTDOWN. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9bb8fd77c8dc177aab9ac96bed4f55972dcda70a |
|
29-Jul-2009 |
Joe Onorato <joeo@android.com> |
Only restore the bits for wallpapers that aren't built in.
/frameworks/base/core/res/AndroidManifest.xml
|
02f5228c3c224dc8804cbedd40899fa0c42bfd4a |
|
29-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f0d83fd9 to master
|
7f2054392e9957d3ba8579ef08c29cfb27df564e |
|
28-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Updates from API review. * AccessibilityService -- document onBind() to not be implemented. * GestureLibrary.getLearner() -- needs to be hidden. * IntentSender -- remove protected constructors, document that it is retrieved from a PendingIntent. * Hide permissions: SHUTDOWN, STOP_APP_SWITCHES. * Context -- hide BACKUP_SERVICE. * ContextWrapper -- hide getSharedPrefs bla h blah * Intent.parseUri() -- fix docs. * ApplicationInfo.FLAG_TEST_ONLY?!? * Hide MockContext.getSharedPrefs blah blah
/frameworks/base/core/res/AndroidManifest.xml
|
143a2ce1ea33aeba81cff26f66144065d379dc64 |
|
27-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am ba989ad0: Merge change 8648 into donut Merge commit 'ba989ad0ed91beda010d44945fa015d75d99cf67' * commit 'ba989ad0ed91beda010d44945fa015d75d99cf67': Use the old string for bookmarks permissions.
|
e7d1c8f3777375468de2e5932a691ef388ee2e75 |
|
27-Jul-2009 |
Leon Scroggins <scroggo@google.com> |
Use the old string for bookmarks permissions. When we made the bookmark permissions public, we also changed their names, which might break existing apps. Change them back. Depends on a change in packages/apps/Browser
/frameworks/base/core/res/AndroidManifest.xml
|
d4a1d2e14297a3387fdb5761090961e714370492 |
|
17-Jul-2009 |
Fred Quintana <fredq@google.com> |
add account manager permission checking
/frameworks/base/core/res/AndroidManifest.xml
|
602bee5bf2a4f688b050077291288b473a7cc6db |
|
13-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am cf29e116: Merge change 6867 into donut Merge commit 'cf29e116129f38309c18ba14b9893b079a712289' * commit 'cf29e116129f38309c18ba14b9893b079a712289': CLOSE_SYSTEM_DIALOGS can't be protected.
|
4554f30c834723db6946400bf1827be4419a3134 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
CLOSE_SYSTEM_DIALOGS can't be protected.
/frameworks/base/core/res/AndroidManifest.xml
|
54a26bc85f4fe972e929e42b986c65a710a229b3 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 889c2d37 to master
|
854060af30f928c0a65591e9c8314ae17056e6b8 |
|
10-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix bug #1873249i: Apps can DoS/brick device This is the problem where various things are listening for broadcasts (such as battery status, PIN/PUK/Network) that an application can send to cause harm to the system. Solving this is tricky because many of these broadcasts are sticky, and I have never figured out how to do permissions with sticky broadcasts in a sane way. So instead, I am going to punt on the general problem and just brute force it: There is new a way for system components to declare specific broadcast actions to be protected, which means that only the system and the phone can send them. This is good enough for now. None of it is exposed in the public API so we can make something a little less stupid in the future if we ever need to.
/frameworks/base/core/res/AndroidManifest.xml
|
e3f054411b9f025848f68389c4e2c325e76b3826 |
|
09-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 2af632f8 to master
|
2af632f87d487deaa5b2eb71341cfc4f0c0d1173 |
|
08-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Add new <path-permission tag for use by global search. This adds a new <path-permission> tag you can use inside of a <provide> to define additional path-based permissions that broaden the global read and write permissions. The initial use for this will be global search, so that a content provider that is protected by permissions can make a part of itself available to global search under another permission. This addresses the issue with global search not being able to request permissions it would need of providers it doesn't know about at build time.
/frameworks/base/core/res/AndroidManifest.xml
|
5ad2f1c05ed69176849f535e4a8ab02e50e8e048 |
|
30-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am dbcd9c34: Merge change 5654 into donut Merge commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4' * commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4': The BACKUP permission should have the signatureOrSystem protectionLevel,
|
8aeaf2e079a1776c5b17f95bf7ad401966f2beef |
|
29-Jun-2009 |
Joe Onorato <joeo@android.com> |
The BACKUP permission should have the signatureOrSystem protectionLevel, because the setup wizard isn't signed by the same cert as the framework.
