05515ae925aa931bc19777e723e09a3748d8e5e3 |
|
01-Jun-2016 |
Felipe Leme <felipeal@google.com> |
Move DownloadsManager to permanent whitelist. DownloadProvider is now based completely on JobScheduler, and deep inside the platform we allow foreground downloads (FLAG_WILL_BE_FOREGROUND) to run even while the device is in doze, so it doesn't need to be temporarily whitelisted anymore. BUG: 29056149 Change-Id: I3658bb42aeeee5d5528f91ec990d6e1bc54257b6
/frameworks/base/data/etc/platform.xml
|
1d0fbedf45b57f7c70ae2c10597707b8a54c63d2 |
|
28-Apr-2016 |
Felipe Leme <felipeal@google.com> |
Whitelist Downloads Manager for Data Saver. BUG: 28431507 Change-Id: I0478ff48865951a7ebac94434f48ad0e272e0901
/frameworks/base/data/etc/platform.xml
|
e5313a842a5e41cde624386448d1e77cb0fbfae7 |
|
11-Apr-2016 |
Svet Ganov <svetoslavganov@google.com> |
Keep read/write external storage as built-in permissions These are permissions that were mapped to gids but we need to keep them listed event though they are no longer mapped to gis until an upgrade from L to the current version is to be supported. These permissions are built-in and in L were not stored in packages.xml as a result if they are not defined in the platform.xml while parsing packages.xml we would ignore these permissions being granted to apps and not propagate the granted state. From N we are storing the built-in permissions in packages.xml as the saved storage is negligible (one tag with the permission) compared to the fragility as one can remove a built-in permission which no longer needs to be mapped to gids and break grant propagation. bug:27185272 Change-Id: I65e05c4f7edd9a934888b4d0974100aa4e9a9453
/frameworks/base/data/etc/platform.xml
|
75cade0a5fd5ec432870de9977f81091ab389423 |
|
11-Jan-2016 |
Chien-Yu Chen <cychen@google.com> |
Add cameraserver process Add UID and permissions for cameraserver process. Bug: 24511454 Change-Id: Iccbda4b42e5584a1f56f9afe5e15a16f40dd2922
/frameworks/base/data/etc/platform.xml
|
701662547341269d610ac5f093e449a4c7078e43 |
|
24-Nov-2015 |
Pavlin Radoslavov <pavlin@google.com> |
Use GID "wakelock" to control access to kernel wakelock * Added GID "wakelock" (3010) to the list of groups the System Server belongs to. * Added GID "wakelock" to the list of assigned groups for the "android.permission.BLUETOOTH_STACK" Android permission. * Grant CAP_BLOCK_SUSPEND to processes that belong to GID "wakelock" Bug: 25864142 Change-Id: I8a9a5f11e4a9ecd1abf2d4f4b90ec89b3101332e
/frameworks/base/data/etc/platform.xml
|
ed0ea40a41aae8e65bc189efe6b631ca78259383 |
|
30-Oct-2015 |
Andy Hung <hunga@google.com> |
Add Android permissions for audioserver audioserver has the same permissions as mediaserver. TBD: Pare down permissions. Bug: 24511453 Change-Id: Id7abddd79a730ad95b554a94207df3aa4b676f2a
/frameworks/base/data/etc/platform.xml
|
8e4f4b3d9409c5a5329aaa4caf0102167d5e610d |
|
02-Dec-2015 |
Chong Zhang <chz@google.com> |
Add permission to prevent third-parth apps from querying OOM scores bug: 25853091 Change-Id: Ic1cdbf155e1e930405773fd078dfc57fda2d9afa
/frameworks/base/data/etc/platform.xml
|
9c990c15ee74ef7aaa742701156df3055d68859a |
|
23-Nov-2015 |
Xiaohui Chen <xiaohuic@google.com> |
Add com.android.settings to white list Bug: 24256521 Change-Id: If315b082960190b3ebea387484f5a00e707ef558
/frameworks/base/data/etc/platform.xml
|
7db5af124e551554f7a2f1abdd2a486c937910fe |
|
01-Aug-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Limit the number of apps running as system user For the system user, enable apps based on the following conditions: - app has no launcher icons or has INTERACT_ACROSS_USER_FULL permission - app is whitelisted - app is not in the blacklist Bug: 23283899 Change-Id: I90fa266e8cfb28d002e5f792998fdddb6a1e6969
/frameworks/base/data/etc/platform.xml
|
4a503b1ece485d44c15eb02ec2bcd464b46e6f7f |
|
07-Aug-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #22989030: Separate battery whitelists We now have a new whitelist you can put apps in, which opts them out of the old battery saver mode and new app idle, but doesn't keep them from going in to doze. This is for a few special cases that we had previously whitelisted for battery saver, and inherited to the new modes... ultimately we should figure out how to get these apps out of the whitelist completely, but this will help for now. Apps in this new whitelist are not shown in the UI, because they are still significantly restricted by not being able to operate normally in doze. This also means they are still visible in the list of all apps for the user to be able to put them on/off the complete whitelist if that is what they really want. In the course of doing this, I needed to clean up code in the network policy manager to better separate management of the two firewall rules that now have different whitelists applied to them. This also hopefully just generally simplifies and cleans up that code. Hopefully! Change-Id: I92e15f2f85899571dd8b049b5e3eb1354f55f353
