1646af8ba8a7e3119e91c5cd7e1c2767d59d53dc |
|
06-Jun-2018 |
Sanry Huang <sanryhuang@google.com> |
Revert "Hide system apps until installed (1/2)" This reverts commit 40ede29ed6467d4d85a482e6008b92aa02d50267. Bug: 74068582 Bug: 80444486 Bug: 80316870 Bug: 109803325 Bug: 109642189 Bug: 109660260 Bug: 109649585 Bug: 109647120 Bug: 109648512 Bug: 109648513 Bug: 109647122 Change-Id: I0e50ceebeaecae89f461f541450e24d9c148527d (cherry picked from commit afef5daaf969546aecd8d8e7de96ee4d9064240d)
/frameworks/base/core/res/AndroidManifest.xml
|
8e6adb1b460f4923f2ce60b52dd9bc9329649a8e |
|
29-May-2018 |
Fan Zhang <zhfan@google.com> |
Update call log permission group icon. Change-Id: I605ece95cd29405b9d63692d038f36390ac367ef Fixes: 78230210 Test: visual
/frameworks/base/core/res/AndroidManifest.xml
|
40ede29ed6467d4d85a482e6008b92aa02d50267 |
|
19-Mar-2018 |
sanryhuang <sanryhuang@google.com> |
Hide system apps until installed (1/2) Applying this mechanism for system carrier apps to make visibility reasonable from the user's perspective. In other words, before hidden system apps have been installed, they wouldn't be listed via APIs in PackageManager which are used at all apps list and search in Settings and so on. Test: manual Test: atest CarrierAppUtilsTest Test: atest PackageManagerTest Bug: 74068582 Change-Id: Id3ff138ad529b909d9bbf6719af3a553b909ccbb
/frameworks/base/core/res/AndroidManifest.xml
|
318abc932467485e191578a923baba2ed40834f0 |
|
04-May-2018 |
lpeter <@google.com> |
[IdleController] Support dock scenario on idle or active judgement In the current design, IdleController of Job service considers devices as ‘idle’ after 71 minutes of screen off. But under docking use scenario, devices screen might remain on for a very long time and it’s not necessary implying the device being interactive with users. So create a mechanism for device to enter the ‘idle’ state that JobScheduler can kick off idle tasks. Bug: 79183658 Test: atest DeviceStatesTest Change-Id: I5b307ca51e28ffca63f79a9c43984c3b76e51629
/frameworks/base/core/res/AndroidManifest.xml
|
689866352b2e36fb10128244c19a671b4bc1fdc5 |
|
10-May-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "add install action for carrier id to system API" into pi-dev
|
2776ed56b846ff34e45467f7618a679049d16f3f |
|
08-May-2018 |
fionaxu <fionaxu@google.com> |
add install action for carrier id to system API Bug: 79426800 Test: Manual Change-Id: Icd3e9ae527dc17ab5762aa57df596f058de08d5b
/frameworks/base/core/res/AndroidManifest.xml
|
06defc2a313b35bd5d2b84484c520554b859486f |
|
02-May-2018 |
android-build-team Robot <android-build-team-robot@google.com> |
Merge "Fix issue #78230210: Strobe: Need separate runtime permission group for READ_CALL_LOG and WRITE_CALL_LOG" into pi-dev
|
62594fd49983f33f60cfb8c96e2c542e3b5554d3 |
|
25-Apr-2018 |
Remi NGUYEN VAN <reminv@google.com> |
Add NETWORK_BYPASS_PRIVATE_DNS permission Have the captive portal app and the MMS service use this new permission to bypass private DNS. Bug: b/78494660 Test: manual: captive portal login & MMS sending works Change-Id: I0a4a8d0105becf6957fd44099bd84eca51e6716f
/frameworks/base/core/res/AndroidManifest.xml
|
ed23b9b12cebfc700a3fd0f61a81e95152ce66bd |
|
28-Apr-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #78230210: Strobe: Need separate runtime permission group for READ_CALL_LOG and WRITE_CALL_LOG Bug: 78230210 Test: manual Change-Id: Ie5a0ab3dffd40dc44f7aa5deb81b42fbc2dbd406
/frameworks/base/core/res/AndroidManifest.xml
|
b65a1cf7ee43099f81a5c44595327ef562240686 |
|
24-Apr-2018 |
Roshan Pius <rpius@google.com> |
AndroidManifest.xml: Add new network permission for setup wizard Adding a new permission for setup wizard to access privileged network operations. Bug: 77924407 Test: Compiles Change-Id: I4203abf62b2b297117b5877c8eb1d5260e30e39a
/frameworks/base/core/res/AndroidManifest.xml
|
5f1f29a97af26ef5e23724a13e52fdc41a212c43 |
|
03-Apr-2018 |
Mathew Inwood <mathewi@google.com> |
Enforce permission when disabling API checks. Add a new internal permission required to disable hidden API checks using "am instrument". Grant this permission to the shell. Test: $ adb shell am instrument --no-hidden-api-checks mypackage/.MainInstrumentation Bug: 64382372 Change-Id: I193dba412560f17810ad0c67c733a1eec15fa7b7
/frameworks/base/core/res/AndroidManifest.xml
|
5e0d36041172a6393e8028184854d3c175f48051 |
|
10-Apr-2018 |
Jeff Sharkey <jsharkey@google.com> |
Merge "API council requested tweaks to SubscriptionPlan." into pi-dev
|
3c3af1406e9fc8afbe9593df6c23fe3d4daa6b42 |
|
30-Mar-2018 |
Suprabh Shukla <suprabh@google.com> |
Activity interceptor dialog for suspended apps Added an AlertActivity to intercept the start for an activity belonging to a suspended app. More details will be shown if the suspending app also defines an activity to handle the API action SHOW_SUSPENDED_APP_DETAILS. Test: Added tests to existing classes. Can be run via: atest com.android.server.pm.SuspendPackagesTest atest com.android.server.pm.PackageManagerSettingsTests atest com.android.server.pm.PackageUserStateTest Bug: 75332201 Change-Id: I85dc4e9efd15eedba306ed5b856f651e3abd3e99
/frameworks/base/core/res/AndroidManifest.xml
|
0fc6d03b628c8cbe80e3c2c14aaf8c6944b32d1e |
|
31-Mar-2018 |
Jeff Sharkey <jsharkey@android.com> |
API council requested tweaks to SubscriptionPlan. Return new shiny Range<> object instead of Pair<>. Tell developers what permission to check on refresh broadcast. Describe what exceptions might be thrown, and that an empty list is okay. Allow creation of plans with richer Period object, instead of forcing them into rigid week or day options. Protect SubscriptionPlan broadcast. Test: atest android.util.RecurrenceRuleTest Test: atest com.android.server.NetworkPolicyManagerServiceTest Bug: 74945820 Change-Id: I7e555798e0cfaa214ca93d9df627c6443fc5d986
/frameworks/base/core/res/AndroidManifest.xml
|
fbc01fcbd5cae80c56745102b40d6b764050d630 |
|
02-Apr-2018 |
Mike Ma <yanmin@google.com> |
Register broadcast receiver at runtime instead Cannot find class when registering Usb connection broadcast receiver in AndroidManifest, causing system process to crash. Switch to register receiver at runtime when boot complete. Fixes: 77274266 Test: Manually plug & unplug usb cable, and reboot device Test: Verify usb_data appears in batterystats dump Test: Verify there is no crash log Change-Id: If4a9e85aa81173ad6d8cb6ce28cc030814c520a5
/frameworks/base/core/res/AndroidManifest.xml
|
c04feba805c5acde92638a062cc13030fc4d3308 |
|
02-Apr-2018 |
Yangster-mac <yanglu@google.com> |
Move forward the alarm timestamp when config is added to statsd. Test: statsd test BUG: b/77344187 Change-Id: Ieacffaa29422829b8956f2b3fcb2c647c8c3eed9
/frameworks/base/core/res/AndroidManifest.xml
|
462e29da9ba854eb3651dd9664b09a2852a05141 |
|
22-Mar-2018 |
Bryan Mawhinney <bryanmawhinney@google.com> |
Add a SystemApi to control display saturation. Allows an app with the appropriate permission to reduce (make more gray) the saturation of colors on the display. Test: manual Bug: 77189882 Change-Id: I2b7b065d07bd2ca24730b2e8c52d161c22b307ab
/frameworks/base/core/res/AndroidManifest.xml
|
c8156c6a524dcb5c3c40e744dd9eccc73fafb80d |
|
29-Mar-2018 |
Jeff Sharkey <jsharkey@google.com> |
Merge "API for granting/revoking runtime permissions." into pi-dev
|
e1003296472c5b3070e7e9d81da481d65e7b26f7 |
|
28-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Fix typo on pull alarm broadcast receiver" into pi-dev
|
86ed912f5afb6384e38d87c517ce6b25aa4466f4 |
|
28-Mar-2018 |
Vishwath Mohan <vishwath@google.com> |
Merge "Refactor FingerprintDialog to BiometricDialog" into pi-dev
|
4cef3e4b8ef0075bb46a21699ebf3bfaff89fb8d |
|
28-Mar-2018 |
Chenjie Yu <cjyu@google.com> |
Fix typo on pull alarm broadcast receiver Bug: 75970648 Test: cts Change-Id: Iaf64b5e55457c2ade476acbe23bf6d3a0e22f8ec
/frameworks/base/core/res/AndroidManifest.xml
|
23bc81d34a2c605fd3c18f341a32860d1d4790b4 |
|
27-Mar-2018 |
Jeff Sharkey <jsharkey@android.com> |
API for granting/revoking runtime permissions. Expose these as public API, since they're useful for devices where the raw "pm grant" or "pm revoke" commands can be flaky. Test: builds, boots Bug: 75315597 Change-Id: I2de94587945f08fd09ebe729bb9872542a11ef26
/frameworks/base/core/res/AndroidManifest.xml
|
1c73370df4c6b8399a264923e1f370b64019fca3 |
|
28-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Sending MY_PACKAGE_SUSPENDED to suspended apps" into pi-dev
|
cf87df15310611ae4e5229b19c5a4942e54185b5 |
|
21-Mar-2018 |
Vishwath Mohan <vishwath@google.com> |
Refactor FingerprintDialog to BiometricDialog This CL changes FingerprintDialog into the more generic BiometricDialog, which OEMs will be able to extend as necessary to provide support for alternate biometric modalities. Bug: 74831038 Test: m -j50 FingerprintDialog (from the associated CL on this topic) The app works and authenticates successfully. Test: make update-api -j56 Change-Id: Ic398ef0a0b448be68dbe3330b30779f93f567243
/frameworks/base/core/res/AndroidManifest.xml
|
926a97cd3f1b0d569c296660cdd012bb2ece108e |
|
25-Mar-2018 |
Mike Ma <yanmin@google.com> |
Track USB data link in batterystats Record USB data link state in addition to plug & charging state, since modern USB controller can keep USB data link connected with minimum current. Device is not acutally charging at those times. Test: manual Fixes: 76209292 Change-Id: I0710d547399a631d594488a524682ccc32a25ce6
/frameworks/base/core/res/AndroidManifest.xml
|
2fd43ba63ef336f9e0edc9c742b85507c46b3bc9 |
|
23-Mar-2018 |
Suprabh Shukla <suprabh@google.com> |
Sending MY_PACKAGE_SUSPENDED to suspended apps Added new broadcast actions MY_PACKAGE_SUSPENDED and MY_PACKAGE_UNSUSPENDED, which are sent to the package that is affected by the suspend state change. A suspended package also receives a bundle of app extras to pass more information. This makes it easier for packages to deal with being suspended/unsuspended. Also updated some existing documentation to make it clearer. Test: atest com.android.server.pm.SuspendPackagesTest Bug: 75036698 Change-Id: I772cf0c023669bc946e07ced4ebccfa74f6835b2
/frameworks/base/core/res/AndroidManifest.xml
|
8808edb063650f4497e6a31f8fbe4d2bcbdf227f |
|
23-Mar-2018 |
Amith Yamasani <yamasani@google.com> |
Merge "Provide app launch count in UsageStats" into pi-dev
|
9753e774ce38bfe7f390f94c267b24c524616a2a |
|
23-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Hearing Aid Profile: set and get activeDevice" into pi-dev
|
0205fd10646785f6d573b487f8ad5f56470bff07 |
|
23-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add MANAGE_IPSEC_TUNNELS Permission" into pi-dev
|
6affc07065083468c5580b04d3572ef6acbb138c |
|
22-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "APIs to suspend packages with SUSPEND_APPS permission" into pi-dev
|
159788455c79fa47847d0c40fcee7aceff2551ae |
|
21-Mar-2018 |
Nathan Harold <nharold@google.com> |
Add MANAGE_IPSEC_TUNNELS Permission Add a new MANAGE_IPSEC_TUNNELS permission and protect all IPsec Tunnel mode APIs with it. This permission is only granted to the system or through an AppOp. Bug: 66955045 Test: compilation Change-Id: I0f618373b500c493ef2211bece681f74652a1833
/frameworks/base/core/res/AndroidManifest.xml
|
bc813eb26e3027856114a26312e36e4bad86bd86 |
|
21-Mar-2018 |
Amith Yamasani <yamasani@google.com> |
Provide app launch count in UsageStats This counts the number of times the app was launched from outside the app and ignores intra-app activity transitions. Introduce a new permission for registering to observe app usage. Fixes a bug where Settings couldn't force the app into another bucket if it was recently launched. Bug: 74335821 Fixes: 76100712 Test: Manual test using Settings Test: UsageStatsTest to verify permission change Change-Id: Ibd343c1cfa37089a3ac6fc30ba3194e21a9be499
/frameworks/base/core/res/AndroidManifest.xml
|
021b57ab8df0927aa1f78a2f3bb01d5e70594b1a |
|
09-Mar-2018 |
Suprabh Shukla <suprabh@google.com> |
APIs to suspend packages with SUSPEND_APPS permission Changed the existing hidden api setPackagesSuspendedAsUser to a system api setPackagesSuspended that can be called by apps with either MANAGE_USERS or SUSPEND_APPS permission. Additionally, the suspending app can now specify optional extra information meant to be used by the suspended apps and the launcher to deal with this state. The following other APIs are added: - isPackageSuspended(): Apps can query whether they are in a suspended state - @SystemApi getPackageSuspendedAppExtras(String): Apps with permission SUSPEND_APPS can get the appExtras passed to PM when suspending the app. - @SystemApi setPackageSuspendedAppExtras(String, PersistableBundle): Apps with permission SUSPEND_APPS can update app extras for a suspended package. - getPackageSuspendedAppExtras(): Apps can call to get the appExtras passed in to PM when they were suspended. Test: Can be run via: atest com.android.server.pm.PackageManagerSettingsTests atest com.android.server.pm.PackageUserStateTest atest com.android.server.pm.SuspendPackagesTest Bug: 74336673 Change-Id: I3b9ed2c8478b34ee2e8986f5f5fddb2839d102e3
/frameworks/base/core/res/AndroidManifest.xml
|
59ca9b5f87bc1248e845b729a740aeddc55d8854 |
|
22-Mar-2018 |
Dmitry Dementyev <dementyev@google.com> |
Update RECOVER_KEYSTORE permission documentation. Previous comment used outdated name for class managing recoverable keystore. Bug: 74976894 Test: none Change-Id: I44460014d0ac5817d48e16bf281d2bb4ffe06823
/frameworks/base/core/res/AndroidManifest.xml
|
01cee8e6862cabe5dd1d7bfebaa82fc5bb255ee6 |
|
21-Mar-2018 |
Ben Lin <linben@google.com> |
Merge "Add new Intent start a package's Open By Default page directly." into pi-dev
|
d7b359165968199e034bd46ca97526dbf719602d |
|
16-Mar-2018 |
Hansong Zhang <hsz@google.com> |
Hearing Aid Profile: set and get activeDevice Add setActiveDevice() for Hearing Aid Profile in SettingsLib Bug: 69623109 Test: robolectric test and manual test Change-Id: I70eafe030747053876e2ab8a125d5dd01c5e0eb9
/frameworks/base/core/res/AndroidManifest.xml
|
18e3eb816887156f40def1c14db434ddde9ec245 |
|
10-Mar-2018 |
Philip P. Moltmann <moltmann@google.com> |
Add SoundTriggerDetectionService The service is meant to replace the PendingIntent based API. Once all users of the PendingIntent based API switched the PendingIntent based API will be removed. To have as little as possible impact on the whole SoundTrigger framework the RemoteSoundTriggerDetectionService class implements the same interface as the PendingIntent based class. Hence the exising code has very little change. Further once the old code can be removed the amount of changed (and added) code is limited. The RemoteSoundTriggerDetectionService -> SoundTriggerDetectionService is a vanilla as possible service implementation. The special behaviors are: - The system holds a wakelock while service operations are in progress and the service is bound as foreground. Hence the service can e.g. listen to the microphone. - Service operations have a certain amount of time they are allowed to run. Once every operation is either finished or the the operation exceeded the allotted time, the system calls onStopOperation for each still pending operation. This is a similar model as for the commonly used JobService. Please note that if the time allowed for an operation is 15s and op1 was run as 0si, and op1 was run at 5s, the service is allowed to run until 20s. Hence _both_ onStopOperations will happen at 20s. This is done for ease of implementation but should not give the service more power than calling onStopOperation exactly 15s after each operation is triggered. - If an operation is done before the allotted time is reached, the service can declare the operation as finished manually by calling onOperationFinished. This is a call back into the system, hence a 'client' binder is sent to the service. If the operation is finished by calling this method onStopOperation will not be called. - As the service instance might be killed and restored between operations we add a opaque bundle 'params' to each operations. The users of the API can use this to send data from the start command to the operations. It can also just be set to null. The params are not meant to store changing state in between operations. Such state needs to be persisted using the regular methods (e.g. write it to disk) - A service can be used for multiple recognition sessions. Each recognition is uniquelity defined by its sound model UUID. Hence each operation gets at least tree arguments: Operation ID, sound mode UUID, params - As a small optimization the params are cached inside of the service instance. The time allowed for each operation is in a @SystemAPI global setting, so the service can make sure it finishes the operations before they are stopped. It might take some time to deliver the operations via the binder, hence it is not recommended to try to use every last ms of allotted time. Test: atest SoundTriggerDetectionServiceTest (added in separate CL) atest android.provider.SettingsBackupTest Change-Id: I47f813b7a5138a6f24732197813a605d29f85a93 Fixes: 73829108
/frameworks/base/core/res/AndroidManifest.xml
|
a5fd0294c76c1faa3479a2093ae3e5f0838791ad |
|
06-Mar-2018 |
Philip P. Moltmann <moltmann@google.com> |
Expose SoundTriggerManager and SoundTrigger APIs These APIs require a system permissions, hence SystemAPI. As SoundTrigger is now partially SystemApi and partially internal API a lot of @hide tags are needed to keep hiding the still internal classes, fields and methods. As SoundTrigger is heavily used via reflection no structural change to this class can be made. The MANAGE_SOUND_TRIGGER permission should be visible to the apps as the apps need to know which permission to request in their manifest. If it wouldn't be exposed it would just be a magic string. Test: built Change-Id: Ic93d67639e2605c26c961acdd827c14cb0a68f47 Bug: 73829108, 71981721
/frameworks/base/core/res/AndroidManifest.xml
|
bf1b57d856685243f677e1f1bd29866e637a16fb |
|
07-Mar-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #62342672: API Review: OPSTR_ACTIVATE_VPN SystemApi Add a new platform-only permission for being able to change app ops mode, so nothing outside of the platform can do this. Bug: 62342672 Test: Booted, ran, settings works, shell works, apps install Change-Id: I372e649c019a8f9b95919ff0da6f56612d7061c2
/frameworks/base/core/res/AndroidManifest.xml
|
3ed6c6330a47b7334881eb1412384e540913f095 |
|
13-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Expose the new brightness permissions as test APIs." into pi-dev
|
22db49485e7e708d75d6ba79fbb9c60f1dca1ff1 |
|
10-Mar-2018 |
Michael Wright <michaelwr@google.com> |
Expose the new brightness permissions as test APIs. Bug: 74332874 Test: atest BrightnessTest Change-Id: Icd341c8813a8f2e806db3f75d6b1f141b56b2911
/frameworks/base/core/res/AndroidManifest.xml
|
04782e277cf0dbb80c35f26880bbe3bb0d538576 |
|
10-Mar-2018 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Added ACTION_BATTERY_LEVEL_CHANGED" into pi-dev
|
805a5ecedb3da0ebd63e02fcaad4d122fc160ade |
|
08-Mar-2018 |
Jordan Liu <jminjie@google.com> |
Merge "Support ENVELOPE (EVENT DOWNLOAD - User activity) command" into pi-dev
|
70e7543066523da04931a52d8c6d8346ce87d376 |
|
02-Mar-2018 |
Fyodor Kupolov <fkupolov@google.com> |
Added ACTION_BATTERY_LEVEL_CHANGED Sent when the current battery level changes. It has EXTRA_EVENTS that carries a list of Bundle instances representing individual battery level changes with associated extras from ACTION_BATTERY_CHANGED Each event has EXTRA_EVENT_TIMESTAMP representing time when it occured. Test: manual Bug: 74020080 Change-Id: I993005950299c5298c9111ca51cc7717e1f029de
/frameworks/base/core/res/AndroidManifest.xml
|
9a2857d927c5a96dc6b25d6c6672a8c62820aef0 |
|
08-Mar-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Tag @SystemApi to ambient brightness stats API" into pi-dev
|
e1bdfc82867e1ddfa8ba23ac267e4426472d6a27 |
|
15-Sep-2017 |
Yoshiaki Naka <yoshiaki.naka@sony.com> |
Support ENVELOPE (EVENT DOWNLOAD - User activity) command The terminal shall send the ENVELOPE (EVENT DOWNLOAD - User activity) command to the UICC when some user activity like a key-press or touch is detected if the user activity event is a part of the current event list. This change allows the SIM Toolkit application to support that event. Please refer to the specification of SET UP EVENT LIST command described in ETSI TS 102.223. Bug: 65884891 Test: Confirmed the expected seq 1.1 of ETSI TS 102.384 TC 27.22.4.16 Change-Id: I7d3faa09cd4625db53bcfe21f90570389a4ea037
/frameworks/base/core/res/AndroidManifest.xml
|
23b73c45fb4d02feeafa61c27a865c1799b1d922 |
|
07-Mar-2018 |
Jason Monk <jmonk@google.com> |
Merge "Remove BIND_SLICE" into pi-dev
|
90eabcc288e7a4ef3ae726f89b9ae25a185c0603 |
|
01-Mar-2018 |
Peeyush Agarwal <apeeyush@google.com> |
Tag @SystemApi to ambient brightness stats API Bug: 72931803 Test: Manual Change-Id: I41ac5569e97cc33c57af55a37135a3f7617a2385 (cherry picked from commit 1584fa6f08fd1ea57237f80877848d33a9d70bce)
/frameworks/base/core/res/AndroidManifest.xml
|
0f73c659580a9a818eb5b0ed30ec6cde711b7188 |
|
06-Mar-2018 |
Jason Monk <jmonk@google.com> |
Remove BIND_SLICE Its not being used anymore and shouldn't be API. Test: update-api Fixes: 74240589 Change-Id: I27d8e3fa5e0570ff268e6160c683d7190c96ef9b
/frameworks/base/core/res/AndroidManifest.xml
|
296f80a539c99e1d8c9346fd6bf35d118c17d644 |
|
28-Feb-2018 |
Ben Lin <linben@google.com> |
Add new Intent start a package's Open By Default page directly. Bug: 74010481 Test: None Change-Id: I63ad4c834e38a718cf444ebc544ee3cb5f38c09d (cherry picked from commit 1c0e3451cdfee9acacb675c33db7c4dbb227b880)
/frameworks/base/core/res/AndroidManifest.xml
|
dd027b3ab2087f4ccaf4e9d72472327f27789a1d |
|
20-Jan-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #72116995: Add permission guarding Service#startForeground Now requires permission if targeting P. Note that this is a separate permission from the existing one that is required for instant apps to use foreground services. The reason for this is that their semantics are different (the instant apps permission is associated with an app op for control over what the app is allowed, while the regular app permission is just a normal permission that is always granted and only there for auditing of apps), and there are probably going to be cases where a developer will want to use a foreground service in the full version of their app but not as an instant app. Bug: 72116995 Test: atest CtsAppTestCases Change-Id: I883c9515c307ed8e39f0bf888c4045944c8183ac
/frameworks/base/core/res/AndroidManifest.xml
|
988234a3437c815f5fdc50c5642e4fcfeb30a0a2 |
|
14-Feb-2018 |
Felipe Leme <felipeal@google.com> |
Removed AMS.updatePersistableUriPermission() Bug: 72055774 Test: manual verification Test: atest CtsAppSecurityHostTestCases:ScopedDirectoryAccessTest#testResetDoNotAskAgain,testResetGranted Test: atest CtsAppSecurityHostTestCases:ScopedDirectoryAccessTest Change-Id: I90cd9a79a1caa19989e00dbc1a656469bc3221f9
/frameworks/base/core/res/AndroidManifest.xml
|
93891ea8aa192dfb9d24631c3c90235a00bb6577 |
|
22-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Split query permission from update permission"
|
2ebb02123122d6ef3b0cf5c115c2ea4e19319496 |
|
21-Feb-2018 |
Makoto Onuki <omakoto@google.com> |
Merge "Shortcut permissions for default text classifier"
|
700feef8a60e06784d28d1db9502e650df854cad |
|
15-Feb-2018 |
Makoto Onuki <omakoto@google.com> |
Shortcut permissions for default text classifier - Add two shortcut related permissions as SystemAPI for the default text classifier. - The default text classifier package name still comes from the system resource. Bug: 73083596 Bug: 71555985 Test: atest CtsPermission2TestCases Test: Manual test with a test package, with the following in config.xml <string name="config_defaultTextClassifierPackage" translatable="false">com.example.android.pm.shortcutlauncherdemo</string> Change-Id: I19081d9d6ba0b33eb25d19aa55b4fe2f26a75897
/frameworks/base/core/res/AndroidManifest.xml
|
2d20fb47f4a7162450f993728876c74762b93112 |
|
09-Feb-2018 |
Svetoslav Ganov <svetoslavganov@google.com> |
APIs to watch active op changes System singed components can watch for starting/finishing of long running app ops. Also protected the APIs to watch op mode changes with a singature permission for the cross-uid use case. Test: atest com.android.server.appops.AppOpsActiveWatcherTest bug:64085448 Change-Id: Id7fe79ce1de4c5690b4f52786424ec5a5d9eb0fa
/frameworks/base/core/res/AndroidManifest.xml
|
699debe2cad5be09fba1907e2a38d791888a0257 |
|
15-Feb-2018 |
Jakub Pawlowski <jpawlowski@google.com> |
Merge "Hearing Aid profile" am: aca4460b64 am: edb16b0f4b am: 44197bd188 Change-Id: Idd601780e2e9483324dbf2e317c925daa78fa049
|
44197bd1883588959e4efef16bff84e3e937edd9 |
|
15-Feb-2018 |
Jakub Pawlowski <jpawlowski@google.com> |
Merge "Hearing Aid profile" am: aca4460b64 am: edb16b0f4b Change-Id: Ica92a9ffecb205f07288139970cd83f578ef7669
|
ea580fa1d1900c3b771cf24ee2dc13d14c0b8ee5 |
|
22-Nov-2017 |
Jakub Pawlowski <jpawlowski@google.com> |
Hearing Aid profile This is implementation of Hearing Aid Profile that will in future be connected to Bluetooth Manager - see TODOs in BluetoothHearingAid.java Bug: 69623109 Test: compilation. Manual test with HA. Change-Id: I79643ea1e14e9df7f5771169359c964a60c56618
/frameworks/base/core/res/AndroidManifest.xml
|
02d43443d0b42df178036474e23728af71463938 |
|
14-Feb-2018 |
Holly Jiuyu Sun <jiuyu@google.com> |
Merge "Public EuiccManager APIs." am: 42339c464f am: cddc0c12cc Change-Id: I01d436c16df678292c8aec1f3ea2d7a65f3e10dd
|
052fbabc35c35273fe44e8ebb0772ba2259f5db7 |
|
13-Dec-2017 |
Holly Jiuyu Sun <jiuyu@google.com> |
Public EuiccManager APIs. Public EuiccManager and other related necessary files. Mark EuiccCardManager and other related necessary files as @SystemApi. Solve lint errors and warnings. Bug: 35851809 Test: test on phone Change-Id: I8a2c78804cae56b679d311d613edca5be4bc2522 Merged-In: I68853e134e1e31fa9b91a83af6c491a2a8cca971
/frameworks/base/core/res/AndroidManifest.xml
|
ceb94979e32b20496c64f6f454b4f1dbe1856341 |
|
12-Feb-2018 |
Qingxi Li <qingxi@google.com> |
Merge "Public EuiccManager APIs."
|
8dddeb98f5ce685eab6f8c876c77578e0955dd77 |
|
12-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Revert "Fix issue #72116995: Add permission guarding Service#startForeground""
|
d3905e654452c68390835e31fcb752884e57a67b |
|
12-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Fix issue #72151749: Lock down 'clear cache' functionality to..."
|
0b4add68db8e5e2ed4f43a651a55574917fcf551 |
|
12-Feb-2018 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Fix issue #72116995: Add permission guarding Service#startForeground" This reverts commit a9da85fde4675ed0b03557e448b1cc67f1d391fe. Reason for revert: b/73224471 Bug: 73224471 Bug: 72116995 Change-Id: I1485305f40d47fdb138cb1e484c329cf20892a6b
/frameworks/base/core/res/AndroidManifest.xml
|
b214bc44f1942b957f60dad75517e07cede77f18 |
|
18-Dec-2017 |
Neil Fuller <nfuller@google.com> |
Split query permission from update permission Split time zone rules query permission from update permission. This would allow an app like Settings to determine the current rules update state, which would enable it to show the version of rules the device came with, if there have been any updates and whether a reboot is needed for changes to take effect. Test: PTS: run -m PtsTimeZoneTestCases Test: atest FrameworksServicesTests:RulesManagerServiceTest Bug: 69443060 Change-Id: Ia5d31814d7caee842f5e28870fab61f7c7129386
/frameworks/base/core/res/AndroidManifest.xml
|
d93e8866a3daf67b2eeea15ed8b88411b9119d26 |
|
12-Feb-2018 |
Neil Fuller <nfuller@google.com> |
Merge "Add support for time zone notifications"
|
20b5dec9d3dce2e4ca09318f36e302b75ab07460 |
|
12-Feb-2018 |
Baisheng Zheng <baisheng@google.com> |
Merge "Add dedicated signature permissions to platform manifest and shell manifest which could enable/disable BT and Wifi state on watch"
|
f62d869ea5af629544215b06b95c3471f0829c9c |
|
25-Jan-2018 |
baisheng <baisheng@google.com> |
Add dedicated signature permissions to platform manifest and shell manifest which could enable/disable BT and Wifi state on watch Skip Bluetooth consent UI if running on shell, also fix a typo in log message. Test: Manual test running `adb root; adb shell service call bluetooth_manager 6` and see if BT is on without consent UI. Bug: 69872231 Change-Id: Ie513794a7fc13041259fd84734bfc651495ba5cf
/frameworks/base/core/res/AndroidManifest.xml
|
1b794faeace9e992a33b2d8bbd9a56836c459135 |
|
09-Feb-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #72151749: Lock down 'clear cache' functionality to... ...only system signature Apps that hold the original permission are silently ignored. There is a new internal permission you must hold to actually delete cache files. Test: booted and run, can still clear cache in settings. Bug: 72151749 Change-Id: I47a5cb697e1a4fa3665ac71aaabcda57bef7b561
/frameworks/base/core/res/AndroidManifest.xml
|
27b3cad2574c2058147b60859435988aca5afb6b |
|
09-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Fix issue #72116995: Add permission guarding Service#startForeground"
|
57fccd61a53b962f568235dccf9e8bc23005a41b |
|
25-Jan-2018 |
Adam Lesinski <adamlesinski@google.com> |
Send broadcast to pkg installers on config change Send a protected system broadcast to apps that hold the INSTALL_PACKAGES permission whenever a change to properties like locale or display density happens. Receivers can be registered in the manifest, and a process will be woken up to receive the broadcast. This will happen rarely, since the configuration changes eligible to trigger this broadcast are rare themselves. Bug: 63918966 Test: manual Change-Id: I817a51ea05f762e02561691825d57d643db7dc30
/frameworks/base/core/res/AndroidManifest.xml
|
4f73b9c09ac6ae73c22ad02872e362c817ab2d4c |
|
13-Dec-2017 |
Holly Jiuyu Sun <jiuyu@google.com> |
Public EuiccManager APIs. Public EuiccManager and other related necessary files. Mark EuiccCardManager and other related necessary files as @SystemApi. Solve lint errors and warnings. Bug: 35851809 Test: test on phone Change-Id: I68853e134e1e31fa9b91a83af6c491a2a8cca971
/frameworks/base/core/res/AndroidManifest.xml
|
d3bb4aed78b75365fc0d18fc31750d86404a1f47 |
|
08-Feb-2018 |
Jiuyu Sun <jiuyu@google.com> |
Revert "Public EuiccManager APIs." This reverts commit af6a5fffdc5ef30065f8bc2d1280bbd87eae3c64. Reason for revert: <INSERT REASONING HERE> Change-Id: Id3296a91e5c3ad624a6a03f6532b859524a518bf
/frameworks/base/core/res/AndroidManifest.xml
|
a9da85fde4675ed0b03557e448b1cc67f1d391fe |
|
20-Jan-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #72116995: Add permission guarding Service#startForeground Now requires permission if targeting P. Note that this is a separate permission from the existing one that is required for instant apps to use foreground services. The reason for this is that their semantics are different (the instant apps permission is associated with an app op for control over what the app is allowed, while the regular app permission is just a normal permission that is always granted and only there for auditing of apps), and there are probably going to be cases where a developer will want to use a foreground service in the full version of their app but not as an instant app. Bug: 72116995 Test: atest CtsAppTestCases Change-Id: I95afb7185742b82c525e775ca20bb36015510b43
/frameworks/base/core/res/AndroidManifest.xml
|
af6a5fffdc5ef30065f8bc2d1280bbd87eae3c64 |
|
13-Dec-2017 |
Holly Jiuyu Sun <jiuyu@google.com> |
Public EuiccManager APIs. Public EuiccManager and other related necessary files. Mark EuiccCardManager and other related necessary files as @SystemApi. Solve lint errors and warnings. Bug: 35851809 Test: test on phone Change-Id: Id7895f9b35ce9d4fb6fae42ba89ca9b29dbfa74c
/frameworks/base/core/res/AndroidManifest.xml
|
d7672c6f49e9afce638a973425e5c5e1f5279431 |
|
07-Feb-2018 |
Malcolm Chen <refuhoo@google.com> |
Merge "Add strings and carrier config needed network service." am: a3ccb8d854 am: 0c2a5852f5 Change-Id: I51a4792545c4fb06611681ef2f4ca1183f2fd61a
|
33ea16b61526f12c6c4f4807c907eb52c7fcb7f4 |
|
05-Feb-2018 |
Patrick Baumann <patb@google.com> |
IntentForwarderActivity visible to instant apps Prior to this change, attempts to resolve to an app in a managed profile would result in a PackageManagerService crash as it replaced the resolved results with the forwarding activity, which wasn't visible to the calling instant app. This would result in a null ActivityInfo when querying getActivityInfo. This change makes the forward activity visible to instant apps so that in this case, the resolve info can be properly populated. Change-Id: Ib1336e561f966bde7a1f429ad71bae2e2c69bb5e Fixes: 67489723 Test: manual - query and start from instant app in personal and work profile
/frameworks/base/core/res/AndroidManifest.xml
|
789289d7311b80d4e048502a1f33ab9fc8da39f1 |
|
30-Jan-2018 |
Malcolm Chen <refuhoo@google.com> |
Add strings and carrier config needed network service. Add resource overlay and carrier config which will determine which package / network services will be bound to. Bug: 64132030 Test: regression tests Change-Id: I5f515ec16b712e7be25f69e0e079d672227542b0 Merged-In: I5f515ec16b712e7be25f69e0e079d672227542b0
/frameworks/base/core/res/AndroidManifest.xml
|
1bb9f29909016aa3be7ebe7ef52558d219696186 |
|
05-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Autofill compatibility mode."
|
1b368de8327b1c19d0a4a50b3b9c098cbd32d293 |
|
04-Feb-2018 |
Xiangyu/Malcolm Chen <refuhoo@google.com> |
Merge "Add strings and carrier config needed network service."
|
c7dc046e0ec62f2c01ae4e3473bfea6b5640fc93 |
|
03-Feb-2018 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Polished rapid data usage alerting."
|
bfb43ea9e684e62644cecf7f037c4087bfaa1e0f |
|
03-Feb-2018 |
Jeff Sharkey <jsharkey@android.com> |
Polished rapid data usage alerting. Switch to reading limit information from NetworkPolicy, which is typically populated from SubscriptionPlan. This lets users have direct control over the limits we're using to trigger rapid usage alerts, and makes the feature work without requiring that the carrier wire up SubscriptionPlan information. Let the user "snooze" the rapid usage alerting for a day at a time, so we're less annoying to them. Send the snooze broadcasts as foreground, so that we don't re-post notifications while working through a long background broadcast queue. Fix notifications to use the "ALERTS" channel, since these alerts really are higher priority than simple "STATUS" updates; this also gives us HUN behavior when in full-screen apps. Update both service and unit tests to work directly with NotificationManager, instead of the raw AIDL. Test: bit FrameworksServicesTests:com.android.server.NetworkPolicyManagerServiceTest Bug: 72444638, 72436702 Change-Id: I8d9138522a7779cc68eb9fa4777b50facb6567b7
/frameworks/base/core/res/AndroidManifest.xml
|
325b8bdb3a252b85380d35d70d70d67268829f4e |
|
03-Feb-2018 |
Jack Yu <jackyu@google.com> |
Merge "Added permission for binding data service" am: 0276f4290f am: f5d3e300b3 Change-Id: Id159d6a83658e5c2fa1b22fd27459287cc37bff3
|
24c90450fe3fe097a7bca51edd6a4cffd8fd13aa |
|
28-Dec-2017 |
Svetoslav Ganov <svetoslavganov@google.com> |
Autofill compatibility mode. Autofill helps users fill credentials, addresses, payment methods, emails, etc without manually typing. When focus lands on a fillable element the platform captures a snapshot of the screen content and sends it to an autofill service for analysis and suggestions. The screen snapshot is a structured representation of the screen content. If this content is composed of standard widgets, autofill works out-of-the-box. However, some apps do their own rendering and the content in this case looks like a single view to the platform while it may have semantic structure. For example, a view may render a login page with two input test fields. The platform exposes APIs for apps to report virtual view structure allowing autofill services to handle apps that have virtual content. As opposed to apps using standard widgets, this case requires the app developer to implement the new APIs which may require a fair amount of code and could be seen as a processes that could take some time. The most prominent typs of apps that fall into this category are browsers. Until most apps rendering virtual content and specifically browsers don't implement the virutal APIs, autofill providers need to fall- back to using the accessibliity APIs to provide autofill support for these apps. This requires developers to work against two sets of APIs - autofill and accessibility - which is incovenient and error prone. Also, users need to enable two plugins - autofill and accessibility which is confusing. Additionally, the privacy and perfomance impact of using the accessibility APIs cannot be addressed while autofill providers need to use thes APis. This change adds an autofill compatibility mode that would allow autofill services to work with apps that don't implement the virtual structure autofill APIs. The key idea is to locally enable accessibility for the target package and remap accessibility to autofill APIs and vise versa. This way an autofill provider codes against a single set of APIs, the users enable a single plugin, the privacy/performance implications of using the accessibility APIs are addressed, the target app only takes a performance hit since accessibility is enabled locally which is still more efficient compared to the performance hit it would incur if accessibility is enabled globally. To enable compatibility mode an autofill service declares in its metadata which packages it is interested in and also what is the max version code of the package for which to enable compat mode. Targeted versioning allows targeting only older versions of the package that are known to not support autofill while newer versions that are known to support autofill would work in normal mode. Since compatibility mode should be used only as a fallback we have a white list setting with the packages for which this mode can be requested. This allows applying policy to target only apps that are known to not support autofill. Test: cts-tradefed run cts-dev -m CtsAutoFillServiceTestCases cts-tradefed run cts-dev -m CtsAccessibilityServiceTestCases bug:72811034 Change-Id: I11f1580ced0f8b4300a10b3a5174a1758a5702a0
/frameworks/base/core/res/AndroidManifest.xml
|
ec1022121b8cb5273d0e610f295a7348705c5d25 |
|
30-Jan-2018 |
Malcolm Chen <refuhoo@google.com> |
Add strings and carrier config needed network service. Add resource overlay and carrier config which will determine which package / network services will be bound to. Bug: 64132030 Test: regression tests Change-Id: I5f515ec16b712e7be25f69e0e079d672227542b0
/frameworks/base/core/res/AndroidManifest.xml
|
568b81ac3f664da6e24534ae31f5eba861dd8df6 |
|
02-Feb-2018 |
Jack Yu <jackyu@google.com> |
Renamed BIND_DATA_SERVICE to BIND_TELEPHONY_DATA_SERVICE Also grated the permission to the phone process. Test: Manual Bug: 64132030 Change-Id: I1fc82a4e8038b1b05b56dcfa43c0c94955967700
/frameworks/base/core/res/AndroidManifest.xml
|
87b69637400e5d27d7ba37331e5c36cc0ffbcfbd |
|
01-Feb-2018 |
Jack Yu <jackyu@google.com> |
Added permission for binding data service This is to make sure only the system can bind the data service. Test: Manual Bug: 64132030 Merged-In: Iaf4e4a604396ec37c83516f1d1f163614ef23c3d Change-Id: Iaf4e4a604396ec37c83516f1d1f163614ef23c3d
/frameworks/base/core/res/AndroidManifest.xml
|
8a1b786d4051607755ad4ced29f7f4961476a073 |
|
02-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Added permission for binding data service"
|
30295ad8f221a197f1e92b0302bcaee4bf33f52c |
|
01-Feb-2018 |
Jack Yu <jackyu@google.com> |
Added permission for binding data service This is to make sure only the system can bind the data service. Test: Manual Bug: 64132030 Change-Id: Iaf4e4a604396ec37c83516f1d1f163614ef23c3d
/frameworks/base/core/res/AndroidManifest.xml
|
9d3986bdc3b9fe5a85a54bf6a4f787e198eade40 |
|
01-Feb-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add Ambient Brightness tracker API"
|
b144227742ada7fd693684a5bd2d53abd8e7c499 |
|
18-Dec-2017 |
Neil Fuller <nfuller@google.com> |
Add support for time zone notifications Add support for time zone notifications to RulesManagerService. This change adds new intents that are broadcast after a time zone rules update is staged / unstaged. This will allow another component on the device to handle notifications telling the user to restart the device. Bug: 69443060 Test: atest FrameworksServicesTests Test: Manual install Change-Id: I4fc4b5715380d84d87cdb43c05aee2f8f9c5d277
/frameworks/base/core/res/AndroidManifest.xml
|
cc155ddc69efce0579118e873ae991cebc083ca6 |
|
10-Jan-2018 |
Peeyush Agarwal <apeeyush@google.com> |
Add Ambient Brightness tracker API Test: atest com.android.server.display.AmbientBrightnessStatsTrackerTest && atest android.hardware.display.AmbientBrightnessDayStatsTest Bug: 69406079 Change-Id: I4b13c6bdd3e9fdded8086371f46dba0fd3102b98
/frameworks/base/core/res/AndroidManifest.xml
|
8420d5e596663a9478ce73a7187d0fc8040781b5 |
|
31-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Introduce a TextClassifierManagerService."
|
d7e0860b4359c8696f9f77473a222a13f34af0e1 |
|
31-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Re-added support for deprecated BIND_AUTOFILL permission."
|
87b7f8f1b89b6e494fead8a3705f58c1d5493b14 |
|
30-Jan-2018 |
Felipe Leme <felipeal@google.com> |
Re-added support for deprecated BIND_AUTOFILL permission. This permission was renamed during the O previews but it was supported on the final O release, so we need to carry it over. Test: atest CtsAutoFillServiceTestCases Bug: 70682223 Change-Id: I2b3d798fe9c09751138f154e6e69e6af6b60dbb1
/frameworks/base/core/res/AndroidManifest.xml
|
83a6df5b070dc5dfddb62abf6c40a074ac98410d |
|
30-Jan-2018 |
Tyler Gunn <tgunn@google.com> |
Merge "Add handover permission, fill in some missing API gaps." am: 1dfa830bb0 am: ed4dd9fbc6 Change-Id: I2f04ac80df28e45d1bb9f8e55b45317752d61bd6
|
1dfa830bb02f9b30a510e8c487238e6328d2bebc |
|
30-Jan-2018 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Add handover permission, fill in some missing API gaps."
|
d32906c202db3b84151c310ecd89a07bb41208f7 |
|
18-Jan-2018 |
Abodunrinwa Toki <toki@google.com> |
Introduce a TextClassifierManagerService. Apps wanting to use a TextClassifier service (instead of an in-app-process TextClassifier) bind to this service. The service binds to and reroutes calls to a configured system TextClassifierService. TextClassifierManagerService manages the lifecycle of the configured TextClassifierService and binds/unbinds to preserve system health. A configurable TextClassifierService extends TextClassifierService, declares an android.textclassifier.TextClassifierService intent, and requires a permission that is only granted to the system so only the system may bind to it. The TextClassifierManagerService implements a similar interface to TextClassifierService (i.e. ITextClassifierService) but doesn't have to. This is done for simplicity sake and things may change in the future. The configuration of the default service is in config.xml. OEMs may change this with a config overlay. If no TextClassifierService is specified, the default in app process TextClassifierImpl is used. Bug: 67609167 Test: bit FrameworksCoreTests:android.view.textclassifier.TextClassificationManagerTest Test: tbd Change-Id: I8e7bd6d12aa1a772897529c3b12f47f48757cfe6
/frameworks/base/core/res/AndroidManifest.xml
|
087fc33b05dcf733db150463d04c0a9066d00f87 |
|
30-Jan-2018 |
Alison Cichowlas <asc@google.com> |
Merge "Revert "Security model for moving sharesheet to systemui""
|
76f0ccb5f1079040b28505e48fe8822b88d474f1 |
|
29-Jan-2018 |
Alison Cichowlas <asc@google.com> |
Revert "Security model for moving sharesheet to systemui" This reverts commit 88f3d4dbe1dbc08316d8a9e25edce1ad16fe2eab. Bug: 72554856 Test: repro instructions in bug
/frameworks/base/core/res/AndroidManifest.xml
|
ffe2a9c4c85af3bdbc6a99dfc800202bfd51027c |
|
29-Jan-2018 |
Ruchi Kandoi <kandoiruchi@google.com> |
Merge "Add android.Manifest.permission.NFC_TRANSACTION_EVENT" am: ac2247c406 am: 626f665a65 am: 8142017f62 Change-Id: I7ef07b3aa3a59f510a7a5e897d134707c04f675b
|
8142017f62a93f636a3e72dbb0d18302173fe9dd |
|
29-Jan-2018 |
Ruchi Kandoi <kandoiruchi@google.com> |
Merge "Add android.Manifest.permission.NFC_TRANSACTION_EVENT" am: ac2247c406 am: 626f665a65 Change-Id: I562b46b71416406e2640fc84f7b6a064327a7ca8
|
62c46eac8e3c769fed400580f555f1fb878e99fd |
|
03-Jan-2018 |
Ruchi Kandoi <kandoiruchi@google.com> |
Add android.Manifest.permission.NFC_TRANSACTION_EVENT This permission would gate if an application is eligible to receive notifications about nfc transactions taking place on the Secure Elements. Bug: 72556384 Test: Test dummy notifications on sample app. Change-Id: I233f7185bbc3a5511f79ae012cc60a081968eb99
/frameworks/base/core/res/AndroidManifest.xml
|
fbf5892f1584dab4e3433a904be30208583c1c3c |
|
26-Jan-2018 |
Ben Gruver <bgruv@google.com> |
Merge "Implement UI for warn-on-launch"
|
9add1b8c1b8bbad2c0dea88733d95d078d125271 |
|
26-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Revert "Fix issue #72116995: Add permission guarding Service#startForeground""
|
858bfaf79c97e000af68649970994ee16bdd08ac |
|
23-Jan-2018 |
Tyler Gunn <tgunn@google.com> |
Add handover permission, fill in some missing API gaps. Adding the ACCEPT_HANDOVER runtime permission which an app must have in order to accept handovers (this is per design). Adding missing onHandoverComplete method in the android.telecom.Connection API (per design). Finishing plumbing for android.telecom.Call#onHandoverComplete API. Fix issue where the new handover API methods would never get called; the legacy handover extra was being used in this case when it should not have been. Bug: 65415068 Test: Verified using new CTS tests Change-Id: If1558f6a23911862c02ac5b18fb62d86911ed7e2 Merged-In: If1558f6a23911862c02ac5b18fb62d86911ed7e2
/frameworks/base/core/res/AndroidManifest.xml
|
0eb58ae39d88a2fbfecabae8b10a4be5e4ebcc8c |
|
26-Jan-2018 |
Bookatz <bookatz@google.com> |
Statsd broadcasts when it is alive 2 Continuation of ag/3508513. Test: manually made sure the broadcast was sent Bug: 70389379 Bug: 72450885 Change-Id: Ib49c5e967d3c8e31ef127347afa450ce8c5e170b
/frameworks/base/core/res/AndroidManifest.xml
|
c2cbc0727aa942ad5ed6f703135a65e4681e3601 |
|
25-Jan-2018 |
Dianne Hackborn <hackbod@google.com> |
Revert "Fix issue #72116995: Add permission guarding Service#startForeground" This reverts commit 994b5ad737831854ac3ba119abba533adca774fc. Waiting for Chrome prebuilt. Test: NA Bug: 72116995 Change-Id: Ifcfea94ddefda27267640283038c9d0f933ea1d8
/frameworks/base/core/res/AndroidManifest.xml
|
79bc1ec8a927149714100b993faa572cefea8965 |
|
23-Jan-2018 |
Tyler Gunn <tgunn@google.com> |
Add handover permission, fill in some missing API gaps. Adding the ACCEPT_HANDOVER runtime permission which an app must have in order to accept handovers (this is per design). Adding missing onHandoverComplete method in the android.telecom.Connection API (per design). Finishing plumbing for android.telecom.Call#onHandoverComplete API. Fix issue where the new handover API methods would never get called; the legacy handover extra was being used in this case when it should not have been. Bug: 65415068 Test: Verified using new CTS tests Change-Id: If1558f6a23911862c02ac5b18fb62d86911ed7e2
/frameworks/base/core/res/AndroidManifest.xml
|
c7ffbe636accef2f52ebc264a7a06b3049b0a05f |
|
19-Jan-2018 |
Ben Gruver <bgruv@google.com> |
Implement UI for warn-on-launch Bug: 63909431 Test: atest CtsHarmfulAppWarningHostTestCases Change-Id: Icabe31f3fb04692bac0313cbeb1cafb64388d5f1
/frameworks/base/core/res/AndroidManifest.xml
|
8b4e2ddc414ac9420f95487377eb83ddf22da324 |
|
24-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Slider always represents absolute brightness"
|
b46faf35c86e627f20a00e8b9c2c860ad4def1fb |
|
17-Jan-2018 |
arangelov <arangelov@google.com> |
Notify DO after PO ownership transfer when they belong to affiliated users. Test: Locally modified TransferDPC to print the callback after manually setting DO, PO and then transfering PO owner. Bug: 72218214 Change-Id: I6c9af00bcfa703c81d9d5b35fe534c928991ff93
/frameworks/base/core/res/AndroidManifest.xml
|
994b5ad737831854ac3ba119abba533adca774fc |
|
20-Jan-2018 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #72116995: Add permission guarding Service#startForeground Now requires permission if targeting P. Note that this is a separate permission from the existing one that is required for instant apps to use foreground services. The reason for this is that their semantics are different (the instant apps permission is associated with an app op for control over what the app is allowed, while the regular app permission is just a normal permission that is always granted and only there for auditing of apps), and there are probably going to be cases where a developer will want to use a foreground service in the full version of their app but not as an instant app. Bug: 72116995 Test: atest CtsAppTestCases Change-Id: If5a79e7ed5ab9e0edc77410315eb4d2df8ac850b
/frameworks/base/core/res/AndroidManifest.xml
|
d997d191edf668de177496e4e00e69d7d3c6b001 |
|
24-Jan-2018 |
Geoffrey Pitsch <gpitsch@google.com> |
Merge "Security model for moving sharesheet to systemui"
|
d846023804ddadcd692666152db420c54594ddb9 |
|
16-Jan-2018 |
Michael Wright <michaelwr@google.com> |
Slider always represents absolute brightness Currently the slider represents a gamma adjustment to the brightness curve when auto brightness is enabled and the absolute screen brightness when it's not. This is a fairly confusing behavior to most people, so this consolidates them to a single behavior: the slider always represents the current brightness and auto-brightness will automatically adjust it. This also moves a bunch of the brightness methods from PowerManager over to DisplayManager, since it's really the DisplayPowerController that's responsible for determining and setting the display brightness. Test: atest com.android.server.display.BrightnessMappingStrategyTest Bug: 69406898 Change-Id: I73b5982809a94cd50d563426a72d7965e923c994
/frameworks/base/core/res/AndroidManifest.xml
|
d12ad36399e271b00d3aa0e98e07c2321e5fd0b2 |
|
24-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add broadcast when notification block state changes"
|
4ee9a3e9287a76fd83f1a3ed760ac6054d738976 |
|
24-Jan-2018 |
Eric Schwarzenbach <easchwar@google.com> |
Merge "Make Wifi Wake onboarding broadcasts protected."
|
88f3d4dbe1dbc08316d8a9e25edce1ad16fe2eab |
|
22-Nov-2017 |
Geoffrey Pitsch <gpitsch@google.com> |
Security model for moving sharesheet to systemui ResolverActivity (still in frameworks) now requests a "permission token" that it hands to a stubbed system ui activity ChooserActivity. This permission token allows an app (SysUI) with the signed permission "START_ACTIVITY_AS_CALLER" to call ActivityManagerService#startActivityAsCaller. Permission tokens are a one-time use, limited-time offer. Test: runtest systemui && manual testing Bug: 69850752 Change-Id: I3600e1a8ff9eea7397f5f59853423c79b6401f98
/frameworks/base/core/res/AndroidManifest.xml
|
fc9767b8457cac6da10a938c71c0f1f29853d8f8 |
|
22-Jan-2018 |
Julia Reynolds <juliacr@google.com> |
Add broadcast when notification block state changes At the app level, to match channel and group broadcasts. Test: runtest systemui-notification Bug: 63927402 Change-Id: If6bf8b468f90fe5ed225ea136425104a418d4974
/frameworks/base/core/res/AndroidManifest.xml
|
e36211c2326696398ce1e3080945fb69c28a7794 |
|
23-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add update packages permission"
|
c6f994207dc7ec1e699415526c71dd96ec24f6b2 |
|
22-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add pending system update info system APIs."
|
82f09bcf93cc2e0f9a363f40bf8a64bcaa6d8b9f |
|
13-Jan-2018 |
Svet Ganov <svetoslavganov@google.com> |
No camera for idle uids - framework If a UID is idle (being in the background for more than cartain amount of time) it should not be able to use the camera. If the UID becomes idle we generate an eror and close the cameras for this UID. If an app in an idle UID tries to use the camera we immediately generate an error. Since apps already should handle these errors it is safe to apply this policy to all apps to protect user privacy. Test: Pass - cts-tradefed run cts -m CtsCameraTestCases Added - CameraTest#testCameraAccessForIdleUid Change-Id: If6ad1662f2af6592b6aca1aeee4bd481389b5e00
/frameworks/base/core/res/AndroidManifest.xml
|
f762496b7f51f7b00bcb624ecac94a0d72d0b711 |
|
17-Jan-2018 |
Jason Monk <jmonk@google.com> |
Slices permission model - Launcher/assistant get access to all slices - Apps with uri access to access a specific slice - Apps without access get a permission granting slice - If the user authorizes access to the slice for the app then the app will be granted access to the app's slices (this happens through a temp grant in the service, and a full uri grant from the app the next time it binds) - Add a hint that apps to add to allow them to return different slices depending on the caller, this allows custom permission checks. Test: runtest --path frameworks/base/services/tests/uiservices Bug: 68751119 Change-Id: I8f8cd0182cfcbfba3f307e2eaba5aae6f6fbe214
/frameworks/base/core/res/AndroidManifest.xml
|
57eb94358527242b4265e59f277ef262af2df17d |
|
20-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Don't record audio if UID is idle - framework"
|
0116f7cbe449394e5d31778eb1c716aafb2803be |
|
20-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "No sensor access to idle UIDs - framework"
|
07342dc1755706d26e614e18fa5ab3b32c435d38 |
|
25-Jan-2017 |
Tao Bao <tbao@google.com> |
Add pending system update info system APIs. This CL adds system APIs in android.os.SystemUpdateManager. The APIs allow system updater apps (RECOVERY permission required) to publish the pending system update information, and allow other apps to query the info accordingly (requiring RECOVERY or READ_SYSTEM_UPDATE_INFO permission). Design doc in go/pi-ota-platform-api. Bug: 67437079 Test: Use test apps to call the new APIs to query and set the update info respectively. Change-Id: Id54b4a48d02922d2abd906dd7e2ec80a656fc9b1
/frameworks/base/core/res/AndroidManifest.xml
|
bc055b0ef1c11337b8ec5f681097e7b51e84b9c4 |
|
06-Jan-2018 |
Felipe Leme <felipeal@google.com> |
Moved Field Classification score logic to ExtServices. Bug: 70939974 Test: atest CtsAutoFillServiceTestCases:FieldsClassificationTest \ CtsAutoFillServiceTestCases:UserDataTest Test: atest CtsAutoFillServiceTestCases Change-Id: I75fd59b5d7530fcd7095b26f6e592d7459c7d235
/frameworks/base/core/res/AndroidManifest.xml
|
c1006a335f67788b6874373035cb9215dba781f2 |
|
16-Jan-2018 |
Svet Ganov <svetoslavganov@google.com> |
Don't record audio if UID is idle - framework To protect user's privacy if a UID is in an idle state we allow recording but report silence (all zeros in the byte array) and once the process goes in an active state we report the real mic data. This avoids the race between the app being notified aboout its lifecycle and the audio system being notified about the state of a UID. Test: Added - AudioRecordTest#testRecordNoDataForIdleUids Passing - cts-tradefed run cts-dev -m CtsMediaTestCases -t android.media.cts.AudioRecordTest bug:63938985 Change-Id: I8b0a0889c4aee07f4e1d3c7e4cee0821f2f8cd91
/frameworks/base/core/res/AndroidManifest.xml
|
7e269fca403581f19bfa8dbcffb039fbe40dd48d |
|
17-Jan-2018 |
Jorim Jaggi <jjaggi@google.com> |
Merge changes from topic "remote_animations" * changes: Remote animations (app-controlled animations) Defer hiding clients until animation is done
|
33a701a55c28dd20390acee1ba7881a500830d7d |
|
01-Dec-2017 |
Jorim Jaggi <jjaggi@google.com> |
Remote animations (app-controlled animations) Adds the ability for another app to control an entire app transition. It does so by creating an ActivityOptions object that contains a RemoteAnimationAdapter object that describes how the animation should be run: Along of some meta-data, this object contains a callback that gets invoked from WM when the transition is ready to be started. Window manager supplies a list of RemoteAnimationApps into the callback. Each app contains information about the app as well as the animation leash. The controlling app can modify the leash like any other surface, including the possibility to synchronize updating the leash's surface properties with a frame to be drawn using the Transaction.deferUntil API. When the animation is done, the app can invoke the finished callback to get WM out of the animating state, which will also clean up any closing apps. We use a timeout of 2000ms such that a buggy controlling app can not break window manager forever (duration subject to change). Test: go/wm-smoke Test: RemoteAnimationControllerTest Bug: 64674361 Change-Id: I34e0c9a91b28badebac74896f95c6390f1b947ab
/frameworks/base/core/res/AndroidManifest.xml
|
8bd1395881446e807924d6f320966d7c26d3d527 |
|
16-Jan-2018 |
Svet Ganov <svetoslavganov@google.com> |
No sensor access to idle UIDs - framework Idle UIDs are ones that were in the background for long enough time. Currently such apps can access sensor data even though they have no user perceptible components running. This affects the user's privacy since an app in the background can use sensor data to infer location, activity, habbits, etc. The goal is to restrict sensor access for all apps in the ecosystem regardless of target SDK which means the solution should be backwards compatible. At the high level the sesnor service observes UID state changes and applies policy like this: Continuous sensors: for sensros in this reporting mode when the UID goes in the background we will stop dispatching events. Once the UID goes active we will start reporting the events. While this is an app visible behavior change we would rather do that vs delivering fake events. Flush events: there is no change in behavior based on the UID state. Hence, idle apps can request a flush and would get the completion callback. From an app perspective flushing works at any point. Trigger events: for sensors in this reporting mode when the UID goes in the background we will not report any trigger events. From an app perspective the sensor just did not pick up any events. On-change events: for sensors in this reporting mode when the UID goes in the background we will not report any change events. From an app perspective the sensor just did not pick up any events. Wake locks: since UIDs in idle state cannot acquire wakelocks we will not be grabbing a wakelock on behalf of apps in that state. Test: Added - SensorTest#testSanitizedContinuousEventsUidIdle Added - SensorTest#testBatchAndFlushUidIdle Pass - cts-tradefed run cts-dev -m CtsSensorTestCases bug:63938985 Change-Id: Iee73dc034f5fe7fbea789a3b60db4290757c5052
/frameworks/base/core/res/AndroidManifest.xml
|
30b8dd4199134c276a5aa657c8dbba5502036ede |
|
15-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Tag brightness APIs with @SystemAPI"
|
d6cf1ef3c58978ce1c27cc6c7b5072fef06cb3f2 |
|
15-Jan-2018 |
Rubin Xu <rubinxu@google.com> |
Remove redundant comments Bug: 63911046 Test: compiles Change-Id: I0428f3c8d9675d8dcddba306f9569e6b3fc9b4c2
/frameworks/base/core/res/AndroidManifest.xml
|
82548f4bc32cab54fd8f3959c245659b8e04cae2 |
|
13-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Implement DISALLOW_SHARE_INTO_MANAGED_PROFILE"
|
e1daf52b92adf3962ded260a36a9594ef8540823 |
|
13-Jan-2018 |
Lucas Dupin <dupin@google.com> |
Merge "Allow custom keyguard "prompt reason""
|
cc391c2c13b30c494908309659509f8426af48ea |
|
02-Jan-2018 |
Rubin Xu <rubinxu@google.com> |
Implement DISALLOW_SHARE_INTO_MANAGED_PROFILE Add a user restriction to allow profile owners to enforce a stronger isolation of managed profile by preventing users sharing data into the profile. This is achieved by disabling a subset of built-in cross profile intent filters added by ManagedProvisioning during profile inflation. Implementation wise, DevicePolicyManagerService listens for the restriction change and notifies ManagedProvisioning to modify the built-in intent filters. This is needed since ManagedProvisioning has ground truth of all built-in intent filters and manages them. It also has the advantage that ManagedProvisioning only needs to run when a policy change happens. Test: cts-tradefed run cts-dev -m CtsDevicePolicyManagerTestCases -t com.android.cts.devicepolicy.ManagedProfileTest#testDisallowSharingIntoProfileFromPersonal Test: cts-tradefed run cts-dev -m CtsDevicePolicyManagerTestCases -t com.android.cts.devicepolicy.ManagedProfileTest#testDisallowSharingIntoProfileFromProfile Bug: 63911046 Change-Id: Ia6d12a5086627d1280325cd19d6e3a0752dae633
/frameworks/base/core/res/AndroidManifest.xml
|
adcb5222266a19ee55a1ef6acd45892164084153 |
|
11-Jan-2018 |
Chad Brubaker <cbrubaker@google.com> |
Add update packages permission This subset of INSTALL_PACKAGES allows a privileged application to install updates to existing applications but not install new applications. When combined with INSTALL_SELF_UPDATES this allows privileged apps to be granted finely scoped install privileges based on their intended usage instead of the more broad INSTALL_PACKAGES permission. Test: WIP Bug: 68731532 Change-Id: Ifbb6f5a18d9e8ff06270fd79ed031b99242c6fa3
/frameworks/base/core/res/AndroidManifest.xml
|
c4a5b5010f18aae74f8a556120335bc5e800a679 |
|
11-Jan-2018 |
Ben Gruver <bgruv@google.com> |
Merge "Implement harmful app warning at activity launch"
|
c80c67e7bc96691b6e3700bac49e819ad52db0ae |
|
04-Dec-2017 |
Lucas Dupin <dupin@google.com> |
Allow custom keyguard "prompt reason" Adds the possibility of presenting a custom message on the keyboard if you're trying to dismiss the keyguard. This is particularly useful when you're showing the bouncer because custom authentication (SmarLock) failed. Test: launch FLAG_SHOW_WHEN_LOCKED activity and call KeyguardManager#requestDismissKeyguard Fixes: 63940122 Change-Id: I0d88c0e59521887efa56d74874062b2b14970e4e
/frameworks/base/core/res/AndroidManifest.xml
|
1ab3d6e56b56fe0cfe31e437326b5cbc66bdb361 |
|
07-Dec-2017 |
Ben Gruver <bgruv@google.com> |
Implement harmful app warning at activity launch Bug: 63909431 Test: manual Change-Id: I8a5497421cb8130af8cdd5129b0f6e1707a01e36
/frameworks/base/core/res/AndroidManifest.xml
|
3caeb4e521c16ebf717f07acbcf745820cb4a5ef |
|
11-Jan-2018 |
Eric Schwarzenbach <easchwar@google.com> |
Make Wifi Wake onboarding broadcasts protected. Bug: 64094365 Test: Build with change in topic. Ensure broadcasts do not cause errors. Change-Id: I738b1da715de6f16bb046b5cd61f4f948b034042
/frameworks/base/core/res/AndroidManifest.xml
|
eea3e937dc87c2b164623bf81704da052b636a60 |
|
11-Jan-2018 |
arangelov <arangelov@google.com> |
Rename ownership transfer related constants from "*OWNER" to "*OWNERSHIP". Change-Id: I70180c66d546521c95488bfbebed1b03fe69422c Test: None
/frameworks/base/core/res/AndroidManifest.xml
|
f79af5e4a14fb5bdeeaec05973751c28b1d62dae |
|
11-Jan-2018 |
Antoan Angelov <arangelov@google.com> |
Merge "Call PROFILE/DEVICE_OWNER_CHANGED broadcast and onTransferCompleted callback upon a successful transfer."
|
360d2cb49442a973c6db87743575be22ef7b6cc5 |
|
10-Jan-2018 |
Qingxi Li <qingxi@google.com> |
Merge "Add API EuiccController#startOtaUpdatingIfNecessary" am: 999d998fb0 am: a043a1c924 Change-Id: Ibf66b8ee23ad81d4119c5f94ad4caacf5abdf3ec
|
8bae4eaa4db74c71d5658d8ee1905be8ecf4dfc2 |
|
20-Dec-2017 |
arangelov <arangelov@google.com> |
Call PROFILE/DEVICE_OWNER_CHANGED broadcast and onTransferCompleted callback upon a successful transfer. Test: cts-tradefed run cts-dev --module DevicePolicyManager --test com.android.cts.devicepolicy.MixedProfileOwnerHostSideTransferTest#testTransferOwnerChangedBroadcast Test: cts-tradefed run cts-dev --module DevicePolicyManager --test com.android.cts.devicepolicy.MixedProfileOwnerHostSideTransferTest#testTransferCompleteCallback Test: cts-tradefed run cts-dev --module DevicePolicyManager --test com.android.cts.devicepolicy.MixedDeviceOwnerHostSideTransferTest#testTransferOwnerChangedBroadcast Test: cts-tradefed run cts-dev --module DevicePolicyManager --test com.android.cts.devicepolicy.MixedDeviceOwnerHostSideTransferTest#testTransferCompleteCallback Bug: 69542936 Bug: 69543044 Change-Id: Ifbe3ac0029794eba185e538e5a490073d5309f0b
/frameworks/base/core/res/AndroidManifest.xml
|
8314fa72f27d0358ab29681fee5dfa4a4276946c |
|
15-Dec-2017 |
Qingxi Li <qingxi@google.com> |
Add API EuiccController#startOtaUpdatingIfNecessary This function requests calling app has WRITE_EMBEDDED_SUBSCRIPTIONS permission. It will check whether the OTA update needed to be done first. If current eUICC OS isn't latest one and OTA needed to be performed, it will update eUICC OS. When the OS update is started or finished, a broadcast will be sent. Bug: 37279356 Test: E2E Merged-In: Iea86add4bdc01c79a8714af4b3a89735ba78ee74 Change-Id: Iea86add4bdc01c79a8714af4b3a89735ba78ee74
/frameworks/base/core/res/AndroidManifest.xml
|
f0720bc5a165c835d291b36b368dd46e895e3871 |
|
10-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Added new MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS permission."
|
0ff4489cc5429b306b21ba00076b097412de9ac1 |
|
10-Jan-2018 |
Kenny Guy <kennyguy@google.com> |
Tag brightness APIs with @SystemAPI Make the API for tracking brightness slider events and setting brightness curves @SystemAPI and @TestAPI Add developement scope to the brightness slider events permission to allow cts testing. Bug: 69405990 Test: atest android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered Test: atest BrightnessTrackerTest Change-Id: I39b0b26454528425b62cf99dc8bbccded4e14a18
/frameworks/base/core/res/AndroidManifest.xml
|
667baa584e0323fb0527327b1b292d4290724d65 |
|
10-Jan-2018 |
Felipe Leme <felipeal@google.com> |
Added new MANAGE_SCOPED_ACCESS_DIRECTORY_PERMISSIONS permission. Test: m update-api Bug: 63720392 Change-Id: I1c77c94597b98f72e210d3a8e3fe00c12a149b8a
/frameworks/base/core/res/AndroidManifest.xml
|
7819f611dee5e4a192d2af250bd463c6894aaf51 |
|
10-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add API EuiccController#startOtaUpdatingIfNecessary"
|
6019f9ca34f47f23148f27e8841e0f6b6d1d26f2 |
|
15-Dec-2017 |
Qingxi Li <qingxi@google.com> |
Add API EuiccController#startOtaUpdatingIfNecessary This function requests calling app has WRITE_EMBEDDED_SUBSCRIPTIONS permission. It will check whether the OTA update needed to be done first. If current eUICC OS isn't latest one and OTA needed to be performed, it will update eUICC OS. When the OS update is started or finished, a broadcast will be sent. Bug: 37279356 Test: E2E Change-Id: Iea86add4bdc01c79a8714af4b3a89735ba78ee74
/frameworks/base/core/res/AndroidManifest.xml
|
834ce2d499b9e2f58a9ab164192a1dd7e4c76a58 |
|
09-Jan-2018 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Start using new reserved disk GID."
|
985cdcb88a262a905ddcc90b20177f2be292198b |
|
03-Jan-2018 |
Jack He <siyuanh@google.com> |
HFP: Add APIs for set and get active device (1/3) 1. Call BluetoothHeadset.setActiveDevice(BluetoothDevice device) to set a connected HFP/HSP device as active. 2. Listen for BluetoothHeadset.ACTION_ACTIVE_DEVICE_CHANGED intent that will contain the latest active device (in EXTRA_DEVICE field). If the active device could not be changed, the EXTRA_DEVICE field could be null. 3. If setActiveDevice() is NOT in-progress, BluetoothA2dp.getActiveDevice() can be used. If setActiveDevice() is in-progress, the result is undefined. 4. BluetoothHeadset.setActiveDevice() could be called by some other parts of the system, so interested parties should always listen for BluetoothHeadset.ACTION_ACTIVE_DEVICE_CHANGED intents and prepared for active device updates. Bug: 68951996 Test: manual Change-Id: I22ca639a04fed7bf17df59c405ddeda90dafb8ff (cherry picked from commit 05f4bc40743654ea501b18d70ee162a08b81b35c)
/frameworks/base/core/res/AndroidManifest.xml
|
b1ebd51c012abc6990fec9b043b80d6519b088b6 |
|
08-Jan-2018 |
Jack He <siyuanh@google.com> |
Merge changes from topics "bt-hfp-add-set-active-device-method", "bt-system-api-annotations" am: 25259faa27 am: d16d93361b Change-Id: I525cbc81c450afafd3fcedaf7b1b5e4b17a4162a
|
af82f64f85b2feeeb965fafa5c90b9a2361273a2 |
|
08-Jan-2018 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Added internal API to get/set the A2DP Active Device" am: 6efee9c079 am: e3428dae04 am: fe73dd0542 Change-Id: Ibf2e9fb0a5939f45a9d21bc06b26ef719ff9c58f
|
fe73dd054248556d7dcf97d7f020bdc265862621 |
|
08-Jan-2018 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Added internal API to get/set the A2DP Active Device" am: 6efee9c079 am: e3428dae04 Change-Id: If220447db71398cc305eb7a702896e21959110c8
|
4a539441d844f85fd899862078b4c27641c1b606 |
|
06-Jan-2018 |
Jeff Sharkey <jsharkey@android.com> |
Start using new reserved disk GID. We recently created a new GID that can be granted to critical system processes, so that the system is usable enough for the user to free up disk space used by abusive apps. Define a permission for the GID so we can grant it to system apps, and add the GID to core apps needed for system stability. (The list was mostly derived from filling a disk and seeing what caused the device to fall over.) Test: builds, boots Bug: 62024591 Change-Id: Icdf471ed3bed4eeb8c01f1d39f0b40c1ea098396
/frameworks/base/core/res/AndroidManifest.xml
|
102f5632fb02fe9ef440410edf8b28e6612e1c72 |
|
06-Jan-2018 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add permission necessary to use RecoverableKeyStoreLoader API."
|
05f4bc40743654ea501b18d70ee162a08b81b35c |
|
03-Jan-2018 |
Jack He <siyuanh@google.com> |
HFP: Add APIs for set and get active device (1/3) 1. Call BluetoothHeadset.setActiveDevice(BluetoothDevice device) to set a connected HFP/HSP device as active. 2. Listen for BluetoothHeadset.ACTION_ACTIVE_DEVICE_CHANGED intent that will contain the latest active device (in EXTRA_DEVICE field). If the active device could not be changed, the EXTRA_DEVICE field could be null. 3. If setActiveDevice() is NOT in-progress, BluetoothA2dp.getActiveDevice() can be used. If setActiveDevice() is in-progress, the result is undefined. 4. BluetoothHeadset.setActiveDevice() could be called by some other parts of the system, so interested parties should always listen for BluetoothHeadset.ACTION_ACTIVE_DEVICE_CHANGED intents and prepared for active device updates. Bug: 68951996 Test: manual Change-Id: I22ca639a04fed7bf17df59c405ddeda90dafb8ff
/frameworks/base/core/res/AndroidManifest.xml
|
64a9435cc720cb9f54a65ae4829b2f0532c45d24 |
|
19-Dec-2017 |
Pavlin Radoslavov <pavlin@google.com> |
Added internal API to get/set the A2DP Active Device 1. Call BluetoothA2dp.setActiveDevice(BluetoothDevice device) to set a connected A2DP device as active. The value of "device" could be null to clear the active device and stop streaming audio to a Bluetooth device. 2. Listen for BluetoothA2dp.ACTION_ACTIVE_DEVICE_CHANGED intent that will contain the latest active device (in EXTRA_DEVICE field). If the active device could not be changed, the EXTRA_DEVICE field could be null. 3. If setActiveDevice() is NOT in-progress, BluetoothA2dp.getActiveDevice() can be used. If setActiveDevice() is in-progress, the result is undefined. 4. BluetoothA2dp.setActiveDevice() could be called by some other parts of the system, so interested parties should always listen for BluetoothA2dp.ACTION_ACTIVE_DEVICE_CHANGED intents and prepared for active device updates. Bug: 71555243 Test: Manual Change-Id: I661b6882e8e6b437db50210aec1dd12a10199969
/frameworks/base/core/res/AndroidManifest.xml
|
ea56c330a3702ec8a9af0acfbf512bdc43fad9e7 |
|
29-Dec-2017 |
fionaxu <fionaxu@google.com> |
Carrier identification config updater Bug: 64131637 Test: test_carrier_id_full.sh samples/carrier-ids-sample.pb Change-Id: I355e90292ef2073e403f13fb0f1d545e0f503c2f
/frameworks/base/core/res/AndroidManifest.xml
|
62bc5f84be9c8754154ba8ed3031b626cec0d445 |
|
03-Jan-2018 |
Ricky Wai <rickywai@google.com> |
Merge "Make Network watchlist use ConfigUpdater to get watchlist"
|
d223db316d11a625a73f86392e7055d5c6f26e7d |
|
22-Dec-2017 |
Svet Ganov <svetoslavganov@google.com> |
Add infrastructure for running a11y tests in instant mode This change adds a special flag when binding to a service to request instant apps to be considered as well (assuming the caller has the permission to see instant apps). This flag is scoped only for the platform to use and is intended only for development and testing. Specifically, we have a class of CTS tests that has tests plus service in the same APK (accessibility, printing, autofill, any other plugin based sub-system). Instead of doing the tediuous work split all these into one APK with tests and one with the services where the latter exposes a remote interface to the former, we will be adding shell commands to the dedicated sub-system to allow temporary binding to plugins provided by instant apps. The goal is not validating the plugin behavious, rather a working plugin is required to test app side funcionality. This change adds a shell command to allow the a11y manager serivce to bind to plugins provided by instant apps. This is required to be able to run relevant CTS test cases in instant mode. Test: cts-tradefed run cts-dev -m CtsAccessibilityTestCases cts-tradefed run cts-dev -m CtsAccessibilityServiceTestCases Bug: 70978575 Change-Id: Ifced735a9a6e495747372dd8b00fdd64933a09c7
/frameworks/base/core/res/AndroidManifest.xml
|
ebe3624628157cb0edd0bd73f3f9f95b11b809df |
|
27-Oct-2017 |
Ricky Wai <rickywai@google.com> |
Make Network watchlist use ConfigUpdater to get watchlist Bug: 63908748 Test: test_network_watchlist_full.sh samples/network-watchlist-sample.xml Change-Id: I9dcca568d3f19f2937786c9c184324b43dc08ff2
/frameworks/base/core/res/AndroidManifest.xml
|
b1bd89a87704aa2c3b47b85f49f63af01f9af5ac |
|
21-Dec-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Allow system server to query local WiFi MAC address"
|
da8d32efbbd582705b859eef0d935e5620099ee8 |
|
21-Dec-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes from topic "work_mode_api1" * changes: Add access control to trySetWorkModeEnabled and make it public Merge setQuietModeEnabled and trySetQuietModeDisabled into one API
|
218718d4d3727a0ccde4064f23205613bc7b66cb |
|
20-Dec-2017 |
Rubin Xu <rubinxu@google.com> |
Allow system server to query local WiFi MAC address Bug: 70500939 Test: cts-tradefed run cts-dev -m CtsDevicePolicyManagerTestCases -t com.android.cts.devicepolicy.DeviceOwnerTest#testWifi Change-Id: Ia4b83cc9f898cedeafb0951668d4fd08123cda5d
/frameworks/base/core/res/AndroidManifest.xml
|
e3d1f65ab684faf4a1194bde2618543d71697b46 |
|
12-Dec-2017 |
Tony Mak <tonymak@google.com> |
Add access control to trySetWorkModeEnabled and make it public Test: Quick Settings -> Toggle work mode Test: Settings -> Work profile settings -> Toggle work mode Test: Turn off work mode -> Settings -> Turn on work mode in the suggestion Test: Turn on work mode through tapping on work app Test: cts-tradefed run cts-dev --module DevicePolicyManager --test com.android.cts.devicepolicy.QuietModeHostsideTest BUG: 70212757 Change-Id: I335c3ab2306a3eb794cd35a3a7b0d184dc31f85e
/frameworks/base/core/res/AndroidManifest.xml
|
7f31bb047820bd5bbf3baab461d24d49f1128052 |
|
07-Sep-2017 |
Alexandru-Andrei Rotaru <rotaru@google.com> |
DPMS: password blacklist Allows admins to blacklist passwords so they cannot be enrolled by the user or the admin. Test: bit FrameworksServicesTests:com.android.server.devicepolicy.PasswordBlacklistTest Test: bit FrameworksServicesTests:com.android.server.devicepolicy.DevicePolicyManagerTest Test: cts-tradefed run cts -m CtsDevicePolicyManagerTestCases -t com.android.cts.devicepolicy.MixedManagedProfileOwnerTest#testPasswordBlacklist Test: cts-tradefed run cts -m CtsAdminTestCases -t android.admin.cts.DevicePolicyManagerTest Bug: 63578054 Change-Id: I8949ac929c760b66dc719cb058a9f88dc9cad727
/frameworks/base/core/res/AndroidManifest.xml
|
2c2ce763b7e977eaed6dc94ce5d8a7d9d654fb5c |
|
13-Dec-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add an API for setting a new brightness curve."
|
b6a9f94d6718894fdd382708a9d87696f055e71e |
|
07-Nov-2017 |
Alex Chau <alexchau@google.com> |
Add getDisallowedSystemApps to DevicePolicyManager - The getDisallowedSystemApps is based on OverlayPacakgesProvider which is moved from ManagedProvisinoing - getDisallowedSystemApps will be used by ManagedProvisioning - createAndManageUser will now use getDisallowedSystemApps to disable disallowed system apps when creating users - LEAVE_ALL_SYSTEM_APPS_ENABLED can be passed to createAndManageUser to enable all system apps - ACTION_MANAGED_USER_CREATED will be broadcasted to ManagedProvisioning after managed user is created to take a system app snapshot Bug: 65842187 Test: OverlayPackagesProviderTest passes Test: Disallowed system apps does not appear in device owenr, managed profile, and managed users Test: System app snapshot is created after provisinoing device owner, managed profile and managed users Change-Id: I86f870f7814b5700cf5539e889fb6998514d110f
/frameworks/base/core/res/AndroidManifest.xml
|
f9a89c184457e27cef89a372f139171b60586f6a |
|
11-Dec-2017 |
Dmitry Dementyev <dementyev@google.com> |
Add permission necessary to use RecoverableKeyStoreLoader API. Test: none Bug: 66499222 Change-Id: Iec1c8770705be56ea169f9a4ab58a8139b23dc6f
/frameworks/base/core/res/AndroidManifest.xml
|
eef0e13f018f33bf3db2f8311bbb429369e13394 |
|
21-Nov-2017 |
Michael Wright <michaelwr@google.com> |
Add an API for setting a new brightness curve. In addition, this also provides multiple strategies for mapping from ambient room brightness in lux to display brightness. The default one is the classic strategy, where we map directly from lux to backlight brightness in an arbitrary unit. The newer and preferred strategy is to use the physical brightness of the display, but requires that the brightness properties of the display are appropriately configured. Bug: 69406783 Test: atest com.android.server.display.BrightnessMappingStrategyTest && atest android.hardware.display.BrightnessConfigurationTest && atest android.hardware.display.PersistentDataStoreTeset Change-Id: I60227bdb6c299d0fa92686cbf3e5994b336a3a79
/frameworks/base/core/res/AndroidManifest.xml
|
45f8b29ce0ca9f80c586850c4be3a1e552bc6c2f |
|
08-Nov-2017 |
Calin Juravle <calin@google.com> |
Add SystemApis to expose runtime profile information The API allows a system apps which acquired {@code android.permission.READ_RUNTIME_PROFILE} to snapshot the runtime profiles of installed packages. The API is implemented in a new service class (AndroidRuntimeManager) accessible from the context using context().getPackageManager().getAndroidRuntimeManager(). The main functionality is exposed as a one way call into the AndroidRuntimeManager with the result being posted on a callback. The profile is available to the caller as a read-only ParcelFileDescriptor. This CL only adds the API interfaces and validation. It does not fully implement the functionality. oneway void snapshotRuntimeProfile(in String packageName, in String codePath, in ISnapshotRuntimeProfileCallback callback) Bug: 30934496 Test: gts-tradefed -m GtsAndroidRuntimeManagerHostTestCases Change-Id: Iaa6be4715840f24508acba3162ea9c1ab725bd38
/frameworks/base/core/res/AndroidManifest.xml
|
70de9728d22f017be27da5b439222f2e344fe3d2 |
|
04-Dec-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes from topic "priv_vendor_app" * changes: BIND_IMS_SERVICE is exposed to vendors Support privileged vendor apps
|
4f7413ea39e52fba994d41007f3f02170f1edfb2 |
|
01-Dec-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge "Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O." into oc-dev am: a96e533840 am: 87b5b0aa1a am: 9d3563ad78 am: 22d290b289 Change-Id: I994b9e0f7ea2b585c4f8f03231ed4d4c92e7e18e
|
22d290b289c0748e41632da1fb8d0ce39fc0f526 |
|
01-Dec-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge "Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O." into oc-dev am: a96e533840 am: 87b5b0aa1a am: 9d3563ad78 Change-Id: I3355b274bf2fad2190cd21f16c01e218a17c8b56
|
9d3563ad78d9c39f0758d0fcd2d980351166cff4 |
|
01-Dec-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge "Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O." into oc-dev am: a96e533840 am: 87b5b0aa1a Change-Id: Iabdbdf3f19e5faa4a0e980afc4d643dad192fc62
|
87b5b0aa1a9a750f087156bbb8a5e8a523832bf5 |
|
01-Dec-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge "Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O." into oc-dev am: a96e533840 Change-Id: Iefd97a3d8b1377dd72f3a3428c539cb029b4e0a9
|
a96e533840eb10dfd42f76356f23db4c023bcb4a |
|
01-Dec-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge "Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O." into oc-dev
|
a151470ad9f00a89172b8ff4baf403c0f305e63a |
|
01-Dec-2017 |
Andrew Solovay <asolovay@google.com> |
Merge "docs: Fixed description of SENSORS permission group" into oc-mr1-dev am: 039d9713a8 am: 925e428f00 Change-Id: I95c539973e0011fc3251b03fd81ce040efb85a7e
|
925e428f00273ee5f032aa2ebb6be696dccab59d |
|
01-Dec-2017 |
Andrew Solovay <asolovay@google.com> |
Merge "docs: Fixed description of SENSORS permission group" into oc-mr1-dev am: 039d9713a8 Change-Id: I6948a7b02b873d6c1af49da926d81d762ef6b82c
|
175d99098d51a7ed935ff4849ceac1dea3c4c8e0 |
|
27-Oct-2017 |
Andrew Solovay <asolovay@google.com> |
docs: Fixed description of SENSORS permission group The description had apparently been copied from CAMERA without alteration. See first comment for doc stage location. Bug: 33490521 Test: make ds-docs Change-Id: I0d5b2ff732e012a70172398dcf264df0ca04aadc
/frameworks/base/core/res/AndroidManifest.xml
|
ef262865496766dd8fcaf8e7e5a9645732cec2ea |
|
20-Nov-2017 |
Jiyong Park <jiyong@google.com> |
BIND_IMS_SERVICE is exposed to vendors Add vendorPrivileged flag to the permission so that privileged vendor apks can obtain the permission. Bug: 35301609 Test: `mm` under frameworks/base/tests/privapp-permissions adb sync && adb reboot adb shell cmd package \ com.android.framework.permission.privapp.tests.vendor shows that the app is installed. android.permission.BIND_IMS_SERVICE is in the installed permissions list android.permission.MANAGE_USE is not in the installed permissions list, but is in the requested permissions list. Change-Id: Ia197990634d8de271d6d5c305e9ee673760b771a
/frameworks/base/core/res/AndroidManifest.xml
|
7430d8d89667a39c5f993dc46c00c98814382f72 |
|
22-Nov-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Notify apps when channels/groups are blocked/unblocked"
|
e9a4b16ea117284362e8317503d3979abe755f7a |
|
21-Nov-2017 |
Kenny Guy <kennyguy@google.com> |
Merge "Daily idle job for writing out brightness events."
|
3eb3ffd9c3b1d1586bf69682442137c2fdb2e082 |
|
16-Nov-2017 |
Julia Reynolds <juliacr@google.com> |
Notify apps when channels/groups are blocked/unblocked So that apps can disable/enable receivers/jobs/etc. that would only need to run to post notifications to the blocked channel(s). Additionally let apps retrieve an individual group so they can inspect blocked state. Change-Id: I733b70c62cd0482d0cf9692ea9b00cf313ad7b81 Fixes: 36530302 Test: runtest systemui-notification, cts
/frameworks/base/core/res/AndroidManifest.xml
|
cfe7b70e99467069c813449a1792958906dffbb3 |
|
14-Nov-2017 |
Kenny Guy <kennyguy@google.com> |
Daily idle job for writing out brightness events. Schedule a job for idle + charging to kick off writing out brighness slider events. While writing events discard ones outside our time window. Bug: 69405990 Test: Manual using adb to kick off job. Test: runtest -c com.android.server.display.BrightnessTrackerTest frameworks-services Change-Id: Ibc79d1c80ced26827d6f985bc70ae165df106a42
/frameworks/base/core/res/AndroidManifest.xml
|
07201a792257fee77287c280919c5a6c5ad0a8dd |
|
15-Nov-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Enforce REQUEST_DELETE_PACKAGES for PackageInstaller.uninstall()"
|
d9bb39abdfeb62c36edee7e5e6a155e5d611eea3 |
|
05-Sep-2017 |
Philip P. Moltmann <moltmann@google.com> |
Enforce REQUEST_DELETE_PACKAGES for PackageInstaller.uninstall() Fixes: 64576642 Test: Uninstalled apps Change-Id: Ia7f3c047bb9c725228ca45e4c34e51a2d9177120
/frameworks/base/core/res/AndroidManifest.xml
|
220871a697290529278ed16db508eda8e12f3fc7 |
|
14-Nov-2017 |
Xin Li <delphij@google.com> |
Merge commit '98e12851336b7db16e583f9afac63ecc97465980' from oc-mr1-dev-plus-aosp-without-vendor into stage-aosp-master. Change-Id: Ia7b8da4a00d215160e4a4fa40f6044208d1297b7 Merged-In: I19846d2a3ee27aecbae2367a74ee49082eea154d
|
341775bfefdbe24821dd80a4d5ea4b976f1bf051 |
|
14-Nov-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Adds client API for interacting with statsd."