/frameworks/base/core/res/AndroidManifest.xml
|
cc79800a741e4ee55ecfa7ec236b0087d83e41e4 |
|
25-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5416d7c9: Merge change 5317 into donut Merge commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2' * commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2': Start backing up wallpaper
|
111bd4acdb378266221b430a284f88a3990a3958 |
|
25-Jun-2009 |
Christopher Tate <ctate@google.com> |
Start backing up wallpaper This CL does the following: + adds an AbsoluteFileBackupHelper class for managing backup of files known by absolute path, not based off of the app's getFilesDir() root + bumps up the collection interval from its testing-only default of 1 second to 3 minutes + adds a SystemBackupAgent class to the main system package and names it as the android:backupAgent for the main OS package. Right now this agent only backs up & restores the wallpaper file. + amend the Wallpaper Service to inform the Backup Manager when the wallpaper changes. On the subject of the 3-minute collection interval before the backup actually occurs: this can be short-circuited from an adb shell. Running the command 'bmgr run' will cause the Backup Manager to kick off any pending backup operations immediately.
/frameworks/base/core/res/AndroidManifest.xml
|
d6377fbe7eb570b880ce5f1fcc71a556a24961ba |
|
22-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
resolved conflicts for merge of 9336f5d9 to master
|
9ce4c6c5cfc111a73e0cfc3c94daa50346c56867 |
|
19-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
Make browser bookmarks permissions part of the public API.
/frameworks/base/core/res/AndroidManifest.xml
|
3c3d3081aad5d3a0cadd18c7764974060c1a5274 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 727f36c6: Merge change 4265 into donut Merge commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef' * commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef': process: Fix bug where if a thread exited while we were changing its control Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally
|
29930a1cb884885f92c72a76e42e795ac948edc3 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 3dcea047: Merge change 4237 into donut Merge commit '3dcea047c5c7a61a56f618815e298d7bd38e2678' * commit '3dcea047c5c7a61a56f618815e298d7bd38e2678': Remove obsolete FOTA_UPDATE permission (which should never have been
|
48f72206dc4215ea2eb3898043eb713b5b72e135 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am aa67df9f: Merge change 4248 into donut Merge commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3' * commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3': Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions.
|
cb05cc4acba4724d06120d2c606d955751bd0d11 |
|
16-Jun-2009 |
Dan Egnor <egnor@google.com> |
Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally reintroduced in an errant and clumsy git merge operation. Also remove permission label and description strings for now-deleted permissions FOTA_UPDATE and (within the SettingsProvider package) WRITE_GSERVICES.
/frameworks/base/core/res/AndroidManifest.xml
|
2d4b6ad9d4c7e3e2dbb6a127f37271686253d71f |
|
15-Jun-2009 |
Dan Egnor <egnor@google.com> |
Remove obsolete FOTA_UPDATE permission (which should never have been made public, and wouldn't be used by any third party applications, and no longer does anything regardless). Also remove the WRITE_GSERVICES permission from the SettingsProvider package's manifest (the declaration there was redundant with the one in the core manifest, where all the other settings-related permissions live -- no other core package includes its own permission definitions).
/frameworks/base/core/res/AndroidManifest.xml
|
29148f90cd9fb34ff64f76936347547885906eb9 |
|
16-Jun-2009 |
Dianne Hackborn <hackbod@google.com> |
Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions. These are no longer used.
/frameworks/base/core/res/AndroidManifest.xml
|
7c49790cde0acb494b6e8980662842c95dd8859a |
|
01-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 162c9d0e: Merge change 2805 into donut Merge commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47' * commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47': base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE
|
5a3a77dabd744d5be79d7745c2a977c108a9ad98 |
|
01-Jun-2009 |
San Mehat <san@google.com> |
base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ad6042aa2342d0a869f84772774b47ae87346ccf |
|
01-Jun-2009 |
Christopher Tate <ctate@google.com> |
am 181fafaf: Retool the backup process to use a new \'BackupAgent\' class Merge commit '181fafaf48208978b8ba2022683ffa78aaeddde1' * commit '181fafaf48208978b8ba2022683ffa78aaeddde1': Retool the backup process to use a new 'BackupAgent' class
|
181fafaf48208978b8ba2022683ffa78aaeddde1 |
|
14-May-2009 |
Christopher Tate <ctate@google.com> |
Retool the backup process to use a new 'BackupAgent' class Backups will be handled by launching the application in a special mode under which no activities or services will be started, only the BackupAgent subclass named in the app's android:backupAgent manifest property. This takes the place of the BackupService class used earlier during development. In the cases of *full* backup or restore, an application that does not supply its own BackupAgent will be launched in a restricted manner; in particular, it will be using the default Application class rather than any manifest-declared one. This ensures that the app is not running any code that may try to manipulate its data while the backup system reads/writes its data set.
