1687 Commits

Author SHA1 Message Date
Neil Fuller
c55590c810 Add Shell permission to support manual testing
Add android.permission.SUGGEST_TELEPHONY_TIME_AND_ZONE to the shell
process to enable command-line injection of time zone suggestions to the
time_zone_detector service.

Shell already has permissions like SET_TIME_ZONE that allow the time
zone to be set directly, so this is not a security regression.

Bug: 227337462
Test: adb shell cmd time_zone_detector suggest_telephony_time_zone --slot_index 0 --zone_id Europe/London --quality single --match_type country
Ignore-AOSP-First: Merge conflict, AOSP cherry-pick will land after
Change-Id: I377cab85a1b39ef2887b452d1ffcdc5b00a8d5ab
2022-03-30 13:28:01 +00:00
arangelov
556bc1a363 Add ACCESS_PDB_STATE to shell permissions
This is needed for CtsPersistentDataBlockManagerTestCases

Bug: 220030410
Test: none
Change-Id: I8d3e75caa1eece052d5495fc06c8beb3ca76b480
2022-03-29 18:17:11 +00:00
Seth Moore
14e9f41072 Merge "DO NOT MERGE Add new privileged permission for unique id attestation" into tm-dev 2022-03-29 15:04:06 +00:00
Seth Moore
4d8825e4da DO NOT MERGE Add new privileged permission for unique id attestation
This permission will eventually replace the sepolicy that we have now,
making it possible to test unique id attestation, which is no longer
possible due to the deprecation of shared uids.

Skipping automerger because the framework manifest has diverged too
much across aosp and tm-dev to allow for clean auto merges, and
presubmits block.

Test: KeyAttestationTest
Bug: 216778747
Change-Id: Iecde35b9a79456b293118d8089dd2a3b0905f5f3
2022-03-25 10:21:40 -07:00
Alex Johnston
f7a1a20815 Require TRIGGER_LOST_MODE permission for sendLostModeLocationUpdate
Changes:
* Use TRIGGER_LOST_MODE permission to gate the
  DevicePolicyManager API sendLostModeLocationUpdate

Bug: 223148704
Test: atest android.devicepolicy.cts.LostModeLocationTest
Change-Id: If15388a377c75b7581c9c2a35b3d9828f78e13fc
Merged-In: If15388a377c75b7581c9c2a35b3d9828f78e13fc
2022-03-24 12:29:28 +00:00
Rubin Xu
a4131c50d0 Secure REMOTE_BUGREPORT_DISPATCH
In remote bugreport collection, Shell sends REMOTE_BUGREPORT_DISPATCH to
DevicePolicyManagerService which in turn notifies Device Owners that a
bug report is ready for collection. There existed a threat where a
malicous user could spoof the REMOTE_BUGREPORT_DISPATCH broadcast via
ADB to send a crafted bugreport to the Device Owner. Securing
REMOTE_BUGREPORT_DISPATCH is not as easy as it appears: putting a
permission on REMOTE_BUGREPORT_DISPATCH does not work since both the
legitimate sender and the malicious user are UID_SHELL. Instead, we
introduces a nonce which was sent from DPMS to Shell when bugreport is
triggered, and DPM will only accept REMOTE_BUGREPORT_DISPATCH when
a matching nonce is seen.

Ignore-AOSP-First: security fix

Bug: 171495100
Test: atest DeviceOwnerTest#testRemoteBugreportWithTwoUsers
Test: atest DeviceOwnerTest#testAdminActionBookkeeping
Test: atest BugreportManagerTest
Change-Id: I7649b4f22b74647d152d76bb46d5ca70bfa3617d
2022-03-22 12:28:36 +00:00
Jack He
9d8b6c7b32 Merge "Shell: Grant BLUETOOTH_PRIVILEGED permission to Shell" am: 69e560995c am: eada5871f4 am: 384882aada
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/2031463

Change-Id: Id694d0b7240a3ffb757b9ba0f87469b97aca0dd8
2022-03-19 00:55:12 +00:00
Jack He
fedd79c9d7 Shell: Grant BLUETOOTH_PRIVILEGED permission to Shell
* So that we can run CTS test with Shell permission

Bug: 225250442
Test: make
Change-Id: I9bf52d9325732c8ea1fef102591da1198b8c4fae
2022-03-18 00:33:22 -07:00
Etan Cohen
19b2879e24 Merge "Add MANAGE_WIFI_INTERFACES to the shell permission" am: dc2f8bfaee am: 8dcf52fdd9 am: ab6b6abfcd
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/2021397

Change-Id: I9356201e6a6817e3ab69c196e2f86ab622cc4c53
2022-03-15 00:21:17 +00:00
Etan Cohen
dc2f8bfaee Merge "Add MANAGE_WIFI_INTERFACES to the shell permission" 2022-03-14 23:03:25 +00:00
TreeHugger Robot
78a0333f67 Merge "Add a system API to make a package become visible to other package" into tm-dev 2022-03-11 05:21:08 +00:00
Rhed Jao
829792d752 Add a system API to make a package become visible to other package
Expose a system API PackageManager#makeUidVisible for
mainline module to make a package become visible to the caller.