|
adaf8b344e312853530e276ceff05783133ecf17 |
|
03-Nov-2017 |
David Chen <dwchen@google.com> |
Adds client API for interacting with statsd. This API will primarily be used by GmsCore to send updated configs. Also, sending a config will implicitly notify the StatsD that this client wants to know when it should request data for this config. We send a broadcast so that all interested subscribers can know if data needs to be pulled. Test: Manually tested that sending broadcast works via new adb command added in StatsService. Change-Id: I23cdd1df706036e14b32c3d01af30c3d4af819fa
/frameworks/base/core/res/AndroidManifest.xml
|
22bd044b0c9af7643a5c3092f080a5b942a67720 |
|
26-Oct-2017 |
Kenny Guy <kennyguy@google.com> |
New class to track brightness slider interactions. Provides system apps with access to the users brightness slider interactions and context from when the brightness level was changed. Test: runtest -c com.android.server.display.BrightnessTrackerTest frameworks-services Change-Id: Ibdb3c78cb1d11887cb38b24c30754ff2e6f3bda8
/frameworks/base/core/res/AndroidManifest.xml
|
f137f895c7cefecc98c707fa7eeb8d73e6bb55b9 |
|
09-Nov-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Update work icon in share sheet"
|
9d0fedffd5c292c314c543902ce1f2847815b921 |
|
09-Nov-2017 |
Tony Mak <tonymak@google.com> |
Update work icon in share sheet Test: Open apps with custom share sheet, observe the new icon. BUG=69028605 Change-Id: Ie3e1172099d347bd504287cfe4f5e1fcf54b97f7
/frameworks/base/core/res/AndroidManifest.xml
|
1a6e667cb6e9211908d02eb21c50c006473376f9 |
|
27-Oct-2017 |
Ricky Wai <rickywai@google.com> |
Add Network security watchlist service Network security watchlist service is a service to monitor all potential harmful network traffic. By setting a network watchlist, any connections that visit any site from watchlist will be logged. Logs will be aggregated everyday and encoded using differential privacy before exporting it from framework. This feature is disabled now, run "setprop ro.network_watchlist_enabled true" to enable it. All network events are handled in an async bg thread, it should not cause any delay in netd. Also, it uses the hooks in enterprise network logging, so we can run netd_benchmark to measure the impact to netd. Here are the things not included in this CL: - ConfigUpdater to get and set watchlist - Differential privacy encoding logic and reporting - CTS - Memory and performance optimization for internal watchlist data structure Test: manual - turn on the feature, hard code a watchlist xml, process that visited that domain is being logged in sqlite. Test: run netd_benchmark - seems no obvious performance change. Test: bit FrameworksCoreTests:android.net.NetworkWatchlistManagerTests Test: runtest frameworks-net Test: runtest frameworks-services -p com.android.server.net.watchlist Bug: 63908748 Change-Id: I09595178bac0070a867bc5e0501a7bf2c840e398
/frameworks/base/core/res/AndroidManifest.xml
|
a9dc4456f7b8d8be2c3112b8388c1998b781fe4d |
|
11-Aug-2017 |
Neil Fuller <nfuller@google.com> |
Change SystemApi as per API council feedback API council have requested a manifest constant be added to the SystemApi directly in preference to an indirect SystemApi constant here: android.provider.TimeZoneRulesDataContract.READER_PERMISSION. This is the first of three changes to (1) add the new constant, (2) switch over code using the constant, (3) remove the constant. Bug: 64568899 Test: None, build only Change-Id: Ib9766591979886d1db3b1d7321536dabf5cf81a8 (cherry picked from commit 8bb4140516c0e18d6c3cbb4215cedc306a2a6da9)
/frameworks/base/core/res/AndroidManifest.xml
|
622597fbc5651cc2ddf68c94fefe79fffdde19ff |
|
06-Nov-2017 |
Neil Fuller <nfuller@google.com> |
Merge "Remove TzDataInstallReceiver"
|
4470ab9c33cb12d056c0e64b03a2a73f0600caee |
|
31-Oct-2017 |
Amith Yamasani <yamasani@google.com> |
Make CHANGE_APP_IDLE_STATE a system API Allows a privileged app to set standby bucket states for apps. Bug: 63527785 Test: adb shell am set-standby-bucket com.example.foo 0 Change-Id: I613f8872ae816e39b167aad1c289187362aa6094
/frameworks/base/core/res/AndroidManifest.xml
|
8948c79fe0f5aaaaf52e7f418d871766fb2d8a76 |
|
02-Nov-2017 |
Andreas Gampe <agampe@google.com> |
Revert "Make CHANGE_APP_IDLE_STATE a system API" This reverts commit c433ee54512c1aa472baad1930a40b319e7ce1a2. Fails on walleye with: java.lang.IllegalStateException: Signature|privileged permissions not in privapp-permissions whitelist: {com.android.settings: android.permission.CHANGE_APP_IDLE_STATE, com.android.shell: android.permission.CHANGE_APP_IDLE_ STATE} Bug: 63527785 Change-Id: I7a30615d20a6c22467a41d4b2d4f84f7702ce195
/frameworks/base/core/res/AndroidManifest.xml
|
c433ee54512c1aa472baad1930a40b319e7ce1a2 |
|
31-Oct-2017 |
Amith Yamasani <yamasani@google.com> |
Make CHANGE_APP_IDLE_STATE a system API Allows a privileged app to set standby bucket states for apps. Bug: 63527785 Test: adb shell am set-standby-bucket com.example.foo 0 Change-Id: I069546555e1b370247f8cd45b2f4c32e6abe15ed
/frameworks/base/core/res/AndroidManifest.xml
|
bc729befa48b63152846f372e22e7ef2b4696ae0 |
|
21-Jul-2017 |
Neil Fuller <nfuller@google.com> |
Remove TzDataInstallReceiver The functionality has been replaced by the RulesManagerService. Bug: 65536493 Test: make droid / boot device Change-Id: I3e3807aff0ad7d367048671a902807a2303dc608
/frameworks/base/core/res/AndroidManifest.xml
|
58019f524f8180423a6e46b83fa3564267612e39 |
|
25-Oct-2017 |
Etan Cohen <etancohen@google.com> |
[RTT2] Add RTT availability API Add a broadcast + availability API allowing apps to keep track of when Wi-Fi RTT is available. Bug: 65014694 Test: unit tests and integration tests Change-Id: I06f4f022c3fc6200be2308931b1fc886ae0ba37e
/frameworks/base/core/res/AndroidManifest.xml
|
16084cfc04e80f39d107140f33a273dd21fa7043 |
|
24-Oct-2017 |
Pulkit Bhuwalka <pulkitb@google.com> |
Merge changes from topic "bt_get_cod" am: 35dc02004c am: 178e5873b0 am: f7e25297ae Change-Id: Ic6d8ff403f54e54d9b353f67f76851bd46b0aff6
|
f7e25297aeee3e40eaa82db99ce4b56eb45121ec |
|
24-Oct-2017 |
Pulkit Bhuwalka <pulkitb@google.com> |
Merge changes from topic "bt_get_cod" am: 35dc02004c am: 178e5873b0 Change-Id: I3fef3c3a196af47518affea2ecac04ccadf4de4e
|
178e5873b0b0065d4560a57200eccd81d78ab9ac |
|
24-Oct-2017 |
Pulkit Bhuwalka <pulkitb@google.com> |
Merge changes from topic "bt_get_cod" am: 35dc02004c Change-Id: Iec67ef3cc9c990b4d5285b23b51972915cbbd335
|
dab081ca5648c95b6d42cd35a7792e45188810be |
|
26-Sep-2017 |
Pulkit Bhuwalka <pulkitb@google.com> |
Add missing intents to protected broadcasts Intents broadcasted by the Bluetooth stack need to be added to protected broadcasts else they complain with errors in the log since Bluetooth is considered a system process. A few of these intents, especially AVRCP intents were missing in the list. Bug: None Test: Verified errors don't show up after introducing the intents while playing on a sink device. Change-Id: Ie283c50243d9a1bac3fd937f58bc1ddc20867d2f
/frameworks/base/core/res/AndroidManifest.xml
|
5140894a5d8f19df5e6ca301fcd678e7ed3291f4 |
|
24-Oct-2017 |
Hansong Zhang <hsz@google.com> |
Merge "Change Bluetooth HID Profile Name (1/6)" am: 8218b219f3 am: c8a370aeba Change-Id: I2c5da84f5b57496e2a0ef45fb17085670f7465a9
|
c8a370aeba5fe441ec84950ec0dcefd5456bc777 |
|
24-Oct-2017 |
Hansong Zhang <hsz@google.com> |
Merge "Change Bluetooth HID Profile Name (1/6)" am: 8218b219f3 Change-Id: Ic085deaa070b4008b34d03b507f81a5df220764a
|
0edf754b2d04965d3186407a6d5de1d36d29f0a9 |
|
21-Oct-2017 |
Hansong Zhang <hsz@google.com> |
Change Bluetooth HID Profile Name (1/6) Make the Bluetooth HID profile name consistent with the Bluetooth HID service name. BluetoothInputHost → BluetoothHidDevice BluetoothInputDevice → BluetoothHidHost IBluetoothInputHost → IBluetoothHidDevice IBluetoothInputDevice → IBluetoothHidHost BluetoothProfile.INPUT_HOST → BluetoothProfile.HID_DEVICE BluetoothProfile.INPUT_DEVICE → BluetoothProfile.HID_HOST (Cherry-picked from commit c26c76c63d933f8057f795d05624f91b811c8c71) Merged-In: Iadb890a54dd3d6868b87514472bbac6bb0c6179f Bug: 68055651 Test: make Change-Id: Iadb890a54dd3d6868b87514472bbac6bb0c6179f
/frameworks/base/core/res/AndroidManifest.xml
|
c26c76c63d933f8057f795d05624f91b811c8c71 |
|
21-Oct-2017 |
Hansong Zhang <hsz@google.com> |
Change Bluetooth HID Profile Name (1/11) Make the Bluetooth HID profile name consistent with the Bluetooth HID service name. BluetoothInputHost → BluetoothHidDevice BluetoothInputDevice → BluetoothHidHost IBluetoothInputHost → IBluetoothHidDevice IBluetoothInputDevice → IBluetoothHidHost BluetoothProfile.INPUT_HOST → BluetoothProfile.HID_DEVICE BluetoothProfile.INPUT_DEVICE → BluetoothProfile.HID_HOST Bug: 68055651 Test: make Change-Id: Iadb890a54dd3d6868b87514472bbac6bb0c6179f
/frameworks/base/core/res/AndroidManifest.xml
|
d18651fa892b70afd21ded4ee56e1f2e3e7614c6 |
|
05-Oct-2017 |
Jason Monk <jmonk@google.com> |
Unhide slice data APIs Test: CTS Change-Id: Ie2a05e30e5ac6c830b6a9a14b2d207b7e2fbe9da
/frameworks/base/core/res/AndroidManifest.xml
|
634cecb899f4dabccf57411f48838d99650a9479 |
|
14-Oct-2017 |
Makoto Onuki <omakoto@google.com> |
Add signature permission to allow access to shortcuts for sysui Bug 34715012 Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest1 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest2 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest3 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest4 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest5 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest6 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest7 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest8 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest9 -w com.android.frameworks.servicestests Test: adb shell am instrument -w -e class com.android.server.pm.ShortcutManagerTest10 -w com.android.frameworks.servicestests Test: cts-tradefed run cts-dev --skip-device-info --skip-preconditions --skip-system-status-check com.android.compatibility.common.tradefed.targetprep.NetworkConnectivityChecker -a armeabi-v7a -l INFO -m CtsShortcutManagerTestCases Test: cts-tradefed run cts-dev --skip-device-info --skip-preconditions --skip-system-status-check com.android.compatibility.common.tradefed.targetprep.NetworkConnectivityChecker -a armeabi-v7a -l INFO -m CtsShortcutHostTestCases Change-Id: I922f9fb872e27b25d1016b3894165a0e63faa9b5
/frameworks/base/core/res/AndroidManifest.xml
|
35f0b541492737e555a0825e55b4e411133bf7b4 |
|
11-Oct-2017 |
Michael Wachenschwanz <mwachens@google.com> |
Merge "Add GET_RESTRICTION_ENTRIES Broadcast to protected list"
|
b3c885525fd58ca82b7a2f08a796f642ebdc5c95 |
|
15-Sep-2017 |
Michael Wachenschwanz <mwachens@google.com> |
Add GET_RESTRICTION_ENTRIES Broadcast to protected list Simple addition to protected broadcast list Change-Id: Iea681935ce5880f1b4f23c7d164933c999e8b315 Fixes: 64836850 Test: manual
/frameworks/base/core/res/AndroidManifest.xml
|
06247e94cf6086093cf8b1911d06fb42b3daa166 |
|
10-Oct-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Expose RECORD_AUDIO to Instant Apps" into oc-mr1-dev am: cffe04a719 am: 15e12ff1fa Change-Id: Idd45c21186d1e005f6dcd50bfe3563403ee63c3a
|
15e12ff1fa5dff0d3ad351d19817d180ea6ff8ef |
|
10-Oct-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Expose RECORD_AUDIO to Instant Apps" into oc-mr1-dev am: cffe04a719 Change-Id: I35ca80db5df3cce385020e3192f82f38d6c033d7
|
27833ebeb3c8370c4f812f75af0e2c46d8857c5e |
|
09-Oct-2017 |
Chad Brubaker <cbrubaker@google.com> |
Expose RECORD_AUDIO to Instant Apps This runtime permission should have been exposed to Instant Apps but incorrectly was not Bug: 67578813 Test: cts-tradefed run cts -m CtsPermission2TestCases Change-Id: Icad01cc8e99f52c6e638f54aaf78e9cc56475fc4
/frameworks/base/core/res/AndroidManifest.xml
|
625a64c243da659d77f3a44f2583810aa02e04b8 |
|
05-Oct-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "First version of Slice data APIs (hidden for now)"
|
d9edfa94b0e2a3f294e8c6ad01d4403bb7a8b971 |
|
25-Sep-2017 |
Jason Monk <jmonk@google.com> |
First version of Slice data APIs (hidden for now) Doesn't handle the viewing side, that will come separately. Test: CTS once unhidden Change-Id: I78f167bd72fe0be1e0577f8f969a7ffcbcbab666
/frameworks/base/core/res/AndroidManifest.xml
|
25feefa918b15cd77d97199bd69a66e66f44c730 |
|
04-Oct-2017 |
Jack He <siyuanh@google.com> |
Merge "PBAP: Use ACTION_CONNECTION_STATE_CHANGED intent" am: cfe51aabd2 am: 8057ba832e am: 5dfce858ea am: 1b41112e38 Change-Id: I05a04fede6b724a5bffb34a062468e1158870132
|
1b41112e385a4b06456bc1812ad3883876932fc3 |
|
04-Oct-2017 |
Jack He <siyuanh@google.com> |
Merge "PBAP: Use ACTION_CONNECTION_STATE_CHANGED intent" am: cfe51aabd2 am: 8057ba832e am: 5dfce858ea Change-Id: Ia3112971eb20c04325dd04bc76078195cec99a5f
|
5dfce858ea04b7e5ec12e405a82242713fdd8aa6 |
|
04-Oct-2017 |
Jack He <siyuanh@google.com> |
Merge "PBAP: Use ACTION_CONNECTION_STATE_CHANGED intent" am: cfe51aabd2 am: 8057ba832e Change-Id: I946cce466bb5e048ad7b19cd97caa466dab27a52
|
8057ba832e55c747e57342b55284476cf9d8fd90 |
|
04-Oct-2017 |
Jack He <siyuanh@google.com> |
Merge "PBAP: Use ACTION_CONNECTION_STATE_CHANGED intent" am: cfe51aabd2 Change-Id: I6e2337a0b0f4722b82a91c53c340618b9277f3f6
|
37ab815c96737ecbd6a4c807a42bbab5c661e521 |
|
03-Oct-2017 |
Jack He <siyuanh@google.com> |
PBAP: Use ACTION_CONNECTION_STATE_CHANGED intent * Use ACTION_CONNECTION_STATE_CHANGED to broadcast connection state change to comply with BluetoothProfile interface requirement * Use BluetoothProfile.STATE_* variables to represent connection states for PBAP profile Bug: 63873163 Test: Connect to car kits Change-Id: I7dfcfc1b3a3e4868ea5e313f62ad5e504d58b9c2
/frameworks/base/core/res/AndroidManifest.xml
|
68278568de7479f9fef31517d799c2c254dd1d37 |
|
24-Sep-2017 |
Wale Ogunwale <ogunwale@google.com> |
HOME_STACK_ID, ASSISTANT_STACK_ID, and RECENTS_STACK_ID be gone! Replaced usages with ACTIVITY_TYPE_HOME, ACTIVITY_TYPE_ASSISTANT and ACTIVITY_TYPE_RECENTS. Test: go/wm-smoke Test: Existing tests pass. Bug: 64146578 Change-Id: I62c55c99df86dba8c9ba9d9986049de1b1083234
/frameworks/base/core/res/AndroidManifest.xml
|
93fcfbc8cbf291eccc0eaa41ef3dbdaecfa7dc77 |
|
20-Sep-2017 |
Neil Fuller <nfuller@google.com> |
resolve merge conflicts of 83c367aa5b48 to stage-aosp-master am: 8acdb8aa65 Change-Id: I7605323c886c9dafb83899c8b78e2bb860f96bb4
|
43b272e20c031f48b0f0d9775723ae962f7d7472 |
|
20-Sep-2017 |
Adam Bookatz <bookatz@google.com> |
Merge changes I82fe220e,Iff324c73,I3bd73acd * changes: indexed priority queue for AnomalyMonitor StatsCompanionService connection to Statsd Set up StatsCompanionService.java
|
8acdb8aa654d3cc7511ea77420849398487f4fcb |
|
20-Sep-2017 |
Neil Fuller <nfuller@google.com> |
resolve merge conflicts of 83c367aa5b48 to stage-aosp-master Test: I solemnly swear I tested this conflict resolution. Change-Id: Ia3dc2e0b10bbf5be9c7d8f98b03cf8030bbfff07
|
933845c4801ae8239604611b7cc92dc973b239cc |
|
13-Sep-2017 |
Neil Fuller <nfuller@google.com> |
Fix reliability triggering Fix reliability triggering in the time zone update feature. The reliability triggering is there to resume an update check when things go wrong. For example, if the device is turned off after a time zone data app is updated but before the time zone update process has finished pulling the data out and installing it in /data. The reliability trigger happens when the device is idle and will complete the work. The idle triggering currently doesn't work as it was implemented incorrectly. The code has been changed to use the JobScheduler to trigger on idle and scheduling has been made explicit. Unit tests run with: make -j30 FrameworksServicesTests adb install -r -g \ "out/target/product/marlin/data/app/FrameworksServicesTests/FrameworksServicesTests.apk" adb shell am instrument -e package com.android.server.timezone -w \ com.android.frameworks.servicestests \ "com.android.frameworks.servicestests/android.support.test.runner.AndroidJUnitRunner" Test: See above Test: Manual testing: adb shell am idle-maintenance, adb logcat/adb shell dumpsys timezone Test: PTS: run pts -m PtsTimeZoneTestCases Bug: 65657543 Change-Id: Ibb2c537955d09a5d538c50490dae94a518522f19 Merged-In: Ibb2c537955d09a5d538c50490dae94a518522f19 (cherry picked from commit cd1a109b872f58f5baa0ce8438bf3ddd69eec9fc)
/frameworks/base/core/res/AndroidManifest.xml
|
782a79f47aea44c0f3124ec3ddce0744c5462ffe |
|
13-Sep-2017 |
Neil Fuller <nfuller@google.com> |
Fix reliability triggering Fix reliability triggering in the time zone update feature. The reliability triggering is there to resume an update check when things go wrong. For example, if the device is turned off after a time zone data app is updated but before the time zone update process has finished pulling the data out and installing it in /data. The reliability trigger happens when the device is idle and will complete the work. The idle triggering currently doesn't work as it was implemented incorrectly. The code has been changed to use the JobScheduler to trigger on idle and scheduling has been made explicit. Unit tests run with: make -j30 FrameworksServicesTests adb install -r -g \ "out/target/product/marlin/data/app/FrameworksServicesTests/FrameworksServicesTests.apk" adb shell am instrument -e package com.android.server.timezone -w \ com.android.frameworks.servicestests \ "com.android.frameworks.servicestests/android.support.test.runner.AndroidJUnitRunner" Test: See above Test: Manual testing: adb shell am idle-maintenance, adb logcat/adb shell dumpsys timezone Test: PTS: run pts -m PtsTimeZoneTestCases Bug: 65657543 Change-Id: Ibb2c537955d09a5d538c50490dae94a518522f19 Merged-In: Ibb2c537955d09a5d538c50490dae94a518522f19 (cherry picked from commit cd1a109b872f58f5baa0ce8438bf3ddd69eec9fc)
/frameworks/base/core/res/AndroidManifest.xml
|
cd1a109b872f58f5baa0ce8438bf3ddd69eec9fc |
|
13-Sep-2017 |
Neil Fuller <nfuller@google.com> |
Fix reliability triggering Fix reliability triggering in the time zone update feature. The reliability triggering is there to resume an update check when things go wrong. For example, if the device is turned off after a time zone data app is updated but before the time zone update process has finished pulling the data out and installing it in /data. The reliability trigger happens when the device is idle and will complete the work. The idle triggering currently doesn't work as it was implemented incorrectly. The code has been changed to use the JobScheduler to trigger on idle and scheduling has been made explicit. Unit tests run with: make -j30 FrameworksServicesTests adb install -r -g \ "out/target/product/marlin/data/app/FrameworksServicesTests/FrameworksServicesTests.apk" adb shell am instrument -e package com.android.server.timezone -w \ com.android.frameworks.servicestests \ "com.android.frameworks.servicestests/android.support.test.runner.AndroidJUnitRunner" Test: See above Test: Manual testing: adb shell am idle-maintenance, adb logcat/adb shell dumpsys timezone Test: PTS: run pts -m PtsTimeZoneTestCases Bug: 65657543 Change-Id: Ibb2c537955d09a5d538c50490dae94a518522f19
/frameworks/base/core/res/AndroidManifest.xml
|
723bf37ab2e4b535a6061c02df03fcec57006e37 |
|
26-Aug-2017 |
Fan Zhang <zhfan@google.com> |
Initial API for providing suggestions. This is a WIP system api that will be - Implemented by one unbundled app (SettingsIntelligence) using system-sdk, - and consumed by Settings app. Note: The bundled app does not have permission to read/write any user settings. Nor does it have permission to call any private API to do anything unsafe. Test: builds Test: instrumentation test Bug: 65065268 Change-Id: Ib190c0e4c167deb3c6197b8a5b39d442d804770b
/frameworks/base/core/res/AndroidManifest.xml
|
947264128775be7f47d3e170a0fbeb6a14a5241e |
|
31-Aug-2017 |
Bookatz <bookatz@google.com> |
Set up StatsCompanionService.java Introduces StatsCompanionService.java and sets it up as a system service. This service is a helper for statsd. It will be responsible for setting and cancelling alarms related to polling stats and anomaly detection. It currently does not have selinux permission, so must be started manually (or with selinux temporarily disabled). Test: disable enforcing selinux, then set and cancel alarms and make sure they work. Change-Id: I3bd73acdd998ee424696cce40965134c14220d8f
/frameworks/base/core/res/AndroidManifest.xml
|
88e6a6999a15ea321343f49d6ce0f82fd77f9725 |
|
08-Sep-2017 |
Stephen Chen <stewchen@google.com> |
Merge "ONA: Make ONA related broadcasts protected." into oc-mr1-dev am: 5aff115e44 am: ec3e2bdc6e Change-Id: I6228d50e403bf3b00276007f5ab1eecc1e9e8d38
|
cd9bdb622fe3942643c399d79e7c022befdb5722 |
|
05-Sep-2017 |
Stephen Chen <stewchen@google.com> |
ONA: Make ONA related broadcasts protected. Bug: 65257065 Bug: 37357441 Test: build with ONA, check that broadcasts do not log WTF errors. Change-Id: I623da59f5cc7ca3feff6cc156664c05fbeb34107
/frameworks/base/core/res/AndroidManifest.xml
|
fff9f7ed6154a209beefcbc40d8faf68c68f711c |
|
31-Aug-2017 |
Felipe Leme <felipeal@google.com> |
Removed deprecated BIND_AUTOFILL permission. Test: cts-tradefed run commandAndExit cts-dev -m CtsAutoFillServiceTestCases Fixes: 37563972 Change-Id: If751eb94336756da205908deae9e3b9b1c67c4e8
/frameworks/base/core/res/AndroidManifest.xml
|
666e08ab155cc3b4a21df5676b883a95c80f28b6 |
|
31-Aug-2017 |
Phil Weaver <pweaver@google.com> |
Merge "resolve merge conflicts of 490d397d284f to oc-dr1-dev" into oc-dr1-dev am: 0ddaa63b67 Change-Id: I84cdc92d542597541266fe506b4a3af160d970b2
|
0784828fb06cd7796c459c09921f814659f5816f |
|
29-Aug-2017 |
Phil Weaver <pweaver@google.com> |
resolve merge conflicts of 490d397d284f to oc-dr1-dev Bug: 62196835 Test: I solemnly swear I tested this conflict resolution. Merged-In: I1a3e3c5b1696a5f5b95eac187acb5a03863b4a0b Change-Id: Ib00a23ae9a329cfc102b1a116b5a585be36b56f6
|
c510ecb3ec0eeca5425f5bc96fae80ea56f85be6 |
|
19-Aug-2017 |
Phil Weaver <pweaver@google.com> |
Backport overlay security fix Replacing app opps fix with the flag that is used elsewhere. Bug: 37442941 Test: Verified that toast and system overlay still goes away on permission and a11y service capability screens. Merged-In: I1a3e3c5b1696a5f5b95eac187acb5a03863b4a0b Change-Id: If9bec515105369055415d54c7fcad7a65431f8e7
/frameworks/base/core/res/AndroidManifest.xml
|
46ea857e475d9c7a59e68fffc24c47a66c08fd11 |
|
25-Aug-2017 |
Santos Cordon <santoscordon@google.com> |
Merge "Allow VR State Listeners with RESTRICTED_VR_ACCESS permission." into oc-mr1-dev am: 0405d12a31 am: 49ef0ee289 Change-Id: I04313ee8bc289714e25d1e69d3fcabfb7eb93aef
|
e6d772330744d2c27545dabfe60a4023495c0925 |
|
09-Aug-2017 |
Santos Cordon <santoscordon@google.com> |
Allow VR State Listeners with RESTRICTED_VR_ACCESS permission. Extend the ability to use VrStateListeners to applications that have RESTRICTED_VR_ACCESS permission. Previously, it required ACCESS_VR_MANAGER only. Add VrStateCallback object and methods to VrManager to access the functionality outside of frameworks. Bug: 64360244 Test: Manual. Tested ability from VrCore. Change-Id: I01f1c75b1ccd44a09364df84218168cf6caab322
/frameworks/base/core/res/AndroidManifest.xml
|
cfdc1eeacf6e84da919772d95c26d3a0b31a3ae9 |
|
18-Aug-2017 |
Chad Brubaker <cbrubaker@google.com> |
Add self update permission This permission is a subset of INSTALL_PACKAGES that only allows a package to update itself. Many of the users of INSTALL_PACKAGE claim to be using it solely for self updating but INSTALL_PACKAGES gives a lot more power than is needed. This limits those priv apps to what they intend to do. Test: manual Change-Id: I3442ad1a285df660b8c2635e3db59d7bc0662324
/frameworks/base/core/res/AndroidManifest.xml
|
682bd5584750ee077a67f43b51b859c686e1a521 |
|
16-Aug-2017 |
Christopher Tate <ctate@google.com> |
Merge "Add privileged permission for reading the current wallpaper image" into oc-mr1-dev am: 4b7b5a6c59 am: 2402e4b385 Change-Id: Ia9131e41b536a4cccd154d58d7662bc2aa92beb2
|
4b7b5a6c590693eca2d365f66cd2425a9cef35ff |
|
16-Aug-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add privileged permission for reading the current wallpaper image" into oc-mr1-dev
|
8a71c48d1cf159fe9da0bc60db68cc2d3a5243dc |
|
15-Aug-2017 |
Christopher Tate <ctate@google.com> |
Add privileged permission for reading the current wallpaper image OEMs can therefore arrange factory-default access to have access prior to setup or user interaction. Bug: 30770233 Bug: 64029450 Test: manual Change-Id: I2cb30721f2a64ef50275b711ca10ca571248504a
/frameworks/base/core/res/AndroidManifest.xml
|
391415435b71fd10dbc0c1c16fe5c4dd8affa4bd |
|
15-Aug-2017 |
Péter Visontay <pvisontay@google.com> |
Merge "Fix the GET_APP_OPS_STATS permission's comment."
|
9467febacf168d5b9cf63d18ce14978dd0f42dc5 |
|
15-Aug-2017 |
Todd Kennedy <toddke@google.com> |
Merge "Change protection level from ephemeral to instant" into oc-mr1-dev am: ef2e7d27ae am: a1f2f3eb7b Change-Id: If8801cd35c71e35cbb11881dca18a58bab1b4aff
|
8193291ca36146af752dbd87e6fcab5274fd9b3d |
|
12-Aug-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes from topic 'b/64606807' into oc-dr1-dev * changes: Revert "Add (disabled) time zone update system server impl" Revert "Time zone update API classes"
|
1f368850d86e517f338975735c7a707b2c856213 |
|
12-Aug-2017 |
Neil Fuller <nfuller@google.com> |
Merge "Move DISABLE_INPUT_DEVICE permission" into oc-dr1-dev am: a031b0d6a1 Change-Id: I1a1a6468921ca5e23cc250aacb713153433917a3
|
a031b0d6a127a4db89e60397737b6f53dcb13a8b |
|
12-Aug-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Move DISABLE_INPUT_DEVICE permission" into oc-dr1-dev
|
708a1ca16a26da074b80f07df29542199e072a9a |
|
12-Aug-2017 |
Dan Sandler <dsandler@android.com> |
Move USE_COLORIZED_NOTIFICATIONS to com.android. It's @hidden, but CTS needs it to be out of the android.* namespace too. Fixes: 64613274 Test: Grab the cts binaries(android-cts.zip) from OC Release Test: Extract and from android-cts/tools directory, launch ./cts-tradefed Test: On the DUT with CL cherrypicked, run the below(will run this test on both abi's): Test: run cts -m CtsPermission2TestCases -t android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered --skip-connectivity-check --skip-preconditions --serial <device serial> Test: android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered doesn't fail for android namespace:android.permission.TRIGGER_TIME_ZONE_RULES_CHECK Change-Id: I753c2cc19111f9ed39e7fc3e006aab096c733ddc Merged-In: I2046ae17b9e89ac0a83e182b91422fd242bc7557
/frameworks/base/core/res/AndroidManifest.xml
|
42b4c4c057dfd9dca58dbba7359d0da839a708fa |
|
12-Aug-2017 |
Neil Fuller <nfuller@google.com> |
Move DISABLE_INPUT_DEVICE permission Move DISABLE_INPUT_DEVICE permission out of the reserved android namespace until the next API version. It appears to be mostly unused. Fixes: 64615722 Test: Grab the cts binaries(android-cts.zip) from OC Release Test: Extract and from android-cts/tools directory, launch ./cts-tradefed Test: On the DUT with CL cherrypicked, run the below(will run this test on both abi's): Test: run cts -m CtsPermission2TestCases -t android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered --skip-connectivity-check --skip-preconditions --serial <device serial> Test: android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered doesn't fail for android namespace:android.permission.TRIGGER_TIME_ZONE_RULES_CHECK Change-Id: If77fd9e5c0eede418fa14a37e5e895fee5667576 Merged-In: Ic98af7e3953da63c3c49bfd38d8cfd0ff0646869
/frameworks/base/core/res/AndroidManifest.xml
|
4e9806c4b47c22144055440ecad95fd4d2c1aeba |
|
11-Aug-2017 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Time zone update API classes" This reverts commit fe6ec56cce981731be7d0bc0e61a0411d0a0d2cf. Fixes: 64606807 Test: Grab the cts binaries(android-cts.zip) from OC Release Test: Extract and from android-cts/tools directory, launch ./cts-tradefed Test: On the DUT with CL cherrypicked, run the below(will run this test on both abi's): Test: run cts -m CtsPermission2TestCases -t android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered --skip-connectivity-check --skip-preconditions --serial <device serial> Test: android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered doesn't fail for android namespace:android.permission.TRIGGER_TIME_ZONE_RULES_CHECK Change-Id: I238e2b6fa7ce60e6a8cbfebcd13e5e4c596834af Merged-In: I31b55e88072dd73055cb3d8cf252be6eac920322
/frameworks/base/core/res/AndroidManifest.xml
|
c247fa136639dd07278b1954e5fba78ade60614c |
|
02-Jun-2017 |
Todd Kennedy <toddke@google.com> |
Change protection level from ephemeral to instant Change-Id: If4b01e5f0728f1d1d7e6903b362dcbedc67a9b3f Fixes: 62264194 Test: Manual. install an instant app and see that it still works
/frameworks/base/core/res/AndroidManifest.xml
|
a41fdcb20ab2c459e6fd02e8564fe60743fce82d |
|
11-Aug-2017 |
Neil Fuller <nfuller@google.com> |
Change SystemApi as per API council feedback API council have requested a manifest constant be added to the SystemApi directly in preference to an indirect SystemApi constant here: android.provider.TimeZoneRulesDataContract.READER_PERMISSION. This is the first of three changes to (1) add the new constant, (2) switch over code using the constant, (3) remove the constant. Bug: 64568899 Test: None, build only Change-Id: Ib9766591979886d1db3b1d7321536dabf5cf81a8 (cherry picked from commit 8bb4140516c0e18d6c3cbb4215cedc306a2a6da9)
/frameworks/base/core/res/AndroidManifest.xml
|
f594c62ec261c19d7fffddb27feea2c408a33af3 |
|
11-Aug-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Change SystemApi as per API council feedback"
|
8bb4140516c0e18d6c3cbb4215cedc306a2a6da9 |
|
11-Aug-2017 |
Neil Fuller <nfuller@google.com> |
Change SystemApi as per API council feedback API council have requested a manifest constant be added to the SystemApi directly in preference to an indirect SystemApi constant here: android.provider.TimeZoneRulesDataContract.READER_PERMISSION. This is the first of three changes to (1) add the new constant, (2) switch over code using the constant, (3) remove the constant. Bug: 64568899 Test: None, build only Change-Id: Ib9766591979886d1db3b1d7321536dabf5cf81a8
/frameworks/base/core/res/AndroidManifest.xml
|
b028ddb306f125147fb2ea7aa82971bf099a1f8b |
|
11-Aug-2017 |
Kevin Chyn <kchyn@google.com> |
Merge "Merge "Merge "Fix CTS, Remove CONFIGURE_ASSIST_GESTURE permission" into oc-dr1-dev am: cad75e2437" into oc-dr1-dev-plus-aosp am: fa6fb4c068" into oc-mr1-dev-plus-aosp am: a45277bb2a Change-Id: I0f726bb78fd565935493dbb15148c4780fe482e8
|
c1a30d507cbd8d0239f4ea0137788b071e3db2ba |
|
11-Aug-2017 |
Kevin Chyn <kchyn@google.com> |
Merge "Merge "Fix CTS, Remove CONFIGURE_ASSIST_GESTURE permission" into oc-dr1-dev am: cad75e2437" into oc-dr1-dev-plus-aosp am: fa6fb4c068 Change-Id: I72ad306a62e999cb15b469887371a1d950228fbf
|
acdaaea57e50a0dce0ebf464255c43dce0b3a359 |
|
11-Aug-2017 |
Kevin Chyn <kchyn@google.com> |
Merge "Fix CTS, Remove CONFIGURE_ASSIST_GESTURE permission" into oc-dr1-dev am: cad75e2437 Change-Id: Ib609a68d8da9eab5e4993565c61aec9ea6b1ba35
|
d40e711ec1eb0b907bb1ec80d923fd1505c66627 |
|
11-Aug-2017 |
Kevin Chyn <kchyn@google.com> |
Merge "Fix CTS, Remove CONFIGURE_ASSIST_GESTURE permission" into oc-dr1-dev am: cad75e2437 Change-Id: Iff57ca1a3b59517218085239e23c68a4315230e1
|
92500f57d07f6e962004572efa57ddc345ec7faa |
|
10-Aug-2017 |
Kevin Chyn <kchyn@google.com> |
Fix CTS, Remove CONFIGURE_ASSIST_GESTURE permission Test: make -j56 cts run cts -m CtsPermission2TestCases -t android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered --skip-connectivity-check --skip-preconditions --serial <device serial> Fixes: 64560640 Change-Id: Ic807028567da9a4f3f108121d3e36358a513cf04
/frameworks/base/core/res/AndroidManifest.xml
|
7c33bb4aedb6540fa7e03f0f0daa1564d2d1278f |
|
10-Aug-2017 |
Hall Liu <hallliu@google.com> |
Merge "Hide the SEND_EMBMS_INTENTS permission" into oc-mr1-dev am: d259d8b80f am: 6b3ce948c6 Change-Id: Iba626fe3720d0cb1d8b714a9eed7945382a662f4
|
d259d8b80f5c049cfe14bf9db9c30d214dae9b2b |
|
10-Aug-2017 |
Hall Liu <hallliu@google.com> |
Merge "Hide the SEND_EMBMS_INTENTS permission" into oc-mr1-dev
|
28440ed3b9476adb768254166ee26a1aa37950c3 |
|
10-Aug-2017 |
Ian Pedowitz <ijpedowitz@google.com> |
Merge "Revert "Initial support for proposed android.net.lowpan"" into oc-dr1-dev am: 0716c8e60e Change-Id: I1016361cd17be52a02a21fb4d1da791c0247be1d
|
3608d5fad7f900d5ba6a2730570059b019e5a8ec |
|
10-Aug-2017 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Initial support for proposed android.net.lowpan" This reverts commit 4e0c2195dd999859f4e79cec1884326fb52a5916. Fixes: 64111427 Test: Grabbed OC CTS binaries Test: Extracted android-cts.zip and from android-cts/tools directory launched ./cts-tradefed Test: On the DUT (running build which has this CL cherrypicked), ran the below (will run this test on both abi's): Test: run cts -m CtsPermission2TestCases -t android.permission2.cts.PermissionPolicyTest#testPlatformPermissionPolicyUnaltered --skip-connectivity-check --skip-preconditions --serial <device serial> Test: Note, while b/64111427 is fixed, this uncovered b/64560640 Change-Id: I1d2132678281a917f03c69d5ead1d28313d7f46d Merged-In: Icab67ba2c40bc02968e3f8ed2da5a4a3be6cf77f
/frameworks/base/core/res/AndroidManifest.xml
|
14f52d9e9dfc465ec5b198b0869c3bfaa51ce900 |
|
10-Aug-2017 |
Hall Liu <hallliu@google.com> |
Hide the SEND_EMBMS_INTENTS permission Bug: 64340162 Change-Id: Ia9370c0e80bb3a99df5008febc994846204272c1
/frameworks/base/core/res/AndroidManifest.xml
|
626bcb90ad3e05d365ff8931edde2d6a4a1586c7 |
|
09-Aug-2017 |
yinxu <yinxu@google.com> |
Merge "Fix the inconsistency of action EUICC_FACTORY_RESET" into oc-dr1-dev am: 669f560338 am: 6b48db9770 am: 47d41c1904 Change-Id: I4d7b78bee03e6fed21e434de5b1b674b389f2bb3
|
6b48db9770d5a8313228e963fb021fd91b7efa2b |
|
09-Aug-2017 |
yinxu <yinxu@google.com> |
Merge "Fix the inconsistency of action EUICC_FACTORY_RESET" into oc-dr1-dev am: 669f560338 Change-Id: Ia5f2a3273a09fe457ef913fb8c0d37791b52bf68
|
8ba767faf8328dbcac6bdc9d62e7194aa92b7537 |
|
09-Aug-2017 |
yinxu <yinxu@google.com> |
Merge "Fix the inconsistency of action EUICC_FACTORY_RESET" into oc-dr1-dev am: 669f560338 Change-Id: I3215628a895b94bbac61bd2aecc34d2f79dbc6dc
|
e19d8413dfd508e1caa2da406222e190adaf0eaa |
|
08-Aug-2017 |
Peter Visontay <pvisontay@google.com> |
Fix the GET_APP_OPS_STATS permission's comment. Test: none Change-Id: I182649ad3184db848ffcf5a9b2c1140fd3df1dba
/frameworks/base/core/res/AndroidManifest.xml
|
7b5a0f421c11ea545cf3c180c88a774fe1d3125a |
|
07-Aug-2017 |
yinxu <yinxu@google.com> |
Fix the inconsistency of action EUICC_FACTORY_RESET This action "com.android.internal.action.EUICC_FACTORY_RESET" is supposed to be set as "protected" in AndroidManifest.xml, but the action in AndroidManifest.xml is "com.android.server.action.WIPE_EUICC_DATA" by mistake. Bug: 64264776 Test: E2E Change-Id: I740af1f8062c0fd79c69398f3a2a72e1b3178860
/frameworks/base/core/res/AndroidManifest.xml
|
1fb3a312e7be09e7ded1b0d4892894cccadd0491 |
|
06-Aug-2017 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Fix broken javadocs." into oc-mr1-dev am: b79eb54d36 am: 1ad38fe278 Change-Id: I21266d20be036196dbeddb9c4366d641ab1b68a8
|
67f9d5070a74a0bf34f0335899a96dedcac26c96 |
|
05-Aug-2017 |
Jeff Sharkey <jsharkey@android.com> |
Fix broken javadocs. Bug: 64337634 Test: make -j32 doc-comment-check-docs Change-Id: I20fdd3dcddef09111d35946c41c596c7689effa6
/frameworks/base/core/res/AndroidManifest.xml
|
e2c0f95a43f474a71f43e10fa3638716e3a08efe |
|
30-Jul-2017 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Migrate plans to @SystemApi, evolve permissions." into oc-mr1-dev am: 2c131cafae am: 284eab179c Change-Id: Ib3f18cb1a0d92e54b4cfe3ab0e51d5364f64d547
|
b7479988d248add39ba6ce1fe71dea6f810fd54f |
|
29-Jul-2017 |
Jeff Sharkey <jsharkey@android.com> |
Migrate plans to @SystemApi, evolve permissions. We're not yet ready to commit to SubscriptionPlan as public API, so relax to be @SystemApi instead. Add a new MANAGE_SUBSCRIPTION_PLANS permission that we require apps to hold, unless they've been delegated access via a trusted CarrierService. Since several apps have the ability to provide plans for a single subId, we now remember the "owner" who set the current plan information, and we refuse to leak plan information beyond the app that originally set it. Relax permissions check to not require READ_PHONE_STATE, since we're only returning data that an app provided to us earlier. Also fix NPE when SubscriptionInfo is missing. Test: bit FrameworksServicesTests:com.android.server.NetworkPolicyManagerServiceTest Bug: 63997177, 63928277, 64156138, 63903381 Change-Id: If503378ef406dcaec438c9b41e837e0a821a3ef4
/frameworks/base/core/res/AndroidManifest.xml
|
8dddb1a4c257ee2b463b3bd5920724a7afc59ce1 |
|
27-Jul-2017 |
Yohei Yukawa <yukawa@google.com> |
Merge "Merge "Lock down IME switcher notification handling" into oc-mr1-dev am: 37f2e48697" into oc-mr1-dev-plus-aosp am: adfbfeb33a Change-Id: Ia1033bd1c9746f86c4b86c8cf0339f315fd63366
|
37f2e48697592e7d693d8828bcb3238c8223805f |
|
27-Jul-2017 |
Yohei Yukawa <yukawa@google.com> |
Merge "Lock down IME switcher notification handling" into oc-mr1-dev
|
01065a5719414b0855da2820beb9bd4a6459ba1b |
|
19-Jul-2017 |
Tadashi G. Takaoka <takaoka@google.com> |
Lock down IME switcher notification handling This CL fixes 1) broken IME switcher notification (Bug 63644555) and 2) a possible security bypass that any background application can virtually call IMM#showInputMethodPicker() by sending an explicit intent to the com.android.settings (Bug 64008672), and 3) wrong hint color for the notification. 1) From Android-O, an implicit broadcast intent doesn't get delivered to background apps [1]. So that the implicit broadcast intent of action "android.settings.SHOW_INPUT_METHOD_PICKER" isn't always delivered to Settings app, especially from the notification. So that InputMethodManagerService should use an explicit broadcast intent for a pending intent in the IME switcher notification. And it should also implement broadcast receiver of the intent by itself and remove InputMethodDialogReceiver from com.android.settings app [2]. 2) In addition to the existing security check [3], the explict broadcast intent mentioned in the above 1) must be locked down to the system by using protected-broadcast [4]. [1]: https://developer.android.com/preview/features/background.html#broadcasts [2]: Id990c66516c9b3ed7ada6891746ec0e0eecbe545 Settings app [3]: I4f0fc21268200c64d12b31ca54416acfbf62f37b InputMethodManagerService [4]: Ib58d2931cc8db3b88eab64352ba445be67eaec68 CTS permission2 Test: Modified InputMethodManagerService.updateSystemUiLocked() method to show IME switcher notification, and confirmed IME picker can be shown from notification bar. Test: Confirmed the following command causes error. $ adb shell am broadcast \ -a com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER java.lang.SecurityException: Permission Denial: not allowed to send broadcast com.android.server.InputMethodManagerService.SHOW_INPUT_METHOD_PICKER from pid=xxxx, uid=xxxx Fixes: 63644555 Bug: 64008672 Change-Id: Id36c8c34159bea8b72557b40bcf024d401f580b6
/frameworks/base/core/res/AndroidManifest.xml
|
5d03e3c2fece7f49832c5359049f89db614a5ccb |
|
25-Jul-2017 |
Tomasz Wasilczyk <twasilczyk@google.com> |
Merge "Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission." into oc-mr1-dev am: 68a0dafc13 am: 07f350bb65 Change-Id: I5d45a3ecd5f3f88e5495e14e9c7f3f4afb70ed82
|
68a0dafc135a28cf6bbc72e44798083075aac872 |
|
25-Jul-2017 |
Tomasz Wasilczyk <twasilczyk@google.com> |
Merge "Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission." into oc-mr1-dev
|
df77643cd8024b381c7df2f509175c7be719fae9 |
|
21-Jul-2017 |
Tomasz Wasilczyk <twasilczyk@google.com> |
Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission. This is a backwards incompatible change against System API, but as there are no existing radio apps, nobody uses it. Bug: b/63405337 Test: manual Change-Id: Iaf6085914434be01e1c1e363609e5b0087ffe127
/frameworks/base/core/res/AndroidManifest.xml
|
02689a78847fa4f8b6077e23b35a2f9b30322036 |
|
06-Jul-2017 |
Andrii Kulian <akulian@google.com> |
DO NOT MERGE Add permission to launch activities on VD 1. Added permission ACTIVITY_EMBEDDING which allows apps to launch activities on virtual displays. 2. Allow owner of display to launch activities from same app without permission check to owned display. 3. Added permission checks for launching on secondary displays to more target task/stack resolution paths in ActivityStarter. Bug: 63117330 Test: android.server.cts.ActivityManagerDisplayTests Test: go/wm-smoke Change-Id: If169a77fb56241e06f7de20168dc38c4b0a217f5 (cherry picked from commit 71587649836d8e97c2ca00d968fc95293b59b0d3)
/frameworks/base/core/res/AndroidManifest.xml
|
97099cacd4c22fdc2a18df4e43b2b56ca83375b5 |
|
21-Jul-2017 |
Android Build Merger (Role) <android-build-merger@google.com> |
Merge "Merge "Expose SubscriptionPlan API." into oc-mr1-dev am: 84c6684bba am: 6f1d451a3a"
|
f7fe611e974aa007eb415ef149bd61c4a6919f7e |
|
21-Jul-2017 |
Andrii Kulian <akulian@google.com> |
Merge "Add permission to launch activities on VD"
|
1eb8b3cf489879a9de29c8f64e01678b79f5369b |
|
21-Jul-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Expose SubscriptionPlan API." into oc-mr1-dev am: 84c6684bba am: 6f1d451a3a Change-Id: I10844e487ab51a121ecdbf51e7732c0bcc198ef6
|
17bebd2fd7d3af0bc648172da6ae36f8b55ad7af |
|
20-Jul-2017 |
Jeff Sharkey <jsharkey@android.com> |
Expose SubscriptionPlan API. Clean up SubscriptionPlan, add docs, and expose as public API. Deprecate older constants in CarrierConfigManager, and point users towards new API. (The goal of CarrierConfigManager is to express key/value pairs that are identical for all users on a particular carrier, not to configure details that vary between users.) Since a CarrierService may itself not have access to the plan details, allow them to "delegate" the capability to configure plans to another package name. Factor out new RecurrenceRule class which is used by both NetworkPolicy and SubscriptionPlan internally. Polish it to support arbitrary periods, and continue to test it through NPMST. Bug: 63391323 Test: bit FrameworksCoreTests:android.util.RecurrenceRuleTest Test: bit FrameworksServicesTests:com.android.server.NetworkPolicyManagerServiceTest Exempt-From-Owner-Approval: Bug 63673347 Change-Id: I93fae4a43e58e9e4c32f8bf345a257dcd607f088
/frameworks/base/core/res/AndroidManifest.xml
|
468300fd7d0a2ffbe4ed949a84d0f8b33601f18c |
|
20-Jul-2017 |
Philip P. Moltmann <moltmann@google.com> |
Merge "Better translatable msgs for permission requests"
|
71587649836d8e97c2ca00d968fc95293b59b0d3 |
|
06-Jul-2017 |
Andrii Kulian <akulian@google.com> |
Add permission to launch activities on VD 1. Added permission ACTIVITY_EMBEDDING which allows apps to launch activities on virtual displays. 2. Allow owner of display to launch activities from same app without permission check to owned display. 3. Added permission checks for launching on secondary displays to more target task/stack resolution paths in ActivityStarter. Bug: 63117330 Test: android.server.cts.ActivityManagerDisplayTests Test: go/wm-smoke Change-Id: If169a77fb56241e06f7de20168dc38c4b0a217f5
/frameworks/base/core/res/AndroidManifest.xml
|
7e909308d2a6b395b2cc06d526cec81458f59aff |
|
18-Jul-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Unify permissions under UPDATE_DEVICE_STATS."
|
9f09e6a73df1748e980eff26a57e611d68c7ee9a |
|
26-Jun-2017 |
Jeff Sharkey <jsharkey@android.com> |
Unify permissions under UPDATE_DEVICE_STATS. The UPDATE_DEVICE_STATS permission has become the de-facto mechanism that platform components use to shift blame for resource usage, so it's confusing to also have a separate MODIFY_NETWORK_ACCOUNTING permission. So this change replaces MODIFY_NETWORK_ACCOUNTING with UPDATE_DEVICE_STATS. Bug: 62483389 Test: builds, boots Exempt-From-Owner-Approval: Bug 63673347 Change-Id: I872759f02327b6d531ec2338bd876890aded60ad
/frameworks/base/core/res/AndroidManifest.xml
|
4ce1e255859da1fa41b4ef6b62c4fdc2db9a3b9e |
|
17-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Enforce permission for print system APIs"
|
42b4446b0eeb60e01db8174f6e286742a7357ba1 |
|
15-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Iterate NetworkPolicy towards SubscriptionPlan."
|
6870033d374a15fd212675d570a2877c28f1cbf0 |
|
19-Jun-2017 |
Philip P. Moltmann <moltmann@google.com> |
Enforce permission for print system APIs The permission is preinstalled as we want to leave the PrintSpooler unpriviledged. Test: Checked that Settings, PrintSpooler and BuiltInPrintService still behave as expected. Fixes: 62350107 Change-Id: Id33896f2899533f2d05cafa926df29cf1c6bfa77
/frameworks/base/core/res/AndroidManifest.xml
|
53313d7e8153982f842910118371e1dc061248cd |
|
14-Jul-2017 |
Jeff Sharkey <jsharkey@android.com> |
Iterate NetworkPolicy towards SubscriptionPlan. Add new SubscriptionPlan API to describe the various types of carrier data plans. Internally the OS will only use the first plan for driving policy, but it will blindly plumb through the details for Settings to display any secondary plans. As part of getting Settings ready to roll towards SubscriptionPlan, reduce references to NetworkPolicy internal fields. All usage cycle details are now obtained from an Iterator which converts to SubscriptionPlan under the hood. Replace all data usage cycle calculation with new SubscriptionPlan implementation, and retrofit large suite of existing tests to exercise and verify the new logic. Offer a debugging property that can be used to return "fake" plan examples for testing. Bug: 63391323 Test: bit FrameworksServicesTests:com.android.server.NetworkPolicyManagerServiceTest Exempt-From-Owner-Approval: Bug 63673347 Change-Id: I889c653980eeb7887abdfa4f5b6986f35855ee6d
/frameworks/base/core/res/AndroidManifest.xml
|
36b92684f185585ce2391923b3432d92cf1a3f1b |
|
14-Jul-2017 |
Eino-Ville Talvala <etalvala@google.com> |
Merge changes from topic 'camera-tron' into oc-dr1-dev am: 280165118d am: 7dcff07a28 Change-Id: I4dedd4ce9dac9f2a15b651fb9e3cd5c09b39e7c1
|
7dcff07a2846da07241203f607f89c4691aabab3 |
|
14-Jul-2017 |
Eino-Ville Talvala <etalvala@google.com> |
Merge changes from topic 'camera-tron' into oc-dr1-dev am: 280165118d Change-Id: Ic163d728471cb1cdb7dfc60955452a0f1491dc76
|
e91012ba881659e7777aedb60f580384cb0925dd |
|
11-Jul-2017 |
Eino-Ville Talvala <etalvala@google.com> |
CameraServiceProxy: Add CameraStatsLoggingService, event dumping - Collect camera usage events (facing, client, duration) - Create a JobService that triggers roughly daily to dump events Test: Verify that 'adb shell cmd jobscheduler run android 13254266' prints out all camera usage since last run Bug: 32449509 Change-Id: I13172e6e68f5cdb94685a112c74d270d1dda45bf
/frameworks/base/core/res/AndroidManifest.xml
|
19b49f6c3ca051f91243c290e7868f7e83ba7005 |
|
13-Jul-2017 |
Hall Liu <hallliu@google.com> |
Merge "Implement getDownloadStatus and add permission" am: 2fa880d016 am: d45a007222 am: 9888af1dfc am: 81d9c6fe71 Change-Id: Ida7f8cfd440553658108688b84f866dddafa3166
|
81d9c6fe71ce2685fed7f30a66090a3c9752c5da |
|
13-Jul-2017 |
Hall Liu <hallliu@google.com> |
Merge "Implement getDownloadStatus and add permission" am: 2fa880d016 am: d45a007222 am: 9888af1dfc Change-Id: I98d30f379072302a5e76a8b157d8aecdd1616235
|
d45a00722271a39bb420b3d15b6bdd3a675d4dc5 |
|
13-Jul-2017 |
Hall Liu <hallliu@google.com> |
Merge "Implement getDownloadStatus and add permission" am: 2fa880d016 Change-Id: I1c8b9140d6fdc20347858f1296dbccfc60319959
|
0bda0736e0c72f363d0773bea7e7836c73d5dc89 |
|
12-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Update UCE service permissions' protection level from the old "signatureOrSystem" to "signature|privileged". Also: update some outdated protection level documentation in AndroidManifest.xml."
|
c8d6ad8b70c63f7105f201c768771b9ea573bddf |
|
11-Jul-2017 |
Jeff Davidson <jpd@google.com> |
Merge "Move eUICC permissions to com.android namespace." into oc-dr1-dev am: 3fc57019bb am: aa7f92dc6a Change-Id: Ibd65e174e4067a8d45c8b9d45a7f020a48e1cdab
|
3fc57019bb843a6a6e68f7c6452cdfaa43c20d68 |
|
11-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Move eUICC permissions to com.android namespace." into oc-dr1-dev
|
fb5883e58c9498f4eaa4b8ec87e200dbf3a6b3df |
|
10-Jul-2017 |
Peter Visontay <pvisontay@google.com> |
Update UCE service permissions' protection level from the old "signatureOrSystem" to "signature|privileged". Also: update some outdated protection level documentation in AndroidManifest.xml. Test: ... Change-Id: I43345aeb3399aab0e6746dafa1a43f0ac477a6e1
/frameworks/base/core/res/AndroidManifest.xml
|
4db5955557154e40838ad2e6bdf140069b0776f8 |
|
30-Jun-2017 |
Julia Reynolds <juliacr@google.com> |
Allow setup apps to colorize notifications. Fixes: 63147379 Test: runtest systemui-notification, core tests Change-Id: I2077a9fd563826d978d0dc01be89dd0bbc09eebf
/frameworks/base/core/res/AndroidManifest.xml
|
d71c5a94264ba764a139de41c753b9d6e6521d27 |
|
30-Jun-2017 |
Julia Reynolds <juliacr@google.com> |
Allow setup apps to colorize notifications. Fixes: 63147379 Test: runtest systemui-notification, core tests Change-Id: I2077a9fd563826d978d0dc01be89dd0bbc09eebf
/frameworks/base/core/res/AndroidManifest.xml
|
27ffeb33fb60d4ee6a4c2dfd9391c8a6127dfc7c |
|
06-Jul-2017 |
Philip P. Moltmann <moltmann@google.com> |
Better translatable msgs for permission requests Only for system permissions & groups for now and fall back to old system for everything else. Bug: 32070095 Test: Opened camera and saw new string Change-Id: If25308b6cd7cddccaf63ea5ed6c10c037e3c1778
/frameworks/base/core/res/AndroidManifest.xml
|
55f557dc7c1622ec757f7f47d469f742148814a8 |
|
30-Jun-2017 |
Hall Liu <hallliu@google.com> |
Implement getDownloadStatus and add permission - Implement getDownloadStatus in the manager - Remove DownloadStatus and add constants in its place to reflect the status of a single file - Add ACT_AS_EMBMS_MIDDLEWARE permission Change-Id: Ica8b8a872a8088a2aaf56d40926051225aa39e87
/frameworks/base/core/res/AndroidManifest.xml
|
f259a1975bf45737f10ff6fd00e090d92c1f50c3 |
|
06-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover" into oc-dr1-dev
|
b1c474331b075519206278e03748949213c5513c |
|
06-Jul-2017 |
Hiroki Yamamoto <hiroki.a.yamamoto@sony.com> |
Merge "Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover" am: 21187ba5cc am: 1a6d0d753e am: 3ccfa35667 am: 5dd3f8fa85 Change-Id: I7f0c921227028ba27fda062da8e47989d0ef71b5
|
5dd3f8fa855a542a050aff8b1e21b3b6da0f6986 |
|
06-Jul-2017 |
Hiroki Yamamoto <hiroki.a.yamamoto@sony.com> |
Merge "Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover" am: 21187ba5cc am: 1a6d0d753e am: 3ccfa35667 Change-Id: I45ba5cbd9eda39c10c5a26405766905e45eaa6ea
|
1a6d0d753ef004d8c72ea2a7e5548c7fc8cfbd9a |
|
06-Jul-2017 |
Hiroki Yamamoto <hiroki.a.yamamoto@sony.com> |
Merge "Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover" am: 21187ba5cc Change-Id: Iae5a62d77719833dc91c881bd3b90c9ab327a0bf
|
eaa33110a839fd86b121b270ba719a86ab659f87 |
|
14-Apr-2017 |
Hiroki Yamamoto <hiroki.a.yamamoto@sony.com> |
Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover Test: do Nfc Bluetooth Handover and wait for the timeout Bug: 63250718 Change-Id: Ieea8b8f7a07fe90a594ed13ecfefd01e1d60853d (cherry picked from commit 506350b6ddf782ec1f35f4b20b2a833d2313eafa)
/frameworks/base/core/res/AndroidManifest.xml
|
506350b6ddf782ec1f35f4b20b2a833d2313eafa |
|
14-Apr-2017 |
Hiroki Yamamoto <hiroki.a.yamamoto@sony.com> |
Protect TIMEOUT_CONNECT broadcast which is for Nfc Handover Test: do Nfc Bluetooth Handover and wait for the timeout Bug: 63250718 Change-Id: Ieea8b8f7a07fe90a594ed13ecfefd01e1d60853d
/frameworks/base/core/res/AndroidManifest.xml
|
3b16d3fc1ebfbd7b318c328a6060cb61d5a94e0b |
|
06-Jul-2017 |
Jeff Davidson <jpd@google.com> |
Move eUICC permissions to com.android namespace. Change-Id: I3457fbb29d04ec82cb5bf819ca479bfe707e3e3f Test: eSIM sanity check + CTS PermissionPolicyTest Fixes: 62375320
/frameworks/base/core/res/AndroidManifest.xml
|
93c2838ec1331977e2ab064af55e308b9ac1e8c7 |
|
05-Jul-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Create new permission READ_CONTENT_RATING_SYSTEMS"
|
01ad4345f92080439a5ccde9cb085f3f90d8709b |
|
30-Jun-2017 |
Wale Ogunwale <ogunwale@google.com> |
Added PRIVATE_FLAG_HIDE_NON_SYSTEM_OVERLAY_WINDOWS window flag. When a window with this flag is visible, then any other window added by an application process that requires OP_SYSTEM_ALERT_WINDOW permission or that are of TYPE_TOAST will be hidden. Bug: 62196835 Test: go/wm-smoke Test: Added the new flag to the RecentsActivity onCreate, launched FB chat heads and observed the head head become invisible when Recents is visible and the chat head become visible when Recents is no longer visible. Change-Id: I1a3e3c5b1696a5f5b95eac187acb5a03863b4a0b
/frameworks/base/core/res/AndroidManifest.xml
|
2b07bbafa261c27409cd7ca8c586521f54babd96 |
|
17-Jun-2017 |
Jack He <siyuanh@google.com> |
Add APIs to get remote device's battery level (1/2) * Add BluetoothDevice.getBatteryLevel() API to retreive battery level information of remote device * Add BluetoothDevice.ACTION_BATTERY_LEVEL_CHANGED intent to notify user that remote device's battery level has changed Bug: 35874078 Test: make, pair with devices and use them Change-Id: I41051ee25383f5f3a1e505aef6f8c526385f58bd Merged-In: I41051ee25383f5f3a1e505aef6f8c526385f58bd (cherry picked from commit 1d312bfa78c25e0e1d6ea25b2c027e2efdd5a418)
/frameworks/base/core/res/AndroidManifest.xml
|
d3307ffc8a576d8509a3620b77d19bd387734231 |
|
28-Jun-2017 |
Shubang <shubang@google.com> |
Create new permission READ_CONTENT_RATING_SYSTEMS Bug: 63016153 Test: make Change-Id: Id770424f7d502790968c84039ee3624a2fa2d639
/frameworks/base/core/res/AndroidManifest.xml
|
e70848b8a915d2c1042932f246d790f508e98f74 |
|
28-Jun-2017 |
Jack He <siyuanh@google.com> |
Merge "Add APIs to get remote device's battery level (1/2)" am: ceaccbfe70 am: 96f98f255b am: 3b22538b46 am: 45c074d406 Change-Id: I64c83fe094697b9d34a41e4044606e07d15a42e2
|
45c074d40680e80d1b75dea39a4aba58962a9852 |
|
28-Jun-2017 |
Jack He <siyuanh@google.com> |
Merge "Add APIs to get remote device's battery level (1/2)" am: ceaccbfe70 am: 96f98f255b am: 3b22538b46 Change-Id: I0a579a4dfd47161b3d9aaccaae9a9a43fcc3bafd
|
96f98f255ba794441883377d81d7a9d4c11967c0 |
|
28-Jun-2017 |
Jack He <siyuanh@google.com> |
Merge "Add APIs to get remote device's battery level (1/2)" am: ceaccbfe70 Change-Id: Ic3253ef666632aaaffe8e1547dc563cd3bca9e37
|
1d312bfa78c25e0e1d6ea25b2c027e2efdd5a418 |
|
17-Jun-2017 |
Jack He <siyuanh@google.com> |
Add APIs to get remote device's battery level (1/2) * Add BluetoothDevice.getBatteryLevel() API to retreive battery level information of remote device * Add BluetoothDevice.ACTION_BATTERY_LEVEL_CHANGED intent to notify user that remote device's battery level has changed Bug: 35874078 Test: make, pair with devices and use them Change-Id: I41051ee25383f5f3a1e505aef6f8c526385f58bd
/frameworks/base/core/res/AndroidManifest.xml
|
12148fa980f68fc3aac051d88a392fbd507330ef |
|
23-Jun-2017 |
Ying Xu <yinxu@google.com> |
Merge "Add flag to wipe eUICC data" into oc-dr1-dev am: 05ce703c87 am: a465181691 Change-Id: I8a54d9ab00223155e473b7ea4683a48def627288
|
f4f9cec234bf147f0067cef2791a26eaa2cde0a0 |
|
19-Jun-2017 |
yinxu <yinxu@google.com> |
Add flag to wipe eUICC data Add a new flag in the DevicePolicyManager so that we can Use EuiccManager#eraseSubscriptions(PendingIntent) to erase all the carrier data from eUICC chip if the user choose to "ERASE" from the Android device manager. Bug: 37277944 Test: E2E Change-Id: Ia78090a00d956c645725be4fd591e02ded8ec467
/frameworks/base/core/res/AndroidManifest.xml
|
f5b210a81893fa345b20da11c9edd9e31caf0658 |
|
21-Mar-2017 |
Kevin Hufnagle <khufnagle@google.com> |
Merge from oc-preview-docs-release: docs: Added note that INSTALL_SHORTCUT is implicit broadcast as of O. The INSTALL_SHORTCUT broadcast is now a private, implicit broadcast, so app developers should pin a shortcut themselves using the methods in the ShortcutManager class on Android O and higher. Updated manifest permission doc accordingly. Test: make ds-docs Bug: 36442658 Change-Id: I1777dfde691089485dc4e6b7cb8a9de0ee527298 Original-Change-Id: I0ef5595e2f08efbab6c28af5fa2f6b6c2295424c
/frameworks/base/core/res/AndroidManifest.xml
|
2ddb92f2d96ad11bdd7c00253bbfd292d3ce3314 |
|
13-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Merge "Protect broadcast used in settings for bond cancel" into oc-dev am: 68a4c91bb4 Change-Id: Ifdb4b625f21dcda5248071263aaf6936158efb39
|
4e06743f218ce996c9774c49812b0d9c9de6e469 |
|
13-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Merge "Merge "Protect broadcast used in settings for bond cancel" am: 5cfbbce162 am: 00bce50dc3 am: 297dbb86fe" into oc-dr1-dev-plus-aosp am: 1270b399cc Change-Id: I77469544f4cd29f2393e4310ff83ed1da4d5ecfe
|
f1b9ee029d309264c3e199e2a3ebc5a67a8943df |
|
13-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Merge "Protect broadcast used in settings for bond cancel" am: 5cfbbce162 am: 00bce50dc3 am: 297dbb86fe Change-Id: I630bc69705870d4cd7252da9bc8501c564950393
|
297dbb86fed9075b3124583d8b9f9684a1357392 |
|
13-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Merge "Protect broadcast used in settings for bond cancel" am: 5cfbbce162 am: 00bce50dc3 Change-Id: I4235d63f1c9aeb3be8b276c082d707e20f8c1d9a
|
77ded58c5f2dade7752f361f0b41fc9e10c9681c |
|
10-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Protect broadcast used in settings for bond cancel Test: cancel pairing from notification tray Bug: 62094630 Change-Id: Ia83a874c1ea9a1d9d5502609f81e94052bb5759c (cherry picked from commit 977992f3fc9f4f6bb2d1f9536143327a6021c5d1)
/frameworks/base/core/res/AndroidManifest.xml
|
977992f3fc9f4f6bb2d1f9536143327a6021c5d1 |
|
10-Jun-2017 |
Marie Janssen <jamuraa@google.com> |
Protect broadcast used in settings for bond cancel Test: cancel pairing from notification tray Bug: 62094630 Change-Id: Ia83a874c1ea9a1d9d5502609f81e94052bb5759c
/frameworks/base/core/res/AndroidManifest.xml
|
b22da80734b7f8069f0558137297a359fcaf70d0 |
|
09-Jun-2017 |
Julius D'souza <jdsouza@google.com> |
Deprecate screen brightness boost detection. Deprecated: PowerManager#isScreenBrightnessBoosted ACTION_SCREEN_BRIGHTNESS_BOOST_CHANGED Bug: 62348163 Test: isScreenBrightnessBoosted should return false. Change-Id: Ia580daeffb249110a6adf1e46052966a718226cb
/frameworks/base/core/res/AndroidManifest.xml
|
53bd7b553bddd809e8bcd0973b186516a7761bf4 |
|
08-Jun-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add permission CHANGE_HDMI_CEC_ACTIVE_SOURCE"
|
4fddc9fa4d39d808bd23e9cf7b098587fa67c2a3 |
|
05-Jun-2017 |
Kevin Chyn <kchyn@google.com> |
Add setting and permission for assist gesture Bug: 37427306 Test: manual Merged-In: I659fa43fb085575df4d62e7765d88c6fd615fb7d Change-Id: I659fa43fb085575df4d62e7765d88c6fd615fb7d
/frameworks/base/core/res/AndroidManifest.xml
|
e41b76f15a1b6f0dc257afc3af789bb46b90121c |
|
07-Jun-2017 |
Shubang <shubang@google.com> |
Add permission CHANGE_HDMI_CEC_ACTIVE_SOURCE Test: mmm Bug: 62270868 Change-Id: I7e8aad5324598ae2e2408d6ef6cb62d58d687d0e
/frameworks/base/core/res/AndroidManifest.xml
|
cfd641e8dc65f1b1460f1cba9641b95cf99ad9e0 |
|
05-Jun-2017 |
Kevin Chyn <kchyn@google.com> |
Add setting and permission for assist gesture Bug: 37427306 Test: manual Change-Id: I659fa43fb085575df4d62e7765d88c6fd615fb7d
/frameworks/base/core/res/AndroidManifest.xml
|
ae6455957b13fbd5e892231cec2e9d243b5fd449 |
|
06-Jun-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Initial support for proposed android.net.lowpan"
|
4e0c2195dd999859f4e79cec1884326fb52a5916 |
|
08-Feb-2017 |
Robert Quattlebaum <rquattle@google.com> |
Initial support for proposed android.net.lowpan Change-Id: I0bf8edb5199d50d2a549a353b2785aef8134ff92
/frameworks/base/core/res/AndroidManifest.xml
|
f4abac4d8f8ea9041b0106161bfda20f844aade6 |
|
26-May-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission." into oc-dev
|
c50c89a5d89b35c0a0c69c51ea73d2eea9dcb9af |
|
24-May-2017 |
Todd Kennedy <toddke@google.com> |
Merge "System installed launcher can see instant apps" into oc-dev am: 1de10d6602 am: 4cdc26746e Change-Id: I2a66bfa001ea03205535bc0337f720d869fa9132
|
4cdc26746e4a78a59013c329c4c5803fec21f931 |
|
24-May-2017 |
Todd Kennedy <toddke@google.com> |
Merge "System installed launcher can see instant apps" into oc-dev am: 1de10d6602 Change-Id: I70d707c25ed793bd2ad8e58f3558d2a4d0b6e980
|
3051caac52729c8c059eb538805f4d274a9945a5 |
|
24-May-2017 |
Todd Kennedy <toddke@google.com> |
System installed launcher can see instant apps Change-Id: I97f791b61f9b4f7ed33305345bf3d92394b40ae4 Fixes: 38202759 Test: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.EphemeralTest Test: Manual. Create sample app that replaces the launcher to test ability to see ephemeral apps.
/frameworks/base/core/res/AndroidManifest.xml
|
5985d027a1d411cc5a8f55518f0b8d33ca1f737d |
|
10-May-2017 |
Rebecca Silberstein <silberst@google.com> |
Merge "Create a new NETWORK_SETTINGS permission" into oc-dev am: ed285e0cd6 am: a5b8380b03 Change-Id: I1fab5a10644d7f24a304e24f373461c72c03d9a6
|
a5b8380b035b6169b81ac0b536dcf90fba23d02f |
|
10-May-2017 |
Rebecca Silberstein <silberst@google.com> |
Merge "Create a new NETWORK_SETTINGS permission" into oc-dev am: ed285e0cd6 Change-Id: Iae9b1317dc53a8213861ff3803764f9d45758f71
|
e694fa7f29dc38e2f3559217d4218603178cb839 |
|
10-May-2017 |
Rebecca Silberstein <silberst@google.com> |
Create a new NETWORK_SETTINGS permission Create a new signature permission that allows SystemUI to call critical methods in Connectivity and Wifi Services. Bug: 36760523 Test: make Change-Id: I475e4c1c040fd3dee87b86d2845c0801195d29d1
/frameworks/base/core/res/AndroidManifest.xml
|
6a9ad74c29fcf774dca3943ad4858ce0fcf40697 |
|
04-May-2017 |
Siarhei Vishniakou <svv@google.com> |
Merge "Adding feature: input device disable/enable."
|
167b0473854c967479f3bcf81978bc21bdf5d6bd |
|
16-Mar-2017 |
Neil Fuller <nfuller@google.com> |
Time zone update API classes Time zone update API classes. Currently hidden but they will go on to be unhidden in future. This forms the basis of client and system server code to support time zone updates. Tests can be run with: make -j30 FrameworksCoreTests adb install out/target/product/angler/data/app/FrameworksCoreTests/FrameworksCoreTests.apk adb shell am instrument -e package android.app.timezone \ -w com.android.frameworks.coretests \ "com.android.frameworks.coretests/android.support.test.runner.AndroidJUnitRunner" This contains a cherry-pick / conflict resolution of commit bede17c216815a849be0c43d5ce7daaf750a9fac after an automerger skip. (cherry picked from commit bede17c216815a849be0c43d5ce7daaf750a9fac) Bug: 31008728 Test: See above. Merged-In: I668bc8ac0cb78f3d4d9a4b7ad6ac1534b88af833 Change-Id: Icde574f8974152617a1f7ac9fa225bd5011dcce1
/frameworks/base/core/res/AndroidManifest.xml
|
cfe0c2f1ec875280d34cfb790ebd119a2c979858 |
|
04-May-2017 |
Neil Fuller <nfuller@google.com> |
Merge "Time zone update API classes"
|
bede17c216815a849be0c43d5ce7daaf750a9fac |
|
16-Mar-2017 |
Neil Fuller <nfuller@google.com> |
Time zone update API classes Time zone update API classes. Currently hidden but they will go on to be unhidden in future. This forms the basis of client and system server code to support time zone updates. Tests can be run with: make -j30 FrameworksCoreTests adb install out/target/product/angler/data/app/FrameworksCoreTests/FrameworksCoreTests.apk adb shell am instrument -e package android.app.timezone \ -w com.android.frameworks.coretests \ "com.android.frameworks.coretests/android.support.test.runner.AndroidJUnitRunner" Bug: 31008728 Test: See above. Merged-In: I668bc8ac0cb78f3d4d9a4b7ad6ac1534b88af833 Change-Id: Icde574f8974152617a1f7ac9fa225bd5011dcce1
/frameworks/base/core/res/AndroidManifest.xml
|
fe6ec56cce981731be7d0bc0e61a0411d0a0d2cf |
|
16-Mar-2017 |
Neil Fuller <nfuller@google.com> |
Time zone update API classes Time zone update API classes. Currently hidden but they will go on to be unhidden in future. This forms the basis of client and system server code to support time zone updates. Tests can be run with: make -j30 FrameworksCoreTests adb install out/target/product/angler/data/app/FrameworksCoreTests/FrameworksCoreTests.apk adb shell am instrument -e package android.app.timezone \ -w com.android.frameworks.coretests \ "com.android.frameworks.coretests/android.support.test.runner.AndroidJUnitRunner" Bug: 31008728 Test: See above. Change-Id: I668bc8ac0cb78f3d4d9a4b7ad6ac1534b88af833
/frameworks/base/core/res/AndroidManifest.xml
|
34e0a257d5cc12d7409d4513278f322219bbd81f |
|
02-May-2017 |
Tyler Gunn <tgunn@google.com> |
Merge "Change MANAGE_OWN_CALLS permission to be a "normal" permission."
|
47145a07556c2fcbc1d07bdfaf2592445782c228 |
|
28-Apr-2017 |
Tyler Gunn <tgunn@google.com> |
Change MANAGE_OWN_CALLS permission to be a "normal" permission. Also remove from Phone group since this isn't really related to phone calls as much as interacting with Telecom APIs. Test: Manual Bug: 37722558 Merged-In: Ia972db4bd79a34bc9b9d3896910adc205c286367 Change-Id: Icc4d2170cc7c83f653eeb0438938f7c0c91a0a7c
/frameworks/base/core/res/AndroidManifest.xml
|
f43e191668954e9038bc618a9cf608af28cfd077 |
|
02-May-2017 |
Eugene Susla <eugenesusla@google.com> |
Merge "Change protection level of companion permissions" into oc-dev am: 897f883409 am: 84666dc643 Change-Id: I74c400f5bbf66f8c2032dd2445dfcb0a3ffb4edc
|
84666dc643f2a44e9b8a5ca77e127364cf6f4356 |
|
02-May-2017 |
Eugene Susla <eugenesusla@google.com> |
Merge "Change protection level of companion permissions" into oc-dev am: 897f883409 Change-Id: I5b123b603debc11a6ef0ed12a5f6da5d0c3ee533
|
fa09f7a1b9baefb38c2e9bffb7f26e36099d62c1 |
|
01-May-2017 |
Eugene Susla <eugenesusla@google.com> |
Change protection level of companion permissions Fixes: 37721270 Test: Ensure co build errors Change-Id: Ide6ce7c83f466ef6886b2aad0228176ae84314b2
/frameworks/base/core/res/AndroidManifest.xml
|
b9a71dfd38e314f463461ed729da90c84ec809f0 |
|
22-Mar-2017 |
Julius D'souza <jdsouza@google.com> |
Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission. Merged-In: I253766553a507e2ada7d631501d8d32d863a823f Bug: 36515029 Test: No build failure; SystemServer loads as usual. Change-Id: I253766553a507e2ada7d631501d8d32d863a823f (cherry picked from commit 069f46ca34162e531229aba04b0099ea1b9df6b1)
/frameworks/base/core/res/AndroidManifest.xml
|
a7f99b5ea884cc1b0ad9217b752b540d4ad2341d |
|
22-Mar-2017 |
Siarhei Vishniakou <svv@google.com> |
Adding feature: input device disable/enable. This functionality will only be available for signed system applications. A disable call will cause a file descriptor to the input device driver to be closed, which in turn may cause the input device to switch into a low-power mode. An enable call will reopen the input device. Bug: 30143923 Test: developed a custom apk with signature permission that calls disable/enable on touchscreen device. Verified that touchscreen stops working when disable is called and starts working again when enable is called. Verified that the file handle to the driver is closed and reopened. Verified that the notification onInputDeviceChanged is received in the app. CTS test - android.view.cts.InputDeviceEnabledTest Change-Id: I1e42c6996e679c083cd3f0c9adfaef8ba22c4ee4
/frameworks/base/core/res/AndroidManifest.xml
|
3bc1e00541dc181beaed025f80b87c6969d5f700 |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Change MANAGE_OWN_CALLS permission to be a "normal" permission." into oc-dev am: e24457409e am: 9930a35e44 Change-Id: I75d43755aa93fc370fe2c7ff37ec89c4f689eb3b
|
9930a35e44db2ffc59e4f5082efdd46d1aaaab2e |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Change MANAGE_OWN_CALLS permission to be a "normal" permission." into oc-dev am: e24457409e Change-Id: I5998fd5c20c43a3a5595919abc4c77a0715ab044
|
e24457409e0e3ff623ab42e2b7f208bd2b559f56 |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Change MANAGE_OWN_CALLS permission to be a "normal" permission." into oc-dev
|
ea2710d27cc816e6d5d501b06e79def24d1f2a77 |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Move intents ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED, ACTION_DEFAULT_SUBSCRIPTION_CHANGED and EXTRA_SUBSCRIPTION_INDEX from Intent class to SubscriptionManager class." into oc-dev am: 080e16575a am: f89879a133 Change-Id: Iac4f73f0c20ce3b95d406d487a5ed2f8ed391033
|
f89879a1331a213855decb25a627c7c1ad4d31ee |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Move intents ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED, ACTION_DEFAULT_SUBSCRIPTION_CHANGED and EXTRA_SUBSCRIPTION_INDEX from Intent class to SubscriptionManager class." into oc-dev am: 080e16575a Change-Id: I8e81a2f5361d2fc6ab61cb38f69fe1e0eb867e63
|
080e16575a5a97aa94498f6dd544d6cbd66faed8 |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Move intents ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED, ACTION_DEFAULT_SUBSCRIPTION_CHANGED and EXTRA_SUBSCRIPTION_INDEX from Intent class to SubscriptionManager class." into oc-dev
|
e4c86e4cb9fec7270edad4e2fdd0e86e00babecf |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Change android.permission.RESTRICTED_VR_ACCESS to SystemAPI" into oc-dev am: 1c9e549c00 am: a70ba223b3 Change-Id: Ib0d10d38e7454cc4ee94b9195d81b6a49a56b94a
|
a70ba223b3678183411ea2e6d01c2d2e6d0a2170 |
|
01-May-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Change android.permission.RESTRICTED_VR_ACCESS to SystemAPI" into oc-dev am: 1c9e549c00 Change-Id: I22e49d7404e21917d5e805424cecd2fad50d1aa4
|
d74c0a79b5db12659c2750a0ec32da5ff9512ef1 |
|
28-Apr-2017 |
Karthik Ravi Shankar <karthikrs@google.com> |
Change android.permission.RESTRICTED_VR_ACCESS to SystemAPI android.permission.RESTRICTED_VR_ACCESS is currently an open API. But since it can only be used by System Apps because of it's protection level which is "signature|preinstalled". Change this to a @SystemApi. Bug: 37724255 Test: run gts --module GtsPermissionTestCases 1. Run with two apps having android.permission.RESTRICTED_VR_ACCESS before change -- fails. 2. Run with two appshaving android.permission.RESTRICTED_VR_ACCESS after this change -- passes. Change-Id: I9e640b0794fa16d03ba22e8aa75175e7e08dd88b Signed-off-by: Karthik Ravi Shankar <karthikrs@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
cb32d062f02fe20bfd500b16204ff82fae813f9d |
|
29-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Merge commit '2aaa8a6ad5ab9f36075c642bd41bfaf5f43fa0a7' into dec10 Change-Id: I7940f41fe5906377f357a6cd711fa3e1660ebef1
|
2aaa8a6ad5ab9f36075c642bd41bfaf5f43fa0a7 |
|
29-Apr-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Rename Companion permissions" into oc-dev am: 48c0dc6c4b Change-Id: Ia52e6c6347969612dc1d4baf036fd696ac568c58
|
48c0dc6c4b1a80ea134164a9acd791593f55aed6 |
|
29-Apr-2017 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Rename Companion permissions" into oc-dev
|
598d24c55817cfbd00b6dafdf772334a7039fe3e |
|
25-Apr-2017 |
Malcolm Chen <refuhoo@google.com> |
Move intents ACTION_DEFAULT_SMS_SUBSCRIPTION_CHANGED, ACTION_DEFAULT_SUBSCRIPTION_CHANGED and EXTRA_SUBSCRIPTION_INDEX from Intent class to SubscriptionManager class. Bug: 37497166 Test: Manual Change-Id: Ifeedf974328cd3d839d7f66bf41a91c479d66316
/frameworks/base/core/res/AndroidManifest.xml
|
bde7b4aa0f65301d46f58116b6e777fb1613edb0 |
|
28-Apr-2017 |
Tyler Gunn <tgunn@google.com> |
Change MANAGE_OWN_CALLS permission to be a "normal" permission. Also remove from Phone group since this isn't really related to phone calls as much as interacting with Telecom APIs. Test: Manual Bug: 37722558 Change-Id: Icc4d2170cc7c83f653eeb0438938f7c0c91a0a7c
/frameworks/base/core/res/AndroidManifest.xml
|
dd6a433163f814a5ac08f05535113d763f2b941e |
|
28-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Respond to API council feedback." into oc-dev am: 77cc43e0d2 am: 86e27f65f8 Change-Id: I7933a8ba6858d38423b29a52dfc5f9f65c641faf
|
86e27f65f8c84a9801892dc1cf19775d4f5380b7 |
|
28-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Respond to API council feedback." into oc-dev am: 77cc43e0d2 Change-Id: I0c2b86d34cfd2b2f5b94bc693657b40ecbd764fe
|
77cc43e0d261a3db835d062e5c770b91b0a80bd9 |
|
28-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Respond to API council feedback." into oc-dev
|
066422180bd8a93739ae89dd9eaaa4a021d976b7 |
|
28-Apr-2017 |
Eugene Susla <eugenesusla@google.com> |
Rename Companion permissions Test: ensure permission check still works Fixes: 37721270 Change-Id: I1ff5c2924ee837c8b4a6e2825dce171e6a2e00cb
/frameworks/base/core/res/AndroidManifest.xml
|
a4d34d971c9566a162a53e6b027ba2bc341ae5b4 |
|
27-Apr-2017 |
Jeff Sharkey <jsharkey@android.com> |
Respond to API council feedback. Move aggressive allocation to @SystemApi, which means we can hide the "flags" API variants. Remove UUID APIs, since we should use existing Serializable APIs. Relax permission checks to allow apps to ask for their own stats. Improve docs. Test: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.StorageHostTest Bug: 37534687, 37534941, 37718184, 37738770 Change-Id: I6a763fb3ab3169c8d3329765bb31e1ee08d9ced7
/frameworks/base/core/res/AndroidManifest.xml
|
f5c6ce029c3efbba8e7f9cb20a3cce08730b203b |
|
27-Apr-2017 |
Felipe Leme <felipeal@google.com> |
Merge "Autofill binding permission fixes." into oc-dev am: d915c42150 am: bd67d13bfc Change-Id: I714263ccec13b4e96f30b180340b9087f900ae0b
|
bd67d13bfcd9fd3fa1449dd44c7da844a7731fb1 |
|
27-Apr-2017 |
Felipe Leme <felipeal@google.com> |
Merge "Autofill binding permission fixes." into oc-dev am: d915c42150 Change-Id: I355fe15bed198f2db1bd819bbeb138be9bea56d2
|
decd887f012f0c39bba855c8878eb5d8255595c4 |
|
27-Apr-2017 |
Felipe Leme <felipeal@google.com> |
Autofill binding permission fixes. - Removed deprecated BIND_AUTO_FILL - Renamed BIND_AUTOFILL to BIND_AUTOFILL_SERVICE - Kept BIND_AUTOFILL as @hide - Fixed the permission code The permission check was actually ignored; it was probably broken when we introduced support to settings. Fixes: 37723410 Bug: 37563972 Test: manual verification with existing client Test: CtsAutoFillServiceTestCases pass Change-Id: If3abdcb0ae850f0a327bfdbb9ca6c44a24823047
/frameworks/base/core/res/AndroidManifest.xml
|
4a6df3c3832e14bedb20d85d3b30bbe89989c621 |
|
16-Dec-2016 |
Ta-wei Yen <twyen@google.com> |
Add VisualVoicemailService VisualVoicemailService can be implemennted by the default dialer to provide a visual voicemail client similar to the OMTP visual voicemail spec. Other APIs such as the SMS filter and hidden text SMS sending are made public and consolidated into the service interface. Test: make. CTS tests in a follow up CL Change-Id: Ib5e9aa15fc098f4c13b15e5dbecf9ab646e0e400 Merged-in: Ib5e9aa15fc098f4c13b15e5dbecf9ab646e0e400
/frameworks/base/core/res/AndroidManifest.xml
|
1a297e53dc24ecca0e0936534b699b5fd00fda3e |
|
24-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources." into oc-dev am: 925d3cf211 Change-Id: I9174e1f12c78ff4f7bbd72446fbf10e09478dbe0
|
925d3cf211feb701f20d5d3d5e72d4cc48c7a0c9 |
|
24-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources." into oc-dev
|
dd749b0f61de8e0fc8bf48f7907009b5c5eb77de |
|
18-Apr-2017 |
Stanley Tng <stng@google.com> |
Allow the Bluetooth MAC address to be updated asynchronously (2/3) There are intermittent issues where either the returned Bluetooth MAC address to Java framework is uninitialized or this address update arrives too late. This fix will do 2 things: (1) Returns error when MAC address is unavailable in the native code. (2) Updates the MAC address later by adding a new broadcast event. Test: Check address for these cases: factory reset, system reboot, and Bluetooth re-enable. Bug: 36709382 Change-Id: I09720193e38fdf9139e1bb146f8e1847e2b65b1a (cherry picked from commit ad4d1d8e28618546953e75d4983335631feb6f2a)
/frameworks/base/core/res/AndroidManifest.xml
|
0f80719a6f3c30619ad73a9f2452626ed5ef5bd0 |
|
13-Apr-2017 |
Kang Li <kanlig@google.com> |
Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources. Test: manually shared images in Camera, and in PTP to confirm it works as expected. Change-Id: I3549292d424fec949e9115faea7a0c5bdec06e87 (cherry picked from commit 61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3)
/frameworks/base/core/res/AndroidManifest.xml
|
ee8187688effbe5a2036d95d115e75bc828f7a0f |
|
21-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources."
|
61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3 |
|
13-Apr-2017 |
Kang Li <kanlig@google.com> |
Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources. Test: manually shared images in Camera, and in PTP to confirm it works as expected. Change-Id: I3549292d424fec949e9115faea7a0c5bdec06e87
/frameworks/base/core/res/AndroidManifest.xml
|
a40fbd0e736527aa691a6444e39ac989d7cf03a6 |
|
21-Apr-2017 |
Stanley Tng <stng@google.com> |
Merge "Allow the Bluetooth MAC address to be updated asynchronously (2/3)" am: c5680c9b05 am: 16609dfe18 am: 559f49a4a8 am: 4a6356942d Change-Id: I874338efb281ddcbb5ddbb8b23814d25512d1f15
|
4a6356942df0b235aea57962c1a8d58483230569 |
|
21-Apr-2017 |
Stanley Tng <stng@google.com> |
Merge "Allow the Bluetooth MAC address to be updated asynchronously (2/3)" am: c5680c9b05 am: 16609dfe18 am: 559f49a4a8 Change-Id: I6fa8f334a84132e121db7c517ea50ff8d8047611
|
559f49a4a8bd571b276ea94e28b6b017365aeb0e |
|
21-Apr-2017 |
Stanley Tng <stng@google.com> |
Merge "Allow the Bluetooth MAC address to be updated asynchronously (2/3)" am: c5680c9b05 am: 16609dfe18 Change-Id: I9c9c500bab98168da48d69cc7e4c93a33b8571bd
|
ad4d1d8e28618546953e75d4983335631feb6f2a |
|
18-Apr-2017 |
Stanley Tng <stng@google.com> |
Allow the Bluetooth MAC address to be updated asynchronously (2/3) There are intermittent issues where either the returned Bluetooth MAC address to Java framework is uninitialized or this address update arrives too late. This fix will do 2 things: (1) Returns error when MAC address is unavailable in the native code. (2) Updates the MAC address later by adding a new broadcast event. Test: Check address for these cases: factory reset, system reboot, and Bluetooth re-enable. Bug: 36709382 Change-Id: I09720193e38fdf9139e1bb146f8e1847e2b65b1a
/frameworks/base/core/res/AndroidManifest.xml
|
e0a8e5bcef921595124ce975a1aa9e49d5940d67 |
|
20-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Merge "Merge changes from topics 'smartselectconfig', 'langidconfig' into oc-dev am: 06a53d4729" into oc-dev-plus-aosp am: 528adaed4f Change-Id: If30d4f866655de89618d1afcb5560f9827691e11
|
d5857c4e9fd6721abbba88e319d251b643b7b518 |
|
20-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Merge changes from topics 'smartselectconfig', 'langidconfig' into oc-dev am: 06a53d4729 Change-Id: Ia739bdad9c5877f9e02efba709521fb9c9dc8795
|
a3f70c18af934c3616952acc7bc997d8a4bdc725 |
|
20-Apr-2017 |
Christopher Tate <ctate@google.com> |
Merge "Revert "Introduce PACKAGE_FIRST_ADDED broadcast"" into oc-dev am: aa6b649a35 am: e56d699a89 Change-Id: I5d684f3dc14130655868394b001d2960a84d1579
|
06a53d4729a679be5b3b716b31a62a112b45ff59 |
|
20-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
Merge changes from topics 'smartselectconfig', 'langidconfig' into oc-dev * changes: SmartSelection Config installer. LangId Config installer.
|
e56d699a89d8460328188b75e1ad86631b4da2a9 |
|
20-Apr-2017 |
Christopher Tate <ctate@google.com> |
Merge "Revert "Introduce PACKAGE_FIRST_ADDED broadcast"" into oc-dev am: aa6b649a35 Change-Id: Ic5d9b128ecaa52ef28d2d9d03748a3a919c64cd6
|
94b91dbbb899a4a1c9e5eec6cda5d7138f0a49b7 |
|
20-Apr-2017 |
Christopher Tate <ctate@google.com> |
Revert "Introduce PACKAGE_FIRST_ADDED broadcast" This reverts commit ee3b42af3f23c37cbd2799c1527f89ac623844be. Bug 37219124 Test: manual
/frameworks/base/core/res/AndroidManifest.xml
|
bb957d12ba96f3a1afcecbcdae8040dcaf35d35e |
|
12-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
SmartSelection Config installer. Test: none Bug: 34780396 Change-Id: I9cb04e7b20b565ac5d128475a90bd065c805e95e
/frameworks/base/core/res/AndroidManifest.xml
|
51c4203ab4223b5cc601dbca2755bbe76082f455 |
|
02-Apr-2017 |
Abodunrinwa Toki <toki@google.com> |
LangId Config installer. Test: none Bug: 34780396 Change-Id: I6cdd608ea9a41041d03640997c076c6e6fea0129
/frameworks/base/core/res/AndroidManifest.xml
|
1c6b5765bbdbb5f406baa53c1b3b326bc7f0f7fb |
|
15-Apr-2017 |
Eugene Susla <eugenesusla@google.com> |
Merge "API for notification listener for Companioon apps" into oc-dev am: 0d88904744 am: 0fb1104b25 Change-Id: I33326544bd1eef9abc900ea13cb2fdf32ad06cbe
|
0fb1104b256d4b3b8ab121707f9ff68e82e81d32 |
|
15-Apr-2017 |
Eugene Susla <eugenesusla@google.com> |
Merge "API for notification listener for Companioon apps" into oc-dev am: 0d88904744 Change-Id: Ie6093be3e7699481473eeb597bc4d604728330a2
|
cf00adebec29d4cdbec5bc0f004b26a09327c236 |
|
10-Apr-2017 |
Eugene Susla <eugenesusla@google.com> |
API for notification listener for Companioon apps Test: 1. Trigger the confitrmation dialog. Ensure it looks exactly like the one from settings. 2. Call an API without associating the appa first Ensure exception is thrown with a message mentioning the need to associate 1st Change-Id: I94d4116e1988db869ed445ae3fd018c50590e3f4
/frameworks/base/core/res/AndroidManifest.xml
|
1b674659182e5d012f86d75cc6cb0016546a4af9 |
|
14-Apr-2017 |
Andrew Scull <ascull@google.com> |
Merge "Service for OEM lock management." into oc-dev am: e52a1bfede am: d4be031c76 Change-Id: I9ab76546a140062940c128abdc2b8b4072d3b0f2
|
25b5fa9d79577ad770eb30e355b3899b20d4dfef |
|
14-Apr-2017 |
Dmitry Dementyev <dementyev@google.com> |
Merge "Merge "Add ACTION_ACCOUNT_REMOVED to Account Manager." into oc-dev am: 2a30085e5c" into oc-dev-plus-aosp am: 0bf753d2e5 Change-Id: I362b107071fc3f9c61a5e183d9a4fdd685ded1d7
|
08b24d15079fac51e661280d109af97f3a11bd46 |
|
14-Apr-2017 |
Dongwon Kang <dwkang@google.com> |
Merge "TIF: add helper methods for making a channel browsable." into oc-dev am: b2eb818a7d am: 3d9ecc264d Change-Id: I321131835e44d67bb5fab085bc7f36a838dd40e3
|
d593e402c20cf819fa3d73db5ba9e3ff0508d656 |
|
14-Apr-2017 |
Chris Tate <ctate@android.com> |
Merge "Introduce PACKAGE_FIRST_ADDED broadcast" into oc-dev am: 117ac766a9 am: 636915a2ed Change-Id: I28d8d31b30c9b500be1796566bb9885741b9aedc
|
d4be031c76a0f451b8f47046d0962178f00c5773 |
|
14-Apr-2017 |
Andrew Scull <ascull@google.com> |
Merge "Service for OEM lock management." into oc-dev am: e52a1bfede Change-Id: I074e29147417d6a358fd97e7e60cd4cfbed5c4df
|
e52a1bfede79f87a75c498730860796ba74dea83 |
|
14-Apr-2017 |
Andrew Scull <ascull@google.com> |
Merge "Service for OEM lock management." into oc-dev
|
11e1805ab3b502ac8fbfd28c7de4b6e24713c273 |
|
14-Apr-2017 |
Dmitry Dementyev <dementyev@google.com> |
Merge "Add ACTION_ACCOUNT_REMOVED to Account Manager." into oc-dev am: 2a30085e5c Change-Id: I2f583203d8b97f0a56c8b911d20098a3ed1772eb
|
2a30085e5ca4a29001a42d21ece791ccf19a96cb |
|
14-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add ACTION_ACCOUNT_REMOVED to Account Manager." into oc-dev
|
3d9ecc264d64088681a81018f851db45a3a8354f |
|
13-Apr-2017 |
Dongwon Kang <dwkang@google.com> |
Merge "TIF: add helper methods for making a channel browsable." into oc-dev am: b2eb818a7d Change-Id: I54b92c8b773706de49ffd2e78df59568e19d3b49
|
b2eb818a7d5f7cf65ce69ba5c98ecc14298515a4 |
|
13-Apr-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "TIF: add helper methods for making a channel browsable." into oc-dev
|
a461e30053da64966d632a9655d0dca0daac983c |
|
12-Apr-2017 |
Dmitry Dementyev <dementyev@google.com> |
Add ACTION_ACCOUNT_REMOVED to Account Manager. AccountManagerService sends an intent with the action when account of any type is removed or renamed. Test: manual, APCT. Bug: 37280078 Change-Id: I53b1bb9d6cde1edba5c37ecf3e4e13d748b19005
/frameworks/base/core/res/AndroidManifest.xml
|
636915a2edd78466564452f788f62ad572fd0430 |
|
13-Apr-2017 |
Chris Tate <ctate@android.com> |
Merge "Introduce PACKAGE_FIRST_ADDED broadcast" into oc-dev am: 117ac766a9 Change-Id: I9bec0f90873a5bcb9ff89eadcf7e334e9f0afb89
|
2e7f5ce709f9ee45c4fb219d768fbec057185375 |
|
06-Apr-2017 |
Dongwon Kang <dwkang@google.com> |
TIF: add helper methods for making a channel browsable. Test: build and manually tested with a local app. Bug: 36395259, Bug: 36097352 Change-Id: I512ed6f4da21af01445fdbcd2f200a681c5dde19
/frameworks/base/core/res/AndroidManifest.xml
|
ee3b42af3f23c37cbd2799c1527f89ac623844be |
|
11-Apr-2017 |
Christopher Tate <ctate@google.com> |
Introduce PACKAGE_FIRST_ADDED broadcast When an app first appears on a device, this new broadcast is issued including to manifest receivers. The more general PACKAGE_ADDED broadcast continues to be issued for both first install and updates, but is not delivered to manifest receivers of apps that target O+. Bug 37219124 Test: manual Change-Id: I59b0a0b0dce96a909076b41280771f63e59584be
/frameworks/base/core/res/AndroidManifest.xml
|
f72b1104f398003c0dd9437ba35473a9c1ec747b |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
DO NOT MERGE: Remove the development privelege level from SET_DISPLAY_OFFSET. am: 0a8ecc6886 am: f72dd4142b Change-Id: I9466a9f2a35ac3f81b2203347afc9f2f62587b20
|
f72dd4142b2568a16f27981709e174363539bd91 |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
DO NOT MERGE: Remove the development privelege level from SET_DISPLAY_OFFSET. am: 0a8ecc6886 Change-Id: I262e7497e9256f708847ba7c767f202c91aa1739
|
0a8ecc688647ec6a8f7e323025b0f44a696e3c0e |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
DO NOT MERGE: Remove the development privelege level from SET_DISPLAY_OFFSET. Bug: 36515029 Test: the build still works. Change-Id: I39ae2c55b6b2b0d6547f75f4ef06e62e3e5f0b84 (cherry picked from commit 8e9ea907448c49f573dd045707e37dd14efdf152)
/frameworks/base/core/res/AndroidManifest.xml
|
8e9ea907448c49f573dd045707e37dd14efdf152 |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
Remove the development privelege level from SET_DISPLAY_OFFSET. Bug: 36515029 Test: the build still works. Change-Id: I39ae2c55b6b2b0d6547f75f4ef06e62e3e5f0b84
/frameworks/base/core/res/AndroidManifest.xml
|
4e4c99f9a56f8ff1282708e0ea38e41315429fac |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
Merge "Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission."
