835 Commits

Author SHA1 Message Date
Svet Ganov
033a68fe27 Lower protection level of WiFi state change permissions.
bug:21724236

Change-Id: Ib2305bf8a6be62fe6b00d9bccc7685100edba9ba
2015-06-11 20:04:11 -07:00
Svet Ganov
6f918b2f92 Merge "Add new storage permission group" into mnc-dev 2015-06-12 01:40:24 +00:00
Svet Ganov
55fd0a702d Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev 2015-06-12 01:36:59 +00:00
Svet Ganov
592d3d35a6 Merge changes Ic643bc07,I4bef927b into mnc-dev
* changes:
  Lower protection level of the dangerous Bluetooth permissions
  Update sensors permission group name string
2015-06-12 01:36:27 +00:00
Svet Ganov
a83d3eaf05 Bump up the protection level of the CLEAR_APP_CACHE permission
This permission guards only hidden and system APIs, hance it
should be signatureOrSystem protection level.

Change-Id: I8d2b75167c6887a285af0b494c39b4ffea2f0cbf
2015-06-11 18:34:31 -07:00
Svet Ganov
d81897d023 Lower protection level of the dangerous Bluetooth permissions
bug:21594947

Change-Id: Ic643bc0768b0fc9adcc3e07661ee34fa59f4ec35
2015-06-11 18:24:30 -07:00
Carlos Valdivia
b3c134e161 Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev 2015-06-11 21:18:03 +00:00
Carlos Valdivia
6eb73a5778 Revert "Revert "Permissions: Fix account related permissions.""
This reverts commit dcddc476651deb72a27798de56eef584e5be5d32.

Change-Id: Ie2402167fc7cd3d5e57bf2fba704fdf00cfcb4fe
2015-06-11 14:10:04 -07:00
Amit Mahajan
02184244dc Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev 2015-06-11 20:26:41 +00:00
Carlos Valdivia
d0041e5f47 Merge "Revert "Permissions: Fix account related permissions."" into mnc-dev 2015-06-11 20:04:44 +00:00
Carlos Valdivia
dcddc47665 Revert "Permissions: Fix account related permissions."
This reverts commit ffb46022b30dffdf1cc4cbd08d4bcbe51e1f8814.

Change-Id: I4c62b1b5a5bd4e2a5fac76244a16730526ed67fc
2015-06-11 20:04:04 +00:00
Amit Mahajan
59acd140b6 Change to add STK_PERMISSION for stk related commands.
Bug: 21697171
Change-Id: I7649c7341428194963ac74e9ae622dfa76ea738b
2015-06-11 12:06:18 -07:00
Svet Ganov
db6ac98ec3 Merge "DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework b/20220885" into mnc-dev 2015-06-11 18:52:39 +00:00
Svet Ganov
9fb3c8826c DO NOT MERGE Remove SUBSCRIBED_FEEDS permissions from framework
b/20220885

Instead, move it to GSF:
ag/700092

SUBSCRIBED_FEEDS_READ/WRITE permissions guard the Content Provider
that stores sync feeds for 1p apps (Gmail, Claendar, etc).
The sync feeds are used for delivering and processing
GCM tickle-to-sync messages.

These permissions should not be used by 3rd parties but
if they were, this change will break them.

I don't know the reason these were not in GSF and 'signature'
to begin with. If someone does, please, comment.

Change-Id: I6c4e4c774fea12c7fe7082477c210ad75f007c66
2015-06-11 11:48:56 -07:00
Carlos Valdivia
ffb46022b3 Permissions: Fix account related permissions.
Requires updating the docs in AccountManaager as well as the logic in
AccountManagerService.

MANAGE_ACCOUNTS, USE_CREDENTIALS, and AUTHENTCATE_ACCOUNTS are going
away. Where AUTHENTCATE_ACCOUNTS was required we now do signature
matching.

GET_ACCOUNTS is kept but has been grouped under contacts.

Bug: 20136477
Change-Id: Iabbb76dce8d1efc607c1f107911d7ddab598a481
2015-06-11 11:07:47 -07:00
Craig Lafayette
77b2d49abb Merge "Remove device initializer status messages" into mnc-dev 2015-06-11 17:45:03 +00:00
Svet Ganov
ee7fb4d683 Add new storage permission group
bug:21730509

Change-Id: If098def755417a90f50328f83d5b419d9e73f120
2015-06-11 10:15:05 -07:00
Svetoslav
f7c06eb03a Add system API to watch for permission changes
Change-Id: I1ce450a59fb326c14848f46732d877dea33f33c7
2015-06-10 21:24:13 -07:00
Mike Lockwood
383ce580b1 Merge "MidiManager: proxy all requests to open devices through MidiService" into mnc-dev 2015-06-08 19:37:36 +00:00
John Spurlock
20ac61b8c0 Merge "Zen: New user flow for requesting DND access." into mnc-dev 2015-06-08 16:39:36 +00:00
John Spurlock
7c74f78a85 Zen: New user flow for requesting DND access.
- User flow is now similar to requesting access to notification
   content, namely prompting the user to visit a settings page
   for enabling/disabling apps access.
 - New ACTION_NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED intent
   for apps to listen to this state change.
 - Removed obsolete request method and associated internal callback
   aidl.
 - Added new android.permission.ACCESS_NOTIFICATION_POLICY permission
   for apps to include as a signal that they want to request this access
   (and therefore appear in the list on the settings page).
 - Improve javadocs, outline the user flow in NotificationManager#isNotificationPolicyAccessGranted
   and link to this method elsewhere.
 - NoManService now persists the user-enabled package list across reboots
   and does so per-user.
 - Rename public settings intent to correspond with the noman api.

