History log of /frameworks/base/data/etc/platform.xml
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
05515ae925aa931bc19777e723e09a3748d8e5e3 01-Jun-2016 Felipe Leme <felipeal@google.com> Move DownloadsManager to permanent whitelist.

DownloadProvider is now based completely on JobScheduler, and deep
inside the platform we allow foreground
downloads (FLAG_WILL_BE_FOREGROUND) to run even while the device is in
doze, so it doesn't need to be temporarily whitelisted anymore.

BUG: 29056149
Change-Id: I3658bb42aeeee5d5528f91ec990d6e1bc54257b6
/frameworks/base/data/etc/platform.xml
1d0fbedf45b57f7c70ae2c10597707b8a54c63d2 28-Apr-2016 Felipe Leme <felipeal@google.com> Whitelist Downloads Manager for Data Saver.

BUG: 28431507

Change-Id: I0478ff48865951a7ebac94434f48ad0e272e0901
/frameworks/base/data/etc/platform.xml
e5313a842a5e41cde624386448d1e77cb0fbfae7 11-Apr-2016 Svet Ganov <svetoslavganov@google.com> Keep read/write external storage as built-in permissions

These are permissions that were mapped to gids but we need
to keep them listed event though they are no longer mapped
to gis until an upgrade from L to the current version is to
be supported. These permissions are built-in and in L were
not stored in packages.xml as a result if they are not defined
in the platform.xml while parsing packages.xml we would
ignore these permissions being granted to apps and not
propagate the granted state.

From N we are storing the built-in permissions in packages.xml
as the saved storage is negligible (one tag with the permission)
compared to the fragility as one can remove a built-in permission
which no longer needs to be mapped to gids and break grant
propagation.

bug:27185272

Change-Id: I65e05c4f7edd9a934888b4d0974100aa4e9a9453
/frameworks/base/data/etc/platform.xml
75cade0a5fd5ec432870de9977f81091ab389423 11-Jan-2016 Chien-Yu Chen <cychen@google.com> Add cameraserver process

Add UID and permissions for cameraserver process.

Bug: 24511454
Change-Id: Iccbda4b42e5584a1f56f9afe5e15a16f40dd2922
/frameworks/base/data/etc/platform.xml
701662547341269d610ac5f093e449a4c7078e43 24-Nov-2015 Pavlin Radoslavov <pavlin@google.com> Use GID "wakelock" to control access to kernel wakelock

* Added GID "wakelock" (3010) to the list of groups the System Server
belongs to.

* Added GID "wakelock" to the list of assigned groups for the
"android.permission.BLUETOOTH_STACK" Android permission.

* Grant CAP_BLOCK_SUSPEND to processes that belong to GID "wakelock"

Bug: 25864142
Change-Id: I8a9a5f11e4a9ecd1abf2d4f4b90ec89b3101332e
/frameworks/base/data/etc/platform.xml
ed0ea40a41aae8e65bc189efe6b631ca78259383 30-Oct-2015 Andy Hung <hunga@google.com> Add Android permissions for audioserver

audioserver has the same permissions as mediaserver.

TBD: Pare down permissions.

Bug: 24511453
Change-Id: Id7abddd79a730ad95b554a94207df3aa4b676f2a
/frameworks/base/data/etc/platform.xml
8e4f4b3d9409c5a5329aaa4caf0102167d5e610d 02-Dec-2015 Chong Zhang <chz@google.com> Add permission to prevent third-parth apps from querying OOM scores

bug: 25853091
Change-Id: Ic1cdbf155e1e930405773fd078dfc57fda2d9afa
/frameworks/base/data/etc/platform.xml
9c990c15ee74ef7aaa742701156df3055d68859a 23-Nov-2015 Xiaohui Chen <xiaohuic@google.com> Add com.android.settings to white list

Bug: 24256521
Change-Id: If315b082960190b3ebea387484f5a00e707ef558
/frameworks/base/data/etc/platform.xml
7db5af124e551554f7a2f1abdd2a486c937910fe 01-Aug-2015 Fyodor Kupolov <fkupolov@google.com> Limit the number of apps running as system user

For the system user, enable apps based on the following conditions:
- app has no launcher icons or has INTERACT_ACROSS_USER_FULL permission
- app is whitelisted
- app is not in the blacklist

Bug: 23283899
Change-Id: I90fa266e8cfb28d002e5f792998fdddb6a1e6969
/frameworks/base/data/etc/platform.xml
4a503b1ece485d44c15eb02ec2bcd464b46e6f7f 07-Aug-2015 Dianne Hackborn <hackbod@google.com> Fix issue #22989030: Separate battery whitelists

We now have a new whitelist you can put apps in, which
opts them out of the old battery saver mode and new app idle,
but doesn't keep them from going in to doze. This is for a few
special cases that we had previously whitelisted for battery saver,
and inherited to the new modes... ultimately we should figure out
how to get these apps out of the whitelist completely, but this
will help for now.