|
6717748effb545ad89b361f16336649603d648ab |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
Merge "DO NOT MERGE: Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission." into cw-f-dev am: 9e3c9eeb96 am: 3c6d6f53f3 Change-Id: I4a3785a799a523c1e650929cf70f333a2492377e
|
3c6d6f53f3d1dc80740c1df94b9a1566f84f8f14 |
|
12-Apr-2017 |
Julius D'souza <jdsouza@google.com> |
Merge "DO NOT MERGE: Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission." into cw-f-dev am: 9e3c9eeb96 Change-Id: Ic97ec1a7e4c5b76bcab8350102585e4dd2cd199b
|
46e47cbecc9519b1c12f89889466a57c2ed36d21 |
|
12-Apr-2017 |
Conrad Chen <conradchen@google.com> |
Merge "TIF: add TvInputManager methods to notify apps" into oc-dev am: 307bec8572 am: 081db81a99 Change-Id: I267fe4c5723ffa66c0555bba862b1618aebae5fd
|
081db81a996cdffdc27cfc03d99fe5a59040be85 |
|
12-Apr-2017 |
Conrad Chen <conradchen@google.com> |
Merge "TIF: add TvInputManager methods to notify apps" into oc-dev am: 307bec8572 Change-Id: I3550c39408739e0a3d1fce93cc35b09a3b77d70f
|
307bec857261e0e3ee9de5af9f30ab289e35ff7b |
|
12-Apr-2017 |
Conrad Chen <conradchen@google.com> |
Merge "TIF: add TvInputManager methods to notify apps" into oc-dev
|
558acf96dbffc0f13b414b1a5c5de191f6ffe27a |
|
06-Apr-2017 |
Conrad Chen <conradchen@google.com> |
TIF: add TvInputManager methods to notify apps Adds TvInputManager methods to notify apps with protected broadcasts for: 1. Disabling browsable state of preview and watch next programs. 2. Adding preview programs to watch next programs. Test: build and verify manually to check if notifications are broadcasted. Bug: 35881266 Change-Id: I20fd5b63f42b2c74277315bbbd251b71c649e5c1
/frameworks/base/core/res/AndroidManifest.xml
|
f4bcbc88731c1d8ed492d2694b0fcdc0964fa04d |
|
11-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Fix READ_PHONE_NUMBERS label" into oc-dev am: 04088837b5 am: 8a9db875c9 Change-Id: Id4a292a2aeb2c6c0e66dadb450c8e09ce8190c6d
|
8a9db875c91f4afe67e81a4f4980226ee003f13e |
|
11-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Fix READ_PHONE_NUMBERS label" into oc-dev am: 04088837b5 Change-Id: I60e0094d152d8bdcb092f357c00d87e467c344d9
|
1d99079ef43a996489168f406c8bd2620b006f44 |
|
10-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Fix READ_PHONE_NUMBERS label Change-Id: If4a254092168d9f7b133a58b59dd946f64cefdae Fixes:37207265 Test: builds
/frameworks/base/core/res/AndroidManifest.xml
|
ab19a048551234641ab90e841a1c22e621c6ee75 |
|
07-Apr-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Add NETWORK_STACK permission Add a new permission that only allows other system services to call networking related methods. This permission is intended to prevent other apps from calling these methods that might leave networking services in intermediate states. Bug: 36538042 Test: build, run wifi unit tests, boots, wifi connects Change-Id: Icba6ad5280e9a8863bd1c706ca34b7add8de5294 (cherry picked from commit fa84050a7e51e2a6643ea242b43f16cd6e3114dd)
/frameworks/base/core/res/AndroidManifest.xml
|
1614f854c55e078e9e8acf9d21009e262bb644f2 |
|
07-Apr-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Add NETWORK_STACK permission" am: b23fabf3fd am: 09146fc440 am: d6b2e7ac93 am: fa84050a7e Change-Id: If1abfc3a7ee596e23257d0259bc5d0243f31e82b
|
fa84050a7e51e2a6643ea242b43f16cd6e3114dd |
|
07-Apr-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Add NETWORK_STACK permission" am: b23fabf3fd am: 09146fc440 am: d6b2e7ac93 Change-Id: I116011c73f20bdd3c23d58c19fc083e2387979ab
|
d6b2e7ac933c1230dd2edec89cf54e2411e6910c |
|
07-Apr-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Add NETWORK_STACK permission" am: b23fabf3fd am: 09146fc440 Change-Id: If0ebaea53188d008ce1cf81ac4f3356c9943dad8
|
b23fabf3fd0710a5e778f7befec0f962d9e569df |
|
07-Apr-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Add NETWORK_STACK permission"
|
ea55ae7d0c1329d42019891dc1ee6140b1368370 |
|
23-Mar-2017 |
Rebecca Silberstein <silberst@google.com> |
Add NETWORK_STACK permission Add a new permission that only allows other system services to call networking related methods. This permission is intended to prevent other apps from calling these methods that might leave networking services in intermediate states. Bug: 36538042 Test: build, run wifi unit tests, boots, wifi connects Change-Id: Icba6ad5280e9a8863bd1c706ca34b7add8de5294
/frameworks/base/core/res/AndroidManifest.xml
|
e388282962ffe01c164398b17b6c2cb679ebc827 |
|
07-Apr-2017 |
Casey Burkhardt <caseyburkhardt@google.com> |
Merge "Revise Accessibility button chooser intent/permissions" into oc-dev am: ecb5b5ccc3 am: bc411cd461 Change-Id: I0a085365593d05a77eab013259c2a36ce2c39f1a
|
bc411cd46130b96262c05a0527837a55ad25d6db |
|
07-Apr-2017 |
Casey Burkhardt <caseyburkhardt@google.com> |
Merge "Revise Accessibility button chooser intent/permissions" into oc-dev am: ecb5b5ccc3 Change-Id: I7aa9a6760ff74e35875aa24e86f88dc72603075b
|
ecb5b5ccc3c88f6430cf5584357c214797f5fd60 |
|
07-Apr-2017 |
Casey Burkhardt <caseyburkhardt@google.com> |
Merge "Revise Accessibility button chooser intent/permissions" into oc-dev
|
461959d71f2940aab8481cfdd316972c57b6cd0c |
|
06-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Add a service to rank apps for ResolverActivity." into oc-dev am: 5a0ee44ce5 Change-Id: I36f8664480f8741dd4d755cfcc3cfa95d8e3d1ba
|
1fd91e9d934bce19dc5a4a3ad777c19e69a9179d |
|
06-Apr-2017 |
Android Build Merger (Role) <android-build-merger@google.com> |
Merge "Merge "Allow permissions to be runtime-only." into oc-dev am: 941e9e2b38 am: 57a9464831"
|
7671735fa5d307e559ea9873fe94d720ff01b553 |
|
06-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Allow permissions to be runtime-only." into oc-dev am: 941e9e2b38 am: 57a9464831 Change-Id: Ibf8b8f13ff5a8819671142e77ee238ba08805d40
|
afe3ef1b36d040f3095db7ec1df644a074df8906 |
|
06-Apr-2017 |
Casey Burkhardt <caseyburkhardt@google.com> |
Revise Accessibility button chooser intent/permissions 1) Switch AccessibilityButtonChooserActivity to non-exported 2) Update AccessibilityButtonChooserActivity's intent action to be CTS-compliant 3) Switches to correct permission to validate a click of the accessibility button originated from the status bar service Bug: 36866328 Bug: 36976440 Test: Manual / Created app to validate launch protection Change-Id: Ifcd5e8dbbe683dc99bb900a5870a9ba374fbd5d4
/frameworks/base/core/res/AndroidManifest.xml
|
38a6da6473563ce2dcee360cabe1183c2a7c926e |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Add a service to rank apps for ResolverActivity. bug: 36952725,30982298 Test: used PTP before and after this fix. Change-Id: I5b249af2dd0d9fe32d1e524e8d2675c863e92b5b
/frameworks/base/core/res/AndroidManifest.xml
|
57a94648318bdc03e90b6ab04657ea1145dde597 |
|
06-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Allow permissions to be runtime-only." into oc-dev am: 941e9e2b38 Change-Id: I2b1b3a53e6609cc335b4efa9084e603986f58bbe
|
941e9e2b38ae46e167d03f5d5d7afb9701dde88f |
|
06-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Allow permissions to be runtime-only." into oc-dev
|
bbced1c3d4c20993935b7b6a5fbca43fadde00a8 |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Add a service to rank apps for ResolverActivity. bug: 36952725,30982298 Test: used PTP before and after this fix. Change-Id: I5b249af2dd0d9fe32d1e524e8d2675c863e92b5b
/frameworks/base/core/res/AndroidManifest.xml
|
069f46ca34162e531229aba04b0099ea1b9df6b1 |
|
22-Mar-2017 |
Julius D'souza <jdsouza@google.com> |
Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission. Bug: 36515029 Test: No build failure; SystemServer loads as usual. Change-Id: I253766553a507e2ada7d631501d8d32d863a823f
/frameworks/base/core/res/AndroidManifest.xml
|
1185d842f7688cdb93e614c7d84e65a60e039ab7 |
|
22-Mar-2017 |
Julius D'souza <jdsouza@google.com> |
DO NOT MERGE: Add WearDisplayService to the system server; add a SET_DISPLAY_OFFSET permission. Bug: 36515029 Change-Id: I253766553a507e2ada7d631501d8d32d863a823f
/frameworks/base/core/res/AndroidManifest.xml
|
6a2dd5450282a76ceee0dc8aefc698385fa0ed22 |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Revert "Add a service to rank apps for ResolverActivity."" into oc-dev am: b24399547c am: e9b280bbec Change-Id: I84ac856c1838184e2ce819e5f637f2f97cdacbf6
|
e9b280bbecf50f570a60907dde60d56d50f67c6b |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Revert "Add a service to rank apps for ResolverActivity."" into oc-dev am: b24399547c Change-Id: I45e96d0b5e88eb280e6dbc5981e6a6a7f1a4b6e2
|
b24399547c931dfcb9e6046072ee9c0f682464ac |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Revert "Add a service to rank apps for ResolverActivity."" into oc-dev
|
c88749fb5a8de40572582e6eceefd46cda3afa2d |
|
05-Apr-2017 |
Kang Li <kanlig@google.com> |
Revert "Add a service to rank apps for ResolverActivity." This reverts commit 90370e0b2497deba9382ab7ff1539b6849df8139. b: 36952725 Change-Id: Ifa8f182c707cdbbc989b1f61630f7a8fa856d32d
/frameworks/base/core/res/AndroidManifest.xml
|
899ee0fe08bfa27b69840e6394deafbeb0c0d787 |
|
05-Apr-2017 |
Conrad Chen <conradchen@google.com> |
Merge "TIF: protect PARENTAL_CONTROLS_ENABLED_CHANGED broadcast" into oc-dev am: 044eeecc1d am: 0cc563d102 Change-Id: I48137a26231d6d12db687154e65ad339431da443
|
0cc563d102e285d694af6b582d5962bdc0311fb6 |
|
05-Apr-2017 |
Conrad Chen <conradchen@google.com> |
Merge "TIF: protect PARENTAL_CONTROLS_ENABLED_CHANGED broadcast" into oc-dev am: 044eeecc1d Change-Id: I4caef36d3cee02d8912cfa7e02681fb404007567
|
9105beacb34e63725ff94336c0fd9030a2985857 |
|
05-Apr-2017 |
Conrad Chen <conradchen@google.com> |
TIF: protect PARENTAL_CONTROLS_ENABLED_CHANGED broadcast Test: build and test manually to see if warnings are eliminated Bug: 36898338 Change-Id: Ifea0844926677fad24f7df2ade31cd299099b639
/frameworks/base/core/res/AndroidManifest.xml
|
5889c3628bff3811015095086f9743829c7d837c |
|
04-Apr-2017 |
Hiroki Yamamoto <hiroki.yamamoto@sonymobile.com> |
Merge "Protect CANCEL_HANDOVER_TRANSFER broadcast" am: 4df6c75b99 am: d0be609210 am: d98be4a456 am: 775c258fd8 Change-Id: I52ebec5d98b3703ce9b6075568e41fc73ee1a9dc
|
775c258fd873387e5332157d9f4c1749c1a13d0d |
|
04-Apr-2017 |
Hiroki Yamamoto <hiroki.yamamoto@sonymobile.com> |
Merge "Protect CANCEL_HANDOVER_TRANSFER broadcast" am: 4df6c75b99 am: d0be609210 am: d98be4a456 Change-Id: Ideac6fbfb6638e43ef499ff75a804295457e7c50
|
d98be4a456e2925b45070b70ca74a5c43d6274a2 |
|
04-Apr-2017 |
Hiroki Yamamoto <hiroki.yamamoto@sonymobile.com> |
Merge "Protect CANCEL_HANDOVER_TRANSFER broadcast" am: 4df6c75b99 am: d0be609210 Change-Id: I8dd81fe9b4bb71b856a023c99594568d0442837c
|
57a5145a01995c4f854a9b196eaf402c28bba441 |
|
28-Mar-2017 |
Hiroki Yamamoto <hiroki.yamamoto@sonymobile.com> |
Protect CANCEL_HANDOVER_TRANSFER broadcast Bug: 36662809 Test: cancel AndroidBeam and check if the error log is not shown Change-Id: Ic442753aacf97f7f5a7e449685c2b1414e77e957
/frameworks/base/core/res/AndroidManifest.xml
|
a5d70a17ebd1b3ffe026879c5d9d96f04d10d4f2 |
|
23-Mar-2017 |
Chad Brubaker <cbrubaker@google.com> |
Allow permissions to be runtime-only. This adds the new runtime protection level flag that if set means the permission can only be granted to apps that target runtime permissions (>= M). ANSWER_PHONE_CALLS has also been made runtime-only. Bug: 30932767 Test: cts-tradefed run commandAndExit cts-dev -m CtsPermission2TestCases Change-Id: I42b30414c808730f2d5961ca31b6e3db740b8cf7
/frameworks/base/core/res/AndroidManifest.xml
|
6df90fa53beda112e3abb1d4046fe47ee4e60049 |
|
04-Apr-2017 |
Kang Li <kanlig@google.com> |
Merge "Add a service to rank apps for ResolverActivity." into oc-dev
|
3a93a909669c7229186dfcb68b3cafaa72892952 |
|
04-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Expose framework activities to Instant Apps" into oc-dev am: b157f08bf8 am: 59551672c1 Change-Id: I231f32fe6ec5958ed88490da42dbd69e57956bb5
|
90370e0b2497deba9382ab7ff1539b6849df8139 |
|
14-Mar-2017 |
Kang Li <kanlig@google.com> |
Add a service to rank apps for ResolverActivity. bug: 30982298 Test: manual - shared images in Camera, texts in Messenger, and webpages in Chrome. Change-Id: If335c269ca54145839ad8fd4b3f9b93a74b550f8 (cherry picked from commit 35b9e3015565850e9de963e4bda1be227825df5d)
/frameworks/base/core/res/AndroidManifest.xml
|
aef012234edc56d20f5d9717ecca97276958ae12 |
|
03-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Expose framework activities to Instant Apps Bug: 36864579 Test: Instant apps can use choosers and account picker Change-Id: Ie8d3a019ffc91497a314b2c9d5a09f6ca5b0ba9f
/frameworks/base/core/res/AndroidManifest.xml
|
9bcef123f49bbb5556e5feedfa2b6a67e5bedb70 |
|
03-Apr-2017 |
Jeff Davidson <jpd@google.com> |
Merge "Squashed merge of master-sim into master."
|
d6ce1adabf5e8e8430403494aa9bc2904c30b1e1 |
|
03-Apr-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Rename READ_PHONE_NUMBER to READ_PHONE_NUMBERS" into oc-dev am: e35d50622c am: a8c068f723 Change-Id: Id57b91b68ce6a4e1f31e8670798b59b82593ea96
|
35cda39422acdeb3fa47ca60f131678e52dbfcb3 |
|
27-Feb-2017 |
Jeff Davidson <jpd@google.com> |
Squashed merge of master-sim into master. Includes the following commits: == New system feature: eUICC. Presence of this feature implies that eUICC-related APIs are expected to function as long as an eUICC is present in the device. Note that an eUICC may be embedded in the device but may also be removable. == Add empty EuiccManager API and plumbing. == Add stub EuiccService. EuiccService is the class that the LPA app must implement; for now, just define the action and priority so that the implementation can be found. Actual methods will come later. Also declare two relevant permissions: BIND_EUICC_SERVICE, which the implementation must require (so that nobody else can bind to the service directly), and WRITE_EMBEDDED_SUBSCRIPTIONS, which permits signature|privileged apps and CTS (via development) to access EuiccManager APIs. == Add UiccAccessRule based off UiccCarrierPrivilegeRules#AccessRule. This class can be used to transfer access rules between an EuiccService implementation and the platform. We also add a simple encoding/decoding of a list of rules so that they may be stored in the subscription info table. == Add getEid() to EuiccManager/EuiccService. getEid() fetches the EID. It requires either a privileged permission (READ_PRIVILEGED_PHONE_STATE) or carrier privileges on the currently-active profile. Until there is a use case that requires opening this up to apps with only READ_PHONE_STATE, we shouldn't do so. To avoid churn in the future, the API signatures for EuiccService include a slot ID to identify which SIM slot is being used. However, this parameter is currently not populated correctly (nor is it usable, as no Telephony APIs accept a slot ID to address commands). There is no need to expose it yet in the EuiccManager APIs as we expect to follow the TelephonyManager pattern of allowing per-slot instances of EuiccManager in the future while keeping other method signatures the same. == Define Euicc UI actions in EuiccManager/EuiccService. The EuiccManager actions are to be implemented by the platform (and only the platform), which forwards the actions to the active implementation. Also, remove our explicit priority meta-data tag as we can just rely on android:priority in the corresponding intent-filter. == APIs for downloading embedded subscriptions. Includes: -getDownloadableSubscriptionMetadata, used by the platform and LUI to fetch metadata about a downloadable subscription. The platform will use this to perform the necessary permission checks (only allowing otherwise-unprivileged apps to download profiles that are permitted per the subscription metadata), and the LUI can use this to present the name of the profile. -downloadSubscription, to actually perform a profile download. The stub for startResolutionActivity is included but not implemented; resolution activities will be handled in a follow-up change. == Test: TreeHugger Change-Id: I47b1da5a69f0736012cb137e02cd6c4e07fdaace
/frameworks/base/core/res/AndroidManifest.xml
|
3b8b46f3a46ccf35a6bb6a828af0f2d011cc9abe |
|
13-Feb-2017 |
Andrew Scull <ascull@google.com> |
Service for OEM lock management. The new service separates OEM lock management from the implementation. Currently, a user restriction (DISALLOW_OEM_UNLOCK) and the persistent data block have been used to implement OEM lock management. In future, other implemention will be used e.g. a secure element. The new API also allows for a signature to be passed when changing whether the device is allowed to be OEM unlocked by the carrier which can be used for cryptographic protection of the flag. Bug: 34766843 Test: gts-tradefed run gts -m GtsOemLockServiceTestCases -t com.google.android.oemlock.gts.OemLockServiceTest Test: cts-tradefed run cts -m CtsPermission2TestCases -t android.permission2.cts.PrivappPermissionsTest Change-Id: I01660d7605d297f273d43436ca03d64ff611b6cf
/frameworks/base/core/res/AndroidManifest.xml
|
0c1651f2899ae3d13db005315ed3709f56ab3db3 |
|
31-Mar-2017 |
Chad Brubaker <cbrubaker@google.com> |
Rename READ_PHONE_NUMBER to READ_PHONE_NUMBERS Bug: 35853790 Test: make -j128 checkbuild Test: cts-tradefed run commandAndExit cts-dev -m CtsPermission2TestCases Change-Id: I11d374cbbb6c2deaf74ac784ff995bd182fe9157
/frameworks/base/core/res/AndroidManifest.xml
|
6a27b97caa52bc8223512dcfdc65eb14e812fbec |
|
31-Mar-2017 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Change namespace of ACTION_REQUEST_SHUTDOWN." into oc-dev am: 670e750b2e am: e6fd3d4281 Change-Id: I869f5455d0f7c95e3fe05581526dba5ee3785a62
|
218190a3c92a7f8a30a0ed99026777eb56ed67a7 |
|
31-Mar-2017 |
Sudheer Shanka <sudheersai@google.com> |
Change namespace of ACTION_REQUEST_SHUTDOWN. Fixes: 36644580 Test: cts-tradefed run singleCommand cts-dev -m CtsSignatureTestCases -t android.signature.cts.IntentTest and Device power-off works Change-Id: I63f461157a63305cd08c5dc42293730be4eb657f
/frameworks/base/core/res/AndroidManifest.xml
|
601afcfd5cfd8917ce946b8b3e1c4204de732d12 |
|
30-Mar-2017 |
Ta-wei Yen <twyen@google.com> |
Merge "Rename ACTION_VOICEMAIL_SMS_RECEIVED" into oc-dev am: dfbc8517ee am: 904e1856a7 Change-Id: I2066d699def9e921df3a2fd12a709a01b5e7795a
|
35b9e3015565850e9de963e4bda1be227825df5d |
|
14-Mar-2017 |
Kang Li <kanlig@google.com> |
Add a service to rank apps for ResolverActivity. bug: 30982298 Test: manual - shared images in Camera, texts in Messenger, and webpages in Chrome. Change-Id: If335c269ca54145839ad8fd4b3f9b93a74b550f8
/frameworks/base/core/res/AndroidManifest.xml
|
a302ac69e438f9df4e9ff32c016c4cabe9b64a85 |
|
23-Mar-2017 |
Ta-wei Yen <twyen@google.com> |
Rename ACTION_VOICEMAIL_SMS_RECEIVED Hidden API should not use the android.* namespace. This CL also make SHOW_VOICEMAIL_NOTIFICATION protected broadcast. Change-Id: I9e5459632d0e826274fd60a4cfbf73c0ea87d29f Fixes:35269913 Fixes: 36201216 Test: CtsSignatureTestCases
/frameworks/base/core/res/AndroidManifest.xml
|
668c34444d13b67949836baa4eac560afcc527c5 |
|
28-Mar-2017 |
Phil Weaver <pweaver@google.com> |
Merge "Fix permission checking for a11y volume."
|
a5b543ec11834dace9444a1d5aa1011d7013cb0f |
|
28-Mar-2017 |
Peter Qiu <zqiu@google.com> |
Merge "hotspot2: register Passpoint related intents as protected broadcast" am: 97bdedf655 am: 61f58f0676 am: 8e94d9e32d Change-Id: Ib293b1fed8a7d5101987d50742cdde66dc670d43
|
8e94d9e32dbc780b4228dea8a4d9f078e8f5b80d |
|
28-Mar-2017 |
Peter Qiu <zqiu@google.com> |
Merge "hotspot2: register Passpoint related intents as protected broadcast" am: 97bdedf655 am: 61f58f0676 Change-Id: I924befd6d9a1fb1e6bdb257bc6d662172d2354d9
|
61f58f06767863907801299f134dd494543cf8b3 |
|
28-Mar-2017 |
Peter Qiu <zqiu@google.com> |
Merge "hotspot2: register Passpoint related intents as protected broadcast" am: 97bdedf655 Change-Id: I06d54b99006d631c5792f823e9ae7da1703a201d
|
cb9ad34e6639a270de10c28a5d7291b995eed1ec |
|
27-Mar-2017 |
Peter Qiu <zqiu@google.com> |
hotspot2: register Passpoint related intents as protected broadcast These intents should only be broadcast by the System Service, so register them as protected broadcast. Bug: 36655814 Test: Build with go/aog/355397, verify in logcat that no non-protected broadcast error gets thrown when android.net.wifi.action.PASSPOINT_OSU_PROVIDERS_LIST intent is broadcasted Change-Id: I57849d0decef407624cac380a0f12f5428e0f1de
/frameworks/base/core/res/AndroidManifest.xml
|
f1a9aff96261a40d16c36dd3d47a8190c308d744 |
|
24-Mar-2017 |
Phil Weaver <pweaver@google.com> |
Fix permission checking for a11y volume. Adding new permission for changing accessibility volume to allow system UI to change it. Also providing audio manager with a whitelist of bound accessibility service uids so it can allow servics to change the volume. Bug: 36569297 Test: Adding CTS test in linked CL. Change-Id: I4f327e3a251fc3780c5957f41217c2ef5bb8b16e
/frameworks/base/core/res/AndroidManifest.xml
|
b43504e85c9cfb349d1512aab3beccdb540a811d |
|
27-Mar-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Make CONNECTIVITY_USE_RESTRICTED_NETWORKS @SystemApi." am: a1e206a335 am: 37afaac70d am: d042c3f400 Change-Id: Ic8a35c9f2d9de0b36cb7ab3f8227f0bc298d672f
|
d042c3f4004a7ea27e05c96464fafa9813aa105d |
|
27-Mar-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Make CONNECTIVITY_USE_RESTRICTED_NETWORKS @SystemApi." am: a1e206a335 am: 37afaac70d Change-Id: Id576f61f3ac7d1de828c870ffaf4d6ab3e1e2568
|
37afaac70d33eb6f7e2bf22c6c98140afea8efa7 |
|
27-Mar-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Make CONNECTIVITY_USE_RESTRICTED_NETWORKS @SystemApi." am: a1e206a335 Change-Id: I71fabdff9deb0f7ba40a545090bd09ddc66994a8
|
5e8b980c5d6bc282b51b3ddfc8722ff973c7e885 |
|
24-Mar-2017 |
Casey Burkhardt <caseyburkhardt@google.com> |
Target selection for Accessibility button Allows for selecting a single accessibility service or feature to be triggered by the accessibility button in the navigation bar Bug: 34720082 Test: Manual Change-Id: I320febede0398b1eff38a87d4db31fd7dfc53062
/frameworks/base/core/res/AndroidManifest.xml
|
87b59632e7d066efb7f92bc5313717bf16c99930 |
|
22-Mar-2017 |
Lorenzo Colitti <lorenzo@google.com> |
Make CONNECTIVITY_USE_RESTRICTED_NETWORKS @SystemApi. Fix: 34721574 Test: builds, apicheck passes Change-Id: If921f265c02ffb57d5ac717f924f91f664dd991f
/frameworks/base/core/res/AndroidManifest.xml
|
4120ee3d4478b5f1fcd052ca0de1bf1074628e47 |
|
23-Mar-2017 |
Makoto Onuki <omakoto@google.com> |
Add ACTION_USER_RESTRICTIONS_CHANGED to protetced-broadcast. Test: cts-tradefed run cts-dev --skip-device-info --skip-preconditions --skip-system-status-check com.android.compatibility.common.tradefed.targetprep.NetworkConnectivityChecker -a armeabi-v7a -l INFO -m CtsDevicePolicyManagerTestCases -t 'com.android.cts.devicepolicy.UserRestrictionsTest#testUserRestrictions_deviceOwnerOnly' Test: cts-tradefed run cts-dev --skip-device-info --skip-preconditions --skip-system-status-check com.android.compatibility.common.tradefed.targetprep.NetworkConnectivityChecker -a armeabi-v7a -l INFO -m CtsDevicePolicyManagerTestCases -t 'com.android.cts.devicepolicy.UserRestrictionsTest#testUserRestrictions_primaryProfileOwnerOnly' Test: cts-tradefed run cts-dev --skip-device-info --skip-preconditions --skip-system-status-check com.android.compatibility.common.tradefed.targetprep.NetworkConnectivityChecker -a armeabi-v7a -l INFO -m CtsDevicePolicyManagerTestCases -t 'com.android.cts.devicepolicy.UserRestrictionsTest#testUserRestrictions_secondaryProfileOwnerOnly' Bug: 36355208 Change-Id: I7a002c1f796a3d1f6241577e6284a8e74bb96749
/frameworks/base/core/res/AndroidManifest.xml
|
ac9e6f74537e76ea5a5bb0aedf818608dc7cd972 |
|
22-Mar-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Implement runtime account update notifications."
|
d225f0bfd5bc8e7767dc000ea5174bddd95bdea8 |
|
21-Mar-2017 |
Fyodor Kupolov <fkupolov@google.com> |
Support expiration of preloaded file cache When device is provisioned, we delete all files from /data/preloads except file_cache. We should do best effort to keep file_cache during the first config_keepPreloadsMinDays. After that, persist.sys.preloads.file_cache_expired is set to 1, which indicates that cache can be deleted when additional storage space is requested. Bug: 34690396 Test: Manual + RetailDemoModeServiceTest Change-Id: Ie584a9dd6689bcc5e6b3cb448e95dfe5f73d2eeb
/frameworks/base/core/res/AndroidManifest.xml
|
8882d881f95f5719a4a9c3eb3f6555b4882e8c4d |
|
15-Mar-2017 |
Dmitry Dementyev <dementyev@google.com> |
Implement runtime account update notifications. Test: manual, cts. Change-Id: Iaf9fe4814c3d3c2ca2dca0a5bfa0f997e060bfeb
/frameworks/base/core/res/AndroidManifest.xml
|
91d40f1baa2eeed2aa68d2492e20650d5e71dab5 |
|
16-Mar-2017 |
Calin Juravle <calin@google.com> |
Set pm.BackgroundDexOptService as the source of true The real dexopt maintainance job is com.android.server.pm.BackgroundDexOptService, and not com.android.server.BackgroundDexOptJobService Partial revert of commit 096d304ae3d85c1bfcda1a1d9cd4eb13d0815500. Test: manual inspection Bug: 36140426 Change-Id: I983ac91117f107282095fa7eefdbce08e0dcfce3
/frameworks/base/core/res/AndroidManifest.xml
|
ab96721a57637cc9132bddb09f407d2a9976dce8 |
|
14-Mar-2017 |
Ajay Panicker <apanicke@google.com> |
resolve merge conflicts of 4b39c15da0f5 to nyc-mr2-dev-plus-aosp Change-Id: I7567db6d1fbb9f8a8b5e29c3e24cdff6508c4b6f
|
4b39c15da0f5d100b9ce6fc29a8f499362c53542 |
|
14-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Merge commit 'faf40708836c34936932c67f47ed39ef4b85de03' into manual_merge_faf40708836c am: 4034a9a96a am: 89d2b46a4a am: c1a5939026 Change-Id: I50df57c208542d35bc72851fa37e47731bbd9965
|
89d2b46a4aae83dcacc7e96517c8fa5f37630935 |
|
14-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Merge commit 'faf40708836c34936932c67f47ed39ef4b85de03' into manual_merge_faf40708836c am: 4034a9a96a Change-Id: Ie63f9d24ab37c5465b250d2b9b60efdf736b4d60
|
4034a9a96a58e37d1a0bebb7c4b9005b2af72cfe |
|
14-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Merge commit 'faf40708836c34936932c67f47ed39ef4b85de03' into manual_merge_faf40708836c Change-Id: I2b9aeca138aefb0579b3be8014b3f0bf49d99764
|
bd7ae7df281e3fdc5d0cbe1acceb8c0d82ecceb9 |
|
11-Mar-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Basic accessibility support for picture-in-picture"
|
f00cd14f17c0acd6bffe78947d32ea0a2900d139 |
|
03-Mar-2017 |
Phil Weaver <pweaver@google.com> |
Basic accessibility support for picture-in-picture Exposing actions from the PIP InputConsumer to accessibility, stripping all actions from a covered PIP app, and adding the InputConsumer's actions on the PIP app's root view. We were also using an "undefined" accessibility ID to mean three different things: a root view, a host view of a virtual view hierarchy, and a truly undefined view. I've introduced new values for cases where the id could be defined. Also gathering all window IDs into one place to reduce the chance of collisions. Bug: 34773134 Test: In progress. Current cts passes. Change-Id: I97269741a292cf406272bf02359c76c396f84640
/frameworks/base/core/res/AndroidManifest.xml
|
4763c1b5cae3ef290fc225c9ac0be28436354cea |
|
10-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Merge "Protect Bluetooth OPP ACCEPT and DECLINE broadcast"
|
95628d6d254cc4784e0b9d9b43d20b42da2ca3fb |
|
10-Mar-2017 |
Maurice Lam <yukl@google.com> |
Merge "Add permission to show notification during setup"
|
132710e3898787f1de8f5249bcb034b3ba55650b |
|
04-Mar-2017 |
Maurice Lam <yukl@google.com> |
Add permission to show notification during setup Add a priviledged permission NOTIFICATION_DURING_SETUP which together with the existing Notification.EXTRA_ALLOW_DURING_SETUP will allow a notification to be shown during setup. Test: Added NotificationDataTest Bug: 34705874 Change-Id: I7215acf4017ad897294c69abf63a7f2e5d556f31
/frameworks/base/core/res/AndroidManifest.xml
|
640f30a7763b0a4b80c767acb84c740aac04768b |
|
07-Mar-2017 |
Felipe Leme <felipeal@google.com> |
Replaced auto-fill by autofill to keep it consistent with API style. This change will affects 2 types of apps: autofill service implementations and apps that use autofill APIs. Since just the former is known to be used at the moment, we're not trying to keep backward compatibility with the latter. Bug: 35956626 Test: CtsAutoFillServiceTestCases pass Test: android.provider.SettingsBackupTest pass Change-Id: Ia720083508716deae9e887f9faa7ae7c5a82f471
/frameworks/base/core/res/AndroidManifest.xml
|
71c52e6e30c5e24956e7bc5303a2978054b9193e |
|
08-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Protect Bluetooth OPP ACCEPT and DECLINE broadcast Non-system apps could send these, and accept OPP transfers without user interaction. Test: run POC code, see that it crashes instaed of accepting Bug: 35258579 Change-Id: I37bf2e17b4d612258f9dbaa879727ac7c72e5969
/frameworks/base/core/res/AndroidManifest.xml
|
52c8ba1ecff872ea425d58b37afc1d55528b95f8 |
|
08-Mar-2017 |
Marie Janssen <jamuraa@google.com> |
Protect Bluetooth OPP ACCEPT and DECLINE broadcast Non-system apps could send these, and accept OPP transfers without user interaction. Test: run POC code, see that it crashes instaed of accepting Bug: 35258579 Change-Id: I37bf2e17b4d612258f9dbaa879727ac7c72e5969
/frameworks/base/core/res/AndroidManifest.xml
|
e45606d6c66019ef4d0dea6fcf5eb50b57276868 |
|
06-Mar-2017 |
Chad Brubaker <cbrubaker@google.com> |
Expose ACCESS_INSTANT_APPS to the verifier The package verifier needs to be able to see Instant Apps in order to do its job. It already sees them on first install so no new information about what Instant Apps are installed is leaked. Test: builds Change-Id: I5d892b2d7aa820a9c0c00ac357f20a3210cf3395
/frameworks/base/core/res/AndroidManifest.xml
|
fa18d7cd71c096fe0d30df2350cd653c837ec0c9 |
|
02-Mar-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Remove SystemApi from android.permission.REQUEST_NETWORK_SCORES."
|
247a3c01326fbcd4e12270b5a2d4fb42fa78e7c6 |
|
01-Mar-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Introduce ANSWER_PHONE_CALLS permission"
|
6d7cb232362d8036875d1d3c3f0e8f5d47a2ad25 |
|
30-Jan-2017 |
Sunny Goyal <sunnygoyal@google.com> |
Sending explicit broadcast to the launcher when a package is installed Test: Manually tested on device and add CTS tests Bug: 32920609 Change-Id: Ic23c077a469fb41d6c4e123d4bc022899f634198
/frameworks/base/core/res/AndroidManifest.xml
|
a9ad1d3af1e3202962c102faae46a555fd818869 |
|
19-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Remove SystemApi from android.permission.REQUEST_NETWORK_SCORES. Copy/paste error, it's not needed. Test: Built & run Bug: 34250804 Change-Id: If9e0ff91e559bbcf278913cba47fd3d2073927b4
/frameworks/base/core/res/AndroidManifest.xml
|
ffffb47569c8021c8b2a9ae7a3353795cafb1491 |
|
27-Feb-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Change internal intents from android.* to com.android.internal.*"
|
cae3d3e59e5f9f2161921654f80e3ec6283f7662 |
|
31-Jan-2017 |
Eugene Susla <eugenesusla@google.com> |
Introduce ANSWER_PHONE_CALLS permission This exposes an API to answer a ringing call, as well as a corresponding runtime permission and appop Test: Grant the permission and ensure the call gets answered. Deny the permission, and ensure that the API call throws an exception. Bug: 30932767 Change-Id: I4c33fcea6b95a30469fa6c0c37090be32b0ad52e
/frameworks/base/core/res/AndroidManifest.xml
|
f5ee78647553264d72c9fde1bc76470b62d2a8ea |
|
24-Feb-2017 |
Amit Mahajan <amitmahajan@google.com> |
Change internal intents from android.* to com.android.internal.* Test: none Bug: 35269293 Change-Id: I74585b3d6459cee613408d80fe4a3c13327e5dab
/frameworks/base/core/res/AndroidManifest.xml
|
aea3cf40d61d5ecdbec729ff1e6ca06dcd7c3534 |
|
24-Feb-2017 |
Adam Lesinski <adamlesinski@google.com> |
Whitelist new CHANGE_OVERLAY_PACKAGES permission The Shell application needs access to change which overlays are enabled in OverlayManagerService. Test: Manual: invoke adb exec-out cmd overlay enable some.package.name when shell is not root (adb unroot on eng builds). Change-Id: I1849f68e244cfc9b1e13eb0e673dde7be03cba6d
/frameworks/base/core/res/AndroidManifest.xml
|
791a887701aa8751f11ec5a664503f2dcf56bb60 |
|
22-Feb-2017 |
Wale Ogunwale <ogunwale@google.com> |
Updated some internal apps to use TYPE_APPLICATION_OVERLAY TYPE_SYSTEM_ALERT is deprecated as of O. Test: builds Change-Id: Ic335ff0aa2f0356737c2e67debe8e71ea9eb2f41
/frameworks/base/core/res/AndroidManifest.xml
|
58229846d03ce719c5a6ef94975b57f4ed21e87a |
|
21-Feb-2017 |
Daniel Nishi <dhnishi@google.com> |
Merge "First pass at adding the cache quota suggestions."
|
4b441535c32252d12663f0fa2d7178472fe82d4d |
|
18-Feb-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes Ie28325b6,I4e406a94 * changes: Display on-going notification for apps using alert windows. Set importance for processes displaying app-overlays based on visibility
|
387e4c61338ddf7aee89d10c8aac329e9562b831 |
|
13-Feb-2017 |
Wale Ogunwale <ogunwale@google.com> |
Display on-going notification for apps using alert windows. Allows the user to associate alert windows with specific apps and revoke the permission if they want. Test: manual Bug: 33256752 Change-Id: Ie28325b6bb799b3df253770ebe655f97ebbadd90
/frameworks/base/core/res/AndroidManifest.xml
|
cf9d19e030830fd808d59f1c97edf65e66f675d6 |
|
23-Jan-2017 |
Daniel Nishi <dhnishi@google.com> |
First pass at adding the cache quota suggestions. This currently integrates with installd, but not with any framework API to expose this information to apps. The first pass, as per the design doc, adds a service which polls for large changes in the file system free space. If enough spaces changes, it begins a recalculation of the cache quotas and pipes the information down to installd. This calculation is done in the updateable ExtServices. Further enhancements in later patches include integrating this to listen to package install and removal events, caching the last computed quota values into an XML file on disk to load on boot, and exposing the information to apps. Bug: 33965858 Test: ExtServices unit test Change-Id: Ie39f228b73532cb6ce2f98529f7c5df0839202ae
/frameworks/base/core/res/AndroidManifest.xml
|
1327d3c3fabc9b4ffeb20e589f7b2350567b681f |
|
17-Feb-2017 |
Julia Reynolds <juliacr@google.com> |
Hide incomplete feature. Test: make Change-Id: I505a8ee2f2fbdb574f607005579832951f28022a
/frameworks/base/core/res/AndroidManifest.xml
|
da0acdf938f1d6e7a978e143d5d80d8dd5af52ad |
|
15-Feb-2017 |
Svet Ganov <svetoslavganov@google.com> |
Auto-grant background execution and data access Companion apps can declare they want background access and background execution exceptions via dedicated permissions in their manifest. If such a permission is requested we auto-grant the corresponding exception after the user has chosen a device from the companion UI. These permissions are appop ones allowing us to use the app ops for gauging whether the user has made a change after we auto-granted the permission since we would like to revoke these special privileges when the app disassociates itself from the companion device if the user did not make an excplicit choice otherwise. While at this auto-grant fixed location permission to the companion device discovery service. Test: manual Change-Id: I46ee4291e5e5a8f7613f0dd75eb61d6b9341f306
/frameworks/base/core/res/AndroidManifest.xml
|
500ce9ea58a6c3465703257eab03f9bad76b1e0a |
|
12-Feb-2017 |
Jeff Sharkey <jsharkey@android.com> |
Explicit API for allocating disk space. Now that we're giving apps better guidance around how much cached disk space they can use, we also need to provide a way to help clear some of those cached files. The final logic is coming in a future CL, but it will be designed to prevent abuse. Test: newly added CTS tests Bug: 34690590 Change-Id: I1e46ade0cdabbc33162fc7bfa76abec711992f92
/frameworks/base/core/res/AndroidManifest.xml
|
b09ac24c3c7097c85609b430aee1b6fe6e8db321 |
|
09-Feb-2017 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Add permission for instant apps creating foreground services"
|
97b383f5a57ed7d384de60c699ca072e6d1d5e95 |
|
03-Feb-2017 |
Chad Brubaker <cbrubaker@google.com> |
Add permission for instant apps creating foreground services Foreground services could potentially be abused to get around the lifecycle requirements of Instant Apps, so limit that behavior with a perission that will need to be granted by the installer. Test: Manually verified Change-Id: Ia162077971e914960ebdb8293a33faa8038ed850
/frameworks/base/core/res/AndroidManifest.xml
|
95e76d7e3db28eb44f76779e379b0b8a157a633f |
|
07-Feb-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add android.permission.RESTRICTED_VR_ACCESS for privileged VR APIs."
|
6ed45d8cd33c297e608aba94fc1f61dace7a7cca |
|
22-Jan-2017 |
Eugene Susla <eugenesusla@google.com> |
CompanionDeviceManager This introduces an API for apps that support companion devices to provide a more streamlined flow for pairing and setting up the device Bug: 30932767 Test: Using a toy app, invoke the newly introduced API (CompanionDeviceManager), and go through the flow. Ensure filtering works, and device is returned to the calling app. Ensure the calling app can pair to the selected device. Change-Id: I0aeb653afd65e4adead13ea9c7248ec20971b04a
/frameworks/base/core/res/AndroidManifest.xml
|
096d304ae3d85c1bfcda1a1d9cd4eb13d0815500 |
|
31-Jan-2017 |
Svetoslav Ganov <svetoslavganov@google.com> |
Add instant cookie APIs This change adds APIs for instant apps to store cookie data that is presisted across instant installs and across the upgrade from an instant to a standard app. Standard apps can use the cookie APIs but when they are uninstalled the cookie is also deleted. The cookies are kept longer than the instant apps as they are much smaller - 16KB by default. We can change the cookie size via a system setting i.e. after we ship we can increase size if needed. We also add internal APIs to surface information about installed and uninstalled instant apps which should be used for showing them in the UI. For this puporse we store the icon, permissions, and label of uninstalled apps. If the app is re-installed we drop this meta-data but keep the cookie around. If we have cookie data stored and the signing cert of the app changes when it gets re-intalled we wipe the cookie. Test: CTS tests pass; hiddent APIs tested manually Change-Id: If145c0440cc61a5303e2cbb70228d235d36037a5
/frameworks/base/core/res/AndroidManifest.xml
|
eabc9e95768e7ac9acc3b32dc9ac2edf99c9e2c5 |
|
15-Dec-2015 |
Mårten Kongstad <marten.kongstad@sonymobile.com> |
OMS: introduce the OverlayManagerService Add a new system service to manage Runtime Resource Overlays. This will offload the PackageManagerService and allow administration of overlay packages while affected packages continue to execute. Overlays can be enabled or disabled during runtime. Running applications will re-create their ResourcesImpl objects and restart their activities via the usual activity life cycle. The order in which a set of overlays is loaded may also be changed during runtime. The underlying mechanics are the same as for when an overlay is enabled or disabled. When an overlay changes state, e.g. becomes enabled, the OverlayManagerService will broadcast one of the new intents android.intent.action.OVERLAY_ADDED, *_CHANGED, *_REMOVED or *.OVERLAYS_REORDERED. Clients that wish to read information about overlays for users other than themselves are required to hold the android.permission.INTERACT_ACROSS_USERS_FULL permission. This mirrors the protection level of PackageManager.getPackageInfo. Clients that wish to change the information are required to hold the permission android.permission.CHANGE_OVERLAY_PACKAGES. Each pair of overlay package and corresponding target package is respresented by a new OverlayInfo class. This class mirrors the existing PackageInfo class. Overlay packages are handled per Android user. The data is persisted in /data/system/overlays.xml. Co-authored-by: Martin Wallgren <martin.wallgren@sonymobile.com> Signed-off-by: Zoran Jovanovic <zoran.jovanovic@sonymobile.com> Bug: 31052947 Test: run tests from 'OMS: tests for OverlayManagerService' Change-Id: I15325e173193df3240b8dc0a58c852fd7a3d5916
/frameworks/base/core/res/AndroidManifest.xml
|
bcf3b70371a98878bcad088914a886df4217f555 |
|
26-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Adding an api for apps to check whether they can install apps"
|
0f4a8ba209175bc61b9925508b4980cee3601f96 |
|
26-Jan-2017 |
Brad Ebinger <breadley@google.com> |
Merge "Adding Dynamic ImsService Binding (1/3)" am: 8e6b13a1c0 am: 64057ab972 am: 2741442324 am: ded1df24e0 Change-Id: Ifd95efa076b7f5c8c8b02be7688aab1008bbc63c
|
ded1df24e01b7317593bbec84724b10f5444d5d9 |
|
26-Jan-2017 |
Brad Ebinger <breadley@google.com> |
Merge "Adding Dynamic ImsService Binding (1/3)" am: 8e6b13a1c0 am: 64057ab972 am: 2741442324 Change-Id: Ibd5c988226e7994c332a7e7f8b40a9338cf84e0f
|
2741442324618804cca953e30251864142e6302d |
|
26-Jan-2017 |
Brad Ebinger <breadley@google.com> |
Merge "Adding Dynamic ImsService Binding (1/3)" am: 8e6b13a1c0 am: 64057ab972 Change-Id: I901c72a38b522c190e849de55078036adc80d8b6
|
aef2513c7157a28236d097a81fe74d7ba6b710c9 |
|
24-Jan-2017 |
Suprabh Shukla <suprabh@google.com> |
Adding an api for apps to check whether they can install apps Some apps may want to check whether they are trusted to install apps on the device, so they can prompt the user to go to settings and mark them as trusted before they do an intensive operation like downloading an apk. Test: cts-tradefed run cts -m CtsExternalSourcesTestCases Bug: 31002700 Change-Id: Icd9d04daa157e6733decba245ec251ce4acd4122
/frameworks/base/core/res/AndroidManifest.xml
|
024aaf23881c142ba92194a001ac038253ae708e |
|
24-Jan-2017 |
Brad Ebinger <breadley@google.com> |
Adding Dynamic ImsService Binding (1/3) Adds support for dynamic ImsService Binding (change 1/3). Included in this change: - AIDLs for ImsServiceController - ImsFeature/ImsServiceBase definitions - KEY_CONFIG_IMS_PACKAGE_OVERRIDE CarrierConfig option Test: Unit Tests in opt/telephony Bug: 30290416 Change-Id: Ic4cb1d85a29681b08a6a525c588a72209862dcc3
/frameworks/base/core/res/AndroidManifest.xml
|
717ca4b07deaea5b9ae2402d3dd87c1592f634f7 |
|
25-Jan-2017 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow notifications to be autocanceled at a time."
|
2a128746b3466e75b6040147fa831fe12cc2ccbb |
|
28-Nov-2016 |
Julia Reynolds <juliacr@google.com> |
Allow notifications to be autocanceled at a time. Test: cts Change-Id: I24ebcab2c0fa2028ec5d2984dc3b7ec19391b590
/frameworks/base/core/res/AndroidManifest.xml
|
f994677626a6babc5121647646f17a7de85065a7 |
|
28-Nov-2016 |
Edman Anjos <edmanp@google.com> |
Refactor DPMS Cert Installer and App Restrictions delegation. The DevicePolicyManagerService currently supports delegation of certificate installation and application restriction management, both of which are individually handled by DPMS. Upcoming framework features will add four more delegation types, namely: block uninstall; app permission management; app access management; and system app enabler. At this moment it makes sense to refactor the underlying delegation system in DPMS so that current and future delegates can be handled in a more generic way. Bug: 33099995 Test: DPMS unit tests Change-Id: I9e350143572c6690febdd59d1ed5149af8ee4388
/frameworks/base/core/res/AndroidManifest.xml
|
b7cab6a19096458a7fafa905eed52db83759b6c6 |
|
25-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge changes from topic 'bisto-request' * changes: Allow privileged app to set media key event listener Allow privileged app to set volume key long-press listener
|
246b4144f1f800adb0eaa168bb722c43747b5042 |
|
24-Jan-2017 |
Karthik Ravi Shankar <karthikrs@google.com> |
Add android.permission.RESTRICTED_VR_ACCESS for privileged VR APIs. Bug: 34682109 Change-Id: I65dc7aeaaceefad470adea8313e1d81c86ad233d Signed-off-by: Karthik Ravi Shankar <karthikrs@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
6e2b01ce75fb1d5647d5d788d8a5644c30cb3068 |
|
20-Jan-2017 |
Jaewan Kim <jaewan@google.com> |
Allow privileged app to set media key event listener If the media key listener is set, the listener will receive the media key events before any other sessions, but after the global priority session. If the event is handled by the listener, other sessions cannot get the event. Privileged app needs permission android.permission.SET_MEDIA_KEY_LISTENER to set the listener. Bug: 30125811 Change-Id: I2b2cf4ac7873b70899194701c6921990dcb9de02
/frameworks/base/core/res/AndroidManifest.xml
|
5026936e49540449165fd5881231f8970a29ea91 |
|
23-Dec-2016 |
Jaewan Kim <jaewan@google.com> |
Allow privileged app to set volume key long-press listener If the volume long-press listener is set, the listener will receive the volume key long-presses instead of chaging the volume. Privileged app needs permission android.permission.SET_VOLUME_KEY_LONG_PRESS_LISTENER to set the listener. Bug: 30125811 Change-Id: I5e8fafbb950e5e11522da0f14004648d0877bf3e
/frameworks/base/core/res/AndroidManifest.xml
|
b16bddca89a423fe8b12c4dd727a8fe9d54acb07 |
|
23-Jan-2017 |
Jeff Schumacher <jeffschu@google.com> |
Merge "Opened some App Links APIs to @SystemApi"
|
6788212d17f54475ca9c3dd689a863e031db868f |
|
12-Dec-2016 |
Svet Ganov <svetoslavganov@google.com> |
Platform support for static shared libraries This change adds support for static shared libraries that emulate static linking allowing apps that statically link against the same library version to share a common implementation. A library is hosed by a package in a standard APK. Static shared libraries have a name and a version declared by a dedicated manifest tag. A client uses also a new tag to refer to the static library it uses by specifying the lib name, version, and the hash of the signing certificate. This allows two apps to rely on two different library versions and prevents impersonation of the shared library by a side-loaded app with the same package name. Internally apps providing static libs use synthetic package name generated from the manifest package name and the library version. This allows having different "versions" of the same package installed at the same time. An application cannot be installed if a static shared lib it depends on is missing. A used shared library cannot be uninstalled. Shared libraries can rotate certificates like normal apps. The versions of these libs should be ordered similarly to the version codes of the hosting package. Such libs cannot use shared user id, cannot be ephemeral, cannot declare other libraries, cannot rename their package, cannot declare child-packages. They must target O SDK. Also they cannot be suspended or hidden or their uninstall blocked. Generally, speaking policy regarding code in static shared libs should be applied to the packages using the library as it could have just statically linked the code. We now have APIs to query information about the shared libraries on the device in general. To clients static shared libraries are presented as multiple versions of the same package which is how they are declared and published. Therefore, one can have two versions of the same package which means we need way to query for and uninstall a specific version of a package. Also static shared libs can depend on other static shared libs which are versioned packages. To ease representation we add the concept of a versioned package which should be used in the case of static shared libs. A client can see only the static shared libs it depends on and more specifically only the versions it depends would be retrieved by using the standard package manager APIs. There is a new dedicated API to get info about all shared libraries which would provide data about all static shared lib versions. Also these libraries must use v2 signing scheme. Test: CTS tests pass bug:30974070 Change-Id: I4f3d537ee7a81f880950377b996e1d9d4813da5c
/frameworks/base/core/res/AndroidManifest.xml
|
6fd90ed96190c0e8668cc001c8d79753065498b4 |
|
20-Jan-2017 |
Jeff Schumacher <jeffschu@google.com> |
Opened some App Links APIs to @SystemApi This change promotes some of the APIs that Settings uses for the "Open by default" screen from @hide to @SystemApi. GTS tests are added in ag/1811536. This change also changes the protection level for Manifest.permission.SET_PREFERRED_APPLICATIONS to allow package verifiers (e.g. the Play Store) to be granted it. This permission is used in the PM.updateIntentVerificationStatusAsUser() and PM.setDefaultBrowserPackageNameAsUser() APIs. Bug:31008483 Test: Patch in ag/1811536 and follow the test instructions there. Change-Id: I18b069de11eaa8fe97c151fb3cfb63854f1fd056
/frameworks/base/core/res/AndroidManifest.xml
|
d9ade64f8c4efe1c5fc18e23fe26d24bf93986ac |
|
20-Jan-2017 |
Sundeep Ghuman <sghuman@google.com> |
Merge "Allow REQUEST_NETWORK_SCORES to be used by SetupWizard."
|
3d12a05f52f33e894dc85170959250322cdbb656 |
|
20-Jan-2017 |
Sundeep Ghuman <sghuman@google.com> |
Allow REQUEST_NETWORK_SCORES to be used by SetupWizard. Bug:34479801 Test: Built system and setup wizard and tested. Change-Id: I4fcc3d1f56f78cfb0deaf13d0eccae97dac4ffa2
/frameworks/base/core/res/AndroidManifest.xml
|
2f34b1a67835307c9d8b6d966e0ae216ce4cc6ca |
|
16-Dec-2016 |
Suprabh Shukla <suprabh@google.com> |
Adding app op and intent action for external sources Added an app op to control which package and uid can install apps on the device and an intent action to launch the settings fragment. Test: Will include in follow up CL, tracked in b/33792674 Bug: 31002700 Change-Id: Ic073495759d9867f8001a6c712e402398c53dfc9
/frameworks/base/core/res/AndroidManifest.xml
|
15470f9bfc7342d63191def8097054f1762812a5 |
|
19-Jan-2017 |
Tyler Gunn <tgunn@google.com> |
Merge "Adding self-managed connection service APIs." am: 3a7253a09d am: 2155be0218 am: d70e5d9317 am: 61650097ed Change-Id: Icfeff293b66b1bb062095a857c8a22ac0dcbdd63
|
61650097edeff0cc154afaa0466e1034127fffa5 |
|
19-Jan-2017 |
Tyler Gunn <tgunn@google.com> |
Merge "Adding self-managed connection service APIs." am: 3a7253a09d am: 2155be0218 am: d70e5d9317 Change-Id: I20ba841ceefb5905bf81262d6c42ea4b252ba3d4
|
d70e5d93171e0b771b1d4b2ceff26084a5797e4e |
|
19-Jan-2017 |
Tyler Gunn <tgunn@google.com> |
Merge "Adding self-managed connection service APIs." am: 3a7253a09d am: 2155be0218 Change-Id: I75319e09f352905ffa45194086b11711f9070c70
|
3a7253a09d1223796bd41b2a6308ace92c504ca2 |
|
19-Jan-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Adding self-managed connection service APIs."
|
f50354363c2bace924c6aeea5746b3c690a7108e |
|
09-Jan-2017 |
Tyler Gunn <tgunn@google.com> |
Adding self-managed connection service APIs. 1. Adding new APIs for self-managed connection services. 2. Adding Telecom package-level documentation. Test: Manual (unit, cts pending; this is just scaffolding for now) Bug: 34159263 Change-Id: Ic226ec8bfcb2fbcc02fe802b47499e47aab17d0a
/frameworks/base/core/res/AndroidManifest.xml
|
7967230de20aeb6993d8332347752c8e508769e4 |
|
12-Jan-2017 |
Julia Reynolds <juliacr@google.com> |
Send Snooze callback for Assistant On selection of a snooze context SnoozeCriterion. Test: runtest systemui-notification & make cts-verifier Change-Id: Iaca567100c29295fbbf1d327195a114106909652
/frameworks/base/core/res/AndroidManifest.xml
|
005224f27d05be2ccf4b5602d3c89da882cc382b |
|
09-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Make REQUEST_NETWORK_SCORES signature only." am: 1f89f3d1da am: 99b73c61f2 am: 542f906448 Change-Id: I55dc42d95816e0edd2c570fe96dc724c180a3cd1
|
542f9064481551a54b9a07dd8b7196a98cae21f0 |
|
09-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Make REQUEST_NETWORK_SCORES signature only." am: 1f89f3d1da am: 99b73c61f2 Change-Id: I5959ba9a45dd3c895421b131fd34db6b37c6e405
|
93b785a90fb0e54c273c689b59c1180f809642c2 |
|
09-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Revert "Implement Account Discovery API.""
|
85fcf96e997216fa710f00b4a03ae3b5d8c01089 |
|
06-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Make REQUEST_NETWORK_SCORES signature only. There are no use cases where it's needed by a privileged app today. Test: Built and ran BUG: 33752149 Change-Id: Ia63a86eca1f60644d25f037d395a08c541a06a08 Merged-In: Iae689e878fdb60b506536c918079a4fcff527a71
/frameworks/base/core/res/AndroidManifest.xml
|
2e22cfbefb8848e52e29827c94225ed9409af4ad |
|
09-Jan-2017 |
Dmitry Dementyev <dementyev@google.com> |
Revert "Implement Account Discovery API." This reverts commit 58fa836210a2872e58e8890456c2cd14a4b0fd3d. Change-Id: Iffc9c5eb63db382b720b45ff5e8f1948db908a03
/frameworks/base/core/res/AndroidManifest.xml
|
44a64f0a8c1b16069c5c7bf792aeb1044168cb54 |
|
07-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Make REQUEST_NETWORK_SCORES signature only."
|
ed92d5b55b09c51f2d583292f4afaff96b531660 |
|
07-Jan-2017 |
Dmitry Dementyev <dementyev@google.com> |
Merge "Implement Account Discovery API."
|
58fa836210a2872e58e8890456c2cd14a4b0fd3d |
|
21-Dec-2016 |
Dmitry Dementyev <dementyev@google.com> |
Implement Account Discovery API. Bug: https://b.corp.google.com/issues/33046496 Test: cts tests, manual tests. Change-Id: I03d1ae5dfa1577f191817aa7d508f6b4d0e625ed
/frameworks/base/core/res/AndroidManifest.xml
|
302d02b95b151e32798f62d1f24ae3d6cb47b897 |
|
06-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Make REQUEST_NETWORK_SCORES signature only. There are no use cases where it's needed by a privileged app today. Test: Built and ran BUG: 33752149 Change-Id: Iae689e878fdb60b506536c918079a4fcff527a71
/frameworks/base/core/res/AndroidManifest.xml
|
afc31dfe0fd4eb4ad512cdfa24451cefb1a5f94b |
|
05-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Defining a new REQUEST_NETWORK_SCORES permission." am: a54d76a81f am: 84fd1e1120 am: 195ac87578 Change-Id: I1f6de46c521a232c1a218e3e6b50883ea6e150b0
|
195ac875782051390b3730176c43fd94e39ec595 |
|
05-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Defining a new REQUEST_NETWORK_SCORES permission." am: a54d76a81f am: 84fd1e1120 Change-Id: I85279a0185d9191bf81e1088d68f86827fe2d103
|
a54d76a81f2d16c3e9d35fa87abc6f6d725d8bd2 |
|
05-Jan-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "Defining a new REQUEST_NETWORK_SCORES permission."
|
6a848fdf098a95faa366082e913d8a9e42fba219 |
|
04-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Use the new BIND_NETWORK_RECOMMENDATION_SERVICE." am: 34d46ca94c am: acbf592683 am: cb3f75cca7 Change-Id: I0da58029bb854a7df7bc286a0bd6a22c61d5daee
|
cb3f75cca718b4681e29615009ff7d93ba7f5a5f |
|
04-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "Use the new BIND_NETWORK_RECOMMENDATION_SERVICE." am: 34d46ca94c am: acbf592683 Change-Id: Ic488962a47eecea4c2ed522596549ef088bfbfc3
|
97e711139dfc4429e8fb67e746c7bf885e41bb42 |
|
21-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
Defining a new REQUEST_NETWORK_SCORES permission. This is intended to be a drop-in replacement for the existing BROADCAST_NETWORK_PRIVILEGED with a more appropriate name. Test: Built, ran. BUG: 33752149 Change-Id: Iebe9d1c12f159bd91953ef094d9866eba9ff925a Merged-In: I12bdba9694fdf2a2e39990736265919edafd865e
/frameworks/base/core/res/AndroidManifest.xml
|
64593c699337e6ff742b437b5635f3842ebebf3d |
|
04-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Defining a new REQUEST_NETWORK_SCORES permission."
|
c02fd4ea78684e96028e089afb9a4549fc47aee7 |
|
29-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
Use the new BIND_NETWORK_RECOMMENDATION_SERVICE. Declare that the system uses the new BIND_NETWORK_RECOMMENDATION_SERVICE permission. Test: Built & ran BUG: 33897544 Change-Id: I43424642a631f58da3a065f8221e351180f4f221 Merged-In: I41c7550adf0d1f81ed9a12068ba569e6a57f3b42
/frameworks/base/core/res/AndroidManifest.xml
|
a1a96763171f3fc532dd5be71922e5581445942c |
|
04-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "New permission - BIND_NETWORK_RECOMMENDATION_SERVICE." am: 871beedc6d am: a169fc3494 am: 8be80273b8 Change-Id: I4930b2d6145e5d7f4e08d267629f40517cbeae34
|
8be80273b88afc85bd106af73bc3f91f6e3c3121 |
|
04-Jan-2017 |
Jeremy Joslin <jjoslin@google.com> |
Merge "New permission - BIND_NETWORK_RECOMMENDATION_SERVICE." am: 871beedc6d am: a169fc3494 Change-Id: I25f816c0ee3df784a02be58a042c505f2c839394
|
871beedc6d51db60e8d3f73752651ad5da98d0b4 |
|
04-Jan-2017 |
Treehugger Robot <treehugger-gerrit@google.com> |
Merge "New permission - BIND_NETWORK_RECOMMENDATION_SERVICE."
|
858ab9907152b2391063f11706e22d9308cb0454 |
|
04-Jan-2017 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Add a mechanism for configuring the A2DP Source codecs" am: 63270f2b96 am: 8b46f87e7e am: da3de76bdb am: 62c5226e9c Change-Id: I14d4cc2dc91cb1ab431eda32d5066ac8f471c3a6
|
62c5226e9c9d5a85689e40b00eacc41e5e90f671 |
|
04-Jan-2017 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Add a mechanism for configuring the A2DP Source codecs" am: 63270f2b96 am: 8b46f87e7e am: da3de76bdb Change-Id: If62a29812dad856d262c38804f3d88a5406ef79e
|
da3de76bdb523e29359859002b6b7e5cdc9cf0e6 |
|
04-Jan-2017 |
Pavlin Radoslavov <pavlin@google.com> |
Merge "Add a mechanism for configuring the A2DP Source codecs" am: 63270f2b96 am: 8b46f87e7e Change-Id: I39e4b90491f646887200649954b652d9f5439925
|
44a4ef0aa93ebb2912f36d65af42ffbb1bcdbc0f |
|
21-Dec-2016 |
Pavlin Radoslavov <pavlin@google.com> |
Add a mechanism for configuring the A2DP Source codecs * Added a new class BluetoothCodecConfig that contains codec-related configuration or capabilities: codec type, priority, sample rate, bits per sample, channel mode, and codec specific fields. * Extended the Bluetooth A2DP AIDL interface to get/set the current codec configuration * Added new call handleBluetoothA2dpDeviceConfigChange() to the Media Framework that is called when there are changes in the Bluetooth A2DP device configuration - e.g., the A2DP codec is changed. Test: A2DP streaming to headsets, TestPlans/71390 Bug: 30958229 Change-Id: I9a82716cbc2a5efbe77352a031ac80c88f6a2459
/frameworks/base/core/res/AndroidManifest.xml
|
b9a61979cc92e0c976802195f021b444ce994e4c |
|
28-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
New permission - BIND_NETWORK_RECOMMENDATION_SERVICE. Used to protect exported network recommendation services. Test: Built & ran BUG:33897544 Change-Id: Icfc566275a8d832449f6358e576784199ab0f7b2 Merged-In: I4f163fb965be6a25201bc3ba5e0032e7652c8f20
/frameworks/base/core/res/AndroidManifest.xml
|
3c9ce1cd174c5fdb3405ffa6db7268532d8ba552 |
|
03-Jan-2017 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Use the new BIND_NETWORK_RECOMMENDATION_SERVICE."
|
48e6745a08e6b89a91afd43809948c47b08b0367 |
|
29-Dec-2016 |
Ivan Podogov <ginkage@google.com> |
Rename the Bluetooth profile classes for HID Device role. am: 0afe190af5 am: 94e3d3f499 am: 91ab2e2f98 am: 48738f5ad0 Change-Id: I15651c5a6e3baf53d915626ea6c55180fefe28b5
|
48738f5ad07b71066a74766a3a066dd10c45f027 |
|
29-Dec-2016 |
Ivan Podogov <ginkage@google.com> |
Rename the Bluetooth profile classes for HID Device role. am: 0afe190af5 am: 94e3d3f499 am: 91ab2e2f98 Change-Id: If0e072e96491020191a7742928cc90adff151342
|
91ab2e2f983eddee138bd7f577c5659e0e610fdc |
|
29-Dec-2016 |
Ivan Podogov <ginkage@google.com> |
Rename the Bluetooth profile classes for HID Device role. am: 0afe190af5 am: 94e3d3f499 Change-Id: I97ff93fd2564bd76d90095f8086f79c6c6086aff
|
d68769390257324cc5e5ce7b053444366389145c |
|
29-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
Use the new BIND_NETWORK_RECOMMENDATION_SERVICE. Declare that the system uses the new BIND_NETWORK_RECOMMENDATION_SERVICE permission. Test: Built & ran BUG: 33897544 Change-Id: I41c7550adf0d1f81ed9a12068ba569e6a57f3b42
/frameworks/base/core/res/AndroidManifest.xml
|
0afe190af52d83c5e52fa994e53c48e33e8e3bf4 |
|
23-Dec-2016 |
Ivan Podogov <ginkage@google.com> |
Rename the Bluetooth profile classes for HID Device role. We already have BluetoothInputDevice class, so adding something called BluetoothHidDevice seems confusing. On the other hand, the new class is designed to connect to HID Host devices, so naming it BluetoothInputHost makes sense and goes in line with the existing BluetoothInputDevice. The same goes for the new constant HID_DEVICE that is just as confusing to have together with the INPUT_DEVICE one. This CL also renames the "connection state changed" broadcast (for the same reasons), declares it as an SDK constant, and also adds some javadoc to it. Note that BluetoothHidDeviceApp* classes remained unchanged, as those correspond to the app that implements the Device (and connects to the Host). Test: make Change-Id: I5075ca5b97db3c1dd403c2e9660eecc7380cffe2
/frameworks/base/core/res/AndroidManifest.xml
|
77447de5d56303126fdec11fa9714c85f95dbe56 |
|
29-Dec-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "New permission - BIND_NETWORK_RECOMMENDATION_SERVICE."
|
305040411b05e97a2fd4ef7dabde0508220ce40f |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. am: 40ba793b33 am: 2891357f4d am: ff501e5e5f am: 88addedb34 Change-Id: Ic38830c87084c6fc7237f290f8167324744c12d0
|
88addedb34a8a68782f0dc0cd845217903d1d4cc |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. am: 40ba793b33 am: 2891357f4d am: ff501e5e5f Change-Id: I8e7bf9b66c92ed5db45007084075fca36ccaa0c8
|
72f5e08ce2efe5d6e9135e31059849bd8be7a659 |
|
28-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
New permission - BIND_NETWORK_RECOMMENDATION_SERVICE. Used to protect exported network recommendation services. Test: Built & ran BUG:33897544 Change-Id: I4f163fb965be6a25201bc3ba5e0032e7652c8f20
/frameworks/base/core/res/AndroidManifest.xml
|
23473e88512c150511beabb23d27e7f1f5016e89 |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. am: 40ba793b33 am: 2891357f4d Change-Id: Id95f2f8c11a98b56f656b3688accd632fe6da43d
|
ff501e5e5f3f1810e5c2de7188b0e0b22f47e9ae |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. am: 40ba793b33 am: 2891357f4d Change-Id: I9b15c8787d6f6aa6c2d362de46ab06a583d3283c
|
2891357f4d26eafa0e0050c3663189676300549c |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. am: 40ba793b33 Change-Id: I5d15df8192fee8362dca8dcc53d84b75af29a13f
|
61dad4b2fcc72ccbfb141f40da1e4219039d4a9e |
|
28-Dec-2016 |
Andrew Solovay <asolovay@google.com> |
Merge "[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported." into nyc-mr1-dev
|
7231d44467e895af4249e9bffe82cb1c249a2a7a |
|
21-Dec-2016 |
Jeremy Joslin <jjoslin@google.com> |
Defining a new REQUEST_NETWORK_SCORES permission. This is intended to be a drop-in replacement for the existing BROADCAST_NETWORK_PRIVILEGED with a more appropriate name. Test: Built, ran. BUG: 33752149 Change-Id: I12bdba9694fdf2a2e39990736265919edafd865e
/frameworks/base/core/res/AndroidManifest.xml
|
ca9eed431525a98e781e3ba99abce6612ae972db |
|
28-Dec-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add VisualVoicemailService"
|
f1312cd68e093a1ef429c0d411dad7e83acc7d2b |
|
21-Dec-2016 |
Daniel Nishi <dhnishi@google.com> |
Augment diskstats dumpsys to have categorization and apps. am: 090b2d9d6c Change-Id: I2c923293a1baf91b14ab50e25c880bfeb191403d
|
090b2d9d6c73ad1b92fd6374aaaa26a384333239 |
|
13-Dec-2016 |
Daniel Nishi <dhnishi@google.com> |
Augment diskstats dumpsys to have categorization and apps. This adds a new service which opportunistically saves the file system categorization information and the app sizes. This information is fetched during a diskstats dumpsys call from a file stored on the disk. This allows us to keep the dumpsys running quickly while adding information which is costly to calculate. Bug: 32207207 Test: System server instrumentation tests Change-Id: Id59e84b9ad38a9debf3e46e5133ef06f7353829d
/frameworks/base/core/res/AndroidManifest.xml
|
dee7669fd2e963af8d490c231ca70d598f697fc8 |
|
20-Dec-2016 |
phweiss <phweiss@google.com> |
DO NOT MERGE Show notification when network logging is enabled am: 923d2cc9d9 Change-Id: Ia5839248361a7d7fbb0c73cdb569ada62a96c286
|
77a78c6f4412dccc58075685ad77f3e41d85f2e4 |
|
13-Dec-2016 |
Daniel Nishi <dhnishi@google.com> |
Augment diskstats dumpsys to have categorization and apps. This adds a new service which opportunistically saves the file system categorization information and the app sizes. This information is fetched during a diskstats dumpsys call from a file stored on the disk. This allows us to keep the dumpsys running quickly while adding information which is costly to calculate. Bug: 32207207 Test: System server instrumentation tests Change-Id: Id59e84b9ad38a9debf3e46e5133ef06f7353829d
/frameworks/base/core/res/AndroidManifest.xml
|
923d2cc9d9915b18a8d29e9087add48dbe820eeb |
|
14-Dec-2016 |
phweiss <phweiss@google.com> |
DO NOT MERGE Show notification when network logging is enabled A notification is shown after network logging is enabled and after the next three reboots that are at least one day apart. Clicking it sends an intent to quick settings to shown its device monitoring dialog. Cherry-picked from master. Bug: 29748723 Bug: 33126577 (cherry-picked from commit a0cb251ca6a8ea8df17ff8089573bc50f2f1849f) Test: Manual, CTS-Verifier tests will be added later Change-Id: I2bf517bd27ab23ad3f66270602dbf062efab8cbb
/frameworks/base/core/res/AndroidManifest.xml
|
a0cb251ca6a8ea8df17ff8089573bc50f2f1849f |
|
14-Dec-2016 |
phweiss <phweiss@google.com> |
Show notification when network logging is enabled A notification is shown after network logging is enabled and after the next three reboots that are at least one day apart. Clicking it sends an intent to quick settings to shown its device monitoring dialog. Bug: 29748723 Bug: 33126577 Test: Manual, CTS-Verifier tests will be added later Change-Id: I2bf517bd27ab23ad3f66270602dbf062efab8cbb
/frameworks/base/core/res/AndroidManifest.xml
|
485d6dec93579d2186a3ecd57c2b5af4ce8e622b |
|
16-Dec-2016 |
Ta-wei Yen <twyen@google.com> |
Add VisualVoicemailService VisualVoicemailService can be implemennted by the default dialer to provide a visual voicemail client similar to the OMTP visual voicemail spec. Other APIs such as the SMS filter and hidden text SMS sending are made public and consolidated into the service interface. Test: make. CTS tests in a follow up CL Change-Id: Ib5e9aa15fc098f4c13b15e5dbecf9ab646e0e400
/frameworks/base/core/res/AndroidManifest.xml
|
73aeea2da24bf0d4eae0dc803df18d1266f85136 |
|
18-Nov-2016 |
Lenka Trochtova <ltrochtova@google.com> |
Make master clear constants system APIs. This is needed for unbundling of the OobConfig apk. Test: gts-tradefed run gts -m GtsGmscoreHostTestCases --test com.google.android.gts.devicepolicy.DeviceOwnerUserRestrictionTest#testFactoryReset_disallowFactoryReset Bug: 32974361 Change-Id: I71e7270bb4c3234ec0516382b18a2ca35aab4c81
/frameworks/base/core/res/AndroidManifest.xml
|
d1c710d5cff55b632e91d95cdba158bbc3879bc8 |
|
14-Dec-2016 |
Michal Karpinski <mkarpinski@google.com> |
DO NOT MERGE [DPM] Management and retrieval of network logs am: 4c47adef60 Change-Id: I39486c9d6116023f1ee9bd576b7fcd0fe20023a1
|
4c47adef60ca0326bdbe124dfdd335382e5c0787 |
|
12-Oct-2016 |
Michal Karpinski <mkarpinski@google.com> |
DO NOT MERGE [DPM] Management and retrieval of network logs This CL follows up on ag/1530343 and adds: 1) Various network events. 2) Retrieval method in DPM and APIs in DeviceAdminReceiver. 3) Extension of NetworkLogger and it's NetworkLoggingHandler. Test: runtest --path frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/NetworkEventTest.java Bug: 29748723 Change-Id: I42a1a477e7c75c109a3982f809c22732b814e8b2
/frameworks/base/core/res/AndroidManifest.xml
|
761ee08e0ac954143511fd05bfd028c906a2b01a |
|
07-Dec-2016 |
Felipe Leme <felipeal@google.com> |
Added label for REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission. am: 965f4265c5 am: 519cb74e92 Change-Id: I988f82958648d6e141e3c161f6e7e72346d0a818
|
519cb74e9268f97da3c35c9b7bb876e22d2eaa78 |
|
07-Dec-2016 |
Felipe Leme <felipeal@google.com> |
Added label for REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission. am: 965f4265c5 Change-Id: Ib7380a343f55e262c2df61d7ad9fc9e8e959a7b7
|
965f4265c5207c01d79626e0b55245330658020e |
|
05-Dec-2016 |
Felipe Leme <felipeal@google.com> |
Added label for REQUEST_IGNORE_BATTERY_OPTIMIZATIONS permission. Change-Id: I84dc652f7297c2b8c9351e737074ddf43754718d Fixes: 32950329 Test: manually verified it
/frameworks/base/core/res/AndroidManifest.xml
|
f81894f4ae402e5ed679ecab956043b7d75a5d87 |
|
02-Dec-2016 |
Jack He <siyuanh@google.com> |
Merge "Protect broadcast emitted by Bluetooth mapmce and pbap profile" am: 7dd909684f am: 33f0cf1267 am: 7ef7e18636 am: 133de5dce0 Change-Id: Id4015a6ff7bfc492181c9e81feadfa66580fbf40
|
7ef7e1863668225129e6b042b0338f0af7669a49 |
|
02-Dec-2016 |
Jack He <siyuanh@google.com> |
Merge "Protect broadcast emitted by Bluetooth mapmce and pbap profile" am: 7dd909684f am: 33f0cf1267 Change-Id: I1cb33a340524aeb579330bd49affd02670e89c5a
|
33f0cf1267a345ae80a345d72f8e3746167ee1f4 |
|
02-Dec-2016 |
Jack He <siyuanh@google.com> |
Merge "Protect broadcast emitted by Bluetooth mapmce and pbap profile" am: 7dd909684f Change-Id: Ib90b23ef7b4271e2adc8a3c66963aaeb5c70a66f
|
1ac34e3657beab34193c9dd8c8866d1a4f261dbc |
|
01-Dec-2016 |
Jack He <siyuanh@google.com> |
Protect broadcast emitted by Bluetooth mapmce and pbap profile Bug: 33281228 Test: mm -j 40 Change-Id: I273e9e3c02f431ba7006bcf5d230a6c30eb67843
/frameworks/base/core/res/AndroidManifest.xml
|
7075269195a7fca25624fb1158b994a512f6a97f |
|
01-Dec-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Add READ_PHONE_NUMBER permission"
|
73ec8f963d46ea96a5a4d63d3086a362bf345320 |
|
10-Nov-2016 |
Chad Brubaker <cbrubaker@google.com> |
Add READ_PHONE_NUMBER permission READ_PHONE_NUMBER allows only access to the phone number and not all the other things that READ_PHONE_STATE allows access to. READ_PHONE_NUMBER will be accessible to ephemeral apps while READ_PHONE_STATE will no longer be. Test: Verified that getLine1Number works with READ_PHONE_NUMBER from an epemheral app Test: cts-tradefed run cts -m CtsPermission2TestCases Change-Id: I599c19227f886adbe8efe346a78d51e88ab46379
/frameworks/base/core/res/AndroidManifest.xml
|
d61cc80acac3441826707422423d5881522d8d32 |
|
30-Nov-2016 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Expose CAMERA and ACCESS_NETWORK_STATE to ephemeral apps"
|
b1df48d32632d0ba5a2389fb9fad2943dcb55562 |
|
23-Nov-2016 |
Baligh Uddin <baligh@google.com> |
Merge remote-tracking branch 'goog/cw-f-dev' into fix_merger Bug: 32849428 * goog/cw-f-dev: (98 commits) Revert "Catch KeyStoreException for setting profile lock" Fix createConfirmDeviceCredentialIntent for wear for CTS. Fix default dialog background colour for watch devices. Catch KeyStoreException for setting profile lock Add cross-links between FINE and COARSE location permissions. bug: 25371600 Fixed a bug with the emergency affordance in multi user Zygote: Additional whitelists for runtime overlay / other static resources. Import translations. DO NOT MERGE Import translations. DO NOT MERGE Import translations. DO NOT MERGE Import translations. DO NOT MERGE Import translations. DO NOT MERGE Import translations. DO NOT MERGE Import translations. DO NOT MERGE Zygote : Block SIGCHLD during fork. colors: add missing accent_material_{700,50} resources. Import translations. DO NOT MERGE Import translations. DO NOT MERGE Zygote : Block SIGCHLD during fork. DO NOT MERGE ANYWHERE Revert "DO NOT MERGE ANYWHERE libhwui: make setSurface asynchronous" ... Change-Id: I63468da5bfa21ed9ac5985bbdbf3a61d4c389aa0
|
40ba793b33538d27bdeaf1ce2bd444572857741d |
|
17-Nov-2016 |
Andrew Solovay <asolovay@google.com> |
[DAC FIXIT]: Noted that UNINSTALL_SHORTCUT is no longer supported. Per b/25487830, this permission is no longer supported. I don't think I can remove it from the manifest file, so unless someone has a better idea, I'm just replacing the existing doc with a comment saying that it's not supported. Doc is staged to: http://go/dac-stage/reference/android/Manifest.permission.html#UNINSTALL_SHORTCUT bug: 25487830 Change-Id: Ib564fb49536626df6f92bd2b97a11ffec41e9a90
/frameworks/base/core/res/AndroidManifest.xml
|
97be8864e5b2029e96da47db5893aaafbeb5f0cd |
|
18-Nov-2016 |
Scott Main <smain@google.com> |
Add cross-links between FINE and COARSE location permissions. bug: 25371600 am: 3fef783359 am: c8b11fb7cb am: 192a8c4973 Change-Id: Ib54b2bafcf87a4f27e6a541a4cde0b01c41780b0
|
192a8c4973a94b89522cc57e0334d0c96e8df7e9 |
|
18-Nov-2016 |
Scott Main <smain@google.com> |
Add cross-links between FINE and COARSE location permissions. bug: 25371600 am: 3fef783359 am: c8b11fb7cb Change-Id: I6db78aa2008d2bdd675a87daeae132e5f5c09371
|
3fef783359bf1953f7bef31fcdbbfa86c085b35b |
|
16-Nov-2016 |
Scott Main <smain@google.com> |
Add cross-links between FINE and COARSE location permissions. bug: 25371600 Change-Id: I7af21b063533085ce20c51d18f118c7752fd77f0 (cherry picked from commit b18745616f9dd6b79202168b648edcef382ea967)
/frameworks/base/core/res/AndroidManifest.xml
|
b18745616f9dd6b79202168b648edcef382ea967 |
|
16-Nov-2016 |
Scott Main <smain@google.com> |
Add cross-links between FINE and COARSE location permissions. bug: 25371600 Change-Id: I7af21b063533085ce20c51d18f118c7752fd77f0
/frameworks/base/core/res/AndroidManifest.xml
|
397873883d3bf335e5c4be218d6d68d206a2d118 |
|
15-Nov-2016 |
Chad Brubaker <cbrubaker@google.com> |
Expose CAMERA and ACCESS_NETWORK_STATE to ephemeral apps Test: cts-tradefed run cts -m CtsPermission2TestCases Change-Id: I9f14949c4f8fb7bc2f9cc7306d01ba52ff783599
/frameworks/base/core/res/AndroidManifest.xml
|
fed51fcedbeaf2de98a109087b8297d6e6df8862 |
|
11-Nov-2016 |
Felipe Leme <felipeal@google.com> |
Uses a notification to request auto-fill. This is a temporary approach until UX decide the final one. BUG: 31001899 Test: manually built and ran it Change-Id: I234ffc9bfffcccae5e5c310f9669c4a2a8e9d65c
/frameworks/base/core/res/AndroidManifest.xml
|
97a06a12ed29fb72eb40d49b83333a9a6327222c |
|
09-Nov-2016 |
Jason Monk <jmonk@google.com> |
Add switchable theme to tuner Allows option in tuner to switch between system theme overlays if multiple exist. Requires a restart to take effect. Test: Settings -> Tuner -> Other -> Theme Change-Id: Iea43b9cbb67fd91c6008be594ad4cfd19c3f57ec
/frameworks/base/core/res/AndroidManifest.xml
|
67c8e1e61f289ff51382c372452071eebca2104c |
|
09-Nov-2016 |
Julia Reynolds <juliacr@google.com> |
Merge "Ranker --> Assistant."
