877 Commits

Author SHA1 Message Date
Billy Lau
22b3f4cb15 Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
Raised the protection level of WRITE_SETTINGS permission to appop and also
allowed backwards compatibility with pre23 flag. Also made sure that this
permission is not added as RuntimePermission in DefaultPermissionGrantPolicy as
that breaks a lot of gmscore stuff.

Introduced new action to manage write system settings as a new API and
renamed the string that describes the managing of overlay permission.

Change-Id: Ifd25a6ddc06de68ee37015cb9fb23452e4ef10f4
2015-07-12 22:41:00 +01:00
Etan Cohen
3e639057b8 Merge "Add ACCESS_IMS_CALL_SERVICE hidden permission." into mnc-dev 2015-07-08 04:02:08 +00:00
Dianne Hackborn
a90c8def2c Add new "preinstalled" permission flag.
This allows you to specify that a permission can be granted to
any pre-installed system app (not just privileged ones).

And as long as I am doing this, clean up the old "system" permission
flag, renaming it to "privileged" which is what it really is today,
deprecating the old names.  And switch the platform's permission
declarations to use the new name.

Change-Id: Iabf484746af232144786851ec7fe90e3de9dddb2
2015-07-07 17:25:25 -07:00
Svetoslav
3e7d977ff7 Grant installer and verifier install permissions robustly
bug:22248271

Change-Id: I3a47ae9a112ba7d88b421fcb5f9651d1168ba7a5
2015-07-07 14:02:51 -07:00
Etan Cohen
bbf40aeab3 Add ACCESS_IMS_CALL_SERVICE hidden permission.
Bug: 17361897
Change-Id: I2b3ef57c647204d981ada9c8bd4f92fbbd3fc748
2015-07-07 09:10:54 -07:00
Billy Lau
c81ecb6d2c Merge "Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission" into mnc-dev 2015-07-07 00:27:33 +00:00
Billy Lau
d6b404c72d Bug: 21589105 Rescope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW permission
Raised the protection level of WRITE_SETTINGS permission to appop and also
allowed backwards compatibility with pre23 flag.

Introduced new action to manage write system settings as a new API and
renamed the string that describes the managing of overlay permission.

Change-Id: I939a95b9a8b1ae75bf67aa6d8190c92a8d2001d3
2015-07-07 00:27:53 +01:00
Jeff Sharkey
32e80d7588 Permission to view shared storage for all users.
Typical apps are restricted so they can only view shared storage
belonging to the user they're running as.  However, a handful of
system components need access to shared storage across all users,
such as DefaultContainerService and SystemUI.

Since WRITE_MEDIA_STORAGE already offers this functionality by
bypassing any FUSE emulation, reuse it to grant the "sdcard_rw" GID
which is no longer handed out to third-party apps.  Then we change
the FUSE daemon to allow the "sdcard_rw" GID to see shared storage
of all users.

Bug: 19995822
Change-Id: I504c2a179ba74f142ed0d32da5baa69f4212cd82
2015-07-06 10:54:28 -07:00
Dianne Hackborn
76664d9dcf Merge "Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW..." into mnc-dev 2015-07-01 22:21:10 +00:00
Dianne Hackborn
de15edaa9b Work on issue #21589105: Scope WRITE_SETTINGS and SYSTEM_ALERT_WINDOW...
...to an explicit toggle to enable in Settings

Add a new permission flag, saying the permission can be automatically
granted to pre-api-23 apps.  Apply this to SYSTEM_ALERT_WINDOW.

Change-Id: I24a0ceabe7e9f5e458a864d30eda2696ad14a699
2015-07-01 12:37:00 -07:00
Svet Ganov
22233b51c3 Merge "Remove the empty accounts group and not needed storage resources." into mnc-dev 2015-07-01 02:32:50 +00:00
Billy Lau
f62f4c94a3 Merge "Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle to be manually enabled in Settings." into mnc-dev 2015-06-30 09:05:34 +00:00
Svet Ganov
ca2c590ba3 Remove the empty accounts group and not needed storage resources.
bug:22044480

Change-Id: I76297f5540614301893871b3b41219002076b920
2015-06-29 10:19:07 -07:00
Svet Ganov
a508bf8ba2 Revert get accounts permission to normal for now
Change-Id: I51efe557b69a50d85dc53ba7a1622b7bafc301e6
2015-06-26 10:25:02 -07:00
Billy Lau
cbe540f946 Bug: 21589105 Rescoping the SYSTEM_ALERT_WINDOW permission to an explicit toggle
to be manually enabled in Settings.

Raised the protection level of SYSTEM_ALERT_WINDOW from dangerous to
system|signature|appop. Added a new API in Settings for developers to invoke
the main configuration setting. Also added a new metrics in MetricsLogger.
Finally, also made changes to PhoneWindowManager to check the permission to draw
overlay properly.