/frameworks/base/data/etc/platform.xml
|
32e80d7588720bdc9f8a3e961ac4566d7c80b2b9 |
|
06-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
Permission to view shared storage for all users. Typical apps are restricted so they can only view shared storage belonging to the user they're running as. However, a handful of system components need access to shared storage across all users, such as DefaultContainerService and SystemUI. Since WRITE_MEDIA_STORAGE already offers this functionality by bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID which is no longer handed out to third-party apps. Then we change the FUSE daemon to allow the "sdcard_rw" GID to see shared storage of all users. Bug: 19995822 Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
/frameworks/base/data/etc/platform.xml
|
9527b223a9d4a4d149bb005afc77148dbeeff785 |
|
25-Jun-2015 |
Jeff Sharkey <jsharkey@android.com> |
Let's reinvent storage, yet again! Now that we're treating storage as a runtime permission, we need to grant read/write access without killing the app. This is really tricky, since we had been using GIDs for access control, and they're set in stone once Zygote drops privileges. The only thing left that can change dynamically is the filesystem itself, so let's do that. This means changing the FUSE daemon to present itself as three different views: /mnt/runtime_default/foo - view for apps with no access /mnt/runtime_read/foo - view for apps with read access /mnt/runtime_write/foo - view for apps with write access There is still a single location for all the backing files, and filesystem permissions are derived the same way for each view, but the file modes are masked off differently for each mountpoint. During Zygote fork, it wires up the appropriate storage access into an isolated mount namespace based on the current app permissions. When the app is granted permissions dynamically at runtime, the system asks vold to jump into the existing mount namespace and bind mount the newly granted access model into place. Bug: 21858077 Change-Id: I62fb25d126dd815aea699b33d580e3afb90f8fd2
/frameworks/base/data/etc/platform.xml
|
00f3904629ef89192e061c1995801ef322fc0bcf |
|
24-Mar-2015 |
Jeff Sharkey <jsharkey@android.com> |
Introduce per-user GIDs for storage. This will eventually allow us to have a single unified filesystem instead of requiring zygote to use bind mounts. Change-Id: I29b819ab51498b4bab874e0367b1ab4165f84025
/frameworks/base/data/etc/platform.xml
|
3bdd327f8532a79b83f575cc62e8eb09a1f93f3d |
|
27-Nov-2014 |
Narayan Kamath <narayan@google.com> |
Move apache specific portions of android.net.http to external/apache-http. We continue to compile external/apache-http into ext.jar. This contains a few changes apart fom the classes moving around : - Makefile changes to build docs and api-stubs for now. A future change will revert these changes and remove these classes from stubs and docs. - Hardcode event IDs in legacyerrorstrings to avoid a dependency between the frameworks and apache. These strings are on their way out and will never change anyway. - Remove imports due to {@link} tags and use {@code} instead. - Remove an accidental(?) dependency on apache commons code that's a part of apache-http. bug: 18027885 Change-Id: I51cd038d846ec7d02c283a4541b10a6a9cf62ecf
/frameworks/base/data/etc/platform.xml
|
1ed78fbf28728cd12ca18e4d0773b34f3e586918 |
|
20-Jan-2015 |
Narayan Kamath <narayan@google.com> |
Add library definition for org.apache.http.legacy. bug: 18027885 Change-Id: I300ab2eb0f87e004ef20157bd23517865133665c
/frameworks/base/data/etc/platform.xml
|
981258e5f957899b034a98ebebade1f0366f506a |
|
23-Sep-2014 |
Benson Huang <benson.huang@mediatek.com> |
[FM] Add FM permission to support FM radio app Add FM permission like KK to support FM radio app. Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9 Signed-off-by: Benson Huang <benson.huang@mediatek.com> Conflicts: data/etc/platform.xml
/frameworks/base/data/etc/platform.xml
|
270e1f4297995248b450afc9e6134da1bb7e368a |
|
02-Oct-2014 |
Jeff Sharkey <jsharkey@android.com> |