|
77b2cc920fb27adaa156b463dccb0bd1b5c87eb9 |
|
08-Nov-2016 |
Julia Reynolds <juliacr@google.com> |
Ranker --> Assistant. Rename ranker to assistant and make some of the methods public. Delete the ext services ranker and restore the listener-type lifecycle to the assistant. Test: manual. add a notification assistant and verify it gets assistant and listener callbacks. Change-Id: Ia3406c8c14d923426c1b8a6d8b5187efe64c31c3
/frameworks/base/core/res/AndroidManifest.xml
|
5381aa4b585f3fa2a315d88e910111173e2ef77d |
|
13-Oct-2016 |
Felipe Leme <felipeal@google.com> |
Initial implementation of the Auto-Fill Framework classes. This CL provides the initial, skeleton implementation of the Auto-Fill Framework classes: - Defines the system service and app-based AIDL (IAutoFillManagerService.aidl and IAutoFillService.aidl respectively). - Defines the 'adb shell cmd' interface. - Defines the permission required to access the service. - Registers the service on SystemServer. - Adds the code to bind the app-specified service to system_server. - Defines the service class (AutoFillService) required by providers. - Implements the initial startSession() method. This is still a very early, "work-in-progress" change: - It has many TODOs. - It does not have unit or CTS tests yet. - It does not provide a callback method to auto-fill the fields. - In fact, it has a lot of TODOs. Despite these adversities, it can be tested by following the steps below: 1.Create an app with a service extending AutoFillService 2.Implement the onNewSession() method 3.In the manifest: - Listen to android.service.autofill.AutoFillService intents. - Require the android.permission.BIND_AUTO_FILL permission. 4.Explicitly set the app as an autofill-service by running: adb shell settings put secure auto_fill_service MY_APP/.MY_SERVICE 5.Start a session against the top activity: adb shell cmd autofill start session BUG: 31001899 Test: manually built and ran it Change-Id: I00f4822159b31ddddba8f513e57c4474bc74eb89
/frameworks/base/core/res/AndroidManifest.xml
|
65710071018141fecd0346ed09e53c262939e54c |
|
06-Nov-2016 |
Etan Cohen <etancohen@google.com> |
Merge "[NAN-AWARE] Rename NAN to Aware" am: 74b1131cc8 Change-Id: I2e788e19a11f2709f2e542dbdc4b58433a3574bf
|
0849ded00879dc05175c079011aa038c5ba0770a |
|
26-Oct-2016 |
Etan Cohen <etancohen@google.com> |
[NAN-AWARE] Rename NAN to Aware ~Rename only (and any reformatting needed to pass lint) - no functional changes! Remove android.net.wifi.nan.STATE_CHANGED from manifest: redundant/remnant of an older configuration. (cherry-pick of commit a61b9fb569153917a650f1d48efa20ba8846a9f3) Bug: 32263750 Test: All unit tests and integration (sl4a) tests pass. Merged-In: Ie4ff675fa61041e8fcf6a9bf9900ea835d0a7614 Change-Id: I4206d2fd722dc7dec9df4aee5c818101d7f9dccc
/frameworks/base/core/res/AndroidManifest.xml
|
0413327d741fe7246f9d5bf508da6f6b6a6a7476 |
|
26-Oct-2016 |
Etan Cohen <etancohen@google.com> |
[NAN-AWARE] Rename NAN to Aware ~Rename only (and any reformatting needed to pass lint) - no functional changes! Remove android.net.wifi.nan.STATE_CHANGED from manifest: redundant/remnant of an older configuration. (cherry-pick of commit a61b9fb569153917a650f1d48efa20ba8846a9f3) (cherry-pick of commit b061f21e7e59a99834e163e2baa1c82229e419a6) Bug: 32263750 Test: All unit tests and integration (sl4a) tests pass. Change-Id: Ie4ff675fa61041e8fcf6a9bf9900ea835d0a7614
/frameworks/base/core/res/AndroidManifest.xml
|
a49078e9ffe488cacbed60ac55505401d64501d8 |
|
27-Oct-2016 |
Christopher Tate <ctate@google.com> |
Make SET_TIME_ZONE permission match SET_TIME That is, SET_TIME_ZONE is now signature|privileged. Bug 19129180 Test: dumpsys package to verify assignment; clock app works Change-Id: Id0e16499a00e1f5cfb5bd4d9fb421f93bb283ee1
/frameworks/base/core/res/AndroidManifest.xml
|
f77ee4f1b79929a77f603e5e879f3616ae464e3e |
|
12-Oct-2016 |
Michal Karpinski <mkarpinski@google.com> |
[DPM] Management and retrieval of network logs This CL follows up on ag/1530343 and adds: 1) Various network events. 2) Retrieval method in DPM and APIs in DeviceAdminReceiver. 3) Extension of NetworkLogger and it's NetworkLoggingHandler. Test: runtest --path frameworks/base/services/tests/servicestests/src/com/android/server/devicepolicy/NetworkEventTest.java Bug: 29748723 Change-Id: I42a1a477e7c75c109a3982f809c22732b814e8b2
/frameworks/base/core/res/AndroidManifest.xml
|
006b53a68149d22dc8174ed6c46175967e6f0764 |
|
31-Oct-2016 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Add ephemeral protection level"
|
c19706a937abc5d025a59b354b3a0d89e7d62805 |
|
14-Oct-2016 |
Chad Brubaker <cbrubaker@google.com> |
Add ephemeral protection level Ephemeral applications will only be able to be granted permissions that have the ephemeral proteciton level, this allows us to tighly define what behavior is OK for ephemeral applications. This includes an initial small whitelist of permissions for ephemeral apps, it may be expanded later. Test: adb install --ephemeral, verified against both runtime and install time permissions Test: cts-tradefed run cts -m CtsPermission2TestCases Change-Id: I854c44cf7a293d484b674cdd4fb5141e362a2f1a
/frameworks/base/core/res/AndroidManifest.xml
|
9df8f51044c19c884058202a156a5a506ad4a276 |
|
25-Oct-2016 |
Dianne Hackborn <hackbod@google.com> |
Tweak ActivityManager.getPackageImportance() - Now requires PACKAGE_USAGE_STATS permission. - Simpler implementation. Test: none Change-Id: Id42ee31d0af8d896cbc94c81666bc734198c1273
/frameworks/base/core/res/AndroidManifest.xml
|
3752e507667f9142a901377a2a7fdfe0f689448f |
|
14-Oct-2016 |
Julia Reynolds <juliacr@google.com> |
Merge "Add support for snoozing notifications"
|
6d392a77faf40a6ce43e4e0f8545b543afd88e73 |
|
13-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off am: b2457c3704 am: ff484bbfeb am: ebdcd873ec Change-Id: Id9cf89c6f4b6a505cb568a3b782f2c302cc5ae49
|
ebdcd873ecf6b3fed7715cd0bd040990a1d21161 |
|
13-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off am: b2457c3704 am: ff484bbfeb Change-Id: I7f6cda2da22347375507a0364e976bbb01066ccc
|
72f1cbb3b988d6daa61c45a69aa9f8024c029b06 |
|
19-Sep-2016 |
Julia Reynolds <juliacr@google.com> |
Add support for snoozing notifications To a notification listener, snoozing will appear as a cancel (with reason snoozed) followed by a post (when the snooze period ends). Apps can repost a snoozed notification, but the updates will not be shown to the user until the snooze period ends. Snoozing is canceled if the posting app or a notification listener cancels the notification. Any notification listener can snooze a notification. Technically apps can snooze their own notifications also, though that's not public. In this iteration snoozed notifications will be lost on device reboot. Test: included. Also, various post, snooze, update, cancel tests with a listener. Bug: 30997603 Change-Id: I568a6448196f0992a17d20a4dac296321ec5092b
/frameworks/base/core/res/AndroidManifest.xml
|
ff484bbfebdfbd765b852a1360159d9f86d7e38b |
|
13-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off am: b2457c3704 Change-Id: I3afe3d8628e8af5806b03b86ea5c866fd454cddd
|
cba436b312f1bf6890be1366843109eebdc1d229 |
|
13-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow SetupWizard to do WiFi scans if location off" into nyc-mr1-dev
|
c573661f4ce2156268a900cc859a50ef2e0813b5 |
|
12-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off Location permission is needed for apps to do WiFi scans and if location is globally off no app can scan too. It is possible that an OEM does not want location to be on until the user agrees to that or a device owner can turn location off before setup. As a result setup wizard cannot show the WiFi networks preventing the user form logging in. This change allows the setup wizard component to perform WiFi scans even if location is globally off. bug:29577364 Change-Id: I6b7c5dca76b8c8ee6051ea2dad3cec6879683524
/frameworks/base/core/res/AndroidManifest.xml
|
b2457c370451ca6eac9457369a30a43aa0179ee6 |
|
12-Oct-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Allow SetupWizard to do WiFi scans if location off Location permission is needed for apps to do WiFi scans and if location is globally off no app can scan too. It is possible that an OEM does not want location to be on until the user agrees to that or a device owner can turn location off before setup. As a result setup wizard cannot show the WiFi networks preventing the user form logging in. This change allows the setup wizard component to perform WiFi scans even if location is globally off. bug:29577364 Change-Id: Ic56bfb7fb3818658a843d309b67ef37324045f67
/frameworks/base/core/res/AndroidManifest.xml
|
9a5792f15b55589141079d82f75ce7f77db2caf3 |
|
11-Oct-2016 |
Jack He <siyuanh@google.com> |
List HF_INDICATORS_VALUE_CHANGED broadcast as protected am: 0bba1c620b am: 4d74ff91aa am: df2bc4958d Change-Id: Ie9f4ec46e6e6021d01f16a8fa89744d0f31ea59e
|
df2bc4958db01c1fddf8a537fce1c7191c5fdbcb |
|
11-Oct-2016 |
Jack He <siyuanh@google.com> |
List HF_INDICATORS_VALUE_CHANGED broadcast as protected am: 0bba1c620b am: 4d74ff91aa Change-Id: I44f5abb2476c10e8e7971ea1ff28832c66768fa8
|
0bba1c620b2fc65f9809a619042e75597075d431 |
|
10-Oct-2016 |
Jack He <siyuanh@google.com> |
List HF_INDICATORS_VALUE_CHANGED broadcast as protected android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED notification should be protected. Bug: 32059227 Test: manual Change-Id: I06d4a7e3aa3a5586eb09d2538b4b526a5d073f9a (cherry picked from commit b798f79ba26e057531fb51e65824e0deee445f26)
/frameworks/base/core/res/AndroidManifest.xml
|
b798f79ba26e057531fb51e65824e0deee445f26 |
|
10-Oct-2016 |
Jack He <siyuanh@google.com> |
List HF_INDICATORS_VALUE_CHANGED broadcast as protected android.bluetooth.headset.action.HF_INDICATORS_VALUE_CHANGED notification should be protected. Bug: 32059227 Test: manual Change-Id: I06d4a7e3aa3a5586eb09d2538b4b526a5d073f9a
/frameworks/base/core/res/AndroidManifest.xml
|
f1ac71dbe278fd9253861787a1bfc6262eae24f4 |
|
05-Oct-2016 |
Robin Lee <rgl@google.com> |
Merge "Redact work notifications separately from personal"
|
557fe02484ca0db88e94edcbacf5f2b9f139b98b |
|
01-Oct-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Register WIFI_NAN_STATE_CHANGED as protected broadcast am: 720d175757 am: 083f313756 am: a06821b2cf am: 1a92c54559 Change-Id: I92d50b5caa6f2aab0b2341957d614210b35b1e66
|
1a92c545596f41f46036a5a3def20b6fc1d084d6 |
|
30-Sep-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Register WIFI_NAN_STATE_CHANGED as protected broadcast am: 720d175757 am: 083f313756 am: a06821b2cf Change-Id: I23d1aee5e8cf1134ea03e7a3b4f32fe931855f14
|
720d175757f30ff7546309031a8e60f71f5387ee |
|
30-Sep-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Register WIFI_NAN_STATE_CHANGED as protected broadcast Broadcast can be registered protected (as in this CL) in which case they are restricted to system apps. Broadcasts sent by the System Service must be protected (so no one else can fake them). The WIFI_NAN_STATE_CHANGED is sent by the System Service and no other apps should be able to send them (e.g. to deny access to NAN to other apps). (cherry-pick of commit b8ce87175e3a865feaad7c6aa49226f768729540) Bug: 31811154 Test: build & run - enable/disable Wi-Fi to trigger bug Change-Id: I77ea18291d68c38a63d64a75affc6b7ea114e549
/frameworks/base/core/res/AndroidManifest.xml
|
3b41285a0ce143a74d545f17696c7c641c4a36bf |
|
28-Sep-2016 |
Salvador Martinez <dehboxturtle@google.com> |
Changed themes for core activities am: 7e2657c303 am: f3209d6c87 am: 32a87ca7a9 Change-Id: I9db830b77e0d6ef224f7fe12e2596e3a6d9bd0e2
|
32a87ca7a9e1405cf2778b53fd55e49cfbfce689 |
|
28-Sep-2016 |
Salvador Martinez <dehboxturtle@google.com> |
Changed themes for core activities am: 7e2657c303 am: f3209d6c87 Change-Id: I1595ffd9a91137666e45792f8f980355ea622f50
|
7e2657c30374dfc89993aa7cde8d96ae60a13d0a |
|
26-Sep-2016 |
Salvador Martinez <dehboxturtle@google.com> |
Changed themes for core activities Many activities in core were using the material theme which would result in teal colors on all devices. These themes have all been changed to DeviceDefault so that the color will be more suited to whatever device the user has. Test: Manual Inspection Bug: 31623421 Change-Id: I6847023c4fb57a1c3384a1f8e483cd740229458f
/frameworks/base/core/res/AndroidManifest.xml
|
b250ffccef99259618984abfdfca496564278a9c |
|
22-Sep-2016 |
Andre Eisenbach <eisenbach@google.com> |
Merge "List btopp.intent.action.ACCEPT broadcast as protected" am: e2d9cc4bc9 am: c1777a853c am: 7b9a3d7134 am: 031facb524 Change-Id: Iab2b3745482b17773764ade14d3b90e82b6c9e8b
|
031facb5248012036db8321abf01e78d4d5144d9 |
|
21-Sep-2016 |
Andre Eisenbach <eisenbach@google.com> |
Merge "List btopp.intent.action.ACCEPT broadcast as protected" am: e2d9cc4bc9 am: c1777a853c am: 7b9a3d7134 Change-Id: Id5f74592e87454f6bc5cf4aacb7e99383e38196c
|
c82a4f41925016bd5677629cfa6eead6447f87fb |
|
21-Sep-2016 |
Jack He <siyuanh@google.com> |
List btopp.intent.action.ACCEPT broadcast as protected Bug: 31604112 Test: manual Change-Id: Ic5ee837bb895fc5b39b6d1abdd91d8f1d33f62ae
/frameworks/base/core/res/AndroidManifest.xml
|
707b68c426e9fa191febd91dfd14f9af6857028b |
|
29-Jun-2016 |
Ajay Panicker <apanicke@google.com> |
Protect REFRESH_BATCHED_SCAN broadcast Bug: 29754520 Test: cherry-pick from internal tree Change-Id: Id3f43d36db2c5f026a5d3a94e7370051d2e23e37 (cherry picked from commit 58dd0cd65e7ac9ca0c9ccbf42087baf2df751c61)
/frameworks/base/core/res/AndroidManifest.xml
|
92b83c6495abb3c091474b3a2f16dcbd949d6da7 |
|
31-Aug-2016 |
Robin Lee <rgl@google.com> |
Redact work notifications separately from personal This will strictly decrease the set of cases where work notifications can be shown. They will continue to honour the parent profile's settings, but will also get redacted/hidden if the work profile has stricter settings than the parent or when the parent is unlocked but the profile is still locked. Bug: 31001762 Change-Id: I2152631dbb8beb7a9899d6406b05f4447d757010
/frameworks/base/core/res/AndroidManifest.xml
|
d280641d2ecbfa02e1abd18a3bf3b2050c35ba09 |
|
01-Sep-2016 |
Sudheer Shanka <sudheersai@google.com> |
Allow apps with CREATE_USERS permission to create demo users. am: 234d1afd79 am: 0be41fc1a9 am: ad520f877f Change-Id: I7e7f759995e06cae7b8f6a0ba636f31f48b1f5ff
|
ad520f877f8b57b83a21fb71c244e73eb95b2267 |
|
30-Aug-2016 |
Sudheer Shanka <sudheersai@google.com> |
Allow apps with CREATE_USERS permission to create demo users. am: 234d1afd79 am: 0be41fc1a9 Change-Id: I9da0eedb106d61c7041df78d0b287e6f28fe3069
|
722de5f9d0bbac21fb0d132669fcc317e2c6703f |
|
30-Aug-2016 |
Mitchell Wills <mwills@google.com> |
DO NOT MERGE Manually merge commit 'f28778064383821ccf48c9570191f34a24aa513f' into nyc-mr1-dev-plus-aosp Change-Id: I7cb1f97a5b931c2057a811d7947f47ad7320ef1c
|
234d1afd7913bebd936c33eba93041aebfd8ac70 |
|
27-Aug-2016 |
Sudheer Shanka <sudheersai@google.com> |
Allow apps with CREATE_USERS permission to create demo users. Bug: 31092477 Test: adb shell am create-user --ephemeral --demo <user-name> Change-Id: Ia08a50ec4371466c62cdc9f5391e298a666b5081
/frameworks/base/core/res/AndroidManifest.xml
|
5f47bf21990ffa92747d7a012d9ec9034b813f28 |
|
23-Mar-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Add master switch to enable/disable usage of NAN APIs. Add master switch to enable/disable usage of NAN. Tie into Wi-Fi state machine (to enable/disable based on Wi-Fi enable/disable). Dispatch broadcasts when NAN status changes. Bug: 27698011 Change-Id: Iea36388443ff8d0dc26a280220022c6bdba6a0c8 (cherry picked from commit d3137af10291ff888125de747d9ee05f73f3fd8e)
/frameworks/base/core/res/AndroidManifest.xml
|
d15aa5dd01253e1a9badd78a691ef29a11235299 |
|
25-Aug-2016 |
Chad Brubaker <cbrubaker@google.com> |
Merge "Add ConfigUpdater service for CT logs"
|
890a210e41d6a77a87370e6782c2ee373fa857d1 |
|
24-Aug-2016 |
Svet Ganov <svetoslavganov@google.com> |
resolve merge conflicts of eeeebd3 to master Change-Id: I3aa0d1b9228be408837f7dd93a9b8268e564fc65
|
eeeebd346a06cc1af2366b933355ac49717136fa |
|
24-Aug-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Only sync adapters with access can see an account - framework am: 5cb2973495 am: 721402e75a Change-Id: I361b009afa6c6e658157e6e04bf88096e8331fd0
|
5cb2973495084f8ce3433b579e4b4962ed9d7efc |
|
12-Jul-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Only sync adapters with access can see an account - framework It was possible for a sync adapter without accounts access to see the account which it is supposed to sync which can be used to identify the user. This change ensures that only sync adapters with account access can run (which results in seeing the account), otherwise we involve the user to approve access only to this account. A sync adapter can access an account if one of these is true: - it is signed as the authenticator for this account - has the GET_ACCOUNTS permission - has an auth token for the account - it is a preinstalled app (system or privileged) The main thing we need to figure out is if the extra prompts for giving access to a sync adapter to the account create too much friction. bug:28163381 Change-Id: Ie083bb681b5a2aed81ca5f6a062193a175fad77e
/frameworks/base/core/res/AndroidManifest.xml
|
7689446208ae41ecf54431778647fdc83ee16fca |
|
10-Aug-2016 |
Chad Brubaker <cbrubaker@google.com> |
Add ConfigUpdater service for CT logs The service extracts the logs from the json log list format and creates a lookup directory based on conscrypt's CTLogStoreImpl's lookup. Since we don't have renameat2 yet (3.15 kernels) in order to support atomic swapping of the log directories on updates a symlink is used to point to the current directory and then that symlink is atomically replaced with a symlink pointing to the new directory. Bug: 28746284 Test: running ConfigUpdater/scripts/test_install.sh with various ctlog files Change-Id: I39372aea83aff6d4a72e517eaae7a7c6eac89c57
/frameworks/base/core/res/AndroidManifest.xml
|
4d657f1e67aa81923e0eb8f73d1c44c0ec175bb8 |
|
19-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Protect various Bluetooth broadcasts" am: 53ff75bb68 am: 779a1f096c am: 2bad652e56 am: 6c1035e0c5 Change-Id: I457daf895af6b23a4715f69e95d6f08b337b0b77
|
6c1035e0c59326f59b3d3d45feb4fc5f56de1b0a |
|
19-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Protect various Bluetooth broadcasts" am: 53ff75bb68 am: 779a1f096c am: 2bad652e56 Change-Id: I342864675beb5083d67c3d74993995936a9af326
|
779a1f096cfe81db421ffd88e2e1fda056462157 |
|
19-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "Protect various Bluetooth broadcasts" am: 53ff75bb68 Change-Id: Id4f77ea2092f9a04397fe596ed92f2f30a3235df
|
1f5b786ad01b5a5f56427b2f4036e27e40869d36 |
|
18-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Protect various Bluetooth broadcasts Bug: 30832954 Change-Id: I37e0b2ffab65c0703244917a4ade9bb8afbb5e6f (cherry picked from commit 9a236066dbf604edfd5f873b4a3b94a200efd628)
/frameworks/base/core/res/AndroidManifest.xml
|
784651fbaa55a5e4313659677066a42107e0cd97 |
|
18-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Protect various Bluetooth broadcasts am: 9a236066db am: 003342e425 am: 90af842f31 Change-Id: I1e1f501ad99f0b8d71bcacb0f22c64a56aaf669e
|
9a236066dbf604edfd5f873b4a3b94a200efd628 |
|
18-Aug-2016 |
Ajay Panicker <apanicke@google.com> |
Protect various Bluetooth broadcasts Bug: 30832954 Change-Id: I37e0b2ffab65c0703244917a4ade9bb8afbb5e6f
/frameworks/base/core/res/AndroidManifest.xml
|
b8a98923446c96880daf2bb904d208c6d67471c8 |
|
26-Jul-2016 |
Hugo Benichi <hugobenichi@google.com> |
resolve merge conflicts of 514da60 to nyc-mr1-dev-plus-aosp am: 524b2e4f30 Change-Id: Ia0a4544784592ac857e5bd652fee47eec621f3a0
|
514da60fb6227de9700e145f03614c2081e8e5a5 |
|
19-Jul-2016 |
Hugo Benichi <hugobenichi@google.com> |
Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission This patch creates a new permission used by ConnectivityService to give access to restricted networks without the NET_CAPABILITY_NOT_RESTRICTED capability bit on. Bug: 24497316 Change-Id: I5b6c8a9ef14395b2f1ab26cb17b24d7876ec79f1
/frameworks/base/core/res/AndroidManifest.xml
|
4ed4b434b69ce249fea7c20c07545d43665d58bd |
|
22-Jul-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Track KEY_PERMISSION_CHANGED rename to KEY_ACCESS_CHANGED"
|
d3ee847b442a4bbf66690b32806ee837eb894a32 |
|
22-Jul-2016 |
Robin Lee <rgl@google.com> |
Track KEY_PERMISSION_CHANGED rename to KEY_ACCESS_CHANGED Bug: 30298085 Change-Id: I290a7f9c23827f5c9adb55429bd6680a7b751393
/frameworks/base/core/res/AndroidManifest.xml
|
bc702e5d421b52689320a5880dba6de10c1563f3 |
|
20-Jul-2016 |
Michael Wright <michaelwr@google.com> |
Merge commit \'f8bc27d9683e4089cdfd778dcb61ae67f44665b7\' into manual_merge_f8bc27d am: 49bcc5dd80 Change-Id: Iee2a7015eefd6a75be2968ec855334f68ec5f79e
|
1c9977b762b4bac46b4470f04c898bfd17da5d90 |
|
12-Jul-2016 |
Michael Wright <michaelwr@google.com> |
Rename color transform to color mode and persist the value. Also, standardize on a set of possible modes for the displays to enter and separate the configuration of the color mode from the configuration of the display mode. Bug: 29044347 Change-Id: I6af0a7d1f11bc72d4cefc380f115c1fb00788864
/frameworks/base/core/res/AndroidManifest.xml
|
d36651717e591ed687f4964d13656c0a52390dba |
|
16-Jul-2016 |
Makoto Onuki <omakoto@google.com> |
Merge \\"Cache the default launcher.\\" into nyc-mr1-dev am: cf99263662 am: 6406be311c Change-Id: If7d3f5325388242a196d78f8429c4aba65ef041e
|
1030520822c42cc7357b463d301c7e97e928ba22 |
|
15-Jul-2016 |
Makoto Onuki <omakoto@google.com> |
Cache the default launcher. Originally we always checked with PM for the default launcher, which would take ~2ms. Now we cache the result, and clears the cache when (any) preferred activities change. Bug 30126557 Change-Id: Iceef288cd372c8bb9b119aa493e5173d894f2302
/frameworks/base/core/res/AndroidManifest.xml
|
8a6b090fd49789a63775f52dc4966a82bae76747 |
|
08-Jul-2016 |
Suprabh Shukla <suprabh@google.com> |
Merge \\"Making timeouts configurable through Settings\\" into nyc-mr1-dev am: 33fa5dfa1d am: 087d33febf Change-Id: If1bb99b356d4b6fdf3471e1ccccc2c6ebf8ace43
|
dbbc7af06363435492410227c3c2b703ebda80e4 |
|
07-Jul-2016 |
Suprabh Shukla <suprabh@google.com> |
Making timeouts configurable through Settings Adding a global setting for timeouts used in retail demo mode. Also renaming the protected intent ACTION_RESET_DEMO to reflect proper owner package. Bug: 29917613 Change-Id: I9a174503626ab28cceb5024a8e63d27612439b92
/frameworks/base/core/res/AndroidManifest.xml
|
6d4f195f1ab24942e9a56e37b05e5c80500b3ba4 |
|
30-Jun-2016 |
Chad Brubaker <cbrubaker@google.com> |
Merge changes from topics 'handle-storage-update', 'action-storage-changed' * changes: Update trusted certificates when the trust store is changed Deprecate ACTION_STORAGE_CHANGED
|
4de59ef3238c4bf4b8c994b83be2c703ffad2a5b |
|
02-May-2016 |
Chad Brubaker <cbrubaker@google.com> |
Deprecate ACTION_STORAGE_CHANGED ACTION_STORAGE_CHANGED is too noisy and fires on too many events. It has been split into ACTION_KEYCHAIN_CHANGED for addition/modification/removal of user certificates and keys, ACTION_TRUST_STORE_CHANGED for changes the the user added and system CA stores on the device and ACTION_KEY_ACCESS_CHANGED for changes to key grants. ACTION_STORAGE_CHANGED will only be sent to applications targeting N and below. Applications targeting future releases should use the new broadcasts. Bug:28450538 Change-Id: I34ff838e9858db65f7308ca2b0f7d652c48fae17
/frameworks/base/core/res/AndroidManifest.xml
|
d9feb6cc54d7756ceac312d4d1a154b76e93340d |
|
29-Jun-2016 |
Ajay Panicker <apanicke@google.com> |
Protect REFRESH_BATCHED_SCAN broadcast am: 58dd0cd65e am: 925464f986 Change-Id: I4e92385b88d143016cd9b9d9b1243b3fc1367cd1
|
58dd0cd65e7ac9ca0c9ccbf42087baf2df751c61 |
|
29-Jun-2016 |
Ajay Panicker <apanicke@google.com> |
Protect REFRESH_BATCHED_SCAN broadcast Bug: 29754520 Change-Id: Id3f43d36db2c5f026a5d3a94e7370051d2e23e37
/frameworks/base/core/res/AndroidManifest.xml
|
bb6e9810271ebf6a96735d52ca443fd818e05571 |
|
16-Jun-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Merge \\"Move IMS-related protected broadcasts to packages/services/Telephony\\" into nyc-mr1-dev am: 9b464f651b am: 960187cfd7 Change-Id: Ie13deb46a8ee9201087a00fc9318cfa9462dcd98
|
022b6fe928f51133166f09578335d7dcb7895d30 |
|
15-Jun-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Move IMS-related protected broadcasts to packages/services/Telephony Bug: 29228175 Change-Id: I03bf54dde0ae1a40eda7fde655124a1d2a901442
/frameworks/base/core/res/AndroidManifest.xml
|
84d2c0de2ec7ccc9fbbcf8e3357b0ac1eb5f9f56 |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
resolve merge conflicts of 6f1ed20 to nyc-mr1-dev Change-Id: I9fe1e50f99382cbd8cd90f77ef99d081b472bb81
|
d9250075fcea59ebbfd3563440713bc461a555de |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
resolve merge conflicts of 8513817 to nyc-mr1-dev-plus-aosp am: 66d2b4175c Change-Id: I8297caccca3704e683cf5f9577d029a692df97ea
|
66d2b4175ca87582c3effc6a9ac01cae368e2ace |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
resolve merge conflicts of 8513817 to nyc-mr1-dev-plus-aosp Change-Id: I1b3fbe77722b34ca754667ba3e9b9c3753002c29
|
6f1ed200b3aa01af88eb309a55a428ceac56a9a2 |
|
13-Jun-2016 |
Ricky Wai <rickywai@google.com> |
Merge "Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked" into nyc-dev
|
2f04769131e2011dc5bcb0ab20bf67be4125901b |
|
10-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge \\\"Reduce shell power over user management.\\\" into nyc-dev am: 1b4124fc95 am: 0979d718c5 am: c1befac360 Change-Id: Ia608e9ce2a2c842971c5424fea8823069a5f6449
|
c1befac3604c2730e5bf0fde38bc447ce96b86dd |
|
10-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge \\"Reduce shell power over user management.\\" into nyc-dev am: 1b4124fc95 am: 0979d718c5 Change-Id: I63bb1c87e01b3536096a508046dba9de8b88bb59
|
a2ef5c89c0945960510716eebe7965002d535789 |
|
10-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge \"Reduce shell power over user management.\" into nyc-dev am: 1b4124fc95 Change-Id: Ia54f3ad9a8594e101407db6b52b378ae8bec72a2
|
1b4124fc954db07064e80d3e25c3549507c255ca |
|
10-Jun-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Reduce shell power over user management." into nyc-dev
|
f5cea03eb036c05cacc711ff90c97a48ffb2bc17 |
|
09-Jun-2016 |
Sudheer Shanka <sudheersai@google.com> |
Reduce shell power over user management. Remove MANAGE_USERS permission from shell and whitelist it for some specific functionality. Bug: 29189712 Change-Id: Ifb37448c091af91991964511e3efb1bb4dea1ff3
/frameworks/base/core/res/AndroidManifest.xml
|
cd32a04f662525bca6c6823f90de9c5f1843a082 |
|
10-Jun-2016 |
Svet Ganov <svetoslavganov@google.com> |
Merge \\\"Protect the android.intent.action.CALL_PRIVILEGED broadcast\\\" into nyc-dev am: c94872e940 am: 08504b5e0d am: 22b24425a6 Change-Id: I81be49b8396538273d1254fe14065625ece31160
|
86d71144d4b36e390a3634e8f365ebed574cb83a |
|
10-Jun-2016 |
Stuart Scott <stuartscott@google.com> |
Merge \\"Add UCE Service Down protected broadcast\\" into nyc-mr1-dev am: 3e03d02f76 am: 5cdb347384 Change-Id: I9b2365f99397d5312a8012c9c394919f76f3fcd5
|
08504b5e0dd4ee87cc47d8a977d47466923bfc4b |
|
10-Jun-2016 |
Svet Ganov <svetoslavganov@google.com> |
Merge \"Protect the android.intent.action.CALL_PRIVILEGED broadcast\" into nyc-dev am: c94872e940 Change-Id: I722d5bfbed781c28db5da59f303c2579123d8e6e
|
c94872e9403ba4b6e8d374c29f42aeefed610bb0 |
|
10-Jun-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Protect the android.intent.action.CALL_PRIVILEGED broadcast" into nyc-dev
|
aa587546ec8f9a3c1425106e83ece86e8437369f |
|
09-Jun-2016 |
Stuart Scott <stuartscott@google.com> |
Add UCE Service Down protected broadcast bug:29173516 Change-Id: I1c5743962dbca9c482ce7d87f6fe570a3249f3fe
/frameworks/base/core/res/AndroidManifest.xml
|
b1dd80bcfe8d495478d185a5d88fc2cb981e9c47 |
|
07-Jun-2016 |
Ricky Wai <rickywai@google.com> |
Disable quiet mode after UserManager.trySetQuietModeDisabled() is unlocked Bug: 29150970 Change-Id: Ie04cec116564147272896e4a5ca076bbc08e60b1
/frameworks/base/core/res/AndroidManifest.xml
|
c69266dec6556c5f82d74819251130b2ca820cec |
|
09-Jun-2016 |
Svet Ganov <svetoslavganov@google.com> |
Protect the android.intent.action.CALL_PRIVILEGED broadcast bug:29178416 Change-Id: I5e8f1e5423d0dd59cc532a45142b2401f5e5a45b
/frameworks/base/core/res/AndroidManifest.xml
|
9f62bf93709e5f35429e3d1cedb3f99428f3542a |
|
08-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
resolve merge conflicts of c33507d to nyc-mr1-dev-plus-aosp am: b8ab1d3b12 Change-Id: I9f4879ae27560ade8fa4e6124908c3dced68feb1
|
b8ab1d3b12efd3a1475263ff105137bc63f6fc50 |
|
08-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
resolve merge conflicts of c33507d to nyc-mr1-dev-plus-aosp Change-Id: Id4b3de71842eedd49684b367ed993f44f2f91970
|
211b5b10f6baddc290f7f65c0ac70eed3b9913c8 |
|
08-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
resolve merge conflicts of 718f321 to nyc-mr1-dev Change-Id: I0021aa5be1822082d8ff026cafa8c8b6b56b90b5
|
d2b21047c8c133d99cbd4821a5dc88f60d933445 |
|
03-Jun-2016 |
Amith Yamasani <yamasani@google.com> |
Add a separate read permission for oem unlock state New privileged permission READ_OEM_UNLOCK_STATE added for system privileged apps. Changing the unlock state still requires the old permission OEM_UNLOCK_STATE, which is signature protected. Bug: 28953956 Change-Id: Iedd2ad1d2d1dc3ae91122d7c406e3ee623a47d61
/frameworks/base/core/res/AndroidManifest.xml
|
d97d8cc0ca3a9c62e89c1eb4590e8373277fb8c0 |
|
28-May-2016 |
Suprabh Shukla <suprabh@google.com> |
Merge "Adding Reset Demo Notification" into nyc-mr1-dev am: 1b9f13d7bc am: 6e215f895b * commit '6e215f895beb16e822d689f179a7458611d6395a': Adding Reset Demo Notification Change-Id: I18fae0829c3b3c83025e95a73d6e4cabdda1ad71
|
4ec430e0623e808c3a0feb1602d48c2894b130f9 |
|
27-May-2016 |
Suprabh Shukla <suprabh@google.com> |
Adding Reset Demo Notification RetailDemoMOdeService adds a notification which allows user to wipe current session and start a fresh demo session. Bug: 27280140 Change-Id: I59dd82d236287206a2ca747210b3423fdc62c185
/frameworks/base/core/res/AndroidManifest.xml
|
ea833e898e6598be75d2b8bae0a368b69301235f |
|
25-May-2016 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #28931042: wtf in system server" into nyc-dev am: 7a1aa92610 am: 9bebd9edb0 am: caf8c3c160 * commit 'caf8c3c160952aff4b4197c1e0282489583a942d': Fix issue #28931042: wtf in system server Change-Id: I86bf73a1294ccf4ef7ef63188e72942b17e61b0c
|
a8e6f875bc07dc12d3c8284cef5b5d83d93ff743 |
|
24-May-2016 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #28931042: wtf in system server More broadcasts (from telephony) that should be protected. Also put a little more information in the wtf message to help determine where broadcasts from out of the system process are coming from. Change-Id: Ie3df25c883482ca54c7a7c5db57ca609950f5cbc
/frameworks/base/core/res/AndroidManifest.xml
|
99e4de3194a98ed66ce85f301e990e744a276f2e |
|
10-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Merge "Update docs for DELETE_PACKAGES permission." into nyc-dev am: 0e351a945b am: ca8ecc0be1" into nyc-mr1-dev-plus-aosp am: b73a4a6678 * commit 'b73a4a6678aa508f1ddfa3260af5a7cbf52ac7cb': Update docs for DELETE_PACKAGES permission. Change-Id: I511f13b5258f23a56bd1f30ce14a98b1e65572b8
|
0e351a945b55e106d26b1d32659358617eff0be5 |
|
10-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Merge "Update docs for DELETE_PACKAGES permission." into nyc-dev
|
eaa6c6b540431ba17f887d456cc1721ccf30c855 |
|
05-May-2016 |
Sudheer Shanka <sudheersai@google.com> |
Update docs for DELETE_PACKAGES permission. Bug: 28302564 Change-Id: I283b8a5490a189fc90f64aec3278b87a430c2623
/frameworks/base/core/res/AndroidManifest.xml
|
04a7cfcf7378e91060a403e4d99590396aff16a6 |
|
07-May-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "List the CONNECTION_STATE_CHANGED broadcast for MAP as protected"
|
d74587fb4ca76e5a39824034566c57ccbd6e4b0b |
|
06-May-2016 |
Christopher Tate <ctate@google.com> |
Merge "Move the \'pretend idle jobs can run now\' broadcast into AMS" into nyc-dev am: 0588954071 am: 2591ee2b0b am: ad2b44c8c7 * commit 'ad2b44c8c7907a971e7437c5ccd0f823caec53fd': Move the 'pretend idle jobs can run now' broadcast into AMS Change-Id: I50b6ca257b7995d6a50fe938f8d4c788f739001a
|
27d92e4e397728d56f4f951dd4ce99668c7c447b |
|
06-May-2016 |
Christopher Tate <ctate@google.com> |
Move the 'pretend idle jobs can run now' broadcast into AMS It's a protected broadcast, so sending it directly from 'am' is no longer an option. This is needed for CTS as well as being generally useful during app development. Bug 28406044 Change-Id: I101915a8c6f19454330a8db2079a75023c112582
/frameworks/base/core/res/AndroidManifest.xml
|
852aa88d6bac955c9889c90808dbefb930a0030c |
|
06-May-2016 |
Ajay Panicker <apanicke@google.com> |
Protect TRANSFER_COMPLETE broadcast am: 2759e429d1 am: 71430fefe8 am: 2e2a044ea2 * commit '2e2a044ea27bc70180220f75deceab18fd595c44': Protect TRANSFER_COMPLETE broadcast Change-Id: If024a1017cffd71a569751746d27fa3cdd242bd7
|
2759e429d1f5e18869de34e5f0e13257c269aff9 |
|
06-May-2016 |
Ajay Panicker <apanicke@google.com> |
Protect TRANSFER_COMPLETE broadcast Bug: 28621801 Change-Id: Ia90abd00694ae80000f59ee0a17826592fd2159b
/frameworks/base/core/res/AndroidManifest.xml
|
dde98961bb96e672a2e4af422d261c2eda84b0ac |
|
06-May-2016 |
Ajay Panicker <apanicke@google.com> |
Protect TRANSFER_COMPLETE broadcast Bug: 28621801 Change-Id: Ia90abd00694ae80000f59ee0a17826592fd2159b
/frameworks/base/core/res/AndroidManifest.xml
|
33d1dd637006c6ab9391c81bb8c66f3ddfac6368 |
|
05-May-2016 |
Adam Powell <adamp@google.com> |
Merge "Have the Resolver/Chooser activities handle resize config changes" into nyc-dev am: a75d4877af am: da00132d47 am: c86ba5580d * commit 'c86ba5580da11f83e976224eff7ea577a829c749': Have the Resolver/Chooser activities handle resize config changes Change-Id: Icfa8381fa99cc8a2697ce2605d6e0194a372dfef
|
a75d4877af7fa045cc91b2d60d3801aa098608de |
|
05-May-2016 |
Adam Powell <adamp@google.com> |
Merge "Have the Resolver/Chooser activities handle resize config changes" into nyc-dev
|
46ef0579dddd6480306fa58553a6e3180aedf9c7 |
|
05-May-2016 |
Adam Powell <adamp@google.com> |
Have the Resolver/Chooser activities handle resize config changes Both of these activities do additional work and look janky when rebuilding for a config change, especially in the presence of multiwindow. As neither of them use layouts or other resources that vary based on configuration, mark them as handling the relevant config changes. Bug 27171954 Change-Id: I38df1d875bcb063d72316b586c4d3f8074c4fad9
/frameworks/base/core/res/AndroidManifest.xml
|
2c14a5886a0ded32b1a313c8e442c55b0cc97eb6 |
|
05-May-2016 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Marking @SystemApi permissions @hide too." into nyc-dev am: 441da79d8a am: 8f04f5f3ba am: 075ceeda01 * commit '075ceeda01dd9890d7464492a291a94113a19e11': Marking @SystemApi permissions @hide too. Change-Id: Ic8da194de3b1a405ed72a9c04e44a04f79e66eba
|
441da79d8aa7b873f23227d10ecd425671b85506 |
|
04-May-2016 |
TreeHugger Robot <treehugger-gerrit@google.com> |
Merge "Marking @SystemApi permissions @hide too." into nyc-dev
|
491354e52da87cabc0dce17283030bf4500ae717 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "List the CONNECTION_STATE_CHANGED broadcast for MAP as protected" into nyc-dev am: 95aa2fc323 am: 0a20048742 am: 1b0d5d3414 * commit '1b0d5d3414dfb0e881af0d374da80965a2cf95c6': List the CONNECTION_STATE_CHANGED broadcast for MAP as protected Change-Id: I96c9d28211ee4657ceb1928c182a9153ac18613f
|
2f78bf96d20d81843a1b6013ee4d18e5ce58a206 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
List the CONNECTION_STATE_CHANGED broadcast for MAP as protected Bug: 28527879 Change-Id: Ifb2db87677e92022814bb9704c26009d249ac6ce
/frameworks/base/core/res/AndroidManifest.xml
|
8a9d642546f0eeaff93bf831e2494defac59a0c1 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
List the CONNECTION_STATE_CHANGED broadcast for MAP as protected Bug: 28527879 Change-Id: Ifb2db87677e92022814bb9704c26009d249ac6ce
/frameworks/base/core/res/AndroidManifest.xml
|
78e1e7c2d962cebd79feab80dfaa6d8b3fa57a86 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "List the SDP_RECORD broadcast as protected" am: 0d14c01a3e am: 60b2f80841 am: 951369f52c am: 27f27eae82 * commit '27f27eae823885b2d33bafd20c62036e914f2b2c': List the SDP_RECORD broadcast as protected Change-Id: I6d1616c64b1d27c91e149702bf2527f47340d553
|
951369f52c28b97592214ad094df54b99bc71e31 |
|
03-May-2016 |
Ajay Panicker <apanicke@google.com> |
Merge "List the SDP_RECORD broadcast as protected" am: 0d14c01a3e am: 60b2f80841 * commit '60b2f80841270da056feb44416b3be66273c54ac': List the SDP_RECORD broadcast as protected Change-Id: Ib91da1d39bac4b23804c0a74f94b43e138d5f749
|
65fad18461b64ac35bf65e463e7f792c6df72add |
|
19-Apr-2016 |
Ajay Panicker <apanicke@google.com> |
List the SDP_RECORD broadcast as protected Bug: 28257589 Change-Id: I97ef91fa3a7f7ef62fd96ca079e0a6d5a957bc71
/frameworks/base/core/res/AndroidManifest.xml
|
d1bc17aacd2fcf45a67cf35adf78eca5c2bd708e |
|
03-May-2016 |
Makoto Onuki <omakoto@google.com> |
Merge "Merge "ShortcutManager: finishing touches" into nyc-dev am: 7d164d35a4" into nyc-mr1-dev am: 59cfcb502d am: 2c0af8597d * commit '2c0af8597dd3edb155893453dbb03027dc95135e': ShortcutManager: finishing touches Change-Id: Id54d01e50b8120b898263a674b1886e2f5c16ac4
|
4f86d76cf4c896d91a189f3c49b84e49cabb9b7b |
|
19-Apr-2016 |
Ajay Panicker <apanicke@google.com> |
List the SDP_RECORD broadcast as protected Bug: 28257589 Change-Id: I97ef91fa3a7f7ef62fd96ca079e0a6d5a957bc71
/frameworks/base/core/res/AndroidManifest.xml
|
a895559a41930b6665d8e3056b463633f3096fbc |
|
02-May-2016 |
Amit Mahajan <amitmahajan@google.com> |
Marking @SystemApi permissions @hide too. Bug: 28287631 Change-Id: Ie0375620689263ebafd6850f2261e090f09521b1
/frameworks/base/core/res/AndroidManifest.xml
|
4d36b3a8c5ba1289d851ef337e46709bba333100 |
|
27-Apr-2016 |
Makoto Onuki <omakoto@google.com> |
ShortcutManager: finishing touches - Change back the throttling quota to 10 calls / day - Foreground apps are no longer throttled, and when an app comes to foreground the call counter will be reset. - When the system locale changes, reset throttling for all packages for all users. See LocalService.onSystemLocaleChangedNoLock() for how it's performed. Because the reset must happen before any other apps have a chance to publish shortcuts, the logic is not straightforward. - Added an internal API to reset the throttling upon inline-reply from a notification. - Stop supporting icons from "content:" URIs - Improved javadoc on several APIs. Also internal refactor needed to this: - ShortcutUser.getAllPackages()/getAllLaunchers() are no longer accessible to outer code to prevent accidentally adding/removing the content. Outer code should use forAllPackages() / forAllLaunchers(). Bug 27923857 Change-Id: I002511193d1d33718163bb1dabe77610bde58198
/frameworks/base/core/res/AndroidManifest.xml
|
bbd031f01380d003437473b40d967fb0998cb775 |
|
25-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Add back protected profile availibility broadcasts." into nyc-dev am: cda5089 am: f8a52ef am: 4038a3a * commit '4038a3a8a957db4d41eabfd4d3a49658790a72c8': Add back protected profile availibility broadcasts. Change-Id: Ib3da0c9dee84b400343086949e086040e98ca0af
|
dae6beda7b9037234e24a1986b4a69db52a7a31c |
|
25-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Add back protected profile availibility broadcasts. Bug: 27532254 Change-Id: Ifbf59f64358864cd1d48be5e797c45ec2744eac0
/frameworks/base/core/res/AndroidManifest.xml
|
e1d55b2779a47764a410ee1d300ee2a8c5374964 |
|
23-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Rename GET_PASSWORD_PRIVILEGED and make it signature." into nyc-dev am: ffcba67 am: 2ab3256 am: b255a2a * commit 'b255a2afb4d3aae35c87d9f6f719bd4f188279da': Rename GET_PASSWORD_PRIVILEGED and make it signature. Change-Id: Id9e1329e3356a1360be4a13b7dae9930f52c36f4
|
ffcba67bf9d25d9b8131f0aab9d5c8a4df492b69 |
|
23-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Rename GET_PASSWORD_PRIVILEGED and make it signature." into nyc-dev
|
879f5ba3f7eecda7c204751efc3fbfa58e7001ae |
|
23-Apr-2016 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Cleanup of the PackageInstaller API - Frameworks" into nyc-dev am: c947ebd am: 70d720c am: 13da561 * commit '13da5613e2fce0ca2d5682fd202234856d2206e9': Cleanup of the PackageInstaller API - Frameworks Change-Id: Ibe4a6258c6437a9e86ed25e242301ca6d6635d26
|
714bbd8539b73f9d8cf396b6e0edd03f968ebfbd |
|
22-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Rename GET_PASSWORD_PRIVILEGED and make it signature. Now named GET_PASSWORD. Now it is just a signature, not privileged. Bug: 28295831 Change-Id: Ice93b527edced9546639b6c7096aad933c517548
/frameworks/base/core/res/AndroidManifest.xml
|
fa5a6320672e7991f7d79c5ee9b9f365641b1c67 |
|
22-Apr-2016 |
Sujith Ramakrishnan <sujithrk@google.com> |
Merge "Unbundle RemoteService on TV - part 3" into nyc-dev am: 7981e8f am: a2262b3 am: c5826ee * commit 'c5826eebc50a6ffafe8cd20633b01b6ca27e8490': Unbundle RemoteService on TV - part 3 Change-Id: If0dabbb8199132648fa9a791f46ee85e8970eb4b
|
ae0e03a9e03de34e37b768b971d7596d7220a053 |
|
26-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
Cleanup of the PackageInstaller API - Frameworks The PackageInstaller app manages side-loading apps as well as permission management. It should be updatable, hence should rely on system APIs to talk to the platform. This is the first step of defining an API boundary. Change-Id: I9814eafd0b22ae03b4b847a7007cdbf14c9e5466
/frameworks/base/core/res/AndroidManifest.xml
|
b5b86c11008422ac4bf5af5fed736f04ebbaa858 |
|
29-Jan-2016 |
Sujith Ramakrishnan <sujithrk@google.com> |
Unbundle RemoteService on TV - part 3 - New service TVRemoteService triggered by SystemServer - Provider service proxy and watcher for maintaining connections to unbundled services which have the BIND_TV_REMOTE_SERVICE permission. - Shared library to facilitate connections between unbundled service and TVRemoteService. - Unbundled service needs TV_VIRTUAL_REMOTE_CONTROLLER permission to be fully functional. b/23792608 Change-Id: Ief5c6995883d1f7268a73bdd0c920c4c3f42cddb
/frameworks/base/core/res/AndroidManifest.xml
|
7b2d5714bb0fba4f12a54a892516d34d0231a680 |
|
22-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast" into nyc-dev am: b40667eccd am: 67c7ac2890 am: dfb47299f8 * commit 'dfb47299f8dfffe4d9c8c57af2d83a64e5ed347c': Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast Change-Id: I9154ccdf9b9b7676cd880fa9d956bb246a2cac3c
|
b40667eccdd797d08560c33e696625509f90d52b |
|
22-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast" into nyc-dev
|
0392182bff9ba7888aa9cd699d2e6d3018a0d742 |
|
20-Apr-2016 |
Trevor Johns <trevorjohns@google.com> |
Merge changes from topic \'merge_docs_nyc-dev\' into nyc-dev am: 59c9a93 am: 254f1b8 am: e1b5670 * commit 'e1b56701fd219227adae615fe81f03d5db4ae433': Remove links to createAndInitializeUser() and createUser() Resolve merge conflicts of a5060ee to nyc-dev Change-Id: I8cf43f9ad491c6f23eb5fe0051293267ab2d03bf
|
59c9a93fc268e226495d4ee8cf7c507c2ea2c433 |
|
20-Apr-2016 |
Trevor Johns <trevorjohns@google.com> |
Merge changes from topic 'merge_docs_nyc-dev' into nyc-dev * changes: Remove links to createAndInitializeUser() and createUser() Resolve merge conflicts of a5060ee to nyc-dev
|
682c24e22811d4ee17ae1cd61bf255c3f7e722b7 |
|
12-Apr-2016 |
Trevor Johns <trevorjohns@google.com> |
Resolve merge conflicts of a5060ee to nyc-dev This undoes the automerger skip which occured in commit e740c84dc32180214a7fd157105d6c18d30408ee and replays it as a standard (NOT -s ours) merge. Change-Id: If5a47be26f73d6a0735c425cd66310a3e2a89086
/frameworks/base/core/res/AndroidManifest.xml
|
19c2a57c24fa337030ff31867380b685e9a5b586 |
|
15-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Remove MANAGED_PROFILE_AVAILABILITY_CHANGED broadcast Bug: 27532254 Change-Id: Iaca17355d3ec75fa09c36a5353f40d678cc2c812
/frameworks/base/core/res/AndroidManifest.xml
|
aefdfa57213397df609ca68adc906a76989ac110 |
|
14-Apr-2016 |
Daniel Sandler <dsandler@android.com> |
Merge "Allow system apps to substitute a different app name in notifications." into nyc-dev am: 3af45bd am: 73a694b * commit '73a694b486b8b37d7e61e5ad53b3c9b139b783e9': Allow system apps to substitute a different app name in notifications. Change-Id: Id47615712e65e8a11edd68dcd729824c9c37c85a
|
732bd6cb2736c9ae091f2b5b136570fc5d579224 |
|
12-Apr-2016 |
Dan Sandler <dsandler@android.com> |
Allow system apps to substitute a different app name in notifications. This is a privileged permission and is only to be used by the core OS and related packages whose names are confusing or misleading when shown in notifications. The user will always be able to see the true package name by accessing the notification inspector (longpress or swipe gesture on the notification row in SystemUI). Fixes: 26517701 Change-Id: I2b021c9da0757b99df76399666af263668d88070
/frameworks/base/core/res/AndroidManifest.xml
|
28576072291225c5fa4e84029184ef975147bcb8 |
|
12-Apr-2016 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Another protected broadcast." into nyc-dev am: a6e38e4 am: 0e33052 * commit '0e330529b2be5ece662b2e7ecd9acdf3e759d87a': Another protected broadcast. Change-Id: Iae9c6bc0d1b819ebc84140712eca5c4813e5c01c
|
e9c752aa37553cab4d27b1c63e6c58eebc87d4c0 |
|
12-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Another protected broadcast. Bug: 28133722 Change-Id: I5fe8158a3c66168e1c5482711a487eba55876b73
/frameworks/base/core/res/AndroidManifest.xml
|
d58e6cf14b671ce84dc350fdd60da8ce5070cdbd |
|
08-Apr-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Add master switch to enable/disable usage of NAN APIs. am: d3137af * commit 'd3137af10291ff888125de747d9ee05f73f3fd8e': [NAN] Add master switch to enable/disable usage of NAN APIs. Change-Id: Iea1d3cf5eca777449898c571d58db33c59ffd0c2
|
d3137af10291ff888125de747d9ee05f73f3fd8e |
|
23-Mar-2016 |
Etan Cohen <etancohen@google.com> |
[NAN] Add master switch to enable/disable usage of NAN APIs. Add master switch to enable/disable usage of NAN. Tie into Wi-Fi state machine (to enable/disable based on Wi-Fi enable/disable). Dispatch broadcasts when NAN status changes. Bug: 27698011 Change-Id: Iea36388443ff8d0dc26a280220022c6bdba6a0c8
/frameworks/base/core/res/AndroidManifest.xml
|
4a49791ef97226b08d9ce4977b5212074f8e160d |
|
06-Apr-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Merge "Add VrManager AIDL interface for use by system apps." into nyc-dev am: 50e229f am: bc783e0 * commit 'bc783e038c17524c5182ad6b5e17ba95d0e1a319': Add VrManager AIDL interface for use by system apps. Change-Id: Ie3aaad8ef509f69c643638f8974a95e1f33a7a60
|
50e229f1f45a1550ba13ec3f81e864630fc3dc1c |
|
06-Apr-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Merge "Add VrManager AIDL interface for use by system apps." into nyc-dev
|
c7be3beced4ade05466a4a77c003ea81c2429f74 |
|
02-Apr-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Add VrManager AIDL interface for use by system apps. Bug: 27884853 Change-Id: I6de0d291deafe5003070d60866c60d6599312e79
/frameworks/base/core/res/AndroidManifest.xml
|
b9511aee132764e2f8232991c238a517cf38a311 |
|
06-Apr-2016 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Protect more broadcasts." into nyc-dev am: 32fa8d1 am: 32584cb * commit '32584cbbba05992cd6831369ebfd8b71c351ec67': Protect more broadcasts. Change-Id: I818d9af58a8ac3a98ae9d81ae32103d34230b978
|
f9324a8dd9556785c6918c079b9236bc1a28e145 |
|
06-Apr-2016 |
Jeff Sharkey <jsharkey@android.com> |
Protect more broadcasts. Bug: 28001192 Change-Id: I3a3a48ccfcd75bb91431988aa3495d091d5d00f4
/frameworks/base/core/res/AndroidManifest.xml
|
284e8a441a823e08eff18934aac630f383567a6e |
|
05-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Split ACTION_MANAGED_PROFILE_AVAILABILITY_CHANGED into two." into nyc-dev am: 63d1ee4 am: 586da02 * commit '586da02e83084174519aead33c1329e76a73b479': Split ACTION_MANAGED_PROFILE_AVAILABILITY_CHANGED into two. Change-Id: I18ec427abd07e39cfdc90d31be420c988ef1ec60
|
e95057ade126e9e159fe05b69c32f85f7891490f |
|
01-Apr-2016 |
Rubin Xu <rubinxu@google.com> |
Split ACTION_MANAGED_PROFILE_AVAILABILITY_CHANGED into two. Add more comment to EXTRA_QUIET_MODE Bug: 27532254 Change-Id: I68a217561afca8b87f523c62393cdad097d5b75d
/frameworks/base/core/res/AndroidManifest.xml
|
2ad74d673274add9d697e35c605bd975175a82f5 |
|
01-Apr-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Merge "Change UCE permissions from dangerous to signatureOrSystem" into nyc-dev am: f3f7965 am: e1ffada * commit 'e1ffada2ce2af8d01f2475934893eab48974bc2e': Change UCE permissions from dangerous to signatureOrSystem Change-Id: I1744ca275b0ac090b2be2e455c7161fffabfd165
|
f3f7965eb38d05cf2f09e8b54105ac35e8855b38 |
|
01-Apr-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Merge "Change UCE permissions from dangerous to signatureOrSystem" into nyc-dev
|
d9855c797cebf279d45121e6ec52f025df4bd860 |
|
01-Apr-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Change UCE permissions from dangerous to signatureOrSystem Bug: 27812202 Change-Id: Icf9d97e4d3f802bc0b3ea26d61835e6471082118
/frameworks/base/core/res/AndroidManifest.xml
|
73fdc544a245dbe8d90aa59efb32ef2907868929 |
|
01-Apr-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "introduce GET_PASSWORD_PRIVILEDGED permission." into nyc-dev am: bb5e52f am: 5a2dccb * commit '5a2dccbc7067640de03c816676eaebb23d5e6ffd': introduce GET_PASSWORD_PRIVILEDGED permission. Change-Id: Ie371d08e1307af6f3df9260d16be99435d065fa8
|
51b651aea178fcfca8a3219141f0ecfda1504887 |
|
30-Mar-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
introduce GET_PASSWORD_PRIVILEDGED permission. That will be used to filter in passwords for Session based AccountManager flows. Bug: 27590532 Change-Id: I4a6d0540bcff186e416351a6f719600ce35d86a0
/frameworks/base/core/res/AndroidManifest.xml
|
6acf733073613423bbeb93dc9ae27338f11f1bba |
|
01-Apr-2016 |
Russell Brenner <russellbrenner@google.com> |
Merge "Add new permission for am.updateLockTaskPackages()" into nyc-dev am: f8c07d6 am: 6ba433f * commit '6ba433f5cf7aff8b2a8735af54efcf31f4378620': Add new permission for am.updateLockTaskPackages() Change-Id: I2c061a16cd360e01bf0f8f3eb3b0b22929820344
|
f8c07d68c1813c6d9a05eb05951a320ace866168 |
|
01-Apr-2016 |
Russell Brenner <russellbrenner@google.com> |
Merge "Add new permission for am.updateLockTaskPackages()" into nyc-dev
|
b3ad567624475d3ad33fa0007e5ec5967b879cec |
|
25-Mar-2016 |
Russell Brenner <russellbrenner@google.com> |
Add new permission for am.updateLockTaskPackages() Adds android.permission.UPDATE_LOCK_TASK_PACKAGES, available only to the system and setup wizard, providing access to updateLockTaskPackages() without registering with the device policy manager as a device owner. Bug: 20016740 Change-Id: I6eceb5cece9407c84eabf3a818bb908f95989b91
/frameworks/base/core/res/AndroidManifest.xml
|
ced556e7e6eaea536f2ddd8fddad9879181dca24 |
|
31-Mar-2016 |
Alan Viverette <alanv@google.com> |
Merge "Remove DayNight theme" into nyc-dev am: b4e7b54 am: 1f890d3 * commit '1f890d325399fb43c08437beddf0533618d11f87': Remove DayNight theme Change-Id: I751f5993fdfd50c53feb6c0ab76a57ddd0549b89
|
ae4908f41c6e96c973a65effe1dfbb3d0fbbeba2 |
|
31-Mar-2016 |
Alan Viverette <alanv@google.com> |
Remove DayNight theme Bug: 21854466 Change-Id: I739872112d0ae457d0d4620f9222206072d54b4b
/frameworks/base/core/res/AndroidManifest.xml
|
ddea724b36d2fc7cb5182e21ffd1f0c7a30ac34f |
|
31-Mar-2016 |
Philip P. Moltmann <moltmann@google.com> |
Merge "Add the print service recommendation service" into nyc-dev am: 740a5f0 am: fa04bc7 * commit 'fa04bc7a5d49415bc7cd397bb9678316d3824f85': Add the print service recommendation service Change-Id: I3da289dfe99e1caa3ed2ab3368902d597f16f738
|
9dcb86a48d73f399fb1b5c020005d76d350eeac2 |
|
14-Mar-2016 |
Philip P. Moltmann <moltmann@google.com> |
Add the print service recommendation service This service connects through the print manager to the print spooler: PrintSpooler.AddPrintersActivity <-> PrintManager <-> PrintManagerService <-> UserState <-> RemotePrintServiceRecommendationService <-> PrintRecommendationService <-> PrintRecommendationServiceImpl Hence there is a lot of mindless plumming. The actual changes are only in the AddPrintersActivity which is extended to show another list of services: The recommended services. The PrintServiceRecommendationService is based on the experimenal print service stubs provider. This provider was contributed the Android by Mopria. As this services uses Android own network discovery service most code from the experimental provider goes away. In fact the only logic left over is the selections of mdns-txt fields to look at and the printer vendor configuration. This relies on the Android MDNS to get fixed (Bug: 27696905). This also does not deal with how to update the recommendation service. Bug: 24533249 Change-Id: I6edc6e25fc08a50d478b61c71bb8ea158b08624c
/frameworks/base/core/res/AndroidManifest.xml
|
79fb81462379f015220cb9318250e896e37acd21 |
|
25-Mar-2016 |
Hall Liu <hallliu@google.com> |
Merge "Update documentation for the READ_PHONE_STATE permission" into nyc-dev am: 5feb8cb am: d4ea53f * commit 'd4ea53f90c57ffbb80e9c972c637e3053ede771c': Update documentation for the READ_PHONE_STATE permission
|
7700ee39ae624f02b03884d5caf60ad65ae4baa2 |
|
25-Mar-2016 |
Hall Liu <hallliu@google.com> |
Update documentation for the READ_PHONE_STATE permission Bug: 26413825 Change-Id: I58d21ddd6e2ad1cc724648db5839d711d96663fb
/frameworks/base/core/res/AndroidManifest.xml
|
debe553a4ef763813ff7dbedc6595327208bb6a9 |
|
22-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Make DISK_SCANNED a protected broadcast." into nyc-dev am: 030247d am: 60028a7 * commit '60028a7bda90f7fafc9000fa663b0ec5bce42eb5': Make DISK_SCANNED a protected broadcast.
|
029ae4dcbfbde25b02968538f75f5729b3fba196 |
|
22-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Make DISK_SCANNED a protected broadcast. Bug: 27763115 Change-Id: Ib8b40ff9f4c1f929ac4f07a9d5460a0a593ba080
/frameworks/base/core/res/AndroidManifest.xml
|
bb6d60a114bca7ca4f68f9c8e67862255a9caa4d |
|
19-Mar-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Merge "ims:rcs: Add UCE interface files for RCS." into nyc-dev am: eac4de2 am: b487726 * commit 'b4877263b14f34e96bcf3b4e08e52f46fbba9228': ims:rcs: Add UCE interface files for RCS.
|
7ed3044ed1c4777650d38775a5f26cb3396fab09 |
|
17-Mar-2016 |
Dheeraj Shetty <dshetty@codeaurora.org> |
ims:rcs: Add UCE interface files for RCS. [DO NOT MERGE] Change-Id: I2ce9e60240740acfe70c4a239163fbdbedbd96e0
/frameworks/base/core/res/AndroidManifest.xml
|
cfedd20d54687449bb6a6982085003cbf9a22bcb |
|
19-Mar-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
ims:rcs: Add UCE interface files for RCS. Bug: 23222011 Change-Id: I2ce9e60240740acfe70c4a239163fbdbedbd96e0
/frameworks/base/core/res/AndroidManifest.xml
|
78bcc89df493fa4cc96f893272193fd6b99cdaed |
|
17-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Refactoring FBE APIs based on council feedback." into nyc-dev am: a0a58a2 am: 5a128c4 * commit '5a128c4f33aa38d3a35b5884519f6bd3a355512d': Refactoring FBE APIs based on council feedback.
|
8a372a0a280127743ce9a7ce4b6198c7a02d2a4f |
|
16-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Refactoring FBE APIs based on council feedback. Mostly consists of removing the word "encryption" from most APIs, since we can't actually make promises about the data being encrypted. Bug: 27531029 Change-Id: Iace9d7c4e64716abf86ed11847c40f3947e1d625
/frameworks/base/core/res/AndroidManifest.xml
|
391b3f459604f438becc5e0e250fb9dbfa66d927 |
|
15-Mar-2016 |
Ian Pedowitz <ijpedowitz@google.com> |
Merge "Revert "Permissions: Get rid of GET_ACCOUNTS"" into nyc-dev am: 440ef18fe7 am: 0f0fba787c * commit '0f0fba787c69d3a53e6f40618e57d772ab317dee': Revert "Permissions: Get rid of GET_ACCOUNTS"
|
440ef18fe7dcfaff28fad0137f4abe4235381e05 |
|
15-Mar-2016 |
Ian Pedowitz <ijpedowitz@google.com> |
Merge "Revert "Permissions: Get rid of GET_ACCOUNTS"" into nyc-dev
|
358e51f3d186719a6a5b1f346f55c5426925055f |
|
15-Mar-2016 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Permissions: Get rid of GET_ACCOUNTS" This reverts commit d39600585bcb720d739ef6f0091066e3d4f77765. Bug: 27665091 Change-Id: I7d017ba7062ac594225229436d2877c7d21fb065
/frameworks/base/core/res/AndroidManifest.xml
|
ed36a0627ba1c00f551d7e218fae140f7bca142e |
|
15-Mar-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Permissions: Get rid of GET_ACCOUNTS" into nyc-dev am: 658e4c5ece am: 71dfb1654b * commit '71dfb1654bf9c4e41c0c62f89719123521956156': Permissions: Get rid of GET_ACCOUNTS
|
658e4c5eceefcb2f0d070d478fb1ab0af27a1bbe |
|
15-Mar-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Permissions: Get rid of GET_ACCOUNTS" into nyc-dev
|
75e4dd98f43ac7dfbdac793a781a14b1fdaa2f83 |
|
14-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Offer to cache ContentResolver-related Bundles." into nyc-dev am: 815c6a8716 am: 961a091bc4 * commit '961a091bc485574842453028a8482daae30e9b45': Offer to cache ContentResolver-related Bundles.
|
8731408b11a24e3a92188653548f2c90bf866a32 |
|
12-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
Offer to cache ContentResolver-related Bundles. There are a handful of core system services that collect data from third-party ContentProviders by spinning them up and then caching the results locally in memory. However, if those apps are killed due to low-memory pressure, they lose that cached data and have to collect it again from scratch. It's impossible for those apps to maintain a correct cache when not running, since they'll miss out on Uri change notifications. To work around this, this change introducing a narrowly-scoped caching mechanism that maps from Uris to Bundles. The cache is isolated per-user and per-calling-package, and internally it's optimized to keep the Uri notification flow as fast as possible. Each Bundle is invalidated whenever a notification event for a Uri key is sent, or when the package hosting the provider is changed. This change also wires up DocumentsUI to use this new mechanism, which improves cold-start performance from 3300ms to 1800ms. The more DocumentsProviders a system has, the more pronounced this benefit is. Use BOOT_COMPLETED to build the cache at boot. Add more permission docs, send a missing extra in DATA_CLEARED broadcast. Bug: 18406595 Change-Id: If3eae14bb3c69a8b83a65f530e081efc3b34d4bc
/frameworks/base/core/res/AndroidManifest.xml
|
6ffe29aa6007b0556fd8f851c015fe315add7df7 |
|
14-Mar-2016 |
Janis Danisevskis <jdanis@google.com> |
Leftovers of SELinux policy update mechanism. Remove SELinuxPolicyInstallReceiver as SELinux policies can no longer be installed at runtime. Bug: 26574861, 26544104 Change-Id: I80b4c1d37a0cbbc8fad288126e065241acd5baf4
/frameworks/base/core/res/AndroidManifest.xml
|
d39600585bcb720d739ef6f0091066e3d4f77765 |
|
11-Feb-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Get rid of GET_ACCOUNTS Second attempt. Still need to add strict mode violation checks and logging. Bug: 21901286 This reverts commit bf33bd4d31cfec895c96990525b0cb856407c8d6. Change-Id: I5d73343544c32ce4fc4c377ba44db8e677a1287d
/frameworks/base/core/res/AndroidManifest.xml
|
be3696d42552ad55ae0a41e9dd9fe81f5b17d3e7 |
|
08-Mar-2016 |
Chris Wren <cwren@android.com> |
Merge "rename the asisstant service for the ranker" into nyc-dev
|
0f90653ca1d25a92e2a5c9864c1347254fe1f65d |
|
08-Mar-2016 |
Amit Mahajan <amitmahajan@google.com> |
Merge "New permission for bypassing premium short code check." into nyc-dev
|
e24b9a6cfa4d565d7f49c9ae8f3aeca737d93312 |
|
17-Feb-2016 |
Ruben Brunk <rubenbrunk@google.com> |
Add a VR listener service. Bug: 22855417 Bug: 26724891 Bug: 27364145 - Add an API for VrListenerService, which is bound/unbound from the framework when the system VR mode changes. - Allow only a single bound VrListenerService at a time. - Monitor allowed VrListenerService implementations from VrManagerService and evict services as needed when packages, users, or settings change. - Remove previous VR functionality in NotificationListenerService. - Add component target to Activity#setVrMode to allow explicit selection of the running VrListenerService from the current VR activity. Change-Id: I776335f4441be0e793d3126f2d16faf86a8c621a
/frameworks/base/core/res/AndroidManifest.xml
|
e5cd9fa4398c2059dc635da5ffd9b9cee28f605b |
|
12-Feb-2016 |
Amit Mahajan <amitmahajan@google.com> |
New permission for bypassing premium short code check. Bug: 18326557 Change-Id: I1b05f73103183b851bbef1280d0785ce0a48159a
/frameworks/base/core/res/AndroidManifest.xml
|
e0ba7eb365ac19fdc11c3f820349f0352761b9f4 |
|
04-Mar-2016 |
Chris Wren <cwren@android.com> |
rename the asisstant service for the ranker Bug: 22960980 Change-Id: Ibe57933303a488b01c43a7621a488d425d6f707d
/frameworks/base/core/res/AndroidManifest.xml
|
925cc2a066889bb8b02493fafd5344bf8b2e9136 |
|
03-Mar-2016 |
Jeff Sharkey <jsharkey@android.com> |
More protected broadcasts! Bug: 26144973 Change-Id: I56f047d7e4b9d7bcf1ac40c98ee381badd909057
/frameworks/base/core/res/AndroidManifest.xml
|
e5ad41bc022db99c4f6663da0a9e49356c006741 |
|
01-Mar-2016 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #27317952: PendingIntent.getIntent() should be protected Change-Id: Ib05135cd94f5251942a6fc6df542ed39083f7827
/frameworks/base/core/res/AndroidManifest.xml
|
bdb14a30d0ae0bd8fdaebf76b80f1ca92c42b8a6 |
|
26-Feb-2016 |
Makoto Onuki <omakoto@google.com> |
Remove READ_WRITE_CONTACT_METADATA, which is no longer used Bug 27365657 Change-Id: Iaf1b62991bbb0ccce9488e4e50bc49a12663a2d0
/frameworks/base/core/res/AndroidManifest.xml
|
5cd52bee32250e14f5eca14d9e82535a0f2f4f87 |
|
23-Feb-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Expose removed permissions flag as system API" into nyc-dev
|
2a1376d9dfb362a18ba110d8e172f96021f1d879 |
|
23-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
Expose removed permissions flag as system API There are some permissions that were removed from the platform and guard nothing but legacy apps may be checking them before calling APIs. Hence, these apps should get the permissions as expected despite them being a no-op. To address this the platform declares removed permissions as normal permissions that are hidden such that legacy apps can always get them. These permissions are not shown in the UI. Play needs a way to filter out these permissions like the platform as they have permissions UI too. bug:23361760 Change-Id: I10f442dfc09a299ddc5480d8bf2db0bd786aec62
/frameworks/base/core/res/AndroidManifest.xml
|
66d7588078fbdbdadf646577dce6b3821976d25c |
|
22-Feb-2016 |
Felipe Leme <felipeal@google.com> |
Removed bugreport intents from protected list. These intents are send by Shell, which is not a protected uid, and already required the android.permission.DUMP permission, hence they are protected by permission. BUG: 27287868 Change-Id: Ie7cfe20a119e8abe989186ca2e0ae16454b4cf22
/frameworks/base/core/res/AndroidManifest.xml
|
9cea80cdddbecadb304eb7c8373cf1ed397f433a |
|
16-Feb-2016 |
Svet Ganov <svetoslavganov@google.com> |
No overlay when permissions shown - framework bug:26973205 Change-Id: I88395e47649191bb7db6dd8723c49e741ef4f1e4
/frameworks/base/core/res/AndroidManifest.xml
|
5dbd4aad809e6fec51df62280bcc1bfe05cc7df5 |
|
07-Feb-2016 |
Jason Monk <jmonk@google.com> |
SysUI Tuner: Night mode v3 TwilightService: - Add support for locking on/off twilight globally - Change twilight state to have float amount rather than having clients calculate it using the sunrise/set values - State controlled through secure setting - Override mode which locks to a state for a couple hours then resets - Add broadcast for SysUI to listen to Brightness/Power: - Updates to handle TwilightService changes - Added secure setting to control whether or not to use twilight when calculating brightness. Tuner: - UI Overhall - NightModeController will set the values of the custom color matrix taking into account the current twilight service state and any custom calibration set by the user. - Probably other stuff. Change-Id: I213f1f76a143e711c507b2ba7d784f581bfc32b4
/frameworks/base/core/res/AndroidManifest.xml
|
087fd6829da7f8ce29db207d134d3b40771af257 |
|
18-Feb-2016 |
Martijn Coenen <maco@google.com> |
Merge "Update protected broadcasts used by NFC." into nyc-dev
|
5e906f8829ce2e036361917dafa0ae674a88ec8f |
|
18-Feb-2016 |
Martijn Coenen <maco@google.com> |
Update protected broadcasts used by NFC. Change-Id: Ie7d062e83929e1058e19427f6ca624ab3f8ee472
/frameworks/base/core/res/AndroidManifest.xml
|
37fc7a7fc0aefc44162fa38d49d3079ced899f26 |
|
16-Feb-2016 |
Jeff Sharkey <jsharkey@android.com> |
More protected broadcasts. These actions are owned by the system and should not be sent by third-party apps for security reasons. Bug: 27171917, 27169730, 27172357, 27163393 Change-Id: I3161cd3c1c37d26a92723b22878dc5aef6f30c47
/frameworks/base/core/res/AndroidManifest.xml
|
b5f0049f9841dfe877c070e4aba41516ed7df710 |
|
15-Feb-2016 |
Rubin Xu <rubinxu@google.com> |
Fix typo in filling ACTION_MANAGED_PROFILE_UNLOCKED extras. Change-Id: Ic949a0d7f72d46d7cc36018b4b0fc54024c3b180
/frameworks/base/core/res/AndroidManifest.xml
|
d820abddd255618e828f53040dc0bfcabe249412 |
|
01-Feb-2016 |
Pavel Zhamaitsiak <pavelz@google.com> |
Make ACTION_RADIO_OFF protected Bug: 25113145 Change-Id: Idcb88cb1fd06d4761ef1f634136f8ec697bf0851 (cherry picked from commit ae6688ca5d2b506eff29ba27c7532513f2da7da8)
/frameworks/base/core/res/AndroidManifest.xml
|
901bbe066762a644ec0790de8b07199f4464bb4f |
|
08-Feb-2016 |
Abhijith Shastry <ashastry@google.com> |
Merge "Hidden permissions to access blocked numbers." into nyc-dev
|
c08268e647f89f8ddfd9c6fb1f6ac4f99b13b9cf |
|
05-Feb-2016 |
Amit Mahajan <amitmahajan@google.com> |
Make permission RECEIVE_EMERGENCY_BROADCAST public. It is required to receive intent SMS_EMERGENCY_CB_RECEIVED_ACTION which is already public. Bug: 24914029 Change-Id: I2d5461fcedb2cb347c818ab6f94577008f6af242 (cherry picked from commit 45d9b36fc6a609893022b812084987cda3e3717d)
/frameworks/base/core/res/AndroidManifest.xml
|
d6e1ed59067acdb1683c8916e798729065a546bb |
|
06-Feb-2016 |
Abhijith Shastry <ashastry@google.com> |
Hidden permissions to access blocked numbers. BUG: 26232372 Change-Id: I213622ef4623dadcf56745798fb3452c57fa4bd5
/frameworks/base/core/res/AndroidManifest.xml
|
10c63d8a12caf5117524799efea95120f8b0845b |
|
05-Feb-2016 |
Chris Wren <cwren@android.com> |
move assistant to system API Bug: 26693581 Change-Id: I7e29b8521e2c33683b8032e63da734cfde1dfcc9
/frameworks/base/core/res/AndroidManifest.xml
|
ee081d5bd0fdbe7224382da7ce388b9d21f21c78 |
|
04-Feb-2016 |
Steven Ng <stevenckng@google.com> |
Merge "Add new permission and action for managed provisioning (QR flow)"
|
4cf5a49e545ec67271452ce1215de86d28fc2087 |
|
04-Feb-2016 |
Christopher Tate <ctate@google.com> |
Mark the idle-maint trigger broadcast 'protected' Bug: 26942536 Change-Id: I52d6b304fc894cad7957f84946178378c309f621
/frameworks/base/core/res/AndroidManifest.xml
|
f933871976b4dc4c8e71a364b66f5208cefad3d3 |
|
03-Feb-2016 |
Felipe Leme <felipeal@google.com> |
Merge "Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent."
|
bf33bd4d31cfec895c96990525b0cb856407c8d6 |
|
02-Feb-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Permissions: Get rid of GET_ACCOUNTS" This reverts commit 918c55a67c2bf0cec79f75dec6ca468e914a5fd1. Change-Id: I995f134336bf61ac1f21052355900ae89d0d6694
/frameworks/base/core/res/AndroidManifest.xml
|
980a1b6fa872f82133a7421bcfe14e2b03a0745e |
|
02-Feb-2016 |
Steven Ng <stevenckng@google.com> |
Add new permission and action for managed provisioning (QR flow) + Instead of reusing NFC provisioning action, new action and permission are introduced for QR code provisioning Bug: 26240297 Change-Id: Id2632d6c6b9e62bf3cad5bc141430d49df4a2c5d
/frameworks/base/core/res/AndroidManifest.xml
|
a491c07f36350cbb13b0a3070508553ba6c96608 |
|
01-Feb-2016 |
Shreyas Basarge <snb@google.com> |
Merge "SyncManager on JobScheduler"
|
c3cd05f8a45ab789aae1cb553df86f94667d595a |
|
11-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Add DevicePolicyManager APIs for process logging. Add Device Owner APIs for controlling and retrieving the logs. Retrieving the logs should be rate limited unless we are at the risk of losing logs due to constrained buffer space. Bug: 22860162 Change-Id: I80658f5a14e86d7cfd42402fbc5e98dc11698c0e
/frameworks/base/core/res/AndroidManifest.xml
|
54fa566ab74368bd0f0a8e9da7c695b2d33d6124 |
|
30-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
Merge "PIP: Use StatusBarService to handle PIP key"
|
6c7185cd2086de86e51c47f99877a8159c1bab99 |
|
30-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Fix permission doc Bug 26406584 Change-Id: I2c443cc52c600edb1ad904e0eb013829caee9897
/frameworks/base/core/res/AndroidManifest.xml
|
8c834c07675052c984728cbf79f7c2e0d8246e43 |
|
07-Jan-2016 |
Shreyas Basarge <snb@google.com> |
SyncManager on JobScheduler SyncManager now uses JobScheduler for scheduling and persistence purposes. Change-Id: I38c92aedbf4d891ca297644d0b706835aaedfcd6
/frameworks/base/core/res/AndroidManifest.xml
|
c552b04cb4aac9d31dbaf9744f32ddc14886e222 |
|
18-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
PIP: Use StatusBarService to handle PIP key Bug: 26591829 Change-Id: I7051fab966e2fc0887b2a21ddbf11aff7e16804b
/frameworks/base/core/res/AndroidManifest.xml
|
9778f761237b2533903bacc091b1597990110a7e |
|
27-Jan-2016 |
Felipe Leme <felipeal@google.com> |
Created a ACTION_RESTRICT_BACKGROUND_CHANGED intent. This intent will be broadcasted when: - Global restrict background setting is changed (sent to all packages) - An individual uid is added to or removed from the whitelist (sent just to the packages belonging to that uid). This intent is only sent to registered receivers. BUG: 26451391 Change-Id: Ic0a5771f88baa52076ad04764f29098a386463cc
/frameworks/base/core/res/AndroidManifest.xml
|
e7c74cc96eeecec52401d9bf720234d1421cfebc |
|
28-Jan-2016 |
Adam Powell <adamp@google.com> |
Revert "Pinning components in ChooserActivity" This reverts commit ec6bc41e1835804533fd21b3ef8047ecd893bcfd. Bug 26842512 Change-Id: I9fc775d21081885d0e26fca4ade412a18da45b7c
/frameworks/base/core/res/AndroidManifest.xml
|
ec6bc41e1835804533fd21b3ef8047ecd893bcfd |
|
27-Jan-2016 |
Adam Powell <adamp@google.com> |
Pinning components in ChooserActivity Move ChooserActivity to SystemUI. This is a safer place for it to live and still be able to persist data to storage. Add a context menu to long press for chooser targets allowing users to 'pin' a target component from an app. This causes it to sort to the front of the list so that a user's favorite apps are always available from share UIs, etc. Similarly, all ChooserTargets from a pinned component receive an impossibly large boost for sorting so that they will always appear first. Bug 26791843 Change-Id: Ib4e603d9d4263403e98ce619287452ddab593044
/frameworks/base/core/res/AndroidManifest.xml
|
a35b5539a95342799a18e95616c5e5751a198e4c |
|
20-Jan-2016 |
Peng Xu <pengxu@google.com> |
Dynamic Sensor Discovery Implementation Defined the dynamic sensor meta data type and UUID of sensor, as well as the broadcast intent that is related to dynamic sensor status change. Modify SensorManager, SystemSensorManager and the JNI layer to support dynamic sensor discovery. Added SensorNotificationService to notify apps that sensor connected or disconnected via broadcast. Change-Id: I28adfb005357d7e3983d65117d6865830c75027d
/frameworks/base/core/res/AndroidManifest.xml
|
4665f49b9ca404adbb9e1bb3053b5f75ed23f846 |
|
27-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Merge "Add new public API to allow call screening"
|
1bef339b88b3f760603dcc08d79a62647fc18296 |
|
25-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Add new public API to allow call screening This CL adds a new service that the default dialer can implement to screen incoming calls. If the service is implemented then Telecom uses it to decide if a call should be shown to the user or rejected. Note, I initially tried to simply extend InCallService instead of creating a whole new service. The problem with this approach is that: - this breaks some in call services which show UI as soon as they are bound to - the in call service lifecycle is tightly coupled to adding and removing calls. Call screening happens before a call is added which makes it a bad fit to in call service - call screening is a function of only the default dialer's in call service but the existing code also binds to "controller" call services For these reasons it seemed simpler to just create a new optional service. BUG: 22857261 Change-Id: I53f2ef93360e0af19b6ce45af21026be6cf3a7f3
/frameworks/base/core/res/AndroidManifest.xml
|
a772e5fc062c8de48cb9c1d61755110f6b2e189b |
|
25-Jan-2016 |
Arunesh Mishra <arunesh@google.com> |
SoundTrigger API improvements. This CL implements the SoundTrigger API improvements as given in b/22860713. Only the java-level parts are implemented in this CL. Key changes include: * Addition of a SoundTriggerManager/SoundTriggerDetector system API to manage the sound-trigger based sound models. * Addition of a SoundTriggerService service that manages all sound models including voice (keyphrase) and sound-trigger based models. * Includes logic to write sound-trigger based models to the database. * VoiceInteractionManager service now uses SoundTriggerService instead of SoundTriggerHelper. Bug: 22860713 Change-Id: I7b5c0ed80702527c4460372efeb5e542d3693a69
/frameworks/base/core/res/AndroidManifest.xml
|
3cdbc806ff52d02bf215a5aa696b670434d9f401 |
|
27-Jan-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Permissions: Get rid of GET_ACCOUNTS"
|
58941094d47deefffabc0222f96ca6e40148d83b |
|
26-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Merge "Mark mised call notification as protected"
|
e6e907ea090b3c6b7cd9b793ac5f4acbe326b003 |
|
25-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Merge "Show dialog when launching work apps is not possible."
|
f13c9801697ccac3171137df10dd15f491dd15bd |
|
21-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Turn off profile by stopping the user. Bug: 22541941 Change-Id: I713ab9b87f3dd1b7bd6206af137562d20a44d76d
/frameworks/base/core/res/AndroidManifest.xml
|
918c55a67c2bf0cec79f75dec6ca468e914a5fd1 |
|
14-Jan-2016 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Get rid of GET_ACCOUNTS Bug: 21901286 Change-Id: Id2c42f4d449a32c88078d80dcf952d15e67d536c
/frameworks/base/core/res/AndroidManifest.xml
|
d1a28aa17bac68cb81336a847a62ac10e5295036 |
|
23-Jan-2016 |
Sailesh Nepal <sail@google.com> |
Mark mised call notification as protected This CL marks the missed call notification as protected. This prevents other apps from being able to broadcast it. BUG: 22857261 Change-Id: I01ae992f2a5fe255f057c5aa28c5c47d34a0a093
/frameworks/base/core/res/AndroidManifest.xml
|
58d25998321d9f4b1b76d18a5af9d42cdbaad30d |
|
21-Jan-2016 |
Rubin Xu <rubinxu@google.com> |
Show dialog when launching work apps is not possible. There are two cases when this could happen. First is when the work profile is turned off by the user, and the second is when the profile owner has suspened the package. Bug: 22776761 Bug: 22541941 Change-Id: Ibc671e93f87dff0168bb7643494b9d6b45a1a7f9
/frameworks/base/core/res/AndroidManifest.xml
|
efd88c3bebca9ca24c8f56a77ac0975ad906632f |
|
21-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Merge "Add missing system broadcast actions to the protected list."
|
730a759254f7a24e77a063eccd1b32ff1bf839ac |
|
21-Jan-2016 |
Makoto Onuki <omakoto@google.com> |
Add missing system broadcast actions to the protected list. Bug 26697573 Change-Id: I39e6b90b38c6e1dbe4978be1cb2a10d72b015cba
/frameworks/base/core/res/AndroidManifest.xml
|
69d5ebc59e3cbc9c394906a95dc4b9bdc3355c08 |
|
14-Jan-2016 |
Andrei Stingaceanu <stg@google.com> |
Suspend apps - broadcast intent and API Send a protected broadcast to registered receivers only when packages get suspended. Bug: 22776761 Change-Id: I043053ed45bdc202ead18518a0c1e39cce47947c
/frameworks/base/core/res/AndroidManifest.xml
|
a8c8851caa0d1d44eccfcae2e01a2b6e7235d290 |
|
18-Jan-2016 |
Michal Karpinski <mkarpinski@google.com> |
Merge "DPM changes to support remote bugreports"
|
12747879b0204b9dfee997eddc981d09289e8b77 |
|
07-Dec-2015 |
Amith Yamasani <yamasani@google.com> |
User creation with an intent New API for an app to request creating a new user with a given user name and seed account information for the SetupWizard to use when that user is switched into. Also adds system APIs to read the seed account data from UserManager. Bug: 22776757 Change-Id: I0bc3f11ee19c15e0ee2a908c88d98b13296cc30d
/frameworks/base/core/res/AndroidManifest.xml
|
52632e21faf5aa63e53e5626046bc1742cba100c |
|
14-Jan-2016 |
Jaewan Kim <jaewan@google.com> |
PIP: Use long press HOME for PIP on Android TV (2/2) Bug: 25580820 Change-Id: Ic269132ec7de1e725989ad57a1ee205b3334e3bb
/frameworks/base/core/res/AndroidManifest.xml
|
69c2907c6300b976152eb360bc7212e9fdec3f23 |
|
15-Jan-2016 |
Neil Fuller <nfuller@google.com> |
Merge "Fix @code escapes" am: b0d92f4717 * commit 'b0d92f4717af4e4736dc80b2a822dae8e5a52587': Fix @code escapes
|
9498e8a8d2deb7b0a2e964d5d3c5d3b8747610e9 |
|
30-Nov-2015 |
Neil Fuller <nfuller@google.com> |
Fix @code escapes The body of {@code} must not be HTML escaped. This is one of several changes that fix the source in conjunction with a doclava fix. Bug: 25757239 (cherry-picked from commit 71fbb81b14958b80fe55738607740c6630e4e9da) Change-Id: I19dafddc6501be6fee362c396ac5bbdc934ae39d
/frameworks/base/core/res/AndroidManifest.xml
|
3fc437e89b018f258a3dee1a83014555aa156dc4 |
|
15-Dec-2015 |
Michal Karpinski <mkarpinski@google.com> |
DPM changes to support remote bugreports Bug: 22860136 Change-Id: If984318e421f511d9b0fc7138aacd36d5334698f
/frameworks/base/core/res/AndroidManifest.xml
|
ab064b3b3687424e14dccfd60ff9a8f93ec22c23 |
|
13-Jan-2016 |
Dongwon Kang <dwkang@google.com> |
Merge "Add a way for SystemUI to receive media resource (e.g. A/V codec) usage"
|
2034a4c4c5edd1516d03b73a8c8d8600eb3d4cbc |
|
14-Dec-2015 |
Dongwon Kang <dwkang@google.com> |
Add a way for SystemUI to receive media resource (e.g. A/V codec) usage Bug: 26175834 Change-Id: If506a533c5c7b567e770217a9430bf68b539677a
/frameworks/base/core/res/AndroidManifest.xml
|
502658dd9037be08b30ce45f4d201da02ba01d8a |
|
11-Jan-2016 |
Jeremy Klein <jlklein@google.com> |
Merge "Add a TETHER_PRIVILEGED permission and use it where needed."
|
ca8bce51f9f0e3ad0614d0d1e83da0ea6a7fd639 |
|
09-Jan-2016 |
Christopher Tate <ctate@google.com> |
Fix typo in protected broadcast decls Bug 26471149 Change-Id: I4332fd9adc52d3bd2f6ee0ce3718bf844f1f9843
/frameworks/base/core/res/AndroidManifest.xml
|
867b3396605421708dbcb0595b8954a3f96858ed |
|
09-Jan-2016 |
Andy Hung <hunga@google.com> |
Merge "Add setMasterMono and getMasterMono"
|
f04b84d4c66ea377ec6fe2b36f3a0994f3e94eba |
|
19-Dec-2015 |
Andy Hung <hunga@google.com> |
Add setMasterMono and getMasterMono Bug: 15283594 Bug: 22700363 Change-Id: I5d0552938ec2a54be4450512974d92ff8c77b1e9
/frameworks/base/core/res/AndroidManifest.xml
|
f3fa0f8fc689d644adc77e91c85e9311bc2f9c74 |
|
07-Jan-2016 |
Felipe Leme <felipeal@google.com> |
Added new API for URI permissions management. The new methods are: - getGrantedUriPermissions(String packageName) - clearGrantedUriPermissions(String packageName) These methods will be used by the Settings app to allow users to clear the URI permissions granted to an application. BUG: 26447975 Change-Id: I6867402e42b3d6fd03050ec57b73973ccd8a17af
/frameworks/base/core/res/AndroidManifest.xml
|
226940ed8550c02875a987f7e46699e6003ec1c0 |
|
15-Dec-2015 |
Michal Karpinski <mkarpinski@google.com> |
Modifying Shell to accomodate remote bugreports After receiving android.intent.action.REMOTE_BUGREPORT_FINISHED in newly created RemoteBugreportReceiver, Shell will generate URI to the bugreport zip file and send the broadcast android.intent.action.REMOTE_BUGREPORT_DISPATCH. Bug: 26152603 Change-Id: I058d626e021b488c9347b45467a4e3505134e79c
/frameworks/base/core/res/AndroidManifest.xml
|
d42209db964de5597b0846cf8175cee6001ec8d7 |
|
29-Dec-2015 |
Jeremy Klein <jlklein@google.com> |
Add a TETHER_PRIVILEGED permission and use it where needed. BUG: 26247383 Change-Id: I73f7227d77926faa9081e83eccb83c8ddee33e08
/frameworks/base/core/res/AndroidManifest.xml
|
9a25da192e12e3226e0b52dfc44bcac9a0283f73 |
|
06-Jan-2016 |
Julia Reynolds <juliacr@google.com> |
Send less unnecessary broadcasts. Protect the broadcasts we do send. Change-Id: I440a7accfc4509512063b663c0418a29f06ef09e
/frameworks/base/core/res/AndroidManifest.xml
|
a7ca3e73bfb9e95bd3e87c7d194f044bb16dd9e5 |
|
05-Jan-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Remove FLASHLIGHT permission"
|
09bc4e0b7eb9142663703212dc500ab5eb05ed14 |
|
29-Dec-2015 |
Andre Eisenbach <eisenbach@google.com> |
Protect android.bluetooth.intent.DISCOVERABLE_TIMEOUT Bug: 26347910 Change-Id: I61b211c3f32c9e79c40c2b07798dd9cb6d82df22
/frameworks/base/core/res/AndroidManifest.xml
|
1463cebd77f5ef7d165c5ca37b313b1ea2253847 |
|
04-Jan-2016 |
Svetoslav Ganov <svetoslavganov@google.com> |
Remove FLASHLIGHT permission This permissions is not protecting access to the flashlight. Anyone can use the latter via CameraManager.setTorchMode(). bug:26383626 Change-Id: I44c6395b5a0f80c1c539cffe61715b29b401a775
/frameworks/base/core/res/AndroidManifest.xml
|
d5a204f16e7c71ffdbc6c8307a4134dcc1efd60d |
|
21-Dec-2015 |
Jason Monk <jmonk@google.com> |
Better service management for QS 3rd party tiles Better wrapper around the service that will handle rebinding when it dies, binding when it becomes available, and forwarding along all messages to the service once it binds. Also better handling of too many services at a time. Will only ever bind to at most 3 tiles and will manage which ones are most important to show based on pending clicks, last update, etc. Change-Id: I5f4da0bc751f7eb25baa32e5c0bb9f1bc418f5bb
/frameworks/base/core/res/AndroidManifest.xml
|
96e2035223638b6e161cdedb795681eee62fae6e |
|
16-Dec-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Roll back some broadcasts."
|
a050e127bbf4891d1e3c7199f56a4723af5fb90a |
|
16-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Roll back some broadcasts. Bug: 26219971, 26219772 Change-Id: Ic45691419f8fcd1b472a380f09408caf29d3c13d
/frameworks/base/core/res/AndroidManifest.xml
|
63b0318e4bd1fff25e6d434513488bb3bdca3097 |
|
15-Dec-2015 |
Jeff Sharkey <jsharkey@google.com> |
Merge "Protect some more broadcasts."
|
4267eacc3bd6c781423a871e135bac03cd93718a |
|
15-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Protect some more broadcasts. Bug: 26144973 Change-Id: Ic05bca52913ee5545719f0f24bed5b359f31259f
/frameworks/base/core/res/AndroidManifest.xml
|
edd137b9b98d6ed8fd3337ce91f529efe9d0aef5 |
|
14-Dec-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Change signature|system permissions to signature|privileged" am: cfed01af4b am: 3dee9db651 * commit '3dee9db6516fd97d7db3641fc81533cc3553fde8': Change signature|system permissions to signature|privileged
|
3dee9db6516fd97d7db3641fc81533cc3553fde8 |
|
14-Dec-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Change signature|system permissions to signature|privileged" am: cfed01af4b * commit 'cfed01af4bea6ff9025c31fbe3ed973f47529484': Change signature|system permissions to signature|privileged
|
381e0a4177c26c2e454a7eef2262d34104e1ea58 |
|
13-Dec-2015 |
Yury Zhauniarovich <y.zhalnerovich@gmail.com> |
Change signature|system permissions to signature|privileged Permission protection level changed from signature|system, which is deprecated to signature|privileged. Change-Id: I697723221617f8c12255d6911d34cd1bf96eff8b Signed-off-by: Yury Zhauniarovich <y.zhalnerovich@gmail.com>
/frameworks/base/core/res/AndroidManifest.xml
|
6714030083b1d8ec5b2df6dfef08034d0d30c2fe |
|
10-Dec-2015 |
Jack Yu <jackyu@google.com> |
merge from master Change-Id: Ic03669db3f4595336a7dbc13ffc77d055d11acf9
/frameworks/base/core/res/AndroidManifest.xml
|
7fff4a1794a842e83e19371bbf7054aa1e02d666 |
|
09-Dec-2015 |
Felipe Leme <felipeal@google.com> |
Protect android.intent.action.BUGREPORT_STARTED. This intent is sent by dumpstate when launched with the -P (progress) option. BUG: 25794470 Change-Id: I6b6265f85f366db3dfca758d90be83c9e3736d7c
/frameworks/base/core/res/AndroidManifest.xml
|
2acf063da08dfff69f184c9a6a90a7a5fe60d818 |
|
25-Nov-2015 |
Svet Ganov <svetoslavganov@google.com> |
Ephemeral cookie API Add APIs for an ephemeral app to set a cookie which is a small peice of data cached longer than the app itself. This is useful for avoiding the user to login every time they use the ephemeral app. The cookie is stored after an ephemeral app is uninstalled. Normal apps or ephemeral apps upgraded to full apps can also use these APIs with the difference that once they are uninstalled the cookie is deleted. The cookie size defaults to 16KB and is configurable by a global settings which can be adjusted via gservices. Also eviction policy is time based with a default of one month and is configurable by a global setting which can be adjusted via gservices. If the cert of the app cahnges (when ephemeral is installed, uninstalled and installed again) the cooke is wiped to prevent data leaks. This cahange also adds an API for apps to know whether they run in an ephemeral mode since it this mode some APIs will not be available. Another API exposed by this change is private for the system and exposes all ephemeral apps - installed and uninstalled. Only the system can call this API. When an ephemeral app is uninstalled the system stores its name, icon, and permissions. When the app is reinstalled or a full version is installed the permissions are propagated. Change-Id: Id4a73a7750bfbabda0bfcb9bf9018d2062e94367
/frameworks/base/core/res/AndroidManifest.xml
|
39a275b3980b5ea75e060da540229b95a47333f7 |
|
04-Dec-2015 |
Jeff Sharkey <jsharkey@android.com> |
Better protection for system broadcast intents. When the system sends broadcast intents, it's in a very authoritative position, and many apps blindly trust the sender. This is why we've historically had the concept of "protected broadcasts" which can only be sent by the system. However, it's far too easy to send new broadcasts from the system without adding them to the protected list. This CL adds logic to help catch those cases. Currently it just logs the error and continues sending the broadcast. Based on boot analysis of a typical device, add 36 new protected broadcasts. Bug: 24571095 Change-Id: Ie2cc6b0b2026e67c64730af897e4eb3e0e8404f1
/frameworks/base/core/res/AndroidManifest.xml
|
0a29ecd8a53b5ac63b628e870a344650ff34c4b0 |
|
04-Nov-2015 |
Rubin Xu <rubinxu@google.com> |
Introduce quiet mode state to managed profile users Quiet mode means the user will be free from visual and audio interruptions from apps inside the managed profile, including notifications, widgets and others. This CL adds the underlying state bit to users and exposes various APIs to control and query the quiet mode state. Bug: 22541941 Change-Id: If5f8e5a897843050e83b6ec26cb39561098f12b9
/frameworks/base/core/res/AndroidManifest.xml
|
b88dd9412e5348f9fa7aca1cff9c1610e0c6668c |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "allow locking UI mode and block launching car dock for automotive"
|
a771049b2ef401ab911a9e0a277dbf9b475388a1 |
|
23-Sep-2015 |
keunyoung <keunyoung@google.com> |
allow locking UI mode and block launching car dock for automotive - add config to lock UI mode change: When this is enabled, request to change car mode will be ignored. Apps can check the config using UiModeManager.isUiModeLocked() - add config to lock day / night mode: When this is enabled, apps cannot change day / night mode without having MODIFY_DAY_NIGHT_MODE permission. Apps can check the config using UiModeManager.isNightModeLocked() - add config to disable car dock intent launch for home key and mode change - All new configs have default values which keeps the current behavior. Car products should override the configs to get desirable behavior. bug: 22700993 Change-Id: Ic0e58f3428151e0b1c19a2e9a7d6ded32ff962a6
/frameworks/base/core/res/AndroidManifest.xml
|
cf7021e827dde0047bd36d32b734893e98d988fe |
|
03-Dec-2015 |
Chris Wren <cwren@android.com> |
Merge "Notification Assistant API"
|
9fa689f8b614d32f36b5f2de2e3065f4ad6b2358 |
|
20-Nov-2015 |
Chris Wren <cwren@android.com> |
Notification Assistant API This API allows a single assistant on the device to help the user manage their notification stream by taking actions on individual notifications: - modifying their priority up or down when they are posted - possibly changing if and how the notification interrupts the user - adding annotations under notifications Bug: 22455414 Change-Id: Idf47972bb71c83f1dc1c9ec68a6fa92ac4fc522f
/frameworks/base/core/res/AndroidManifest.xml
|
568f4de11a87308cbcb888083f02818a8290a7d7 |
|
03-Dec-2015 |
Neil Fuller <nfuller@google.com> |
Merge "Fix @code escapes"
|
aa8b1c35add23922ff394e0193ba24cb15bd34f3 |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "Revert "allow locking UI mode and block launching car dock for automotive""
|
3b741e03b3eaa8a263f11cd1837091d3ac39483b |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Revert "allow locking UI mode and block launching car dock for automotive" This reverts commit 1746369a6bcd1a7219e94366b3774bfdfff08fc6. Change-Id: I4989e99b8f648145d0dbfe18e557102939e7d1e3
/frameworks/base/core/res/AndroidManifest.xml
|
ef3ca438c9b89949c020fecf13834851406f0482 |
|
03-Dec-2015 |
Keun-young Park <keunyoung@google.com> |
Merge "allow locking UI mode and block launching car dock for automotive"
|
8e4f4b3d9409c5a5329aaa4caf0102167d5e610d |
|
02-Dec-2015 |
Chong Zhang <chz@google.com> |
Add permission to prevent third-parth apps from querying OOM scores bug: 25853091 Change-Id: Ic1cdbf155e1e930405773fd078dfc57fda2d9afa
/frameworks/base/core/res/AndroidManifest.xml
|
71fbb81b14958b80fe55738607740c6630e4e9da |
|
30-Nov-2015 |
Neil Fuller <nfuller@google.com> |
Fix @code escapes The body of {@code} must not be HTML escaped. This is one of several changes that fix the source in conjunction with a doclava fix. Bug: 25757239 Change-Id: Ib38a0fa2dd2a3d68e467f78a812071e763d7e881
/frameworks/base/core/res/AndroidManifest.xml
|
64cdc1458bcf0d09781463a6e421b9b870b09687 |
|
30-Nov-2015 |
Filip Gruszczynski <gruszczy@google.com> |
Remove dock divider surface when it's not visible. We achieve the removal by notifying System UI about the visibility of the dock divider. This way System UI can change visibility of the root view, which in turn will cause the WMS to destroy or create the surface as necessary. Bug: 25844096 Bug: 25683717 Change-Id: Idbc33368db697a059af49106dfadb80c3d7d06c1
/frameworks/base/core/res/AndroidManifest.xml
|
a3ecf45fd93f3999e616a6b80d784144d5d6f44e |
|
25-Nov-2015 |
Nick Kralevich <nnk@google.com> |
AndroidManifest.xml: More protected broadcasts Make the following broadcasts protected: android.intent.action.PRE_BOOT_COMPLETED android.intent.action.USER_INITIALIZE Bug: 25022002 Change-Id: Ic36e29c51b930e4d7367688ab837c6a40d74ec23
/frameworks/base/core/res/AndroidManifest.xml
|
7f35036c95650ee5b66166ad4517f3cd352efdaa |
|
20-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Added a placeholder home activity for system user"
|
c40e244b4a5f224d749be62e8fd512fadb568a85 |
|
18-Nov-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Added a placeholder home activity for system user Standard launcher can be uninstalled for system user. A low priority placeholder home activity is used to make sure the system can always boot. By default the component is disabled for all users, and is only enabled for the system user at boot time. Bug: 25726710 Change-Id: I97eed02c9e2bbd69a737cc1d203110bed837b803
/frameworks/base/core/res/AndroidManifest.xml
|
bbadff8603ca6922a0ef89338bee5b59d6dcf641 |
|
06-Nov-2015 |
Jason Monk <jmonk@google.com> |
Add Quick Settings API It is a little bit limited right now, but it contains the lifecycle of a tile getting added/removed, and listening/not listening and clicks. SysUI side will need some cleanup later on. Change-Id: I4db803c8a271f8bf44f2ef710517969a84a95cf0
/frameworks/base/core/res/AndroidManifest.xml
|
1746369a6bcd1a7219e94366b3774bfdfff08fc6 |
|
23-Sep-2015 |
keunyoung <keunyoung@google.com> |
allow locking UI mode and block launching car dock for automotive - add config to lock UI mode change: When this is enabled, request to change car mode will be ignored. Apps can check the config using UiModeManager.isUiModeLocked() - add config to lock day / night mode: When this is enabled, apps cannot change day / night mode without having MODIFY_DAY_NIGHT_MODE permission. Apps can check the config using UiModeManager.isNightModeLocked() - add config to disable car dock intent launch for home key and mode change - All new configs have default values which keeps the current behavior. Car products should override the configs to get desirable behavior. bug: 22700993 Change-Id: I351fc53163575d2f523c2d6e886befdb69a5a0c6
/frameworks/base/core/res/AndroidManifest.xml
|
f9fc6d6cc05595241bc7ced6d4cab97b45f9b901 |
|
09-Nov-2015 |
Jeff Sharkey <jsharkey@android.com> |
More file-based encryption work. Add granular StorageManager APIs for key creation/destruction and unlocking/locking. Start passing through an opaque token as part of the unlock command, but leave it empty for now. We now have a separate "prepare" method that sanity checks that user directories are correctly setup. Define a handful of system properties used for marking devices that should be operating in FBE mode, and if they're emulating FBE. Wire a command to "sm", but persisting will come later. Start using new "encryptionAware" flag on apps previously marked with coreApp flag, which were apps running in the legacy CryptKeeper model. Small tweaks to handle non-encryptionAware voice interaction services. Switch PackageManager to consult StorageManager about the unlocked state of a user. Bug: 22358539 Change-Id: Ic2865f9b81c10ea39369c441422f7427a3c3c3d6
/frameworks/base/core/res/AndroidManifest.xml
|
aad093b67574a6d28963d07befd67a2a45784074 |
|
02-Nov-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow verifier to grant permissions" into mnc-dr-dev am: cfa233eefb am: 22d7f4c2ed am: 6423c0a29b am: bd4168540f * commit 'bd4168540f009c71af1242e5b7866146c8724d6f': Allow verifier to grant permissions
|
22d7f4c2eddef09e0ceb16aadff2860a184a68d8 |
|
02-Nov-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Allow verifier to grant permissions" into mnc-dr-dev am: cfa233eefb * commit 'cfa233eefb5b77c96a3239a5a51f381a7f0722c9': Allow verifier to grant permissions
|
7bddf5aa06e11117c623a4a44eab88df80084607 |
|
30-Oct-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow verifier to grant permissions bug:25329324 Change-Id: I2ac01a983ad812df7725a0499a8d9b470a7ea481
/frameworks/base/core/res/AndroidManifest.xml
|
0529672a8cffd2abb749265ddeb703a179c34662 |
|
29-Oct-2015 |
John Reck <jreck@google.com> |
resolve merge conflicts of a1b8d77ca3 to master. Change-Id: Ia78c6d31687542dfaba20b177e774333cfb1edb5
|
35151fbc8b028f6633f477fd36044032a03b2bff |
|
29-Oct-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev am: 2658cb002a * commit '2658cb002abae9341c9a82bfeaed764ba5bf97c8': Make SYSTEM_ALERT_WINDOW development permission
|
2658cb002abae9341c9a82bfeaed764ba5bf97c8 |
|
29-Oct-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Make SYSTEM_ALERT_WINDOW development permission" into mnc-dr-dev
|
01af6a42a6a008d4b208a92510537791b261168c |
|
27-Oct-2015 |
Svetoslav <svetoslavganov@google.com> |
Make SYSTEM_ALERT_WINDOW development permission bug:25329324 Change-Id: I0086464846bab9424764dd0d726692d96a0f1207
/frameworks/base/core/res/AndroidManifest.xml
|
b6d8f81b10ba85651d2309afc665b9e9fc1ab955 |
|
26-Oct-2015 |
Paul Jensen <pauljensen@google.com> |
Merge "Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN"
|
67fb3d7358f01c1bea429b680db54629d6ff4a19 |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev am: 809dcade99 am: bdc458048a am: bb8f652372 am: 8ecad265b6 * commit '8ecad265b6db57f78dd142e974057c91f69489ed': Reinstate CHANGE_NETWORK_STATE as a normal permission.
|
bdc458048abee78a945a26cd13a71245e7d4a2e5 |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev am: 809dcade99 * commit '809dcade9906001f6aa51a68aa783e20bb1d7c0d': Reinstate CHANGE_NETWORK_STATE as a normal permission.
|
809dcade9906001f6aa51a68aa783e20bb1d7c0d |
|
22-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Merge "Reinstate CHANGE_NETWORK_STATE as a normal permission." into mnc-dr-dev
|
d54270506669e474b5b8d1703212c77780a04ae9 |
|
15-Oct-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Reinstate CHANGE_NETWORK_STATE as a normal permission. This is a partial revert of http://ag/738523 , but not a full revert because M apps that have gone through the WRITE_SETTINGS route to obtain permission to change network state should continue to have permission to do so. Specifically: 1. Change the protection level of CHANGE_NETWORK_STATE back from "signature|preinstalled|appop|pre23" to "normal". This allows apps that declare CHANGE_NETWORK_STATE in their manifest to acquire it, even if they target the M SDK or above. 2. Change the ConnectivityManager permission checks so that they first check CHANGE_NETWORK_STATE, and then ask Settings if the app has the WRITE_SETTINGS runtime permission. 3. Slightly simplify the code in the Settings provider code that deals specifically with the ability to change network state. 4. Make the ConnectivityService permissions checks use the ConnectivityManager code to avoid code duplication. 5. Update the ConnectivityManager public Javadoc to list both CHANGE_NETWORK_STATE and WRITE_SETTINGS. Bug: 21588539 Bug: 23597341 Change-Id: Ic06a26517c95f9ad94183f6d126fd0de45de346e
/frameworks/base/core/res/AndroidManifest.xml
|
244f776855b2144a7fe16be09c67e5b189e8dcfd |
|
21-Oct-2015 |
Michael Wright <michaelwr@google.com> |
resolve merge conflicts of f013c3f111 to master. Change-Id: I2045187f8fa948a1733cb9a2cdc0a69ae97b5907
|
bab2b424453e556a2e7bb9470d70673793dd82df |
|
20-Oct-2015 |
Michael Wright <michaelwr@google.com> |
resolve merge conflicts of 57a5cba606 to cw-e-dev. Change-Id: Ib43f0cf0b285c9799239658859af735279f87fff
|
627bc36eb7827c5a72f5a8ecb085028fb485f72f |
|
15-Oct-2015 |
Paul Jensen <pauljensen@google.com> |
Remove dead ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN I centralized all the provisioning APN logic in Telephony back in 89e0f09 so this intent is now unused. Bug:24451710 Change-Id: I401ac3e46442c8921545c88fee228873261ebd2b
/frameworks/base/core/res/AndroidManifest.xml
|
9209c9cd9a6f779d0d9d86f9b2e368df564fa6bb |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Add SystemUI component to watch for keyboard attachment. Add a new SystemUI component to watch for keyboard attachment / detachment. If the config specifies the name of a keyboard that is packaged with the device, then SystemUI will ask the user if they would like to enable BT (if disabled) and then attempt to pair to the device. Bug: 22876536 Change-Id: I786db35524d49706d5e61d8b8bc71194d50113f3
/frameworks/base/core/res/AndroidManifest.xml
|
41da2f777f3195a857d25834274a9e4850102b6c |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow signature apps to modify notification policies."
|
6ee2617832548bdbff7cc27a6b8b852516625eb1 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Allow signature apps to modify notification policies. Bug: 22977552 Change-Id: Ib2bc3a55a904011218bb3adb19998cc4a0b7e709
/frameworks/base/core/res/AndroidManifest.xml
|
7581121ba5736b1626109445c90cc1b65bf90da9 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Revert "Allow signature apps to modify notification policies.""
|
3a0ee8f9639bd3995bc50e7ecc666f3ca0350985 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Revert "Allow signature apps to modify notification policies." This reverts commit 39a8c353a8f723e5e67bc846f8fa96d580c4abbb. Change-Id: I9a9a5fcc76202f5d2b3b175e5d5b9361604285d8
/frameworks/base/core/res/AndroidManifest.xml
|
b487ffeef7e9e6cc2fae08c2ef7ac078cf626bd3 |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow signature apps to modify notification policies."
|
39a8c353a8f723e5e67bc846f8fa96d580c4abbb |
|
28-Sep-2015 |
Julia Reynolds <juliacr@google.com> |
Allow signature apps to modify notification policies. Bug: 22977552 Change-Id: I7bfd2fe7bcb2e14b9eb7281acbb8a35dbc2ec93e
/frameworks/base/core/res/AndroidManifest.xml
|
b4a6d9847b7677611efa6fc64c9d78d92b8229d7 |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am 337c069a: am 81451c1c: am cb4bafb4: am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit '337c069ac897db69f239c1927ddaf9225a7a6fef': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
cb4bafb4c97dc5e73b055ae1c0e4a548068062cd |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am 86e153d5: am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit '86e153d5f0614c9f3da137fd0b815a398598928b': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
86e153d5f0614c9f3da137fd0b815a398598928b |
|
28-Sep-2015 |
Billy Lau <billylau@google.com> |
am f360bbca: Merge "Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE" into mnc-dev * commit 'f360bbca969f60ee968240d22bc0b1f1e5e17218': Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE
|
535570a7ce8fac764a45a603856d664227dba8c1 |
|
27-Sep-2015 |
Bryce Lee <brycelee@google.com> |
am 979a22ea: am 6ad696c3: am f0740e0a: Merge "Add ThermalObserver system service to capture thermal state uevents." into cw-e-dev * commit '979a22eaf9c62637c02ebd6f92ef6ea2888aa5be': Add ThermalObserver system service to capture thermal state uevents.
|
bc58f59da6226c6f1d240c95d566186f679fc310 |
|
26-Sep-2015 |
Bryce Lee <brycelee@google.com> |
Add ThermalObserver system service to capture thermal state uevents. Bug: 21445745 Change-Id: I980d60b66ca51942a1fd62502d6cf1f09208fc3a
/frameworks/base/core/res/AndroidManifest.xml
|
a62e8a8d398f00332fa77bfe6be07cb6f5bf57ab |
|
21-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Make android.hardware.usb.action.USB_ACCESSORY_DETACHED... a protected broadcast. The broadcast "android.hardware.usb.action.USB_ACCESSORY_ATTACHED" was accidentally included twice, changed the extra copy to "android.hardware.usb.action.USB_ACCESSORY_DETACHED". Bug: 24188595 Change-Id: I8863c336f70796b2a15633595648b594864e84e2
/frameworks/base/core/res/AndroidManifest.xml
|
c0f2bc0f0e11da0fd59b146425764a162c932410 |
|
19-Sep-2015 |
Justin Harrison <astyrrian@google.com> |
am 46db0f22: am 08b00423: am 1f463957: am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev * commit '46db0f2215ad6e969418d1fedd1578445b46588f': Add support for setting color transforms
|
1f46395702f609d90909df39ab990844c0731952 |
|
19-Sep-2015 |
Justin Harrison <astyrrian@google.com> |
am 91f2123b: Merge "Add support for setting color transforms" into mnc-dr-dev * commit '91f2123b2a6d534372ab9b7c8e6ac0c62cf33ae6': Add support for setting color transforms
|
58e829f71d2c525309e5bb5a1c02dc64397df221 |
|
15-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Add support for setting color transforms Bug: 24038268 Change-Id: I05275c906e02eb9e67331f6f909166eb08ad5536
/frameworks/base/core/res/AndroidManifest.xml
|
369b7ca4fbe6a635344f43845a82da25ececa0e4 |
|
18-Sep-2015 |
Billy Lau <billylau@google.com> |
Bug: 24112165 Update docs for protection level of CHANGE_NETWORK_STATE Previously, when CHANGE_NETWORK_STATE's protection level was raised to signature from normal, the documentation was not changed. This CL addresses the documentation to reflect the correct protection level. Change-Id: I0a4d2fcef5f30c58b38250865543e72b5eb1ab06
/frameworks/base/core/res/AndroidManifest.xml
|
51c61ee23a55ccc75e0ddb3582720fc626607e42 |
|
09-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
am fd183706: am 22262f31: am 0bc35668: am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev * commit 'fd18370675f8794807747a18276dd7385e25f06e': Require the new PACKET_KEEPALIVE_OFFLOAD permission. Add an error code for generic hardware error. Fix bugs and crashes in PacketKeepalive API. Add tests for the PacketKeepalive API. Add a PACKET_KEEPALIVE_OFFLOAD permission. Use a CountDownLatch instead of sleep() in NetworkFactory tests. Get rid of shortSleep() in ConnectivityServiceTest. Make ConnectivityServiceTest a bit more readable.
|
0bc356687e022fa1ae611c4ebeb0e0622810d7e4 |
|
09-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
am 017223ac: Merge changes from topic \'packet-keepalive-fixes\' into mnc-dr-dev * commit '017223acda5bfe16cb87d0a33d72dd28d2fccd3b': Require the new PACKET_KEEPALIVE_OFFLOAD permission. Add an error code for generic hardware error. Fix bugs and crashes in PacketKeepalive API. Add tests for the PacketKeepalive API. Add a PACKET_KEEPALIVE_OFFLOAD permission. Use a CountDownLatch instead of sleep() in NetworkFactory tests. Get rid of shortSleep() in ConnectivityServiceTest. Make ConnectivityServiceTest a bit more readable.
|
7b70036abc4564b04251a979fe406f1d1d55d21b |
|
08-Sep-2015 |
Lorenzo Colitti <lorenzo@google.com> |
Add a PACKET_KEEPALIVE_OFFLOAD permission. Bug: 23884210 Change-Id: I0f9207ac9b9c07c676f64f2748905e523e891501
/frameworks/base/core/res/AndroidManifest.xml
|
56dafdb5ae5f1618e3583c2835759108e8c0d99f |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
am 7f7ffa37: am 87e4c951: am 59c1a0e1: am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev * commit '7f7ffa3722ef90a7bf5611221c4a4c9d06823a38': Add TabletModeChangedListener for SystemUI.
|
59c1a0e1cb6cad46e30821e25f99c1ecce1227f0 |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
am 8ae90587: Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev * commit '8ae90587a510f72a176119b1f23add8bc36285b9': Add TabletModeChangedListener for SystemUI.
|
8ae90587a510f72a176119b1f23add8bc36285b9 |
|
03-Sep-2015 |
Michael Wright <michaelwr@google.com> |
Merge "Add TabletModeChangedListener for SystemUI." into mnc-dr-dev
|
8ef94501f0adfdbcc18b6ed0e32673b3abf69a14 |
|
26-Aug-2015 |
Julia Reynolds <juliacr@google.com> |
Merge "Allow third party condition providers."