Change-Id: I4a073e6f038b8b8d2fa5bd6ad60abda496be9701
2015-06-26 16:59:41 +01:00
Svetoslav
71b6ca6d43 Add JavaDoc for permission protection level
1. Add the permission protection level in the java doc

2. Make some system permissions that are not mean to be
   used by third-parties system API.

bug:21402257

Change-Id: Ic0ae8d6ca44dbbbf12848a9164acc0e908c90402
2015-06-25 18:19:19 -07:00
Svetoslav
c5e43c508f Only current IME and spell checker can access user dictionary
Change-Id: I6c5716d4d6ea9d5f55a71b6268d34f4faa3ac043
2015-06-24 00:56:44 +00:00
Svetoslav Ganov
2c99ea3524 Merge "Remove not needed contacts related permissions." into mnc-dev 2015-06-23 23:04:20 +00:00
Svetoslav Ganov
6d2c0e5ee2 Remove not needed contacts related permissions.
This reverts commit ed5ff51b2ca7c051e2719dfc8a8a083e6208848e.

Change-Id: If2407e4e474a438d95e1b7ad1aa6f441bb3ace08
2015-06-23 23:03:55 +00:00
Adam Lesinski
8144aa2e9a Merge "Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS" into mnc-dev 2015-06-23 21:37:20 +00:00
Adam Lesinski
f374a4bc2a Allow system apps to be granted android.permission.PACKAGE_USAGE_STATS
Bug:22008542
Change-Id: Ifb4565ec8077e88596f0304328c083c7d1c9db04
2015-06-23 14:15:04 -07:00
Bart Sears
1ef23adef8 Merge "Revert "Remove not needed contacts related perissions."" into mnc-dev 2015-06-23 06:18:20 +00:00
Bart Sears
ed5ff51b2c Revert "Remove not needed contacts related perissions."
Broke the build, reverting.

This reverts commit a2991da0d671adf511ccb884cf25bf1241303f92.

Change-Id: I2bdfa70fbd8a6c03e48426f85eeb63896762d5da
2015-06-23 06:16:25 +00:00
Svet Ganov
2b5bec9356 Merge "Remove not needed contacts related perissions." into mnc-dev 2015-06-23 04:00:06 +00:00
Adam Powell
4c470d641c Add voice interaction support to ResolverActivity/ChooserActivity
All options are sent to the VoiceInteractor once ChooserTargetServices
have reported in. We don't perform explicit progressive refinement or
filtering, but an explicit option picked will be invoked.

Also fix a lingering bug around being able to nested-fling the
resolver drawer closed.

Bug 21516866

Change-Id: I6b141f5fa87d74dccec9dcb88110630696e9c38e
2015-06-22 18:11:10 -07:00
Svet Ganov
a2991da0d6 Remove not needed contacts related perissions.
Removing the read/write profile/social stream permissions as they
are not needed anymore. These permissions are for accessing data
nested in the conacts provider which is already guaded by the
read/write contacts runtime permissions. The removed permissions
would be in the contacts group which means they would not provide
more protection compated to read/write contacts. Also removing
the permissions voids the need for app op support for legacy apps.

Removed deprecated APIs for social streams as these were deprecated
and will go away in the next release. We want apps targeting M to
not be able to compile if still suing these APIs to help with
migration.

Change-Id: I26ed9055847af7f92c78eb0f4ac8f9f1aa616fcd
2015-06-22 13:20:55 -07:00
Rubin Xu
c54bcade1b Merge "New internal permission to protect apps against rogue Nfc message." into mnc-dev 2015-06-22 15:44:51 +00:00
Svet Ganov
d8e247db8c Make READ_EXTERNAL_STORAGE dangerous
We have a new storage permission group that has read and
write external storage. However, read external storage is
(not a regression) a normal permission while write is a
dangerous one. This leads to cases where the user disables
the Storage permission and apps still read form it. This
change makes read external storage a dangerous permission.