Give audio GID to MANAGE_VOICE_KEYPHRASES apps. Some system apps doing hotword training need low-level access to audio hardware, beyond what the existing HAL offers. For now, give them the audio GID. Bug: 17763721 Change-Id: I8025c3abacae13a6ffec4e10e4976a67ab505bdf
/frameworks/base/data/etc/platform.xml
|
be7c50e0a14e91330ce13161bc14a33d34ff6aca |
|
30-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Add network access blocking when in battery save mode. The network policy manager now monitors battery save mode and, when in battery save, uses its facility to block access to metered networks to block access to all networks. That is, it tells the network management service that all networks have an (infinite) quota, and puts various app uids to be restricted under quota interfaces as appropriate. This new network blocking needs a new facility to be able to white list apps, such as GmsCore. To do this, I refactored the package manager's permission configuration stuff into a separate SystemConfig class that can be used by others, and it now has a new tag to specify package names that should be white-listed for power save mode. These are retrieved by the network policy manager and used to build a whitelist of uids. The new general config files can now go in system/etc/config, though currently everything still remains in the permissions dir. Still left to be done is changing the semantics of what uids are allowed in this mode, to include all perceptable uids. (So that we can still do things like background music playback.) This will be done in a follow-on CL. Change-Id: I9bb7029f61dae62e6236da5ca60765439f8d76d2
/frameworks/base/data/etc/platform.xml
|
d983ba5cac232c01dff818556b57f497f7d99854 |
|
03-Oct-2013 |
Marco Nelissen <marcone@google.com> |
Add PowerManager method to assign blame to a single uid Currently used by audioflinger to account for recording wakelocks. b/10985160 Change-Id: I18fc8487f2a197bf02b5269a4bcae9e75b6c2207
/frameworks/base/data/etc/platform.xml
|
9c104ab454de23628b5751db44ef08221d20dc86 |
|
03-Sep-2013 |
Jeff Sharkey <jsharkey@android.com> |
Remove deprecated ACCESS_DRM permission. The permission no longer exists, so don't assign it to media. Bug: 9967611 Change-Id: I5e11fcfc265310cbc3c2a8812a13e68b717fa476
/frameworks/base/data/etc/platform.xml
|
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 |
|
13-Aug-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add GIDs to packages.list, update SD card perms. Write supplementary GIDs to packages.list for lower-level system components to parse. WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always enforce READ_EXTERNAL_STORAGE permission. Update permission docs to mention new behavior. Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/data/etc/platform.xml
|
b8dd91a6b23c5098740fa080eb265e516e546dd9 |
|
17-Jul-2013 |
Eino-Ville Talvala <etalvala@google.com> |
Camera: Remove camera gid from apps with camera permission. This gid is not needed by camera-using apps, since all camera access is mediated by the camera service, which does not depend on gid for permission checks. Bug: 9904186 Change-Id: I859e6cabc905af9d98e2b09f5bbad086b5eb2b26
/frameworks/base/data/etc/platform.xml
|
788717ca599c714d58b2cb5deea1d37b4a711c07 |
|
16-Feb-2013 |
Eino-Ville Talvala <etalvala@google.com> |
Camera and MediaRecorder: Support AppOps - Allow media processes to update AppOps state - Pass package name to media services Bug: 8181262 Change-Id: I115d39f0b306cb9eb7cd3d3e663c680b7322fd3f
/frameworks/base/data/etc/platform.xml
|
514074fae81028937eda29e782c92e8ea78d85d2 |
|
11-Feb-2013 |
Dianne Hackborn <hackbod@google.com> |
App ops: cleanup, handle root and shell, perms. Rework how the shell user is defined so that it is associated with an actual apk, instead of being a free roaming uid with special permissions assigned to it. This allows us to correctly account for its operations in app ops. Implement a special case for the root user in app ops -- it is always allowed, always with the package name "root". Add various code to take care of cleaning up package state from app ops -- when packages are uninstalled, and during boot if any packages currently being stored no longer exist. Also fix a bug in the activity manager to correctly grant permissions in all cases when onNewIntent() is being called. Change-Id: Iae9f6d793ee48b93518c984ad957e46ae4582581
/frameworks/base/data/etc/platform.xml
|
b616f0c239ad61f818741909821b86aceff60b60 |
|
29-Jan-2013 |
Doug Zongker <dougz@android.com> |
add android.permission.LOOP_RADIO for access to loop radio device Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/data/etc/platform.xml
|
ef48662876cd79c9cd459e44bf51aeac81b06fd7 |
|
16-Nov-2012 |