|
4f5de340c9c7b12d7d67ca53bac863976b36fd32 |
|
25-Aug-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Renamed primaryUserOnly to systemUserOnly In the split mode, broadcast receivers and activities marked as systemUserOnly will be running as system. This is a non-functional change for non-split system user mode. Bug: 22958572 Change-Id: I0f7d4f4a81275bc326bf630a776c695e8b5291a6
/frameworks/base/core/res/AndroidManifest.xml
|
b0a773f6b338f8ec35d9faaa3b566f482bdc2f92 |
|
25-Aug-2015 |
Julia Reynolds <juliacr@google.com> |
Allow third party condition providers. Bug: 22977552 Change-Id: I3d8689f52daa9376496e14997a6dd7862fb3ade6
/frameworks/base/core/res/AndroidManifest.xml
|
39e5e947447bc611205404ae6a4690656f1aa0f9 |
|
19-Aug-2015 |
Michael Wright <michaelwr@google.com> |
Add TabletModeChangedListener for SystemUI. Bug: 23256614 Change-Id: I6e5d636c24a84846cfad84da800911a469689dda
/frameworks/base/core/res/AndroidManifest.xml
|
dec9a216d24dabe168b60e460b6ab6a6026be0c0 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am f18cbd76: am c9dec164: am e96b80f3: am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit 'f18cbd760142e627ab6c9672e4aca3a29d05d9ee': Add missing removed permissions to the platform manifest
|
e96b80f3deb7a49225112d497dcf75cc4211b092 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 446c00a2: am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit '446c00a2919da5b4ea0bdf08f72ac4f95125ea45': Add missing removed permissions to the platform manifest
|
446c00a2919da5b4ea0bdf08f72ac4f95125ea45 |
|
21-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am cb59747d: Merge "Add missing removed permissions to the platform manifest" into mnc-dev * commit 'cb59747de7222bc7310162c4174f7b460c34adef': Add missing removed permissions to the platform manifest
|
f1418ae65be77a0d0fac1b616cc9901f9bceffc7 |
|
20-Aug-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add missing removed permissions to the platform manifest We need to keep in the manifest as normal hidden permissions all removed dangerous ones to ensure backwards compatibility as apps may be gating operations based on whether they have a removed permission. bug:23377184 Change-Id: I105bd646c4594d85c501f53a10ea393ee50046bc
/frameworks/base/core/res/AndroidManifest.xml
|
741abfc12074623d24297ebb67d98cb2d9126add |
|
11-Aug-2015 |
Nicolas Prevot <nprevot@google.com> |
Fix cross-profile intent filters with system-user split. Don't assume that the parent is always the user owner. BUG:23105562 Change-Id: Ia98ed608e2b6d1d82d95a73110134d85274c6abf
/frameworks/base/core/res/AndroidManifest.xml
|
4ea5152bd8b7f046562901b5dfc2ca917dbd987b |
|
19-Aug-2015 |
Jim Miller <jaggies@google.com> |
am 849b9e58: am ce6fb7bb: am 7ef77271: am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev * commit '849b9e58d6775a393f7d86a6305b658c6af9d16f': Reset fingerprint lockout timer when strong auth is used.
|
7ef772713fac5d7b69874f2b972cdec7a60f074b |
|
19-Aug-2015 |
Jim Miller <jaggies@google.com> |
am bea9d7b9: Merge "Reset fingerprint lockout timer when strong auth is used." into mnc-dr-dev * commit 'bea9d7b94cfa16da8f257ed705e218b017d459a7': Reset fingerprint lockout timer when strong auth is used.
|
e0507bbbf95ae6d958c900f32122baf078d47d71 |
|
13-Aug-2015 |
Jim Miller <jaggies@google.com> |
Reset fingerprint lockout timer when strong auth is used. Fixes bug 22565462 Change-Id: I4842877839845e7fe103396d8ca8104928568c04
/frameworks/base/core/res/AndroidManifest.xml
|
9600b7fb406714ae26bce5e50e4ecd5e0c924f90 |
|
17-Aug-2015 |
Bryce Lee <brycelee@google.com> |
am de243eb2: am 55d39ecb: am d74a66bd: Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev * commit 'de243eb290c194b2204a27c0276bae5cd024797d': Introduce permission for updating the cell broadcast content provider.
|
d74a66bd97ed52fc985e9fa145072a9fc4e0a3e3 |
|
17-Aug-2015 |
Bryce Lee <brycelee@google.com> |
Merge "Introduce permission for updating the cell broadcast content provider." into cw-e-dev
|
143ebdb94e13f7a9fee2c9f3801bda1df17844c1 |
|
11-Aug-2015 |
Zach Johnson <zachoverflow@google.com> |
DO NOT MERGE Allow a custom component to handle network policy notifications Broadcasts information about network policy notifications to a custom component, if specified, so it can handle them. Also exposes an API to snooze warning notifications. Change-Id: Ic89478fa437861e2d4b6a9443858bcaf12122fba
/frameworks/base/core/res/AndroidManifest.xml
|
60d18aba1d0ad32147367ab30313ca5b9f0645cb |
|
11-Aug-2015 |
Dianne Hackborn <hackbod@google.com> |
am b44cdfdd: am afacdbe1: am 09e77852: am 5cf89a01: am b2b02092: Merge "Fix issue #23037899: Support for Battery Optimization permission + Dialog" into mnc-dev * commit 'b44cdfdd10ffa861492d044a058cfbaa167d71db': Fix issue #23037899: Support for Battery Optimization permission + Dialog
|
c7b57b1e65b487defad4967cf42cf076b499cbee |
|
10-Aug-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #23037899: Support for Battery Optimization permission + Dialog New permission, new Intent action. Change-Id: I1d9ba55be8f72074e29d33ad7a0a12a820bbac39
/frameworks/base/core/res/AndroidManifest.xml
|
64b9b9ad9e5f10d7a4d31c5e393432b87afbd742 |
|
08-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 618e065c: am 546a3449: am e12a685c: am 02d6c013: am 90b030ba: Merge "Do not show removed permissions in the UI - framework" into mnc-dev * commit '618e065cc14b9069954e462fc25cdc934ee3300f': Do not show removed permissions in the UI - framework
|
3e0be7440bf40f5d81581077bc4f5f47e57b88b7 |
|
08-Aug-2015 |
Svet Ganov <svetoslavganov@google.com> |
Do not show removed permissions in the UI - framework bug:23043018 Change-Id: Ia5cf49f299eda627d9fde2b34498812afcb3a6d5
/frameworks/base/core/res/AndroidManifest.xml
|
e37acf3256c107da2a9c4892225aa7238d148669 |
|
08-Aug-2015 |
Billy Lau <billylau@google.com> |
am 4a10b66d: am 99271a39: am 9751afcf: am 26ab6ed3: am 70f998e5: Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev * commit '4a10b66df364092cdc42a3cfaa990c877b389624': Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS
|
70f998e57df2b3ed79331669a93a0ba314f25e7d |
|
08-Aug-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS" into mnc-dev
|
a7238a397d5c3431eeb19b5b77e8c7c2bf0e608f |
|
01-Aug-2015 |
Billy Lau <billylau@google.com> |
Bug: 21588539 Move CHANGE_NETWORK_STATE to be in SYSTEM_SETTINGS Merge the CHANGE_NETWORK_STATE permission with WRITE_SETTINGS. AndroidManifest.xml: Raised the protection level of CHANGE_NETWORK_STATE permission from normal to signature|appops and pre23|preinstall for compatibility provider/Settings: Wrote new helper methods to check if app is allowed to change network state. ConnectivityManager.java & ConnectivityService.java: Replace enforcement checks for CHANGE_NETWORK_STATE with checkAndNoteChangeNetworkStateOperations instead. Change-Id: If8c2dd3c76a5324ca43f1d90fa17973216c2bcc5
/frameworks/base/core/res/AndroidManifest.xml
|
598b03d1008fb416a597ae4b2e037c4492bf696d |
|
07-Aug-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 9bf912c1: am 5ed03384: am 1f514608: am 5a624aad: am 38d30dc5: Merge "Immediately kill a shared user process on a permission revocation." into mnc-dev * commit '9bf912c1cf6941402dc0f8ef449f34787796875e': Immediately kill a shared user process on a permission revocation.
|
aa41add33b8d7d318387cc74c34e3d347d245211 |
|
07-Aug-2015 |
Svetoslav <svetoslavganov@google.com> |
Immediately kill a shared user process on a permission revocation. 1. When a permission is revoked we kill the app immediately but do not do an immediate kill for shared uid processes. This fixes it. 2. Remove system APIs that are used only by the package installer. bug:22984670 Change-Id: I3d4ae52ea8679f894aa7c5972941263903479183
/frameworks/base/core/res/AndroidManifest.xml
|
b66cec227739f328b7004a3bb71d4a97b98022af |
|
31-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
am 3c01ac0b: am fc0b2e98: am df961732: am f9fdb08c: am 4988378c: Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev * commit '3c01ac0b199d787f6a81b01ab3b6296421ea40a0': Introduced android.permission.PEERS_MAC_ADDRESS permission
|
4988378cd0f1bb6cdd83f797d10fd45105672296 |
|
30-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Introduced android.permission.PEERS_MAC_ADDRESS permission" into mnc-dev
|
523d865d9f2853f26089cbbd2bd0dbb75804050d |
|
29-Jul-2015 |
Nicolas Prévot <nprevot@google.com> |
am 327046d0: am e1d51934: am 95c26295: am 2b0cd2c7: am 64ac302f: Merge "Send a public broadcast when the device owner is set." into mnc-dev * commit '327046d0e75c8917dc18cbc23b4aa72b1ba61034': Send a public broadcast when the device owner is set.
|
9069fab8bca535a33501a75bc8f61b23dcdcaffd |
|
01-May-2015 |
Amit Mahajan <amitmahajan@google.com> |
Changes to update APN db via Gservices and ConfigUpdater. - Adding settings that are updated by Gservices. - Changes to handle UPDATE_APN_DB intent. - UPDATE_APN_DB intent triggers update of apns-conf.xml and carriers db. Change-Id: I65a63f3015da1b827b974d17e48bee4c747544ff
/frameworks/base/core/res/AndroidManifest.xml
|
00799008832e11f06f9ddc0bf721799edee99f28 |
|
27-Jul-2015 |
Nicolas Prevot <nprevot@google.com> |
Send a public broadcast when the device owner is set. Make it a protected broadcast. BUG: 22623518 Change-Id: Ia36e8f0b80a6301d7d8e0461476842c78762b5e8
/frameworks/base/core/res/AndroidManifest.xml
|
136a2e7fc94098f762cd3d9bd092b4c4d5bf4c70 |
|
27-Jul-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Introduced android.permission.PEERS_MAC_ADDRESS permission Introduced signature-level permission android.permission.PEERS_MAC_ADDRESS. It allows access to MAC addresses of WiFi and Bluetooth peer devices, without having location permission or even if location is turned off. Bug: 21852542 Bug: 22728628 Change-Id: If0ff80636e57b38dbedc8fcf5f520a3a6d6f734e
/frameworks/base/core/res/AndroidManifest.xml
|
61fe8e010520d92362167556cff48c5052a0254f |
|
24-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 1298b1a0: am 1ad413c0: am af27474f: am cc3c6dbf: am 3d6f6060: Merge "Add a privileged permission to get user accounts" into mnc-dev * commit '1298b1a0a25a19559c81293ac87b31a4ffcbc973': Add a privileged permission to get user accounts
|
7b97b2332927d8a2aa1de2e2759123d576c9eec3 |
|
24-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 6ae3ec45: am d14cbeab: am 8276a97f: am 010b53c0: am bdb7d936: Merge "Update permission icons to final versions - framework" into mnc-dev * commit '6ae3ec45352b5ef54366150f68d1c44994f52657': Update permission icons to final versions - framework
|
3d6f606031da248a3b1fd6f0f569ac33a26c0b5e |
|
22-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Add a privileged permission to get user accounts" into mnc-dev
|
2062eeff0156bc4e119398f1736e699d90ad8345 |
|
22-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add a privileged permission to get user accounts bug:22602794 Change-Id: I6e5429f0eb5f2cb274d4740755070e588735e179
/frameworks/base/core/res/AndroidManifest.xml
|
39c8a08b5e673dbf1416543840854faae39e59d9 |
|
21-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Update permission icons to final versions - framework bug:22383613 Change-Id: I3f524fd0538a1b843b0394fa766f032835d1ecaa
/frameworks/base/core/res/AndroidManifest.xml
|
0269352160a8f1ed02189ba40481cb899e1616cf |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 6b2d1be6: am f4d5fa93: am 55596f85: am 098a88e6: am 2a500e32: Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev * commit '6b2d1be6628fa80a4e2c9f8c893606dc1030cf7f': Revert "Temporary lower GET_ACCOUNTS protection level"
|
4f4734ff0e8dfab7b5b04b94a2a6c91769b66f38 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 62237c4e: am 60584816: am e329ce0c: am 7a8f2006: am ecb88792: Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev * commit '62237c4ea09ab52db7176c838ca713ae3d87e933': Temporary lower GET_ACCOUNTS protection level
|
2a500e32169b53679db83077e57f3c9cd02cfd36 |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Revert "Temporary lower GET_ACCOUNTS protection level"" into mnc-dev
|
2c20277dd51e8aeeb10b800a67d97273dee0c5f2 |
|
17-Jul-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Revert "Temporary lower GET_ACCOUNTS protection level" This reverts commit 6e20ac343c22ab27e5ac7471bc1219df6bf11282. Change-Id: I96b21bad9406abffa95c90abde509dc8dcf3eff5
/frameworks/base/core/res/AndroidManifest.xml
|
ecb887925a3ff3d54ecb6593932d4f866a6fe9e9 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Temporary lower GET_ACCOUNTS protection level" into mnc-dev
|
6e20ac343c22ab27e5ac7471bc1219df6bf11282 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Temporary lower GET_ACCOUNTS protection level bug:22550851 Change-Id: If43f10639220f9a69d304b08def6d869658c2960
/frameworks/base/core/res/AndroidManifest.xml
|
28e7313992ba6efd94ddc16b45278863f84d7fcb |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 71d12704: am 475858c3: am b295963b: am c00e49b6: am d4b566bf: Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev * commit '71d12704f64eeace695a6b8e0cd8f36007b96270': Add APIs for verifier to grant at install and revoke permissions
|
d4b566bf56333de708908ce4accb5fb067be64f0 |
|
17-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add APIs for verifier to grant at install and revoke permissions" into mnc-dev
|
f82631ff35e22f43ed7e79e9fbc75ca241aae70a |
|
30-Jun-2015 |
Bryce Lee <brycelee@google.com> |
Introduce permission for updating the cell broadcast content provider. Change-Id: I64a1001b6aaf7c0032cde01216abb240c54520f7
/frameworks/base/core/res/AndroidManifest.xml
|
7121e18595d4c559044e26bfe6035406a862f466 |
|
14-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add APIs for verifier to grant at install and revoke permissions bug:22231699 Change-Id: Ie0c758bf73699f50bf99ff5aa0bf98dcc9004e37
/frameworks/base/core/res/AndroidManifest.xml
|
4085a74b4c6b46c9a08a20b5d63d728713767db4 |
|
16-Jul-2015 |
Jeff Brown <jeffbrown@google.com> |
am 209c8ced: am 6e4997db: am 8bdd92d4: am 0cb1cfdc: am 76c4c666: Add USB port manager. * commit '209c8cedab87359564c032a3e56b3acd452e1ac9': Add USB port manager.
|
76c4c6668a1486bc003ab0c585bb1f41d16e27a7 |
|
07-Jul-2015 |
Jeff Brown <jeffbrown@google.com> |
Add USB port manager. Add some new internal APIs to enumerate USB Type C ports, query their status, determine whether they support changing power or data roles, and doing so. The API also adds a new ACTION_USB_PORT_CHANGED broadcast for port state changes. The implementation includes a mechanism for simulating the behavior of the USB stack. See 'adb shell dumpsys usb -h' for details. Note that the underlying kernel driver interface is still subject to change but its behavior has been encapsulated as much as possible. Bug: 21615151 Change-Id: I0c853ae179248a4550b3e60d02a7a7e65e4546b2
/frameworks/base/core/res/AndroidManifest.xml
|
db4f4b226ce1bad7d4d900d1396c598d8bf0ae92 |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
am 5edc6ffd: am a6fc7f96: am 779e5e0e: am d72fc63a: am 46d1864c: Merge "Make get_accounts a runtime permissions again" into mnc-dev * commit '5edc6ffda765c51bbd97bd7ae6f1bd2082309dd2': Make get_accounts a runtime permissions again
|
46d1864ceee7229cd7fe7bac80226c930539861d |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Make get_accounts a runtime permissions again" into mnc-dev
|
f07602bea9f964d03a009445ffe3a6172fa33432 |
|
14-Jul-2015 |
Jim Miller <jaggies@google.com> |
am c1aaa6ae: am 5ab70110: am a9845680: am a95d9f0b: am 16c1764c: Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev * commit 'c1aaa6ae49d6c1820472a2061ec8f6df08ffea50': Change MANAGE_FINGERPRINT permission to system|signature
|
949d16ebd5f4902db8fe79970479fcb1bee4a524 |
|
14-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
am 5571a986: am afe3c2b3: am 474f987d: am f5d6d432: am cf9aebf1: Merge "Remove ExternalStorageFormatter" into mnc-dev * commit '5571a986f0a2939248aefc584248d08732c761e4': Remove ExternalStorageFormatter
|
4c8d3126068334826e2a6f921799e2b86dba8916 |
|
14-Jul-2015 |
Billy Lau <billylau@google.com> |
am e385d26f: am cb2a7a2c: am 0be2efb2: am f028ba3d: am 96d00ab3: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev * commit 'e385d26fef2f62988c082ee8066f5d6715aa16c9': Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
|
4079c7ec6adb3fb4c6d1efd829c7a68f556c476d |
|
14-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Make get_accounts a runtime permissions again The permission was lowered in protection level to normal allowing apps to assess migration strategy. This change makes the permission dangerous again allowing apps to implement this strategy. bug:22385299 Change-Id: I3694c06236a33b97f63761b48745b1df654a2bf4
/frameworks/base/core/res/AndroidManifest.xml
|
16c1764cf552432d304eaefd912d5aebe3192449 |
|
13-Jul-2015 |
Jim Miller <jaggies@google.com> |
Merge "Change MANAGE_FINGERPRINT permission to system|signature" into mnc-dev
|
cf9aebf138a3ec07277b1e5564751d2396a155c0 |
|
13-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Remove ExternalStorageFormatter" into mnc-dev
|
22b3f4cb15207239e203d5ec8b72ec6bc90fef35 |
|
08-Jul-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission Raised the protection level of WRITE_SETTINGS permission to appop and also allowed backwards compatibility with pre23 flag. Also made sure that this permission is not added as RuntimePermission in DefaultPermissionGrantPolicy as that breaks a lot of gmscore stuff. Introduced new action to manage write system settings as a new API and renamed the string that describes the managing of overlay permission. Change-Id: Ifd25a6ddc06de68ee37015cb9fb23452e4ef10f4
/frameworks/base/core/res/AndroidManifest.xml
|
9da440786d8001dbfddfcfc1a6b535f522ae06be |
|
11-Jul-2015 |
Jim Miller <jaggies@google.com> |
Change MANAGE_FINGERPRINT permission to system|signature This allows fingerprint enrollment to be done from system-installed apps, such as Setup Wizard. Fixes bug 21695577 Change-Id: I990912dcf229aa03f6350f96a09ff4588b20ca48
/frameworks/base/core/res/AndroidManifest.xml
|
cb746a860cc6830a1d7d1762a57a871b100ded77 |
|
09-Jul-2015 |
Rubin Xu <rubinxu@google.com> |
Remove ExternalStorageFormatter Bug: 9433509 Change-Id: I815770e0e0314fc7012ebc213f2167a13d6f37d1
/frameworks/base/core/res/AndroidManifest.xml
|
8bc65585564b034af38031e52f50cb743d2dd953 |
|
08-Jul-2015 |
Etan Cohen <etancohen@google.com> |
am a8c58435: am e62c69ee: am 7fc77e60: am d453d7e4: am 3e639057: Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev * commit 'a8c5843591ab3f7cc1f62c5b1396ea38e506c140': Add ACCESS_IMS_CALL_SERVICE hidden permission.
|
3e639057b8d9c4287bc5e92ce29c122e805bbe17 |
|
08-Jul-2015 |
Etan Cohen <etancohen@google.com> |
Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev
|
ee94484303ebddbb5eb7cc7efa347240ad641bc7 |
|
08-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
am 7b3add61: am f368f6b9: am 6ee8a509: am c55c4a28: am b14dc048: Merge "Add new "preinstalled" permission flag." into mnc-dev * commit '7b3add61c9e47b708725147dffc23d396db37add': Add new "preinstalled" permission flag.
|
4e5dac3d6ef6f28aecb116b8dfd92ff31d49c926 |
|
08-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
am 3fd5ebfd: am 7cc8de60: am 0ce19f8e: am 240f8e5f: am 3e07ee07: Merge "Grant installer and verifier install permissions robustly" into mnc-dev * commit '3fd5ebfd778e540276fb5205a8ba3185e620647d': Grant installer and verifier install permissions robustly
|
a90c8def2c6762bc6e5396b78c43e65e4b05079d |
|
08-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Add new "preinstalled" permission flag. This allows you to specify that a permission can be granted to any pre-installed system app (not just privileged ones). And as long as I am doing this, clean up the old "system" permission flag, renaming it to "privileged" which is what it really is today, deprecating the old names. And switch the platform's permission declarations to use the new name. Change-Id: Iabf484746af232144786851ec7fe90e3de9dddb2
/frameworks/base/core/res/AndroidManifest.xml
|
3e7d977ff7c743713f0ad6336a039d7760ba47d1 |
|
07-Jul-2015 |
Svetoslav <svetoslavganov@google.com> |
Grant installer and verifier install permissions robustly bug:22248271 Change-Id: I3a47ae9a112ba7d88b421fcb5f9651d1168ba7a5
/frameworks/base/core/res/AndroidManifest.xml
|
ecb7af7d10e10a3db3435057adcbfcf726af4aa5 |
|
07-Jul-2015 |
Ian Pedowitz <ijpedowitz@google.com> |
am 0a5e18bf: am a3599c78: am 8ea98a8a: am 13c2a4f5: am 937edac8: Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" * commit '0a5e18bfe23f4b256bbda995a1f3e383fa979ee3': Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission"
|
bbf40aeab3445dc81e37b1e47f25c8e47ae035d8 |
|
01-Jul-2015 |
Etan Cohen <etancohen@google.com> |
Add ACCESS_IMS_CALL_SERVICE hidden permission. Bug: 17361897 Change-Id: I2b3ef57c647204d981ada9c8bd4f92fbbd3fc748
/frameworks/base/core/res/AndroidManifest.xml
|
937edac8e8583023019b625dd426ebf65169e30d |
|
07-Jul-2015 |
Ian Pedowitz <ijpedowitz@google.com> |
Revert "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" This reverts commit d6b404c72da7e2475508c7d5948494b2e9b1a262. This CL seems to have broken the build, causing GMSCore to continuously crash. Bug: 22313634 Bug: 22312938 Bug: 22314605 Bug: 22308392 Bug: 22307889
/frameworks/base/core/res/AndroidManifest.xml
|
bfe288690a53560f500ada91c13acfc6fd78ccde |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
am 4ce9ebea: am bb1a1e5f: am e2835f9f: am 212c006e: am c81ecb6d: Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev * commit '4ce9ebea91be2456f5958b86e1c7e36b800e8dde': Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
|
e35360d806d0858229ec8dde4929da0bdb93e7d3 |
|
07-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
am 67804838: am ccde254c: am 0cae3e9e: am 7dfe0f83: am 7fd3c296: Merge "Permission to view shared storage for all users." into mnc-dev * commit '67804838150fc85efb1bd27cc68422197976fe3f': Permission to view shared storage for all users.
|
c81ecb6d2c6badb5ddbf19f7c90e350cf24322ee |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev
|
d6b404c72da7e2475508c7d5948494b2e9b1a262 |
|
07-Jul-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission Raised the protection level of WRITE_SETTINGS permission to appop and also allowed backwards compatibility with pre23 flag. Introduced new action to manage write system settings as a new API and renamed the string that describes the managing of overlay permission. Change-Id: I939a95b9a8b1ae75bf67aa6d8190c92a8d2001d3
/frameworks/base/core/res/AndroidManifest.xml
|
32e80d7588720bdc9f8a3e961ac4566d7c80b2b9 |
|
06-Jul-2015 |
Jeff Sharkey <jsharkey@android.com> |
Permission to view shared storage for all users. Typical apps are restricted so they can only view shared storage belonging to the user they're running as. However, a handful of system components need access to shared storage across all users, such as DefaultContainerService and SystemUI. Since WRITE_MEDIA_STORAGE already offers this functionality by bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID which is no longer handed out to third-party apps. Then we change the FUSE daemon to allow the "sdcard_rw" GID to see shared storage of all users. Bug: 19995822 Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
/frameworks/base/core/res/AndroidManifest.xml
|
7e07288c7720001542182a4a70a5395015bcff1c |
|
04-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
am 0783b9a4: am ee987ce4: am 76664d9d: Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev * commit '0783b9a47ae682cc85a14284e79643b5087b8c9f': Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW...
|
fab8c63aa005af30fcb610d4f99c4ab3f7ac4876 |
|
03-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 5243632f: am 10f87f47: am 22233b51: Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev * commit '5243632f918169bd58e388db988454a16983e490': Remove the empty accounts group and not needed storage resources.
|
76664d9dcfbbe04c50a00ea1e268e80b9a9f6087 |
|
02-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev
|
de15edaa9bf486a4050bb067317d313fd807bb10 |
|
01-Jul-2015 |
Dianne Hackborn <hackbod@google.com> |
Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW... ...to an explicit toggle to enable in Settings Add a new permission flag, saying the permission can be automatically granted to pre-api-23 apps. Apply this to SYSTEM_ALERT_WINDOW. Change-Id: I24a0ceabe7e9f5e458a864d30eda2696ad14a699
/frameworks/base/core/res/AndroidManifest.xml
|
22233b51c3c3e678571dbe5e6d1035b7e1440408 |
|
01-Jul-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev
|
28aad8efe60d7d7c59d748ef50d8fe0118b9c323 |
|
30-Jun-2015 |
Billy Lau <billylau@google.com> |
am 67dfa491: am e4c3fd72: am f62f4c94: Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev * commit '67dfa49194cf91241ff791730bacb71e07530ef3': Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings.
|
f62f4c94a36f5c2f7ad3c70316dc585ea3fd721a |
|
30-Jun-2015 |
Billy Lau <billylau@google.com> |
Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev
|
ca2c590ba3d6de067c6b5cd820e6ee9319cbfeb7 |
|
29-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Remove the empty accounts group and not needed storage resources. bug:22044480 Change-Id: I76297f5540614301893871b3b41219002076b920
/frameworks/base/core/res/AndroidManifest.xml
|
2ce64b872d464209efefb6c74584d6ab1088d169 |
|
26-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 0678733a: am a9f79160: am 6cbf7928: Merge "Revert get accounts permission to normal for now" into mnc-dev * commit '0678733a525c6a785feb68a9a2004ff8c494c911': Revert get accounts permission to normal for now
|
a508bf8ba227c90e15fd7e6260264be4ccd1dcbd |
|
26-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Revert get accounts permission to normal for now Change-Id: I51efe557b69a50d85dc53ba7a1622b7bafc301e6
/frameworks/base/core/res/AndroidManifest.xml
|
cbe540f94691b595ca2eaede2871d885c38a845c |
|
25-Jun-2015 |
Billy Lau <billylau@google.com> |
Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings. Raised the protection level of SYSTEM_ALERT_WINDOW from dangerous to system|signature|appop. Added a new API in Settings for developers to invoke the main configuration setting. Also added a new metrics in MetricsLogger. Finally, also made changes to PhoneWindowManager to check the permission to draw overlay properly. Change-Id: I4a073e6f038b8b8d2fa5bd6ad60abda496be9701
/frameworks/base/core/res/AndroidManifest.xml
|
e072d842ec16eb82d933ef04d01f2d9005892293 |
|
26-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am e7fe26c9: am f513006c: am e171899a: Merge "Add JavaDoc for permission protection level" into mnc-dev * commit 'e7fe26c94b46b6e8b4860ceaba46b95584e38914': Add JavaDoc for permission protection level
|
71b6ca6d4325d7851030486bb4a080ecbc18c9a5 |
|
26-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add JavaDoc for permission protection level 1. Add the permission protection level in the java doc 2. Make some system permissions that are not mean to be used by third-parties system API. bug:21402257 Change-Id: Ic0ae8d6ca44dbbbf12848a9164acc0e908c90402
/frameworks/base/core/res/AndroidManifest.xml
|
9c58c651ceef19d9bf6352c59b309158cfa65fd2 |
|
24-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 4074a871: am 338ac4ac: am c5e43c50: Only current IME and spell checker can access user dictionary * commit '4074a871cbc109d4fd518413fc4e43ba3eea41a5': Only current IME and spell checker can access user dictionary
|
c5e43c508f415a72a77825ed260df60bdb048218 |
|
24-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Only current IME and spell checker can access user dictionary Change-Id: I6c5716d4d6ea9d5f55a71b6268d34f4faa3ac043
/frameworks/base/core/res/AndroidManifest.xml
|
b96d1f1e6979a91b9e35657cbfbee6acff3330ed |
|
24-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 242c1f33: am 4475dbca: am 2c99ea35: Merge "Remove not needed contacts related permissions." into mnc-dev * commit '242c1f333431b32445336faed18feb1a90ebd6e4': Remove not needed contacts related permissions.
|
caef842f35dae5c3aa2f0af7a27b0fbeee400912 |
|
24-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
am c62dafdf: am 05feded4: am 8144aa2e: Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev * commit 'c62dafdffc5a382b47d47d5aad528d8500eafb3b': Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS
|
2c99ea3524bba58f87a9fefad79aa136538b6e0e |
|
24-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Remove not needed contacts related permissions." into mnc-dev
|
6d2c0e5ee2f717d4a5c00df08aca21c76eea8278 |
|
23-Jun-2015 |
Svetoslav Ganov <svetoslavganov@google.com> |
Remove not needed contacts related permissions. This reverts commit ed5ff51b2ca7c051e2719dfc8a8a083e6208848e. Change-Id: If2407e4e474a438d95e1b7ad1aa6f441bb3ace08
/frameworks/base/core/res/AndroidManifest.xml
|
8144aa2e9a732be6ba66c385a590e07ec59c5f77 |
|
23-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev
|
f374a4bc2ad5c31f252c7d37104e1315a955daad |
|
23-Jun-2015 |
Adam Lesinski <adamlesinski@google.com> |
Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS Bug:22008542 Change-Id: Ifb4565ec8077e88596f0304328c083c7d1c9db04
/frameworks/base/core/res/AndroidManifest.xml
|
edfda6a1c8eed3be77b506ca84f045ae22ea465c |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
am 0623d635: am 2544da4c: am 1ef23ade: Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev * commit '0623d6359178df8861159f188df7645959866cd8': Revert "Remove not needed contacts related perissions."
|
1ef23adef84f8b0080f315aa9283a416737e2e34 |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev
|
ed5ff51b2ca7c051e2719dfc8a8a083e6208848e |
|
23-Jun-2015 |
Bart Sears <bsears@google.com> |
Revert "Remove not needed contacts related perissions." Broke the build, reverting. This reverts commit a2991da0d671adf511ccb884cf25bf1241303f92. Change-Id: I2bdfa70fbd8a6c03e48426f85eeb63896762d5da
/frameworks/base/core/res/AndroidManifest.xml
|
46e28423030178711bcaa34ebc2ed2a840246ce6 |
|
23-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 8bf62c7d: am 477bb484: am 2b5bec93: Merge "Remove not needed contacts related perissions." into mnc-dev * commit '8bf62c7d0ccda08ae5982d3bbf39b72ba327b2fc': Remove not needed contacts related perissions.
|
8baaf220e4a4f979328a5fdc1e8a1765f7a5a95b |
|
23-Jun-2015 |
Adam Powell <adamp@google.com> |
am 04333109: am f66c97b5: am 9f49dcda: Merge "Add voice interaction support to ResolverActivity/ChooserActivity" into mnc-dev * commit '04333109ce6ea332a9136fbdd69ca83b8f8e56e5': Add voice interaction support to ResolverActivity/ChooserActivity
|
2b5bec9356de159a216e5aec8d553e6da7078b72 |
|
23-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Remove not needed contacts related perissions." into mnc-dev
|
4c470d641c6906a742b63273b305695ba575b3e1 |
|
20-Jun-2015 |
Adam Powell <adamp@google.com> |
Add voice interaction support to ResolverActivity/ChooserActivity All options are sent to the VoiceInteractor once ChooserTargetServices have reported in. We don't perform explicit progressive refinement or filtering, but an explicit option picked will be invoked. Also fix a lingering bug around being able to nested-fling the resolver drawer closed. Bug 21516866 Change-Id: I6b141f5fa87d74dccec9dcb88110630696e9c38e
/frameworks/base/core/res/AndroidManifest.xml
|
a2991da0d671adf511ccb884cf25bf1241303f92 |
|
22-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Remove not needed contacts related perissions. Removing the read/write profile/social stream permissions as they are not needed anymore. These permissions are for accessing data nested in the conacts provider which is already guaded by the read/write contacts runtime permissions. The removed permissions would be in the contacts group which means they would not provide more protection compated to read/write contacts. Also removing the permissions voids the need for app op support for legacy apps. Removed deprecated APIs for social streams as these were deprecated and will go away in the next release. We want apps targeting M to not be able to compile if still suing these APIs to help with migration. Change-Id: I26ed9055847af7f92c78eb0f4ac8f9f1aa616fcd
/frameworks/base/core/res/AndroidManifest.xml
|
c71c4d56c522b9511ee7695b0a881fafb7c134d4 |
|
22-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
am 57f605f8: am a136f8d7: am c54bcade: Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev * commit '57f605f82b6ebf87bd9e7f2def4a082ab06a4556': New internal permission to protect apps against rogue Nfc message.
|
c54bcade1b7ec7e044aca7fe9c60357ad957a8c2 |
|
22-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev
|
9fe6c3805607ae407fa9f7f05bf4a5cb81454052 |
|
20-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 07247e48: am af4ace3d: am d8e247db: Make READ_EXTERNAL_STORAGE dangerous * commit '07247e482e63984bdeac02a47a15c67b3a6a2eb0': Make READ_EXTERNAL_STORAGE dangerous
|
d8e247db8cabe209966f4bfcb550637b45f18441 |
|
20-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Make READ_EXTERNAL_STORAGE dangerous We have a new storage permission group that has read and write external storage. However, read external storage is (not a regression) a normal permission while write is a dangerous one. This leads to cases where the user disables the Storage permission and apps still read form it. This change makes read external storage a dangerous permission. bug:21949045 Change-Id: I7e28f629dda6e9c1f70cb20a3d5bea74fb109890
/frameworks/base/core/res/AndroidManifest.xml
|
b8c0e7a85b64b4328b503893730bd0b642a7592d |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
am 64dba615: am a0a5dc5e: am 95499dcb: Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev * commit '64dba6159f83c6b91d3aa418d4229c9d1f581ac0': Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit
|
95499dcbb404d8e4d5575be7d5568115c35a639a |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev
|
8a1533ed2ea77b9f68dae84759b3376eafdc2fc8 |
|
20-Jun-2015 |
Hyunyoung Song <hyunyoungs@google.com> |
Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit b/21853008 Change-Id: If9c4e88fd2074de17814120d111546d6ecf58cf4
/frameworks/base/core/res/AndroidManifest.xml
|
1213487aa7dc32d392cb5f2489f0c76321f02430 |
|
19-Jun-2015 |
Rubin Xu <rubinxu@google.com> |
New internal permission to protect apps against rogue Nfc message. Bug: 19838376 Change-Id: Id23f6d14ce8d93988e4382ea0d0dc5c586456bf7
/frameworks/base/core/res/AndroidManifest.xml
|
172671b349062b6958ad1a6de6d1232c92b9f9e8 |
|
19-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
am 8a55a5ad: am 7c74c944: am 0b00db8e: Merge "create Wifi PNO ALARM intent" into mnc-dev * commit '8a55a5ade28ac4622a4ca2b60106280c23cd66e7': create Wifi PNO ALARM intent
|
5297c2fb7f6cc3e6e3421297856ec1c9450d0b4f |
|
19-Jun-2015 |
Todd Kennedy <toddke@google.com> |
am bd626dd9: am 24cd7b03: am f29c4a07: Merge "Add getPackageImportance() system API" into mnc-dev * commit 'bd626dd96d25033812e7d3aa528d63fafc96cb0d': Add getPackageImportance() system API
|
0b00db8eebd3b677c1d9190061d0d97dd672976e |
|
19-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
Merge "create Wifi PNO ALARM intent" into mnc-dev
|
f29c4a07f42eecb77fbd9acdcf61a26d3480c047 |
|
19-Jun-2015 |
Todd Kennedy <toddke@google.com> |
Merge "Add getPackageImportance() system API" into mnc-dev
|
69810483c770e99b65f4fd01ad1973885969062c |
|
18-Jun-2015 |
Todd Kennedy <toddke@google.com> |
Add getPackageImportance() system API Callers must have the permission GET_PACKAGE_IMPORTANCE Bug: 20642684 Change-Id: I6f3ef2ec810c884e0dee239e5909bcb314957302
/frameworks/base/core/res/AndroidManifest.xml
|
15d48a16f645509cb0c6a1f3abf52ddd233cd8b5 |
|
19-Jun-2015 |
Alan Viverette <alanv@google.com> |
DO NOT MERGE: Remove DayNight theme Do not go gentle into that good night, Old age should burn and rave at close of day; Rage, rage against the dying of the light. Though wise men at their end know dark is right, Because their words had forked no lightning they Do not go gentle into that good night. Bug: 21854466 Change-Id: I0b7cd116c23f7df88e94f31b3aee7dd22a102804
/frameworks/base/core/res/AndroidManifest.xml
|
b6ca937abeb145ec0e39073aaa72bfb769160704 |
|
18-Jun-2015 |
Pierre Vandwalle <vandwalle@google.com> |
create Wifi PNO ALARM intent Change-Id: I9bdae8ae37e30d36bf82b731468b8a157bb2862b
/frameworks/base/core/res/AndroidManifest.xml
|
9faad27a1e4f4005ca0cc9f017a4e5f56de5146b |
|
18-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
am 2cabb0da: am a4e0fca0: am b4c46909: Merge "Remove FRP wipe support for device initializers" into mnc-dev * commit '2cabb0da0c5b09f3736c61a7eea74ee947182702': Remove FRP wipe support for device initializers
|
b4c469095f12972ef04558961ddbdbdfe8305ccb |
|
18-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove FRP wipe support for device initializers" into mnc-dev
|
e981e00b14fc0bdf4906303c66eef3a125f33037 |
|
16-Jun-2015 |
Yorke Lee <yorkelee@google.com> |
am fc86e40d: am 8d308309: am a5f59258: Merge "Send broadcast when default dialer changes" into mnc-dev * commit 'fc86e40d9632366d05af4db8b56d6a85f4502710': Send broadcast when default dialer changes
|
107c4ce2ac9b76e7b4ed251fff8929958c5d3e63 |
|
15-Jun-2015 |
Yorke Lee <yorkelee@google.com> |
Send broadcast when default dialer changes Add hidden TelecomManager.setDefaultDialer for system apps to set the default dialer and trigger the broadcast Bug: 21846308 Change-Id: Ifdd30cd1323ab0157edf7fd966173b6c52df6ba0
/frameworks/base/core/res/AndroidManifest.xml
|
f8d6ce6aab07a83d99b50147aac464205eddd528 |
|
14-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 13fb3353: am 281c8389: am 6d977832: Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev * commit '13fb33535f93c8cd49650b398f5728938f90933b': Remove bookmarks provider and associated permissions - framework
|
6d9778328a3c3c9da525870fff606af8ac5e9529 |
|
14-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev
|
b299f8d984548874493909b6623ec3bed6d95efd |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 986506c4: am f4c6f135: am 7f55b008: Merge "Revert write secure settings permission protection level." into mnc-dev * commit '986506c42a9565acd73d28020b461c0a95fddefd': Revert write secure settings permission protection level.
|
353d0ef9358df95ffe42afb591905347da48a4e2 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Revert write secure settings permission protection level. bug:21619456 Change-Id: I31212d3677b74fbf26b2d9eb222a2a8132de2271
/frameworks/base/core/res/AndroidManifest.xml
|
53e5a05378919c4b4ac04d9dee745ecfda008393 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am ede23cfe: am 9b53c26b: am 033a68fe: Lower protection level of WiFi state change permissions. * commit 'ede23cfe868641da64d91a9cd8cf940e07eab1c1': Lower protection level of WiFi state change permissions.
|
887b2d6989589bb83f3eb9929d32db14a137c442 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 5289bc37: am ab32fe21: am 6f918b2f: Merge "Add new storage permission group" into mnc-dev * commit '5289bc37688f4e0b570c197184feadd37d3d4deb': Add new storage permission group
|
32c00bbbdbbd633c2ea8834e3a2f8c6569251e1a |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am ea1ac5ea: am b4e3c87f: am 55fd0a70: Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev * commit 'ea1ac5ea97c188b59bf57100306da80e8d789b49': Bump up the protection level of the CLEAR_APP_CACHE permission
|
c27407e1adbd7ab8f34a6da4f9c85bb31370e514 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 1891eb8e: am cdf20eac: am 592d3d35: Merge changes Ic643bc07,I4bef927b into mnc-dev * commit '1891eb8e6a3eeb2394c6eb2343da42bb7e925606': Lower protection level of the dangerous Bluetooth permissions Update sensors permission group name string
|
033a68fe2739aac89bded94bb4ca99473050bcd7 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of WiFi state change permissions. bug:21724236 Change-Id: Ib2305bf8a6be62fe6b00d9bccc7685100edba9ba
/frameworks/base/core/res/AndroidManifest.xml
|
bfa216ac261dd3c5035ad38795650ce5f4ce6fb7 |
|
05-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Remove bookmarks provider and associated permissions - framework Change-Id: I7f5a2f14a12da473f05a5075d98e762f8f8ed970
/frameworks/base/core/res/AndroidManifest.xml
|
6f918b2f92ece0ba7904262fc1fd0b50cf746a6c |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add new storage permission group" into mnc-dev
|
55fd0a702d5bb346efb3a149b3cbaba4dc5952b2 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev
|
592d3d35a6ae4eee0645bf92bc8cf4ab9d0d9b7b |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge changes Ic643bc07,I4bef927b into mnc-dev * changes: Lower protection level of the dangerous Bluetooth permissions Update sensors permission group name string
|
a83d3eaf05dd7b29362aa7897628a67c4428eb65 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Bump up the protection level of the CLEAR_APP_CACHE permission This permission guards only hidden and system APIs, hance it should be signatureOrSystem protection level. Change-Id: I8d2b75167c6887a285af0b494c39b4ffea2f0cbf
/frameworks/base/core/res/AndroidManifest.xml
|
d81897d0232e4629340a541bf6ffb8dcfae0fd52 |
|
12-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of the dangerous Bluetooth permissions bug:21594947 Change-Id: Ic643bc0768b0fc9adcc3e07661ee34fa59f4ec35
/frameworks/base/core/res/AndroidManifest.xml
|
1d2bd010ecd0399fd1992c00fffd1b0ac1cbafaf |
|
12-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am e6f426a1: am fe216ddd: am b3c134e1: Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev * commit 'e6f426a109aff7b081f9dc59722cee80c1092e91': Revert "Revert "Permissions: Fix account related permissions.""
|
b44339776a434cbfd65f0c5b7186347fad37f2dd |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
am 7e2bbad7: am 486d4283: am 02184244: Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev * commit '7e2bbad7f9feac0a484bb59afcc711ddde3b314e': Change to add STK_PERMISSION for stk related commands.
|
6b4450bcf8ca2a7fddc3dfe4ecfd2fddad04bcf9 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am f68b581c: am 9c9ebccd: am d0041e5f: Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev * commit 'f68b581cb0687fb1b40258ea526d1154df311bee': Revert "Permissions: Fix account related permissions."
|
b3c134e1614e02471811a43d12bedcfc5778667b |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev
|
6eb73a577850a4b6ddb06fd746f09a6c1d124f34 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Revert "Permissions: Fix account related permissions."" This reverts commit dcddc476651deb72a27798de56eef584e5be5d32. Change-Id: Ie2402167fc7cd3d5e57bf2fba704fdf00cfcb4fe
/frameworks/base/core/res/AndroidManifest.xml
|
02184244dcd0149252676bbf24c6d9a5c9ebfd5b |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev
|
d0041e5f474f4e795d6bc9e5eeaec4098949897c |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev
|
dcddc476651deb72a27798de56eef584e5be5d32 |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Revert "Permissions: Fix account related permissions." This reverts commit ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814. Change-Id: I4c62b1b5a5bd4e2a5fac76244a16730526ed67fc
/frameworks/base/core/res/AndroidManifest.xml
|
59acd140b6e3165767ec5a11a16779bc9e220def |
|
11-Jun-2015 |
Amit Mahajan <amitmahajan@google.com> |
Change to add STK_PERMISSION for stk related commands. Bug: 21697171 Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
/frameworks/base/core/res/AndroidManifest.xml
|
db6ac98ec375f388d4815fe405201e9649a003f8 |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885" into mnc-dev
|
9fb3c8826ceb2c1b7d93c7c151ec5f39f26c9e1d |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885 Instead, move it to GSF: ag/700092 SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider that stores sync feeds for 1p apps (Gmail, Claendar, etc). The sync feeds are used for delivering and processing GCM tickle-to-sync messages. These permissions should not be used by 3rd parties but if they were, this change will break them. I don't know the reason these were not in GSF and 'signature' to begin with. If someone does, please, comment. Change-Id: I6c4e4c774fea12c7fe7082477c210ad75f007c66
/frameworks/base/core/res/AndroidManifest.xml
|
afd71a8fb6cca37c8ba874b941be8944b0224e3f |
|
11-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
am 2e2d22a2: am e262829d: am ffb46022: Permissions: Fix account related permissions. * commit '2e2d22a20e7eb8216fa299a1b9b4f8ef98078021': Permissions: Fix account related permissions.
|
2e8beb5d40a7ed56ea4adb80b1a8b7efbf06567e |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
am 6c5acdbc: am 7ff09f2b: am 77b2d49a: Merge "Remove device initializer status messages" into mnc-dev * commit '6c5acdbc938bc9ee989fb36b8ace7f91b3bfbc1b': Remove device initializer status messages
|
79b71e71962a2993de517f8a9695e685cc7a7da5 |
|
29-May-2015 |
Georgi Nikolov <geonik@google.com> |
Remove SUBSCRIBED_FEEDS permissions from framework b/20220885 Instead, move it to GSF: ag/700092 SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider that stores sync feeds for 1p apps (Gmail, Claendar, etc). The sync feeds are used for delivering and processing GCM tickle-to-sync messages. These permissions should not be used by 3rd parties but if they were, this change will break them. I don't know the reason these were not in GSF and 'signature' to begin with. If someone does, please, comment. Change-Id: I22b5233893df7f0c6db41ed7d4e878722bd412f0
/frameworks/base/core/res/AndroidManifest.xml
|
ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814 |
|
09-Jun-2015 |
Carlos Valdivia <carlosvaldivia@google.com> |
Permissions: Fix account related permissions. Requires updating the docs in AccountManaager as well as the logic in AccountManagerService. MANAGE_ACCOUNTS, USE_CREDENTIALS, and AUTHENTCATE_ACCOUNTS are going away. Where AUTHENTCATE_ACCOUNTS was required we now do signature matching. GET_ACCOUNTS is kept but has been grouped under contacts. Bug: 20136477 Change-Id: Iabbb76dce8d1efc607c1f107911d7ddab598a481
/frameworks/base/core/res/AndroidManifest.xml
|
09ad6bfe9619ff7a61209131f1f3182d53d840d0 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove FRP wipe support for device initializers - Remove ManagedProvisioning NFC parameter key from DevicePolicyManager - Remove wipeIfAllowed from PersistentDataBlockManager Bug: 21558883 Change-Id: I59354b7bb1ef7e0b0346ff9a7d1654780231dff0
/frameworks/base/core/res/AndroidManifest.xml
|
77b2d49abb38fafb91fb99ce603a92f189553cd7 |
|
11-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Remove device initializer status messages" into mnc-dev
|
ee7fb4d6832e894dfc31db3ec977fda4df29cbaf |
|
11-Jun-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add new storage permission group bug:21730509 Change-Id: If098def755417a90f50328f83d5b419d9e73f120
/frameworks/base/core/res/AndroidManifest.xml
|
3c0e6d9ebfb4406f421788ca3c33953f9ff242fe |
|
11-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 47db7221: am 0525c07f: am 75a0ee08: Merge "Add system API to watch for permission changes" into mnc-dev * commit '47db7221685aaa12926abc42198069c733491cfc': Add system API to watch for permission changes
|
f7c06eb03ab4479b9d0656a23a4733d17e995183 |
|
11-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add system API to watch for permission changes Change-Id: I1ce450a59fb326c14848f46732d877dea33f33c7
/frameworks/base/core/res/AndroidManifest.xml
|
6e48b76640a6c3eaa24c7b727f1e61387387936d |
|
08-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
am e89f9d8a: am ac4c704b: am 383ce580: Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev * commit 'e89f9d8af721d2be7369f9c361cfa566f6a24757': MidiManager: proxy all requests to open devices through MidiService
|
383ce580b1c9e706d1b06a23d81986f3b4ed83fb |
|
08-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev
|
8a3188e8ea63ea646f43524c5b632e214da9c1c9 |
|
08-Jun-2015 |
John Spurlock <jspurlock@google.com> |
am 202dea41: am 5e73a085: am 20ac61b8: Merge "Zen: New user flow for requesting DND access." into mnc-dev * commit '202dea4125f189e242da71c1378699321882671b': Zen: New user flow for requesting DND access.
|
add777bd54575449587fcdee0db0cb832f4b6873 |
|
08-Jun-2015 |
Martijn Coenen <maco@google.com> |
am de6294b0: am 2812397f: am 6280481a: Merge "Remove NFC CardEmulation dynamic resource APIs." into mnc-dev * commit 'de6294b0a20de4b4c0fcd20fc1a491c636e3462c': Remove NFC CardEmulation dynamic resource APIs.
|
20ac61b8c0abd5af4ce32707e01cc1a501cbb7f0 |
|
08-Jun-2015 |
John Spurlock <jspurlock@google.com> |
Merge "Zen: New user flow for requesting DND access." into mnc-dev
|
7c74f78a85283912d7239214024ccca702622f21 |
|
04-Jun-2015 |
John Spurlock <jspurlock@google.com> |
Zen: New user flow for requesting DND access. - User flow is now similar to requesting access to notification content, namely prompting the user to visit a settings page for enabling/disabling apps access. - New ACTION_NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED intent for apps to listen to this state change. - Removed obsolete request method and associated internal callback aidl. - Added new android.permission.ACCESS_NOTIFICATION_POLICY permission for apps to include as a signal that they want to request this access (and therefore appear in the list on the settings page). - Improve javadocs, outline the user flow in NotificationManager#isNotificationPolicyAccessGranted and link to this method elsewhere. - NoManService now persists the user-enabled package list across reboots and does so per-user. - Rename public settings intent to correspond with the noman api. Bug: 21621663 Change-Id: I72cbc21cd736e6a157b6be5d1d0ba0b4a8e7ef4e
/frameworks/base/core/res/AndroidManifest.xml
|
a2344eac370b38263d7f17a7e9802cc9a017eb3a |
|
05-Jun-2015 |
Martijn Coenen <maco@google.com> |
Remove NFC CardEmulation dynamic resource APIs. No longer needed. Bug: 21343778 Change-Id: I5188c4bc819146861d346f3f4339f002b7173027
/frameworks/base/core/res/AndroidManifest.xml
|
e0a6ca64fac5bd4f10139321604031816e90adb4 |
|
04-Jun-2015 |
Mike Lockwood <lockwood@google.com> |
MidiManager: proxy all requests to open devices through MidiService Previously when a MidiManager client opened a virtual or Bluetooth device, the client bound directly to the virtual device's MidiDeviceService or BluetoothMidiDevice's IMidiDeviceServer for the given BluetoothDevice. Only USB devices were opened in MidiService. Now opening any type of MIDI device is done via IMidiManager.openDevice() or IMidiManager.openBluetoothDevice(). MidiService tracks all connnections between clients and devices. Services that implement virtual devices must now require android.permission.BIND_MIDI_DEVICE_SERVICE so only MidiService can bind to these services. Bug: 21044677 Change-Id: I7172f7b1e0cbfe4a2a87dff376c32dc9b41aa563
/frameworks/base/core/res/AndroidManifest.xml
|
982c0d9d4d289b733d574b2b36e69a5858a090d5 |
|
02-Jun-2015 |
Amith Yamasani <yamasani@google.com> |
am 9984f181: am 52f26b63: am ff3b76d0: Merge "Temporarily whitelist an app for network during doze" into mnc-dev * commit '9984f181c5d0ed933837e548a97729ae81b5e4dd': Temporarily whitelist an app for network during doze
|
ff3b76d04672d09214cd0ceb29ec548c8abb2330 |
|
02-Jun-2015 |
Amith Yamasani <yamasani@google.com> |
Merge "Temporarily whitelist an app for network during doze" into mnc-dev
|
5288d74d4109d65ff90536fcd636b040596a45d8 |
|
02-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
am 5d8e4aba: am bbf5b460: am acbe426b: Merge "Add accidentally deleted strings." into mnc-dev * commit '5d8e4abaf3775627cd8451254e56b0e439c291c2': Add accidentally deleted strings.
|
af575b9f8e1b59be9c8862b6a65c0dcb88145a23 |
|
30-May-2015 |
Amith Yamasani <yamasani@google.com> |
Temporarily whitelist an app for network during doze API to allow an app to be whitelisted for network and wakelock access for a short period. So even if the device is in idle mode, such apps can be given a chance to download the payload related to a high priority cloud-to-device message. This API is meant for system apps only. A new permission CHANGE_DEVICE_IDLE_TEMP_WHITELIST is required to make this call. Bug: 21525864 Change-Id: Id7a761a664f21af5d7ff55aa56e8df98d15511ca
/frameworks/base/core/res/AndroidManifest.xml
|
240e64828f68064b2a1074a1dda1fc41fe19d711 |
|
02-Jun-2015 |
Craig Lafayette <craiglafa@google.com> |
Remove device initializer status messages - Remove ManagedProvision Bluetooth extras from DevicePolicyManager - Remove ManagedProvisioning device initializer status action and extras from DevicePolicyManager. - Remove DIA status update protected-broadcast and permission - Remove DPM.sendDeviceInitializerStatus method Bug: 21559093 Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
/frameworks/base/core/res/AndroidManifest.xml
|
5f79d8282d593daec7071765f7ca60a24a4ad3c5 |
|
02-Jun-2015 |
Svetoslav <svetoslavganov@google.com> |
Add accidentally deleted strings. Change-Id: I16d7c151b46c076bfdccb1ff0b2bcb0934eedf93
/frameworks/base/core/res/AndroidManifest.xml
|
f4efdfc51f316049508c957ec54e81f7a3099297 |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
am 98bc46d1: am 701ea8b5: am 8d38a8d8: Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev * commit '98bc46d13a523efaf06eae6ddaeb9100d15006a2': Deprecate {READ,WRITE}_PROFILE permission
|
6f51e48dfb4777a31ca5bb1086a6070d573a53fe |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 6e520470: am 73e74be1: am 63428ccd: Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev * commit '6e5204701142b3e1281824ced1ab41813a8c4072': Add a normal permission guarding the installer UI - used for stats tracking
|
8d38a8d84f3c6ee81db9e6aa38492a7ce7766206 |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev
|
63428ccde7e925ceb94aa40e933b3d51954a7797 |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev
|
86877e44f054facb535b29b8db7fda8c543bc245 |
|
28-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Add a normal permission guarding the installer UI - used for stats tracking bug:2147009 Change-Id: Id020eaf7b852de43966f4ab8231e3f7046e66542
/frameworks/base/core/res/AndroidManifest.xml
|
b97df269b5c44dc6aed70bdff156cd70ee394fbb |
|
28-May-2015 |
Brian Attwell <brianattwell@google.com> |
Deprecate {READ,WRITE}_PROFILE permission Now that *_PROFILE permissions are in the same permission group as *_CONTACTS, these permissions have no visible impact on the user. However, they complicate developer's lives and prevent us from using Context#grantUriRequest(). Bug: 21090207 Change-Id: I31e6ae7b0f49c3589071f6a95f8d69a9456c144d
/frameworks/base/core/res/AndroidManifest.xml
|
79965b35fdf832ed00c8fcd0029e3682adf6470f |
|
28-May-2015 |
Svetoslav <svetoslavganov@google.com> |
am 28917b1e: am 713f4c32: am b2849d9a: Merge "Allow priv apps to get local mac address" into mnc-dev * commit '28917b1e51049175f63b2084f4ec6b7e75a82f04': Allow priv apps to get local mac address
|
59ffbc46f3274b7178d4c41f0060522e38152c28 |
|
27-May-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow priv apps to get local mac address Change-Id: I550847cedd5a407c9424778e483b525d4b97e46d
/frameworks/base/core/res/AndroidManifest.xml
|
854cf72d266cfa772d045edb44f17b8d054ea568 |
|
20-May-2015 |
Jorim Jaggi <jjaggi@google.com> |
am 9ae0100c: am b599c1ea: am d6bd9da8: Lower fingerprint permission protection level * commit '9ae0100c767eac741de61b7dbce321108cec679e': Lower fingerprint permission protection level
|
d6bd9da8efaae7bdf806dbe32bc711b0aed7f500 |
|
20-May-2015 |
Jorim Jaggi <jjaggi@google.com> |
Lower fingerprint permission protection level Bug: 21307136 Change-Id: Iafdb42c6a82b27a5297ad14ffaa289b14fffad23
/frameworks/base/core/res/AndroidManifest.xml
|
a0a060dbc21e3ff93a7cebb51154d41af10a89cc |
|
19-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am cbe0916e: am e7896371: am f7b541ff: Merge "Do not report WiFi and Bluetooth MAC addresses - framework." into mnc-dev * commit 'cbe0916ebff2fc32d5a28fbd5bba9f0c3da1ae86': Do not report WiFi and Bluetooth MAC addresses - framework.
|
408abf7f1bec3253675d0225300d7ee39481d286 |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Do not report WiFi and Bluetooth MAC addresses - framework. As a part of the new runtime permissions work we are limiting the PII apps can access. BT and WiFi MAC addresses are PII and based on our research there is no valid use case for app dev to get these addresses aside of user tracking which we are trying to limit. bug:21078858 Change-Id: Ib48223b272c0fd4f5c36acc889d4f44df204b309
/frameworks/base/core/res/AndroidManifest.xml
|
86e86a77fc46ba08b8115058b16a4ff622e8bea6 |
|
17-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 11fe86ae: am a4f7ea55: am 321f0157: Hide platform platform legacy permissions behind a menu option - framework. * commit '11fe86ae6e30a4e642b9c7255af21c522334a147': Hide platform platform legacy permissions behind a menu option - framework.
|
321f01574e523dd680090694ea22e38b83a7c2b3 |
|
17-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Hide platform platform legacy permissions behind a menu option - framework. bug:21195624 Change-Id: I563c448e2abd7d33070ed2d8f62ba1b60a3744e8
/frameworks/base/core/res/AndroidManifest.xml
|
0bf27e9b0438a41c00a1713e0efb0f43dbfa0415 |
|
16-May-2015 |
Zach Johnson <zachoverflow@google.com> |
am 85f82784: am 4b197204: am a80282a7: Merge "Create unified BIND_CARRIER_SERVICES permission" into mnc-dev * commit '85f82784f88a6bd2a94ee5bf44b8d105bcb1671b': Create unified BIND_CARRIER_SERVICES permission
|
cdaaa91f7c67b2c56f17d5512f015c7c25c7c351 |
|
14-May-2015 |
Zach Johnson <zachoverflow@google.com> |
Create unified BIND_CARRIER_SERVICES permission Replace BIND_CARRIER_MESSAGING_SERVICE and BIND_CARRIER_CONFIG_SERVICE since we don't really need one permission for each carrier service type. Deprecate BIND_CARRIER_MESSAGING_SERVICE since it already shipped, but remove BIND_CARRIER_CONFIG_SERVICE since it hasn't. b/21165906 Change-Id: I716f3f1c98a228afcfee84cf4a48911f0736ce8c
/frameworks/base/core/res/AndroidManifest.xml
|
fb8026a8d9b239fe168a62e832e959d538b7e69f |
|
14-May-2015 |
Jaesung Chung <jaesung@google.com> |
am 614cb6f2: am 393fc7f0: am f5edb20a: Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev * commit '614cb6f2f0f01a35cab72e29d8c361f92d3208f2': TIF: Add DVB device handling to TvInputManagerService
|
4d78a792f636fa09f49e389965048c558ab14227 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
am 0cc30270: am 606e9e1c: am ad0bfe3a: Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev * commit '0cc30270274cfab889d0f710a426e95911824355': Add BIND_TELECOM_CONNECTION_SERVICE permission
|
f5edb20ae90ab9a817c8cf23b5a0d21fe8c80e2a |
|
14-May-2015 |
Jaesung Chung <jaesung@google.com> |
Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev
|
ad0bfe3ae2f056a568c6256614079e6f31f5d542 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev
|
58739e758428f3b880f8e67161f57c59aa06d496 |
|
24-Apr-2015 |
Jaesung Chung <jaesung@google.com> |
TIF: Add DVB device handling to TvInputManagerService Added an API to pass an open file descriptor of DVB devices and addressed the security issue of setting the permissions on DVB devices to 0666. Bug: 20436120 Change-Id: I4649e76084f3356ec22b7e776fb87c6a8fdc00d6
/frameworks/base/core/res/AndroidManifest.xml
|
4ec301faace5802797d860707d97cb29045a3ef4 |
|
14-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 59a49c03: am a82e4878: am 67b7ec28: Merge "Access mock location is no longer a runtime permission - framework" into mnc-dev * commit '59a49c0309e9cec01e33be07de74e3c530efa07f': Access mock location is no longer a runtime permission - framework
|
249c12e7b88fc7799c1b5e1eaf72429fc6aa56a2 |
|
14-May-2015 |
Yorke Lee <yorkelee@google.com> |
Add BIND_TELECOM_CONNECTION_SERVICE permission Bug: 21088342 Change-Id: I465307899d83c4a3ee5e88a28554c4b867c1f4ba
/frameworks/base/core/res/AndroidManifest.xml
|
f7e9cf4fb48ea80cbc5088204ac3f898109623f7 |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Access mock location is no longer a runtime permission - framework The access mock location is no longer a runtime permission. It is a signature protected one that apps cannot get but the fact they request it means they want to inject location into the system. Now the user gets to choose the current mock location app in developer options from the apps that request the mock location permission. The access to mock location is no longer guarded by the permisson but from a new app op which is off by default and the settiings UI sets it to enabled only for the currently selected mock location app. bug:21078873 Change-Id: I19e3f9dc7c7de82eab46b30fec1abfbca54a0e59
/frameworks/base/core/res/AndroidManifest.xml
|
a1948682df1115aaf84920e018c7ca7739f6368f |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 129df089: am de69b559: am 20cb37c6: Merge "Lower protection level of permissions of permissions" into mnc-dev * commit '129df08914de2678fd9381ebfb2e19796d4679d5': Lower protection level of permissions of permissions
|
b467330b14fcd14f21e13c4dfeff97914e45cfbb |
|
13-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Lower protection level of permissions of permissions Permissions ACCESS_NETWORK_STATE, INTERNET, NFC, DISABLE_KEYGUARD do not lead to unrecoverable damage and do not lead to PII leaks, hence they do not meet the bar to be runtime permissions and we are lowering their protection level. bug:21078873 Change-Id: I30c8e742d6a69474171994b65ce070068402ae47
/frameworks/base/core/res/AndroidManifest.xml
|
6102ad4678b19b0e1a2900f8e421fb3a7890c8e3 |
|
11-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
am 05f62d9d: am 50c21067: am 11a1086f: Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev * commit '05f62d9d0b4055b6344ca8c11683e0d85cdc2247': Improve javadoc on android.permission.PACKAGE_USAGE_STATS
|
11a1086f69abafc17e4fc6db38622d126a1a7ecc |
|
11-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev
|
763e170f58fb2f2221f615c7802521f7627039df |
|
06-May-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Improve javadoc on android.permission.PACKAGE_USAGE_STATS Bug: 20642656 Change-Id: Ib0cedee487950dab16134edd383ce5bd5374ff65
/frameworks/base/core/res/AndroidManifest.xml
|
a39b5ff076523d216cde0d9faa801cefa6272039 |
|
09-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
am 8bc22f52: am 85dbc345: am 4f434a04: Merge "Remove restrictions PIN functionality" into mnc-dev * commit '8bc22f521872d64af1c61c1d0845ae562cc5cb8f': Remove restrictions PIN functionality
|
4f434a04708e7a254afe2e0d362f715229dc15d1 |
|
09-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Merge "Remove restrictions PIN functionality" into mnc-dev
|
4cf355d209a2c159e2ab3e8e7405dec981ee5aa2 |
|
07-May-2015 |
Jeff Brown <jeffbrown@google.com> |
am 37d66f3b: am 8d605030: am ee2e8fbe: Merge changes from topic \'mr\' into mnc-dev * commit '37d66f3bccdde61517308b8d034484abbe82c36b': Replace WIFI_DISPLAY_SETTINGS with CAST_SETTINGS. Revert "Initial draft of new MediaRouter APIs."
|
c05c1aeedf44b7019b6749758dffc03df7632225 |
|
05-May-2015 |
Jeff Brown <jeffbrown@google.com> |
Revert "Initial draft of new MediaRouter APIs." This reverts commit 1a937b04e63539cb1fab1bde601031d415c7156f. Bug: 20641986 Change-Id: I035d945d1561e5fc7c914aa9362635f763c83cfd
/frameworks/base/core/res/AndroidManifest.xml
|
ef24909d84db9d5aefb825ee1556089fcdcc1678 |
|
06-May-2015 |
Fyodor Kupolov <fkupolov@google.com> |
Remove restrictions PIN functionality Bug: 20852231 Change-Id: I5666ee28ff1341ead9b258bc0852d8ba6d313c5e
/frameworks/base/core/res/AndroidManifest.xml
|
558283e606aada276958517cc96814dd8abb2f37 |
|
06-May-2015 |
Alan Viverette <alanv@google.com> |
am 52796c28: am 39a96908: am 809d5d7f: Merge "DayNight theme for framework packages" into mnc-dev * commit '52796c28d580cfbbf398c90f48c1e06aca9ca7b1': DayNight theme for framework packages
|
b9da280ac20091673878f3c4b04c65d0510ba23d |
|
05-May-2015 |
Alan Viverette <alanv@google.com> |
DayNight theme for framework packages Change-Id: I745f90561c957c83540e75a2886e294633c83be1
/frameworks/base/core/res/AndroidManifest.xml
|
b0a09de8192cce008daff192a18d68040bf1ddbc |
|
05-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
am 4e2029c0: am 2514a265: am 4a64b19f: Merge "Permission UI - legacy apps support" into mnc-dev * commit '4e2029c058966f30a71b1bcea16aa65a5d7f85c4': Permission UI - legacy apps support
|
019d2304998f3ed77c0a608df6cf4bea1138f8dc |
|
04-May-2015 |
Svet Ganov <svetoslavganov@google.com> |
Permission UI - legacy apps support Change-Id: Id3f98c138422d33868363d587dd196898b42a0d4
/frameworks/base/core/res/AndroidManifest.xml
|
37ba44112c519bb055fcac2efebfb0a6e16d5cc0 |
|
01-May-2015 |
Zheng Fu <zhengfu@google.com> |
Add permissions to read/write contacts metadata Bug: 20537162 Change-Id: I5e12857e62635fccec52447404363bf0f1507594
/frameworks/base/core/res/AndroidManifest.xml
|
0b4daca9ba54b7252ea8c159218391380eb00c8a |
|
27-Apr-2015 |
Dianne Hackborn <hackbod@google.com> |
Implement user-settable power save whitelist. The whitelist is now maintained by DeviceIdleController, which is moving out into its own independent system service. Network stats now queries it for the whitelist, instead of collecting that itself. Also did a few improvements in alarm manager -- made the code for moving alarms out of the pending list more robust, and fixed the debug output to always print the contents of the pending list even if we aren't in a pending state. (That would have helped me identify the problem much earlier.) Change-Id: I0f7119d4c553c3af4d77b2f71246fa6e2c13c561
/frameworks/base/core/res/AndroidManifest.xml
|
e9d766a312b766a16155872cfae796b4979dce9e |
|
29-Apr-2015 |
Yorke Lee <yorkelee@google.com> |
Make BIND_INCALL_SERVICE and BIND_CONNECTION_SERVICE public These system|signature only permissions must be required by an InCallService and ConnectionService respectively. Bug: 20304458 Change-Id: I26156afb610a7f549c0a1a7c01c2096928ef33a7
/frameworks/base/core/res/AndroidManifest.xml
|
cd895cdf4dd98b4271e24742a6a46be70cda6382 |
|
25-Apr-2015 |
Etan Cohen <etancohen@google.com> |
Merge changes from topic 'mwd-merge-042415' * changes: Rename removeVideoCallListener to unregisterCallback Bluetooth document fix: remove reference from open API to hidden entities Fix build due to merge of 7595842 and renaming due to 8eb87f0 Merge commit '052a0da' into merge2 Merge commit 'db1dbb8' into merge2 Merge commit '7e5e791' into merge2 Merge commit '170102d' into merge2 Merge commit '4cb5d80' into merge2 Merge commit '83cda00' into merge2 Merge commit 'c91bc62' into merge2 Merge commit 'cffc360' into merge2 Merge commit '7f61051' into merge2 Merge commit '167c3a7' into merge2 Merge commit '4467b98' into merge2 Merge commit '25a217c' into merge2 Merge commit '04b18ec' into merge2 Merge commit '7595842' into merge2 Merge commit '2bbd2b6' into merge2 Merge commit '4890351' into merge2 Merge commit 'cd405fe' into merge2 Merge commit '6ddbb5e' into merge2 Merge commit 'de93575' into merge2 Merge commit '9561e74' into merge2
|
a179962b61a9c41e8859ce642471928f1ad33c60 |
|
24-Apr-2015 |
Etan Cohen <etancohen@google.com> |
Merge commit '25a217c' into merge2 Change-Id: I116a9dbf19e95651a7c50393e4dcd7fb59ca3f3f
|
4bc704655abee70c1998b9a62777cdf643920467 |
|
24-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Merge "Add ability to get and set idle state of apps"
|
cf76872a62075abf9008e99ca08413fb70761dc2 |
|
24-Apr-2015 |
Amith Yamasani <yamasani@google.com> |
Add ability to get and set idle state of apps Add am shell command to set and get idle Add public API to check if an app is idle Bug: 20534955 Bug: 20493806 Change-Id: Ib48b3fe847c71f05ef3905563f6e903cf060c498
/frameworks/base/core/res/AndroidManifest.xml
|
2806374f9531490296547d4e884ce9163f4ac867 |
|
08-Jan-2015 |
Nicolas Prevot <nprevot@google.com> |
Restrict setting the profile/device owner with a signature-level permission. Create the new permission MANAGE_PROFILE_OWNERS to restrict setting the profile/device owner. BUG:19838376 Change-Id: Ib55a2db85fcb6f34e3b88c398683bddb0ad66868
/frameworks/base/core/res/AndroidManifest.xml
|
dc105cc91c63c27479d73a21702cd4ba0304acc4 |
|
15-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Enable system service to notify device owners about pending update Create a DevicePolicyManager API which can be used by OTA subsystem to tell device owners about pending updates. Device owners will get a callback from its DeviceAdminReceiver when the update service sends out such notifications. Bug: 20213644 Change-Id: Ifcc755655e4f441980cf77d76175a046112ca9ae
/frameworks/base/core/res/AndroidManifest.xml
|
8abf680e007a378c2828fe43ed8d71131390ec2e |
|
20-Apr-2015 |
Martijn Coenen <maco@google.com> |
Add NFC APIs for dynamic resources. For new Tap & Pay settings UX. Change-Id: I55ff4e4d4a4b6d26c3c88d96431c4f14d0963323
/frameworks/base/core/res/AndroidManifest.xml
|
4eb6a36922f5e98fe181c0326cc5721f0e7589ca |
|
02-Apr-2015 |
Andrei Kapishnikov <kapishnikov@google.com> |
Introduced DO_NOT_ASK_CREDENTIALS_ON_BOOT flag A new flag for DPM.resetPassword() method that specifies that the device should be decrypted without asking for the password or pattern. Bug 19250601 Related CL in Settings App: https://googleplex-android-review.git.corp.google.com/#/c/670206 Change-Id: I9ca3472dc18e66e618ff772dee16ca4a450e9997
/frameworks/base/core/res/AndroidManifest.xml
|
17e11fad0a6272dd750427e2e4cb9810e67b6dec |
|
21-Apr-2015 |
Erik Kline <ek@google.com> |
Final removal of CONNECTIVITY_ACTION_IMMEDIATE. Since the demise of the connectivity change delay, CONNECTIVITY_ACTION_IMMEDIATE has been sent out back to back with CONNECTIVITY_ACTION. Interested parties should watch for CONNECTIVITY_ACTION. Bug: 20013379 Change-Id: I072dddf95adb3bbd17fa1f7159d4ea848ade8f19
/frameworks/base/core/res/AndroidManifest.xml
|
97e2f7d5afebb107a8c2c65a094ae4426bbe701b |
|
21-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Merge "Rename public OTA policy APIs in DevicePolicyManager"
|
5faad8e4cdf04211239f076b5d073e26d0ae3207 |
|
20-Apr-2015 |
Rubin Xu <rubinxu@google.com> |
Rename public OTA policy APIs in DevicePolicyManager Use the term "SystemUpdate" instead of "OTA", in public DevicePolicyManager APIs that handle OTA policies. Bug: 19650524 Change-Id: Iebdaea91337d617147cb411b6f47e0f3fae8671c
/frameworks/base/core/res/AndroidManifest.xml
|
6c589570c44752d96f35620de271ccae7d32502d |
|
17-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Remove unnecessary WRITE_SMS permission - framework Currently only one app can write to the SMS provider and it has to be set as the default SMS app by the user in the UI. The default SMS app is set by enabling the write SMS app op for it and keeping this op off for other SMS apps. Hence, this permission does not guard anything and can be taken out. The API change is fine as if an app refers to the permission in the manifest as string it will be ignored and if it was referred in Java the value is statically compiled in the source. Change-Id: I1128c3b034e6c7dda4baa051500ac1ef46a53575
/frameworks/base/core/res/AndroidManifest.xml
|
8fcd5fee60b468c36aee337da0cadad3cd8cf4cd |
|
16-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Lower protection level of access mock location permission"
|
9a1c9b67c4b2426884deb60c1ff84130ab47333c |
|
25-Feb-2015 |
Jonathan Basseri <misterikkit@google.com> |
Adding Carrier Config API. UICC privileged carrier apps will extend CarrierConfigService to provide carrier-specific configuration. Apps/services will use CarrierConfigManager to read the current configuration. CarrierConfigManager also defines the set of configuration variables and their default values. Bug: b/19483786 Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
|
25a217c0fbda9bbaf58ec08b91115e99f73b727f |
|
28-Feb-2015 |
Paul Jensen <pauljensen@google.com> |
Add captive portal API. This API allows apps other than the system's CaptivePortalLogin to handle signing in to captive portals. bug:19416463 Change-Id: I27fce5856b635233e6ff66396d50ccabedd76cf5
/frameworks/base/core/res/AndroidManifest.xml
|
3031bf961103ecc1caa32449a3cdb95575042278 |
|
25-Feb-2015 |
Jonathan Basseri <misterikkit@google.com> |
Adding Carrier Config API. UICC privileged carrier apps will extend CarrierConfigService to provide carrier-specific configuration. Apps/services will use CarrierConfigManager to read the current configuration. CarrierConfigManager also defines the set of configuration variables and their default values. Bug: b/19483786 Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
/frameworks/base/core/res/AndroidManifest.xml
|
df0db7fe83bfab2926e098a5198f43be299d0632 |
|
15-Apr-2015 |
Ben Gruver <bgruv@google.com> |
Merge "Don't verify signatures in ConfigUpdateInstallReceiver"
|
7f24225e5e363613eb4f5027d07c32a9acf457f3 |
|
14-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Lower protection level of access mock location permission The ACCESS_MOCK_LOCATION permission is gated by a secure setting toggled in developer options by the user. Hence, there is no need for getting yet another consent from the user for accessing it. Change-Id: Ica1a72f587a712d7da7c00cfc4a8ca228064286e
/frameworks/base/core/res/AndroidManifest.xml
|
1441fc73e87fed4d5df84e5e19c14c2a4307b23b |
|
14-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Mark the SUBSCRIBED_FEEDS_READ/WRITE permissions removed. These permissions are definded by the platform to protect the subscribed feeds provider which is not in the system, neither is its contract specified in the system. Both the contract and the implementation of the provider are in GmsCore. Hence, this permissions shuld be declared by GmsCore, not the system. Until GmsCore adds the permissions we have to keep this as removed but present in the implementation to keep apps that use the provider working. bug:20192150 Change-Id: I3f38b01a159bb430c30948b14de7cdaf5cb50772
/frameworks/base/core/res/AndroidManifest.xml
|
8027a4ffc285ba39df3a262abfff1cfdd6dd31db |
|
10-Mar-2015 |
Rubin Xu <rubinxu@google.com> |
Add setOtaPolicy/getOtaPolicy API in DPMS Allow device owners to set OTA policy for automatically accept/postpone incoming OTA system updates. This class only provides the setting and getting of OTA policy, the actual OTA subsystem should handle and respect the policy stored here. Bug: 19650524 Change-Id: I9b64949fab42097429b7da649039c13f42c10fd1
/frameworks/base/core/res/AndroidManifest.xml
|
12964bf5dd36d13fc25efef7c7175a677f9490a5 |
|
06-Apr-2015 |
Ben Gruver <bgruv@google.com> |
Don't verify signatures in ConfigUpdateInstallReceiver Instead, require the intent sender to hold the new system-or-signature UPDATE_CONFIG permission. An application holding this permission is now responsible for verifying the integrity/source of an update, before sending it to one of the ConfigUpdateInstallReceiver subclasses. Bug: 8949824 Change-Id: I0925051c1dcef312b8508fb34927150ffbc346f9
/frameworks/base/core/res/AndroidManifest.xml
|
ef8fcb52dc887603b8a08f9bd97c7d4917a00081 |
|
13-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Send device initializer status."
|
dbe31a6616f2e8cb8436ea235149d076302fb793 |
|
02-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Send device initializer status. - Create method in DevicePolicyManager to send device provisioning status to ManagedProvisioning. - Define status updates used by ManagedProvisioning. Bug: 20001077 Change-Id: Ia98fc765d1ebb2ba9680636ca15c2c870d160261
/frameworks/base/core/res/AndroidManifest.xml
|
61a4dd5c6677048fcbcbdf2de402649dba50bbeb |
|
09-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
First pass on the new permission grouping. 1. Defining the new permission groups and moving relevant permissions to these groups. 2. Removed some permissions that were guading ... nothing and old permission groups. 3. Removing unnecessary comments for siganture and system permissions as they are no surfaced to the user. Change-Id: Ibd7e6bb22b3559a4febb37c39326350eeb4285bd
/frameworks/base/core/res/AndroidManifest.xml
|
caa41648f4e3cecc1996447396aabc4e394b8fd0 |
|
10-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Merge "Allow only system signed apps to grant permissions at install"
|
805b63e253c139625f5a86d72ef7b31d6ec9f8e9 |
|
10-Apr-2015 |
Svetoslav <svetoslavganov@google.com> |
Allow only system signed apps to grant permissions at install bug:20099946 Change-Id: Ifcc5c6638b4174ffb3ba452ae68a5a53b2d1ff0a
/frameworks/base/core/res/AndroidManifest.xml
|
2a91bbfb4d19c7262abc063b3c0c0349059311d5 |
|
10-Apr-2015 |
Craig Lafayette <craiglafa@google.com> |
Merge "Reset protection in PersistentDataBlockManager"
|
66445a639dc134d09393f5069b7683ec36d4cd07 |
|
27-Mar-2015 |
Craig Lafayette <craiglafa@google.com> |
Reset protection in PersistentDataBlockManager Add method to allow authorized data block wipe in support of factory reset protection. This will allow ManagedProvisioning to respond to and pass factory reset protection challenges during automated device setup. - Adds the wipeIfAllowed method to clear the data block - Creates a protected-broadcast to send to allowed package Bug: 19792435 Change-Id: I897f2ea2afb1222a1fc8ac49290ee45ea4d3f2d7
/frameworks/base/core/res/AndroidManifest.xml
|
4870e9d5eba59fb257a87f97f1adf0b734cf48d3 |
|
09-Apr-2015 |
Dianne Hackborn <hackbod@google.com> |
More work on device idle mode and other power stuff. Add idle mode support to the alarm manager. Introduce a new concept of flags associated with alarms to tell the alarm manager how to treat the alarm -- they allow everything from the alarm that will bring us out of idle mode, to alarms that are allowed when idle or should also bring us out of idle. The standalone boolean is now also a flag. (Note there is currently no protection from user space setting the flags however it wants; I will be working on that in a follow-up change.) When in idle mode, the alarm manager pushes all alarms that shouldn't execute during that time over to a separate list that is not executed until out of idle. To help with this, I reworked a bit how Alarm objects are managed, so that when rebatching or moving between lists we don't have to allocated new objects but can just use the same existing instance. Also tweaked the sync manager to deal with idle mode, which currently just means doing the same thing as when low on storage -- turning off sync. Add new ACTION_CHARGING and ACTION_DISCHARGING broadcasts that apps can listen for to know when the device is actively charging and discharging. These are better than the old POWER_CONNECTED and POWER_DISCONNECTED ones because we only report charging when we actually see that there is enough power being provided to charge the battery (and will report discharging if there is not enough power). The job controller uses these new actions for scheduling jobs that want to run while plugged in. Removed the "stable charging" stuff while doing so, since the new charging state serves as an even better signal for that. Introduced two new process states: FOREGROUND_SERVICE and TOP_SLEEPING. This will allow us to treat foreground services specially (such as still allowing network access to them for background music playback) while not mixing them together with whatever happens to be the top activity while the device is asleep. Also some other small cleanup here and there. Change-Id: I7a9808b578bad6f50deb8e1baf919298512a0d3a
/frameworks/base/core/res/AndroidManifest.xml
|
25e12abc5b8a4aa83cfa150094fd145b777e6e03 |
|
02-Apr-2015 |
Jorim Jaggi <jjaggi@google.com> |
Add ability to start voice interaction session directly Add internal API's for SystemUI to start a voice interaction session directly, without using an intent. Make the assist gesture use that ability, if available. Change-Id: I88ce3c7514714eb45666884847193585a07417a9
/frameworks/base/core/res/AndroidManifest.xml
|
885b3ef519e5b0b67a896fb6693925b9b2fd22c6 |
|
02-Apr-2015 |
Santos Cordon <santoscordon@google.com> |
Merge "New generic intent for SIM Activation"
|
15a13781ad17bbc7e8ddbbad4d0c208f0fae615e |
|
01-Apr-2015 |
Santos Cordon <santoscordon@google.com> |
New generic intent for SIM Activation New hidden intents and permissions for a generic SIM-activation activity. New activity will handle generic SIM setup requests and then delegate to the appropriate activation method (OTASP, HFA, CARRIER_SETUP). Change-Id: I1b22200544abefe486ec961b67a6e77b4d15aec3
/frameworks/base/core/res/AndroidManifest.xml
|
095d99904579a5231d974a2447661c10a8eb621b |
|
01-Apr-2015 |
Ruben Brunk <rubenbrunk@google.com> |
Merge "Add CameraService to system server."
|
9d21ee5d7755755cc5695a9d7cea00a05a4b92aa |
|
21-Mar-2015 |
Ruben Brunk <rubenbrunk@google.com> |
Add CameraService to system server. - Adds a camera service to system server that forwards events to the mediaserver camera service. - Notify the camera service when the device user changes. Bug: 19186859 Change-Id: I172a2ce46c8e8a131ae7e8dd99d60c5f4f0d6668
/frameworks/base/core/res/AndroidManifest.xml
|
cea283535cfecc81565c07597d8db2674e76578a |
|
31-Mar-2015 |
Neil Fuller <nfuller@google.com> |
resolved conflicts for merge of 962a11ad to master Change-Id: I8c6ac62d7267629c019997bb343d863aa56264eb
|
efd92907898161efe466889d2229e4acde2e973c |
|
31-Mar-2015 |
Neil Fuller <nfuller@google.com> |
am 25c5296b: Merge "An updater for all timezone data on a device" * commit '25c5296b0d85979ad216195000b857dce8127ab1': An updater for all timezone data on a device
|
1c1b47125da018b44240739db75f8898e064a948 |
|
20-Nov-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Add IntentFilter auto verification The purpose of this feature is to prompt the Disambiguation dialog to Users as less as possible. - add the new "autoVerify" property to the IntentFilter class - add new APIs to PackageManager: verifyIntentFilter(int, int, List<String>), getIntentVerificationStatus(String, int), updateIntentVerificationStatus(String, int, int), getIntentFilterVerifications(String) for supporting IntentFilter verification - add support for multi-user - update PackageManager for IntentFilter verification: basically when we are installing a new package, ask for verification of all domains from the IntentFilters that have the "autoVerify" to true. This means that the PackageManager will send a well defined protected broadcast (with a new INTENT_FILTER_NEEDS_VERIFICATION action) to an IntentFilter verifier to do the real job of verification. We are passing in the broadcast Intent all the necessary data for doing the verification. The PackageManager will receive as response the result code of the domain verifications and, if needed, the list of domains that have failed the verification. - add a new INTENT_FILTER_VERIFICATION_AGENT permission that needs to be set by an intent filter verifier to be considered as a trustable party by the PackageManager. - add also a new BIND_INTENT_FILTER_VERIFIER permission for securing the binding between the PackageManager and a service doing the intent filter verifications. - add ResolveInfo filterNeedsVerification which is a boolean to knows if the IntentFilter is of a type that needs a verification (action VIEW, category BROWABLE, HTTP/HTTPS data URI) - add new "domain-preferred-apps" / "d" dump command for listing the prefered Apps for all domains - add new "intent-filter-verifiers" / "ivf" command for listing the IntentFilterVerifier used - introduce the IntentVerificationService which is a basic service for verifying IntentFilters. This service will send HTTPS requests to the domain declared in the IntentFilter(s) for doing the verification. This service has a low priority level so that it can be replaced by a more sophisticated one if needed. This service is updating the PackageManager intent verification states thru the updateIntentVerificationStatus(...) API. - update MockPackageManager Change-Id: I0bfed193d0bf1f7c7ac79f6c1b160b7ab93b5fb5
/frameworks/base/core/res/AndroidManifest.xml
|
5a680f2e2738137f1566da57ac978b3ff33fb0da |
|
13-Mar-2015 |
Neil Fuller <nfuller@google.com> |
An updater for all timezone data on a device The existing one, being deleted here, did not work properly: it only updated the file used by libcore and bionic, it did not update the ICU data. Most of the installation logic exists in code in libcore/tzdata that is independent of the server code so that it can be tested. Bug: 19941636 Change-Id: Id0985f8c5be2f12858ee8bf52acf52bdb2df8741
/frameworks/base/core/res/AndroidManifest.xml
|
a223d658306fea5c0a6d30c9850058d5afadb2d1 |
|
25-Mar-2015 |
Bryce Lee <brycelee@google.com> |
am 3309be5e: am 21b7e6de: am c831b978: Merge "Add isScreenBrightnessBoosted and a broadcast when underlying value changes." into lmp-mr1-modular-dev * commit '3309be5e7bc782d89adaf4abca5f1f81649c655f': Add isScreenBrightnessBoosted and a broadcast when underlying value changes.
|
9c5dfa5c79fff17f96bf977b86c0c9ceb8c3cf9b |
|
23-Feb-2015 |
Zoltan Szatmary-Ban <szatmz@google.com> |
Data Usage public API Added new API consisting of android.app.usage.NetworkUsageManager and android.app.usage.NetworkUsageStats. Through them data usage on a network interface can be programmatically queried. Both summary and details are available. Bug: 19208876 Change-Id: I0e0c4b37ae23ad1e589d4b0c955b93f28ba4333e
/frameworks/base/core/res/AndroidManifest.xml
|
84d6c0fbf6e513d68330234503b809751d0e3564 |
|
17-Mar-2015 |
Bryce Lee <brycelee@google.com> |
Add isScreenBrightnessBoosted and a broadcast when underlying value changes. Bug: 18334219 Change-Id: I20051e97633017711574a063b8061f95c3b616c5
/frameworks/base/core/res/AndroidManifest.xml
|
6597e3435f8abfedbb9a4f1bfb10cc17ea7f38bf |
|
17-Feb-2015 |
Christopher Tate <ctate@google.com> |
Notification listener backup & restore We now back up & restore the set of enabled notification listeners. Post- restore, a listener that had been enabled on the ancestral device will be enabled on the current device as soon as it's installed, matching the user's previous configuration. After this has happened the enable/disable state for that app is not "sticky"; disabling it again will work as expected. The infrastructure for accomplishing this is general: it can be leveraged by any ManagedServices derivative. There's a bit of extra wiring in the settings provider to support the restore-time information flow as well. This is because ManagedServices -- like many other parts of the system -- monitors writes to the settings provider and does work in response to new writes of the elements that it cares about. Unfortunately this means that there is no way to use the BackupAgent's restoreFinished() hook to post- process the restored data: by the time it is run, the ManagedService's observers have already executed and culled any unknown components from the description that was just pushed into settings. As of this patch, the settings provider's restore logic knows that a particular settings element will require a message to interested observers about the restore-driven change. The message is delivered as a broadcast, and is sent after the new value has been committed to the settings db. Adding other system ManagedService handling that parallels this will only require adding a new corresponding entry to the table of individual settings for which the relevant "this settings element is being restored" broadcast is sent, found in SettingsHelper. (It isn't sent for all settings elements because very few settings elements have semantics that require it; 3rd party code won't be running yet during platform restore anyway; and sending up to hundreds of broadcasts during setup & restore is far from ideal.) Bug 19254153 Change-Id: Ib8268c6cb273862a3ee089d2764f3bff4a299103
/frameworks/base/core/res/AndroidManifest.xml
|
b9a5e4ad30c9add140fd13491419ae66e947809d |
|
04-Mar-2015 |
Dianne Hackborn <hackbod@google.com> |
Add new debug feature to automatically create heap dumps. Not yet working, unless you turn off SELinux enforcing. We need to update SElinux to allow the system process to give apps access to /data/system/heapdump/javaheap.bin. Currently watching can only be enabled through the shell, such as: adb shell am set-watch-heap com.android.systemui 1024 The last number is the process pss size in bytes, so this is asking us to warn if it goes about 1K which will be all the time. Change-Id: I2089e5db2927afca0bf01a363c6247ee5dcb26e8
/frameworks/base/core/res/AndroidManifest.xml
|
e30c9af3566cfa14796144b352230709c7b5647d |
|
28-Feb-2015 |
Adam Powell <adamp@google.com> |
Add ChooserTargetService API A ChooserTargetService can be implemented by apps that wish to offer additional deep-link targets for the system intent chooser to in turn offer to the user. This allows apps to create contextually relevant shortcuts for UI flows that would otherwise require several steps of explicit disambiguation. For example, a chat app might offer one-touch access to recent conversations when sharing a photo to it from elsewhere. The chooser implementation must limit the number of ChooserTargetServices it elects to query in order to respect available system resources. Only the system chooser is permitted to bind to a ChooserTargetService. Change-Id: Ia7e075ee649c51cf2035f20aee166c5a27d91aeb
/frameworks/base/core/res/AndroidManifest.xml
|
73570db59f9178cf3a8affe943e96808ac404049 |
|
27-Feb-2015 |
Christopher Tate <ctate@google.com> |
Use scheduled job rather than periodic alarms for key/value backups Instead of a runs-forever periodic alarm that drives key/value backup passes, we instead schedule-on-demand a trigger job that will kick off the pass after a batching interval. The key semantic change is that we now never wake for key/value backup work unless we've been explicitly asked to do so. We also use a rather longer batching interval than was previously the case. Bug 19536032 Change-Id: Ie377562b2812c9aeda0ee73770dfa94af6017778
/frameworks/base/core/res/AndroidManifest.xml
|
ba67aee02cf864793129976cd8a8a46e60c60577 |
|
21-Feb-2015 |
Jim Miller <jaggies@google.com> |
Add fingerprint settings support to the framework - cleanup thread issue and simplify native FingerprintService methods - add new permissions and enforce them - add fingerprint hardware detection API Change-Id: I87c2243ea2412061f1e85b044138480d0161bcdf
/frameworks/base/core/res/AndroidManifest.xml
|
cfb3185a27efeb9312ddf71f52f3a7039c4694df |
|
25-Feb-2015 |
Filip Gruszczynski <gruszczy@google.com> |
am 0fbcc708: am 1e74b5d6: Merge "Burn in protection." into lmp-mr1-modular-dev * commit '0fbcc7086fe742e641915ed5f097119d01613cb5': Burn in protection.
|
d2e8640c2c1972d4f2e92d48660fa9e17d9291c4 |
|
19-Feb-2015 |
Filip Gruszczynski <gruszczy@google.com> |
Burn in protection. Bug: 19373758 Change-Id: I7242f73acadd21bdee03262b4205c8af0734fccb
/frameworks/base/core/res/AndroidManifest.xml
|
98a0b38819acab3c6068663435cdaeed5a69d4db |
|
27-Jan-2015 |
Mike Lockwood <lockwood@google.com> |
AndroidManifest.xml: Remove two obsolete protected broadcasts android.media.action.USB_AUDIO_ACCESSORY_PLUG and android.media.action.USB_AUDIO_DEVICE_PLUG were removed in a previous change. Change-Id: I22d09b9a0eb4f6f29a31a50ed8bfa7e09c52b064
/frameworks/base/core/res/AndroidManifest.xml
|
5f86b66c9bd9276f31255fc372631e532dd5d974 |
|
06-Jan-2015 |
Dianne Hackborn <hackbod@google.com> |
am 24bc8d76: am 29807195: Merge "Fix issue #18901214: APR: Frequent crash in android" into lmp-mr1-dev automerge: d17218e * commit 'd17218e7df24da8a2bcf6e7714dc0151155c3286': Fix issue #18901214: APR: Frequent crash in android
|
b182955a1eabc30d3cf70856f838b46a91c34569 |
|
05-Jan-2015 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #18901214: APR: Frequent crash in android The ShutdownActivity was implemented in the system server code, which is no longer part of the boot class path. This would work fine when requesting a shutdown from the primary user, since in that case the activity would be loaded in to the main system process which also has the system service code loaded. However, when executed from a secondary user, we need to spin up a new system process for it; that system process is just a regular app process, without the system service code, so *boom*. To fix this, move ShutdownActivity to the framework jar. Change-Id: Icb831cd6ed619da5feede5605c45ef177a892fbc
/frameworks/base/core/res/AndroidManifest.xml
|
a0973778ca5d67e13149ee8ad46a916663fe3d48 |
|
09-Dec-2014 |
Jing Zhao <zhaojing@motorola.com> |
am 8d50d0fb: am 23ad6efb: am df1d07b4: Add checking to find AppDirectedSmsProxy for App Directed SMS feature * commit '8d50d0fb27c1958dbd047bb8a46d7183d873f131': Add checking to find AppDirectedSmsProxy for App Directed SMS feature
|
8b3f47b35a303ed21bf41162d2979843d50e6039 |
|
09-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
am 673f443f: am 695b5d25: am 0752da22: Merge "add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE" into lmp-mr1-dev * commit '673f443f7e92956399c322b31a14178436fa723b': add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE
|
df1d07b4c77bcc8928b2e5360440aa9b69a6cd21 |
|
05-Dec-2014 |
Jing Zhao <zhaojing@motorola.com> |
Add checking to find AppDirectedSmsProxy for App Directed SMS feature Adding new system permission android.permission.CARRIER_FILTER_SMS Bug: 18609762 Change-Id: I80a133653101cd4ec1793e726faf3601e2970224
/frameworks/base/core/res/AndroidManifest.xml
|
981344861cdea72580964d6936dcf2e2dd9ff439 |
|
05-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
add system|signature protection to android.permission.BIND_CARRIER_MESSAGING_SERVICE Bug: 18005911 Change-Id: Iacb16a20c5cef4a55be0187af0a47e0cb82b409b
/frameworks/base/core/res/AndroidManifest.xml
|
412766a7d6e7b208cd347f90a776d3aff2fd2e2f |
|
04-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
am 29ac679f: am dba26aa2: am 109ec376: Merge "new SMS/MMS carrier app API" into lmp-mr1-dev * commit '29ac679f9f85a68eca03c262e740d62f8af66797': new SMS/MMS carrier app API
|
109ec376da86de1275f73fa432d6344431a457e9 |
|
04-Dec-2014 |
Cheuksan Wang <edwang@google.com> |
Merge "new SMS/MMS carrier app API" into lmp-mr1-dev
|
008dfadb31f58efbd7bd99b3d3e5d6ee21d68c05 |
|
02-Dec-2014 |
Mike Lockwood <lockwood@google.com> |
Remove obsolete AudioManager audio dock plugged Intents We have no code that listens for AudioManager.ACTION_ANALOG_AUDIO_DOCK_PLUG and AudioManager.ACTION_DIGITAL_AUDIO_DOCK_PLUG Change-Id: I96a746c84e5a4b17df1b9fbdbb5de77e6bc39714
/frameworks/base/core/res/AndroidManifest.xml
|
b72eb97e4bca1e4fd68e79f9d04e9a6a15aebd21 |
|
22-Nov-2014 |
Cheuksan Wang <edwang@google.com> |
new SMS/MMS carrier app API Changes based on api council review BUG: 18005911 Change-Id: I23bd207ce70f7fa201d6d964c1700cfc44cb009b
/frameworks/base/core/res/AndroidManifest.xml
|
8f70a2558b44f8ad56eb48eeadc4ec3ba698cd34 |
|
25-Nov-2014 |
Andres Morales <anmorales@google.com> |
am ffc71028: am 83f4847f: am 59093d92: Merge "Define permission for system apps to query size of block" into lmp-mr1-dev * commit 'ffc710281c38aba9546d200a25d6b19b0f85470a': Define permission for system apps to query size of block
|
6b0c7acd7f175552d90d1d73b9717ff347158e7d |
|
24-Nov-2014 |
Andres Morales <anmorales@google.com> |
Define permission for system apps to query size of block Allows ManagedProvisioning to determine whether there's a challenge and thus whether to disable NFC provisioning. Other implementation option: new hidden boolean API method. Can't think of benefit of new API method "isBlockInUse", other than doesn't leak PDB size and is more explicitly tied to the use case. Open to either impl if anyone has opinions on the matter. Bug: 18508767 Change-Id: I28d2eb5a0837ff85cb91f140b17ce1dd843fe9d6
/frameworks/base/core/res/AndroidManifest.xml
|
c79924f7412d527f640595bc2ad9f2ab631e83b7 |
|
18-Nov-2014 |
Jeff Davidson <jpd@google.com> |
am b431a198: am e6bc5adf: am e0cb56b0: Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev * commit 'b431a198ec255be7efb30b4c81a779a4eb5009f6': Enforce VPN control "permission" with an actual permission.