/frameworks/base/core/res/AndroidManifest.xml
|
96cdc61c69aa735e65295a50e3e2922425b3c877 |
|
28-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 1e2e44e9: Merge change 2365 into donut Merge commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc' * commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc': Fix wifi multicast API for public use. Revert "Bug fixes and performance improvements"
|
fc1b15cfbfc5f69235ec1f367abd7a909381cd05 |
|
23-May-2009 |
Robert Greenwalt <robdroid@android.com> |
Fix wifi multicast API for public use. Applying API review comments and taking it public.
/frameworks/base/core/res/AndroidManifest.xml
|
9b1e1400df4c6c4b69985f164097f0c842dd796f |
|
21-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 8c690ea9: Merge change 2182 into donut Merge commit '8c690ea9976d644db3c96eddbbbd2d50eac56913' * commit '8c690ea9976d644db3c96eddbbbd2d50eac56913': location: Replace ILocationCollector interface with new ILocationProvider method
|
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 |
|
21-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Replace ILocationCollector interface with new ILocationProvider method This change replaces ILocationCollector with a more general mechanism that passes locations received from a provider to all other providers. The network location provider now uses this to implement the location collector. In the future, this could be used to inject network locations to the GPS as aiding data. This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0bcad89a58ad49a0a836902ad41584777ca1f3f3 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
am 95fc68f2: Fix issue where apps could prevent the user from going home. Merge commit '95fc68f24a2a93e5664e2234abcfe479d385cc05' * commit '95fc68f24a2a93e5664e2234abcfe479d385cc05': Fix issue where apps could prevent the user from going home.
|
95fc68f24a2a93e5664e2234abcfe479d385cc05 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue where apps could prevent the user from going home. Now we have a 5-second time after home is pressed, during which only the home app (and the status bar) can switch to another app. After that time, any start activity requests that occurred will be executed, to allow things like alarms to be displayed. Also if during that time the user launches another app, the pending starts will be executed without resuming their activities and the one they started placed at the top and executed.
/frameworks/base/core/res/AndroidManifest.xml
|
470c1a8f394597329b400874f0b3afb58e558a1a |
|
19-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
am af999280: Change BIND_APPWIDGET to be signatureOrSystem. Merge commit 'af9992802992aaccfe1fb5893448939f215dd607' * commit 'af9992802992aaccfe1fb5893448939f215dd607': Change BIND_APPWIDGET to be signatureOrSystem.
|
af9992802992aaccfe1fb5893448939f215dd607 |
|
18-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
Change BIND_APPWIDGET to be signatureOrSystem. See http://b/issue?id=1839074 for more details.
/frameworks/base/core/res/AndroidManifest.xml
|
62da8461ed5317fe78ae5e3793662694e7fc99a3 |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
97ecc9cbe7eccafc0923d7655daf07f4c2ea9791 |
|
12-May-2009 |
Wei Huang <weih@google.com> |
define Intent.ACTION_REMOTE_INTENT, which replaces the old GTalk data messaging intent "android.intent.action.GTALK_DATA_MESSAGE_RECEIVED". The remote intent concept shouldn't be limited to Google or GTalkService. It should be owned by the Android platform.
/frameworks/base/core/res/AndroidManifest.xml
|
3531fdb1d9a0ca536bd7a7a27d35b3e62c318ad9 |
|
08-May-2009 |
The Android Open Source Project <initial-contribution@android.com> |
merge 55280a9 Merge commit '55280a9'
|
55280a91884b9256e8db6af6a09f28b3feeaa9d8 |
|
08-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Improve shutdown process to send broadcast for applications. This introduces a new class in the base platform for performing a clean shutdown (which was copied from the classes in the policies). It includes new features to send a shutdown broadcast for applications to do cleanup, and ot have the activity manager pause the current activity before proceeding with the shutdown. These facilities are also use to write at the most recent stat files for sync, battery and user activity.