Bug: 222205552
Test: atest AppEnumerationTests
Test: atest PermissionPolicyTest
Ignore-AOSP-First: (for packages/Shell/AndroidManifest.xml) Permission
Change-Id: I6cf322ddfea09a8a4c0c442a6789af4e79d294d7
2022-03-11 10:53:08 +08:00
Oscar Shu
6793c6fd69 Merge "Rename MANAGE_WIFI_AUTO_JOIN to MANAGE_WIFI_NETWORK_SELECTION" am: 2349f6f641 am: 64c4227b11 am: c917ab08d9
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/2019225

Change-Id: If94a79731f5a7605717e10cf978f9c42b78cea11
2022-03-11 01:32:42 +00:00
Etan Cohen
bee32e37f6 Add MANAGE_WIFI_INTERFACES to the shell permission
Enable CTS validatio of the protected APIs.

Bug: 223512835
Test: builds
Change-Id: Ie34564e2bc09937636629b395cc303b1f2c0a537
2022-03-10 22:23:32 +00:00
xshu
b869dbaee6 Rename MANAGE_WIFI_AUTO_JOIN to MANAGE_WIFI_NETWORK_SELECTION
Change to request for the updated permission.

Bug: 219947411
Test: compile
Change-Id: Iaf31a24080961a5e224bbd3871649fe7694dc3a5
2022-03-09 16:04:55 -08:00
kholoud mohamed
53a01ab1ed Add new permission PROVISION_DEMO_DEVICE
The new permission allows holders to provision a demo device as a fully
managed device.

Bug: 222476910
Test: N/A
Change-Id: Ie36b05d62a8972a142d5b9b8792b0e59dd1f5602
2022-03-03 17:04:13 +00:00
Treehugger Robot
cc2d08db85 Merge "Add shell permission for CTS test" am: 94dd832f60 am: 24d521a6bb am: a72c59093b
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1972639

Change-Id: Icabb84612057b380a581236d7e638d687589bf2e
2022-02-24 08:02:20 +00:00
Treehugger Robot
24d521a6bb Merge "Add shell permission for CTS test" am: 94dd832f60
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1972639

Change-Id: Iefb4d5932bbd0e3b2a3f80e8b23fc4f247bfdd63
2022-02-24 07:17:26 +00:00
Brian Lindahl
ee41663e2c Add shell permission for CTS test
The MEDIA_RESOURCE_OVERRIDE_PID permission is needed to create codecs on
behalf of other processes for correct MediaCodec resource reclaiming
behavior.

Bug: 217746837
Test: atest MediaCodecResourceTest
Change-Id: I75f2b33f7fee6d6e84ed7aec94eccd8aee5e4b20
2022-02-23 20:29:53 +00:00
Xiaowen Lei
a650c2c4b7 Add role guarded APIs for subscribing to keyguard locked state in KeyguardManager.
Bug: 216630470
CTS-Coverage-Bug: 220371902
Test: manual
Test: atest CtsAppTestCases:KeyguardLockedStateApiTest
Ignore-AOSP-First: (for packages/Shell/AndroidManifest.xml) Permission
not yet publicly announced.

Change-Id: I1f44ec6799b0f74791613389ce28aadf84c9fe5c
2022-02-19 03:48:40 +00:00
Hunter Knepshield
6297982e45 Merge "Give shell BIND_TELECOM_CONNECTION_SERVICE for CTS" 2022-02-17 18:55:25 +00:00
Treehugger Robot
08155b3fd2 Merge "p2p: add MANAGE_WIFI_AUTO_JOIN permission for CTS external approver tests" am: 2a491d487f am: 7faee6e286 am: 3cf3a321e6
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1985827

Change-Id: Iaec2d433251d6ea1a3c9ece2f73c1202e510fbb2
2022-02-17 05:40:42 +00:00
Treehugger Robot
7faee6e286 Merge "p2p: add MANAGE_WIFI_AUTO_JOIN permission for CTS external approver tests" am: 2a491d487f
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1985827

Change-Id: If981308b6291b0df9c250020aea410b343b12e2b
2022-02-16 23:18:31 +00:00
Jimmy Chen
6d7c9fa967 p2p: add MANAGE_WIFI_AUTO_JOIN permission for CTS external approver tests
Wi-Fi Direct external approver APIs require MANAGE_WIFI_AUTO_JOIN
permission and CTS tests need to use Shell to invoke these
privelege APIs.