|
e0cb56b02eb2bb52a537b32c5d3f5360b9718c8a |
|
17-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Enforce VPN control "permission" with an actual permission." into lmp-mr1-dev
|
e3435feed48ecd1f37904f48ebb7e39dc9456d03 |
|
14-Nov-2014 |
Abhijith Shastry <ashastry@google.com> |
am 0f064207: am 530f25d6: am fb8db1c8: Merge "new sms/mms carrier app API" into lmp-mr1-dev * commit '0f0642075e42f415d7f5244c5d94fe726756afa0': new sms/mms carrier app API
|
fb8db1c84b7fd59f596a6c090a8035fab08ef2f5 |
|
13-Nov-2014 |
Abhijith Shastry <ashastry@google.com> |
Merge "new sms/mms carrier app API" into lmp-mr1-dev
|
f9c50c45c615338bf9bfe57cd1ecff490051c997 |
|
22-Oct-2014 |
Cheuksan Wang <edwang@google.com> |
new sms/mms carrier app API BUG: 18005911 Change-Id: Ib961badc1ccac270f1244f8d971d9abec324b73f
/frameworks/base/core/res/AndroidManifest.xml
|
bc19c181c8c058c824e4fee907a05129e142c388 |
|
11-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Enforce VPN control "permission" with an actual permission. The current implementation uses a whitelist of package names. Use a system|signature permission instead of rolling our own security and add that permission to the existing set of whitelisted packages (SystemUI and VpnDialogs). In addition to being less of a security risk (using well-known methods like Context.enforceCallingPermission rather than manually querying PackageManager and checking UIDs for package names), this enables other system-privileged apps to control VPN as needed per the below bug. Bug: 18327583 Change-Id: I38617965c40d62cf1ac28e3cb382c0877fb1275d
/frameworks/base/core/res/AndroidManifest.xml
|
3b54b6d78ccb653bcb7a24f55cdf0ac1b999ead9 |
|
11-Nov-2014 |
Alan Viverette <alanv@google.com> |
am cf7f3b6b: am a9b503ae: Merge "Fix Material styling in remaining dialogs and layouts" into lmp-mr1-dev automerge: 0aaebd4 * commit 'cf7f3b6be252f313536e58cc62763075d4f45e5a': Fix Material styling in remaining dialogs and layouts
|
f89b58ca834de833fe45130f49270b3743240b2e |
|
11-Nov-2014 |
Alan Viverette <alanv@google.com> |
Fix Material styling in remaining dialogs and layouts Also updates existing row and dialog layouts to use preferred list item or dialog padding as appropriate, fixes incorrect activity themes, and updates ChooseAccountActivity variants for Material. BUG: 18314215 BUG: 18292562 Change-Id: I2fde4ba6db80d839104abdaa334a46ad1861600f
/frameworks/base/core/res/AndroidManifest.xml
|
12fc80b2b207612f58fa057b8372bef3f32c9d29 |
|
10-Nov-2014 |
Evan Charlton <evanc@google.com> |
am 13cf9cf1: am 3caf6fc7: Merge "Apply @hide / @SystemApi to android.telecom.*" into lmp-mr1-dev automerge: e2e649f * commit '13cf9cf1d3f426d82a2af46c36bdf308ff43d428': Apply @hide / @SystemApi to android.telecom.*
|
0e094d926c306c3667bcdf6f23c52cc7181f25f3 |
|
09-Nov-2014 |
Evan Charlton <evanc@google.com> |
Apply @hide / @SystemApi to android.telecom.* Move the android.telecom.* namespace back to @hide, and also mark it with @SystemApi so that system-privileged apps can use them. Bug: 18302450 Change-Id: I33ae1b9b0dfdb1c5eff51ca3c829196bcfc9411c
/frameworks/base/core/res/AndroidManifest.xml
|
3527aa01cdb35f4bfad4e2f5b062c1a47838b224 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
am fb68a976: am dd40ccf3: am b42bdef5: Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev * commit 'fb68a9762087a262146eec5d0e0d3fbdbdf25b6b': Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED.
|
b42bdef51c5a4de44333ad268f25df1aac5ab880 |
|
05-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED." into lmp-mr1-dev
|
161977998feebf0a855ea56558464470877040cf |
|
04-Nov-2014 |
Jeff Davidson <jpd@google.com> |
Rename BROADCAST_SCORE_NETWORKS to BROADCAST_NETWORK_PRIVILEGED. This is necessary/desired for two reasons: 1. UX around network scoring shipped with L despite lacking underlying platform support. We do not want network scoring applications to trigger this UX on L devices, and therefore we must break the contract of what defines a network scorer so that apps build against the new contract don't trigger the old UX. 2. As a start towards generalizing the term "score" for a potentially broader role in the future, though that role is very much undefined. Bug: 18160480 Change-Id: If228977513e32e45bc44dbeda24aa18436fdfca6
/frameworks/base/core/res/AndroidManifest.xml
|
71a4f2129f33df6a4ef1efeb00af0f449aae2d45 |
|
03-Nov-2014 |
Santos Cordon <santoscordon@google.com> |
am 082f4978: am 04f3eebe: am 27be7b35: Merge "Split Telecom PhoneAccount registration permissions." into lmp-mr1-dev * commit '082f49786ec25b254992781a5ad3c67e75ceb8ee': Split Telecom PhoneAccount registration permissions.
|
2ef87ee728e7ac76c9199f0b75c96835991c0ceb |
|
31-Oct-2014 |
Santos Cordon <santoscordon@google.com> |
Split Telecom PhoneAccount registration permissions. Bug: 18106506 Change-Id: Ic825b44c2dc42709073a3990f6a7ca8e372025e9
/frameworks/base/core/res/AndroidManifest.xml
|
b2dda6903131d7534fc2e92d0049f05821f36210 |
|
28-Oct-2014 |
Evan Charlton <evanc@google.com> |
am 4d4b2cfd: am 2ad5eb53: Merge "Move telecom permission to the public API" into lmp-mr1-dev automerge: 8e25057 * commit '4d4b2cfd4c611800787b71d0896c6d8781875732': Move telecom permission to the public API
|
cef5a5404a7c61667883cc1fdff842355bc511e9 |
|
25-Oct-2014 |
Evan Charlton <evanc@google.com> |
Move telecom permission to the public API Make REGISTER_PROVIDER_OR_SUBSCRIPTION and REGISTER_CONNECTION_MANAGER part of the public API so that they can be used by third-party apps. Bug: 18114695 Change-Id: I1b8578cbc82e95ea78b4a2166f4a23650a0c375f
/frameworks/base/core/res/AndroidManifest.xml
|
be11d12462c800d3a7770b2871b1c31128f688fd |
|
20-Oct-2014 |
Wink Saville <wink@google.com> |
am f9bec04d: am f4d86a1d: am f44628e3: am 6bacccbf: Merge "Radio Capability Support." into lmp-sprout-dev * commit 'f9bec04d89ce6270d71b738be341f3e443abcce5': Radio Capability Support.
|
2af2d57d578e0c3a2740628e7c6336b19961cc49 |
|
18-Oct-2014 |
Wink Saville <wink@google.com> |
Radio Capability Support. New design of capability switch for L. Add new RIL requests: RIL_REQUEST_GET_RADIO_CAPABILITY RIL_REQUEST_SET_RADIO_CAPABILITY RIL_UNSOL_RADIO_CAPABILITY These commands allow the framework to communicate what the Radio Capabilities for each logical modem has or should be using. It can support 2/3/4G switch and has flexible architecture to support future technology. Change-Id: Iedf7f608d2ba3c06a883500f2d85abb98e69d9c1
/frameworks/base/core/res/AndroidManifest.xml
|
0e8b697f2348a317c5eeaee9b6342d6089c4675c |
|
18-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
am 76e3689b: am 438723e6: am a801d349: am 9621b793: am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev * commit '76e3689b45189902a85b06de22053cfa5d25a1cd': Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
|
9621b79396303037a86eb2639035b12080c858bf |
|
18-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
am e4e3fcec: Merge "Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions" into lmp-dev * commit 'e4e3fcec415cdc9739f32ce1eaaec67666e5454d': Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions
|
65d241b92db36e8f14d08efc6f35a91481b0d73d |
|
17-Oct-2014 |
Yorke Lee <yorkelee@google.com> |
Make READ_VOICEMAIL/WRITE_VOICEMAIL system permissions Bug: 18020724 Change-Id: I5a0e5ef8a1e40ee23f4b132f5877b63a738e776e
/frameworks/base/core/res/AndroidManifest.xml
|
fa72516ac9cf6eeb3a08711c7cf35e31479d5a7d |
|
14-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
am ed454542: am 38e48c2f: am 3547c13e: am 097c8d60: am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev * commit 'ed4545423b0166f2436adee077d11b85b62ed07a': Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
|
097c8d60115a9207ba4140ef99766741a2256361 |
|
14-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
am 1901e175: Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev * commit '1901e175079e3b7242ace7d4b3ec38af3723f91b': Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem.
|
1901e175079e3b7242ace7d4b3ec38af3723f91b |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Merge "Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem." into lmp-dev
|
59a24d6ca9a888b90a1b8ae348b79359d205da78 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 4dd24730: am b3bab92e: am 0a4e2245: am 8ca4886e: am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev * commit '4dd247305f4e4f3b3a7a9f52a8d1a9c6641391f3': Change RECEIVE_BLUETOOTH_MAP permission to signature or system
|
8ca4886e439685fdcb1eff4c3552a62522ebeeb0 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
am 317f9ce8: Merge "Change RECEIVE_BLUETOOTH_MAP permission to signature or system" into lmp-dev * commit '317f9ce85a492a213b8f1dac477b1aefad55f621': Change RECEIVE_BLUETOOTH_MAP permission to signature or system
|
5742335cbdb1c84a88a8ed12240316271fbb0f25 |
|
13-Oct-2014 |
Amit Mahajan <amitmahajan@google.com> |
Change protectionLevel for READ_PRECISE_PHONE_STATE from dangerous to signatureOrSystem. Bug: 17952946 Change-Id: I4a75da11cb092ca795d0eacf824890eb12c7446a
/frameworks/base/core/res/AndroidManifest.xml
|
6e383350e4e06b31b885812c5d9df82761a41269 |
|
13-Oct-2014 |
Mike Lockwood <lockwood@google.com> |
Change RECEIVE_BLUETOOTH_MAP permission to signature or system Bug: 17954105 Change-Id: I8b16cab7193c97e5f54d6e4ef33ebf8cda0da197
/frameworks/base/core/res/AndroidManifest.xml
|
a3bfb7808409d06182e8a4e0a9b3bb70da55bf8d |
|
08-Oct-2014 |
Dan Sandler <dsandler@android.com> |
am d23fa0f6: am 97a7fbfb: am 621fa30c: am 9eef8749: am 2200f86f: All (er, L) is finally revealed. * commit 'd23fa0f65077ba83d7b9b24805096f2b4532b9da': All (er, L) is finally revealed.
|
9eef8749232c00afad5ca3c26736c0be785cb8c1 |
|
08-Oct-2014 |
Dan Sandler <dsandler@android.com> |
am 2200f86f: All (er, L) is finally revealed. * commit '2200f86f800876d005f911e6864708fa9772d03a': All (er, L) is finally revealed.
|
2200f86f800876d005f911e6864708fa9772d03a |
|
06-Oct-2014 |
Dan Sandler <dsandler@android.com> |
All (er, L) is finally revealed. If you exceed 20000 points, please send in a screenshot. Bug: 15984887 Change-Id: I1164160bfa8e7dca3b9e7d7ca5d50ef9abd38b61
/frameworks/base/core/res/AndroidManifest.xml
|
22dbaddf58144ea847c9aa617be0e77114f3f7c3 |
|
06-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
am 8b718b80: am db75703b: am 2f577e83: am 90d557b7: am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev * commit '8b718b80e0caf179a174f8417fe4f5b875297de6': Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
|
90d557b7a68e64e049a44560b76b959ef87f13d7 |
|
06-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
am 7f7d240b: Merge "Fix issue #17752399: Multiple apps broken by GET_TASKS permission change" into lmp-dev * commit '7f7d240b13b96b617e298c6178af0425308f5ef9': Fix issue #17752399: Multiple apps broken by GET_TASKS permission change
|
2d7576b082b84068fb9d68419b710b9bec49139b |
|
04-Oct-2014 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #17752399: Multiple apps broken by GET_TASKS permission change Keep around GET_TASKS as a permission available to apps, so apps still think they have it and don't get all uppity because they don't. Add a new REAL_GET_TASKS that is the actual permission now. Plus some temporary compatibility code until everyone can transition fromn GET_TASKS to REAL_GET_TASKS. Change-Id: I12c1102eed24844685dcbd2fa3b612811603958f
/frameworks/base/core/res/AndroidManifest.xml
|
f75866cba095cfe8247e87aafa4162abba37fdbb |
|
02-Oct-2014 |
Benson Huang <benson.huang@mediatek.com> |
am cea4f7ac: am 19766ff9: am 398de894: am 981258e5: [FM] Add FM permission to support FM radio app * commit 'cea4f7acb40b495c137e1ac6c9eb57b3ddfa2c34': [FM] Add FM permission to support FM radio app
|
981258e5f957899b034a98ebebade1f0366f506a |
|
23-Sep-2014 |
Benson Huang <benson.huang@mediatek.com> |
[FM] Add FM permission to support FM radio app Add FM permission like KK to support FM radio app. Change-Id: Ifb76f63e3136a5f88306903fd28e9abbb01e69c9 Signed-off-by: Benson Huang <benson.huang@mediatek.com> Conflicts: data/etc/platform.xml
/frameworks/base/core/res/AndroidManifest.xml
|
3e3857c4f5d277c69bcb0ff3a581a176f3a84bf8 |
|
22-Sep-2014 |
Sky Faber <skyf@google.com> |
Separate wifi AP added by applications. -Add field for tracking user approval of application added networks. -Add WifiConfig fields for creating/updating application name -Add permission to allow system apps to modify any network Bug: 16953082 Change-Id: I12943563ef714c4287e13488578f020d136d006d
/frameworks/base/core/res/AndroidManifest.xml
|
4b4d68534155e6a2776e2cc7f2168307fd55cb1f |
|
19-Sep-2014 |
Wink Saville <wink@google.com> |
am 1ddcdc2d: Merge commit \'e58e59cc\' into fix-merge-conflict * commit '1ddcdc2d1cef6387612923ad3f9e73de12727dc1': ksd to lmp-sprout-dev
|
f067f8fb16dd0778ef75b44d7323a07fe1ba52c3 |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
am 84d05ed5: am 8a20c56f: am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev * commit '84d05ed5a229186c7859013327887f6af7ef4a29': Adds APIs for Bluetooth PBAP and MAP access permission.
|
d796159bbb14fce247177ad25aabd70038437181 |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
am c172b209: Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev * commit 'c172b2090317b158974bc73d8baa141449a1d784': Adds APIs for Bluetooth PBAP and MAP access permission.
|
1bbfcc2fdcbe72a69477b0395ea92f777efb7c9d |
|
16-Sep-2014 |
Edward Jee <edjee@google.com> |
Merge "Adds APIs for Bluetooth PBAP and MAP access permission." into lmp-dev
|
02e3979d62bf4b85fe7dedeefa357748419db992 |
|
15-Sep-2014 |
Wink Saville <wink@google.com> |
Merge commit 'e58e59cc' into fix-merge-conflict * commit 'e58e59cc': ksd to lmp-sprout-dev Conflicts: core/java/android/provider/CallLog.java telephony/java/android/telephony/SubInfoRecord.java telephony/java/android/telephony/SubscriptionManager.java telephony/java/android/telephony/TelephonyManager.java telephony/java/com/android/internal/telephony/ISub.aidl telephony/java/com/android/internal/telephony/TelephonyIntents.java Change-Id: I2b892b692743a7ccde55185a2b90135bf28408cd
|
613d076fa58bc4d48d5e0e197300a1f1be7c3dbb |
|
11-Sep-2014 |
John Spurlock <jspurlock@google.com> |
am 56e64b2a: am 88c61af5: am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev * commit '56e64b2a589a09786caa1eb1d9bfa59292a227f2': Zen: Make condition providers available via @SystemApi.
|
7456ae83e8ae6ad3081a4a31589c1569b985be93 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
am 3a972844: Merge "Zen: Make condition providers available via @SystemApi." into lmp-dev * commit '3a972844e934b1031d73bfb114d84a7d2f8d4b19': Zen: Make condition providers available via @SystemApi.
|
bf4e41747d138bf89c6c3fa5076a38334d3b45e1 |
|
10-Sep-2014 |
John Spurlock <jspurlock@google.com> |
Zen: Make condition providers available via @SystemApi. Bug:16819503 Change-Id: Ibd7004f7a0928d3f14f9ccd55088cf645d5285e2
/frameworks/base/core/res/AndroidManifest.xml
|
0a2cfc629698e17657adaf58ad67aa8b58dda653 |
|
10-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
am 2feb9c9a: am 2413aa58: am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev * commit '2feb9c9a5153136d6d0f4d32859113fc1ebe6a4f': Make UsageStats API default on only for the system ActivityManager shouldn't return null for getCurrentUser
|
7137ee38cbfeb01b6e19b5e4b2588e765b5a56c6 |
|
10-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
am 38bd55ff: Merge changes I79ba54d7,I224fb4b6 into lmp-dev * commit '38bd55ffd7084d744e4e814593056e1e12ebfb00': Make UsageStats API default on only for the system ActivityManager shouldn't return null for getCurrentUser
|
8dd30aadaf133fe1b8974847efdd5b8cf285136d |
|
05-Sep-2014 |
Edward Jee <edjee@google.com> |
Adds APIs for Bluetooth PBAP and MAP access permission. Currently, users' preference in phonebook and call history or message access per each Bluetooth-paired device is stored in Settings application's shared preferences. However, some privileged applications other than Settings need to access such data. So we decided to migrate the data from Settings application's shared preferences to Bluetooth application's. Bug: 17158953 Change-Id: I3771f03eaea3f57cf60d93ab9fd41c9eb3e1e99c
/frameworks/base/core/res/AndroidManifest.xml
|
6590d7c75c1d706f70ebf6a5594d6a7601c080df |
|
09-Sep-2014 |
Adam Lesinski <adamlesinski@google.com> |
Make UsageStats API default on only for the system This changes the PACKAGE_USAGE_STATS permission to be a signature only permission, meaning that only apps signed with the system signature have access to the UsageStats API enabled by default. Bug:17428130 Change-Id: I79ba54d7102c770ea2490f014a1f6736f0f46b3a
/frameworks/base/core/res/AndroidManifest.xml
|
067a1780f56f6a883544fe3a9e93c590999d32d9 |
|
06-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
am c16a3a6c: am c256b10b: am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev * commit 'c16a3a6ca2235554c4232651fca4c84af5ceded9': Update the broadcasts reserved to the system
|
91488f464db3753d1534fb4d16cde2c90abd8126 |
|
05-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
am aa82a6c7: Merge "Update the broadcasts reserved to the system" into lmp-dev * commit 'aa82a6c7adc6de4ec3f843328f7bb207aa6540ec': Update the broadcasts reserved to the system
|
26d6ff0b2406d2917b6ad1f6dd7b35450b0044fc |
|
03-Sep-2014 |
Jean-Michel Trivi <jmtrivi@google.com> |
Update the broadcasts reserved to the system The action value for all AUDIO*PLUG broadcasts has been changed from "android.intent" to "android.media". This value needs to be updated in the core manifest too as part of the broadcasts that only the system can send. Bug 17289385 Change-Id: Ibc0f4139c28ce863f85efc24ff0fcb81ab12ce21
/frameworks/base/core/res/AndroidManifest.xml
|
05e6dde3a0b9ba1eb3d13d511fe2e27a0d10c851 |
|
01-Sep-2014 |
Wink Saville <wink@google.com> |
ksd to lmp-sprout-dev Change-Id: I94eb65c62231b5831570bb0cbbbd9c916bee0a37
/frameworks/base/core/res/AndroidManifest.xml
|
070bf912a25b6cf3b7051b2b6710dc20a7386c4c |
|
27-Aug-2014 |
Christofer Åkersten <akersten@google.com> |
am c957fa3b: am 8ddbb2cf: am e7a96447: Merge "Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS" into lmp-dev * commit 'c957fa3bcc42ebed337582f98c8ebb8f2d1148e5': Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS
|
9dd43afbb9f041e807d2051478e861c556f0771f |
|
26-Aug-2014 |
Sungsoo Lim <sungsoo@google.com> |
Ensure system apps can be granted MODIFY_PARENTAL_CONTROLS Bug: 16948874 Change-Id: If44aaa7085705e8a2f55c71dae61bf6ac0cdfc09
/frameworks/base/core/res/AndroidManifest.xml
|
4b40c24877ce2074c03aeb23adade3756ff320a1 |
|
25-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
am d35615ce: am fdfd79f2: am 6a276cec: Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev * commit 'd35615ce7a0ffd477d0dae8d098813d62e92a7db': Poke interactive hint from userActivity and add @SystemApi.
|
d7761be23d30b5e9ca9c07998af27e704d2a7ae2 |
|
23-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Merge "Poke interactive hint from userActivity and add @SystemApi." into lmp-dev
|
6be3d49339ba719e68cf44a16becb6866355238e |
|
22-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
am 21ecfce5: am 0c581229: am 654d72fd: Merge "Show a user switching dialog before starting the user switch" into lmp-dev * commit '21ecfce5be747dd676cc0b5f0452408fd9280766': Show a user switching dialog before starting the user switch
|
7805a10c86a2de9fb5ddf41d63075eef342a59ea |
|
22-Aug-2014 |
Amith Yamasani <yamasani@google.com> |
Show a user switching dialog before starting the user switch switchUser() now first shows a dialog and the dialog calls startUserInForeground to do the actual switch. Bug: 16661752 Change-Id: Ie4e2e9eec8bf7c2116694072ea8555b8254a0e13
/frameworks/base/core/res/AndroidManifest.xml
|
0a571123544058578b4ef1558c276a4050519652 |
|
22-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Poke interactive hint from userActivity and add @SystemApi. Previously we only poked the interactive hint for input events that were dispatched through the regular input system. However, when using a car dock in projection mode input events are directly delivered to apps by other system components, bypassing user activity. So now we poke the interactive hint on all user activity. Added an @SystemApi version of userActivity. Added a new signature|system permission called USER_ACTIVITY to allow system apps to poke userActivity. For now it seems prudent to keep DEVICE_POWER signature only. Bug: 17043684 Change-Id: Ia84bd03083065b8938a9853c08901fbf71b2e56b
/frameworks/base/core/res/AndroidManifest.xml
|
369fcc5e79d24e8e56aed5c9b83e0a07039aff66 |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
am e4df8728: am 084c98b4: am d324e32f: Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev * commit 'e4df8728312f9d289c096ba804816e3091c2a125': Exposing in-call API to other implementing classes. (1/4)
|
198ca696fb318380dee5ae9f4f3e47114d74ed14 |
|
19-Aug-2014 |
Michael Wright <michaelwr@google.com> |
am 7814d9f0: am 4bbb811f: am 504960cb: Merge "Add callbacks for MediaProjection start / stop." into lmp-dev * commit '7814d9f05d202625280210269c89655013dce3de': Add callbacks for MediaProjection start / stop.
|
d86ecd26d78c7bcd7f820b9ef5e3f4c3eb037510 |
|
13-Aug-2014 |
Michael Wright <michaelwr@google.com> |
Add callbacks for MediaProjection start / stop. Also, enforce that there is only one valid MediaProjection at a time. Bug: 16488053 Change-Id: Id05445d798c98cb208bc4dab186296392e15d30b
/frameworks/base/core/res/AndroidManifest.xml
|
b135d06cb83db03b1328b7a82f064de7868fb16f |
|
20-Aug-2014 |
Jeff Brown <jeffbrown@google.com> |
Remove incomplete media router API. (DO NOT MERGE) Change-Id: I310fadafb5a6b8190a32e5d87f3e1823c87bcef7
/frameworks/base/core/res/AndroidManifest.xml
|
50cddeca1f6f66ccc3dbfd526aee621e1b87a516 |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Merge "Exposing in-call API to other implementing classes. (1/4)" into lmp-dev
|
2ac401093e5ebb975f14e5108d457c148370f7de |
|
19-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Exposing in-call API to other implementing classes. (1/4) - Adding service_interface constant to InCallService. Bug: 16133960 Change-Id: I4ace89bc3300428d2c56ed43e47ccd12a9f9748a
/frameworks/base/core/res/AndroidManifest.xml
|
19caa123d623fdfd55cba0ae8a2bcb519ce9e7e6 |
|
16-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
am 3ec54522: am 5c0aa11d: am fbcb50db: Merge "Add BIND_CONNECTION_SERVICE permission." into lmp-dev * commit '3ec545229af4be3a45583170a2509d9ad4161c04': Add BIND_CONNECTION_SERVICE permission.
|
0dae9a4cfa9d51cadb0f731b65f742d48e9e893c |
|
16-Aug-2014 |
Tyler Gunn <tgunn@google.com> |
Add BIND_CONNECTION_SERVICE permission. - Added system permission. - Added enforcement in ConnectionService API class. Bug: 16171070 Change-Id: Idbd26a31e8f6bb59d3e881a1e5885a44026f2fbd
/frameworks/base/core/res/AndroidManifest.xml
|
af8b11ae2ad4e3de7641ecb61fc6fde691f6a105 |
|
15-Aug-2014 |
Doug Zongker <dougz@google.com> |
am 8c26c4c8: am a9c87471: am 2b13359a: Merge "@hide RECOVERY permission" into lmp-dev * commit '8c26c4c8f4784e3f8acce3a97f36e8c136d48349': @hide RECOVERY permission
|
183415e521d599ca5e33e5022fec5ec7dfe1c055 |
|
12-Aug-2014 |
Doug Zongker <dougz@google.com> |
@hide RECOVERY permission Bug: 16959027 Change-Id: I99fbdf24d5e8bce4beb32fa872e0caa6bfdbe1e9
/frameworks/base/core/res/AndroidManifest.xml
|
c216c473eb50e16ab6c6361bd0c9232d5bfaeb39 |
|
07-Aug-2014 |
Chelsea Derrick <chelsead@google.com> |
Revert "Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE]" This reverts commit 41158d90a69cae2a9c4ced0e04f235e8cfef5259. Bug: 16871063 Change-Id: I93623be92f2de41789b16827867f3f95bf0480c5
/frameworks/base/core/res/AndroidManifest.xml
|
aac303d0a24294c1f9ac74a0e5e7b7fa77bb379f |
|
11-Aug-2014 |
Nicolas Prevot <nprevot@google.com> |
Removing the personal icon, which was only a placeholder. This icon should never show up: the avatar of the personal space should show up instead. If something goes wrong and correct avatar fails to show, the systems falls back to the green android now, which is desired behaviour. BUG: 15875652 Change-Id: I41beb4cbd5e707d27ef6d4cf35d02ec9cfa1b61d
/frameworks/base/core/res/AndroidManifest.xml
|
6b93229a211cd4b963dae0a46d6dde689beabb90 |
|
24-Jul-2014 |
Matthew Xie <mattx@google.com> |
Add BLUETOOTH_MAP permission to give Bluetooth app exclusive access to email access The permission is hidden. It's for Bluetooth app only. We may unhide it in the future. Change-Id: Ibc6f7b71f0c79dc282a8e5fdc786e1c16be7a892
/frameworks/base/core/res/AndroidManifest.xml
|
8694f2443230e74515e04e572d22406764746834 |
|
04-Aug-2014 |
Jeff Tinker <jtinker@google.com> |
Merge "Allow device to be unprovisioned" into lmp-dev
|
6bf5b600d6d1e98f7eabbbc884dd286b335acd66 |
|
30-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Allow device to be unprovisioned bug: 12247651 Change-Id: Ie2e77566d2c65925091296da5bcbec327985c946
/frameworks/base/core/res/AndroidManifest.xml
|
1bb480a3a4ce2ce63c5d09fa7f5cc38ec160ebf4 |
|
02-Aug-2014 |
John Spurlock <jspurlock@google.com> |
Battery saver: new policy changes + SystemUI tweaks. - Service policy changes: allow the user to turn off (snooze) saver mode below the auto-trigger level. Plugging in the device always exits saver mode. - Default trigger level is now 0 (never) instead of 15. - SystemUI now also listens to a new POWER_SAVE_MODE_CHANGING, since waiting for _CHANGED can take seconds. - Move shared feature description text into the framework so it can be shared. - Tweak dialog title + action strings. - Remove trigger-level from SystemUI, it no longer needs it. - Add the ability to turn off saver mode directly from the notification. - Migrate saver confirmation dialog to common system UI dialog helper, and add a few convenience methods. - Fix bug where the status bar area would be orange over the keyguard in SHADE_LOCKED mode. Bug:16214395 Change-Id: I3d1ded1eec9e63e7d97469486f6a320e1bebbccd
/frameworks/base/core/res/AndroidManifest.xml
|
783645e99f909ffc7a2d5d2fca9324cc0e9b7362 |
|
28-Jul-2014 |
Jae Seo <jaeseo@google.com> |
TIF: Merge TvParentalControlManager into TvInputManager This change addresses the following API council feedback. TvParentalControlManager: -- Replace the listener interface with a broadcast Intent with well-known action, something like ACTION_BLOCKED_RATINGS_CHANGED. -- TvParentalControlManager goes away, and two remaining methods move to TvInputManager. == Implementation changes == -- The user-selected rating preferences should be stored in an XML file, and loaded at boot by your internal system service. It should _not_ be stored in a Secure/Global setting. Bug: 16542165 Change-Id: I278df963576652ec9163a66c1ef99419fcdb36c2
/frameworks/base/core/res/AndroidManifest.xml
|
1f33d77f0430efb2d7eb532e360ba9a30004ffe7 |
|
25-Jul-2014 |
Alexandra Gherghina <alexgherghina@google.com> |
Rename work icon symbol to match the prefix used for badges. Also renames the images for consistency. Bug: 16369104 Change-Id: I19f97ae22cb2ee4f7db210f083badc1a30520b44
/frameworks/base/core/res/AndroidManifest.xml
|
a06d5ca1d96af3555ad4e384994e6321a0c5bb9c |
|
28-Jul-2014 |
Adrian Roos <roosa@google.com> |
Make TrustAgentService a SystemApi Bug: 16401527 Change-Id: I6d19281600bacac7c8a29afc07c39ca1d461d23c
/frameworks/base/core/res/AndroidManifest.xml
|
5eeb59cceb1f95813c548c1c5937f161c1ed3571 |
|
22-Jul-2014 |
Christopher Tate <ctate@google.com> |
Schedule full backups Initial policy: at most daily; backups only run when the device is idle + charging + on an unmetered network. Bug 16485874 Change-Id: I5665d890a943bac765adcef14be79d7dba6ce078
/frameworks/base/core/res/AndroidManifest.xml
|
16c8e3f49497b6046972ae650772f65768366be8 |
|
25-Jul-2014 |
Jeff Sharkey <jsharkey@android.com> |
PackageInstaller changes based on feedback. Mostly cosmetic changes from API council feedback. Bug: 16543552 Change-Id: Ic926829b3f77c31f50a899c59b779353daf00d59
/frameworks/base/core/res/AndroidManifest.xml
|
c086a3df3b28996cd10ebe42c5f59035d054aa0d |
|
18-Jun-2014 |
Terry Heo <terryheo@google.com> |
Add a frame capture API of TV input - Added new permission CAPTURE_TV_INPUT Bug: 15736756 Change-Id: I2ae8b2e3f5b1ad1d525854ed89ab2043cf66acbe
/frameworks/base/core/res/AndroidManifest.xml
|
193f049221dce7764d50293ac02255fd0223c538 |
|
10-Jun-2014 |
Jason Long <jasonlong@google.com> |
Switched Holo to Material for account chooser activities. Change-Id: I6a44fb174eb4e981c37fca0836b103d7ee3f5ffe
/frameworks/base/core/res/AndroidManifest.xml
|
dc00cbe2c15eef5141656311a6d05c753d7c6db6 |
|
21-Jul-2014 |
Craig Mautner <cmautner@google.com> |
Create API for launching from recents Relaunch apps from recents using the same uid and package as was used in the original launch. Fixes bug 16358208. Change-Id: I340800bfee79926b197929360d69f1d570bbf1eb
/frameworks/base/core/res/AndroidManifest.xml
|
33f5ddd1bea21296938f2cba196f95d223aa247c |
|
22-Jul-2014 |
Dianne Hackborn <hackbod@google.com> |
Add permissions associated with app ops. Change-Id: I575ad7a3ceea59486ca601f69760b14f6269511d
/frameworks/base/core/res/AndroidManifest.xml
|
09a65601b24b77b7e5b3d2d4c7c30eded1ba1040 |
|
21-Jul-2014 |
Adam Powell <adamp@google.com> |
Sort ResolverActivity items based on UsageStats Sort targets by the total amount of time the user has spent with their containing package in the foreground. Bug 15694906 Change-Id: I63c956424f78eb22911517674dfefd96901d19f8
/frameworks/base/core/res/AndroidManifest.xml
|
a19d7bfacf83837fab1f785ed1319d83a7f45675 |
|
19-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Rename voicemail permissions Rename READ_ALL_VOICEMAIL to READ_VOICEMAIL, and MANAGE_VOICEMAIL to WRITE_VOICEMAIL Bug: 16400686 Change-Id: I4c87a7e2fb3aa71d7de3865301f110bcfb29221b
/frameworks/base/core/res/AndroidManifest.xml
|
891f5b2638f30479eb8d78ecb28ba0b39808fca4 |
|
18-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Merge "Mark social APIs stream APIs as deprecated" into lmp-dev
|
bdb13c8c07f07d405e74f479068eb972d509cea5 |
|
17-Jul-2014 |
Brian Attwell <brianattwell@google.com> |
Mark social APIs stream APIs as deprecated Bug: 14490632 Change-Id: I6b54613514e52f34cfcc37d25493a7ea7d636a86
/frameworks/base/core/res/AndroidManifest.xml
|
c39d47a8e7c74bd539104b0efab898ef6fc43ddf |
|
09-Jul-2014 |
Michael Wright <michaelwr@google.com> |
Add MediaProjection APIs. The new MediaProjection infrastructure allows the system to hand out tokens granting the ability to capture the screen's contents, audio, etc. at a granular level. It's intended to be used both for screen casting, via the cast APIs, as well as screen sharing via third party applications. The screen sharing case is implemented, but all of audio capturing is still forthcoming. Change-Id: I4b24669bed7083e11413c10ed8d6b025f5375316
/frameworks/base/core/res/AndroidManifest.xml
|
4bd7efbe982d26a68950f3c92bd0e7142c4ecbf7 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Restrict SCORE_NETWORKS permission to signature|system. As long as the APIs aren't ready to be un-hidden, there's no need to allow non-system apps to access them. This can be reverted when the APIs are finalized and we have mechanisms in place for selecting between scorers installed on the device, rather than only a preselected scorer bundled with the system. Change-Id: I745b4c691eccfb526014d4cb71639db2119e4fdb
/frameworks/base/core/res/AndroidManifest.xml
|
58fba8b14b7e80dc2e7f676a32d1a69661fb13d4 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Merge "Expose network scoring APIs to /system apps." into lmp-dev
|
7be8e9725f4a60f0d1a6cb175a05a320968d7439 |
|
17-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Expose network scoring APIs to /system apps. Ideally, we'd only expose the methods that we intend unbundled apps to call (e.g. not NetworkScoreManager#setActiveScorer, which should only be called by Settings), but this isn't harmful in terms of permissions as the APIs still check security appropriately. Bug: 15833200 Change-Id: I2047515b41c8be0cf7cb51dd495fe72309c05f68
/frameworks/base/core/res/AndroidManifest.xml
|
cdd5858e481fb0087c40c5997a9fa1446b326165 |
|
18-Jun-2014 |
Wenchao Tong <tongwenchao@google.com> |
Changes in framework for WIFI_CREDENTIAL_CHANGE broadcast. [DO NOT MERGE] * Only allow system app to send/receive WIFI_CREDENTIAL_CHANGE. * Define constants in WifiManager. Bug: 15703353 Change-Id: I4bcc6bc82ec01952500eef3965cf81116bba693d (cherry picked from commit f4a43f196e1132968a8add60efa4ae4558f8b010)
/frameworks/base/core/res/AndroidManifest.xml
|
1a937b04e63539cb1fab1bde601031d415c7156f |
|
02-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Initial draft of new MediaRouter APIs. This patch introduces basic infrastructure for the new MediaRouter API. The code is fully documented but incompletely implemented. It is being submitted not to facilitate API reviews. MediaRouter is a new class that applications used to discovery, connect to, and control media devices as represented by media destinations and their routes. Routes may offer a variety of capabilities. This new class is a much more powerful replacement for the existing MediaRouter. MediaRouteService is a base class for creating media route services which third-parties can implement to make routes available to applications. It is analoguous to the MediaRouteProvider infrastructure of the old media router support library but it is designed to be integrated into the framework and enable a variety of new usages such as remote display projection. Stay tuned for more... Change-Id: I2c7c6013d9f751d71e83697e7fc9e49bf7751fef
/frameworks/base/core/res/AndroidManifest.xml
|
01a500ed1c6ae3fff66678144ae637aa8cad0ecc |
|
11-Jul-2014 |
Jeff Brown <jeffbrown@google.com> |
Delete first draft of media routing APIs. The new APIs will not be as tightly integrated into MediaSession. Change-Id: I5cfd37d9d8d0c5d46c55edb5cf0772a8f1ef13ab
/frameworks/base/core/res/AndroidManifest.xml
|
06b6cdaed5c68816faac9d2354c6caf61e65e19d |
|
12-Jul-2014 |
Sreeram Ramachandran <sreeram@google.com> |
Remove unnecessary code and APIs. This stuff has been replaced by setNetworkForUser() in NetdClient. Change-Id: If525ee259b74314191d1913f7c2a3e828e05c38f
/frameworks/base/core/res/AndroidManifest.xml
|
c42a1e1071937ae48b7aa5d6291a32c29078b74b |
|
07-Jul-2014 |
Adrian Roos <roosa@google.com> |
Add AlarmClock API to AlarmManager Adds a new kind of alarm that represents an alarm clock and a way to query the next scheduled alarm clock. Deprecates Settings.System.NEXT_ALARM_FORMATTED. Bug: 14589952 Change-Id: I297eeeff36d07adcda010afac183d0f5ee37dc99
/frameworks/base/core/res/AndroidManifest.xml
|
68d4acd205e8c2da524e62734ca42847306cc029 |
|
02-Jul-2014 |
Andres Morales <anmorales@google.com> |
Service for reading and writing blocks to PST partition Permits apps with permission android.permission.ACCESS_PERSISTENT_PARTITION to obtain a read and write data blocks to the PST partition. Only one block ever exists at one time in PST. When a client writes another block, the previous one is overwritten. This permits storing a block of data that will live across factory resets. Change-Id: I8f23df3531f3c0512118eb4b7530eff8a8e81c83
/frameworks/base/core/res/AndroidManifest.xml
|
99bd4eabd17c1211adcd8eb9afeb5e1c6077617c |
|
09-Jul-2014 |
Yorke Lee <yorkelee@google.com> |
Merge "Add manage voicemail permission (1/4)"
|
6752cba4642ea9103f3013336c005f06968fd442 |
|
09-Jul-2014 |
Nick Kralevich <nnk@google.com> |
Merge "ConfigUpdateInstallReceiver: pass content via content provider"
|
b708ce5f1a30a63ed79a86a23ead4e5ad972a48a |
|
08-Jul-2014 |
Shishir Agrawal <shishir@google.com> |
Remove permission SIM_COMMUNICATION. The permission is replaced by the MODIFY_PHONE_STATE permission which is System|Signature. Change-Id: I74dbd242fc0fdbb5884fdc7a5c3f0063424fbfcf
/frameworks/base/core/res/AndroidManifest.xml
|
103173e16da609bcf57a88961ca57a8de17e0ee7 |
|
28-Jun-2014 |
Nick Kralevich <nnk@google.com> |
ConfigUpdateInstallReceiver: pass content via content provider When receiving a request to update ConfigUpdater content, don't try to open by filename. Fetch the content via a file descriptor delivered from a content provider. This avoids the files needing to be marked world-readable, and resolves an SELinux violation. Bug: 14989241 Change-Id: I10ad0d710c9a833a45995c545ba585a533c35b0d
/frameworks/base/core/res/AndroidManifest.xml
|
b096bdceaf2a4becffd2d930a870ccb57bfbe99c |
|
01-Jul-2014 |
Jeff Davidson <jpd@google.com> |
Add a SCORER_CHANGED broadcast. Sent whenever the active network scorer is changed. Bug: 16007033 Change-Id: Ib71e89e2cc98fa424db7e489445ec03edefb6880
/frameworks/base/core/res/AndroidManifest.xml
|
8949bfb90c415629dbd0e30d25003fb3e0375fb5 |
|
16-Aug-2013 |
Hemant Gupta <hemantg@codeaurora.org> |
Bluetooth: Support MAP Client role on Bluedroid. Implementation changes to support MAP client and PBAP client role on Bluedroid stack. Change-Id: I1733a67bf5256bd7b181bd5e68e40b476994ebfd
/frameworks/base/core/res/AndroidManifest.xml
|
5e4554351045776c1cf2da77375f0ca8363d647f |
|
25-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add manage voicemail permission (1/4) Bug: 6948882 Change-Id: I3367c20721b6e9572e79c7b4f42758b8c4e30372
/frameworks/base/core/res/AndroidManifest.xml
|
eb8d1be6acad180eabde84f19196b9ecaba81353 |
|
25-Jun-2014 |
John Spurlock <jspurlock@google.com> |
Add a BIND_DREAM_SERVICE signature-level permission. Starting in api 21, will be required to bind to a declared dream or doze service. Also added to aapt dump badging output. Bug:15862654 Change-Id: Ifa0a594eeecf21e6146176c7810a847e1d08fe3b
/frameworks/base/core/res/AndroidManifest.xml
|
d96e4948daf687f3f631ba8d93c89026fd3ce272 |
|
26-Jun-2014 |
Andres Morales <anmorales@google.com> |
Merge "interface for nfc handover supplicant commands"
|
5a2f488b70c9f9a712be7bcdbd9ec893c38670c2 |
|
24-Jun-2014 |
Yorke Lee <yorkelee@google.com> |
Add REMOVE_VOICEMAIL permission to system Add a permission that will allow any app that has this permission to remove any voicemails in the user's call log, even those that don't belong to it. This will be needed for the unbundled dialer to be able to manage the user's voicemails. Bug: 6948882 Change-Id: Idca23ee83e541ba8aef24d6cb7fe09d5adac1e10
/frameworks/base/core/res/AndroidManifest.xml
|
9d4e9bcebbd97ad51daa0ef15cfba5aabb399bbb |
|
19-Jun-2014 |
Craig Mautner <cmautner@google.com> |
Allow a root activity to relinquish task identity If a an acitivty with attribute android:relinquishTaskIdentity true is the root activity of a task then the intent of that task will be that of the first activity in the stack with android:relinquishTaskIdentity set false. The ability to set intent also includes the ability to set the TaskDescription of the task. Fixes bug 15675610. Fixes bug 10428661. Change-Id: Ib28a9eae3b9832eeeef9106adbebe344184ee5ae
/frameworks/base/core/res/AndroidManifest.xml
|
5834ee75038e9095cefe089cdb26795b3ffe9e38 |
|
18-Jun-2014 |
fafaisland <fafaisland@google.com> |
Merge "Add READ_ALL_VOICEMAIL permission in the core"
|
88fb96505ce7587b23479d07ed77412f69a84ce8 |
|
17-Jun-2014 |
fafaisland <fafaisland@google.com> |
Add READ_ALL_VOICEMAIL permission in the core Bug:15695227 Change-Id: I96bebcd949293679d938b2ec290820d4ed9035fa
/frameworks/base/core/res/AndroidManifest.xml
|
cf1a2f73fc102be2ac7060ac97d4682bb2565ca5 |
|
17-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch everything to scheduled jobs Everything that used the IdleMaintenance APIs/broadcasts gets to use the spiffy new JobScheduler instead. Hooray! On top of that, the now-obsolete "idle maintenance" APIs are now gone entirely. Double hooray! Bug 14993295 Change-Id: I5fb67c296ca8cd0ba8a2c8760a0f0d9d962d813b
/frameworks/base/core/res/AndroidManifest.xml
|
9740e468bc895cbc08c71aecc35fc56c3faafa06 |
|
08-Feb-2014 |
Andres Morales <anmorales@google.com> |
interface for nfc handover supplicant commands expose: NFC_GET_HANDOVER_SEL NFC_GET_HANDOVER_REQ NFC_REPORT_HANDOVER These are used in for setting up WFD with NFC and are only accessible given the CONNECTIVITY_INTERNAL permission. Change-Id: Ia43afc137d474822cad896d335530654081a808c
/frameworks/base/core/res/AndroidManifest.xml
|
29372ab484c916c0774c976d5b896a7cf19a2b91 |
|
04-Jun-2014 |
Ido Ofir <iofir@google.com> |
Adding permission for launching the trust agent settings. Change-Id: Iac5bde57ca8d465fdf0fa5848d6716fc88801aeb
/frameworks/base/core/res/AndroidManifest.xml
|
94b59de852df7b6ce16aef73a9b2c11be8f3102d |
|
03-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothAvrcpController: Move AVRCP controller support to new BluetoothProfile subclass Change-Id: Id988040a7ce623ed68e0349920301ff48db1fbce
/frameworks/base/core/res/AndroidManifest.xml
|
2263dd1ddd1a8ac828c25d34000c85165cad21ef |
|
14-May-2014 |
Mike Lockwood <lockwood@google.com> |
BluetoothA2dpSink: Add new BluetoothProfile subclass for A2DP sink Change-Id: I09d5cb8fdaea4c4828f333949b7c18deffd22722
/frameworks/base/core/res/AndroidManifest.xml
|
cf916d34671f0ab6aad8de24c18e4dc96fb21941 |
|
12-Jun-2014 |
Mike Lockwood <lockwood@google.com> |
Rename BluetoothHandsfreeClient to BluetoothHeadsetClient This makes our terminology consistent with the existing BluetoothHeadset profile Also updated arguments to Context.bindService() Change-Id: I27cc5a6fde256b1f5dccca53a7a15ec8f58691c2
/frameworks/base/core/res/AndroidManifest.xml
|
104e14531ca2212117540d8b6abc06ab67564ebc |
|
12-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am f894cad0: Merge "Some tweaks to improve document task creation." into lmp-preview-dev * commit 'f894cad093c1a3083f4aca099babc4677977a12f': Some tweaks to improve document task creation.
|
d38aed81420d7d992f65ef2efb5f69c1900fc61d |
|
11-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Some tweaks to improve document task creation. - Mark the chooser activity as never launching in to a new task, even if the caller asks for it. These are dialogs so don't make sense as stand-alone tasks. (Maybe later the policy should be to not launch into a new task in any case that the activity is a dialog or even transparent at all.) - Keep track in the task record of whether any activities in it have been shown to the user, and use this to automatically remove the task when all activities finish. This leans up cases where apps are launching stub activities that get turned in to tasks but are never seen by the user because they immediately launch another activity in another task and then finish. Change-Id: I00b641c80aa96bd5071479f36ee2e4d8e3a81aeb
/frameworks/base/core/res/AndroidManifest.xml
|
5833bbe2d6a38244e48dd793d2d0872321535f57 |
|
12-Jun-2014 |
Sandeep Siddhartha <sansid@google.com> |
Merge "Initial support for reading the enrollment metadata"
|
e5706787599f8397e19e66afa70753ba350cc91b |
|
30-May-2014 |
Sandeep Siddhartha <sansid@google.com> |
Initial support for reading the enrollment metadata - Defines schema for enrollment apps to publish metadata for the search keyphrase. This metadata consists of an ID, a user visible keyphrase, and the target package to handle the keyphrase, when it triggers. - Reads the metadata and populates the KeyphraseInfo object for access via the VoiceInteractionService - Adds permission and intent action for the enrollment app. The enrollment app needs to be a system app protected with the MANAGE_VOICE_KEYPHRASES permission and the activity performing the enrollment needs to handle the ACTION_MANAGE_VOICE_KEYPHRASES - The keyphrase info currently stores an ID - that's for internal bookkeeping only, a keyphrase text - that's used by the public APIs, and a list of supported locales, which isn't exposed but is used while indicating if hardware hotword is available for a particular keyphrase in a language or not. Change-Id: Ibe6c52a5a3eecfd74c4a8382713a35eb88d38df9
/frameworks/base/core/res/AndroidManifest.xml
|
0188bee2c526270c178a0b1f918b2a09999de25f |
|
11-Jun-2014 |
Christopher Tate <ctate@google.com> |
am d8f71d34: Merge "Out with the old; in with the new" into lmp-preview-dev * commit 'd8f71d34c3c7fb161a1586de8edb52161c32d672': Out with the old; in with the new
|
1b8aef2be7a467672b3ffdc37039b9233ece0fbc |
|
11-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Merge "Material-ize the restrictions pin challenge."
|
fe1de89fe91a099dd535acd3df0845839baf4232 |
|
11-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
am 3d5066de: Merge "Add different resolutions of afw icons" into lmp-preview-dev * commit '3d5066de154193cc3a08a7be168aa5e31bfe0359': Add different resolutions of afw icons
|
7060b04f6d92351b67222e636ab378a0273bf3e7 |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
Out with the old; in with the new Switch to the official "JobScheduler" etc naming. Bug 14997851 Change-Id: I73a61aaa9af0740c114d08188bd97c52f3ac86b7
/frameworks/base/core/res/AndroidManifest.xml
|
40e53cdc944472cf2417c069a7a4514c9e37911b |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
Merge "hide RECOVERY permission from L preview -- DO NOT MERGE" into lmp-preview-dev
|
085a1e793382580811798cbdd7e354cc755fc3ed |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
am af0c2ebf: @hide ACCESS_INPUT_FLINGER permission. * commit 'af0c2ebfc71f6106656eb17345e122ea7ac8cf2a': @hide ACCESS_INPUT_FLINGER permission.
|
4a1c0bd20b317fbc48efc35f986b9a7f5cef128e |
|
10-Jun-2014 |
Christopher Tate <ctate@google.com> |
am 2099866f: Merge "Switch framework to using new scheduled-work API" into lmp-preview-dev * commit '2099866f0d9ae5692e6edfc053aebe7f93a21618': Switch framework to using new scheduled-work API
|
b19fd00c51855954366a288cc4838327cb5d83a4 |
|
10-Jun-2014 |
Jessica Hummel <jhummel@google.com> |
Add different resolutions of afw icons Also update the name of the icon so that it is consistent with other namings in the framework and in managed provisioning. bug: 15538051 Change-Id: I9e8e680eb1c654d9f5d94ce27775687b3dc92a22
/frameworks/base/core/res/AndroidManifest.xml
|
465c5de4ee3df861dd1ad0b71ca40f3daeb9cbee |
|
10-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_INPUT_FLINGER permission. Bug: 15516225 Change-Id: Ief70650d956a7161153e283c24f553fcfa7996b1
/frameworks/base/core/res/AndroidManifest.xml
|
115afdadb5863a02f0b0daefcc0511bfd35b531e |
|
07-Jun-2014 |
Christopher Tate <ctate@google.com> |
Switch framework to using new scheduled-work API Also add the intended permission-use enforcement to said API. Bug 14994893 Bug 14993295 Change-Id: I5a3ffd32d0702c68f4ef6da68f7fa6e9de674380
/frameworks/base/core/res/AndroidManifest.xml
|
c302e4d32f97c21400b3ab76911cad8984eff20e |
|
10-Jun-2014 |
Doug Zongker <dougz@google.com> |
hide RECOVERY permission from L preview -- DO NOT MERGE Bug: 15516323 Change-Id: I16a6355f631523919607bd111e5ebfe16fa4506e
/frameworks/base/core/res/AndroidManifest.xml
|
238fd930fc0131044d317d7c5ead756be89d1299 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. (DO NOT MERGE) This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
bbf4270a6c8c6441dfb9b22f3cc5394d42cdada8 |
|
09-Jun-2014 |
Julia Reynolds <juliacr@google.com> |
Material-ize the restrictions pin challenge. Change-Id: I90be6d2e1b1043f45a8067561a0d5ce56cc02dd6
/frameworks/base/core/res/AndroidManifest.xml
|
b61eaaac59298afafa973ee739a072290e000348 |
|
07-Jun-2014 |
Jeff Brown <jeffbrown@google.com> |
Add @SystemApi annotation to internal permissions. This is a first pass at annotating permissions that should not be granted or used by to third-party apps but that may be required by privileged system applications. For this patch, the annotation was only added to permissions that have a protection level of at least system. Signature-only permissions were left alone since they only need to be visible to built-in components. Change-Id: I189472028274c133793ad8e4068585c536dd7f38
/frameworks/base/core/res/AndroidManifest.xml
|
d8883df650b77dba3be38fb2ca8980594b901461 |
|
06-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
am 87bc3c25: Merge "Improvements to low power mode." into lmp-preview-dev * commit '87bc3c258d8be516bc0fcedeb6eec34088582061': Improvements to low power mode.
|
eb94fa7975b1e8742f3b00cec6bd4f9d6b329e3a |
|
04-Jun-2014 |
Dianne Hackborn <hackbod@google.com> |
Improvements to low power mode. Add new public API for monitoring low power mode. BatteryService now puts device in to low power mode when battery level is low. Window manager now watches low power mode to turn off animations. Modifying the animator scale now gets propagated to all processes. Change-Id: I8fa566994764ddd4e1977631e28381ab9409f8ee
/frameworks/base/core/res/AndroidManifest.xml
|
aaa688972a682a42c3ee207538f3e6b204748151 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
am 25d7a394: Merge "add permission for AudioManager routing APIs." into lmp-preview-dev * commit '25d7a394c0cf91d9e9711d3f36913f4ed8aa91d8': add permission for AudioManager routing APIs.
|
b4df2f586ad7b5a0387489401de0c83203610ba9 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
am b2302d43: Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev * commit 'b2302d437fd636d9973f466062cfad145cdd042d': Ensure trust agents are only provided by platform packages
|
94236c56ddef7f0a3db010c38940f6eae75f67b4 |
|
04-Jun-2014 |
Eric Laurent <elaurent@google.com> |
Merge "add permission for AudioManager routing APIs." into lmp-preview-dev
|
b803ad3c2cefaba57063385ecab1be27dd2636b0 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Hide TrustAgentService in lmp-preview - DO NOT MERGE Bug: 15287044 Change-Id: Iba0d53b87bcb4bddccec89cf943ed65491aa9d76
/frameworks/base/core/res/AndroidManifest.xml
|
1e9021aef89d53eb08d0e8a4e017c9e79d260241 |
|
04-Jun-2014 |
Adrian Roos <roosa@google.com> |
Merge "Ensure trust agents are only provided by platform packages" into lmp-preview-dev
|
01fae55d175eea6e723d6fa8729bbe868d05cfc2 |
|
29-May-2014 |
Eric Laurent <elaurent@google.com> |
add permission for AudioManager routing APIs. Add signature or system permission "android.permission.MODIFY_AUDIO_ROUTING" for AudioManager APIs allowing system services and applications to modify audio routing. Bug: 14815883. Change-Id: If09f6f3a166a6b2f3761b65dbde0c86873850f07
/frameworks/base/core/res/AndroidManifest.xml
|
4c9e57f156d3cbd86b38e9897dfdab81964efe90 |
|
03-Jun-2014 |
Jae Seo <jaeseo@google.com> |
resolved conflicts for merge of ebe661c4 to master Change-Id: Ic25dc762ee43654b439de3ec237ead007bee3df4
|
18ea893a2319e2a192188d2288bb881149c9b06e |
|
28-May-2014 |
Adrian Roos <roosa@google.com> |
Ensure trust agents are only provided by platform packages Prevents the TrustManagerService from binding to any non-platform trust agents and updates the SampleTrustAgent to use the new permission. Bug: 15287044 Change-Id: I38c3deebd5ad359075e68f52d19417bab5ab43db
/frameworks/base/core/res/AndroidManifest.xml
|
faa3ff9ba89486aad83eab0526aea46ea7bbcfe6 |
|
03-Jun-2014 |
Evan Charlton <evanc@google.com> |
Merge "Revert sendEnvelope changes [DO NOT MERGE]" into lmp-preview-dev
|
d5cc4a281e7ce29d1e8687ff3394b57a3a549260 |
|
31-May-2014 |
Jae Seo <jaeseo@google.com> |
Put TV Input Framework under android.media.tv, including TvContract Bug: 15345342 Change-Id: I665ca23f0f074ce29cb2e047109b209178532107
/frameworks/base/core/res/AndroidManifest.xml
|
f20d640fa2b155a971ddfe0965fc803a73b5e53c |
|
25-May-2014 |
Amith Yamasani <yamasani@google.com> |
Restrictions Manager Mechanism to register a provider for requesting an administrator to respond to permission requests. Request format and response format constants. Description of manifest template for static restrictions. Int type introduced in RestrictionEntry. Needs more javadoc and better description of manifest templates, including specifying the XML attributes. Change-Id: I5a654d364e98379fc60f73db2e06bf9a8310263d
/frameworks/base/core/res/AndroidManifest.xml
|
fda1855eaa61daad528cb444e99d0fc5195a7bd1 |
|
28-May-2014 |
Evan Charlton <evanc@google.com> |
Revert sendEnvelope changes [DO NOT MERGE] Revert the following changes from the I/O preview. This reverts the following changes: Revert "Revert "Revert "Modify TelephonyManager to expose sendEnvelopeWithStatus instead of sendEnvelope.""" This reverts commit 452e185fb6df92358701fb68d4fe6c65f172cc29. Change-Id: I6bbff508b2f542d6ef3d372956db53d63a9165eb Revert "Revert "Revert "Expose sendEnvelope.""" This reverts commit 0d5e5b9cce8af40494f72ff9decc169f99780254. Revert "Adding support for SIM communication from Android over logical channels." This reverts commit 57f656b9f6271cf857b5ecec5f8c7eacb321ec0b. Change-Id: I975eb468841e85d63e506f68a5d8c879e110d9f6
/frameworks/base/core/res/AndroidManifest.xml
|
c22dbb69194c8e8fe2a32326d1f37a738cad0904 |
|
26-May-2014 |
Wonsik Kim <wonsik@google.com> |
Revert "Revert "Add physical TV input handling to TvInputManagerService"" This reverts commit 1940e197a8de186df5edf0b78e0907ae539bd215. Bug: 14118245, Bug: 15197740 Change-Id: Ia308f16d2ed8ec55112a4d21c180ccb97e8d7c6a
/frameworks/base/core/res/AndroidManifest.xml
|
fb052926b84d69fdc4bebcb0373e33388c7bcbb7 |
|
21-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Revert "Hide voice interaction APIs." This reverts commit a677a9b9367bcf8c81c36dc59b53554cb347b438.
/frameworks/base/core/res/AndroidManifest.xml
|
62b25a5bf0750483f36ac79c88177ee2ab630f8e |
|
20-May-2014 |
Andres Morales <anmorales@google.com> |
Revert "Adding INfcUnlockSettings and NfcUnlock interface class." This will be re-added as a Trustlet in a subsequent CL. This reverts commit 38a7ed05f8fed0aa81f7214d827875f9876ffbe1. Change-Id: I5aa36df42a7751f165b4ef184e0cda57e5568b59
/frameworks/base/core/res/AndroidManifest.xml
|
b19c19265448a6252b1c14f3da85d52e50be34c3 |
|
19-May-2014 |
RoboErik <epastern@google.com> |
Merge "Rename session classes to have media prefix, hide routes"
|
42ea7eecd149161ed192d3029f0d77d1d08a4aa5 |
|
17-May-2014 |
RoboErik <epastern@google.com> |
Rename session classes to have media prefix, hide routes This renames several of the core session classes to be prefixed with Media. It also adds @hide to all route references for now. Change-Id: Idb42897d490cf24626e4e93ca975b2cb93ec054c
/frameworks/base/core/res/AndroidManifest.xml
|
dcff99598f16737e75278e8ea9dbfe92579ea234 |
|
16-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Hide voice interaction APIs. Change-Id: I961b6399a6edca239caaba9bbd1dd5e03bc612bd
/frameworks/base/core/res/AndroidManifest.xml
|
7e03dfcb796ef1a6000a5fd5fda03c9e15ea62e1 |
|
16-May-2014 |
Adrian Roos <roosa@google.com> |
Apply revised TrustAgent API Bug: 14997466 Change-Id: I81042e058a20f28603a11471882f3dcfc4f8b13c
/frameworks/base/core/res/AndroidManifest.xml
|
fbf53d042d68d1b0f9fefbcb1e819f25bd385f89 |
|
08-May-2014 |
Jessica Hummel <jhummel@google.com> |
Merge "Disallow the INTERACT_ACROSS_USERS permission for system apps"
|
96599a05acd7559464d527d819eaf4571129eb77 |
|
06-May-2014 |
Jessica Hummel <jhummel@google.com> |
Disallow the INTERACT_ACROSS_USERS permission for system apps This reverts a temporary hack which was required for a temporary launcher version to work for development purposes. Change-Id: Ifd17447076bf5c67ad2ce8df8f184fe6f12baad3
/frameworks/base/core/res/AndroidManifest.xml
|
d83a096f299abd9c7fe5e441ef1bb169c314b575 |
|
03-May-2014 |
Dianne Hackborn <hackbod@google.com> |
Bump up priority of system receiving BOOT_COMPLETED. Change-Id: I5166f88f11f781914312e867cb653c8ecbefa705
/frameworks/base/core/res/AndroidManifest.xml
|
09233289624a85093b1d99e4a6a149bf09059d8d |
|
30-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Make GET_TASKS signature|system. Normal apps can't hold it now. If they try to use getRecentTasks() or getRunningTasks() without the permission, they will only see their own tasks and home in the list. Also took this opportunity to eradicate all of the old pending thumbnail stuff. Change-Id: I6dc52a06221c78097162e4a8b482027b798bf3ee
/frameworks/base/core/res/AndroidManifest.xml
|
10fa67c77e11699391e27975fc2d276a0b8c7cbb |
|
24-Mar-2014 |
Nicolas Prevot <nprevot@google.com> |
Introduce forwarding intents across profiles. The package manager service maintains, for some user ids, a list of forwarding intent filters. A forwarding intent filter is an intent filter with a destination (a user id). If an intent matches the forwarding intent filter, then activities in the destination can also respond to the intent. When the package manager service is asked for components that resolve an intent: If the intent matches the forwarding intent filter, and at least one activity in the destination user can respond to the intent: The package manager service also returns the IntentForwarderActivity. This activity will forward the intent to the destination. Change-Id: Id8957de3e4a4fdbc1e0dea073eadb45e04ef985a
/frameworks/base/core/res/AndroidManifest.xml
|
b22aabbbd2801db0be526a64badf2efa208f19f1 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Merge "Introduce condition provider services."
|
7340fc8665ae3f9f1978f42aa0e5e1da85036158 |
|
25-Apr-2014 |
John Spurlock <jspurlock@google.com> |
Introduce condition provider services. Add the condition provider interface, base class, and associated system metadata. Pull out common service management code into a reusable helper, used by notification listeners and condition providers. The helper, ManagedServices, is now completely self-contained - it has no dependencies on NoMan or NoMan abstractions. Bug:13743109 Change-Id: I6856d40f0a2ead78ac9b5707568559a57e7eb009
/frameworks/base/core/res/AndroidManifest.xml
|
91097de49b0f683b00e26a75dbc0ac6082344137 |
|
05-Apr-2014 |
Dianne Hackborn <hackbod@google.com> |
Initial implementation of new voice interaction API. This gives a basic working implementation of a persist running service that can start a voice interaction when it wants, with the target activity(s) able to go through the protocol to interact with it. It may even work when the screen is off by putting the activity manager in the correct state to act like the screen is on. Includes a sample app that is a voice interation service and also has an activity it can launch. Now that I have this initial implementation, I think I want to rework some aspects of the API. Change-Id: I7646d0af8fb4ac768c63a18fe3de43f8091f60e9
/frameworks/base/core/res/AndroidManifest.xml
|
0a57a1112ff45507ef6361aabf42c97460405f47 |
|
18-Apr-2014 |
RoboErik <epastern@google.com> |
Merge "Add RouteProviders to the new Media APIs"
|
07c7077c54717dbbf2c401ea32d00fa6df6d77c6 |
|
20-Mar-2014 |
RoboErik <epastern@google.com> |
Add RouteProviders to the new Media APIs Compiles and works with OneMedia. This currently is a rough test of the system for finding, connecting to, and sending messages to routes. This will just connect to the first route it finds when a request to open the route picker is made (and disconnect when another request is made). Change-Id: I5de5521a079471b9e02664be4654c0591dfd9a6d
/frameworks/base/core/res/AndroidManifest.xml
|
66e5d96cf9e689148b202787bdc269519c4b6f8f |
|
09-Apr-2014 |
Robin Lee <rgl@google.com> |
Allow ProfileOwner apps to manage app restrictions Simple wrapper around the UserManager.{get|set}ApplicationRestrictions APIs. Also added a new Intent to signal to running apps that the set of restrictions has changed since startup. Change-Id: Ifd108108a73f87325b499d9de2e1b2aacc59b264
/frameworks/base/core/res/AndroidManifest.xml
|
b51e0a6c4b249e0d6f404fafef007645221be0d3 |
|
09-Apr-2014 |
Jeff Davidson <jpd@google.com> |
Stub APIs for network scoring. NetworkScoreManager defines all interactions between the framework and the scorer app. An ACTION_SCORE_NETWORKS broadcast is sent to the default scorer with any unscored networks, which responds by calling updateScores() with scores for those networks. An app may also check whether they are currently the default scorer with getDefaultScorerPackage() and request to become the default via the ACTION_CHANGE_DEFAULT broadcast. Bug: 13786258 Change-Id: Id3dc0f7c1109f0e3afd73356e2475b7f34167419
/frameworks/base/core/res/AndroidManifest.xml
|
d951ab230d80631731ef12b5d76c678c30165d6a |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am 8ebd66c2: am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit '8ebd66c259602f6b0be26fdfd3fe2f55538f6424': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
8ebd66c259602f6b0be26fdfd3fe2f55538f6424 |
|
11-Apr-2014 |
Aravind Akella <aakella@google.com> |
am cd4c1c71: Merge "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" into klp-modular-dev * commit 'cd4c1c714c37a1bc7ba35ebd2509eca4f0f6a314': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
cd9a7bb3ba742606f93dcbd549d6d6eeb1cb5247 |
|
08-Apr-2014 |
Aravind Akella <aakella@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor This reverts commit 819239e5bec90ee3c861ac45fffac4a832a183a1. Change-Id: I4bbb222e5c9dc65aed03aa28fd9e0f00fe335819
/frameworks/base/core/res/AndroidManifest.xml
|
6be2f95202237b7284542e692273d13a5bd26913 |
|
10-Apr-2014 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding render stats APIs to UiAutomation (framework)."
|
3957091ba8f08c02b5e781098cb955a5f697a1ff |
|
21-Feb-2014 |
Jae Seo <jaeseo@google.com> |
Initial round of Television Input Framework This provides APIs to control and create individual television inputs on the system which will later be hosted by television applications. Change-Id: I6866d28e78175a1bff2c32a85c5d77e94d0cd60c
/frameworks/base/core/res/AndroidManifest.xml
|
1376d600d8e0eefdbc0aa11d398cf7517fc77129 |
|
13-Mar-2014 |
Svetoslav <svetoslavganov@google.com> |
Adding render stats APIs to UiAutomation (framework). bug:12927198 Change-Id: Iae21481c75ae58dcdab3731bf5f1e2844e29d434
/frameworks/base/core/res/AndroidManifest.xml
|
acf395fd9441bce9fbe68c1b7efbf824570284bc |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am 819239e5: Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" * commit '819239e5bec90ee3c861ac45fffac4a832a183a1': Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor"
|
fa1d2417d296e28a48a8c4a5cfb932172edbdd65 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61 (cherry picked from commit 819239e5bec90ee3c861ac45fffac4a832a183a1)
/frameworks/base/core/res/AndroidManifest.xml
|
819239e5bec90ee3c861ac45fffac4a832a183a1 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
Revert "Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor" This reverts commit fd53d8352a4617941b0a0449390aa562a01ea1d3. Change-Id: I1c6322d1d992147bb5ef201238374966128c1a61
/frameworks/base/core/res/AndroidManifest.xml
|
ded264733036bb566c54da5b771d63f57213c84e |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am bdfe3841: am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'bdfe384106de364ea2effac6ab80108556d11649': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
bdfe384106de364ea2effac6ab80108556d11649 |
|
05-Apr-2014 |
Etienne Le Grand <etn@google.com> |
am fd53d835: Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor * commit 'fd53d8352a4617941b0a0449390aa562a01ea1d3': Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor
|
fd53d8352a4617941b0a0449390aa562a01ea1d3 |
|
25-Mar-2014 |
Etienne Le Grand <etn@google.com> |
Add stringType and requiredPermissions to SensorManager.java, as well as a permission for the heart rate sensor Change-Id: I16e5da68f860494e24cca64075be76fad02617bc
/frameworks/base/core/res/AndroidManifest.xml
|
9de8c1d82b6bf2b70e854a3349c9f1da60a23e83 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
resolved conflicts for merge of 4f342e87 to master Change-Id: I2cdb238759beb49fede2de703df8defee92d316f
/frameworks/base/core/res/AndroidManifest.xml
|
4f342e878d88b1f75a9b487e2aa0582b59e29083 |
|
03-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
am 4995d725: Merge "Add signature|system permission to MediaDrm signer APIs" into klp-modular-dev * commit '4995d72520d16302fca13bc4614d1dd3c0d1c17c': Add signature|system permission to MediaDrm signer APIs
|
65c94e695929ffa1aaa49d7b5938b34aaf078b6c |
|
02-Apr-2014 |
Jeff Tinker <jtinker@google.com> |
Add signature|system permission to MediaDrm signer APIs Also addresses style issues noted in post-submit review from https://googleplex-android-review.git.corp.google.com/#/c/439054/ Change-Id: If177b11dbcc049bc271529c119bc5c36ae0107b5 related-to-bug: 12702350
/frameworks/base/core/res/AndroidManifest.xml
|
82142c21dd333307682d5f4bb09de3ab3ccfa06c |
|
27-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define trust agent framework components Adds the TrustManager system service that allows registering for changes to the trust status and reporting events that are important to trust agents. Bug: 13723878 Change-Id: I7d0d2ea86fd755702d31aa5d49cac038a6cd4301
/frameworks/base/core/res/AndroidManifest.xml
|
ff2144ccb4215acf4587fc628493b3d49dca6043 |
|
28-Mar-2014 |
Adrian Roos <roosa@google.com> |
Define initial trust agent API Adds the minimal API needed to define a useful trust agent. Bug: 13723878 Change-Id: Ib24440bab7b16d0b656bde8b059e7d42cab2c7dc
/frameworks/base/core/res/AndroidManifest.xml
|
a42cb8b0e2b8fdfbac1a6590d6b60814caa01088 |
|
21-Mar-2014 |
Colin Cross <ccross@android.com> |
resolved conflicts for merge of a67e34c8 to master Change-Id: I597525886260884c9b2dfc7945e01eb8138a58c2
|
cf0c4a59b6d6c7d0abe6b643e200af2eb9f0d6b2 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am 4868da52: am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit '4868da52450d3e5456b3567c228967539144d108': Lock down MANAGE_DOCUMENTS permission.
|
4868da52450d3e5456b3567c228967539144d108 |
|
21-Mar-2014 |
Jeff Sharkey <jsharkey@android.com> |
am c620ec36: am 3f523222: Merge "Lock down MANAGE_DOCUMENTS permission." into klp-dev * commit 'c620ec3614c8737b87d60efa9db96c288bcad794': Lock down MANAGE_DOCUMENTS permission.
|
f2fecf48f740a079cf9015ea8c2695039ca11d81 |
|
21-Mar-2014 |
Jinsuk Kim <jinsukkim@google.com> |
am c61f4dd7: Merge "Add HDMI-CEC service" into klp-modular-dev * commit 'c61f4dd744b1b0396703aa58eb22fc31d2b7050e': Add HDMI-CEC service
|
adfe8b86e9178a553b6db9722340fa4ff5201cf1 |
|
05-Feb-2014 |
Christopher Tate <ctate@google.com> |
App widget backup/restore infrastructure Backup/restore now supports app widgets. An application involved with app widgets, either hosting or publishing, now has associated data in its backup dataset related to the state of widget instantiation on the ancestral device. That data is processed by the OS during restore so that the matching widget instances can be "automatically" regenerated. To take advantage of this facility, widget-using apps need to do two things: first, implement a backup agent and store whatever widget state they need to properly deal with them post-restore (e.g. the widget instance size & location, for a host); and second, implement handlers for new AppWidgetManager broadcasts that describe how to translate ancestral-dataset widget id numbers to the post-restore world. Note that a host or provider doesn't technically need to store *any* data on its own via its agent; it just needs to opt in to the backup/restore process by publishing an agent. The OS will then store a small amount of data on behalf of each widget-savvy app within the backup dataset, and act on that data at restore time. The broadcasts are AppWidgetManager.ACTION_APPWIDGET_RESTORED and ACTION_APPWIDGET_HOST_RESTORED, and have three associated extras: EXTRA_APPWIDGET_OLD_IDS EXTRA_APPWIDGET_IDS EXTRA_HOST_ID [for the host-side broadcast] The first two are same-sized arrays of integer widget IDs. The _OLD_IDS values are the widget IDs as known to the ancestral device. The _IDS array holds the corresponding widget IDs in the new post- restore environment. The app should simply update the stored widget IDs in its bookkeeping to the new values, and things are off and running. The HOST_ID extra, as one might expect, is the app-defined host ID value of the particular host instance which has just been restored. The broadcasts are sent following the conclusion of the overall restore pass. This is because the restore might have occurred in a tightly restricted lifecycle environment without content providers or the package's custom Application class. The _RESTORED broadcast, however, is always delivered into a normal application environment, so that the app can use its content provider etc as expected. *All* widget instances that were processed over the course of the system restore are indicated in the _RESTORED broadcast, even if the backing provider or host is not yet installed. The widget participant is responsible for understanding that these are promises that might be fulfilled later rather than necessarily reflecting the immediate presentable widget state. (Remember that following a cloud restore, apps may be installed piecemeal over a lengthy period of time.) Telling the hosts up front about all intended widget instances allows them to show placeholder UI or similarly useful information rather than surprising the user with piecemeal unexpected appearances. The AppWidgetProvider helper class has been updated to add a new callback, onRestored(...), invoked when the _RESTORED broadcast is received. The call to onRestored() is immediately followed by an invocation of onUpdate() for the affected widgets because they will need to have their RemoteViews regenerated under the new ID values. Bug 10622506 Bug 10707117 Change-Id: Ie0007cdf809600b880d91989c00c3c3b8a4f988b
/frameworks/base/core/res/AndroidManifest.xml
|
8e3feb15c5aec2c72b0ef120a1da325e1e8f0dda |
|
24-Feb-2014 |
Svetoslav <svetoslavganov@google.com> |
Added accessibility APIs for introspecting interactive windows. 1. The old introspection model was allowing querying only the active window which is the one the user is touching or the focused one if no window is touched. This was limiting as auto completion drop downs were not inspectable, there was not way to know when the IME toggles, non-focusable windows were not inspectable if the user taps them as until a screen-reader starts introspecting the users finger is up, accessibility focus was limited to only one window and the user couldn't use gestures to visit the whole UI, and other things I can't remember right now. The new APIs allow getting all interactive windows, i.e. ones that a sighted user can interact with. This prevents an accessibility service from interacting with content a sighter user cannot. The list of windows can be obtained from an accessibility service or the host window from an accessibility node info. Introspecting windows obey the same rules for introspecting node, i.e. the service has to declare this capability in its manifest. When some windows change accessibility services receive a new type of event. Initially the types of windows is very limited. We provide the bounds in screen, layer, and some other properties which are enough for a client to determined the spacial and hierarchical relationship of the windows. 2. Update the documentation in AccessibilityService for newer event types. 3. LongArray was not removing elements properly. 4. Composite accessibility node ids were not properly constructed as they are composed of two ints, each taking 32 bits. However, the values for undefined were -1 so composing a 64 long from -1, -1 prevents from getting back these values when unpacking. 5. Some apps were generating inconsistent AccessibilityNodeInfo tree. Added a check that enforces such trees to be well formed on dev builds. 6. Removed an necessary code for piping the touch exploration state to the policy as it should just use the AccessibilityManager from context. 7. When view's visibility changed it was not firing an event to notify clients it disappeared/appeared. Also ViewGroup was sending accessibility events for changes if the view is included for accessibility but this is wrong as there may be a service that want all nodes, hence events from them. The accessibility manager service takes care of delivering events from not important for accessibility nodes only to services that want such. 8. Several places were asking for prefetching of sibling but not predecessor nodes which resulted in prefetching of unconnected subtrees. 9. The local AccessibilityManager implementation was relying on the backing service being ready when it is created but it can be fetched from a context before that. If that happens the local manager was in a broken state forever. Now it is more robust and starts working properly once the backing service is up. Several places were lacking locking. bug:13331285 Change-Id: Ie51166d4875d5f3def8d29d77973da4b9251f5c8
/frameworks/base/core/res/AndroidManifest.xml
|
4f512fb451c8ddcea852645c5c24314c20c0974b |
|
28-Feb-2014 |
Jinsuk Kim <jinsukkim@google.com> |
Add HDMI-CEC service This CL adds a system service handling HDMI-CEC protocol. The service is equipped with the capability sending/receiving HDMI-CEC messages Not all the messages are in place. Currently it has messages to support a few features only, as follows: - One touch play - System information - Routing control (partially - active source status maintenance only) - Device OSD transfer - Power status It will be extended to cover the wider usages in the follow up CLs. The CEC standard version referenced in the implementation is 1.3a. Change-Id: Ifed0b02f52ebf098eddb3bd0987efbf353b7e8fe
/frameworks/base/core/res/AndroidManifest.xml
|
d0abcedece5c749129af89cf096534c98a716d89 |
|
20-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Introduce the SearchIndexablesProvider and its friends"
|
b49995d4d997bf086c2f3214ca410b2a30861b13 |
|
15-Mar-2014 |
Fabrice Di Meglio <fdimeglio@google.com> |
Introduce the SearchIndexablesProvider and its friends - enable retrieval of search data to be indexed Change-Id: I4a16408dec3d3305bf20107fb11eb2d1aee7fad5
/frameworks/base/core/res/AndroidManifest.xml
|
42c32c0c88e4049a358b0a2bf6e6a5881ee206b8 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
b4ca2639e4fddaaf7ff72ec7322929d6397e66b7 |
|
13-Mar-2014 |
Jessica Hummel <jhummel@google.com> |
Temporarily allow system apps to fully act across users. This is to allow launcher to start activities across users and will be reverted when an alternative API is provided. Change-Id: I67ec3e9d419afffbadce37d6e9958e2dfc096fb2
/frameworks/base/core/res/AndroidManifest.xml
|
d6396d67201fb2b64d13070324bb115c9c23b08a |
|
28-Jan-2014 |
Jason Gerecke <killertofu@gmail.com> |
Allow persistence of input device calibration This patch extends the PersistentDataStore store to read and write input device calibration data. A new SET_INPUT_CALIBRATION permission grants apps the ability to update this information, and a new TouchCalibration class is used to wrap the raw calibration data. Change-Id: I4daac2b15ef03616ea5b068c1e77bebd0ce7b8c1
/frameworks/base/core/res/AndroidManifest.xml
|
4c8c27ed7360abe3cd91a281e40d4e21948abc2a |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. DO NOT MERGE. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa (cherry picked from commit b4aeac730503eb4b9db7d2dcece48e1ca13b4b30)
/frameworks/base/core/res/AndroidManifest.xml
|
f55616cd8b78ed55148ee2dcfcf59cd34cdb4a96 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978 (cherry picked from commit 08d7c2861fee205a314c3847ab5f5894617a233b)
/frameworks/base/core/res/AndroidManifest.xml
|
b4aeac730503eb4b9db7d2dcece48e1ca13b4b30 |
|
04-Mar-2014 |
Santos Cordon <santoscordon@google.com> |
Updating wording around PROCESS_INCOMING_CALL. bug: 12175514 Change-Id: I37dba7eedbf86c0b87ce559a52fe0b15c6911bfa
/frameworks/base/core/res/AndroidManifest.xml
|
a4eeb0dca0108ac5b2c0f0dc044c9104ba1db302 |
|
04-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am bc8301df: am 0054ed81: am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit 'bc8301dfa3fc2789c4bf8dc82784075980b6329f': Update permission description string.
|
0054ed815a3db340a27d8a179d3b748bf3eeaaf0 |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 8bb3b8f8: am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '8bb3b8f805658ecf9106778992dceea9a05dcc4c': Update permission description string.
|
8bb3b8f805658ecf9106778992dceea9a05dcc4c |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am 95cf532f: am 26de0b71: am cce121fb: Merge "Update permission description string." into klp-docs * commit '95cf532fe389713ff1fb33810012586fd460e223': Update permission description string.
|
26de0b7118e188bac5a30d9562418fa09be3826a |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
am cce121fb: Merge "Update permission description string." into klp-docs * commit 'cce121fb7504fbc460b85564735ff5d8a1ed4d55': Update permission description string.
|
08d7c2861fee205a314c3847ab5f5894617a233b |
|
03-Mar-2014 |
Dirk Dougherty <ddougherty@google.com> |
Update permission description string. Change-Id: I6cd5895d78bff4f6f3fc8090e13a9ddbd83a1978
/frameworks/base/core/res/AndroidManifest.xml
|
3cff34742aa4f4b305b2edc462a369355b2e75da |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am 341e6b73: am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit '341e6b73e6362f8757717a2518b370724c3a3913': Make FORCE_STOP_PACKAGES "signature|system"
|
341e6b73e6362f8757717a2518b370724c3a3913 |
|
03-Mar-2014 |
rich cannings <richc@google.com> |
am fd6d8a8b: am bc4d34dd: am 8ebfbffc: Merge "Make FORCE_STOP_PACKAGES "signature|system"" into klp-dev * commit 'fd6d8a8b736568ccb61af10dec04a99a8c36f29a': Make FORCE_STOP_PACKAGES "signature|system"
|
0c9bd3ed4da14fbfe7f9cab872b94ed2be436cc2 |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b (cherry picked from commit 4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e)
/frameworks/base/core/res/AndroidManifest.xml
|
89f545a4ebd96b7d36b00eafa43db8ea70ed21f9 |
|
18-Feb-2014 |
Jeff Sharkey <jsharkey@android.com> |
Lock down MANAGE_DOCUMENTS permission. MANAGE_DOCUMENTS is a very broad permission, since it allows full access to all DocumentsProviders. DocumentsUI should really be the only app holding this permission; everyone else should rely on Uri permission grants for access. Bug: 12958298 Change-Id: I1def48a4ea1814e031fc8513c3cd051d764cd7f8
/frameworks/base/core/res/AndroidManifest.xml
|
5a92fec650447baddff3c85aaa83c6fc805880bf |
|
14-Feb-2014 |
rich cannings <richc@google.com> |
Merge "Make FORCE_STOP_PACKAGES "signature|system""
|
005151484546fb0bf7f83c5a6ee065715230bf26 |
|
13-Feb-2014 |
Narayan Kamath <narayan@google.com> |
resolved conflicts for merge of 396b9e79 to master Change-Id: Ie71a79699be57f5af6069559068bf6253835d805
|
27bf55c8159e7f883ddc839453d5a12374ddc50a |
|
13-Feb-2014 |
Wink Saville <wink@google.com> |
am 16c0b295: am bba3a694: Merge "Telephony API extension v2" * commit '16c0b295ef069e128a4e01fd2f72da06784950a1': Telephony API extension v2
|
4b7510cf842fdadf1b7e8e0495ded1b2bbd50d7e |
|
12-Feb-2014 |
rich cannings <richc@google.com> |
Make FORCE_STOP_PACKAGES "signature|system" Bug: 12992556 Change-Id: Iebc91aabb67034e8a5ada7efdcdaaed4cc6d0f1b
/frameworks/base/core/res/AndroidManifest.xml
|
8f9b33e77686de8e917ba61c5e2f2e31a1e0e49b |
|
15-Jan-2014 |
Jake Hamby <jhamby@google.com> |
Add new RIL commands to read/write NV items and reset NV config. Add new RIL commands and generic code cleanups. The only changes required for OMA DM support are the addition of five new methods in ITelephony.aidl for reading/writing NV items and performing NV config and radio resets (requires MODIFY_PHONE_STATE), along with the new RIL request IDs in RILConstants.java. Bug: 12864208 Change-Id: I958d2571580d98a49936ef2e6822e5ac086acbe2
/frameworks/base/core/res/AndroidManifest.xml
|
31b4834b6d5eb1e5156950930b69221819a84766 |
|
03-Feb-2014 |
Christopher Tate <ctate@google.com> |
Merge "Introduce "IdleService" API to expose idle-time maintenance to apps"
|
d417d625d244356bc770e2692fd59e754a72f59f |
|
20-Aug-2013 |
Christopher Tate <ctate@google.com> |
Introduce "IdleService" API to expose idle-time maintenance to apps When an application wishes to do low-priority background work when the device is otherwise idle (e.g. in a desk dock overnight), it declares a service in its manifest that requires this permission: android:permission="android.permission.BIND_IDLE_SERVICE to launch, and which publishes this intent filter: <intent-filter> <action android:name="android.service.idle.IdleService" /> </intent-filter> This string is declared in the API as IdleService.SERVICE_INTERFACE. The service must be implemented by extending the new "IdleService" class, which provides the API through which the system will communicate with the app. IdleService declares three methods, two of which are lifecycle callbacks to the service, and the third of which is for the service itself to invoke when appropriate. The lifecycle callbacks are public abstract boolean onIdleStart(); public abstract void onIdleStop(); The first of these is a notification to the service that an idle maintenance interval has begun. The service can then spin off whatever non-UI work it wishes. When the interval is over, or if the OS determines that idle services should be shut down immediately, the onIdleStop() method will be invoked. The service must shut down any background processing immediately when this method is called. Both of these methods must return immediately. However, the OS holds a wakelock on the application's behalf for the entire period between the onIdleStart() and onIdleStop() callbacks. This means that for system-arbitrated idle-time operation, the application does not need to do any of its own wakelock management, and does not need to hold any wakelock permissions. The third method in IdleService is public final void finishIdle(); Calling this method notifies the OS that the application has finished whatever idle-time operation it needed to perform, and the OS is thus free to release the wakelock and return to normal operation (or to allow other apps to run their own idle services). Currently the idle window granted to each idle service is ten minutes. The OS is rather conservative about when these services are run; low battery or any user activity will suppress them, and the OS will not choose to run them particularly often. Idle services are granted their execution windows in round-robin fashion. Bug 9680213 Change-Id: Idd6f35940c938c31b94aa4269a67870abf7125b6
/frameworks/base/core/res/AndroidManifest.xml
|
17b79985f4e5e6b696320e29f665adb796a2aef5 |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
am 47e276db: am cbd156c1: Merge "Update READ&WRITE_DREAM_STATE to signature|system." into klp-modular-dev * commit '47e276db2a938ca4ff9767cba28062b892e81629': Update READ&WRITE_DREAM_STATE to signature|system.
|
4fda2d5ab7a3faf782c78e2f1ac4a54201ab8dff |
|
31-Jan-2014 |
John Spurlock <jspurlock@google.com> |
Update READ&WRITE_DREAM_STATE to signature|system. Change-Id: Ic3c4c5445384712571e7a1188ed9e2ab6ceb4bde
/frameworks/base/core/res/AndroidManifest.xml
|
bca57ee556c26cd3eaeccab43ec3ddda39d287fa |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
am e2bb257c: Merge "Make MANAGE_ACTIVITY_STACKS a signature|system permission." into klp-modular-dev * commit 'e2bb257c349b21f68e3b9b87eb7cabd205380082': Make MANAGE_ACTIVITY_STACKS a signature|system permission.
|
9e24357ddb504e575ce86207355811bfc9008088 |
|
27-Jan-2014 |
Griff Hazen <griff@google.com> |
Make MANAGE_ACTIVITY_STACKS a signature|system permission. To allow ActivityView support within privileged apps. Change-Id: Ic0246939bf71c52ca9415149415a976537c8270b
/frameworks/base/core/res/AndroidManifest.xml
|
3b0218b0ae1fad67f539ff3c10d6d2f3abec1a11 |
|
14-Jan-2014 |
Doug Zongker <dougz@android.com> |
boot into recovery via the pre-recovery service Change PowerManagerService to start the pre-recovery service rather than rebooting directly, when requested to reboot into recovery. Add a new RECOVERY permission which a caller needs (in addition to REBOOT) in order to go to recovery. Bug: 12188746 Change-Id: I39121b701c4724558fe751adfbad79f8567faa43
/frameworks/base/core/res/AndroidManifest.xml
|
c5ac15a3e11c03951e269b243674858411204b67 |
|
27-May-2013 |
Antonio Marín Cerezuela <amarin@swissms.ch> |
Telephony API extension v2 Added new AndroidManifest permission: android.permission.READ_PRECISE_PHONE_STATE Added the following PhoneStateListeners and corresponding broadcast intents: onPreciseCallStateChanged(PreciseCallState callState); onPreciseDataConnectionStateChanged(PreciseDataConnectionState dataConnectionState); broadcastPreciseCallStateChanged(int ringingCallState, int foregroundCallState, int backgroundCallState, int disconnectCause, int preciseDisconnectCause) broadcastPreciseDataConnectionStateChanged(int state, int networkType, String apnType, String apn, String reason, LinkProperties linkProperties, String failCause) Added TelephonyManager intent actions with their extras and constants: public static final String ACTION_PRECISE_CALL_STATE_CHANGED = "android.intent.action.PRECISE_CALL_STATE"; public static final String ACTION_PRECISE_DATA_CONNECTION_STATE_CHANGED = "android.intent.action.PRECISE_DATA_CONNECTION_STATE_CHANGED"; public static final int PRECISE_CALL_STATE_* Moved public static final int DISCONNECT_CAUSE_* from PreciseCallState.java to a new class DisconnectCause.java Moved public static final int PRECISE_DISCONNECT_CAUSE_* from PreciseCallState.java to a new class PreciseDisconnectCause.java Change-Id: If3b88c679507c529b746046c4a17cf6d9974bd09
/frameworks/base/core/res/AndroidManifest.xml
|
c4d41755d73ffe85d179d42a4f0c993b49303145 |
|
17-Dec-2013 |
Shishir Agrawal <shishir@google.com> |
Merge "Adding support for SIM communication from Android over logical channels."
|
57f656b9f6271cf857b5ecec5f8c7eacb321ec0b |
|
28-Oct-2013 |
Shishir Agrawal <shishir@google.com> |
Adding support for SIM communication from Android over logical channels. Expose the folowing commands in ITelephony.aidl and TelephonyManager: - iccOpenLogicalChannel - iccCloseLogicalChannel - iccTransmitApduLogicalChannel Also add a new SIM_COMMUNICATION permission (maked as dangerous) to control access to the above commands. Change-Id: I89c08adc6f9738907e3b547c749f3cc61f300710
/frameworks/base/core/res/AndroidManifest.xml
|
09e9cdceceb722643e2c80c6544d44a43d7f95f0 |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
DO NOT MERGE : Move some system services to their own sub package. (Cherry pick from master) As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: Idd92871c1828bdde81d85fe99a9c87a22d53169d
/frameworks/base/core/res/AndroidManifest.xml
|
38a7ed05f8fed0aa81f7214d827875f9876ffbe1 |
|
15-Nov-2013 |
Andres Morales <anmorales@google.com> |
Adding INfcUnlockSettings and NfcUnlock interface class. Change-Id: Ie55a5d4bb58c2944952fc84cce32d3573a3a1a22
/frameworks/base/core/res/AndroidManifest.xml
|
84e0747552cfaa0546822df221e3dece7481c4b1 |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
am 461febad: am 64397749: am 22010817: Merge "Handle backup transport registration dynamically" into klp-dev * commit '461febadc44190bf19e870a0bc1a706ec3667212': Handle backup transport registration dynamically
|
cefba58d14f9669b57c16b4ea493779d882c43bd |
|
15-Nov-2013 |
Christopher Tate <ctate@google.com> |
Handle backup transport registration dynamically Bug 11369873 Change-Id: I9bbdcc21ce25159c6645690123b5d03c553b0ddc
/frameworks/base/core/res/AndroidManifest.xml
|
30f8eb472e44228069c2ffb8bd0b43213edbf04e |
|
06-Nov-2013 |
Amith Yamasani <yamasani@google.com> |
Move some system services to their own sub package. As a next step they can be moved into separate directories to be built as separate modules that may or may not be included in a particular configuration. Moves AppWidgetService, BackupManagerService, ClipboardService, DevicePolicyMS, and WallpaperMS. Change-Id: I33e48d070f38186819d3a1d7a4dc3984b75a9eda
/frameworks/base/core/res/AndroidManifest.xml
|
6c58d890f3a6993a3bcf413b84ba6fba875832f8 |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
am 84d76025: am eb223425: am 1f7a8a06: Merge "Add a platform library for remote display providers." into klp-dev * commit '84d760257f46232601e5f47411fb4e59f57f1872': Add a platform library for remote display providers.
|
1f7a8a06256907e03405f89108f081289c23e97a |
|
08-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Merge "Add a platform library for remote display providers." into klp-dev
|
f3c99e883f46c56e5e2877e844b902b6eb45545b |
|
06-Nov-2013 |
Jeff Brown <jeffbrown@google.com> |
Add a platform library for remote display providers. This interface allows applications to register services that offer remote displays to the system. The system will then provide UI to allow user to connect to these displays and enable mirroring. Bug: 11257292 Change-Id: I34da5b9dfdaf71267bd3450c505bc1b7368d1b40
/frameworks/base/core/res/AndroidManifest.xml
|
99543e03b87899ac5de4f7f2dc388e5c9f546d04 |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 8f4797d1: am 35c94390: am 7ce4381a: Merge "Move READ_EXTERNAL_STORAGE to storage group." into klp-dev * commit '8f4797d111cf3dd83fdda69bdbe2a7dcef1888d9': Move READ_EXTERNAL_STORAGE to storage group.
|
eaa9780fd64f122df8a306562786e106ae228ceb |
|
30-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Move READ_EXTERNAL_STORAGE to storage group. Bug: 11437351 Change-Id: I460a3ee7860e8591e601eec7d390c3ca7eed1be6
/frameworks/base/core/res/AndroidManifest.xml
|
3aab4962513bc61ea75ac1e4cc239a97ee5f1860 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
am 41fab0a1: am fa191d5a: am d9e98a4b: Merge "Unhide BIND_NFC_SERVICE permission." into klp-dev * commit '41fab0a19caeb8077171f0eb605f416cbc4a0ef0': Unhide BIND_NFC_SERVICE permission.
|
8c99ab849e7d9c87bae3b20377af66ad266eba99 |
|
23-Oct-2013 |
Martijn Coenen <maco@google.com> |
Unhide BIND_NFC_SERVICE permission. Needs to be held by host-based card emulation apps in order to work. Bug: 11352063 Change-Id: I8ba42446cd3066b38309d8e9cbc51d140a023547
/frameworks/base/core/res/AndroidManifest.xml
|
ad9739cdbeb09f672304a0812c6c5fef5733e1c2 |
|
14-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5f7f97e0: am 2dbe1627: am 12ad9ce2: Merge "Fix spelling." into klp-dev * commit '5f7f97e01507c6d5860388dfea860e05c2a3616e': Fix spelling.
|
ed74f8eda220445a09f4b49b66de73da2f71c3eb |
|
11-Oct-2013 |
Jeff Sharkey <jsharkey@android.com> |
Fix spelling. Change-Id: Ibcc5a5b976e185c4a6605b18b645b05a5c00f3ec
/frameworks/base/core/res/AndroidManifest.xml
|
0fae349f19e2f4738c12f4849054c72a007770b0 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am 353ec474: am 8029493f: am f012b777: Merge "Fix some doc issues." into klp-dev * commit '353ec47422cbd1bb40f19e7ec9ec6b4f300ee3ab': Fix some doc issues.
|
ebc15ef80ff1b4354be99a45d348537f094d6b59 |
|
10-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix some doc issues. Bug: 11079621 Bug: 10461610 Bug: 10461369 Bug: 10461417 Change-Id: I7fd966f3cda0660ba20fa15d7164dcac95efadd3
/frameworks/base/core/res/AndroidManifest.xml
|
b8aa12273f91b4b2689ceca5029da58d8f307bee |
|
02-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
am af85c03d: am b9edb3a2: Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev * commit 'af85c03deb3506cebebd1719df4bfb844505fc9d': Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature.
|
3d2a664a426be706d293e895493ee96376b1de30 |
|
02-Oct-2013 |
Matthew Xie <mattx@google.com> |
am 9eb9ebb2: am 0e772b22: Merge "Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields" into klp-dev * commit '9eb9ebb2fbbe1135919cf685d84eba18cfecdf01': Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields
|
b9edb3a22b3342912bb9eef79aee0bfcb6be1675 |
|
01-Oct-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature." into klp-dev
|
3714141d287c965ea3451831dd5167f63f8db87b |
|
30-Sep-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #10971287: Make ACCESS_BATTERY_STATS permission system or signature. Change-Id: I432a2ddbd2fe1d095bb3895c5c122acf465d0c9b
/frameworks/base/core/res/AndroidManifest.xml
|
091fc2ba7a4441b9985dfd9ebe25cb7c99a7324b |
|
24-Sep-2013 |
Matthew Xie <mattx@google.com> |
Unhide setPin, setPin, setPairingConfirmation, and relevant intent fields bug 9987787 Change-Id: Id1c149964137e35703310e2f2893c8830aacddea
/frameworks/base/core/res/AndroidManifest.xml
|
e5a8b028c3bccc5eb72c5d23c8a43eecee9740a7 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
am 54e3e7b5: am 92baafb4: Merge "Moving Launcher permission to Framework. (Bug 10343529)" into klp-dev * commit '54e3e7b5d43b87bddabfb2e312becb33a8c46582': Moving Launcher permission to Framework. (Bug 10343529)
|
4516798862bf46d12b3f1130b8480e8c804146d0 |
|
26-Sep-2013 |
Winson Chung <winsonc@google.com> |
Moving Launcher permission to Framework. (Bug 10343529) Change-Id: Ic48c254c844e65171b5f92d81272962cdc673acc
/frameworks/base/core/res/AndroidManifest.xml
|
80326646b79538178c3115a4bf2d89b9616c50be |
|
19-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am 58910a74: am 1608f496: Merge "Public API for RemoteController" into klp-dev * commit '58910a746ebf915264b87536ab25148a94714ca2': Public API for RemoteController
|
a83487e8c618f3c267c3fe3a72d4eb9f1388d07e |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
Public API for RemoteController Public API, under system|signature permission for access to currently playing metadata and playback state. Public API for sending media key events. Bug 8209392 Change-Id: I39b9309ca3fb1bc305492bad98740df0ae0842b2
/frameworks/base/core/res/AndroidManifest.xml
|
cac8a1c08ce5c07e5d5a4ab4314fa46ddf52c983 |
|
18-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
am f54f7d70: am 15bcc323: Merge "RemoteController class to expose IRemoteControlDisplay features" into klp-dev * commit 'f54f7d707546a99ffc5345591f2c9488e6149e84': RemoteController class to expose IRemoteControlDisplay features
|
7ddd226e7c6e759feaf2747a90be1cc06acf37a3 |
|
02-Sep-2013 |
Jean-Michel Trivi <jmtrivi@google.com> |
RemoteController class to expose IRemoteControlDisplay features Wrap all the features of IRemoteControlDisplay.aidl in a new class, RemoteController, that implements the IRemoteControlDisplay interface. The API functions to expose in the SDK are tagged with "CANDIDATE FOR API" Bug 8209392 Change-Id: I597bcd503ac93e73889c9ae8b47b16c4fcb363bc
/frameworks/base/core/res/AndroidManifest.xml
|
8a4577a1697f053f94527fc2dfa89209284d8d71 |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am deae1e11: am b00e5cc6: Merge "Add permissions for the InCallUI Split." into klp-dev * commit 'deae1e11bf9d6ee40e70bee62d24dbcb01ef1b60': Add permissions for the InCallUI Split.