Guang Zhu <guangzhu@google.com> |
grant shell user EXPAND_STATUS_BAR permission Bug: 7555251 Change-Id: I68cebb26bcee060c56e124941f3ea9289ab2b3bf
/frameworks/base/data/etc/platform.xml
|
fca9d63635d9603c318a089397b23c17682453e3 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Add multi user support for bluetooth Create a BLUETOOTH_STACK permission to share between all users of Bluetooth apk. Bluetooth Manager binds to apk of current user bug 6925422 Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/data/etc/platform.xml
|
786b44046a79d6c4c9cd07f5989d491c7196ad80 |
|
28-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix installing applications from non-primary users. We also now send the correct broadcasts to each user. You no longer need to be running the shell as root to be able to create/remove users. Also added some more man page material to the pm command, and got rid of a bunch of showUsage() calls that now make error messages completely buried because of how large the usage info has become. And the package manager now shows the user each historical broadcast was sent to. Change-Id: Iab42498e1352a0c023069139c80fc04d2d69ab4b
/frameworks/base/data/etc/platform.xml
|
b497a819b78cca9cc7e7cc115a7a366fd192f6f0 |
|
25-Jul-2012 |
Dianne Hackborn <hackbod@google.com> |
am f52dcf32: am da9754e8: Merge "Fix issue #6860828 Non-root shell can\'t grant permissions" into jb-dev * commit 'f52dcf32f2fba7c89bbd127c22f2ee2b933915c6': Fix issue #6860828 Non-root shell can't grant permissions
|
4d5f968f41b8d91f03a1311d3a99215a928f563b |
|
23-Jul-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #6860828 Non-root shell can't grant permissions That, plus a few other permissions. Bug: 6860828 Change-Id: I69f0360471e4fd46e689388cd993e18c1e0bfb02
/frameworks/base/data/etc/platform.xml
|
0f42037eb7b5118015c2caca635538324ccf0ccf |
|
12-Apr-2012 |
fredc <fredc@broadcom.com> |
Non persistent adapter service Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5 Conflicts: core/java/android/bluetooth/BluetoothInputDevice.java Conflicts: core/java/com/android/internal/app/ShutdownThread.java services/java/com/android/server/SystemServer.java Conflicts: services/java/com/android/server/SystemServer.java services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/data/etc/platform.xml
|
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 |
|
12-Mar-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new READ_EXTERNAL_STORAGE permission. Also adds some initial compatibility code for dealing with it. Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/data/etc/platform.xml
|
25872aa3ef189ae5506a923398af11ce5eb1a9b9 |
|
04-Feb-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding shell commands for modifying content. 1. Added methods to the ActivityManagerService remote interface that allow accessing content providers outside of an application. These methods are guarded by an internal signature protected permission which is given to the shell user. This enables a shell program to access content providers. 2. Implemented a shell command that takes as input as standart fagls with values and manipulates content via the content provider mechanism. Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/data/etc/platform.xml
|
7aa6d31240787da87bb06d4457fdf23e39c46f98 |
|
16-Nov-2011 |
Dianne Hackborn <hackbod@google.com> |
Whoops, need to acquire lock. Also increase time between reports to try to reduce the amount of redundant spam we get. Change-Id: Iedd7d743826fffa62ee431073cb7dfb49a00cea0
/frameworks/base/data/etc/platform.xml
|
2c84cfc001fb92a71811bf7384b7f865ff31ff9d |
|
31-Oct-2011 |
Dianne Hackborn <hackbod@google.com> |
Various performance and other work. - IME service now switches between visible and perceptible depending on whether it is being showm, allowing us to more aggressively free its memory when not shown. - The activity display time is no longer delayed by the activity transition animation. - New -R (repeat) option for launching activities with the am command. - Improved some documentation on Loader to be clear about some methods that apps should not normally call. - FrameworkPerf test now allows you to select individual tests to run. Change-Id: Id1f73de66dc93d63212183958a72119ad174318b
/frameworks/base/data/etc/platform.xml
|
fc8fa638617efb5695a1f89ea75375faebbe2a40 |
|
18-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #5128639: SystemUI grows by 10MB after taking a screenshot We now do the screenshot in a separate process. Also change the recents panel to not use hardware acceleration on lower-end devices. And improve how it gets shown to not load all data up-front which results in a long delay when you have lots of recents. Change-Id: Ia309a90f9939e5405758621b3f7114597bd0c02a