Bug: 218166551
Bug: 159038892
Test: atest ConcurrencyTest
Change-Id: Ia5c1c749e38fe94992c6364d0fd6117707834eb5
2022-02-16 12:00:16 +08:00
Xin Li
5ad6db7742 Merge sc-v2-dev-plus-aosp-without-vendor@8084891
Bug: 214455710
Merged-In: I8cfa435bb6233818adb9cc99dadeeb06a03443d5
Change-Id: Ib93992d88fd1704179009a3872798b9e7b83a6d1
2022-02-11 07:25:43 +00:00
Kathy Chen
17a4a4e2ff Fix a bug where after the client calls startConsentActivity(), the framework is not loading the test activity as expected. Add permission to shell for cts test.
Test: end-to-end test with dev aiai and wellbeing apks
Bug: 218708840
Change-Id: Ia1c6a3575d85df274b4e6fcbed4881e576fcbfac
Ignore-AOSP-First: to prevent new feature leak.
2022-02-10 23:59:25 +00:00
Kyeongkab.Nam
5e4c395cdb Guard TIF vendor extension APIs by new permission
Guard TvInputManager#getAvailableExtensionInterfaceNames() and
TvInputManager#getExtensionInterface() by
android.Manifest.permission.TIS_EXTENSION_INTERFACE.

Bug: 215189795
Bug: 193052431
Test: run cts -m CtsTvTestCases -t
android.media.tv.cts.TvInputManagerTest

Change-Id: I43d4f063b0a602f00f7f71e8fe08fb09c7a763bf
2022-02-07 12:19:54 -08:00
Dave McCloskey
994e4e4b70 Merge "Add TRUST_LISTENER to the shell for use in CTS tests" am: f4a4508e64 am: 9845deb4e9 am: 911482e768 am: 1a22e966e5
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1962480

Change-Id: Icfd3343b7a629878201f04013afa3d9dfc4f499a
2022-02-05 00:09:28 +00:00
Dave McCloskey
911482e768 Merge "Add TRUST_LISTENER to the shell for use in CTS tests" am: f4a4508e64 am: 9845deb4e9
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1962480

Change-Id: I1e44c4359dabe2333353f55e0c42afe04efedc78
2022-02-04 23:28:44 +00:00
Dave McCloskey
f4a4508e64 Merge "Add TRUST_LISTENER to the shell for use in CTS tests" 2022-02-04 22:58:26 +00:00
Peiyong Lin
817d4a78eb Allow Shell to access MANAGE_GAME_ACTIVITY.
Allow Shell to have MANAGE_GAME_ACTIVITY permission in order to run CTS.

Bug: b/202414447
Test: atest GameServiceTest
Ignore-AOSP-First: not-yet-published new permission.
Change-Id: I11a64d4e2819e5a94ae59d280eaa165dce51f518
2022-02-04 08:00:27 +00:00
Maciej Żenczykowski
1ff3c31349 Merge "Revert "Allow Shell to access MANAGE_GAME_ACTIVITY."" 2022-02-04 02:43:44 +00:00
Michael Eastwood
8563bb2bd3 Revert "Allow Shell to access MANAGE_GAME_ACTIVITY."
This reverts commit 9d9268e635310b61fe52af753ff8dbc57484dfd6.

Reason for revert: DroidMonitor: Potential culprit for Bug b/217792792 - verifying through ABTD before revert submission. This is part of the standard investigation process, and does not mean your CL will be reverted.

Change-Id: I8f0f469a8fd83b8096e2d2c595a588a762443a88
2022-02-04 01:21:02 +00:00
Peiyong Lin
2a3f3807aa Merge "Allow Shell to access MANAGE_GAME_ACTIVITY." 2022-02-03 22:54:38 +00:00
Treehugger Robot
698279f7d4 Merge "Add NEARBY_WIFI_DEVICES to shell permissions for CTS" am: 5d4effbd23 am: e4ee7f0e2e am: c144be7ef4 am: 0ff22a2817
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1966019

Change-Id: Iefec7643bc26a244a107eaadda7b55667258dd8e
2022-02-03 02:37:36 +00:00
Treehugger Robot
c144be7ef4 Merge "Add NEARBY_WIFI_DEVICES to shell permissions for CTS" am: 5d4effbd23 am: e4ee7f0e2e
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1966019

Change-Id: I20ad89d1047717a8c5df66581be7014e3d10631e
2022-02-03 02:06:03 +00:00
Treehugger Robot
5d4effbd23 Merge "Add NEARBY_WIFI_DEVICES to shell permissions for CTS" 2022-02-03 00:51:24 +00:00
Peiyong Lin
9d9268e635 Allow Shell to access MANAGE_GAME_ACTIVITY.
Allow Shell to have MANAGE_GAME_ACTIVITY permission in order to run CTS.