/frameworks/base/core/res/AndroidManifest.xml
|
7a1355950172b7a549820e9a2cd4a9b2099ec32f |
|
06-May-2009 |
Dianne Hackborn <hackbod@google.com> |
merged 231cc608d06ffc31c24bf8aa8c8275bdd2636581
|
231cc608d06ffc31c24bf8aa8c8275bdd2636581 |
|
28-Apr-2009 |
Dianne Hackborn <hackbod@google.com> |
Rewrite SyncStorageEngine to use flat files and in-memory data structures. The previous implementation used a database for storing all of its state, which could cause a significant amount of IO activity as its tables were updated through the stages of a sync. This new implementation replaces that in-memory data structures, with hand-written code for writing them to persistent storage. There are now 4 files associated with this class, holding various pieces of its state that should be consistent. These are everything from a main XML file of account information that must always be retained, to a binary file of per-day statistics that can be thrown away at any time. Writes of these files as scheduled at various times based on their importance of the frequency at which they change. Because the database no longer exists, there needs to be a new explicit interface for interacting with the sync manager database. This is provided by new APIs on IContentService, with a hidden method on ContentResolver to retrieve the IContentService so that various system entities can use it. Other changes in other projects are required to update to the new API. The goal here is to have as little an impact on the code and functionality outside of SyncStorageEngine, though due to the necessary change in API it is still somewhat extensive.
/frameworks/base/core/res/AndroidManifest.xml
|
e90c0da675a945a86ac06098c1f5694ddc4efb23 |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
am 275555c: location: Add support for location providers outside of the Merge commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e' * commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e': location: Add support for location providers outside of the system process.
|
275555c8eb3fb5df6e7320873b88b77cdde85a9e |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Add support for location providers outside of the system process. Also added new permissions android.permission.INSTALL_LOCATION_PROVIDER and android.permission.INSTALL_LOCATION_COLLECTOR to the public API. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
1e89ef82b1cb06034c30f9772f936a8a0cf4a7df |
|
29-Apr-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 947fe79: Merge change 483 into donut Merge commit '947fe79e99d5536a10c5b81946d20e69d0e9d479' * commit '947fe79e99d5536a10c5b81946d20e69d0e9d479': API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings
|
29b57e63e54321f99ff086bb25439098d83292f6 |
|
23-Apr-2009 |
San Mehat <san@google.com> |
API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3326920329cecb57c7ff1fc5c6add5c98aab9ed9 |
|
21-Apr-2009 |
Fred Quintana <fredq@google.com> |
adding concept of features to accounts
/frameworks/base/core/res/AndroidManifest.xml
|
935ae463d495d41155e27feb849768ad2b8b16db |
|
14-Apr-2009 |
Dianne Hackborn <> |
AI 145994: Integrate #145778 from Donut. Automated import of CL 145994
/frameworks/base/core/res/AndroidManifest.xml
|
f8a7ceaef2e7d5cd530c9426bde91b6fa9a40b75 |
|
11-Apr-2009 |
Andy Stadler <> |
AI 145778: Manual merge changes 145382-145384 from cupcake. Automated import of CL 145778
/frameworks/base/core/res/AndroidManifest.xml
|
15ba27802eb23e01f4fada11f3fa1f35925eab49 |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/master/...@142576,142576
/frameworks/base/core/res/AndroidManifest.xml
|
603073430bbcb1bd29db7afb9b14e2732ad589fb |
|
25-Mar-2009 |
Fred Quintana <> |
Automated import from //branches/master/...@142414,142414
/frameworks/base/core/res/AndroidManifest.xml
|
7d1e577d5f7ae96bfc533e1c73a3a6a272a4a16d |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/donutburger/...@142472,142472
/frameworks/base/core/res/AndroidManifest.xml
|
246924180995326ed368dadbc59772b41095d6e6 |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/master/...@140750,140750
/frameworks/base/core/res/AndroidManifest.xml
|
77323363091b42060bfd697ffb33ce6b3696ad6f |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/donutburger/...@140749,140749
/frameworks/base/core/res/AndroidManifest.xml
|
c39a6e0c51e182338deb8b63d07933b585134929 |
|
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
/frameworks/base/core/res/AndroidManifest.xml
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
076357b8567458d4b6dfdcf839ef751634cd2bfb |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@132589
/frameworks/base/core/res/AndroidManifest.xml
|
3dec7d563a2f3e1eb967ce2054a00b6620e3558c |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@137055
/frameworks/base/core/res/AndroidManifest.xml
|
3001a035439d8134a7d70d796376d1dfbff3cdcd |
|
19-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@132276
/frameworks/base/core/res/AndroidManifest.xml
|
d24b8183b93e781080b2c16c487e60d51c12da31 |
|
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
/frameworks/base/core/res/AndroidManifest.xml
|
22f7dfd23490a3de2f21ff96949ba47003aac8f8 |
|
20-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@127101
/frameworks/base/core/res/AndroidManifest.xml
|
b798689749c64baba81f02e10cf2157c747d6b46 |
|
10-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@125939
/frameworks/base/core/res/AndroidManifest.xml
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/frameworks/base/core/res/AndroidManifest.xml
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/frameworks/base/core/res/AndroidManifest.xml
|