Bug: 21621663
Change-Id: I72cbc21cd736e6a157b6be5d1d0ba0b4a8e7ef4e
2015-06-08 11:53:35 -04:00
Martijn Coenen
a2344eac37 Remove NFC CardEmulation dynamic resource APIs.
No longer needed.

Bug: 21343778
Change-Id: I5188c4bc819146861d346f3f4339f002b7173027
2015-06-05 10:45:50 +02:00
Mike Lockwood
e0a6ca64fa MidiManager: proxy all requests to open devices through MidiService
Previously when a MidiManager client opened a virtual or Bluetooth device,
the client bound directly to the virtual device's MidiDeviceService
or BluetoothMidiDevice's IMidiDeviceServer for the given BluetoothDevice.
Only USB devices were opened in MidiService.

Now opening any type of MIDI device is done via IMidiManager.openDevice() or
IMidiManager.openBluetoothDevice().  MidiService tracks all connnections between
clients and devices.

Services that implement virtual devices must now require android.permission.BIND_MIDI_DEVICE_SERVICE
so only MidiService can bind to these services.

Bug: 21044677

Change-Id: I7172f7b1e0cbfe4a2a87dff376c32dc9b41aa563
2015-06-04 19:16:23 -07:00
Amith Yamasani
ff3b76d046 Merge "Temporarily whitelist an app for network during doze" into mnc-dev 2015-06-02 20:34:59 +00:00
Amith Yamasani
af575b9f8e Temporarily whitelist an app for network during doze
API to allow an app to be whitelisted for network and wakelock
access for a short period. So even if the device is in idle
mode, such apps can be given a chance to download the payload
related to a high priority cloud-to-device message.

This API is meant for system apps only.

A new permission CHANGE_DEVICE_IDLE_TEMP_WHITELIST is required
to make this call.

Bug: 21525864
Change-Id: Id7a761a664f21af5d7ff55aa56e8df98d15511ca
2015-06-02 11:05:03 -07:00
Craig Lafayette
240e64828f Remove device initializer status messages
- Remove ManagedProvision Bluetooth extras from
  DevicePolicyManager
- Remove ManagedProvisioning device initializer status
  action and extras from DevicePolicyManager.
- Remove DIA status update protected-broadcast
  and permission
- Remove DPM.sendDeviceInitializerStatus method

Bug: 21559093
Change-Id: Ibb651ebb2772ace6a16a5830f82f75465150e6e3
2015-06-02 13:28:23 -04:00
Svetoslav
5f79d8282d Add accidentally deleted strings.
Change-Id: I16d7c151b46c076bfdccb1ff0b2bcb0934eedf93
2015-06-01 16:51:11 -07:00
Brian Attwell
8d38a8d84f Merge "Deprecate {READ,WRITE}_PROFILE permission" into mnc-dev 2015-05-28 17:36:36 +00:00
Svet Ganov
63428ccde7 Merge "Add a normal permission guarding the installer UI - used for stats tracking" into mnc-dev 2015-05-28 15:37:06 +00:00
Svet Ganov
86877e44f0 Add a normal permission guarding the installer UI - used for stats tracking
bug:2147009

Change-Id: Id020eaf7b852de43966f4ab8231e3f7046e66542
2015-05-28 08:33:45 -07:00
Brian Attwell
b97df269b5 Deprecate {READ,WRITE}_PROFILE permission
Now that *_PROFILE permissions are in the same permission
group as *_CONTACTS, these permissions have no visible
impact on the user. However, they complicate developer's
lives and prevent us from using Context#grantUriRequest().

Bug: 21090207
Change-Id: I31e6ae7b0f49c3589071f6a95f8d69a9456c144d
2015-05-27 19:36:02 -07:00
Svetoslav
59ffbc46f3 Allow priv apps to get local mac address
Change-Id: I550847cedd5a407c9424778e483b525d4b97e46d
2015-05-27 14:39:21 -07:00
Jorim Jaggi
d6bd9da8ef Lower fingerprint permission protection level
Bug: 21307136
Change-Id: Iafdb42c6a82b27a5297ad14ffaa289b14fffad23
2015-05-20 19:36:13 +00:00
Svet Ganov
408abf7f1b Do not report WiFi and Bluetooth MAC addresses - framework.
As a part of the new runtime permissions work we are limiting
the PII apps can access. BT and WiFi MAC addresses are PII and
based on our research there is no valid use case for app dev
to get these addresses aside of user tracking which we are
trying to limit.

bug:21078858

Change-Id: Ib48223b272c0fd4f5c36acc889d4f44df204b309
2015-05-18 15:14:24 -07:00
Svet Ganov
321f01574e Hide platform platform legacy permissions behind a menu option - framework.
bug:21195624

Change-Id: I563c448e2abd7d33070ed2d8f62ba1b60a3744e8
2015-05-16 22:52:33 -07:00
Zach Johnson
cdaaa91f7c Create unified BIND_CARRIER_SERVICES permission
Replace BIND_CARRIER_MESSAGING_SERVICE and
BIND_CARRIER_CONFIG_SERVICE since we don't really
need one permission for each carrier service type.