Bug: b/202414447
Test: atest GameServiceTest
Ignore-AOSP-First: not-yet-published new permission.
Change-Id: I595c3b36c79c08b6c4092b6eb3fad8f704a11d65
2022-02-02 23:51:35 +00:00
Antonio Kantek
3237ec6669 Merge "(TouchMode Permission) Update shell permission" am: 9d625f5392 am: 74927c2995 am: 952554a16f am: 822f1965c5
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1959747

Change-Id: I3e3075eea443242d67ce9f05156b379772e467fe
2022-02-01 23:28:36 +00:00
Antonio Kantek
952554a16f Merge "(TouchMode Permission) Update shell permission" am: 9d625f5392 am: 74927c2995
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1959747

Change-Id: I8d44811b771bb7ddc2c3e61b5d7567ef064869e7
2022-02-01 21:32:00 +00:00
Antonio Kantek
e06f3d2e3f (TouchMode Permission) Update shell permission
Update shell permission with MODIFY_TOUCH_MODE_STATE

Bug: 198487159
Test: manual
Change-Id: Ib5d5fd6298f281fe1339781026f4a2f471267747
2022-02-01 17:00:54 +00:00
xshu
a8460ad918 Add NEARBY_WIFI_DEVICES to shell permissions for CTS
Bug: 197776854
Test: build
Change-Id: I51f8441e3744a4137042abe602d700a4ab757fe1
2022-01-28 17:05:48 -08:00
Robert Horvath
5dfac22224 Merge changes from topics "low-power-standby-api", "lps-wakelock-testapi"
* changes:
  Add API to configure LPS maintenance mode behavior
  Add TestApi to force Low Power Standby to be active
  Add TestApi wakelock flag to have system acquire wakelock
  Allowlist active voice interaction session from Low Power Standby
  Introduce Low Power Standby API and wakelock restrictions
2022-01-28 12:27:05 +00:00
Robert Horvath
570645567f Introduce Low Power Standby API and wakelock restrictions
In Low Power Standby, additional restrictions are placed on apps that
are in a process state of FOREGROUND_SERVICE or less important
during standby (while the device is non-interactive):
- Wakelocks are disabled
- Network access is blocked
During doze maintenance windows the restrictions are lifted temporarily.

This change introduces the APIs for Low Power Standby, as well as
the wakelock restrictions.

This feature is targeting TVs. To prevent Low Power Standby from being
enabled on other devices, the feature is guarded by the config flag
config_lowPowerStandbySupported.

Bug: 190822356
Test: atest LowPowerStandbyControllerTest PowerManagerServiceTest
Ignore-AOSP-First: New permission only added internally for now.
Change-Id: Ia40f8a0fc4b366860af58ad76c988f93a5d41936
2022-01-27 23:08:26 +01:00
Shannon Chen
33b42f50df Merge "Add a test API allowing overriding the GameService provider." 2022-01-27 18:03:46 +00:00
Maurice Lam
f214e0d92e Merge "Make ADD_TRUSTED_DISPLAY and ADD_ALWAYS_UNLOCKED_DISPLAY "role"" 2022-01-27 17:45:42 +00:00
Evan Chen
bf9a16b7f5 Merge "Add computer permission to Shell's allowlist" 2022-01-27 06:57:35 +00:00
Calvin Pan
2801e6de4f Merge changes Ib484fc0c,I2b9ff69c,I0a31b117,I888c65c8,I03723cfe, ...
* changes:
  Clean <plurals> in DateTimeView
  Clean <plurals> in CertificateMonitor
  Clean <plurals> in FillUi
  Clean <plurals> in BugreportProgressService
  Clean <plurals> in keyguard
  Clean <plurals> in ChooserActivity
  Clear <plurals> in TextUtils
  Clean <plurals> in FindActionModeCallback
  Clean <plurals> in ZenModeConfig
  Add util class for plurals
2022-01-27 06:31:58 +00:00
Dave McCloskey
e0b7e861cd Add TRUST_LISTENER to the shell for use in CTS tests
Bug: 213631677
Test: m

Change-Id: I66eced84399147c4f182d250cd64598794b9c93b
2022-01-27 00:48:14 +00:00
Nate(Qiang) Jiang
1ce97f91ca Merge "Add OVERRIDE_WIFI_CONFIG permission to Shell for CTS" am: dbe634a784 am: 93be545cde am: 8a4f65b48b am: e2f51cb6fc
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1959813

Change-Id: I5f937570a060cc33af62635efa8ad0704ab053d2
2022-01-26 21:44:47 +00:00