|
b00e5cc610f24aca7e989db0ca552c952d2a924f |
|
17-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
798363894d21cf87bf1915372f9dcc4605b3d4ac |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic1023adba939c82e9bce844c104f85821f21f43c
/frameworks/base/core/res/AndroidManifest.xml
|
dde1f8b01b02b6227444d9096e106b93615bb83f |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
am 1e763fd2: am e4fdc847: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '1e763fd280b3dc555e6a0a3a6458fbdb9a43e096': Revert "Add permissions for the InCallUI Split."
|
e4fdc84794923f9408fc400ed9177178329a08cd |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
41b9ef9c4e175770e4ccef3d83d117f404915b48 |
|
12-Sep-2013 |
Selim Gurun <sgurun@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit 4f7ffa90d117e499786c77bccefdef88c1714668. Change-Id: If07f7dd0b416c070398593e2d5a15b3557c1f323
/frameworks/base/core/res/AndroidManifest.xml
|
835b5f344ba63a6c0ac9c8a7cc40052134d59b8c |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
am e33b79ef: am 95a18139: Merge "Add HOTWORD as an AudioSource" into klp-dev * commit 'e33b79ef373fd3db9de035b5ecf2137a0684a441': Add HOTWORD as an AudioSource
|
e7f6bfbc51365f40185f53027c7dd5a07e162924 |
|
12-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 07d545e0: am e0b7e4cf: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '07d545e08d615865860a0f73b7eabfd149754893': Add permissions for the InCallUI Split.
|
4c980cc6aede622b165d7936a89aae507a317cd3 |
|
12-Sep-2013 |
Alexander Ray <aray@google.com> |
am b0049151: am 7563d423: Merge "Add consumer IR framework" into klp-dev * commit 'b0049151f7c1f2ffa7481ac7c6f6baf7a548c5e8': Add consumer IR framework
|
6f64688bc8c1fc01b632dadfe4f75587f446e626 |
|
12-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am 6c5e9fb4: am f702286c: Merge "Remove HotwordRecognition APIs" into klp-dev * commit '6c5e9fb4c4215f76a8a1fd8d72eee1154deb1039': Remove HotwordRecognition APIs
|
95a181397dad3113b96e3cc7392a5b0f5d742f39 |
|
12-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Merge "Add HOTWORD as an AudioSource" into klp-dev
|
e0b7e4cf455b21316661b158edee12ac5467995c |
|
11-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
7563d42331ed7df7f026c8921ae990ce2fca9efd |
|
11-Sep-2013 |
Alexander Ray <aray@google.com> |
Merge "Add consumer IR framework" into klp-dev
|
65a6ba347848069b198869a7500d07a419aaf15d |
|
11-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Remove HotwordRecognition APIs - and its usage from Keyguard Bug: 10708010 Change-Id: Ic4a695a1d0e9312706a3b4ff01e59e2567b6ad9c
/frameworks/base/core/res/AndroidManifest.xml
|
51e95df8f24e9ea30775686b9e324b9a671213dc |
|
26-Jun-2013 |
Erik Gilling <konkers@android.com> |
Add consumer IR framework Change-Id: I786c00db0cce61ef75e4edc24e90f2cdcba6dbfb
/frameworks/base/core/res/AndroidManifest.xml
|
357263da0ec2bc2be9d48c1becc3d94288c2f3ed |
|
09-Sep-2013 |
Eric Laurent <elaurent@google.com> |
Add HOTWORD as an AudioSource - This is a low-priority source that can be preempted by others - This is required for scenarios where someone wants an alway-on graceful microphone Bug: 10640877. Change-Id: Idb3577541103717cb713a7a93d3762ad2c2f4710
/frameworks/base/core/res/AndroidManifest.xml
|
4f7ffa90d117e499786c77bccefdef88c1714668 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: I7e45aeebbe8873f99fe897272390fb06f1840d2d
/frameworks/base/core/res/AndroidManifest.xml
|
bc7d392ef1fb7f7cf12a518b20d6e8f59e092c51 |
|
07-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
am c3360d2a: am b05b4086: Merge "Add permission checks and unhide the Hotword recognition APIs" into klp-dev * commit 'c3360d2a8b6d7b8e820c99844364be4f1fc83824': Add permission checks and unhide the Hotword recognition APIs
|
c73c1783744baeeabc620ecede545e0ffbd034d4 |
|
06-Sep-2013 |
Sandeep Siddhartha <sansid@google.com> |
Add permission checks and unhide the Hotword recognition APIs - Also tweak the API a little to send an intent on hotword being recognized. Change-Id: I8a3fedaec4e1db595ed058089734d25c7957111e
/frameworks/base/core/res/AndroidManifest.xml
|
cd57b4950f5df4c3c435ec3995d730ad98b525dc |
|
06-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
am 3d27c9f9: am f1eebfc2: Merge "Remove unused APIs and rename others based on API review" into klp-dev * commit '3d27c9f973b1dd35ed457785b452851316cdca8a': Remove unused APIs and rename others based on API review
|
d304af69891483aad808356af1ac5f00e90c8edf |
|
05-Sep-2013 |
Amith Yamasani <yamasani@google.com> |
Remove unused APIs and rename others based on API review Restrictions challenge is only to be used by device admins. Bug: 10461761 Change-Id: I3db1249e2ce99f386602de59ed930302bb0a97fb
/frameworks/base/core/res/AndroidManifest.xml
|
7275ecc5094f119be35f485ebad9ef1c858d8206 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
am 70c2dd93: am 2cf8138b: Merge "Add LocationManager.MODE_CHANGED_ACTION broadcast" into klp-dev * commit '70c2dd932bd585ed578ea684db06f17c4e5d24d3': Add LocationManager.MODE_CHANGED_ACTION broadcast
|
40a86c24d2601df4966c57573a5bf58b30a41990 |
|
04-Sep-2013 |
Tom O'Neill <tomo@google.com> |
Add LocationManager.MODE_CHANGED_ACTION broadcast - Currently redundant with PROVIDERS_CHANGED_ACTION, but that may change in the future - Part of fix for b/10409275 Change-Id: I12daaf20e6546fd9e9dc71c599967fa0ad95e27f
/frameworks/base/core/res/AndroidManifest.xml
|
92774a9f9739da20a47ea576f91777e656106db9 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8bd2eb31: am 90a5df1e: Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev * commit '8bd2eb314bf923f556fda0229a1ef44392c4ec00': Revert "Add permissions for the InCallUI Split."
|
90a5df1ee8c89ca17df93d9ecf95652b2ae619f4 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Revert "Add permissions for the InCallUI Split."" into klp-dev
|
b6c46d2381e707f0b55b193636fc515ba3129d7a |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Revert "Add permissions for the InCallUI Split." This reverts commit bf84eb5ed579d13b74c97b995299ca61cafedea6. Change-Id: I40e311174898a741f5053501290833420355ad03
/frameworks/base/core/res/AndroidManifest.xml
|
42d1cd25be5865fa2f50948e71fd50cd74ba18c6 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
am 8fab063a: am 7f60dc57: Merge "Add permissions for the InCallUI Split." into klp-dev * commit '8fab063abcfef648bef9232dad62c8b8cea251d5': Add permissions for the InCallUI Split.
|
7f60dc57780281030f26a2109a64d0260e976af7 |
|
03-Sep-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Add permissions for the InCallUI Split." into klp-dev
|
bf84eb5ed579d13b74c97b995299ca61cafedea6 |
|
13-Aug-2013 |
Santos Cordon <santoscordon@google.com> |
Add permissions for the InCallUI Split. Change-Id: Ic759d14acefcea746e0d8e86c0f006d4bc462386
/frameworks/base/core/res/AndroidManifest.xml
|
4b905b6195443acb2e16f234f4cb24318b9a3458 |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
am 97c61ab7: am 86d2db97: Merge "Print spooler security and some new print service facing APIs." into klp-dev * commit '97c61ab7c02c24c485acf5775310a304730dfeea': Print spooler security and some new print service facing APIs.
|
86d2db9750657401deadea6766c94300c3bfc7cd |
|
30-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Merge "Print spooler security and some new print service facing APIs." into klp-dev
|
d26d4898fcc9b78f4b66118895c375384098205e |
|
28-Aug-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print spooler security and some new print service facing APIs. 1. Updated the security mode of the print spooler. Now the spooler is not signed with the system key, it is not a privileged app so if it gets compromised (PDF rendering is a potential attack vector) it cannot access dangerous permissions. Also only the system can bind to the spooler. 2. Added APIs for asking a print service to start and stop tracking a given printer. This is need for the case when the user selects the printer and the print service should do a best effort to keep the system updated for the current state of the printer. 3. Added APIs for putting a print job in a blocked state. A print service would report the print job as blocked if for some reason the printer cannot proceed, e.g. 99 pages are printed but there is no paper for the last one. The user has to add more paper and the print service can resume the job. 4. Changed the read/write APIs to use ParcelFileDescriptor instead of FileDescriptor since the latter does not have a clean API for detaching the wrapped Linux file descriptor when one wants to push it to native. 5. Added API for getting the size of the printed document so the print service can avoid handling big filed over cellular network or ask the user if needed. 6. Now the print services that are preinstalled on the system image are automatically enabled. Change-Id: Ia06c311d3d21cabb9e1368f13928e11cd0030918
/frameworks/base/core/res/AndroidManifest.xml
|
ae1fda5aa3979445153d84f418092cc2473b3c24 |
|
30-Aug-2013 |
Wink Saville <wink@google.com> |
am d2f41b3d: am 35bd30b1: Merge "Merge commit \'270226b0\' into manualmerge" into klp-dev * commit 'd2f41b3dc692e2c9a0c2f60bdf0730d9b52b6df3': Add support for handling mobile provisioning networks.
|
7788c61af5927a0fac612ea94d5205eeec2f507f |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Merge commit '270226b0' into manualmerge * commit '270226b0': Add support for handling mobile provisioning networks. Conflicts: core/java/android/net/CaptivePortalTracker.java core/java/android/net/ConnectivityManager.java core/java/android/net/IConnectivityManager.aidl core/java/android/net/MobileDataStateTracker.java core/res/AndroidManifest.xml services/java/com/android/server/ConnectivityService.java Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
|
948282b0e6cf5310f09db97a4ae939db7c1cef72 |
|
29-Aug-2013 |
Wink Saville <wink@google.com> |
Add support for handling mobile provisioning networks. When a sim is new or it has expired it needs to be provisioned with the carrier. Basically provisioning is associating a sim with a user account. When a sim isn't provisioned then operators will restrict access to the network and only allow certain addresses or services to be used. This set of changes allows two types of provisioning networks to be recognized. The first is a network that causes all DNS lookups to be redirected to a different address than was intended. This is exemplified by how T-Mobile works. The second technique uses a special apn for provisioning. An example is AT&T where lwaactivate is the provisioning apn and broadband is the normal apn. We first try broadband and if we are unable to connect we try lwaactivate. When we see the activate we identify it as special and the ApnContext.isProvisioningApn will return true. In the future our plan is to create a new network type that can be added to the apn list, but for now it identified by name. Here is a list of significant changes: - CaptivePortalTracker now only test WiFi networks instead of all networks - checkMobileProvisioning checks for provisioning networks and doesn't try to ping. - IConnectivityManager.aidl changes: * getProvisioningOrActiveNetworkInfo was added to and used by Manage mobile plan in WirelessSettings so even when there is no active network it will still allow provisioning. Otherwise it would report no internet connection. * setSignInErrorNotificationVisible is used by both CaptiviePortalTracker and checkMobileProvisioning so they use the same code for the notifications. * checkMobileProvisioning was simplified to have only a timeout as returning the result is now harder as we abort simultaneous call otherwise we'd could get into loops because we now check every time we connect to mobile. - Enhanced MDST to handle the provisioning network. - Added CONNECTED_TO_PROVISIONING_NETWORK to NetworkInfo to make a new state so we don't announce to the world we're connected. - TelephonyIntents.ACTION_DATA_CONNECTION_CONNECTED_TO_PROVISIONING_APN is sent by the low level data connection code to notify Connectivity Service that a provisioning apn has connected. This allows CS to handle the connection differently than a normal connection. Bug: 10328264 Change-Id: I3925004011bb1243793c4c1b963d923dc2b00cb5
/frameworks/base/core/res/AndroidManifest.xml
|
18643b58eec84c0ce5a10ced66c93e95fbb41cb4 |
|
27-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
am 2517d08b: am 61d806c7: Merge "Docs changes pursuant to API review feedback." into klp-dev * commit '2517d08b9a09d123729b01d34840e96f099ea704': Docs changes pursuant to API review feedback.
|
511cd35fcc0b8ab048f284a6af374de8ccc69865 |
|
24-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Docs changes pursuant to API review feedback. Change-Id: I74c51791192f7fefad4e299d25c91438cbf6ab73
/frameworks/base/core/res/AndroidManifest.xml
|
7e458235ac2f2522bea07aa24423b39d1729d2e3 |
|
23-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Remove input flinger stubs. (DO NOT MERGE) Bug: 10446930 Change-Id: I6c9fd490f2efd9c359c598eb2a18c4150b446564
/frameworks/base/core/res/AndroidManifest.xml
|
e2a6d3df1257c1c04b1a14777bb7ee65f634bdc3 |
|
22-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Merge "Introduce network link quality statistics" into klp-dev
|
1f12cb52a494a3eaefc62d03a8d2fdf47a5535e9 |
|
21-Aug-2013 |
Vinit Deshapnde <vinitd@google.com> |
Introduce network link quality statistics This change starts tracking traffic quality data for WiFi and mobile networks. The quality is tracked based on incidental traffic, and not on specific measurements. Theoretical bandwidths are hard-coded, as well as sampling interval; although sampling interval can be changed by setting a system policy. Bugs filed to remove shortcomings of this change - 10342372 Change LinkInfo name to something better 10342318 Move hardcoded values of MobileLinkInfo to resources so they can be updated without changing code Bug: 10006249 Change-Id: I83d8c7594da20fe53abbd5e1f909b1f606b035bb
/frameworks/base/core/res/AndroidManifest.xml
|
e530c41b57514d419cdc7a7b14802b6954d3293c |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Merge "Protect a bunch of broadcast intents" into klp-dev
|
6b8a6a6e056c0f639220c4bfdf044d5f04bc593e |
|
21-Aug-2013 |
Matthew Xie <mattx@google.com> |
Protect a bunch of broadcast intents All the changed intents are restricted. Only Bluetooth Process can broadcast/send them. bug 7622253 Change-Id: I098664bf266ac44b7904f8f79b1804d5130f5cd5
/frameworks/base/core/res/AndroidManifest.xml
|
ff796e5a24481febd8c07b1a6a3c3eda0e3fd88b |
|
21-Aug-2013 |
Jason Monk <jmonk@google.com> |
Merge "Change PacProcessor to Android Service" into klp-dev
|
9ced3cd9d6ea414523051ec872fffc68f5fdbf08 |
|
12-Aug-2013 |
Jason Monk <jmonk@google.com> |
Change PacProcessor to Android Service This switches the PacProcessor over to an Android Service. The service is bound and unbound by the PacManager, which also adds it to the ServiceManager, allowing for Context-Free access by the PacProxySelector in all DVMs. bug:10182711 Change-Id: Id1ff7660be56e8976cdcccd76e041feb47a17a61
/frameworks/base/core/res/AndroidManifest.xml
|
da51e68e582ffa017543982297c831680d201a91 |
|
09-Aug-2013 |
Maggie Benthall <mbenthall@google.com> |
Add methods for managing CAs to DevicePolicyManager(Service) Guard install/uninstall by enforcing that the caller have the new system-only permission MANAGE_CA_CERTIFICATES. Also include API methods for asking whether there are any User CA certs installed, or if one by a particular name is installed in the keystore. CA certs will be installed via KeyChain into the TrustedCertificateStore. Bug: 8232670 Change-Id: I17b47a452e72eb4fe556dc6db823a46c6e854be8
/frameworks/base/core/res/AndroidManifest.xml
|
02e4d16ed9a0499ad72f2ff427e8bf0e85d7ae06 |
|
13-Aug-2013 |
Jeff Sharkey <jsharkey@android.com> |
Add GIDs to packages.list, update SD card perms. Write supplementary GIDs to packages.list for lower-level system components to parse. WRITE_EXTERNAL_STORAGE also implies sdcard_r GID. Switch to always enforce READ_EXTERNAL_STORAGE permission. Update permission docs to mention new behavior. Change-Id: I316ba4b21beebb387ac05c80980ae9b38235b37d
/frameworks/base/core/res/AndroidManifest.xml
|
1ed51627d94b140e8893b8e1dcde9bf37e2adca7 |
|
01-Aug-2013 |
Brian Williammee <bwill@google.com> |
Track latency of captive portal checks When captive portal check occurs, track its latency, whether or not we received a response, and whether or not the response was a captive portal. Pair with information identifying the access point / base station, and broadcast it (with a system|signature-protected permission). Broadcast only occurs if user has consented to Settings.Global.WIFI_SCAN_ALWAYS_AVAILABLE. Change-Id: I6fd59954a7ee2cc7acedf064a1465882653b2173
/frameworks/base/core/res/AndroidManifest.xml
|
7d00affce6e25b22fd8fc135933b3bf6b547a0dc |
|
03-Aug-2013 |
Jeff Brown <jeffbrown@google.com> |
Support public virtual displays. Refactor the new private virtual display API to also support creating public virtual displays with various characteristics. This feature requires special permissions and is only intended for use by the system. Change-Id: I44dd19f37cf76ea6d6e313afe42f4a412bd96663
/frameworks/base/core/res/AndroidManifest.xml
|
a7397883de67d674970d91f86d46ccf637e5e543 |
|
31-Jul-2013 |
Martijn Coenen <maco@google.com> |
NFC: Host-based card emulation APIs. - New INfcCardEmulation interface to allow apps to interface with card emulation system. - New BIND_NFC_SERVICE permission to prevent malicious apps from binding to card emulation services. - ApduServiceInfo is now in the framework. - Added constants to Settings.Secure for storing defaults. - Modified XML grammar a bit. Change-Id: I56b3fa6b42eb5dc132c91c1386ab1e6bac779059
/frameworks/base/core/res/AndroidManifest.xml
|
a418cf21c9d03c1435e9adec3e025387b6345cd9 |
|
19-Jul-2013 |
Amith Yamasani <yamasani@google.com> |
New permission to manage device admins The previously used permission was doing double duty as the permission that device admins to check for to ensure that calls are coming from valid system components. MANAGE_DEVICE_ADMINS is system|signature and is now required to add/remove device admins. Required for: Bug: 9856348 Change-Id: I64385d2ec734c3957af21b5a5d9cffd8a3bcd299
/frameworks/base/core/res/AndroidManifest.xml
|
538cdb98ef06a1768c582df28e8cc0e4335dd216 |
|
19-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
resolved conflicts for merge of 85b5e4c4 to master Change-Id: Idd0ad9b1504fddf68c4c4cc04731de1eddd204b3
|
e182bfe398a132236f723a76522bacd4d6d4c0a4 |
|
16-Jul-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Add gservices updater for carrier provisioning url bug:9623159 Change-Id: I36697ed341353b7a3dbec5afe20241102e76f6f1
/frameworks/base/core/res/AndroidManifest.xml
|
6c1c0b6cbecf0cd0486a9a781da5e6f9bd2c0eaa |
|
13-Jul-2013 |
Jeff Brown <jeffbrown@google.com> |
Declare permission for accessing input flinger. Change-Id: I2914b301b74e0d310a9e95e2d6fb5cb72d3e3703
/frameworks/base/core/res/AndroidManifest.xml
|
10dd2b6464c0d9b78ae16cf19e62df947299c408 |
|
15-Jul-2013 |
Evan Charlton <evanc@google.com> |
Merge "Add carrier setup app integration"
|
1df62d27838657a0988f38883f906be024af7d87 |
|
12-Jul-2013 |
Geremy Condra <gcondra@google.com> |
Merge "Permissions to protect socket marking settings"
|
f11e5d34766a589af46ffc47e461b0103250fd69 |
|
09-Jul-2013 |
Chad Brubaker <cbrubaker@google.com> |
Permissions to protect socket marking settings Add the manifest entries for the net_mark group that protects marking traffic as from another user in per user routing. Change-Id: I97932a9e407467a7adc733caea8746a712bc6b68
/frameworks/base/core/res/AndroidManifest.xml
|
843d5ea5ec965c17de525b3a9f52c8cb9d352c3c |
|
13-May-2013 |
Evan Charlton <evanc@google.com> |
Add carrier setup app integration Add an intent to invoke a native carrier setup app. This is paired with the INVOKE_CARRIER_SETUP permission, though it is up to the app to enforce that callers hold this permission. Change-Id: I317a40675de7e9587de23c028459be2331a2f8a2
/frameworks/base/core/res/AndroidManifest.xml
|
053f61d6a6e23825e680dc49982e55c5b4299d61 |
|
27-Jun-2013 |
Dianne Hackborn <hackbod@google.com> |
Work on issue #9586838: Crash after waking up Hammerhead device I made the power manager more rigid, not allowing different uids to use the same wake lock. This never should happen. I would guess there is somewhere that the activity manager is acquiring the wake lock without clearing the calling identity... but it is hard to follow all the paths this may happen in. So here we add some checks when acquiring/releasing the wake lock to make sure it is being done as the system uid. Also: - Protect the new activity stack calls with a permission, and make sure to clear the calling uid once past that. - Collect uid data from process stats so we can correctly associate CPU use with a uid even if we don't know about the pid for some reason. - Fix battery stats dump commands to clear calling uid before executing so they aren't broken. Change-Id: I0030d4f7b614e3270d794ecfc3669139a5703ce9
/frameworks/base/core/res/AndroidManifest.xml
|
5fa9f2b127c2d7c40da419540f3425ac45a89439 |
|
27-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Single-user restrictions"
|
505e35bca9e19773e42cb8771fcf36158208b8ab |
|
26-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am c869696e: am 65f7a95f: am 2f50097a: Merge "Fix power issues around wifi scans." into jb-mr2-dev * commit 'c869696ef3c1dca3efbc6ce8ab804e8a1b117900': Fix power issues around wifi scans.
|
89710842585404ea33f941afeb2c321e706005e9 |
|
25-Jun-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix power issues around wifi scans. - Sending a broadcast indicating when scan requests could be serviced so that apps don't request scans we won't do anything with. - Fix our batt stats accounting so we only count it if we send the request to the driver. bug: 8868201 bug: 9496690 Change-Id: I64a4f1c294c848ac64c50d8854ed4a6a1a47f603
/frameworks/base/core/res/AndroidManifest.xml
|
655d0e2029e6ae77a47e922dce4c4989818b8dd1 |
|
12-Jun-2013 |
Amith Yamasani <yamasani@google.com> |
Single-user restrictions Introduces a new "blocked" state for each package. This is used to temporarily disable an app via Settings->Restrictions. PIN creation and challenge activities for use by Settings and other apps. PIN is stored by the User Manager and it manages the interval for retry attempts across reboots. Change-Id: I4915329d1f72399bbcaf93a9ca9c0d2e69d098dd
/frameworks/base/core/res/AndroidManifest.xml
|
4b9a4d16872bbb50712e007b419ac0b35ff1582d |
|
12-Jun-2013 |
Svetoslav Ganov <svetoslavganov@google.com> |
Print - platform APIs Related changes: Skia (inlcude PDF APIs): https://googleplex-android-review.googlesource.com/#/c/305814/ Canvas to PDF: https://googleplex-android-review.googlesource.com/#/c/319367/ Settings (initial version): https://googleplex-android-review.googlesource.com/#/c/306077/ Build: https://googleplex-android-review.googlesource.com/#/c/292437/ Sample print services: https://googleplex-android-review.googlesource.com/#/c/281785/ Change-Id: I104d12efd12577f05c7b9b2a5e5e49125c0f09da
/frameworks/base/core/res/AndroidManifest.xml
|
6fbb5553a5b2d7c19ea411ace9a46e18262698c4 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Merge "Protect more system broadcasts."
|
61277dfcd9479cfaca0fce00f00a79a2e51083a2 |
|
13-Jun-2013 |
Jeff Sharkey <jsharkey@android.com> |
Protect more system broadcasts. Bug: 8877514 Change-Id: Iaff8a5fbfab2c48bf26ce611fe2caff4f22d9152
/frameworks/base/core/res/AndroidManifest.xml
|
81888d56610bd4771e61b47c2c57a62966c11385 |
|
11-Jun-2013 |
Scott Main <smain@google.com> |
am 26bc073d: am fe7c2220: Merge "add NA message for any "signature" level permissions" into jb-mr2-dev * commit '26bc073dfa32c8122ce194cfc39e2dfc44370fcd': add NA message for any "signature" level permissions
|
93e60b5b2618c65b9494c474fd09563f8b6e42f3 |
|
10-Jun-2013 |
Scott Main <smain@google.com> |
add NA message for any "signature" level permissions Change-Id: If76e9e3b7ffc5d97422321db312a03869c407f08
/frameworks/base/core/res/AndroidManifest.xml
|
5a3915b06bf1e82cda024945d3b71b51b470b809 |
|
24-May-2013 |
Amith Yamasani <yamasani@google.com> |
UX compliance for error messages Bug: 9122154 Change-Id: I4a64750f11845a230321450bc6a2955cb73e3b6d
/frameworks/base/core/res/AndroidManifest.xml
|
049219925fc2fb3adee803731a2ccd1c6c7c580a |
|
21-May-2013 |
Jay Shrauner <shrauner@google.com> |
am 66d67241: am 34bed420: Merge "Update CALL_PRIVILEGED docs" into jb-mr2-dev * commit '66d67241205e857e434bacf1a1e8fb8e3100018d': Update CALL_PRIVILEGED docs
|
592c9fc3122eb86cc66f18de4cc29dadb7a12c8c |
|
17-May-2013 |
Jay Shrauner <shrauner@google.com> |
Update CALL_PRIVILEGED docs Add usage restriction note to CALL_PRIVILEGED permission doc. Bug:8987211 Change-Id: I3545e2ae30464680e533e3eea0ff9ae913e20ef6
/frameworks/base/core/res/AndroidManifest.xml
|
9ecfee03fa188aebfbd9778b4e020323903495ee |
|
19-Apr-2013 |
Jeff Sharkey <jsharkey@android.com> |
Start fleshing out new storage APIs. Introduces new DocumentsContract which storage backends must implement. Backends surface a simple directory-like organizational structure that enables a document to appear at multiple locations in that hierarchy. Querying a document or the contents of a directory will return a Cursor populated with DocumentColumns, which includes simple metadata. Adds new OPEN_DOC and CREATE_DOC Intents, and permission to protect storage backends. Change-Id: Ib4984bc980182b2cedbe552908e5be94604ef085
/frameworks/base/core/res/AndroidManifest.xml
|
c0b676dcc23baedb12946c3470d9fa9b02cb39e0 |
|
23-Mar-2013 |
Jim Miller <jaggies@google.com> |
Add keyguard background scrim and protection around keyguard APIs With this change, the system process will put up a scrim in the event keyguard crashes to protect underlying content. It also adds permission checks to prevent unathorized access through the binder APIs. Cleaned up KeyguardTestActivity to build separately. Removed unused resources. Change-Id: I9e370c6bfb7dca68eae9eae304c815fb84a753d2
/frameworks/base/core/res/AndroidManifest.xml
|
2d0ed28ff65ad110c875a61cb3c20ca922640bd6 |
|
26-Apr-2013 |
Igor Murashkin <iam@google.com> |
am 10ce90ad: am eaebe4c1: Merge "Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED" into jb-mr2-dev * commit '10ce90adfafa25e417fdefa7510e53bc70bccd7b': Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED
|
f640bb9bbbe104fd08c98df240f1aeea0cacdbab |
|
23-Apr-2013 |
Igor Murashkin <iam@google.com> |
Add new android.permission.CAMERA_DISABLE_TRANSMIT_LED This system-only permission allows a service to disable the transmit LED when a camera is in use. Bug: 8554573 Change-Id: I64f7e3fcdc8ded8be3904650bd0c91d3b8f10dd4
/frameworks/base/core/res/AndroidManifest.xml
|
5c0bd520b8095a12c6cd0c8cf0a6837b2addf520 |
|
19-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
am ab3f5903: am 688a6977: Replacing accessibility service permissions with capability attributes. * commit 'ab3f5903fc4cefbaed6c5cf2242703d56f80028e': Replacing accessibility service permissions with capability attributes.
|
688a6977cf7673ed0542ab3d839053c4e38a4dbd |
|
17-Apr-2013 |
Svetoslav <svetoslavganov@google.com> |
Replacing accessibility service permissions with capability attributes. Accessibility services can perform special operations such as retrieve the screen content, enable explore by touch, etc. To ensure the user is aware that the service will perform special operations we were using permissions. However, the special operations cannot be performed unless the service is really enabled by the user and it is at this point that we want to notify the user about the service capabilities. This change adds capability attributes to the accessibility service's meta-data XML file. The service has to declare the capability and when it is enabled we show the user the capabilities in the warining dialog. bug:8633951 Change-Id: Id3442dc71dad018e606888afdc40834682fdb037
/frameworks/base/core/res/AndroidManifest.xml
|
6c5a2e72bd2f9a83fef7abc1441d58212da48211 |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
am e0495912: am 5a02663d: Merge "Doc change: Eat some permissions group comments." into jb-mr2-dev * commit 'e0495912246495d784736cad7d5e4fa87ed788d8': Doc change: Eat some permissions group comments.
|
f6878b009ad680630577ed45207d064bc99059ad |
|
19-Apr-2013 |
Dirk Dougherty <ddougherty@google.com> |
Doc change: Eat some permissions group comments. Change-Id: I6db06ed80fbc9e3d71c2a029cc50a6fa954d35b9
/frameworks/base/core/res/AndroidManifest.xml
|
63e7dcf9cf190e1286003b4b3674e94b0d8c2dca |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
am e3e55f2a: am 5d1a182a: Merge "Secure broadcasts." into jb-mr2-dev * commit 'e3e55f2a1943a296472d91680a385ea5dc288a31': Secure broadcasts.
|
5d1a182a8a2dd9613ef3b1f2de7b6a3d690ae890 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Merge "Secure broadcasts." into jb-mr2-dev
|
68b13ba12f2096cd69824187f9b744cbd651bc38 |
|
18-Apr-2013 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure broadcasts. Prevents 3rd party spoofing. bug:7622253 Change-Id: I1e1a9887afe009d060205e349c31e3aefba2ea5b
/frameworks/base/core/res/AndroidManifest.xml
|
2590a8b341a176672474e67a7b322f82bcc93795 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
am bc463ea1: am e8d12dd6: Merge "Fix issue #8032572: Android app permission help text "null"..." into jb-mr2-dev * commit 'bc463ea1c5fa9c80fa06183a82fdd1acfb5289e5': Fix issue #8032572: Android app permission help text "null"...
|
84c7111c4ba2f2f956103e0a7dcc03664b8d6f23 |
|
17-Apr-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8032572: Android app permission help text "null"... ...for "Microphone / Record audio" Change-Id: Ie839b055771950e1078fa66506a007203338cfb5
/frameworks/base/core/res/AndroidManifest.xml
|
18a21459729ba6fd40545ee7ed2128dcb83eb23f |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
am 399a2977: am b3a98725: Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev * commit '399a2977a5067e4ea562ad4d74aaa0f1bffe4c53': Show an error dialog when account type is requested on a limited user
|
b3a9872549137f6c3983609e48e5b2d4fc94a3d4 |
|
11-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Merge "Show an error dialog when account type is requested on a limited user" into jb-mr2-dev
|
a934b7c99ac558ba45a2a6fb8c6e3769cdd3db4b |
|
11-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
am 7228e1ae: am 8ce470dd: GPS Hardware geofencing. * commit '7228e1aeb9a2af8fad410749e2adc61266b2649a': GPS Hardware geofencing.
|
23c8b96a7e5c3f4c169bf65ae3886357943bb7b0 |
|
10-Apr-2013 |
Amith Yamasani <yamasani@google.com> |
Show an error dialog when account type is requested on a limited user This covers the scenario where an app doesn't find an account of the required type and requests the account manager to add one of that type. Bug: 8537648 Change-Id: I4d9c8842c2d90aa668f16034d3db007dc61714b8
/frameworks/base/core/res/AndroidManifest.xml
|
8ce470dd4ba0608abb6b5eae117cefca927af96b |
|
03-Apr-2013 |
Jaikumar Ganesh <jaikumar@google.com> |
GPS Hardware geofencing. Add support for doing geofencing in hardware. Change-Id: I6d5015190e8d84e1f4beb1010ed977a71c1622d0
/frameworks/base/core/res/AndroidManifest.xml
|
8740cb1da6adb71a4e195774801c97db5853b097 |
|
05-Apr-2013 |
John Spurlock <jspurlock@google.com> |
resolved conflicts for merge of 29211d3a to master Change-Id: I9691f41b12fbf52d0ef35a9bf5223edef7afdfd2
|
5feceebb892d4cb5777cea3c6174b206705d456b |
|
23-Mar-2013 |
Daniel Sandler <dsandler@android.com> |
New NotificationListenerService. This is the best and only way for apps to listen for notifications: create a NotificationListenerService, wait for the NoMan to bind to you (as a result of the user checking a box somewhere in Settings and agreeing to a scary dialog box), and you'll start receiving notification posted and dismissed callbacks. Your service, while enabled, will also be able to clear one or all notifications. Use this power wisely. This change moves StatusBarNotification out of com.android.internal into android.service.notification. [Internal customers, including System UI and early users of the system-only listener binder API, will need to be updated.] Bug: 8199624 Change-Id: I1be46f823d4b3ddc901109ec1e085cd6deb740c2
/frameworks/base/core/res/AndroidManifest.xml
|
60765b285da48e7362b935105036efefbd1d5e58 |
|
05-Apr-2013 |
Ben Gruver <bgruv@google.com> |
am a1607a8c: am 65f420ec: Merge "Add a config updater component for the intent firewall" into jb-mr2-dev * commit 'a1607a8c62a630150b4e96ec1148e90dc40ab984': Add a config updater component for the intent firewall
|
633dc9bcef0935931781d7e4554566271fe9f2c5 |
|
04-Apr-2013 |
Ben Gruver <bgruv@google.com> |
Add a config updater component for the intent firewall Change-Id: I43f6defa16691099592bf87e75f2d1a732135cf3
/frameworks/base/core/res/AndroidManifest.xml
|
77118fb55eb3a0dcccbb8cf7861a96416f552390 |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
4e7f7e839e6adb8986114ee5b619030696f910ca |
|
27-Mar-2013 |
Geremy Condra <gcondra@google.com> |
Add SELinux updater and Settings-based enforcement switch. Bug: 8116902 Change-Id: Ifac495026a354dac7655c28ea2188499a2a319aa
/frameworks/base/core/res/AndroidManifest.xml
|
1a95a42c8984aa9012a9d9ea24fc54a7b09e6148 |
|
27-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am 177543db: am 3bcc2fba: Merge "Fix issue #8470131: Process thrash kills battery" into jb-mr2-dev * commit '177543db55f88f060d9a43df79afd6733cd565da': Fix issue #8470131: Process thrash kills battery
|
a40cfeb55f6caa35fee894b86175b7d916520c80 |
|
26-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8470131: Process thrash kills battery Protect app widget broadcasts from abuse. In this case the app was sending an APPWIDGET_UPDATE broadcast without specifying a target, which (a) should not be allowed (you should not be able to send updates to other apps), and (b) resulted in every single potential app widget in the system being launched... which was about 75 of them. Change-Id: I9d48733610ce6d5a7c32e69a3e06b9f33bd79a34
/frameworks/base/core/res/AndroidManifest.xml
|
c42a44931f75076d93860de2a7d2caa38a553b88 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
am b2bf4ecd: am 71b00177: Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev * commit 'b2bf4ecd4ab7c2182c2a6611ff6dead67e712a80': Fix issue #8410116: "Disable your screen lock" permission...
|
71b0017759b825f8bddcdda7425afc802e8918c9 |
|
21-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #8410116: "Disable your screen lock" permission..." into jb-mr2-dev
|
3ad2769ba5215bdc1f777b27bfe99d5cce982095 |
|
18-Mar-2013 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #8410116: "Disable your screen lock" permission... ...appears under "Storage" section Change-Id: I55673c559551797aae3a0dd80e90c573a028b4b0
/frameworks/base/core/res/AndroidManifest.xml
|
2044158fe12fada339762825d0b4ec3961a14d34 |
|
14-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
am 5d7b4a44: am 34f37e74: Merge "Handle finished bugreports, share from private." into jb-mr2-dev * commit '5d7b4a4448e0f29f36ba27aee2de06ce25ff2ee1': Handle finished bugreports, share from private.
|
02ffba940ca96988ed3e7774c606b43c58373b5e |
|
09-Mar-2013 |
Jeff Sharkey <jsharkey@android.com> |
Handle finished bugreports, share from private. Show notification when a bugreport is finished, letting the user launch a SEND_MULTIPLE intent to share them. Add dialog that warns user about contents before sharing. Since bugreports are now stored in private app data of the Shell app, use FileProvider to build Uris that we can grant others access to. Define BUGREPORT_FINISHED as being a protected broadcast. Delete older bugreports automatically to reclaim disk space. Migrate any Intent extras to ClipData when building PendingIntents. Add --receiver-permission support to am shell command. Bug: 7005318 Change-Id: If6c607dbcf137362d5887eac482ff7391563890f
/frameworks/base/core/res/AndroidManifest.xml
|
5ecd81154fa039961f65bb4e36d18ac555b0d1d6 |
|
10-Jan-2013 |
Jim Miller <jaggies@google.com> |
Move keyguard to its own process. This is in preparation to moving keyguard into its own process. Moved keyguard source and resources into new .apk. Got basic test app working. Still need to implement MockPatternUtils and means to pass it into KeyguardService with local binder interface. Added new ACCESS_KEYGUARD_SECURE_STORAGE permission. Temporarily disabled USER_PRESENT broadcast. Remove unintentional whitespace changes in PhoneWindowManager, etc. Checkpoint basic working version. Move to systemui process. Synchronize with TOT. Sync with recent user API changes. Fix bug with returing interface instead of stub for IKeyguardResult. Create KeyguardServiceDelegate to allow for runtime-selectable local or remote interface. More keyguard crash robustness. Keyguard crash recovery working. Currently fails safe (locked). Fix selector view which was still using frameworks resources. Remove more references to internal framework variables. Use aliases for those we should move but currently have dependencies. Allow runtime switching between service and local mode. Fix layout issue on tablets where orientation was reading the incorrect constant from the framework. Remove more framework dependencies. Fix PIN keyboard input. Remove unnecessary copy of orientation attrs. Remove unused user selector widget and attempt to get multi user working again. Fix multi-user avatar icon by grabbing it from UserManager rather than directly since keyguard can no longer read it. Merge with AppWidget userId changes in master. Change-Id: I254d6fc6423ae40f6d7fef50aead4caa701e5ad2
/frameworks/base/core/res/AndroidManifest.xml
|
aa7cc1e2ab9856e9c57c1664020df60afaae3d72 |
|
20-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Adding idle maintenance service."
|
b3038ec7cfc5d26eb0be18ae65c62825556bca0f |
|
13-Feb-2013 |
Svetoslav <svetoslavganov@google.com> |
Adding idle maintenance service. It is beneficial that there is a mechanism on the platform to notify applications whether it is safe to perform somehow expensive operations while the user is not using the device. Thus, user experience will not be degraded. An example is discarding of unused blocks on a mounted file system instead of doing this on every write operation. bug:8056794 Change-Id: I708bad9d3ce6c8f1d5a1c05c0abf46f81a3d464b
/frameworks/base/core/res/AndroidManifest.xml
|
108da0cfa4a2f59cc953a4ec61314e69b61d6777 |
|
12-Feb-2013 |
Russell Brenner <russellbrenner@google.com> |
Adjust captive portal test for setup wizard During setup wizard, perform captive portal test without the typical delays. Change-Id: If596948e732966817aae6201440e87e19be0c2f8
/frameworks/base/core/res/AndroidManifest.xml
|
fde19b106b2b77bc3540b04445357870caf878b5 |
|
17-Jan-2013 |
Daniel Sandler <dsandler@android.com> |
New API to request a list of current notifications. The ACCESS_NOTIFICATIONS permission is signature|system only. Change-Id: I41338230aee9611117cbdac251c1b6b6c3cebf00
/frameworks/base/core/res/AndroidManifest.xml
|
3b53da493440efbacd147d1aedcea8679c3a642b |
|
04-Feb-2013 |
Santos Cordon <santoscordon@google.com> |
Merge "Sort out permission around "instant text response""
|
d4b1d9cf9cee4bd4f234e30069996dc7e449f0e7 |
|
31-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Merge changes I4859c8db,I7643024d * changes: Add the TZInfo updater and relevant intent. Fix ConfigUpdater for binary files.
|
ec695824af7ab263eaae613b87f2c0b24f176f91 |
|
31-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Merge "Remove "enhance web scripts" from settings and make it requested by plug-ins."
|
78a4c718e30b6af69fafa6c017af3b2719868631 |
|
30-Jan-2013 |
Geremy Condra <gcondra@google.com> |
Add the TZInfo updater and relevant intent. Also add a hook for ConfigUpdateInstallReciever subclasses to change the delivery of data- in this case, from raw text to b64 encoded binary. Change-Id: I4859c8db1cc97c2427310a108b2fef03975df2b4
/frameworks/base/core/res/AndroidManifest.xml
|
58395e71ce7e99f8149eebbf39db77798165a539 |
|
30-Jan-2013 |
Doug Zongker <dougz@android.com> |
am 9c4ba4fe: am b616f0c2: add android.permission.LOOP_RADIO for access to loop radio device # Via Android Git Automerger (1) and Doug Zongker (1) * commit '9c4ba4fe752b131b01aa402389c96eb8f24764b8': add android.permission.LOOP_RADIO for access to loop radio device
|
3822896e226567c6cd3ef84518d318abd33a7624 |
|
29-Jan-2013 |
Svetoslav <svetoslavganov@google.com> |
Remove "enhance web scripts" from settings and make it requested by plug-ins. Currently we have an "enhance web accessibility" setting that has to be enabled to make sure web content is accessible. We added the setting to get user consent because we are injecting JavaScript-based screen-reader pulled from the Google infrastructure. However, many users do not know that and (as expected) do not read the user documentation, resulting in critique for lacking accessibility support in WebViews with JavaScript enabled (Browser, Gmail, etc). To smoothen the user experience now "enhance web accessibility" is a feature an accessibility plug-in can request, similarly to explore by touch. Now a user does not need to know that she has to explicitly enable the setting and web accessibility will work out-of-the-box. Before we were showing a dialog when a plug-in tries to put the device in a touch exploration mode. However, now that we have one more feature a plug-in can request, showing two dialogs (assume a plug-in wants both features) will mean that a user should potentially deal with three dialogs, one for enabling the service, and one for each feature. We could merge the dialogs but still the user has to poke two dialogs. It seems that the permission mechanism is a perfect fit for getting user permission for an app to do something, in this case to enable an accessibility feature. We need a separate permission for explore by touch and enhance web accessibility since the former changes the interaction model and the latter injects JavaScript in web pages. It is critical to get user consent for the script injection part so we need a well-documented permission rather a vague umbrella permission for poking accessibility features. To allow better grouping of the accessibility permissions this patch adds a permission group as well. bug:8089372 Change-Id: Ic125514c34f191aea0416a469e4b3481ab3200b9
/frameworks/base/core/res/AndroidManifest.xml
|
b616f0c239ad61f818741909821b86aceff60b60 |
|
29-Jan-2013 |
Doug Zongker <dougz@android.com> |
add android.permission.LOOP_RADIO for access to loop radio device Change-Id: I811d70fa67aa758122678809f32b8aade42ced0f
/frameworks/base/core/res/AndroidManifest.xml
|
f9c5e0fe837a3090820da502ecaabc5accc00ace |
|
23-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
Add new API to propagate contextual data to the assist action When launching an assist, we have a new API allowing the current foreground activity/application to provide additional arbitrary contextual information that is stuffed in the assist intent before it is launched. Change-Id: I0b2a6f5a266dc42cc0175327fa76774f814af3b4
/frameworks/base/core/res/AndroidManifest.xml
|
35654b61e8fe7bc85afcb076ddbb590d51c5865f |
|
15-Jan-2013 |
Dianne Hackborn <hackbod@google.com> |
More work on App Ops service. Implemented reading and writing state to retain information across boots, API to retrieve state from it, improved location manager interaction to monitor both coarse and fine access and only note operations when location data is being delivered back to app (not when it is just registering to get the data at some time in the future). Also implement tracking of read/write ops on contacts and the call log. This involved tweaking the content provider protocol to pass over the name of the calling package, and some infrastructure in the ContentProvider transport to note incoming calls with the app ops service. The contacts provider and call log provider turn this on for themselves. This also implements some of the mechanics of being able to ignore incoming provider calls... all that is left are some new APIs for the real content provider implementation to be involved with providing the correct behavior for query() (return an empty cursor with the right columns) and insert() (need to figure out what URI to return). Change-Id: I36ebbcd63dee58264a480f3d3786891ca7cbdb4c
/frameworks/base/core/res/AndroidManifest.xml
|
a06de0f29b58df9246779cc4bfd8f06f7205ddb6 |
|
12-Dec-2012 |
Dianne Hackborn <hackbod@google.com> |
New "app ops" service. Initial implementation, tracking use of the vibrator, GPS, and location reports. Also includes an update to battery stats to also keep track of vibrator usage (since I had to be in the vibrator code anyway to instrument it). The service itself is only half-done. Currently no API to retrieve the data (which once there will allow us to show you which apps are currently causing the GPS to run and who has recently accessed your location), it doesn't persist its data like it should, and no way to tell it to reject app requests for various operations. But hey, it's a start! Change-Id: I05b8d76cc4a4f7f37bc758c1701f51f9e0550e15
/frameworks/base/core/res/AndroidManifest.xml
|
149ceec6ebac9dd000c213fc91ee8e5c08522cc6 |
|
26-Mar-2012 |
Daisuke Miyakawa <dmiyakawa@google.com> |
Sort out permission around "instant text response" - Remove SEND_SMS_NO_CONFIRMATION - Add SEND_RESPOND_VIA_MESSAGE Permission This permission is held by the phone and applications that want to handle respond-via-message should require this permission of the sender. This permission is signature/system and currently only held by the Phone app. Bug: 5108429 Change-Id: Ib611368d488de2f8e1e853f550eb2c654305eda4
/frameworks/base/core/res/AndroidManifest.xml
|
a4405ba6ea56cd1a13c45bf8e37f7b44f7d038b0 |
|
07-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Add new protected broadcasts According to the javadocs for these intents, they are all protected intents. It appears the original author forgot to add them to this file. Change-Id: I025061716d5707f10939019f2bc5bc3d4d23b04f
/frameworks/base/core/res/AndroidManifest.xml
|
a170bb81d5953c1f0aa0f5f49bd72eb43c50e233 |
|
06-Dec-2012 |
Nick Kralevich <nnk@google.com> |
Remove duplicate AndroidManifest.xml entries. The automerger added the entries twice... Change-Id: I7910cb2126b339b0c8aee11051db1a2de8ae26ae
/frameworks/base/core/res/AndroidManifest.xml
|
849f5188e34ea667b689e795d88411a2412db2e8 |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
am 6643ea82: resolved conflicts for merge of 011132a7 to jb-mr1-dev * commit '6643ea823bf8b0726da0518ffecfcc7a9f60f87d': Secure a handful of framework broadcasts
|
6643ea823bf8b0726da0518ffecfcc7a9f60f87d |
|
30-Nov-2012 |
Nick Kralevich <nnk@google.com> |
resolved conflicts for merge of 011132a7 to jb-mr1-dev Change-Id: I304ef91eef99526dec348a59b12c0934173bcfcb
|
b8da0376f2d50fdb2ee58deacc6d2041689e36d1 |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 (cherry picked from commit 47918ae3b4e7ebb54711884e9ff9d0300591ab8b) Conflicts: core/res/AndroidManifest.xml Change-Id: I118b31489fe7add5b8d69289cab9f4e8ab269495
/frameworks/base/core/res/AndroidManifest.xml
|
47918ae3b4e7ebb54711884e9ff9d0300591ab8b |
|
29-Nov-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Secure a handful of framework broadcasts At least one of these was getting spoofed in the wild. We don't want to go too far this late in the game, but this is a good start. bug:7622253 Change-Id: Id8ec2778b15fe001e6fd0d5a010181bb21c52ad8
/frameworks/base/core/res/AndroidManifest.xml
|
2681faafae03548ab6fc09307215d7f2b279ab5c |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: explain implicit permissions applied by sdk versions bug: 7453055 Change-Id: I59ba2de6108b5209ff0db6b084fc0a887c5f2cce
/frameworks/base/core/res/AndroidManifest.xml
|
7dcacd559a85c2b567690fd5f3f1a8050ef6c35b |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
277b352d9f9002eb63541c86ea9388be3d7c0e16 |
|
01-Nov-2012 |
Scott Main <smain@google.com> |
docs: update description for location permissions bug: 6996667 Change-Id: I3b5d706d98b56386a88b33a343721ff7432063b9
/frameworks/base/core/res/AndroidManifest.xml
|
fc753c0cf676000b1c2d3cb2728af85a9b49f795 |
|
31-Oct-2012 |
Michael Jurka <mikejurka@google.com> |
Use new keyguard appwidget picker Also, remove ability to filter widgets by feature in appwidget picker in anticipation of api change Change-Id: I325de0b98f03d3a250758d504229ea27794b5330
/frameworks/base/core/res/AndroidManifest.xml
|
a1f739ea83b6d770b8469ae1c2c4161f6fe96334 |
|
19-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Merge "Change android.permission.SERIAL_PORT to signature|system." into jb-mr1-dev
|
c29f35b8f4610677d8fd9ae1816b39ef4b5f9983 |
|
17-Oct-2012 |
Geremy Condra <gcondra@google.com> |
Change android.permission.SERIAL_PORT to signature|system. Bug: 7367956 Change-Id: I0bc65936ba59c43c18d9a6ba52affff4c921f2fb
/frameworks/base/core/res/AndroidManifest.xml
|
fca9d63635d9603c318a089397b23c17682453e3 |
|
04-Oct-2012 |
Matthew Xie <mattx@google.com> |
Add multi user support for bluetooth Create a BLUETOOTH_STACK permission to share between all users of Bluetooth apk. Bluetooth Manager binds to apk of current user bug 6925422 Change-Id: I2df5546e977c2d77bc66d97d12479d933826922a
/frameworks/base/core/res/AndroidManifest.xml
|
7c3586c576c7f7238274f1ffbc4577a57be0d1f1 |
|
29-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Merge "Make the theme for choose account and choose account type dialogs same." into jb-mr1-dev
|
3ff8e1a80058e5557d13693d3223e1aa011c0038 |
|
29-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Merge "Fix issue #7211769 and #7244492, thrash around on #7226656." into jb-mr1-dev
|
d4ac8d7b3de27a9f0e4c6af2496ca71d794e42d1 |
|
28-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7211769 and #7244492, thrash around on #7226656. Issue #7211769: Crash dialog from background user has non-working "report" The report button now launches the issue reporter for the correct user. Also for crashes on background users, either disable the report button, or simply don't show the dialog depending on the build config. Issue #7244492: Bugreport button in Quick Settings doesn't actually do anything Now they do. Issue #7226656: second user seeing primary user's apps I haven't had any success at reproducing this. I have tried to tighten up the path where we create the user to ensure nothing could cause the user's applications to be accessed before the user it fully created and thus make them installed... but I can't convince myself that is the actual problem. Also tightened up the user switch code to use forground broadcasts for all of the updates about the switch (since this is really a foreground operation), added a facility to have BOOT_COMPELTED broadcasts not get launched for secondary users and use that on a few key system receivers, fixed some debug output. Change-Id: Iadf8f8e4878a86def2e495e9d0dc40c4fb347021
/frameworks/base/core/res/AndroidManifest.xml
|
856b01e7e41c6800c81d04f001e5dd4f7ae05a57 |
|
28-Sep-2012 |
Jatin Lodhia <jlodhia@google.com> |
Make the theme for choose account and choose account type dialogs same. Contacts app uses a custom account picker which calls the system account picker when an account needs to be added. The system accout picker invokes choose accout type dialog which overlays over the system acccount picker. Because these two dialog boxes use different themes, he one behind is wider than the one in foreground and ends up looking like a thin black strip protruding from the two sides. Bug: 6980517 Change-Id: Ia8b23767d995dcbe1a58087cb4bfbee140c2c744
/frameworks/base/core/res/AndroidManifest.xml
|
c6fa237daeaae6107174a9b9d4f591ea8cd26d86 |
|
24-Sep-2012 |
Robert Greenwalt <rgreenwalt@google.com> |
Use updatable file for premium-sms filter The data is really to big for a gservices-driven secure setting. bug:7221402 Change-Id: Ie3d4a1a0aeb69b9ef8fad360fa7ec32e927644e8
/frameworks/base/core/res/AndroidManifest.xml
|
7befb7deb2ac15134b3bb190520cba19165d16dd |
|
28-Sep-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Global gesture to toggle Accessibility system-wide. 1. This change adds a global gesture for enabling accessibility. To enable this gesture the user has to allow it from the accessibility settings or use the setup wizard to enable accessibility. When the global gesture is enabled the user can long press on power to bring the global actions dialog and then hold with two fingers for a few seconds to enable accessibility. The appropriate feedback is also provided. 2. The global gesture is writing directly into the settings for the current user if performed when the keyguard is not on. If the keygaurd is on and the current user has no accessibility enabled, the gesture will temporary enable accessibility for the current user, i.e. no settings are changed, to allow the blind user to log into his account. As soon as a user switch happens the new user settings are inherited. If no user change happens after temporary enabling accessibility the temporary changes will be undone when the keyguard goes away and the device will works as expected by the current user. bug:6171929 3. The initialization code for the owner was not executed due to a redundant check, thus putting the accessibility layer in an inconsistent state which breaks pretty much everything. bug:7240414 Change-Id: Ie7d7aba80f5867b7f88d5893b848b53fb02a7537
/frameworks/base/core/res/AndroidManifest.xml
|
52c62344c585662d6b441a08c2a69a5732255a6f |
|
21-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #7213113: Remove old intent resolver Also make the query package restart broadcast protected like the documentation says it should be. Change-Id: I445166111318a02f2f2b1ab0dff9c641a441c20b
/frameworks/base/core/res/AndroidManifest.xml
|
f4f6b4c8b0fcf77d46567f13b409255948fe107b |
|
25-Aug-2012 |
John Spurlock <jspurlock@google.com> |
Fire "dreaming started" and "dreaming stopped" broadcasts. Dream manager now fires broadcast intents when entering + exiting dreamland (except when testing). Power manager can now listen for dreams ending, using polling only as a backstop. Also: - Bullet-proof dream-manager/dream against known failure modes - Add new read/write dream permissions - Refactor dream-manager to delegate work + state management into a new DreamController class, via a handler Bug:6999949 Bug:7152024 Change-Id: I986bb7812209d8c95ae1d660a5eee5998a7b08b1
/frameworks/base/core/res/AndroidManifest.xml
|
8832c18d8b63367929c2d394c9c508f56003d400 |
|
18-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Fix API review bugs. 7173152 API REVIEW: android.content.pm.PackageUserState 7172969 API REVIEW: android.app.PendingIntent 7172730 API REVIEW: android.content.Context 7172726 API REVIEW: android.manifest.permission Change-Id: Iad470256d3b5ca5596487f6a699ec1871457c3b5
/frameworks/base/core/res/AndroidManifest.xml
|
2ca2c8787130506d350d997c18bbc274faf88e37 |
|
17-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More adjustments to permissions. - New "cost money" flag can be put on a permission to have this emphasized in the UI. - Some further re-organization of permissions to better match UX spec. Change-Id: I450ac739eff6b90e7c7fc39589d68db82b61f897
/frameworks/base/core/res/AndroidManifest.xml
|
5dc5a00e7ebadc085ded7e29feacd17e53698486 |
|
16-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
More multi-user stuff. - New public APIs to find out when a user goes to the foreground, background, and is first initializing. - New activity manager callback to be involved in the user switch process, allowing other services to let it know when it is safe to stop freezing the screen. - Wallpaper service now implements this to handle its user switch, telling the activity manager when it is done. (Currently this is only handling the old wallpaper going away, we need a little more work to correctly wait for the new wallpaper to get added.) - Lock screen now implements the callback to do its user switch. It also now locks itself when this happens, instead of relying on some other entity making sure it is locked. - Pre-boot broadcasts now go to all users. - WallpaperManager now has an API to find out if a named wallpaper is in use by any users. Change-Id: I27877aef1d82126c0a1428c3d1861619ee5f8653
/frameworks/base/core/res/AndroidManifest.xml
|
f60921d921947d7d40285f471a09b0478044c29c |
|
13-Sep-2012 |
Geremy Condra <gcondra@google.com> |
Merge changes I69689a73,Iaaef6d41,I7e3cb47a,I42307f58 into jb-mr1-dev * changes: DO NOT MERGE Push event logging down into libcore.EventLogger DO NOT MERGE Added event logging for config installation failures. DO NOT MERGE Create intermediate directories when installing config data. DO NOT MERGE Add components for the Android Config Updater to system server.
|
cd403fc0318684cb7c6c38987d3e0dd0fb8a55bd |
|
13-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Bring back new permission organization. Change-Id: I83e7dd06989ab7b0116bcff5ad52d36e01b851d1
/frameworks/base/core/res/AndroidManifest.xml
|
b631084613e12e1c6a0ae2ad9446e1284b650ccb |
|
24-Aug-2012 |
Geremy Condra <gcondra@google.com> |
DO NOT MERGE Add components for the Android Config Updater to system server. This adds the necessary bits to verify and install configuration updates using system server. It also includes the cert pinning updater as the first user. Change-Id: I42307f58074157b33b6e01216aab10022340d449
/frameworks/base/core/res/AndroidManifest.xml
|
5cf8bd79bbdef0185574f0e3514124583ad537cd |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Merge "Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware" into jb-mr1-dev
|
4497e0c3c672e507b4fd1ff1debefaf76c52ec28 |
|
11-Sep-2012 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #7141044 GlobalActions dialog (power off / airplane mode / sound off) should be RTL aware - add android:supportsRtl="true" to the manifest for system_process Change-Id: I9794f6880c883d91751d0037646253810b086d46
/frameworks/base/core/res/AndroidManifest.xml
|
9d9ece3c1e16001b63244459cdf4b428f4272d2e |
|
11-Sep-2012 |
Dianne Hackborn <hackbod@google.com> |
Animations for user switching. The window manager now has a facility to provide a full-screen animation, which the activity manager uses every time a user switch happens. The current animation is just a simple dumb slide until we get a design from UX. Also some cleanup: moved the portrait task animations to the default config so we always have an animation for them, and finally got the java symbol stuff out of public.xml. Change-Id: I726f77422b2ef5f2d98f961f8da003e045f0ebe8
/frameworks/base/core/res/AndroidManifest.xml
|
e08ae388d63c4db8f9d9a7ecd634f9a51f6e91b9 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add new wifi display discovery API. The API is quite simple. There are a few extra functions on DisplayManager to scan, connect and disconnect from wifi displays and get status, and a single protected broadcast sent when the status changes. Change-Id: Ic91dbab5ee818e790b27fa32e1a1e93788793be0
/frameworks/base/core/res/AndroidManifest.xml
|
4b71e4e66cd12d581d4939bab86ec624d27eb570 |
|
08-Sep-2012 |
Jeff Brown <jeffbrown@google.com> |
Add permissions to control and configure wifi display. Change-Id: I54af6da53b7243516becd6a3d5985c0feda6c225
/frameworks/base/core/res/AndroidManifest.xml
|
1cf70bbf96930662cab0e699d70b62865766ff52 |
|
06-Aug-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Screen magnification - feature - framework. This change is the initial check in of the screen magnification feature. This feature enables magnification of the screen via global gestures (assuming it has been enabled from settings) to allow a low vision user to efficiently use an Android device. Interaction model: 1. Triple tap toggles permanent screen magnification which is magnifying the area around the location of the triple tap. One can think of the location of the triple tap as the center of the magnified viewport. For example, a triple tap when not magnified would magnify the screen and leave it in a magnified state. A triple tapping when magnified would clear magnification and leave the screen in a not magnified state. 2. Triple tap and hold would magnify the screen if not magnified and enable viewport dragging mode until the finger goes up. One can think of this mode as a way to move the magnified viewport since the area around the moving finger will be magnified to fit the screen. For example, if the screen was not magnified and the user triple taps and holds the screen would magnify and the viewport will follow the user's finger. When the finger goes up the screen will clear zoom out. If the same user interaction is performed when the screen is magnified, the viewport movement will be the same but when the finger goes up the screen will stay magnified. In other words, the initial magnified state is sticky. 3. Pinching with any number of additional fingers when viewport dragging is enabled, i.e. the user triple tapped and holds, would adjust the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 4. When in a permanent magnified state the user can use two or more fingers to pan the viewport. Note that in this mode the content is panned as opposed to the viewport dragging mode in which the viewport is moved. 5. When in a permanent magnified state the user can use three or more fingers to change the magnification scale which will become the current default magnification scale. The next time the user magnifies the same magnification scale would be used. 6. The magnification scale will be persisted in settings and in the cloud. Note: Since two fingers are used to pan the content in a permanently magnified state no other two finger gestures in touch exploration or applications will work unless the uses zooms out to normal state where all gestures works as expected. This is an intentional tradeoff to allow efficient panning since in a permanently magnified state this would be the dominant action to be performed. Design: 1. The window manager exposes APIs for setting accessibility transformation which is a scale and offsets for X and Y axis. The window manager queries the window policy for which windows will not be magnified. For example, the IME windows and the navigation bar are not magnified including windows that are attached to them. 2. The accessibility features such a screen magnification and touch exploration are now impemented as a sequence of transformations on the event stream. The accessibility manager service may request each of these features or both. The behavior of the features is not changed based on the fact that another one is enabled. 3. The screen magnifier keeps a viewport of the content that is magnified which is surrounded by a glow in a magnified state. Interactions outside of the viewport are delegated directly to the application without interpretation. For example, a triple tap on the letter 'a' of the IME would type three letters instead of toggling magnified state. The viewport is updated on screen rotation and on window transitions. For example, when the IME pops up the viewport shrinks. 4. The glow around the viewport is implemented as a special type of window that does not take input focus, cannot be touched, is laid out in the screen coordiates with width and height matching these of the screen. When the magnified region changes the root view of the window draws the hightlight but the size of the window does not change - unless a rotation happens. All changes in the viewport size or showing or hiding it are animated. 5. The viewport is encapsulated in a class that knows how to show, hide, and resize the viewport - potentially animating that. This class uses the new animation framework for animations. 6. The magnification is handled by a magnification controller that keeps track of the current trnasformation to be applied to the screen content and the desired such. If these two are not the same it is responsibility of the magnification controller to reconcile them by potentially animating the transition from one to the other. 7. A dipslay content observer wathces for winodw transitions, screen rotations, and when a rectange on the screen has been reqeusted. This class is responsible for handling interesting state changes such as changing the viewport bounds on IME pop up or screen rotation, panning the content to make a requested rectangle visible on the screen, etc. 8. To implement viewport updates the window manger was updated with APIs to watch for window transitions and when a rectangle has been requested on the screen. These APIs are protected by a signature level permission. Also a parcelable and poolable window info class has been added with APIs for getting the window info given the window token. This enables getting some useful information about a window. There APIs are also signature protected. bug:6795382 Change-Id: Iec93da8bf6376beebbd4f5167ab7723dc7d9bd00
/frameworks/base/core/res/AndroidManifest.xml
|
d1b5cfc94ae940f42be352e7ed98c21c973471b2 |
|
29-Aug-2012 |
rich cannings <richc@google.com> |
Notify verifiers that verification is complete Send the Intent.ACTION_PACKAGE_VERIFIED to all verifiers when verification is complete (either one verifier verified the package or a timeout occurred). Details of what occurred is in a new extra, PackageManager.EXTRA_VERIFICATION_RESULT. Bug: 7048930 Change-Id: I4f9855a29b0eb6d77f469891402c69e2e8922945
/frameworks/base/core/res/AndroidManifest.xml
|
e217ee4d7a8223289a1af7363627c69956c46d41 |
|
29-Aug-2012 |
Jeff Sharkey <jsharkey@android.com> |
Access to all users' external storage. System services holding this permission have external storage bound one level higher, giving them access to all users' files. Bug: 7003520 Change-Id: Ib2bcb8455740c713ebd01f71c9a2b89b4e642832
/frameworks/base/core/res/AndroidManifest.xml
|
80a4af2bbc6af42ae605e454bf89558e564f5244 |
|
28-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Start implementing concept of "running" users. The activity manager now keeps track of which users are running. Initially, only user 0 is running. When you switch to another user, that user is started so it is running. It is only at this point that BOOT_COMPLETED is sent for that user and it is allowed to execute anything. You can stop any user except user 0, which brings it back to the same state as when you first boot the device. This is also used to be able to more cleaning delete a user, by first stopping it before removing its data. There is a new broadcast ACTION_USER_STOPPED sent when a user is stopped; system services need to handle this like they currently handle ACTION_PACKAGE_RESTARTED when individual packages are restarted. Change-Id: I89adbd7cbaf4a0bb72ea201385f93477f40a4119
/frameworks/base/core/res/AndroidManifest.xml
|
7e67151b912622f8a279ab1523a9bcf26ebaff3d |
|
27-Aug-2012 |
rich cannings <richc@google.com> |
Add permission checks for Verification API calls Ensure that only applications with android.Manifest.permission.PACKAGE_VERIFICATION_AGENT can call application verification APIs, like PackageManager.verifyPendingInstall and PackageManager.extendVerificationTimeout Bug: 7049083 Change-Id: I5fc28b37e864d67cd319a1ed9d03a90dd15ad052
/frameworks/base/core/res/AndroidManifest.xml
|
1952637425eece18aa1ce3d80d4b49086ef3bcf7 |
|
22-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
Remove permission requirement for some UserManager calls Update javadocs to be explicit about permissions. Minor fixes in UserManagerService Change-Id: I0d355e0a60e5dbdb49ed06091111d480ff249f3d
/frameworks/base/core/res/AndroidManifest.xml
|
2a00329c6d55c6cd9166e01963d7410e95d80d21 |
|
15-Aug-2012 |
Amith Yamasani <yamasani@google.com> |
UserHandle to UserSerialNo mapping Use AtomicFile for usermanager files. Added a MANAGE_USERS permission that apps (signature permission) can use to create/query/modify/remove users. Change-Id: I5cf232232d0539e7508df8ec9b216e29c2351cd9
/frameworks/base/core/res/AndroidManifest.xml
|
0224ccab3c7121aeafe7d491042dd38c3a2bb9d3 |
|
17-Aug-2012 |
Subir Jhanb <subir@google.com> |
Change directory permission to "signature|system" Change-Id: I53dea6984b4577803fdead5caad0112503d2b4e5
/frameworks/base/core/res/AndroidManifest.xml
|
603af61a7cd49f214743b286520419a3fe460774 |
|
07-Aug-2012 |
Subir Jhanb <subir@google.com> |
Add a new permission to have access to Gal Provider BUG:6897999 Change-Id: Ie60963b7f3911b402b971e794178754e1b4f0a43
/frameworks/base/core/res/AndroidManifest.xml
|
b4163a6e12ee7100c758c6d3d062ade1f2843fce |
|
03-Aug-2012 |
Dianne Hackborn <hackbod@google.com> |
Add APIs for interacting across users. - Expose the existing Context.sendBroadcast() as Context.sendBroadcastAsUser(). - Add new android:singleUser attribute for services. - Add new INTERACT_ACROSS_USERS_FULL permission for full system-level access to cross-user interface (allows sendBroadcastAsUser() to send to any receiver). - Add new INTERACT_ACROSS_USERS_FULL permission for more restricted cross-user interaction: this is required for android:singleUser, and allows you to use sendBroadcastAsUser() but only to send to your own receivers. Change-Id: I0de88f6718e9505f4de72e3f45d29c0f503b76e9
/frameworks/base/core/res/AndroidManifest.xml
|
db3c8678e5cbdfec011afaf25bde2091152c30ad |
|
20-Jun-2012 |
Haoyu Bai <bhy@google.com> |
Network data activity change intent for network interfaces. The activity notification is received from netd, an intent DATA_ACTIVITY_CHANGE is then raised for other part of the system to consume. Change-Id: Idfcc4763c51c5b314c57f546c12557082f06bebf
/frameworks/base/core/res/AndroidManifest.xml
|
0f42037eb7b5118015c2caca635538324ccf0ccf |
|
12-Apr-2012 |
fredc <fredc@broadcom.com> |
Non persistent adapter service Change-Id: Ib13d5c77416e58161df0e04d7a15ec0dddbde8b5 Conflicts: core/java/android/bluetooth/BluetoothInputDevice.java Conflicts: core/java/com/android/internal/app/ShutdownThread.java services/java/com/android/server/SystemServer.java Conflicts: services/java/com/android/server/SystemServer.java services/java/com/android/server/pm/ShutdownThread.java
/frameworks/base/core/res/AndroidManifest.xml
|
c9c9a48e7bafae63cb35a9aa69255e80aba83988 |
|
16-Jul-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Removing a workaround for incorrect window position on window move. 1. The window manager was not notifying a window when the latter has been moved. This was causing incorrect coordinates of the nodes reported to accessibility services. To workaround that we have carried the correct window location when making a call from the accessibility layer into a window. Now the window manager notifies the window when it is moved and the workaround is no longer needed. This change takes it out. 2. The left and right in the attach info were not updated properly after a report that the window has moved. 3. The accessibility manager service was calling directly methods on the window manager service without going through the interface of the latter. This leads to unnecessary coupling and in the long rung increases system complexity and reduces maintability. bug:6623031 Change-Id: Iacb734b1bf337a47fad02c827ece45bb2f53a79d
/frameworks/base/core/res/AndroidManifest.xml
|
d0d2cda9d414da73773285d7fee9e13aef3495e9 |
|
08-Jun-2012 |
Adam Powell <adamp@google.com> |
Further work on MediaRouter Remove volume control and tracking. This will be handled by extensions to existing audio and media APIs for now. Tweak/refine other aspects of the API. Pass the router to callbacks for easier future-proofing. Add group/ungroup callback methods. Change-Id: Ib69e76e5f46280a9002b545bcf4cbc7b839844ee
/frameworks/base/core/res/AndroidManifest.xml
|
636fd528f7ad51f565a390226d9f469f8c675ccf |
|
06-Jun-2012 |
Dianne Hackborn <hackbod@google.com> |
Docs (mostly): enumerate JELLY_BEAN target SDK changes. Okay this isn't entirely docs. I have un-hidden the new permission for binding to accessibility services; we were going to go out with it hidden since it didn't go into factory ROM, but now that we are doing other things we might as well expose it. Also changed a log from E to W, since it is not an error. Change-Id: I9226c95e3b63e12218fe41dc3f4290d9824a9e5c
/frameworks/base/core/res/AndroidManifest.xml
|
7c86958d73e7216a92bdfd84fce4440e1def7eaa |
|
03-Jun-2012 |
Adam Powell <adamp@google.com> |
Merge "Add MediaRouter API." into jb-dev
|
361dfebc943fa53f2a2e3fe0b3429ea5d2530ad0 |
|
02-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
For JB, the READ_EXTERNAL_STORAGE permission is not enforced by default. It may be enforced by default in future releases. Developers have the option of enabling enforcement to test their application and some may begin to include this permission on applications. To avoid user confusion, the permission is placed in the development tools group. Change-Id: Id27ba241db0253eac774401aaaa6e5c4340588d7
/frameworks/base/core/res/AndroidManifest.xml
|
9a1de308cea2d160778fd977825f10a07b49d738 |
|
22-May-2012 |
Adam Powell <adamp@google.com> |
Add MediaRouter API. This is just the initial state tracking. Still to go is actually triggering Bluetooth A2DP correctly and tracking process state in the system server. Change-Id: I33031d52799d6e2d7208910da833831085cc3677
/frameworks/base/core/res/AndroidManifest.xml
|
4c52235fbc257bc3d73459e61c2d595a539271ba |
|
01-Jun-2012 |
Adrian Ludwig <aludwig@google.com> |
Revert "Make the protectionLevel of framework permissions consistent and related to sensitive user data. Dangerous permissions are applied only where sensitive user data may be exposed." This reverts commit a8a200278dcc232eabd4550f814439c94857c47c. Conflicts: core/res/AndroidManifest.xml core/res/res/values/strings.xml Change-Id: I3f76d93a6ffde031bf82c2afea315ebcdbc179e3
/frameworks/base/core/res/AndroidManifest.xml
|
727c599454b1e280a237b10fea4dd7f7cb1096e0 |
|
29-May-2012 |
Alice Yang <alice@google.com> |
New UI for account picker - Added radio buttons to indicate the selected item - "Add account" is one of the list options instead of a button - Removed icons - Added "Cancel" and "OK" buttons - Use dialog theme - Omit description text by default Bug 6505441 Change-Id: I672a11481ee99e183142142bddf8f97b7b149d37
/frameworks/base/core/res/AndroidManifest.xml
|
1e7456ba74f93cdf80dc430aa082cc3c271b30b1 |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Fixing the build for real. Change-Id: I792d029c7fff4d96fbe238ff4b3f268cb8603b95
/frameworks/base/core/res/AndroidManifest.xml
|
e63049b838e94379ba1dae3137198bc3ddf5f19d |
|
17-May-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding some missing files. Change-Id: I991d8bf815a7e57dc1cbad384e15aa21bef0c7c7
/frameworks/base/core/res/AndroidManifest.xml
|
507f5586fb48f59f7b4f2fa0ca5387e4d4f2bd8d |
|
08-May-2012 |
Jeff Brown <jeffbrown@google.com> |
Hide SET_KEYBOARD_LAYOUT permissions. Bug: 6427036 Change-Id: Idbb442ad8071b2ca4acf247b135c7aba0830cf70
/frameworks/base/core/res/AndroidManifest.xml
|
99222d212f9ff5081d4ce6eef09dbe8eff85b83a |
|
07-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Finish up issue #6249094: Display permissions based on relevance to private data Added bitmaps for permission group icons. We had to pick either icons for a dark or light background, and it had to be light for settings, so the installer theme has gone back to dark. Tweaked the permission groups to match the icons. Redid the group priorities to make them correct (they were written with higher priorities being less important). Fixed bug where priority was not being used for system apps. Change-Id: Ia3d3f0c1614a11b4cfd11682ce9e6c9f87d75c06
/frameworks/base/core/res/AndroidManifest.xml
|
dc410cb3499683509770bb88cb771a91acd16bd2 |
|
13-Apr-2012 |
Adrian Ludwig <aludwig@google.com> |
Reorganizing permissions into groups oriented around user-understandable concepts. These groups are assigned priority for sort-order when displayed to users, and use the new permissionGroupFlags to indicate whether they contain personalInfo. Change-Id: I27e81912e08b8d7766b8ce449b4b3bd6473d8f07
/frameworks/base/core/res/AndroidManifest.xml
|
fd5015be41080970c9a992a8ef17a1deefb57478 |
|
01-May-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new APIs for permission group flags and priorities. Change-Id: I2d476c6aa9dbd05407ec49be45986f42d2acf9e7
/frameworks/base/core/res/AndroidManifest.xml
|
098d580cc2bb6c0891c756a4e5230c6c6b0d2376 |
|
27-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Migrate ringtone playback to SystemUI. Introduce IRingtonePlayer, which handles playback for both Ringtone objects and Notifications. SystemUI now hosts this player, which it registers with AudioService. It also keeps MediaPlayer instances warm, and cleans them up after stop() or Binder death. Move both Ringtone and NotificationManagerService to play back audio through this new interface. Bug: 6376128, 6350773 Change-Id: I1dcb86d16ee3c4f07cdb2248d33dcff4ead3609a
/frameworks/base/core/res/AndroidManifest.xml
|
8f014059d3084fcce9e82b4b1f8b8323744ac52d |
|
26-Apr-2012 |
Mike Lockwood <lockwood@google.com> |
Make audio routing Intents protected These intents should only be sent by the system: android.intent.action.HEADSET_PLUG android.intent.action.ANALOG_AUDIO_DOCK_PLUG android.intent.action.DIGITAL_AUDIO_DOCK_PLUG android.intent.action.HDMI_AUDIO_PLUG android.intent.action.USB_AUDIO_ACCESSORY_PLUG android.intent.action.USB_AUDIO_DEVICE_PLUG Change-Id: I7be41892a9c4e619ca3e1c892fad6f1f2714c74f Signed-off-by: Mike Lockwood <lockwood@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
6dcf382b1b1dde5e6303a51a27f8d3b928072415 |
|
18-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move RINGTONE_PICKER to handle external storage. To give RINGTONE_PICKER external storage access, move it from system to MediaProvider. Fix OOBE when getRingtoneUri() kicked requery(). Bug: 6346701 Change-Id: I837002eef0580b8cdd8920a27b068c745995a8a3
/frameworks/base/core/res/AndroidManifest.xml
|
2c8e19e81fb930fbb4d353c91ca0852fe91d8166 |
|
25-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
Merge "New API to allow third-party apps to bind widgets"
|
61a5b0160d9f2e53ef4d4b451212a63032dad32d |
|
13-Apr-2012 |
Michael Jurka <mikejurka@google.com> |
New API to allow third-party apps to bind widgets Change-Id: I1a3761c1a0f557a32d4d3bdd0207567fec918ba7
/frameworks/base/core/res/AndroidManifest.xml
|
8238e717df4bc5eebf15f97172d68af3599a95bb |
|
24-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new signature-level permission to get details of tasks. Third party apps now can't get access to the extras of the intents associated with tasks, to keep private data in them from leaking out. Change-Id: I95af9e181ac42557bc8b981807e7ddd266a88d0e
/frameworks/base/core/res/AndroidManifest.xml
|
d65c2be5485143a0d489c6dfa24276ae834ccffc |
|
20-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Merge "Add ContentProvider for apps to read received SMS cell broadcasts."
|
35be7560300a97fc3675bdd325910f28827d9508 |
|
19-Apr-2012 |
Jeff Sharkey <jsharkey@android.com> |
Move SystemUI out of system UID. Add permissions for various things it pokes. Create new permission to control launching non-exported activities from recents. Hidden API to relax WallpaperService checks. Change-Id: I547fdcd7c213dd153ae101533ce7c56cd8f86a0d
/frameworks/base/core/res/AndroidManifest.xml
|
c3296ffdfc70c6778b6ae760b812b4e53e335f97 |
|
18-Apr-2012 |
Jake Hamby <jhamby@google.com> |
Add ContentProvider for apps to read received SMS cell broadcasts. The CellBroadcastReceiver app will allow apps with the new permission "android.permission.READ_CELL_BROADCASTS" to read previously received cell broadcast messages from a new ContentProvider database at URI "content://cellbroadcasts". This will enable third parties to provide additional information to users in the event of emergencies without delaying or interfering with the initial system alert dialog to warn the user when the alert is received. Includes a new android.telephony.CellBroadcastMessage class which can be instantiated from the Cursor retrieved from the ContentProvider. This was previously a part of the CellBroadcastReceiver app, but can now be used by third party apps with read permission on the ContentProvider. Change-Id: I2c31f62b63c050c7946de2d81c28a5f4dc6f00b0
/frameworks/base/core/res/AndroidManifest.xml
|
9f25b7fdf216c9ef0bd2322cd223eeaf0d60f77f |
|
10-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Request key maps from input manager service. Instead of each application loading the KeyCharacterMap from the file system, get them from the input manager service as part of the InputDevice object. Refactored InputManager to be a proper singleton instead of having a bunch of static methods. InputManager now maintains a cache of all InputDevice objects that it has loaded. Currently we never invalidate the cache which can cause InputDevice to return stale motion ranges if the device is reconfigured. This will be fixed in a future change. Added a fake InputDevice with ID -1 to represent the virtual keyboard. Change-Id: If7a695839ad0972317a5aab89e9d1e42ace28eb7
/frameworks/base/core/res/AndroidManifest.xml
|
e824120016248bcfe3962883fe9f3b0481dd1c3d |
|
06-Apr-2012 |
Dianne Hackborn <hackbod@google.com> |
Hide the optional permission stuff, not making it in to JB. Also lock down the rest of the development tools permissions to be development permissions that must be granted through an explicit shell command. Change-Id: I1ba216fffe1aab4bb9f83fcef108efc504f892f4
/frameworks/base/core/res/AndroidManifest.xml
|
ac14351e16e1258f1cb54e2bf772b8be004eb2b8 |
|
06-Apr-2012 |
Jeff Brown <jeffbrown@google.com> |
Move some APIs from window manager to input manager. Simplified input injection API down to just one call. Removed all input state reading API. It was only used by the window manager policy and required a permission that applications could not obtain. READ_INPUT_STATE is now unused and deprecated. Change-Id: I41278141586ddee9468cae0fb59ff0dced6cbc00
/frameworks/base/core/res/AndroidManifest.xml
|
5b8fd25029e8b53353f4cdcb7c0dacea294a6b44 |
|
27-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Merge "Make READ_LOGS signature|system|development"
|
135936072b24b090fb63940aea41b408d855a4f3 |
|
23-Mar-2012 |
Amith Yamasani <yamasani@google.com> |
User management and switching Broadcast intents that get sent out when users are added/removed/switched. More work on generating user-specific information in package manager queries. APIs to update user name and query a user by id. Removed Package.mSetStopped and mSetEnabled, since they're not user specific. User removal: - Cleanup ActivityManager, PackageManager, WallpaperManager, AppWidgetService and AccountManager. - Shutdown processes belonging to the user. Don't show vibrate option in long-press power if there's no vibrator. Lock the screen when switching users, to force unlocking. Change-Id: Ib23a721cb75285eef5fd6ba8c7272462764038fa
/frameworks/base/core/res/AndroidManifest.xml
|
cb5863e022938fe98e0ddbfe1700082750a8761f |
|
23-Mar-2012 |
Nick Kralevich <nnk@google.com> |
Make READ_LOGS signature|system|development Change-Id: I387d53ac4b7fd3d65891145985e4cd272dffddcf
/frameworks/base/core/res/AndroidManifest.xml
|
53567a756e34706edbeae7217ad4205c55bb76b6 |
|
13-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Merge "Introduce READ_CALL_LOG and WRITE_CALL_LOG"
|
7924512aa12c6af37d90e8ccfcdf04eb78a294a3 |
|
12-Mar-2012 |
Dianne Hackborn <hackbod@google.com> |
Add new READ_EXTERNAL_STORAGE permission. Also adds some initial compatibility code for dealing with it. Change-Id: I104bff11798349e4aaa6da9b7be787b257daa1bb
/frameworks/base/core/res/AndroidManifest.xml
|
f06d9497afe01896b52e0cb5e5ff38fd49ef6eef |
|
12-Mar-2012 |
Daniel Lehmann <lehmannd@google.com> |
Introduce READ_CALL_LOG and WRITE_CALL_LOG Bug:6141864 Change-Id: I66fcab2a35b8c1c73bac7cfffb9f008c82ed51e8
/frameworks/base/core/res/AndroidManifest.xml
|
8662cab5c6a01ea5c426512e6f6d2cf3e158aea0 |
|
23-Feb-2012 |
Christopher Tate <ctate@google.com> |
Merge: Introduce UpdateLocks An "UpdateLock" works similarly to a wake lock in API: the caller is providing a hint to the OS that now is not a good time to interrupt the user/device in order to do intrusive work like applying OTAs. This is particularly important for headless or kiosk-like products where ordinarily the update process will be automatically scheduled and proceed without user or administrator intervention. UpdateLocks require that the caller hold the new signatureOrSystem permission android.permission.UPDATE_LOCK. acquire() and release() will throw security exceptions if this is not the case. The "is now convenient?" state is expressed to interested parties by way of a sticky broadcast sent only to registered listeners. The broadcast is protected; only the system can send it, so listeners can trust it to be accurate. The broadcast intent also includes a timestamp (System.currentTimeMillis()) to help inform listeners that wish to implement scheduling policies based on when the device became idle. The API change here is a tiny one: a dump(PrintWriter) method has been added to the TokenWatcher class to facilitate getting information out of it for dumpsys purposes. UpdateLock itself is still @hide. Bug 5543442 Change-Id: I3709c831fc1883d7cb753cd2d3ee8e10a61e7e48
/frameworks/base/core/res/AndroidManifest.xml
|
e639da7baa23121e35aa06d6e182558e0e755696 |
|
22-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
New development permissions. These are permissions that an application can request, but won't normally be granted. To have the permission granted, the user must explicitly do so through a new "adb shell pm grant" command. I put these permissions in the "development tools" permission group. Looking at the stuff there, I think all of the permissions we already had in that group should be turned to development permissions; I don't think any of them are protecting public APIs, and they are really not things normal applications should use. The support this, the protectionLevel of a permission has been modified to consist of a base protection type with additional flags. The signatureOrSystem permission has thus been converted to a signature base type with a new "system" flag; you can use "system" and/or "dangerous" flags with signature permissions as desired. The permissions UI has been updated to understand these new types of permissions and know when to display them. Along with doing that, it also now shows you which permissions are new when updating an existing application. This also starts laying the ground-work for "optional" permissions (which development permissions are a certain specialized form of). Completing that work requires some more features in the package manager to understand generic optional permissions (having a facility to not apply them when installing), along with the appropriate UI for the app and user to manage those permissions. Change-Id: I6571785c6bb5f6b291862b7a9be584885f88f3a5
/frameworks/base/core/res/AndroidManifest.xml
|
25872aa3ef189ae5506a923398af11ce5eb1a9b9 |
|
04-Feb-2012 |
Svetoslav Ganov <svetoslavganov@google.com> |
Adding shell commands for modifying content. 1. Added methods to the ActivityManagerService remote interface that allow accessing content providers outside of an application. These methods are guarded by an internal signature protected permission which is given to the shell user. This enables a shell program to access content providers. 2. Implemented a shell command that takes as input as standart fagls with values and manipulates content via the content provider mechanism. Change-Id: I2943f8b59fbab33eb623458fa01ea61a077b9845
/frameworks/base/core/res/AndroidManifest.xml
|
b01e8bf57b7492b77e3445db51471edcbadda75e |
|
30-Aug-2011 |
Mike Lockwood <lockwood@android.com> |
New Serial Manager API: SerialManager: provides access to serial ports SerialPort: for reading and writing data to and from serial ports IO with both array based and direct ByteBuffers is supported. Accessing serial ports requires android.permission.SERIAL_PORT permission Each platform must configure list of supported serial ports in the config_serialPorts resource overlay (this is needed to prevent apps from accidentally accessing the bluetooth or other system UARTs). In addition, the platform uevent.rc file must set the owner to the /dev/tty* files to "system" so the framework can access the port. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a573f6a1d9b12393fbdfd2c0850499973849854b |
|
10-Feb-2012 |
Dianne Hackborn <hackbod@google.com> |
Some hardening of isolated processes by restricting access to services. Services now must explicitly opt in to being accessed by isolated processes. Currently only the activity manager and surface flinger allow this. Activity manager is needed so that we can actually bring up the process; SurfaceFlinger is needed to be able to get the display information for creating the Configuration. The SurfaceFlinger should be safe because the app doesn't have access to the window manager so can't actually get a surface to do anything with. The activity manager now protects most of its entry points against isolated processes. Change-Id: I0dad8cb2c873575c4c7659c3c2a7eda8e98f46b0
/frameworks/base/core/res/AndroidManifest.xml
|
9be4962060ca67c4fe9bfc391043f6d2829cf720 |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Merge "Unhide social stream permissions." into ics-mr1
|
098d466a25cf294487188b34dfa95575911a37cf |
|
17-Nov-2011 |
Dave Santoro <dsantoro@google.com> |
Unhide social stream permissions. Bug 5569021 Change-Id: I35ee70418be0e0286294fef54e194831b5fa3b2c
/frameworks/base/core/res/AndroidManifest.xml
|
20cf0916cc6a4920b1d882a9478615a15fe6b3b0 |
|
09-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Merge "Bug 5585323 New system permission for media decode" into ics-mr1
|
4ba27fe702580a90c6e9c1861d4ea2da6fc3b029 |
|
07-Nov-2011 |
Jean-Michel Trivi <jmtrivi@google.com> |
Bug 5585323 New system permission for media decode Add a system permission to enable the use of any installed media decoder when decoding for playback (as opposed to transcode). Change-Id: Ifb10a5fa8d5663a78ccbb5fa8266ad6535c234f2
/frameworks/base/core/res/AndroidManifest.xml
|
8588e47358878b7a1add2bd1df2ade95091cdb8d |
|
08-Nov-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Fix build. Missed a commit that fixed some issues. bug:5237167 Change-Id: I61e44831e2c3f1cf613ca1387aa95d712b7d2ded
/frameworks/base/core/res/AndroidManifest.xml
|
148c7d0de720a92632aa6ed10a39bfc38b427239 |
|
13-Oct-2011 |
tk.mun <tk.mun@samsung.com> |
Wimax : wimax framework related open source. Integrate wimax network related changes into Android Framework. - In Connectivity service, start wimax service. - 4G icon display in StatusBarPolicy. - DHCP renew add. - Add radio for wiamx Change-Id: I2d9012247edfdf49d71ca7e1414afd0006f330ca Signed-off-by: tk.mun <tk.mun@samsung.com> bug:5237167
/frameworks/base/core/res/AndroidManifest.xml
|
0b61f59d77153e7d63a33fc5d47805feb99d918b |
|
04-Oct-2011 |
Dave Santoro <dsantoro@google.com> |
Add new permissions for read/write social stream. This is a manual merge of a change going in to ICS-FactoryROM. These permissions are needed to separate the (potentially invasive) access to the user's social stream from the existing read/write contacts permission. Per discussion with Android release team, we are also hiding the stream item API until we figure out a better way to guard the data. Bug 5406886 Change-Id: I8339d743c3ebe8923c7ee47f2900444efcf82a52
/frameworks/base/core/res/AndroidManifest.xml
|
b04fe4e82abb073b4e5d82563b0882cea0dcc139 |
|
17-Sep-2011 |
Fred Quintana <fredq@google.com> |
Continuation of the unified account chooser flow. - made the UI match the spec - added ability to force the account chooser to appear - added ability to pass in a description that will override the stock one - added ability to pass in requiredFeatures for addAccount - added ability to pass in an authTokenType for addAccount Bug: 5293377 Change-Id: I243c0fd6598c943b1f65753e1f5d3c86629f64f5
/frameworks/base/core/res/AndroidManifest.xml
|
1121bb5e6ff20a2c694225300507ed486e04fea2 |
|
15-Sep-2011 |
Fred Quintana <fredq@google.com> |
Add a generic account chooser/add account flow for apps. The activity is launched as follows: Account account1 = new Account("account1@gmail.com", "com.google") Account account2 = new Account("account2@gmail.com", "com.google") ArrayList<Account> accounts = new ArrayList<Account>(); accounts.add(account1); accounts.add(account2); String[] accountTypes = new String[]{"com.google", "com.android.exchange"}; Bundle addAccountOptions = null; Intent intent = AccountManager.newChooseAccountIntent(account1, accounts, accountTypes, addAccountOptions); startActivityForResult(intent, 0); Change-Id: I05a467bdc3552a2e39397b0182879351f4324389
/frameworks/base/core/res/AndroidManifest.xml
|
d2509fd83597595914ef0627685e917380863eb6 |
|
12-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Add boot mode where only "core apps" are started. A core app is one that has coreApp="true" in its manifest tag. The system can successfully boot (though a little painfully) with only framework-res.apk, SettingsProvider.apk, SystemUI.apk, DefaultContainerService.apk, and Launcher2.apk set as core apps. Currently this boot mode is always turned off. Change-Id: Ieaa4a8031c2c391a12996aa8d8b1d65fc2b09d6b
/frameworks/base/core/res/AndroidManifest.xml
|
905577f6345c014fc2489a8068ea967ba8c18012 |
|
08-Sep-2011 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #5263361: Browser instance not created in application picker The resolver activity was hiding the following activity from recents. Also some other fixes: a little better memory use debugging, removed some unneeded code from window manager, moved some system activities into their own process, added some more running process information for manage apps. Change-Id: I66687d16989ff965d524b92dc360f37c19199717
/frameworks/base/core/res/AndroidManifest.xml
|
b6ae19a96d05546fca61cadcab5c39996d68c9ba |
|
08-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Remove connection access intents from protected broadcasts. These intents are sent by Bluetooth-Pbap app which doesn't have the system uuid. Instead protect with admin permission on the reciever side. Change-Id: Ibb788e1526108909b5a3b15462ac3a008b041613
/frameworks/base/core/res/AndroidManifest.xml
|
81e23acb0b2ffc8962a9b3ff40da328d2bfa401b |
|
06-Sep-2011 |
Jaikumar Ganesh <jaikumar@google.com> |
Add Bluetooth intents to protected broadcasts. Change-Id: I3734a4ff7d964c64ce39ec3f897d3799aa9653f7
/frameworks/base/core/res/AndroidManifest.xml
|
cccdd721e95bff5f964ea6fdf389c1f740a03702 |
|
01-Sep-2011 |
Robert Greenwalt <rgreenwalt@google.com> |
Make WRITE_APN_SETTINGS a system-only permission. Protects us from apps getting packet snooping ability (ie, routing all your traffic through their server by modifing your APN settings). We may eventually revert this if/when we have time to provide a proper API and scary UI like VPN has. bug:5242750 Change-Id: I71d73807ca5268c6aacc2156839b4d11427048c4
/frameworks/base/core/res/AndroidManifest.xml
|
961e30458319cfd50e1892ba7dd14a1d0ebe4cc7 |
|
30-Aug-2011 |
Jeff Sharkey <jsharkey@android.com> |
Introduce immediate CONNECTIVITY_ACTION variant. New broadcast that is dispatched immediately after connectivity changes have been handled by ConnectivityService, bypassing any applicable CONNECTIVITY_CHANGE_DELAY. Also protect CONNECTIVITY_CHANGE broadcasts, since they should only be sent by system. Bug: 5198167 Change-Id: I75f1fb44b21da1879f0ab960bcaa481126d70fde
/frameworks/base/core/res/AndroidManifest.xml
|
463f22114587344c96460179069a08d7381fbfd6 |
|
22-Jul-2011 |
Jake Hamby <jhamby@google.com> |
Add ISIM application support for LTE devices. - Add methods to TelephonyManager to provide access to IMS records on the ISIM application of the UICC, as well as access to the ISIM AKA authentication algorithm. - Add support for the new IMS methods to CDMALTEPhone, using the helper class ImsUiccRecords to load the IMS records from the ISIM. The same approach can be used to implement IMS support for UMTS/LTE devices. - There is a new RIL request, RIL_REQUEST_ISIM_AUTHENTICATION, which is used to perform IMS AKA authentication using the algorithm on the ISIM application of the UICC. The challenge nonce and response are both encoded as Base64 strings. Change-Id: I73367c7d9bc573d0d883d68adf09891de1319129
/frameworks/base/core/res/AndroidManifest.xml
|
5ab2157bf1f105b02d3e2913cd3a33f9765b74ca |
|
27-Jul-2011 |
Kenny Root <kroot@google.com> |
Infrastructure to support package verifier Allow a package verifier to approve or disapprove of a package being installed. Change-Id: Ibfea0f2b1aaa4ab1589a4e59f96144702b9bf94b
/frameworks/base/core/res/AndroidManifest.xml
|
b0381688b8556f4f0a86bb534c8bc52275f16d12 |
|
11-Aug-2011 |
Tom Taylor <tomtaylor@google.com> |
Add private permission for sending SMS via Messaging app When the phone dialer sends an sms, it will use the Messaging app. That way the sent messages will end up in the messaging provider db and sending will be more reliable. Currently, the phone dialer uses the SmsManager directly. For now, the feature is only available to system apps and the permission is private. Bug 4563486 Change-Id: I10f7e1042683164ee61d01a2aaf738d19084da72
/frameworks/base/core/res/AndroidManifest.xml
|
e09cd7914c117e84bf78676d0e760c51aa147eb8 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Merge "New broadcast telling when an app is fully removed."
|
f9abb405903cab1fcd379388a96925524840c607 |
|
11-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
New broadcast telling when an app is fully removed. Change-Id: Ia516d826f302a01881fa92d9ffdc0adfbf669a4b
/frameworks/base/core/res/AndroidManifest.xml
|
d0d85f26cb7287c63adf95bace098bc1af3fe4e8 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I6f9ddb3fffe9e10cc2d34dda3ae8700b1af7e470
/frameworks/base/core/res/AndroidManifest.xml
|
89c95a0da87fc85a86a7341f60decf7e50609a18 |
|
09-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: remove unused protected intent. Change-Id: Id58f81d5f50a13a1fb422eafe66fa512047f9b05
/frameworks/base/core/res/AndroidManifest.xml
|
880f64ac1080ccec111de91a4af026cca3d1bb25 |
|
08-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: introduce VpnService as the base class for user space VPN."
|
199ed6ef89bd356895534ba09ac43ed340cd9a1a |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: introduce VpnService as the base class for user space VPN. Change-Id: I4793a6eb51b33f669fc6d39e1a16cf5eb9e3d851
/frameworks/base/core/res/AndroidManifest.xml
|
b234636105317942bdf2daf4f5581c2218847084 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "VPN: move away from the VPN permission."
|
e53eba0470b7578def756cd22952d447776ba141 |
|
04-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed permission READ_WRITE_OWN_VOICEMAIL from framework/base. This permission has now been replaced by ADD_VOICEMAIL. Bug: 5098551 Change-Id: Idc993f1674a66f0df3ec699ed14b2e5cfedfe3e8
/frameworks/base/core/res/AndroidManifest.xml
|
fcc1b41b663c1a0cb551344c4a16a5ad9ce36d60 |
|
04-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: move away from the VPN permission. VpnBuilder will be replaced by VpnService in the next change. Change-Id: I2dea67a1616b74d17b372f7b214d207f1617198e
/frameworks/base/core/res/AndroidManifest.xml
|
766839cb6f2aac8c802ec1de9f3cc12fcb9eabad |
|
02-Aug-2011 |
Debashish Chatterjee <debashishc@google.com> |
Step1 of renaming READ_WRITE_OWN_VOICEMAIL to ADD_VOICEMAILS. READ_WRITE_OWN_VOICEMAIL sounds a confusing name. Dianne recommened to rename it to ADD_VOICEMAILS as this simply allows 3rd party apps to add new voicemails to the system. The fact that we allow the app to acces only its own voicemail is implicit and need not be highlighted in the permission name. See bug: 5098551 for more details This CL implements the 1st step of this change by adding the permission ADD_VOICEMAILS. A follow up CL will remove READ_WRITE_OWN_VOICEMAIL once content provider and contacts app have been modified to start using the new ADD_VOICEMAILS permission instead. Bug: 5098551 Change-Id: I515e7967bdb0e8498a60a32983f9122ce10dcc4a
/frameworks/base/core/res/AndroidManifest.xml
|
ba39839444532af0ed3766f736582413f6d7a40b |
|
02-Aug-2011 |
Dianne Hackborn <hackbod@google.com> |
Move ImageWallpaper to SystemUI process. Nice to not load 4MB bitmaps in the system process. Also, hey, with how we are now scrolling the surface instead of the bitmap, there is no reason to keep that 4MB bitmap loaded in to memory. So don't. Unfortunately it looks like for some reason the VM is still holding on to the bitmap. I'll need to figure out why. Later. Change-Id: Ib3503756144502fc5c8d5e294248c2417c4fe8c8
/frameworks/base/core/res/AndroidManifest.xml
|
e1538f05587386bbba8dac0b4b4a6c1059947429 |
|
01-Aug-2011 |
Chia-chi Yeh <chiachi@android.com> |
Revert "Unhide APIs for user space VPN." This reverts commit 3c2529c717cda3df321c1d0d6abe23ac1f298ac9. Change-Id: I37d4ea6c1079d337ede7ac567d88414a41fc1e11
/frameworks/base/core/res/AndroidManifest.xml
|
24a12104fd09ad8658b8d8af1f8efce4ec1c6701 |
|
30-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Hide permissions that are not available to apps. Change-Id: I5f3bc72114b780fffe218a5600bfd011ede029d3
/frameworks/base/core/res/AndroidManifest.xml
|
fcbb4924864976339d5ad8b7adb925d7a050df6a |
|
28-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Merge "Unhide APIs for user space VPN."
|
988323c57bd25a58f05dfa492d9b9c8ab62c5153 |
|
22-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 This CL inherits https://android-git.corp.google.com/g/112600 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Iaa425c7915fe70767ad0b17bf6c6fbcd2a1200b2
/frameworks/base/core/res/AndroidManifest.xml
|
3c2529c717cda3df321c1d0d6abe23ac1f298ac9 |
|
22-Jul-2011 |
Chia-chi Yeh <chiachi@android.com> |
Unhide APIs for user space VPN. Change-Id: I2d9e5a8a3ee8556626e373bfdc93c809dad40bff
/frameworks/base/core/res/AndroidManifest.xml
|
0bc369ee66df6dc4c126f1991af591ea6a2c0fd0 |
|
21-Jul-2011 |
Jeff Hamilton <jham@android.com> |
Make READ_FRAME_BUFFER signatureOrSystem. Bug: 4941390 Change-Id: I6d38b2d5ca2ed3bbf9ec0561659a486a99cbc024
/frameworks/base/core/res/AndroidManifest.xml
|
cdf95e31024d235b51c7e6076ea2afc990f460cd |
|
20-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Removed READ_WRITE_ALL_VOICEMAILS permission from framework. This permission is meant to be a 'signature' permission and to be used only by the contacts app. We recently moved it to framework/base as part of opening up voicemail api into the SDK. However, the signature of framework is different from contacts app. Consequently the contacts app is not granted READ_WRITE_ALL_VOICEMAILS permission. This makes the contacts app crash on start. This fix removes the READ_WRITE_ALL_iVOICEMAILS from framework/base so that the one defined in contacts provider is then used by the system. Bug: 5054221 Change-Id: Iaa7a23fe95b0142978eff124e25fe2291dc7d212
/frameworks/base/core/res/AndroidManifest.xml
|
5521e892f8b5b2313619405684d426309f66ade4 |
|
07-Jul-2011 |
Debashish Chatterjee <debashishc@google.com> |
Voicemail content provider API for api council review. This is a new content provider implemented to add visual voicemail support in android. Voicemail content provider is the central repository for storing voicemails inserted by various voicemail sources. The content provider also exposes a status table to let the voicemail source application convey its current status to the system. The primary application that reads from this content provider is the phone app. The phone app shows voicemails along with other call entries within the call log and optionally any relevent message about the voicemail source status. The implementation of this content provider can be found at https://android-git.corp.google.com/w/?p=platform/packages/providers/ContactsProvider.git;a=blob;f=src/com/android/providers/contacts/VoicemailContentProvider.java Change-Id: I8ad46aec20c70684f7bfa45530bbb90dd841d81a
/frameworks/base/core/res/AndroidManifest.xml
|
45ce864ef41ce90938cc34d42a8e1075f69e7a61 |
|
15-Jul-2011 |
Dianne Hackborn <hackbod@google.com> |
Move LoadAverageService to the SystemUI apk. Change-Id: I442e264802d1e35cd7d27bae121ae75f932595b6
/frameworks/base/core/res/AndroidManifest.xml
|
79ec80db70d788f35aa13346e4684ecbd401bd84 |
|
24-Jun-2011 |
Christopher Tate <ctate@google.com> |
Make full backup API available to apps New methods for full backup/restore have been added to BackupAgent (still hidden): onFullBackup() and onRestoreFile(). The former is the entry point for a full app backup to adb/socket/etc: the app then writes all of its files, entire, to the output. During restore, the latter new callback is invoked, once for each file being restored. The full backup/restore interface does not use the previously-defined BackupDataInput / BackupDataOutput classes, because those classes provide an API designed for incremental key/value data structuring. Instead, a new FullBackupDataOutput class has been introduced, through which we restrict apps' abilities to write data during a full backup operation to *only* writing entire on-disk files via a new BackupAgent method called fullBackupFile(). "FullBackupAgent" exists now solely as a concrete shell class that can be instantiated in the case of apps that do not have their own BackupAgent implementations. Along with the API change, responsibility for backing up the .apk file and OBB container has been moved into the framework rather than have the application side of the transaction do it. Change-Id: I12849b06b1a6e4c44d080587c1e9828a52b70dae
/frameworks/base/core/res/AndroidManifest.xml
|
428e84388af3695cb19549bdb107e2b88afd3708 |
|
30-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Extend network stats to signatureOrSystem. Change-Id: I82cc99797b5d5bc3bb9a876b67f311643174da33
/frameworks/base/core/res/AndroidManifest.xml
|
9e18fd1a72ceca43ffd8bc50476a05e236b38b08 |
|
03-May-2011 |
Jeff Sharkey <jsharkey@android.com> |
Permissions to protect bandwidth statistics. Introduces new "net_bw_stats" group which will protect reading detailed bandwidth statistics from the kernel. Also introduce "net_bw_acct" group which will enable specific applications to request that their network traffic be counted against other UIDs. This change associates manifest permissions with the low-level GIDs. Change-Id: If3fc28053afda201ff305d798a8878ff1f35b997
/frameworks/base/core/res/AndroidManifest.xml
|
8969d9924c662ab4cdacc342bbdc33756db730be |
|
22-Jun-2011 |
satok <satok@google.com> |
Revert "Create TextServiceManager and SpellCheckerService" This reverts commit eaddb894865a804279659b4aad6364a34ab50beb.