Apps in this new whitelist are not shown in the UI, because they
are still significantly restricted by not being able to operate
normally in doze. This also means they are still visible in the
list of all apps for the user to be able to put them on/off the
complete whitelist if that is what they really want.

In the course of doing this, I needed to clean up code in the
network policy manager to better separate management of the
two firewall rules that now have different whitelists applied
to them. This also hopefully just generally simplifies and cleans
up that code. Hopefully!

Change-Id: I92e15f2f85899571dd8b049b5e3eb1354f55f353
/frameworks/base/data/etc/platform.xml
32e80d7588720bdc9f8a3e961ac4566d7c80b2b9 06-Jul-2015 Jeff Sharkey <jsharkey@android.com> Permission to view shared storage for all users.

Typical apps are restricted so they can only view shared storage
belonging to the user they're running as. However, a handful of
system components need access to shared storage across all users,
such as DefaultContainerService and SystemUI.

Since WRITE_MEDIA_STORAGE already offers this functionality by
bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID
which is no longer handed out to third-party apps. Then we change
the FUSE daemon to allow the "sdcard_rw" GID to see shared storage
of all users.

Bug: 19995822
Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
/frameworks/base/data/etc/platform.xml
9527b223a9d4a4d149bb005afc77148dbeeff785 25-Jun-2015 Jeff Sharkey <jsharkey@android.com> Let's reinvent storage, yet again!

Now that we're treating storage as a runtime permission, we need to
grant read/write access without killing the app. This is really
tricky, since we had been using GIDs for access control, and they're
set in stone once Zygote drops privileges.

The only thing left that can change dynamically is the filesystem
itself, so let's do that. This means changing the FUSE daemon to
present itself as three different views:

/mnt/runtime_default/foo - view for apps with no access
/mnt/runtime_read/foo - view for apps with read access
/mnt/runtime_write/foo - view for apps with write access

There is still a single location for all the backing files, and
filesystem permissions are derived the same way for each view, but
the file modes are masked off differently for each mountpoint.

During Zygote fork, it wires up the appropriate storage access into
an isolated mount namespace based on the current app permissions. When
the app is granted permissions dynamically at runtime, the system
asks vold to jump into the existing mount namespace and bind mount
the newly granted access model into place.

Bug: 21858077
Change-Id: I62fb25d126dd815aea699b33d580e3afb90f8fd2
/frameworks/base/data/etc/platform.xml
00f3904629ef89192e061c1995801ef322fc0bcf 24-Mar-2015 Jeff Sharkey <jsharkey@android.com> Introduce per-user GIDs for storage.

This will eventually allow us to have a single unified filesystem
instead of requiring zygote to use bind mounts.

Change-Id: I29b819ab51498b4bab874e0367b1ab4165f84025
/frameworks/base/data/etc/platform.xml
3bdd327f8532a79b83f575cc62e8eb09a1f93f3d 27-Nov-2014 Narayan Kamath <narayan@google.com> Move apache specific portions of android.net.http to external/apache-http.

We continue to compile external/apache-http into ext.jar. This contains
a few changes apart fom the classes moving around :

- Makefile changes to build docs and api-stubs for now. A future change
will revert these changes and remove these classes from stubs and
docs.
- Hardcode event IDs in legacyerrorstrings to avoid a dependency between
the frameworks and apache. These strings are on their way out and will
never change anyway.
- Remove imports due to {@link} tags and use {@code} instead.
- Remove an accidental(?) dependency on apache commons code that's a
part of apache-http.

bug: 18027885

Change-Id: I51cd038d846ec7d02c283a4541b10a6a9cf62ecf
/frameworks/base/data/etc/platform.xml
1ed78fbf28728cd12ca18e4d0773b34f3e586918 20-Jan-2015 Narayan Kamath <narayan@google.com> Add library definition for org.apache.http.legacy.

bug: 18027885
Change-Id: I300ab2eb0f87e004ef20157bd23517865133665c
/frameworks/base/data/etc/platform.xml
981258e5f957899b034a98ebebade1f0366f506a 23-Sep-2014 Benson Huang <benson.huang@mediatek.com> [FM] Add FM permission to support FM radio app

Add FM permission like KK to support FM radio app.

Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9
Signed-off-by: Benson Huang <benson.huang@mediatek.com>

Conflicts:
data/etc/platform.xml
/frameworks/base/data/etc/platform.xml
270e1f4297995248b450afc9e6134da1bb7e368a 02-Oct-2014 Jeff Sharkey <jsharkey@android.com> Give audio GID to MANAGE_VOICE_KEYPHRASES apps.

Some system apps doing hotword training need low-level access to
audio hardware, beyond what the existing HAL offers. For now, give
them the audio GID.

Bug: 17763721
Change-Id: I8025c3abacae13a6ffec4e10e4976a67ab505bdf
/frameworks/base/data/etc/platform.xml
be7c50e0a14e91330ce13161bc14a33d34ff6aca 30-Jun-2014 Dianne Hackborn <hackbod@google.com> Add network access blocking when in battery save mode.

The network policy manager now monitors battery save mode and,
when in battery save, uses its facility to block access to metered
networks to block access to all networks. That is, it tells the
network management service that all networks have an (infinite)
quota, and puts various app uids to be restricted under quota
interfaces as appropriate.

This new network blocking needs a new facility to be able to white
list apps, such as GmsCore. To do this, I refactored the package
manager's permission configuration stuff into a separate SystemConfig
class that can be used by others, and it now has a new tag to
specify package names that should be white-listed for power save
mode. These are retrieved by the network policy manager and used
to build a whitelist of uids.

The new general config files can now go in system/etc/config,
though currently everything still remains in the permissions dir.

Still left to be done is changing the semantics of what uids are
allowed in this mode, to include all perceptable uids. (So that we
can still do things like background music playback.) This will be
done in a follow-on CL.

Change-Id: I9bb7029f61dae62e6236da5ca60765439f8d76d2
/frameworks/base/data/etc/platform.xml
d983ba5cac232c01dff818556b57f497f7d99854 03-Oct-2013 Marco Nelissen <marcone@google.com> Add PowerManager method to assign blame to a single uid

Currently used by audioflinger to account for recording wakelocks.
b/10985160

Change-Id: I18fc8487f2a197bf02b5269a4bcae9e75b6c2207
/frameworks/base/data/etc/platform.xml
9c104ab454de23628b5751db44ef08221d20dc86 03-Sep-2013 Jeff Sharkey <jsharkey@android.com> Remove deprecated ACCESS_DRM permission.

The permission no longer exists, so don't assign it to media.

Bug: 9967611
Change-Id: I5e11fcfc265310cbc3c2a8812a13e68b717fa476
/frameworks/base/data/etc/platform.xml
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 13-Aug-2013 Jeff Sharkey <jsharkey@android.com> Add GIDs to packages.list, update SD card perms.

Write supplementary GIDs to packages.list for lower-level system
components to parse.

WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always
enforce READ_EXTERNAL_STORAGE permission. Update permission docs to
mention new behavior.

Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/data/etc/platform.xml
b8dd91a6b23c5098740fa080eb265e516e546dd9 17-Jul-2013 Eino-Ville Talvala <etalvala@google.com> Camera: Remove camera gid from apps with camera permission.

This gid is not needed by camera-using apps, since all camera access
is mediated by the camera service, which does not depend on gid for
permission checks.

Bug: 9904186
Change-Id: I859e6cabc905af9d98e2b09f5bbad086b5eb2b26
/frameworks/base/data/etc/platform.xml
788717ca599c714d58b2cb5deea1d37b4a711c07 16-Feb-2013 Eino-Ville Talvala <etalvala@google.com> Camera and MediaRecorder: Support AppOps

- Allow media processes to update AppOps state
- Pass package name to media services

Bug: 8181262
Change-Id: I115d39f0b306cb9eb7cd3d3e663c680b7322fd3f
/frameworks/base/data/etc/platform.xml
514074fae81028937eda29e782c92e8ea78d85d2 11-Feb-2013 Dianne Hackborn <hackbod@google.com> App ops: cleanup, handle root and shell, perms.

Rework how the shell user is defined so that it is
associated with an actual apk, instead of being a free
roaming uid with special permissions assigned to it.
This allows us to correctly account for its operations
in app ops.

Implement a special case for the root user in app ops --
it is always allowed, always with the package name "root".

Add various code to take care of cleaning up package state
from app ops -- when packages are uninstalled, and during
boot if any packages currently being stored no longer exist.