bug:21949045

Change-Id: I7e28f629dda6e9c1f70cb20a3d5bea74fb109890
2015-06-19 23:57:52 -07:00
Hyunyoung Song
95499dcbb4 Merge "Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit" into mnc-dev 2015-06-19 23:07:53 +00:00
Hyunyoung Song
8a1533ed2e Change com.android.launcher.permission.INSTALL_SHORTCUT permission to normal level
https://docs.google.com/document/d/12H0b6R2tmyIoNoOs2t8PbyzlGFcbxT8OnGpRb6P6c6s/edit

b/21853008

Change-Id: If9c4e88fd2074de17814120d111546d6ecf58cf4
2015-06-19 15:27:42 -07:00
Rubin Xu
1213487aa7 New internal permission to protect apps against rogue Nfc message.
Bug: 19838376
Change-Id: Id23f6d14ce8d93988e4382ea0d0dc5c586456bf7
2015-06-19 20:38:43 +01:00
Pierre Vandwalle
0b00db8eeb Merge "create Wifi PNO ALARM intent" into mnc-dev 2015-06-18 23:13:19 +00:00
Todd Kennedy
f29c4a07f4 Merge "Add getPackageImportance() system API" into mnc-dev 2015-06-18 22:37:40 +00:00
Todd Kennedy
69810483c7 Add getPackageImportance() system API
Callers must have the permission GET_PACKAGE_IMPORTANCE

Bug: 20642684
Change-Id: I6f3ef2ec810c884e0dee239e5909bcb314957302
2015-06-18 15:27:44 -07:00
Alan Viverette
15d48a16f6 DO NOT MERGE: Remove DayNight theme
Do not go gentle into that good night,
Old age should burn and rave at close of day;
Rage, rage against the dying of the light.

Though wise men at their end know dark is right,
Because their words had forked no lightning they
Do not go gentle into that good night.

Bug: 21854466
Change-Id: I0b7cd116c23f7df88e94f31b3aee7dd22a102804
2015-06-18 15:15:16 -07:00
Pierre Vandwalle
b6ca937abe create Wifi PNO ALARM intent
Change-Id: I9bdae8ae37e30d36bf82b731468b8a157bb2862b
2015-06-18 14:48:39 -07:00
Craig Lafayette
b4c469095f Merge "Remove FRP wipe support for device initializers" into mnc-dev 2015-06-18 15:44:49 +00:00
Yorke Lee
107c4ce2ac Send broadcast when default dialer changes
Add hidden TelecomManager.setDefaultDialer for system apps
to set the default dialer and trigger the broadcast

Bug: 21846308
Change-Id: Ifdd30cd1323ab0157edf7fd966173b6c52df6ba0
2015-06-15 12:36:09 -07:00
Svetoslav
6d9778328a Merge "Remove bookmarks provider and associated permissions - framework" into mnc-dev 2015-06-14 20:01:02 +00:00
Svet Ganov
353d0ef935 Revert write secure settings permission protection level.
bug:21619456

Change-Id: I31212d3677b74fbf26b2d9eb222a2a8132de2271
2015-06-12 00:28:47 -07:00
Svet Ganov
033a68fe27 Lower protection level of WiFi state change permissions.
bug:21724236

Change-Id: Ib2305bf8a6be62fe6b00d9bccc7685100edba9ba
2015-06-11 20:04:11 -07:00
Svetoslav
bfa216ac26 Remove bookmarks provider and associated permissions - framework
Change-Id: I7f5a2f14a12da473f05a5075d98e762f8f8ed970
2015-06-11 18:59:25 -07:00
Svet Ganov
6f918b2f92 Merge "Add new storage permission group" into mnc-dev 2015-06-12 01:40:24 +00:00
Svet Ganov
55fd0a702d Merge "Bump up the protection level of the CLEAR_APP_CACHE permission" into mnc-dev 2015-06-12 01:36:59 +00:00
Svet Ganov
592d3d35a6 Merge changes Ic643bc07,I4bef927b into mnc-dev
* changes:
  Lower protection level of the dangerous Bluetooth permissions
  Update sensors permission group name string
2015-06-12 01:36:27 +00:00
Svet Ganov
a83d3eaf05 Bump up the protection level of the CLEAR_APP_CACHE permission
This permission guards only hidden and system APIs, hance it
should be signatureOrSystem protection level.

Change-Id: I8d2b75167c6887a285af0b494c39b4ffea2f0cbf
2015-06-11 18:34:31 -07:00
Svet Ganov
d81897d023 Lower protection level of the dangerous Bluetooth permissions
bug:21594947

Change-Id: Ic643bc0768b0fc9adcc3e07661ee34fa59f4ec35
2015-06-11 18:24:30 -07:00
Carlos Valdivia
b3c134e161 Merge "Revert "Revert "Permissions: Fix account related permissions.""" into mnc-dev 2015-06-11 21:18:03 +00:00
Carlos Valdivia
6eb73a5778 Revert "Revert "Permissions: Fix account related permissions.""
This reverts commit dcddc476651deb72a27798de56eef584e5be5d32.

Change-Id: Ie2402167fc7cd3d5e57bf2fba704fdf00cfcb4fe
2015-06-11 14:10:04 -07:00
Amit Mahajan
02184244dc Merge "Change to add STK_PERMISSION for stk related commands." into mnc-dev 2015-06-11 20:26:41 +00:00