/frameworks/base/core/res/AndroidManifest.xml
|
eaddb894865a804279659b4aad6364a34ab50beb |
|
01-Jun-2011 |
satok <satok@google.com> |
Create TextServiceManager and SpellCheckerService Bug: 4176026 Spec of TextServiceManager - Chooses the most applicable TextService(e.g. SpellCheckerService, WordBreakIteratorService..) for each locale Spec of SpellCheckerService - Returns whether the given string is a correct word or not - Returns Suggestions for the given string Change-Id: Ia25e7b4f308778891929e31b8cbd741f6848cce4
/frameworks/base/core/res/AndroidManifest.xml
|
3f3337a662e9916bbf14502ef3b32dedaa7adfa4 |
|
18-Jun-2011 |
Chia-chi Yeh <chiachi@android.com> |
VPN: avoid leaking file descriptors. Change-Id: If70f5af3529d79bddb9d72675cf6eb038ff3ff70
/frameworks/base/core/res/AndroidManifest.xml
|
21c9c45e5caf62b935354b74392fb40c4bf18529 |
|
07-Jun-2011 |
Jeff Sharkey <jsharkey@android.com> |
Interface-level network policy, persist policies. Define NetworkPolicy as cycle-reset day and warning/limit values, and set/get through NetworkPolicyManager. Watch ConnectivityManager for network connection events, and apply quota rules based on matching interfaces. Policy service matches based on strong identity to support IMSI-specific policy values. Calculates remaining quota based on current stats recorded since the last reset cycle day. Tests to verify edge cases around February. Persist network and UID policies in XML, and restore on boot. Change-Id: Id40ba7d6eed6094fbd5e18e6331286c606880d80
/frameworks/base/core/res/AndroidManifest.xml
|
432513380e8ea8f4c70853190bfd55a9186407f4 |
|
11-May-2011 |
Dave Santoro <dsantoro@google.com> |
API modifications to handle profiles in Contacts. The user's profile is represented as a single Contact, comprised of Raw Contacts which may be contributed from any accounts the user has on the system. Two new permissions have been added: READ_PROFILE and WRITE_PROFILE. These are required for reading or writing any contact data that is designated as part of the user's profile. Contact queries can include the user's profile data by setting the include_profile URI parameter to 1 (this requires READ_PROFILE access). By default, the user's profile data will not be included in any Contact queries. Change-Id: I25616f59622dbb157032c9c435064eb36af6e8e1
/frameworks/base/core/res/AndroidManifest.xml
|
d4f1bacca50a74a74a02bf6a242bb22c495e4034 |
|
09-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 7ca13deb to master Change-Id: If34814d6c70cf63eca9bd816845389f6785518ae
|
7d259626d009a45195ec341646ce06658b842e40 |
|
08-Jun-2011 |
Jake Hamby <jhamby@google.com> |
resolved conflicts for merge of 0cb17a52 to honeycomb-plus-aosp Change-Id: I784e6d1946fa708f63becece070c7090cec6f1e2
|
8643aa0179e598e78d938c59035389054535a229 |
|
20-Apr-2011 |
Svetoslav Ganov <svetoslavganov@google.com> |
Interrogation of the view hierarchy from an AccessibilityService. 1. Views are represented as AccessibilityNodeInfos to AccessibilityServices. 2. An accessibility service receives AccessibilityEvents and can ask for its source and gets an AccessibilityNodeInfo which can be used to get its parent and children infos and so on. 3. AccessibilityNodeInfo contains some attributes and actions that can be performed on the source. 4. AccessibilityService can request the system to preform an action on the source of an AccessibilityNodeInfo. 5. ViewAncestor provides an interaction connection to the AccessibiltyManagerService and an accessibility service uses its connection to the latter to interact with screen content. 6. AccessibilityService can interact ONLY with the focused window and all calls are routed through the AccessibilityManagerService which imposes security. 7. Hidden APIs on AccessibilityService can find AccessibilityNodeInfos based on some criteria. These API go through the AccessibilityManagerServcie for security check. 8. Some actions are hidden and are exposes only to eng builds for UI testing. Change-Id: Ie34fa4219f350eb3f4f6f9f45b24f709bd98783c
/frameworks/base/core/res/AndroidManifest.xml
|
7218d830e27d81141588cd6e37f206d141a18f62 |
|
04-Jun-2011 |
Jeff Brown <jeffbrown@google.com> |
resolved conflicts for merge of ca2b552d to master Change-Id: I2f3693a59042ac5aa2d7bcdc3a504c78dc99a18b
|
ca2b552d981239043a575dfc9db86966492d0f9e |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am c8812761: am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'c8812761609e532cceb400b112ed9982149c2490': Add a preference panel for mouse speed.
|
c8812761609e532cceb400b112ed9982149c2490 |
|
03-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
am e1718de6: Merge "Add a preference panel for mouse speed." into honeycomb-mr2 * commit 'e1718de61c20c8d401633f83589f18d2c0c652db': Add a preference panel for mouse speed.
|
1a84fd1fb7a51f3fe4f8865e1cdd09f3490f696c |
|
02-Jun-2011 |
Jeff Brown <jeffbrown@android.com> |
Add a preference panel for mouse speed. Bug: 4124987 Change-Id: I3ce175d268a1d043cf5878481261b1049a15a149
/frameworks/base/core/res/AndroidManifest.xml
|
ab79ee4adcbc6eb9fb9c509766753f65d3857739 |
|
27-Apr-2011 |
Jake Hamby <jhamby@google.com> |
Enable full support for SMS Cell Broadcast. Implement full support for SMS Cell Broadcast (3GPP TS 23.041). Includes support for ETWS and CMAS emergency message types. Includes GSM and UMTS support (CDMA will be added later). Note: the change to GsmAlphabet.java is only necessary if the SMS national languages support patch has been applied. If that change has not been applied, then the changes to GsmAlphabet.java in this patch set can safely be ignored. Change-Id: Ia0362c53695b8ef9a0982f558f1cffa912def34b
/frameworks/base/core/res/AndroidManifest.xml
|
9f67adfc2d33ef63960d2e528ccbcbdea621f969 |
|
14-May-2011 |
Chia-chi Yeh <chiachi@android.com> |
Add a new permission for user space VPN applications. Change-Id: I2b87ef34db01209dac45fbceccafd865840830d5
/frameworks/base/core/res/AndroidManifest.xml
|
4a627c71ff53a4fca1f961f4b1dcc0461df18a06 |
|
01-Apr-2011 |
Christopher Tate <ctate@google.com> |
Full local backup infrastructure This is the basic infrastructure for pulling a full(*) backup of the device's data over an adb(**) connection to the local device. The basic process consists of these interacting pieces: 1. The framework's BackupManagerService, which coordinates the collection of app data and routing to the destination. 2. A new framework-provided BackupAgent implementation called FullBackupAgent, which is instantiated in the target applications' processes in turn, and knows how to emit a datastream that contains all of the app's saved data files. 3. A new shell-level program called "bu" that is used to bridge from adb to the framework's Backup Manager. 4. adb itself, which now knows how to use 'bu' to kick off a backup operation and pull the resulting data stream to the desktop host. 5. A system-provided application that verifies with the user that an attempted backup/restore operation is in fact expected and to be allowed. The full agent implementation is not used during normal operation of the delta-based app-customized remote backup process. Instead it's used during user-confirmed *full* backup of applications and all their data to a local destination, e.g. via the adb connection. The output format is 'tar'. This makes it very easy for the end user to examine the resulting dataset, e.g. for purpose of extracting files for debug purposes; as well as making it easy to contemplate adding things like a direct gzip stage to the data pipeline during backup/restore. It also makes it convenient to construct and maintain synthetic backup datasets for testing purposes. Within the tar format, certain artificial conventions are used. All files are stored within top-level directories according to their semantic origin: apps/pkgname/a/ : Application .apk file itself apps/pkgname/obb/: The application's associated .obb containers apps/pkgname/f/ : The subtree rooted at the getFilesDir() location apps/pkgname/db/ : The subtree rooted at the getDatabasePath() parent apps/pkgname/sp/ : The subtree rooted at the getSharedPrefsFile() parent apps/pkgname/r/ : Files stored relative to the root of the app's file tree apps/pkgname/c/ : Reserved for the app's getCacheDir() tree; not stored. For each package, the first entry in the tar stream is a file called "_manifest", nominally rooted at apps/pkgname. This file contains some metadata about the package whose data is stored in the archive. The contents of shared storage can optionally be included in the tar stream. It is placed in the synthetic location: shared/... uid/gid are ignored; app uids are assigned at install time, and the app's data is handled from within its own execution environment, so will automatically have the app's correct uid. Forward-locked .apk files are never backed up. System-partition .apk files are not backed up unless they have been overridden by a post-factory upgrade, in which case the current .apk *is* backed up -- i.e. the .apk that matches the on-disk data. The manifest preceding each application's portion of the tar stream provides version numbers and signature blocks for version checking, as well as an indication of whether the restore logic should expect to install the .apk before extracting the data. System packages can designate their own full backup agents. This is to manage things like the settings provider which (a) cannot be shut down on the fly in order to do a clean snapshot of their file trees, and (b) manage data that is not only irrelevant but actively hostile to non-identical devices -- CDMA telephony settings would seriously mess up a GSM device if emplaced there blind, for example. When a full backup or restore is initiated from adb, the system will present a confirmation UI that the user must explicitly respond to within a short [~ 30 seconds] timeout. This is to avoid the possibility of malicious desktop-side software secretly grabbing a copy of all the user's data for nefarious purposes. (*) The backup is not strictly a full mirror. In particular, the settings database is not cloned; it is handled the same way that it is in cloud backup/restore. This is because some settings are actively destructive if cloned onto a different (or especially a different-model) device: telephony settings and AndroidID are good examples of this. (**) On the framework side it doesn't care that it's adb; it just sends the tar stream to a file descriptor. This can easily be retargeted around whatever transport we might decide to use in the future. KNOWN ISSUES: * the security UI is desperately ugly; no proper designs have yet been done for it * restore is not yet implemented * shared storage backup is not yet implemented * symlinks aren't yet handled, though some infrastructure for dealing with them has been put in place. Change-Id: Ia8347611e23b398af36ea22c36dff0a276b1ce91
/frameworks/base/core/res/AndroidManifest.xml
|
4397c3240240080cf17a1cd4dcaff87ab7cacb3a |
|
04-May-2011 |
Mike Lockwood <lockwood@android.com> |
am c535f7f2: DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" * commit 'c535f7f291f0bda688efcee62f21cf44d0ebe38e': DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE"
|
c535f7f291f0bda688efcee62f21cf44d0ebe38e |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: Iaf9cf120217e8417d328a51db0d82be6835b0ff0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f60ba87f075eb7bd278bc14af77ba41c70b2f8b0 |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I0b139a0f3b369c1080831a5b3a48f5d9a330b1bb Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ec9b5d17af1199e418b7352313575f0f7288b550 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am ee081bf5: am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit 'ee081bf5ee936396a89d5bd2b29487047b260f49': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
ee081bf5ee936396a89d5bd2b29487047b260f49 |
|
04-May-2011 |
Wink Saville <wink@google.com> |
am 3ed0a1ec: Merge "IMS: Provide net_admin permission so that IPSec could be configured/used." into honeycomb-LTE * commit '3ed0a1ec7aa6364c236721a1bd29fd196f259cba': IMS: Provide net_admin permission so that IPSec could be configured/used.
|
0e7b5a0287ef4a3dde2b29b4a2421679f88965e0 |
|
28-Mar-2011 |
Ramesh Sudini <ramesh.sudini@motorola.com> |
IMS: Provide net_admin permission so that IPSec could be configured/used. IMS configures the security database in kernel with keys generated from ISIM. Change-Id: Iae9fb85f286ff2a627369d784a127bf7d4d8f4b3
/frameworks/base/core/res/AndroidManifest.xml
|
1e23db4c2f5a6eba37a786e4390d52fe2012bfae |
|
22-Apr-2011 |
Mike Lockwood <lockwood@android.com> |
Revert "Remove permission android.permission.WRITE_MEDIA_STORAGE" We need this to allow MTP to access secondary external storage devices This reverts commit 35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4. Conflicts: data/etc/platform.xml Change-Id: I9faf54526182a786a1c0ca1fd01a09baabca186d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0c5001d776d56bae02a5cc2663286a125d99bc5e |
|
13-Apr-2011 |
Dianne Hackborn <hackbod@google.com> |
Add APIs to remove tasks. You can remove sub-tasks inside of a task, or an entire task. When removing an entire task, you can have its process killed as well. When the process is killed, any running services will get an onTaskRemoved() callback for them to do cleanup before their process is killed (and the service possibly restarted). Or they can set a new android:stopWithTask attribute to just have the service automatically (cleanly) stopped at this point. Change-Id: I1891bc2da006fa53b99c52f9040f1145650e6808
/frameworks/base/core/res/AndroidManifest.xml
|
5ee250aa744720c90b264966f9721cfb9d256e96 |
|
05-Apr-2011 |
Jason parks <jparks@google.com> |
am 1d733625: am cca2f2f9: Merge "Send out a broadcast that the system is being factory reset." into gingerbread * commit '1d73362597c49f4692a580460bc8697a8f1d0efa': Send out a broadcast that the system is being factory reset.
|
016f8847471a9d4ffe6a03c29e0600529d51d929 |
|
31-Mar-2011 |
Jeff Hamilton <jham@android.com> |
am b9896794: am 96cf34d3: Merge "Make STOP_APP_SWITCHES signatureOrSystem." into gingerbread * commit 'b98967942e9a764b80abc8ff1c6f6f2d620c0f7a': Make STOP_APP_SWITCHES signatureOrSystem.
|
cca2f2f987ab772a4bae3176df7259f59d6502ce |
|
30-Mar-2011 |
Jason parks <jparks@google.com> |
Merge "Send out a broadcast that the system is being factory reset." into gingerbread
|
10de0b31df14a2f3337bbfc824419f8e4a246f52 |
|
25-Mar-2011 |
Jeff Hamilton <jham@android.com> |
Make STOP_APP_SWITCHES signatureOrSystem. The NFC service relies on this permission for it's dispatching mechanism and it is no longer signed with the platform cert. Bug: 4173610 Change-Id: I598ad2889c4af307f04433093923255fe7daedbb
/frameworks/base/core/res/AndroidManifest.xml
|
4ca74dc4c2e0c68803e777cf47ed8e01b8e8444e |
|
14-Mar-2011 |
Jason parks <jparks@google.com> |
Send out a broadcast that the system is being factory reset. Change-Id: I339b7ce58cb3f48316103be49b582d4f7e9b63bf
/frameworks/base/core/res/AndroidManifest.xml
|
a64e2ad4da3612586594a19489a2b5d44f3f23a0 |
|
14-Mar-2011 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of 38d0d562 to honeycomb-plus-aosp Change-Id: Iff9ea08b810b0d142a9227272492c0305a9bcf42
|
367f41f8f61126c2ab34a34cc676756a9fc23ac2 |
|
08-Mar-2011 |
Nick Pelly <npelly@google.com> |
Implement new NFC-EE API's as shared library (frameworks/base). Change-Id: I45c4eaf59ec78167fc236fdd59676465a5e1bcb7
/frameworks/base/core/res/AndroidManifest.xml
|
4bdab1751f0db3b2f03e8c58ef5c11a543dfa3c7 |
|
23-Feb-2011 |
TK MUN <tk.mun@samsung.com> |
DO NOT MERGE WiMAX support - In Connectivity service, start WiMAX service - 4G icon display in StatusBarPolicy - Add DHCP renew - Add radio for WiMAX Change-Id: Iffff012b270d80e84ec8fbd4486921a8adb847dd Signed-off-by: TK MUN <tk.mun@samsung.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a68b8338b431eb15d28e92f06452efbbda9493e |
|
08-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
USB: Add API and dialog for apps to request permissions for USB devices and accessories New APIs: UsbManager.hasPermission returns true if the caller has permission for the given device or accessory UsbManager.requestPermission poses a dialog to allow the user to give the caller permission for the device or accessory. Result is returned via a PendingIntent. No dialog is displayed if the caller already has permission. Also moved UsbResolverActivity to SystemUI package BUG: 4069037 Change-Id: I93be769501a8776b49ac26e468af19f8fa2114c9
/frameworks/base/core/res/AndroidManifest.xml
|
40bbf9295d5245d3917629ce15f7b37670aef1ac |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE: Backport USB accessory support to gingerbread Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
c4308f01c965571dc2354107c3574df113e397ee |
|
01-Mar-2011 |
Mike Lockwood <lockwood@android.com> |
Move USB framework support from android.hardware to android.hardware.usb package Change-Id: I00fd4f0caaa4aebe48f71c576bb211b5f38bf88d Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
02eb8746de2d60563ec2751a34d20923192e4293 |
|
27-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: Enhancements for managing USB devices and accessories When a USB device or accessory is connected, the UsbService now asks the user which application to associate with the device or accessory. Applications interested in devices or accessories must specify the devices they work with via meta-data attached to their manifest. Permission to communicate with the device is assigned when the user chooses the activity to use for the device. The user has the option of clicking the "always use this application" checkbox to make the assignment automatic in the future. The user may later clear this preference and revoke permission for an application to have permission to communicate with the device by clicking the "Clear defaults" button for the activity in the Manage Applications panel in Settings. Added class UsbResolveActivity (a subclass or ResolveActivity for choosing an activity for a USB device or accessory) Added UsbDeviceManager, which manages the mapping between USB devices/accessories and applications, including default applications for devices and accessories, and manages application permissions. Add interface to allow Settings to clear device and accessory preferences and permissions for an application. Remove obsolete ACCESS_USB permission. Add new signatureOrSystem MANAGE_USB permission to allow administrating preferences and permissions. Moved UsbService.java to a "usb" subdirectory, along with new classes UsbResolveActivity and UsbDeviceManager. Change-Id: I92554381e9779e68ce380daaee4e1401fb875703 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7f972122db87dc54e41ed1a6e417534d43bca3a |
|
24-Feb-2011 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3426299: Introduce application "stopped" state The package manager now keeps track of whether an application is stopped. There are new intent flags to control whether intent filters in a stopped application will match the intent. This is currently used in one place, sending broadcasts, so that stopped apps can not be launched due to background processes. The package manager during first init makes sure no applications are in the stopped state. When new applications are installed, that begin in the stopped state. When the activity manager is launching a component of an application, it ensures the application is taken out of the stopped state. The "force stop" button in manage applications will now put an application back in to the stopped state; it can't go back out of the stopped state until one of its components is launched by the activity manager. There will probably be a few more places where we need to filter stopped applications out of intent matches, but doing this for broadcast is a very big first step. This also introduces a new broadcast that is sent to an application after it is replaced with a new .apk. But only if the app is not in the stopped state. This makes it a lot easier for developers to implement code to get their application back in proper running shape after an upgrade. Finally another new broadcast is added that is sent to a package's installer at the first time it is launched. This allows the installer to tell the package about it being installed only when it is first actually used. Change-Id: I589c53ff0e0ece868fe734ace4439c0d202dca2d
/frameworks/base/core/res/AndroidManifest.xml
|
8d224caf989b212f8e633cc1a8b0db453300a742 |
|
18-Feb-2011 |
Peter Visontay <pvisontay@google.com> |
ActivityManager exposes launch count API. Bug: 3431684 Change-Id: I49d4fb0b1620aafaf251d77700bc017859328968
/frameworks/base/core/res/AndroidManifest.xml
|
984dd8a206e782027c2b0c866aa845e6d236f218 |
|
16-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
Merge "UsbManager: New APIs for USB accessories"
|
ef12256ca500bb0c16af51e5a923b70e9adabd34 |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am d8d51fed: am 8c8e9d9a: am 1df862a4: Minor doc update. * commit 'd8d51fed861cd36f57f1eb2542def23322379d7c': Minor doc update.
|
d8d51fed861cd36f57f1eb2542def23322379d7c |
|
16-Feb-2011 |
Nick Pelly <npelly@google.com> |
am 8c8e9d9a: am 1df862a4: Minor doc update. * commit '8c8e9d9a7f1bddbc995a5c088f19a0a3be1f6a5b': Minor doc update.
|
1df862a4656bb0d7a3329311b1e243fc6db32448 |
|
15-Feb-2011 |
Nick Pelly <npelly@google.com> |
Minor doc update. Change-Id: I1d29adfccbdc196a145a2c2a044d63b00e5f788b
/frameworks/base/core/res/AndroidManifest.xml
|
9182d3c4eb1f9065cb33df5a3594969dd0d42acc |
|
15-Feb-2011 |
Mike Lockwood <lockwood@android.com> |
UsbManager: New APIs for USB accessories USB accessories are peripherals that connect to android devices as a USB host. When connected, the accessory will first identify itself to the android device by sending manufacturer, product, accessory type and version strings to the device, and then request the device to enter USB accessory mode. The device will then enable the USB accessory kernel driver and disable all other USB functionality except possibly adb (adb can be used while the android device is connected to the PC and the PC is running software that emulates a USB accessory) The class android.hardware.UsbAccessory is used to describe the currently attached USB accessory. UsbAccessory contains the manufacturer, product, accessory type and version strings to identify the accessory. The accessory can be opened as a ParcelFileDescriptor, which can be used to communicate with the accessory over two bulk endpoints. The Intents UsbManager.USB_ACCESSORY_ATTACHED and UsbManager.USB_ACCESSORY_DETACHED are broadcast when accessories are connected and disconnected to the device. The USB_ACCESSORY_ATTACHED contains a UsbAccessory object for the attached accessory as an extra. The Intent also contains string extras for the manufacturer, product, accessory type and version strings to allow filtering on these strings. Change-Id: Ie77cbf51814a4aa44a6b1e62673bfe4c6aa81755 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3a40182c77b9cfb608d1f9a17c3ed7d9a6a56efa |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am 49295e53: am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit '49295e5379472c22af8975e32271f9659c016531': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
49295e5379472c22af8975e32271f9659c016531 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
am ccd79399: am 1d07b5bc: Merge "Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm." into gingerbread * commit 'ccd79399cc2a28d79287fd1558c5f5a530356003': Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm.
|
f5e4f208b9ed73ff9c8d74d9c2e75a95ec1014b4 |
|
26-Jan-2011 |
Dianne Hackborn <hackbod@google.com> |
Make CHANGE_COMPONENT_ENABLED_STATE a signatureOrSystem perm. Change-Id: I53a6671d5478e7dbca44b17d90f1edfa8e3420bc
/frameworks/base/core/res/AndroidManifest.xml
|
7df04fb2a02515edb1398b891d857b27f348fd83 |
|
25-Jan-2011 |
Adam Powell <adamp@google.com> |
am 41cd1ce1: am f72a13ec: Merge "Fix bug 3378333 - Holo-style layout for granting permissions" into honeycomb * commit '41cd1ce1b97e48190b47447555560702d0843aba': Fix bug 3378333 - Holo-style layout for granting permissions
|
c91466f56a777ab44a9a025e9d51f576e21dcce9 |
|
22-Jan-2011 |
Adam Powell <adamp@google.com> |
Fix bug 3378333 - Holo-style layout for granting permissions Change-Id: Ie1bb925db3ddd8343c9756e220a0d821f4d31c6d
/frameworks/base/core/res/AndroidManifest.xml
|
97d7e4c227ca26c125c1b587c5ed04ab82d0f4e1 |
|
07-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Make ACCESS_USB permission for applications to access USB devices: - change from signatureOrSystem to normal - no longer associate this permission with the "usb" unix group - add to public API Change-Id: I3be3a5d138719dd126ff0a798824a77f9ce79e24 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
e7d511e148bc901ef41ac44d7b3593e5d803f72f |
|
30-Dec-2010 |
Mike Lockwood <lockwood@android.com> |
New APIs for USB host support: UsbManager: - is now a service retrievable via Context.getSystemService(Context.USB_SERVICE). - provides support for returning a list all connected USB devices - broadcasts ACTION_USB_DEVICE_ATTACHED and USB_DEVICE_DETACHED when devices are added and removed from the USB host bus UsbDevice: - represents an attached USB device. UsbInterface: - represents an interface on a USB device - devices may have multiple interfaces if they provide multiple sets of functionality (for example, android phones typically have interfaces for both USB mass storage and adb) UsbEndpoint: - represents an endpoint on a USB interface - endpoints are used for sending or receiving data (only in one or the other direction) UsbRequest: - encapsulates a send or receive request to be sent over an endpoint Change-Id: Ieef3e434c62760770ea839070cf5eba1a705967a Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
795f135a08b6db7372935fa15874723307748fec |
|
21-Jan-2011 |
Fabrice Di Meglio <fdimeglio@google.com> |
Fix bug #3338957 (Account Picker and Account type picker need love) - update UI to match design requirements Change-Id: Idb5dbea876eb7170a8c1f077a99cfe168d41f1e1
/frameworks/base/core/res/AndroidManifest.xml
|
8888c597c4bc3002e48738b6aea6fd43f69c0f78 |
|
21-Jan-2011 |
Jason parks <jparks@google.com> |
Add and enforce the permission for encrypting/decrypting. Change-Id: Ia292d8a5981266c2703743beb79fd786d77b375d
/frameworks/base/core/res/AndroidManifest.xml
|
81f39eb6e76d0be1dd341af835e8002a0f80524e |
|
12-Jan-2011 |
Winson Chung <winsonc@google.com> |
Refactoring app widgets to address security/performance issues. - Moving the service binding to AppWidgetService to prevent arbitrary apps from binding to widget services - Requiring RemoteViewsServices to require android.permission.BIND_REMOTEVIEWS permission Change-Id: Id135bafba998299eb278067712b8a5d8487cfd04
/frameworks/base/core/res/AndroidManifest.xml
|
35a2ea2fbf156a503d1b0bc6ca7784e51e2462f4 |
|
12-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Remove permission android.permission.WRITE_MEDIA_STORAGE Access to the /data/media directory is now restricted exclusively to the sdcard daemon, so there is no longer a need for this permission. Change-Id: Iea8400f0eee167df19cc231c502d251a364f98b3 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
f9a04233c1db22a6ddd989b55db725badeae7539 |
|
11-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
@hide android.permission.WRITE_MEDIA_STORAGE This permission is not needed for non-system or unbundled apps, so we don't need it in the public API Change-Id: I1a2a0349c6c5b7b5dc3104d69f4e39e95b878db9 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
10bc1114f37d9edb3f153ec209745dd476530325 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Add separate permission and group for access to the MTP USB driver Since the "usb" group and ACCESS_USB permission will be used by regular apps to access USB devices in host mode, we need a separate permission for the device side MTP driver. Change-Id: Id03f7c4f3d2712c489b4b74cf17a72a182084501 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3f182381e1279874148f619c6ad2f76840ab3990 |
|
10-Jan-2011 |
Mike Lockwood <lockwood@android.com> |
Framework manifest: Remove USB_CAMERA_ATTACHED and USB_CAMERA_DETACHED broadcasts These broadcasts no longer exist, so remove their <protected-broadcast> elements from the manifest. Signed-off-by: Mike Lockwood <lockwood@android.com> Change-Id: I4a724509d3058f16283870f02e5e1b51dfb21a43
/frameworks/base/core/res/AndroidManifest.xml
|
b19e62add0a747127952862bb7bea0b73379edcc |
|
16-Dec-2010 |
Fred Quintana <fredq@google.com> |
fix the TooManyDeletes to show up again It was moved so it was no longer in the location that SyncManager expected. I fixed it by (a) moving it to the SyncManager directory and by (b) changing the SyncManager to refer to it by class rather than by class name, which means it will now check for it at compile time, not run time. Bug: 3289922 Change-Id: I24f8bac371a16c62c2a38ed1024702c6d0913b93
/frameworks/base/core/res/AndroidManifest.xml
|
7458091ffc7c5b3ff9220351bb9e55da5d87f545 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
am ea294903: am eba947a3: Merge "Remove ACTION_TAG_DISCOVERED from protected broadcast list." into gingerbread * commit 'ea294903ca4c298c44b50b473b9b10ae2b77c9e3': Remove ACTION_TAG_DISCOVERED from protected broadcast list.
|
35042f1f58663fd00a08e4a8dd51c59bfeddda78 |
|
07-Dec-2010 |
Nick Pelly <npelly@google.com> |
Remove ACTION_TAG_DISCOVERED from protected broadcast list. ACTION_TAG_DISCOVERED is a start activity intent, not a broadcast intent, so its presence in this list is redundant. Change-Id: I05419ec9c4471b7b11c9ae50a02e5ac3d9e572d2
/frameworks/base/core/res/AndroidManifest.xml
|
addfc766d535aa2cde76caa9b3049e311f656b5f |
|
02-Dec-2010 |
Freeman Ng <tenorslowworm@google.com> |
change SHUTDOWN permission to signatureOrSystem so setup wizard can start ACTION_REQUEST_SHUTDOWN bug: 3201638 Change-Id: I0d422667fa27df5df2fadbf27d4e3677a70db8f1
/frameworks/base/core/res/AndroidManifest.xml
|
fa04b8de117a017818761623a961426b03af2914 |
|
30-Nov-2010 |
Costin Manolache <costin@google.com> |
Revert "Merge "Fix permission."" It breaks apps that rely on the wrong permission. This reverts commit 974ab30569f9543c897047972260887cb33f8827, reversing changes made to 8b780ec773b2d1765f3ce932ee8f86c9048fdb85.
/frameworks/base/core/res/AndroidManifest.xml
|
e4e6efa46b8d324ddcf506649e349406aafd8052 |
|
23-Nov-2010 |
Costin Manolache <costin@google.com> |
Fix permission. Change-Id: Ifb545e8fb1a312f0fecb9aed35027c0cb98fab65
/frameworks/base/core/res/AndroidManifest.xml
|
434203a277cd2f237a71508a3d5a7d1602126cd5 |
|
12-Oct-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Notify all VMs when proxy changes. bug:2700664 Change-Id: I74cc6e0bd6e66847bf18f524ce851e3e9d2c4e87
/frameworks/base/core/res/AndroidManifest.xml
|
a4eb4c3a207c4d1b0e72bad332c3e6b928a77738 |
|
08-Nov-2010 |
Joe Onorato <joeo@google.com> |
Make all the activities in the framework use the holo theme. Change-Id: I18b669923fcd52e3bbb82b63e491d46cdb4bf4be
/frameworks/base/core/res/AndroidManifest.xml
|
03595d01188d88c169e8c9dd51b357fd545e69cc |
|
02-Nov-2010 |
Robert Greenwalt <rgreenwalt@google.com> |
Tell each VM to flush their DNS cache. bug:3095357 Change-Id: I93de24e3e5a7d8b94d55f4facfffc863a2b8c202
/frameworks/base/core/res/AndroidManifest.xml
|
482c9332972b928938e681d4553356896eb9b61c |
|
02-Nov-2010 |
Amith Yamasani <yamasani@google.com> |
Use Holo theme for Ringtone picker. Bug: 3148863
/frameworks/base/core/res/AndroidManifest.xml
|
3f425a6be47b706349f17679ed2b6877179df1cc |
|
29-Oct-2010 |
Mike Lockwood <lockwood@android.com> |
Add new WRITE_MEDIA_STORAGE permission to control write access to /data/media BUG: 3113970 Change-Id: Idb56be76729dc560dee5f680225cf4050f2751d2 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
4611bb1814afc7dcc3177cbb248bfb5ee1662ba0 |
|
29-Oct-2010 |
Nick Pelly <npelly@google.com> |
am ba1664b3: am 4bf4b491: Merge "Hide some NFC API\'s." into gingerbread * commit 'ba1664b34cc33ebb6b45fccedb35298ff8b1d998': Hide some NFC API's.
|
11b075e218b9921a953eeebe73fcd1a8a81f764b |
|
28-Oct-2010 |
Nick Pelly <npelly@google.com> |
Hide some NFC API's. We are leaving enough API so that you can see when any Tag is discovered, get its ID, and get its NDEF messages. But for advanced use - creating tag connections and writing messages - we have 2 problems. Firstly a lot of the code is untested (RawTagConnection.transceive()), or in some cases known not to work (NdefTagConnection.write()). Secondly, there is still debate about how to best expose information about Tags. The set of data/methods exposed for a Tag changes completely depending on the tag technology. There may be multiple sets of technology implemented in a single tag. Tag A may have technology X and Y, Tag B may have technology Y and Z. Furthermore, some NFC controllers will be not be able to use all technologies, and so Android Device 1 may see technology X and Y on Tag A but Android device 2 may only see technology X. So we have a pretty challenging set of constraints to work under, and we are not convinced the current Tag and NdefTag class is the best approach going forwards. The Tag application should be able to remain unbundled, since it just needs to get incoming NDEF Messages. Change-Id: Ic09f094f33794e10f8d730fffe011c9a5957e0ac Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
86417ea3f8041481a085823a1aa9f66d747231e8 |
|
27-Oct-2010 |
satok <satok@google.com> |
Remove InputMethodAndSubtypeEnabler and call intent of Settings.ACTION_INPUT_METHOD_AND_SUBTYPE_ENABLER Change-Id: I467cfba9644ec266f6a98f7aec0886ad205fef4f
/frameworks/base/core/res/AndroidManifest.xml
|
54770496d393385408cfba3198f87e139712ed94 |
|
19-Oct-2010 |
Nick Pelly <npelly@google.com> |
am 6b09a90a: am e47150e9: Fix up NFC permissions. Merge commit '6b09a90a818137de52a0c7325339849ccf584b9e' * commit '6b09a90a818137de52a0c7325339849ccf584b9e': Fix up NFC permissions.
|
027610a76e67f39e3a435d68ec785a1cf09dcf9c |
|
18-Oct-2010 |
Kenny Root <kroot@google.com> |
resolved conflicts for merge of 964eb438 to master Change-Id: I0c54d6b88356d8734d7f51234b0114434414502e
|
e47150e933e6f610546f57183477f324566e521e |
|
18-Oct-2010 |
Nick Pelly <npelly@google.com> |
Fix up NFC permissions. The initial (vendor) implementation had 4 perms, replace with 1. Requires no permissions: - Viewing UID, type of discovered tags and cards. - Viewing the NDEF message contents of NDEF formatted tags and cards. Requires android.permission.NFC - Get/Set the local tag "MyTag" - Creating or using a RawTagConnection (transceive()) - Creating or using a NdefTagConnection (write()/read()) Change-Id: I1b585c7d91738bed6261277061a48cf7c939482a Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
424991704b5fb7a64f6cf0fcc3f4b1aabbf2a2e0 |
|
16-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Implement issue #3094621 and #3094609 - wipe sd card 3094621: add "wipe sd card" option to factory data reset 3094609: collapse unmount/format into one command Also since we have decided that it is important to consider the Crespo storage as internal storage, DevicePolicyManager gets a new API to be able to wipe it. (No big deal, since all of the work for this is now done in the implementation of the new UI.) Change-Id: I32a77c410f710a87dcdcbf6586c09bd2e48a8807
/frameworks/base/core/res/AndroidManifest.xml
|
f36c6db108364dea89b1e3c27c0b15103e560d87 |
|
15-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com> Conflicts: Android.mk CleanSpec.mk core/java/android/app/ContextImpl.java
/frameworks/base/core/res/AndroidManifest.xml
|
bc931eaf154b8f196fd15983b1d0603e12dae890 |
|
14-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
am a007ab29: am ffbc4b94: Merge "Fix SD card mounting issues #3074555 and #3072332" into gingerbread Merge commit 'a007ab294d83db987b05b49ab869566978a87494' * commit 'a007ab294d83db987b05b49ab869566978a87494': Fix SD card mounting issues #3074555 and #3072332
|
590b73bc5b8e5f7b59bff1d9264a52388a5162e6 |
|
12-Oct-2010 |
Nick Pelly <npelly@google.com> |
NFC API revision round 2. - Add the second half of the new NFC API: NfcAdapter, Tag, NdefTag, RawTagConnection, NdefTagConnection. - Add implementations for all of the new NFC API. Change-Id: I8da9fd1d2971ed2c8b76f2a93f207fa9e305b0f6 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d39d515b9110d7405d0f03dbf612ba5c9b8ac566 |
|
12-Oct-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix SD card mounting issues #3074555 and #3072332 Change-Id: I79572bb4e92d2546abd97512a119ae74f0d72019 3074555: Kill "Shared storage safe to remove" notification 3072332: "blank shared storage" notification doesn't go anywhere
/frameworks/base/core/res/AndroidManifest.xml
|
3d59480dc201c893c6da5c3934b14a2d95a1bef9 |
|
10-Oct-2010 |
Hung-ying Tyan <tyanh@google.com> |
am ea445758: am 08faac3c: Unhide SIP API. Merge commit 'ea445758efba6b728d5e597402e9d9538f3ef451' * commit 'ea445758efba6b728d5e597402e9d9538f3ef451': Unhide SIP API.
|
08faac3c26e12863858e1534985dd950193f755f |
|
15-Sep-2010 |
Hung-ying Tyan <tyanh@google.com> |
Unhide SIP API. Change-Id: I09468e3149a242a3b1e085ad220eb74f84ac6c68
/frameworks/base/core/res/AndroidManifest.xml
|
47a44916e2fb33cf4751906386d5f5c903b28d8b |
|
06-Oct-2010 |
satok <satok@google.com> |
Add InputMethodEnabler for enabling input methods and subtypes - Copyed functionarity from LanguageSettings.java TODO: Save enabled InputMethodSubtypes Change-Id: I7b4fb1a79cb8b3229f88773d261430e23ba7aae2
/frameworks/base/core/res/AndroidManifest.xml
|
4715bd91f5949a1919156a5a5cb50f0cccda645e |
|
29-Sep-2010 |
Nick Pelly <npelly@google.com> |
resolved conflicts for merge of f4c3b7e9 to master Change-Id: Idcdc521144f3072058b2bb6cb383e42c852e64f4
|
038cabe0247ee46df62f9363f1a303bc5b9c1028 |
|
24-Sep-2010 |
Nick Pelly <npelly@google.com> |
NFC integration Source: Trusted_NFC_Device_Host_AA03.01e02_google.zip code drop (23-Sep-2010) Conflicts: core/java/android/app/ApplicationContext.java core/java/android/provider/Settings.java core/jni/Android.mk core/jni/AndroidRuntime.cpp core/res/AndroidManifest.xml include/utils/Asset.h Change-Id: I62c92f4c79f5ee65126c97602f6bc1c15794e573 Signed-off-by: Nick Pelly <npelly@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
a0b49cfc0c68bafb0bd7826f3b4096f30148824a |
|
25-Sep-2010 |
Patrick Scott <phanna@android.com> |
am 888bcdbe: am 3ae249dc: Merge "Add new Alarm provider class for setting an alarm." into gingerbread Merge commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0' * commit '888bcdbeca34819c07d7dc06dc03d91207aea0c0': Add new Alarm provider class for setting an alarm.
|
a73c4b082c2ab38831fc57c6bfb425d32ffe2aa4 |
|
22-Sep-2010 |
Patrick Scott <phanna@android.com> |
Add new Alarm provider class for setting an alarm. The new class provides static variables for creating an intent to broadcast to applications implementing the alarm clock. A new permission has been added and applications are recommended to require this permission if accepting the set alarm broadcast. Change-Id: I7b1014acdc54371cbda19bcf9b5c395b647aa413
/frameworks/base/core/res/AndroidManifest.xml
|
4e0bfd70d090b5653dd00c5a671db0519086dcfe |
|
16-Sep-2010 |
Chris Palmer <palmer@google.com> |
am 1b60963c: am b8dbdc29: Clarify the danger of READ_LOGS and DUMP permissions. Merge commit '1b60963c42e159aacc52d688defcac206e5ecec0' * commit '1b60963c42e159aacc52d688defcac206e5ecec0': Clarify the danger of READ_LOGS and DUMP permissions.
|
b6f8989385bd69e3b6fc56f5a095917f8624ed7e |
|
16-Sep-2010 |
David Brown <dab@google.com> |
am 0237cf2e: am 8626d1a3: Merge "Mark MODIFY_PHONE_STATE permission as signatureOrSystem" into gingerbread Merge commit '0237cf2eace5d35410e95f586fd40c3068c94582' * commit '0237cf2eace5d35410e95f586fd40c3068c94582': Mark MODIFY_PHONE_STATE permission as signatureOrSystem
|
b8dbdc293a8495a873a9c36353d6a9408c698256 |
|
15-Sep-2010 |
Chris Palmer <palmer@google.com> |
Clarify the danger of READ_LOGS and DUMP permissions. The logs inevitably contain PII, so now we are making that clear in user strings and developer docs. Moving DUMP and READ_LOGS into the PERSONAL_INFO group. Note that this means we need string translations. Change-Id: I1b5bf9d2d827ab1a31dedbdb30d0906a87c26a32
/frameworks/base/core/res/AndroidManifest.xml
|
f4ece2086f3b7060edc4b93a12f04c9af648867a |
|
15-Sep-2010 |
David Brown <dab@google.com> |
Mark MODIFY_PHONE_STATE permission as signatureOrSystem This permission isn't needed right now, since there aren't actually any public APIs that require it. (There are a few calls in the ITelephony interface that do, but they're all hidden.) Since there's no good reason for 3rd party apps to declare it, let's mark it signatureOrSystem for now. We can bring it back -- and probably split it apart into multiple finer-grained permissions -- once we finally expose full telephony APIs to 3rd party apps (see bug 1043005). Bug: 2989096 Change-Id: Idf898d5e12d648a959f622cd815e75597195aa82
/frameworks/base/core/res/AndroidManifest.xml
|
e746f03c6c8b8d0897d322ab524d545ace200fcd |
|
14-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 53686433 to master Change-Id: I27004dc464f5771d3205ae5757c6eccc5b16854d
|
7e9f4eb2608148436cef36c9969bf8a599b39e72 |
|
11-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Track client requests through location manager. This fixes a problem where applications could ask the location manager to do very heavy-weight things (like... say... update location every minute), which would get accounted against the system instead of the application because ultimately it is the system making the heavy calls (wake locks, etc). To solve this, we introduce a new class WorkSource representing the source of some work. Wake locks and Wifi locks allow you to set the source to use (but only if you are system code and thus can get the permission to do so), which is what will be reported to the battery stats until the actual caller. For the initial implementation, the location manager keeps track of all clients requesting periodic updates, and tells its providers about them as a WorkSource param when setting their min update time. The network location provider uses this to set the source on the wake and wifi locks it acquires, when doing work because of the update period. This should also be used elsewhere, such as in the GPS provider, but this is a good start. Change-Id: I2b6ffafad9e90ecf15d7c502e2db675fd52ae3cf
/frameworks/base/core/res/AndroidManifest.xml
|
94bf9431e5464c7757890abfe0716997151f153f |
|
08-Sep-2010 |
Jake Hamby <jhamby@google.com> |
am e7578344: am 5872e9d7: Merge "Allow incoming SMS until internal storage is almost full." into gingerbread Merge commit 'e75783440a55fb0a5ef75066be94a11898f652f0' * commit 'e75783440a55fb0a5ef75066be94a11898f652f0': Allow incoming SMS until internal storage is almost full.
|
bb3716332321e22537a5015be13e2229fb9b90bc |
|
24-Aug-2010 |
Jake Hamby <jhamby@google.com> |
Allow incoming SMS until internal storage is almost full. Fix for bug 2382830: new incoming SMS should not be rejected when running low on internal phone storage. Testing revealed that the /data partition should have at least 256 KiB available in order to prevent random app crashes (including system apps) due to SQLite transaction failures. With 256 KiB free, the device should safely boot without storage full errors. This takes into account the 36-40 KiB that the YAFFS2 filesystem reports as available even after the partition has been completely filled. I've set the default full threshold to 1 MiB to provide a generous safety margin. For this bug, I changed the DeviceStorageMonitorService demon to send two new hidden notifications for device storage "full" and "not full", when the free space falls below the full threshold (default 1 MiB, but configurable as a system setting), in addition to the existing storage low/okay notifications sent when the storage crosses the threshold of 90% full (also configurable). The SMS code was changed to use these new notifications so that it can accept messages until the data partition has been filled to the maximum safe capacity rather than stopping when it hits 90% full. There should be no negative impact on battery life because the additional check in the storage polling service should be offset by an optimization to cache the free threshold values which were previously being computed every time through the loop. While testing this change, I discovered that SMSDispatcher was being instantiated twice, the first time in GSMPhone/CDMAPhone, and the second time in SimSmsInterfaceManager / RuimSmsInterfaceManager. Changed the code to pass the original SMSDispatcher to the Sim/RuimSmsInterfaceManager constructor. Change-Id: Ie0c6d05294778ab6ee42e0fa01313af96d824c77
/frameworks/base/core/res/AndroidManifest.xml
|
b8a8a578c2483d84ef96fd7050bbbcbc48d49a37 |
|
08-Sep-2010 |
Mike Lockwood <lockwood@android.com> |
Fix Intent.ACTION_REBOOT Turns out this would be useful for automated testing. Change-Id: Idd5e35a8d4a354447b17a77fe0b606f78df844d0 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
44434f002aadb4e234a963ba9317a3c79d431d97 |
|
03-Sep-2010 |
Daniel Sandler <dsandler@google.com> |
Don't get stung! Change-Id: I8211675e619bcc31c991296387513d07ad53ff10
/frameworks/base/core/res/AndroidManifest.xml
|
8f5edc93b622bbdc33db24d348480fd7d55afb41 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
am 840f0fec: am d3efa392: Clean up some permissions. Merge commit '840f0fecd87357cadf4b2a0ae96d30b457f89729' * commit '840f0fecd87357cadf4b2a0ae96d30b457f89729': Clean up some permissions.
|
d3efa3924407da6d38aa5931ac29aa088d9eb986 |
|
02-Sep-2010 |
Dianne Hackborn <hackbod@google.com> |
Clean up some permissions. Note that WRITE_OWNER_DATA and READ_OWNER_DATA don't actually appear to be associated with anything or used by anyone, so they are just deleted. Also deprecate the activity API to go in the foreground. I didn't realize that was released in the SDK. It needs to go away. Change-Id: I96f53702c2c79e4999b6b2c498abb770bd27e03a
/frameworks/base/core/res/AndroidManifest.xml
|
7b6d0d99b6904b511996267efae215fe9cb5e98f |
|
11-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
am 679ac09a: am a5ae50cd: Merge "More native work." into gingerbread Merge commit '679ac09a5c22175354f3a04b28456b323839530e' * commit '679ac09a5c22175354f3a04b28456b323839530e': More native work.
|
08d5b8fad8d46ccb64db2fdcb4d66972ec87bf48 |
|
04-Aug-2010 |
Dianne Hackborn <hackbod@google.com> |
More native work. Implement save/restore of state, and add native APIs for configuration information. Change-Id: I2a3ddc2ba605db58d7c8b2b31b9215fb323f90b5
/frameworks/base/core/res/AndroidManifest.xml
|
da39f0e87814c5acb8b6319a1877b93197fb910e |
|
28-Jul-2010 |
Mike Lockwood <lockwood@android.com> |
Send Intents when PTP compatible devices are connected/disconnected to USB Usb.ACTION_USB_CAMERA_ATTACHED and Usb.ACTION_USB_CAMERA_DETACHED are sent when cameras are connected and disconnected. The data field of the intent contains a Uri for the camera in the Mtp content provider. Change-Id: I814221b4f0507b309997c71edb5a041e8efc54f7 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
dad497e598de663c742289fe10dfa65c0cb154e9 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
am 0d929d7f: am 059f009d: Make android.hardware.action.USB_STATE a protected broadcast. Merge commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757' * commit '0d929d7f094f2ea743c9ce2e17d5e40780cfe757': Make android.hardware.action.USB_STATE a protected broadcast.
|
059f009d970fb37ac4e408dcf8e1d2d2cdcf0a84 |
|
29-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Make android.hardware.action.USB_STATE a protected broadcast. Change-Id: I84160e9342025228c1f810077f5aa25f5cc83023 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
57c798ade1a30c5587269519dd9f55b87c3b3be7 |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I919fcd5aa8d640d051cec87053f474a9843ed545 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2423607a32d63a0c646b17758ebeb4dc1d0b791f |
|
23-Jun-2010 |
Mike Lockwood <lockwood@android.com> |
Add a new UEventObserver subclass to broadcast an Intent whe USB state changes. We now broadcast Usb.ACTION_USB_CONNECTED and Usb.ACTION_USB_DISCONNECTED when USB is connected or disconnected. The ACTION_USB_CONNECTED extras indicate the enabled/disabled state of all USB functions. Change-Id: I11495d039429dbe22bd738067296e39ae415befa Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9163d42a50076c2a77694ff394363264d862c7bf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
DO NOT MERGE Add new permission to allow access to USB devices Adds permission android.permission.ACCESS_USB. This is a partial cherry pick of a change from master. It adds the permission, but not the support for associating it the AID_USB group. Change-Id: If5816721a4fc88bf444141a7b717da65ea37d5f4 Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
14f2ef4c9da27a3d58d65dc9f684c5f764ee279a |
|
15-Jun-2010 |
Robert Greenwalt <robdroid@android.com> |
Move the net transition wakelock to ConnService. When the default network goes down we lose the wake-on-incoming-data capability until the new net is brought up and apps rebuild their connections. We fixed this in Wifi, but it's a general connectivity issue, not a wifi issue so moving the mechanism to connecitivty so other networks can use it. bug:2734419 Change-Id: I39b5d825eb6b548bd9bb8f179b89254f4db53147
/frameworks/base/core/res/AndroidManifest.xml
|
8a5f10b30dae663eb01372490df3497e8a2ad56a |
|
10-Jun-2010 |
Joe Onorato <joeo@android.com> |
resolved conflicts for merge of f7b79151 to master Change-Id: Ia4538f73d8bade9e6565835d484dcb650830feca
|
1d46191d88ee9262ea05b868d2db5b44ad85fa43 |
|
09-Jun-2010 |
Joe Onorato <joeo@android.com> |
am b5f9b4f1: am 302759c1: Merge changes I4a11f027,Ib2c4abf6,Id0c7ef9f,I839d7771 into kraken
|
8bc6c5141974dbc36a6fe416853f558921be9f24 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Require the STATUS_BAR_SERVICE permission for something to be the status bar. Change-Id: I57b2d296e0d0cef0d256ae6697fffc47188d14df
/frameworks/base/core/res/AndroidManifest.xml
|
fe4f3ae33c8da86585399b4167fd7987c8a16066 |
|
04-Jun-2010 |
Joe Onorato <joeo@android.com> |
Move the usb mass storage notification & activity into SystemUI.apk. Also fix the notification to show properly when the runtime is restarted. Change-Id: Id0c7ef9f9dc9c9df18428cbaa7db1703f085137e
/frameworks/base/core/res/AndroidManifest.xml
|
d0b15cecc63b03ca4e42549ed3a54ae2c7e31866 |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f3307ae8 to master Change-Id: Ic59db363391f73343eba32894113914ceea5a963
|
860755faa6bdd3c2aeae49c05b87b5bc080ae60c |
|
04-Jun-2010 |
Dianne Hackborn <hackbod@google.com> |
Add support for heavy-weight applications. Only one can be running at a time, their process can not be killed, and a notification is posted while it is running. Change-Id: I843015723947e0c934ae63a1aeee139327c0bc01
/frameworks/base/core/res/AndroidManifest.xml
|
2b6b8351961d627be87396bbeb3e0ab811747bf3 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
am 0c6028c1: am c1959658: am fa2e3dcd: am 8ea9f130: Merge "Bug 2680071: Rename the Cloud to Device" into froyo
|
8d83f9e31bfff0281b522c53e035dffc7dd00ba9 |
|
13-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2680071: Rename the Cloud to Device Change-Id: I12ab32de393e44a499e3f9e3a0b38f4682156ff5
/frameworks/base/core/res/AndroidManifest.xml
|
3a17fbb757576ab52ff1ec5fcd54101f33977099 |
|
12-May-2010 |
Costin Manolache <costin@google.com> |
am b20842c7: am 8579a4d7: am 625de488: am e2055fe4: Merge "Bug 2673557: rename datamessaging" into froyo
|
31ac8e9d56d121e276f0c9e2359c28fefb3e80cf |
|
11-May-2010 |
Mike Lockwood <lockwood@android.com> |
Add new permission android.permission.ACCESS_USB to allow access to USB devices Change-Id: Ib3dd573a5ef3950d20b21251fe7a3efad56b5c1f Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
161c75a0f3ca5255001f7d737a02a4f9d728f1f4 |
|
11-May-2010 |
Costin Manolache <costin@google.com> |
Bug 2673557: rename datamessaging Change-Id: I583ac61c7b8fce69d60801dc76aeca9f13d250b2
/frameworks/base/core/res/AndroidManifest.xml
|
ec7c78fbf526816cd361fd482bdf3792ecfd9a9f |
|
31-Mar-2010 |
Jeff Brown <jeffbrown@google.com> |
@hide ACCESS_CACHE_FILESYSTEM and MOVE_PACKAGE Bug: b/2553489 Change-Id: I681b3f9a243777b931298cc93c9d34c8d7eae0f2
/frameworks/base/core/res/AndroidManifest.xml
|
9c9c532d3625ba2485eb4ea6924ed0a0163fd958 |
|
31-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2560791: Expose API to go in to car mode. Also fix bug where night mode was being used in desk dock. Change-Id: I56c1cf3d6fe800a4f986d40cc4cb2e70b76ac261
/frameworks/base/core/res/AndroidManifest.xml
|
98bfa39596448504f58f6dfe1b8bd2d31f25367b |
|
24-Mar-2010 |
Bjorn Bringert <bringert@android.com> |
Use a secure setting for default browser geolocation permissions Partly reverts I6308b476ad18b1d71d7438b936c592a45365c9f0 Bug: http://b/issue?id=2535598 Change-Id: Ib488c6d4f10a87b714ecb78eef6fe58f572907c6
/frameworks/base/core/res/AndroidManifest.xml
|
cbf953ed09b036441d90e14b0723a2ea417b3f35 |
|
22-Mar-2010 |
San Mehat <san@google.com> |
Permissions: Change ASEC permissions from 'dangerous' -> 'signature' Change-Id: I5e495332c45f718178486f2e07d37031e6fa5afc Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
2ee89ea2887252053c31541c54126a8b084c9bca |
|
11-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Applications should -not- be able to set preferred activities. I can't believe I let this slip through. And in the SDK no less. :( The APIs for setting preferred activities will now throw a security exception when used. This may break some apps, we'll see how it goes. If it is too bad we can just make these log and not throw anything, but I would much prefer they throw an exception. Change-Id: I3aed434750eef8b202aa9d5bd774a0121be521c6
/frameworks/base/core/res/AndroidManifest.xml
|
7299c41630935a2b106e73e5603579a7747f7535 |
|
05-Mar-2010 |
Dianne Hackborn <hackbod@google.com> |
Refactor car mode. Extract all UI behavior from dock observer and ACTION_DOCK_EVENT. Also introduce a desk type to go along with the car type all through the resource system, since we now need to have corresponding high-level broadcasts for desk dock mode. As part of that I also reworked some of the logic for switching modes to all funnel through a single update() call that looks all of the current state to decide what to do next, and fixed various locking issues. In addition I found there were bugs in the configuration change handling causing us to only switch into the car mode config and then never get out of it. Unfortunately now that we are actually changing the configuration for each mode change, the transitions between them are really crummy as we restart all kinds of activities. :(
/frameworks/base/core/res/AndroidManifest.xml
|
e7085e909d0c7f58a160b2730ff06aca085dfd6b |
|
04-Mar-2010 |
Robert Greenwalt <robdroid@android.com> |
Update framework tethering UI Getting rid of notification dialog - maybe the entire TetherActivity. Also getting rid of toasts - to ephemeral.
/frameworks/base/core/res/AndroidManifest.xml
|
8946dd3355fc1dcbad872c0546e356474d4cc5de |
|
19-Feb-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
Move package from internal to external and vice versa.
/frameworks/base/core/res/AndroidManifest.xml
|
154f7a1cc2d4f0468a7cc8dfa36e837c84cd9f7e |
|
17-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Show car mode notification in status bar. The notification is an ongoing event and can be used to get out of car mode.
/frameworks/base/core/res/AndroidManifest.xml
|
63cfebf2dbe628508cccc10f47754fdacd48c1a0 |
|
05-Feb-2010 |
Costin Manolache <costin@google.com> |
Switch from REMOTE_INTENT to the new push messaging, add the required permission.
/frameworks/base/core/res/AndroidManifest.xml
|
a87240c2270e83c3e865ffa1e56f79bfa74daffc |
|
12-Feb-2010 |
Christopher Tate <ctate@google.com> |
Remove BACKUP_DATA permission and associated checks Any package can now participate in backup/restore, without requiring any manifest-declared permission. *Control* of the backup manager is still guarded by the BACKUP permission, which is signatureOrSystem. Change-Id: I116fcfcd4cd255e3c976330da1c4dea7d4faae9d
/frameworks/base/core/res/AndroidManifest.xml
|
27b28b3f62bd3b54fa13acd5d035940b9be464f3 |
|
09-Feb-2010 |
Tobias Haamel <haamel@google.com> |
Introduce special UI modes for night and car usage. The device mode is now called ui mode. Furthermore is the order of precedence for the resources now in such a way that the ui mode needs to be specified after the orientation and before the density. The ui mode can be set, like it is done for the locale, as follows: IActivityManager am = ActivityManagerNative.getDefault(); Configuration config = am.getConfiguration(); config.uiMode = Configuration.UI_MODE_TYPE_CAR | Configuration.UI_MODE_NIGHT_ANY; am.updateConfiguration(config); To allow users to disable the car mode and set the night mode the IUiModeManager interface is used. The automatic night mode switching will be added in a separate change.
/frameworks/base/core/res/AndroidManifest.xml
|
18e939623556928f73fcc7511c85a537929a4a7e |
|
11-Feb-2010 |
Dan Egnor <egnor@google.com> |
Eliminate dependencies on Checkin, replacing checkin events with EventLog events (and in one case, a DropBox entry). Add a simple intent that triggers master-clear (and toggle EFS), given the right permissions. Bug: 2264596 Bug: 2350452 Bug: 2264596
/frameworks/base/core/res/AndroidManifest.xml
|
91f2a20a5957095a6cba9f97326ea0f1eab17195 |
|
09-Feb-2010 |
Bjorn Bringert <bringert@android.com> |
Add content provider for browser geolocation permissions This replaces the old Google-specific geolocation setting. Fixes http://b/issue?id=2428694 Part of http://b/issue?id=2383870 Change-Id: I6308b476ad18b1d71d7438b936c592a45365c9f0
/frameworks/base/core/res/AndroidManifest.xml
|
4154c07c5cabc74029a2df379075391d782a682c |
|
10-Feb-2010 |
San Mehat <san@google.com> |
StorageNotification: Move notification / usb storage activity into StatusBarPolicy Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
97e44947282b3918ee0bed2d16b33b983f882580 |
|
05-Feb-2010 |
Dan Egnor <egnor@google.com> |
Add an AlarmManager API to set the system time (with the proper permissions).
/frameworks/base/core/res/AndroidManifest.xml
|
d0e18ffb82b59d38aeaf0e552f48e734202719ab |
|
26-Jan-2010 |
Robert Greenwalt <robdroid@android.com> |
First pass at USB Tethering. bug:2281900
/frameworks/base/core/res/AndroidManifest.xml
|
b94f795c257e32a1d7be1115568b5b6f576dec37 |
|
28-Jan-2010 |
Daniel Sandler <dsandler@google.com> |
New full-screen activity for USB mass storage interaction. Still TODO: patch into forthcoming callbacks from MountService so the USB storage activity always shows the correct state of the device. (Right now it only refreshes its display onResume.) Bug: 2299129
/frameworks/base/core/res/AndroidManifest.xml
|
c028be4f3b8c7476b46859f66c3f33d528adf181 |
|
25-Jan-2010 |
Suchi Amalapurapu <asuchitra@google.com> |
AppsOnSd feature - Add default container Add new remote interface to do temporary copies. The new remote stub handling is done on mHandler thread and doesn't need locking for now. Add new InstallArgs class and subclasses to isolate cases for installation. Move resource deletion for failed installs/upgrades to later on in installation cycle. Fix code path for forward locked apps when using scanPackageLI TODO's Fix installation paths to completely use InstallArgs based design later on. Get rid of using flags in various install/uninstall code paths. Ideally InstallArgs should be created using these flags and used in the rest of the code. Function renames. Revisit mount api's.
/frameworks/base/core/res/AndroidManifest.xml
|
02735bc9b7686e56957cdec9c10660c4a6dd1090 |
|
27-Jan-2010 |
San Mehat <san@google.com> |
MountService: Introduce new @hide permissions to protect secure containers. Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
d68478467e3f837511196c80891d7245d0e163df |
|
13-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
First pass at new device policy and administration APIs. This adds new DevicAdmin, DevicePolicyManager, and DeviceAdminInfo classes. See the java docs for each on documentation on them. Basically: a DeviceAdmin is what you derive from to administer a device; DevicePolicyManager is what you use to apply and check your policy requirements and perform other administration tasks.
/frameworks/base/core/res/AndroidManifest.xml
|
6e99b7a3b29fbb1936463a3a48fe693dae909c8f |
|
07-Jan-2010 |
Doug Zongker <dougz@android.com> |
add ACCESS_CACHE_FILESYSTEM permission to core manifest All of the permissions in data/etc/platform.xml are defined in core/res/AndroidManifest.xml, except for ACCESS_CACHE_FILESYSTEM. Add it. Change-Id: If7906bc0007484cc21196fb1c0593b967fd79920
/frameworks/base/core/res/AndroidManifest.xml
|
03abb8179f0d912e6dabfc0e2b0f129d85066d17 |
|
05-Jan-2010 |
Dianne Hackborn <hackbod@google.com> |
Kill the task killers. The ActivityManager.restartPackage() API is now deprecated, and no longer allows applications to mess up the state of other applications. This was being abused by task killers, causing users to think their other applications had bugs. A new API is introduced for task killers, ActivityManager.killBackgroundProcesses(), which allows these applications to kill processes but only the same amount that the out of memory killer does, thus causing no permanent damage. The old restartPackage() API is now a wrapper for calling this new API. There is also a new private forceStopPackage() API that is used for the system's force stop UI which does what the old restartPackage() API did.
/frameworks/base/core/res/AndroidManifest.xml
|
9256bb08d22b0dad73bdc3f14929dc519dc02414 |
|
19-Dec-2009 |
Scott Main <smain@google.com> |
am 9a6c8168: am 77fa05a4: Merge change Iab5952e1 into eclair Merge commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd' * commit '9a6c8168f743c1dc8cc28de22fe12be4623434cd': docs: add "required" attribute to the <uses-feature> docs
|
0b91635caf91b76d304e80997c82fe582b636428 |
|
18-Dec-2009 |
Scott Main <smain@google.com> |
docs: add "required" attribute to the <uses-feature> docs and add a note to the CAMERA permission stating that it enables the <uses-feature> for camera. This is an incrimental update for the 2.0.1 docs. More changes to come for the 2.1 docs to include more features
/frameworks/base/core/res/AndroidManifest.xml
|
9ed7dc10d263a505da32522139098f085fee811a |
|
02-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
am 5886050f: Merge change I0d8f7593 into eclair Merge commit '5886050fad97923c33cbc831fe07a5b1746b2b58' into eclair-mr2 * commit '5886050fad97923c33cbc831fe07a5b1746b2b58': Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op
|
a7ca0e5e320bbb643f8bc9feb4717dbc5e78e0b9 |
|
01-Dec-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2296457: PackageManager.addPackageToPreferred needs to a no-op Change-Id: I0d8f75938226e1bb49cf7b1154445631b0bb0bc9
/frameworks/base/core/res/AndroidManifest.xml
|
50a21f4d3b70360b36acad20e234c380654fd59f |
|
19-Nov-2009 |
Doug Zongker <dougz@android.com> |
add reboot() method to PowerManager In order to unbundle System Update, we need some to expose in the SDK some way to reboot the device into recovery. Add a reboot() method to PowerManager, protected by the android.permission.REBOOT permission.
/frameworks/base/core/res/AndroidManifest.xml
|
ac63ebc82433347e6c8e74e26fa670717acffac7 |
|
13-Nov-2009 |
Dan Egnor <egnor@google.com> |
Make WRITE_GSERVICES into system-or-signature (instead of just signature), as a temporary measure so unbundled Google components (GSF, etc.) can hold it. (In the longer term, WRITE_GSERVICES won't be a system permission at all, but it or something like it will be defined directly by GSF.)
/frameworks/base/core/res/AndroidManifest.xml
|
362d5b9b6429a2766f5b980d2010262135788ad8 |
|
12-Nov-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2256032: Change CONFIGURATION_CHANGED and add a locale changed broadcast You can no longer receive CONFIGURATION_CHANGED in a manifest, which is really really bad (launching apps every time the screen is rotated!). A new LOCALE_CHANGED broadcast is sent that you can receive in a manifest. Change-Id: I80022375f0716db2e672382a29db3cea1af74702
/frameworks/base/core/res/AndroidManifest.xml
|
f7ae77cd67f1a3993b8e56c1af4720a7adf4e69d |
|
03-Oct-2009 |
Fred Quintana <fredq@google.com> |
account manager api review changes
/frameworks/base/core/res/AndroidManifest.xml
|
29e4a3c566f435c32f0b95e4ac8e8b33cac6faba |
|
01-Oct-2009 |
Dianne Hackborn <hackbod@google.com> |
Update from API review. Change-Id: I16b1c566f91167aac9615ac59dd297a154c828ea
/frameworks/base/core/res/AndroidManifest.xml
|
96cb8d0b94b5737d0a06088bff3bf409ced3cd3d |
|
30-Sep-2009 |
Debajit Ghosh <debajit@google.com> |
fix account permission strings. this permission is used to protect more than just Google accounts.
/frameworks/base/core/res/AndroidManifest.xml
|
aef405d82931a08a7683cf0f58b5e74dbe268d45 |
|
28-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Allow wallpaper picker to work. Change-Id: I379f25e0e8e372d72c0a89e71ccd584a5dbb3648
/frameworks/base/core/res/AndroidManifest.xml
|
4cc86e1ae80eb1938500fe5fa06bbdf8b4b7b50d |
|
22-Sep-2009 |
Christopher Tate <ctate@android.com> |
Clear the device's data from the transport when backup is disabled Turning off backup in the Settings UI constitutes an opt-out of the whole mechanism. For privacy reasons we instruct the backend to wipe all of the data belonging to this device when the user does this. If the attempt fails it is rescheduled in the future based on the transport's requestBackupTime() suggestion. If network connectivity changes prompt the transport to indicate a backup pass is appropriate "now," any pending init operation is processed before the backup schedule is resumed. The broadcasts used internally to the backup manager are now fully protected; third party apps can neither send nor receive them. (Also a minor logging change; don't log 'appropriate' EOF encountered during parsing of a backup data stream.)
/frameworks/base/core/res/AndroidManifest.xml
|
ffa424800d0338b8b894aef2ea1e3e3344cbda7a |
|
24-Sep-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2133206: dialogs/menus should auto-dismiss when screen turns off Lot of infrastructure for more things to go away when "clear system dialogs" happens, and now do this when we turn on the lock screen. Change-Id: I567130296fe47ce82df065ed58ef21b37416ceaf
/frameworks/base/core/res/AndroidManifest.xml
|
72440a0e2c8f73240e0dcee36e58b1840ffbb5fd |
|
16-Sep-2009 |
Nick Pelly <npelly@google.com> |
Allow only System Service to send most Bluetooth intents. Change-Id: I9f63425995f12741b60b85cdffe5a94e97ca03f1
/frameworks/base/core/res/AndroidManifest.xml
|
5e1ab335e6e8fbfa19c64d53880a22f472010953 |
|
02-Sep-2009 |
Christopher Tate <ctate@android.com> |
Expand apps' control over the settings restore process Applications can now specify two more aspects of the restore process: whether they need to run with their own custom Application subclass rather than being launched in the usual restricted mode during restore, and whether it's okay for the backup manager to kill the app process once restore has completed. The new manifest attributes for these are, respectively, android:restoreNeedsApplication and android:killAfterRestore. If unspecified in the manifest, restoreNeedsApplication is false, and killAfterRestore is true. In order to support kill-after-restore cleanly, this change also adds a new system-process-only interface to the Activity Manager, which will schedule a "commit suicide" event on the target app's main thread looper. The framework backup agents have been given the appropriate new backup attributes as well.
/frameworks/base/core/res/AndroidManifest.xml
|
284ac93aa30642fda87d5c40263a1263677c21cd |
|
28-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
More work on wallpapers: animations, lifecycle, scaling, etc. Yet more work on improving the behavior of wallpapers. This fixes a few problems in their lifecycle (corresponding change in the picker also required for this), makes their animations better for hardware that supports alpha fades, adds animations for the wallpapers themselves, eliminates fixed size wallpapers, and adjusts the API for retrieving a wallpaper bitmap to take care of scaling the raw wallpaper image to match the current desired width and height. Change-Id: If1c0aaceba4ea4e175dcb7a8416ca7ddbb9bfa6f
/frameworks/base/core/res/AndroidManifest.xml
|
22d1f9fb23015471de6af1a70e40fb5c82ecb665 |
|
19-Aug-2009 |
Danke Xie <dankex@qualcomm.com> |
gps: Network initiated SUPL Initial contribution from Qualcomm. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
767be5f0b929cc1eeb8a7d5aa7a02e228053e9bb |
|
26-Aug-2009 |
Jim Miller <jaggies@google.com> |
Integrate CDMA provisioning into SetupWizard
/frameworks/base/core/res/AndroidManifest.xml
|
edc5ff862877d679578cbe9ecbbc806782620968 |
|
18-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
am c678a93a: Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode Merge commit 'c678a93a73c83e841032874bee9c202936da73c0' into eclair * commit 'c678a93a73c83e841032874bee9c202936da73c0': Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
|
c678a93a73c83e841032874bee9c202936da73c0 |
|
17-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue #2056585: applications can put phone in inconsistent state wrt airplane mode
/frameworks/base/core/res/AndroidManifest.xml
|
f21adf6fc19bc9c6908c6f1aaae203389f104bfa |
|
13-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Always have a wallpaper service running.
/frameworks/base/core/res/AndroidManifest.xml
|
0749dcd19301fe4093f9cf8677c722d17bceabfb |
|
14-Aug-2009 |
Christopher Tate <ctate@android.com> |
Backup participants must now hold the BACKUP_DATA permission Packages that do not use android.permission.BACKUP_DATA will neither be backed up nor restored. That permission is currently signature-only. In the future if access to the backup/restore infrastructure is made available to arbitrary 3rd party applications, the permission checks (and indeed, the permission itself) can simply be removed.
/frameworks/base/core/res/AndroidManifest.xml
|
4c62fc0e1e5ea9c69a12a7d1cf8b3ec8b2d114a3 |
|
09-Aug-2009 |
Dianne Hackborn <hackbod@google.com> |
Very primitive wallpapers in a surface. This is all of the basic pieces: - The WallpaperService now creates a surface with the window manager for its contents. - There is a simple service that displays a bitmap. - The wallpaper manager takes care of starting and stopping the service. - The window manager knows about wallpaper windows and how to layer them with the windows that want to be shown on top of wallpaper. Lots and lots of issues remain, but at this point you can actually write a wallpaper service, select it in the UI, and see it behind an activity.
/frameworks/base/core/res/AndroidManifest.xml
|
49f746823eafabbf251f27a059ddd8c94ada04f1 |
|
31-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Remove android:multiprocess from ShutdownActivity to ensure it runs in the system process. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
bad80e0dccdeaeea97991f7d092678ff0df1bc84 |
|
30-Jul-2009 |
Mike Lockwood <lockwood@android.com> |
Add Activity Intent.ACTION_REQUEST_SHUTDOWN for requesting a system shutdown. The Intent.EXTRA_KEY_CONFIRM extra can be set to require user confirmation before shutting down. The ACTION_REQUEST_SHUTDOWN Intent is protected by android.permission.SHUTDOWN. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
9bb8fd77c8dc177aab9ac96bed4f55972dcda70a |
|
29-Jul-2009 |
Joe Onorato <joeo@android.com> |
Only restore the bits for wallpapers that aren't built in.
/frameworks/base/core/res/AndroidManifest.xml
|
02f5228c3c224dc8804cbedd40899fa0c42bfd4a |
|
29-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of f0d83fd9 to master
|
7f2054392e9957d3ba8579ef08c29cfb27df564e |
|
28-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Updates from API review. * AccessibilityService -- document onBind() to not be implemented. * GestureLibrary.getLearner() -- needs to be hidden. * IntentSender -- remove protected constructors, document that it is retrieved from a PendingIntent. * Hide permissions: SHUTDOWN, STOP_APP_SWITCHES. * Context -- hide BACKUP_SERVICE. * ContextWrapper -- hide getSharedPrefs bla h blah * Intent.parseUri() -- fix docs. * ApplicationInfo.FLAG_TEST_ONLY?!? * Hide MockContext.getSharedPrefs blah blah
/frameworks/base/core/res/AndroidManifest.xml
|
143a2ce1ea33aeba81cff26f66144065d379dc64 |
|
27-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am ba989ad0: Merge change 8648 into donut Merge commit 'ba989ad0ed91beda010d44945fa015d75d99cf67' * commit 'ba989ad0ed91beda010d44945fa015d75d99cf67': Use the old string for bookmarks permissions.
|
e7d1c8f3777375468de2e5932a691ef388ee2e75 |
|
27-Jul-2009 |
Leon Scroggins <scroggo@google.com> |
Use the old string for bookmarks permissions. When we made the bookmark permissions public, we also changed their names, which might break existing apps. Change them back. Depends on a change in packages/apps/Browser
/frameworks/base/core/res/AndroidManifest.xml
|
d4a1d2e14297a3387fdb5761090961e714370492 |
|
17-Jul-2009 |
Fred Quintana <fredq@google.com> |
add account manager permission checking
/frameworks/base/core/res/AndroidManifest.xml
|
602bee5bf2a4f688b050077291288b473a7cc6db |
|
13-Jul-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am cf29e116: Merge change 6867 into donut Merge commit 'cf29e116129f38309c18ba14b9893b079a712289' * commit 'cf29e116129f38309c18ba14b9893b079a712289': CLOSE_SYSTEM_DIALOGS can't be protected.
|
4554f30c834723db6946400bf1827be4419a3134 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
CLOSE_SYSTEM_DIALOGS can't be protected.
/frameworks/base/core/res/AndroidManifest.xml
|
54a26bc85f4fe972e929e42b986c65a710a229b3 |
|
11-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 889c2d37 to master
|
854060af30f928c0a65591e9c8314ae17056e6b8 |
|
10-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix bug #1873249i: Apps can DoS/brick device This is the problem where various things are listening for broadcasts (such as battery status, PIN/PUK/Network) that an application can send to cause harm to the system. Solving this is tricky because many of these broadcasts are sticky, and I have never figured out how to do permissions with sticky broadcasts in a sane way. So instead, I am going to punt on the general problem and just brute force it: There is new a way for system components to declare specific broadcast actions to be protected, which means that only the system and the phone can send them. This is good enough for now. None of it is exposed in the public API so we can make something a little less stupid in the future if we ever need to.
/frameworks/base/core/res/AndroidManifest.xml
|
e3f054411b9f025848f68389c4e2c325e76b3826 |
|
09-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
resolved conflicts for merge of 2af632f8 to master
|
2af632f87d487deaa5b2eb71341cfc4f0c0d1173 |
|
08-Jul-2009 |
Dianne Hackborn <hackbod@google.com> |
Add new <path-permission tag for use by global search. This adds a new <path-permission> tag you can use inside of a <provide> to define additional path-based permissions that broaden the global read and write permissions. The initial use for this will be global search, so that a content provider that is protected by permissions can make a part of itself available to global search under another permission. This addresses the issue with global search not being able to request permissions it would need of providers it doesn't know about at build time.
/frameworks/base/core/res/AndroidManifest.xml
|
5ad2f1c05ed69176849f535e4a8ab02e50e8e048 |
|
30-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am dbcd9c34: Merge change 5654 into donut Merge commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4' * commit 'dbcd9c34f378a93c1e7e8c91e035782daf66e5f4': The BACKUP permission should have the signatureOrSystem protectionLevel,
|
8aeaf2e079a1776c5b17f95bf7ad401966f2beef |
|
29-Jun-2009 |
Joe Onorato <joeo@android.com> |
The BACKUP permission should have the signatureOrSystem protectionLevel, because the setup wizard isn't signed by the same cert as the framework.
/frameworks/base/core/res/AndroidManifest.xml
|
cc79800a741e4ee55ecfa7ec236b0087d83e41e4 |
|
25-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 5416d7c9: Merge change 5317 into donut Merge commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2' * commit '5416d7c905e723a978ac29ccaf22a91b76e9d5c2': Start backing up wallpaper
|
111bd4acdb378266221b430a284f88a3990a3958 |
|
25-Jun-2009 |
Christopher Tate <ctate@google.com> |
Start backing up wallpaper This CL does the following: + adds an AbsoluteFileBackupHelper class for managing backup of files known by absolute path, not based off of the app's getFilesDir() root + bumps up the collection interval from its testing-only default of 1 second to 3 minutes + adds a SystemBackupAgent class to the main system package and names it as the android:backupAgent for the main OS package. Right now this agent only backs up & restores the wallpaper file. + amend the Wallpaper Service to inform the Backup Manager when the wallpaper changes. On the subject of the 3-minute collection interval before the backup actually occurs: this can be short-circuited from an adb shell. Running the command 'bmgr run' will cause the Backup Manager to kick off any pending backup operations immediately.
/frameworks/base/core/res/AndroidManifest.xml
|
d6377fbe7eb570b880ce5f1fcc71a556a24961ba |
|
22-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
resolved conflicts for merge of 9336f5d9 to master
|
9ce4c6c5cfc111a73e0cfc3c94daa50346c56867 |
|
19-Jun-2009 |
Leon Scroggins <scroggo@google.com> |
Make browser bookmarks permissions part of the public API.
/frameworks/base/core/res/AndroidManifest.xml
|
3c3d3081aad5d3a0cadd18c7764974060c1a5274 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 727f36c6: Merge change 4265 into donut Merge commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef' * commit '727f36c6a1c70ba5519ec9ce2da9ab1cf303a2ef': process: Fix bug where if a thread exited while we were changing its control Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally
|
29930a1cb884885f92c72a76e42e795ac948edc3 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 3dcea047: Merge change 4237 into donut Merge commit '3dcea047c5c7a61a56f618815e298d7bd38e2678' * commit '3dcea047c5c7a61a56f618815e298d7bd38e2678': Remove obsolete FOTA_UPDATE permission (which should never have been
|
48f72206dc4215ea2eb3898043eb713b5b72e135 |
|
16-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am aa67df9f: Merge change 4248 into donut Merge commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3' * commit 'aa67df9f2f8e4c0993c5954e598031bbf4aaf7a3': Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions.
|
cb05cc4acba4724d06120d2c606d955751bd0d11 |
|
16-Jun-2009 |
Dan Egnor <egnor@google.com> |
Fix the build: Remove ADD_SYSTEM_SERVICE, which I had accidentally reintroduced in an errant and clumsy git merge operation. Also remove permission label and description strings for now-deleted permissions FOTA_UPDATE and (within the SettingsProvider package) WRITE_GSERVICES.
/frameworks/base/core/res/AndroidManifest.xml
|
2d4b6ad9d4c7e3e2dbb6a127f37271686253d71f |
|
15-Jun-2009 |
Dan Egnor <egnor@google.com> |
Remove obsolete FOTA_UPDATE permission (which should never have been made public, and wouldn't be used by any third party applications, and no longer does anything regardless). Also remove the WRITE_GSERVICES permission from the SettingsProvider package's manifest (the declaration there was redundant with the one in the core manifest, where all the other settings-related permissions live -- no other core package includes its own permission definitions).
/frameworks/base/core/res/AndroidManifest.xml
|
29148f90cd9fb34ff64f76936347547885906eb9 |
|
16-Jun-2009 |
Dianne Hackborn <hackbod@google.com> |
Remove ADD_SYSTEM_SERVICE and SET_PROCESS_FOREGROUND permissions. These are no longer used.
/frameworks/base/core/res/AndroidManifest.xml
|
7c49790cde0acb494b6e8980662842c95dd8859a |
|
01-Jun-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 162c9d0e: Merge change 2805 into donut Merge commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47' * commit '162c9d0e90eaa71adc8c7d1456d1a9a95e638c47': base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE
|
5a3a77dabd744d5be79d7745c2a977c108a9ad98 |
|
01-Jun-2009 |
San Mehat <san@google.com> |
base: Rename WRITE_SDCARD -> WRITE_EXTERNAL_STORAGE Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
ad6042aa2342d0a869f84772774b47ae87346ccf |
|
01-Jun-2009 |
Christopher Tate <ctate@google.com> |
am 181fafaf: Retool the backup process to use a new \'BackupAgent\' class Merge commit '181fafaf48208978b8ba2022683ffa78aaeddde1' * commit '181fafaf48208978b8ba2022683ffa78aaeddde1': Retool the backup process to use a new 'BackupAgent' class
|
181fafaf48208978b8ba2022683ffa78aaeddde1 |
|
14-May-2009 |
Christopher Tate <ctate@google.com> |
Retool the backup process to use a new 'BackupAgent' class Backups will be handled by launching the application in a special mode under which no activities or services will be started, only the BackupAgent subclass named in the app's android:backupAgent manifest property. This takes the place of the BackupService class used earlier during development. In the cases of *full* backup or restore, an application that does not supply its own BackupAgent will be launched in a restricted manner; in particular, it will be using the default Application class rather than any manifest-declared one. This ensures that the app is not running any code that may try to manipulate its data while the backup system reads/writes its data set.
/frameworks/base/core/res/AndroidManifest.xml
|
96cdc61c69aa735e65295a50e3e2922425b3c877 |
|
28-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 1e2e44e9: Merge change 2365 into donut Merge commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc' * commit '1e2e44e900cb9a25d548e27a20d65292a7f321bc': Fix wifi multicast API for public use. Revert "Bug fixes and performance improvements"
|
fc1b15cfbfc5f69235ec1f367abd7a909381cd05 |
|
23-May-2009 |
Robert Greenwalt <robdroid@android.com> |
Fix wifi multicast API for public use. Applying API review comments and taking it public.
/frameworks/base/core/res/AndroidManifest.xml
|
9b1e1400df4c6c4b69985f164097f0c842dd796f |
|
21-May-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 8c690ea9: Merge change 2182 into donut Merge commit '8c690ea9976d644db3c96eddbbbd2d50eac56913' * commit '8c690ea9976d644db3c96eddbbbd2d50eac56913': location: Replace ILocationCollector interface with new ILocationProvider method
|
fd6e5f0dda50e113db4ccc55338b6c4f09da37a4 |
|
21-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Replace ILocationCollector interface with new ILocationProvider method This change replaces ILocationCollector with a more general mechanism that passes locations received from a provider to all other providers. The network location provider now uses this to implement the location collector. In the future, this could be used to inject network locations to the GPS as aiding data. This change also removes the now obsolete permission INSTALL_LOCATION_COLLECTOR. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
0bcad89a58ad49a0a836902ad41584777ca1f3f3 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
am 95fc68f2: Fix issue where apps could prevent the user from going home. Merge commit '95fc68f24a2a93e5664e2234abcfe479d385cc05' * commit '95fc68f24a2a93e5664e2234abcfe479d385cc05': Fix issue where apps could prevent the user from going home.
|
95fc68f24a2a93e5664e2234abcfe479d385cc05 |
|
20-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Fix issue where apps could prevent the user from going home. Now we have a 5-second time after home is pressed, during which only the home app (and the status bar) can switch to another app. After that time, any start activity requests that occurred will be executed, to allow things like alarms to be displayed. Also if during that time the user launches another app, the pending starts will be executed without resuming their activities and the one they started placed at the top and executed.
/frameworks/base/core/res/AndroidManifest.xml
|
470c1a8f394597329b400874f0b3afb58e558a1a |
|
19-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
am af999280: Change BIND_APPWIDGET to be signatureOrSystem. Merge commit 'af9992802992aaccfe1fb5893448939f215dd607' * commit 'af9992802992aaccfe1fb5893448939f215dd607': Change BIND_APPWIDGET to be signatureOrSystem.
|
af9992802992aaccfe1fb5893448939f215dd607 |
|
18-May-2009 |
Jeff Sharkey <jsharkey@android.com> |
Change BIND_APPWIDGET to be signatureOrSystem. See http://b/issue?id=1839074 for more details.
/frameworks/base/core/res/AndroidManifest.xml
|
62da8461ed5317fe78ae5e3793662694e7fc99a3 |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
a96cbb435d7b2197ab2b61fd98d14cbd6e0c5c3d |
|
14-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Implement compatibility support for WRITE_SDCARD permission. Now old applications will automatically be granted it. Also renamed it from SDCARD_WRITE to WRITE_SDCARD to be consistent with our other permissions, and re-arranged how we do targetSdkVersion to actually be usuable for this kind of stuff. Note that right now this results in basically all apps being given the WRITE_SDCARD permission, because their targetSdkVersion is not set. I will be dealing with that in a future change.
/frameworks/base/core/res/AndroidManifest.xml
|
97ecc9cbe7eccafc0923d7655daf07f4c2ea9791 |
|
12-May-2009 |
Wei Huang <weih@google.com> |
define Intent.ACTION_REMOTE_INTENT, which replaces the old GTalk data messaging intent "android.intent.action.GTALK_DATA_MESSAGE_RECEIVED". The remote intent concept shouldn't be limited to Google or GTalkService. It should be owned by the Android platform.
/frameworks/base/core/res/AndroidManifest.xml
|
3531fdb1d9a0ca536bd7a7a27d35b3e62c318ad9 |
|
08-May-2009 |
The Android Open Source Project <initial-contribution@android.com> |
merge 55280a9 Merge commit '55280a9'
|
55280a91884b9256e8db6af6a09f28b3feeaa9d8 |
|
08-May-2009 |
Dianne Hackborn <hackbod@google.com> |
Improve shutdown process to send broadcast for applications. This introduces a new class in the base platform for performing a clean shutdown (which was copied from the classes in the policies). It includes new features to send a shutdown broadcast for applications to do cleanup, and ot have the activity manager pause the current activity before proceeding with the shutdown. These facilities are also use to write at the most recent stat files for sync, battery and user activity.
/frameworks/base/core/res/AndroidManifest.xml
|
7a1355950172b7a549820e9a2cd4a9b2099ec32f |
|
06-May-2009 |
Dianne Hackborn <hackbod@google.com> |
merged 231cc608d06ffc31c24bf8aa8c8275bdd2636581
|
231cc608d06ffc31c24bf8aa8c8275bdd2636581 |
|
28-Apr-2009 |
Dianne Hackborn <hackbod@google.com> |
Rewrite SyncStorageEngine to use flat files and in-memory data structures. The previous implementation used a database for storing all of its state, which could cause a significant amount of IO activity as its tables were updated through the stages of a sync. This new implementation replaces that in-memory data structures, with hand-written code for writing them to persistent storage. There are now 4 files associated with this class, holding various pieces of its state that should be consistent. These are everything from a main XML file of account information that must always be retained, to a binary file of per-day statistics that can be thrown away at any time. Writes of these files as scheduled at various times based on their importance of the frequency at which they change. Because the database no longer exists, there needs to be a new explicit interface for interacting with the sync manager database. This is provided by new APIs on IContentService, with a hidden method on ContentResolver to retrieve the IContentService so that various system entities can use it. Other changes in other projects are required to update to the new API. The goal here is to have as little an impact on the code and functionality outside of SyncStorageEngine, though due to the necessary change in API it is still somewhat extensive.
/frameworks/base/core/res/AndroidManifest.xml
|
e90c0da675a945a86ac06098c1f5694ddc4efb23 |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
am 275555c: location: Add support for location providers outside of the Merge commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e' * commit '275555c8eb3fb5df6e7320873b88b77cdde85a9e': location: Add support for location providers outside of the system process.
|
275555c8eb3fb5df6e7320873b88b77cdde85a9e |
|
01-May-2009 |
Mike Lockwood <lockwood@android.com> |
location: Add support for location providers outside of the system process. Also added new permissions android.permission.INSTALL_LOCATION_PROVIDER and android.permission.INSTALL_LOCATION_COLLECTOR to the public API. Signed-off-by: Mike Lockwood <lockwood@android.com>
/frameworks/base/core/res/AndroidManifest.xml
|
1e89ef82b1cb06034c30f9772f936a8a0cf4a7df |
|
29-Apr-2009 |
Android (Google) Code Review <android-gerrit@google.com> |
am 947fe79: Merge change 483 into donut Merge commit '947fe79e99d5536a10c5b81946d20e69d0e9d479' * commit '947fe79e99d5536a10c5b81946d20e69d0e9d479': API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings
|
29b57e63e54321f99ff086bb25439098d83292f6 |
|
23-Apr-2009 |
San Mehat <san@google.com> |
API_CHANGE: external_storage: Add SDCARD_WRITE permission with associated strings Signed-off-by: San Mehat <san@google.com>
/frameworks/base/core/res/AndroidManifest.xml
|
3326920329cecb57c7ff1fc5c6add5c98aab9ed9 |
|
21-Apr-2009 |
Fred Quintana <fredq@google.com> |
adding concept of features to accounts
/frameworks/base/core/res/AndroidManifest.xml
|
935ae463d495d41155e27feb849768ad2b8b16db |
|
14-Apr-2009 |
Dianne Hackborn <> |
AI 145994: Integrate #145778 from Donut. Automated import of CL 145994
/frameworks/base/core/res/AndroidManifest.xml
|
f8a7ceaef2e7d5cd530c9426bde91b6fa9a40b75 |
|
11-Apr-2009 |
Andy Stadler <> |
AI 145778: Manual merge changes 145382-145384 from cupcake. Automated import of CL 145778
/frameworks/base/core/res/AndroidManifest.xml
|
15ba27802eb23e01f4fada11f3fa1f35925eab49 |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/master/...@142576,142576
/frameworks/base/core/res/AndroidManifest.xml
|
603073430bbcb1bd29db7afb9b14e2732ad589fb |
|
25-Mar-2009 |
Fred Quintana <> |
Automated import from //branches/master/...@142414,142414
/frameworks/base/core/res/AndroidManifest.xml
|
7d1e577d5f7ae96bfc533e1c73a3a6a272a4a16d |
|
25-Mar-2009 |
Dianne Hackborn <> |
Automated import from //branches/donutburger/...@142472,142472
/frameworks/base/core/res/AndroidManifest.xml
|
246924180995326ed368dadbc59772b41095d6e6 |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/master/...@140750,140750
/frameworks/base/core/res/AndroidManifest.xml
|
77323363091b42060bfd697ffb33ce6b3696ad6f |
|
25-Mar-2009 |
Jasper Lin <> |
Automated import from //branches/donutburger/...@140749,140749
/frameworks/base/core/res/AndroidManifest.xml
|
c39a6e0c51e182338deb8b63d07933b585134929 |
|
11-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@137873
/frameworks/base/core/res/AndroidManifest.xml
|
9066cfe9886ac131c34d59ed0e2d287b0e3c0087 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
d83a98f4ce9cfa908f5c54bbd70f03eec07e7553 |
|
04-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@135843
/frameworks/base/core/res/AndroidManifest.xml
|
076357b8567458d4b6dfdcf839ef751634cd2bfb |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@132589
/frameworks/base/core/res/AndroidManifest.xml
|
3dec7d563a2f3e1eb967ce2054a00b6620e3558c |
|
03-Mar-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //depot/cupcake/@137055
/frameworks/base/core/res/AndroidManifest.xml
|
3001a035439d8134a7d70d796376d1dfbff3cdcd |
|
19-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@132276
/frameworks/base/core/res/AndroidManifest.xml
|
d24b8183b93e781080b2c16c487e60d51c12da31 |
|
11-Feb-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@130745
/frameworks/base/core/res/AndroidManifest.xml
|
22f7dfd23490a3de2f21ff96949ba47003aac8f8 |
|
20-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@127101
/frameworks/base/core/res/AndroidManifest.xml
|
b798689749c64baba81f02e10cf2157c747d6b46 |
|
10-Jan-2009 |
The Android Open Source Project <initial-contribution@android.com> |
auto import from //branches/cupcake/...@125939
/frameworks/base/core/res/AndroidManifest.xml
|
f013e1afd1e68af5e3b868c26a653bbfb39538f8 |
|
18-Dec-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Code drop from //branches/cupcake/...@124589
/frameworks/base/core/res/AndroidManifest.xml
|
54b6cfa9a9e5b861a9930af873580d6dc20f773c |
|
21-Oct-2008 |
The Android Open Source Project <initial-contribution@android.com> |
Initial Contribution
/frameworks/base/core/res/AndroidManifest.xml
|