Also fix a bug in the activity manager to correctly grant
permissions in all cases when onNewIntent() is being called.

Change-Id: Iae9f6d793ee48b93518c984ad957e46ae4582581
/frameworks/base/data/etc/platform.xml
b616f0c239ad61f818741909821b86aceff60b60 29-Jan-2013 Doug Zongker <dougz@android.com> add android.permission.LOOP_RADIO for access to loop radio device

Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/data/etc/platform.xml
ef48662876cd79c9cd459e44bf51aeac81b06fd7 16-Nov-2012 Guang Zhu <guangzhu@google.com> grant shell user EXPAND_STATUS_BAR permission

Bug: 7555251
Change-Id: I68cebb26bcee060c56e124941f3ea9289ab2b3bf
/frameworks/base/data/etc/platform.xml
fca9d63635d9603c318a089397b23c17682453e3 04-Oct-2012 Matthew Xie <mattx@google.com> Add multi user support for bluetooth

Create a BLUETOOTH_STACK permission to share between all users of
Bluetooth apk. Bluetooth Manager binds to apk of current user
bug 6925422

Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/data/etc/platform.xml
786b44046a79d6c4c9cd07f5989d491c7196ad80 28-Aug-2012 Dianne Hackborn <hackbod@google.com> Fix installing applications from non-primary users.

We also now send the correct broadcasts to each user.

You no longer need to be running the shell as root
to be able to create/remove users.

Also added some more man page material to the pm command, and
got rid of a bunch of showUsage() calls that now make error
messages completely buried because of how large the usage info
has become.

And the package manager now shows the user each historical broadcast
was sent to.

Change-Id: Iab42498e1352a0c023069139c80fc04d2d69ab4b
/frameworks/base/data/etc/platform.xml
b497a819b78cca9cc7e7cc115a7a366fd192f6f0 25-Jul-2012 Dianne Hackborn <hackbod@google.com> am f52dcf32: am da9754e8: Merge "Fix issue #6860828 Non-root shell can\'t grant permissions" into jb-dev

* commit 'f52dcf32f2fba7c89bbd127c22f2ee2b933915c6':
Fix issue #6860828 Non-root shell can't grant permissions
4d5f968f41b8d91f03a1311d3a99215a928f563b 23-Jul-2012 Dianne Hackborn <hackbod@google.com> Fix issue #6860828 Non-root shell can't grant permissions

That, plus a few other permissions.

Bug: 6860828
Change-Id: I69f0360471e4fd46e689388cd993e18c1e0bfb02
/frameworks/base/data/etc/platform.xml
0f42037eb7b5118015c2caca635538324ccf0ccf 12-Apr-2012 fredc <fredc@broadcom.com> Non persistent adapter service

Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5

Conflicts:

core/java/android/bluetooth/BluetoothInputDevice.java

Conflicts:

core/java/com/android/internal/app/ShutdownThread.java
services/java/com/android/server/SystemServer.java

Conflicts:

services/java/com/android/server/SystemServer.java
services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/data/etc/platform.xml
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 12-Mar-2012 Dianne Hackborn <hackbod@google.com> Add new READ_EXTERNAL_STORAGE permission.

Also adds some initial compatibility code for dealing with it.

Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/data/etc/platform.xml
25872aa3ef189ae5506a923398af11ce5eb1a9b9 04-Feb-2012 Svetoslav Ganov <svetoslavganov@google.com> Adding shell commands for modifying content.

1. Added methods to the ActivityManagerService remote interface
that allow accessing content providers outside of an application.
These methods are guarded by an internal signature protected
permission which is given to the shell user. This enables a
shell program to access content providers.

2. Implemented a shell command that takes as input as standart
fagls with values and manipulates content via the content provider
mechanism.

Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/data/etc/platform.xml
7aa6d31240787da87bb06d4457fdf23e39c46f98 16-Nov-2011 Dianne Hackborn <hackbod@google.com> Whoops, need to acquire lock.

Also increase time between reports to try to reduce the amount
of redundant spam we get.

Change-Id: Iedd7d743826fffa62ee431073cb7dfb49a00cea0
/frameworks/base/data/etc/platform.xml
2c84cfc001fb92a71811bf7384b7f865ff31ff9d 31-Oct-2011 Dianne Hackborn <hackbod@google.com> Various performance and other work.

- IME service now switches between visible and perceptible depending on
whether it is being showm, allowing us to more aggressively free its
memory when not shown.

- The activity display time is no longer delayed by the activity
transition animation.