/frameworks/base/data/etc/platform.xml
|
6dbdc40e9a317488fc5f6e14cf9e699bce9a9387 |
|
22-Jul-2011 |
Eric Laurent <elaurent@google.com> |
Fix issue 4604090: notification sound interrupted. The problem is that the audio HAL fails to acquire the wake lock when playing the notification. This is because of a change that removed the mediaserver process form the system group for honeycomb. The fix consists in requesting the wake lock from PowerManagerService when AudioFlinger mixer wakes up. A consequence of this change is that audio HALs or pcm drivers do not have to hold wake locks anymore as in the past. Change-Id: I4fb3cc84816c9c408ab7fec75886baf801e1ecb5
/frameworks/base/data/etc/platform.xml
|
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 |
|
03-May-2011 |
Jeff Sharkey <jsharkey@android.com> |
Permissions to protect bandwidth statistics. Introduces new "net_bw_stats" group which will protect reading detailed bandwidth statistics from the kernel. Also introduce "net_bw_acct" group which will enable specific applications to request that their network traffic be counted against other UIDs. This change associates manifest permissions with the low-level GIDs. Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/data/etc/platform.xml
|
8643aa0179e598e78d938c59035389054535a229 |
|
20-Apr-2011 |
Svetoslav Ganov <svetoslavganov@google.com> |
Interrogation of the view hierarchy from an AccessibilityService. 1. Views are represented as AccessibilityNodeInfos to AccessibilityServices. 2. An accessibility service receives AccessibilityEvents and can ask for its source and gets an AccessibilityNodeInfo which can be used to get its parent and children infos and so on. 3. AccessibilityNodeInfo contains some attributes and actions that can be performed on the source. 4. AccessibilityService can request the system to preform an action on the source of an AccessibilityNodeInfo. 5. ViewAncestor provides an interaction connection to the AccessibiltyManagerService and an accessibility service uses its connection to the latter to interact with screen content. 6. AccessibilityService can interact ONLY with the focused window and all calls are routed through the AccessibilityManagerService which imposes security. 7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos based on some criteria. These API go through the AccessibilityManagerServcie for security check. 8. Some actions are hidden and are exposes only to eng builds for UI testing. Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/data/etc/platform.xml
|
ec9b5d17af1199e418b7352313575f0f7288b550 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit 'ee081bf5ee936396a89d5bd2b29487047b260f49': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 |
|
28-Mar-2011 |
Ramesh Sudini <ramesh.sudini@motorola.com> |
IMS: Provide net_admin permission so that IPSec could be configured/used. IMS configures the security database in kernel with keys generated from ISIM. Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/data/etc/platform.xml
|
1e23db4c2f5a6eba37a786e4390d52fe2012bfae |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 |
|
07-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Make ACCESS_USB permission for applications to access USB devices: - change from signatureOrSystem to normal - no longer associate this permission with the "usb" unix group - add to public API Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 |
|
12-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Remove permission android.permission.WRITE_MEDIA_STORAGE Access to the /data/media directory is now restricted exclusively to the sdcard daemon, so there is no longer a need for this permission. Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
10bc1114f37d9edb3f153ec209745dd476530325 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to the MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
3f425a6be47b706349f17679ed2b6877179df1cc |
|
29-Oct-2010 |
Mike Lockwood <lockwood@android.com> |
Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media BUG: 3113970 Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
8f5edc93b622bbdc33db24d348480fd7d55afb41 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
am 840f0fec: am d3efa392: Clean up some permissions. Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729' * commit '840f0fecd87357cadf4b2a0ae96d30b457f89729': Clean up some permissions.