Deprecate BIND_CARRIER_MESSAGING_SERVICE since it
already shipped, but remove BIND_CARRIER_CONFIG_SERVICE
since it hasn't.

b/21165906

Change-Id: I716f3f1c98a228afcfee84cf4a48911f0736ce8c
2015-05-14 15:10:39 -07:00
Jaesung Chung
f5edb20ae9 Merge "TIF: Add DVB device handling to TvInputManagerService" into mnc-dev 2015-05-14 02:14:37 +00:00
Yorke Lee
ad0bfe3ae2 Merge "Add BIND_TELECOM_CONNECTION_SERVICE permission" into mnc-dev 2015-05-14 02:06:54 +00:00
Jaesung Chung
58739e7584 TIF: Add DVB device handling to TvInputManagerService
Added an API to pass an open file descriptor of DVB devices and
addressed the security issue of setting the permissions on DVB devices
to 0666.

Bug: 20436120
Change-Id: I4649e76084f3356ec22b7e776fb87c6a8fdc00d6
2015-05-14 02:00:06 +00:00
Yorke Lee
249c12e7b8 Add BIND_TELECOM_CONNECTION_SERVICE permission
Bug: 21088342
Change-Id: I465307899d83c4a3ee5e88a28554c4b867c1f4ba
2015-05-13 16:12:44 -07:00
Svet Ganov
f7e9cf4fb4 Access mock location is no longer a runtime permission - framework
The access mock location is no longer a runtime permission. It is a
signature protected one that apps cannot get but the fact they request
it means they want to inject location into the system. Now the user
gets to choose the current mock location app in developer options from
the apps that request the mock location permission. The access to mock
location is no longer guarded by the permisson but from a new app op
which is off by default and the settiings UI sets it to enabled only
for the currently selected mock location app.

bug:21078873

Change-Id: I19e3f9dc7c7de82eab46b30fec1abfbca54a0e59
2015-05-13 15:37:21 -07:00
Svet Ganov
b467330b14 Lower protection level of permissions of permissions
Permissions ACCESS_NETWORK_STATE, INTERNET, NFC, DISABLE_KEYGUARD
do not lead to unrecoverable damage and do not lead to PII leaks,
hence they do not meet the bar to be runtime permissions and we
are lowering their protection level.

bug:21078873

Change-Id: I30c8e742d6a69474171994b65ce070068402ae47
2015-05-12 20:50:17 -07:00
Zoltan Szatmary-Ban
11a1086f69 Merge "Improve javadoc on android.permission.PACKAGE_USAGE_STATS" into mnc-dev 2015-05-11 16:24:52 +00:00
Zoltan Szatmary-Ban
763e170f58 Improve javadoc on android.permission.PACKAGE_USAGE_STATS
Bug: 20642656
Change-Id: Ib0cedee487950dab16134edd383ce5bd5374ff65
2015-05-11 16:01:33 +00:00
Fyodor Kupolov
4f434a0470 Merge "Remove restrictions PIN functionality" into mnc-dev 2015-05-08 23:10:31 +00:00
Jeff Brown
c05c1aeedf Revert "Initial draft of new MediaRouter APIs."
This reverts commit 1a937b04e63539cb1fab1bde601031d415c7156f.

Bug: 20641986
Change-Id: I035d945d1561e5fc7c914aa9362635f763c83cfd
2015-05-06 16:02:21 -07:00
Fyodor Kupolov
ef24909d84 Remove restrictions PIN functionality
Bug: 20852231
Change-Id: I5666ee28ff1341ead9b258bc0852d8ba6d313c5e
2015-05-06 13:36:03 -07:00
Alan Viverette
b9da280ac2 DayNight theme for framework packages
Change-Id: I745f90561c957c83540e75a2886e294633c83be1
2015-05-05 14:09:21 -07:00
Svet Ganov
019d230499 Permission UI - legacy apps support
Change-Id: Id3f98c138422d33868363d587dd196898b42a0d4
2015-05-05 08:33:04 -07:00
Dianne Hackborn
0b4daca9ba Implement user-settable power save whitelist.
The whitelist is now maintained by DeviceIdleController,
which is moving out into its own independent system service.
Network stats now queries it for the whitelist, instead of
collecting that itself.

Also did a few improvements in alarm manager -- made the
code for moving alarms out of the pending list more robust,
and fixed the debug output to always print the contents of
the pending list even if we aren't in a pending state.  (That
would have helped me identify the problem much earlier.)

Change-Id: I0f7119d4c553c3af4d77b2f71246fa6e2c13c561
2015-04-29 12:38:09 -07:00