- New -R (repeat) option for launching activities with the am command.

- Improved some documentation on Loader to be clear about some methods
that apps should not normally call.

- FrameworkPerf test now allows you to select individual tests to run.

Change-Id: Id1f73de66dc93d63212183958a72119ad174318b
/frameworks/base/data/etc/platform.xml
fc8fa638617efb5695a1f89ea75375faebbe2a40 18-Aug-2011 Dianne Hackborn <hackbod@google.com> Fix issue #5128639: SystemUI grows by 10MB after taking a screenshot

We now do the screenshot in a separate process.

Also change the recents panel to not use hardware acceleration
on lower-end devices. And improve how it gets shown to not
load all data up-front which results in a long delay when you have
lots of recents.

Change-Id: Ia309a90f9939e5405758621b3f7114597bd0c02a
/frameworks/base/data/etc/platform.xml
6dbdc40e9a317488fc5f6e14cf9e699bce9a9387 22-Jul-2011 Eric Laurent <elaurent@google.com> Fix issue 4604090: notification sound interrupted.

The problem is that the audio HAL fails to acquire the wake lock when playing the notification.
This is because of a change that removed the mediaserver process form the system group for honeycomb.

The fix consists in requesting the wake lock from PowerManagerService when AudioFlinger mixer
wakes up.

A consequence of this change is that audio HALs or pcm drivers do not have to hold wake locks
anymore as in the past.

Change-Id: I4fb3cc84816c9c408ab7fec75886baf801e1ecb5
/frameworks/base/data/etc/platform.xml
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 03-May-2011 Jeff Sharkey <jsharkey@android.com> Permissions to protect bandwidth statistics.

Introduces new "net_bw_stats" group which will protect reading
detailed bandwidth statistics from the kernel. Also introduce
"net_bw_acct" group which will enable specific applications to
request that their network traffic be counted against other UIDs.

This change associates manifest permissions with the low-level GIDs.

Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/data/etc/platform.xml
8643aa0179e598e78d938c59035389054535a229 20-Apr-2011 Svetoslav Ganov <svetoslavganov@google.com> Interrogation of the view hierarchy from an AccessibilityService.

1. Views are represented as AccessibilityNodeInfos to AccessibilityServices.

2. An accessibility service receives AccessibilityEvents and can ask
for its source and gets an AccessibilityNodeInfo which can be used
to get its parent and children infos and so on.

3. AccessibilityNodeInfo contains some attributes and actions that
can be performed on the source.

4. AccessibilityService can request the system to preform an action
on the source of an AccessibilityNodeInfo.

5. ViewAncestor provides an interaction connection to the
AccessibiltyManagerService and an accessibility service uses
its connection to the latter to interact with screen content.

6. AccessibilityService can interact ONLY with the focused window
and all calls are routed through the AccessibilityManagerService
which imposes security.

7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos
based on some criteria. These API go through the AccessibilityManagerServcie
for security check.

8. Some actions are hidden and are exposes only to eng builds for UI testing.

Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/data/etc/platform.xml
ec9b5d17af1199e418b7352313575f0f7288b550 04-May-2011 Wink Saville <wink@google.com> am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE

* commit 'ee081bf5ee936396a89d5bd2b29487047b260f49':
IMS: Provide net_admin permission so that IPSec could be configured/used.
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 28-Mar-2011 Ramesh Sudini <ramesh.sudini@motorola.com> IMS: Provide net_admin permission so that IPSec could be configured/used.

IMS configures the security database in kernel with keys generated from ISIM.

Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/data/etc/platform.xml
1e23db4c2f5a6eba37a786e4390d52fe2012bfae 22-Apr-2011 Mike Lockwood <lockwood@android.com> Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"

We need this to allow MTP to access secondary external storage devices

This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4.

Conflicts:

data/etc/platform.xml

Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 07-Jan-2011 Mike Lockwood <lockwood@android.com> Make ACCESS_USB permission for applications to access USB devices:

- change from signatureOrSystem to normal
- no longer associate this permission with the "usb" unix group
- add to public API

Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 12-Jan-2011 Mike Lockwood <lockwood@android.com> Remove permission android.permission.WRITE_MEDIA_STORAGE

Access to the /data/media directory is now restricted exclusively to the
sdcard daemon, so there is no longer a need for this permission.

Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
10bc1114f37d9edb3f153ec209745dd476530325 10-Jan-2011 Mike Lockwood <lockwood@android.com> Add separate permission and group for access to the MTP USB driver

Since the "usb" group and ACCESS_USB permission will be used by regular apps
to access USB devices in host mode, we need a separate permission for the
device side MTP driver.

Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
3f425a6be47b706349f17679ed2b6877179df1cc 29-Oct-2010 Mike Lockwood <lockwood@android.com> Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media

BUG: 3113970

Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
8f5edc93b622bbdc33db24d348480fd7d55afb41 02-Sep-2010 Dianne Hackborn <hackbod@google.com> am 840f0fec: am d3efa392: Clean up some permissions.

Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729'

* commit '840f0fecd87357cadf4b2a0ae96d30b457f89729':
Clean up some permissions.
d3efa3924407da6d38aa5931ac29aa088d9eb986 02-Sep-2010 Dianne Hackborn <hackbod@google.com> Clean up some permissions.

Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear
to be associated with anything or used by anyone, so they are just
deleted.

Also deprecate the activity API to go in the foreground. I didn't
realize that was released in the SDK. It needs to go away.

Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/data/etc/platform.xml
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf 11-May-2010 Mike Lockwood <lockwood@android.com> Add new permission android.permission.ACCESS_USB to allow access to USB devices

Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f
Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
527f015b9a99b64a20bcbfe6aad78e815365c760 20-Aug-2009 Scott Su <scott.su@myriadgroup.com> Remove the decleration of com.android.im.plugin.jar in platform.xml
Add a column definition for keep_signed_in when query the active account with a given provider
/frameworks/base/data/etc/platform.xml
05ff98bbefda39b9ff26f8bca132cfd0248745c6 14-Jul-2009 Tao Liejun <L.J.Tao@motorola.com> Fix minor obex bugs and re-format the comments

re-format comments
move connectible to connectable
remove unnecessary throws
remove not-used function ClientOperation.readResponse()
fix client abort case for PUT
set mOpen for PrivateOutputStream
add to platform.xml
/frameworks/base/data/etc/platform.xml
de83ab9fce4d02ddfde785e193bc787497d45138 15-Jul-2009 Christopher Tate <ctate@android.com> Grant adb the BACKUP permission

This also means we should no longer do explicit calling-identity fiddling in
dump(), relying instead on the usual permission enforcement mechanism to handle
things.
/frameworks/base/data/etc/platform.xml
aeb049ce8b782cadc1690d6339af4afe722817d1 08-Jul-2009 Bob Lee <crazybob@google.com> Removed reference to awt jar from platform.xml.
/frameworks/base/data/etc/platform.xml
5a3a77dabd744d5be79d7745c2a977c108a9ad98 01-Jun-2009 San Mehat <san@google.com> base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/data/etc/platform.xml
627e7b50be41e4fdee758a1bfad3a55de56b4e27 22-May-2009 Mathias Agopian <mathias@google.com> split boot animation out of SurfaceFlinger

Conflicts:

data/etc/platform.xml
/frameworks/base/data/etc/platform.xml
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 21-May-2009 Mike Lockwood <lockwood@android.com> location: Replace ILocationCollector interface with new ILocationProvider method

This change replaces ILocationCollector with a more general mechanism that
passes locations received from a provider to all other providers.
The network location provider now uses this to implement the location collector.
In the future, this could be used to inject network locations to the GPS
as aiding data.

This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR.

Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/data/etc/platform.xml
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d 14-May-2009 Dianne Hackborn <hackbod@google.com> Implement compatibility support for WRITE_SDCARD permission.

Now old applications will automatically be granted it. Also renamed it from
SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions,
and re-arranged how we do targetSdkVersion to actually be usuable for this
kind of stuff.

Note that right now this results in basically all apps being given the
WRITE_SDCARD permission, because their targetSdkVersion is not set. I will
be dealing with that in a future change.
/frameworks/base/data/etc/platform.xml
29b57e63e54321f99ff086bb25439098d83292f6 23-Apr-2009 San Mehat <san@google.com> API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings

Signed-off-by: San Mehat <san@google.com>
/frameworks/base/data/etc/platform.xml
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/frameworks/base/data/etc/platform.xml
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 04-Mar-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //depot/cupcake/@135843
/frameworks/base/data/etc/platform.xml
d24b8183b93e781080b2c16c487e60d51c12da31 11-Feb-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@130745
/frameworks/base/data/etc/platform.xml
b798689749c64baba81f02e10cf2157c747d6b46 10-Jan-2009 The Android Open Source Project <initial-contribution@android.com> auto import from //branches/cupcake/...@125939
/frameworks/base/data/etc/platform.xml