|
d3efa3924407da6d38aa5931ac29aa088d9eb986 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Clean up some permissions. Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear to be associated with anything or used by anyone, so they are just deleted. Also deprecate the activity API to go in the foreground. I didn't realize that was released in the SDK. It needs to go away. Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/data/etc/platform.xml
|
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
Add new permission android.permission.ACCESS_USB to allow access to USB devices Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
527f015b9a99b64a20bcbfe6aad78e815365c760 |
|
20-Aug-2009 |
Scott Su <scott.su@myriadgroup.com> |
Remove the decleration of com.android.im.plugin.jar in platform.xml Add a column definition for keep_signed_in when query the active account with a given provider
/frameworks/base/data/etc/platform.xml
|
05ff98bbefda39b9ff26f8bca132cfd0248745c6 |
|
14-Jul-2009 |
Tao Liejun <L.J.Tao@motorola.com> |
Fix minor obex bugs and re-format the comments re-format comments move connectible to connectable remove unnecessary throws remove not-used function ClientOperation.readResponse() fix client abort case for PUT set mOpen for PrivateOutputStream add to platform.xml
/frameworks/base/data/etc/platform.xml
|
de83ab9fce4d02ddfde785e193bc787497d45138 |
|
15-Jul-2009 |
Christopher Tate <ctate@android.com> |
Grant adb the BACKUP permission This also means we should no longer do explicit calling-identity fiddling in dump(), relying instead on the usual permission enforcement mechanism to handle things.
/frameworks/base/data/etc/platform.xml
|
aeb049ce8b782cadc1690d6339af4afe722817d1 |
|
08-Jul-2009 |
Bob Lee <crazybob@google.com> |
Removed reference to awt jar from platform.xml.
/frameworks/base/data/etc/platform.xml
|
5a3a77dabd744d5be79d7745c2a977c108a9ad98 |
|
01-Jun-2009 |
San Mehat <san@google.com> |
base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE Signed-off-by: San Mehat <san@google.com>
/frameworks/base/data/etc/platform.xml
|
627e7b50be41e4fdee758a1bfad3a55de56b4e27 |
|
22-May-2009 |
Mathias Agopian <mathias@google.com> |
split boot animation out of SurfaceFlinger Conflicts: data/etc/platform.xml
/frameworks/base/data/etc/platform.xml
|
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 |
|
21-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Replace ILocationCollector interface with new ILocationProvider method This change replaces ILocationCollector with a more general mechanism that passes locations received from a provider to all other providers. The network location provider now uses this to implement the location collector. In the future, this could be used to inject network locations to the GPS as aiding data. This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
|
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/data/etc/platform.xml
|
29b57e63e54321f99ff086bb25439098d83292f6 |
|
23-Apr-2009 |
San Mehat <san@google.com> |
API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings Signed-off-by: San Mehat <san@google.com>
/frameworks/base/data/etc/platform.xml
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/data/etc/platform.xml
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/data/etc/platform.xml
|
d24b8183b93e781080b2c16c487e60d51c12da31 |
|
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
/frameworks/base/data/etc/platform.xml
|
b798689749c64baba81f02e10cf2157c747d6b46 |
|
10-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@125939
/frameworks/base/data/etc/platform.xml
|