1360 Commits

Author SHA1 Message Date
Robin Lee
413dd36486 Give CONTROL_DEVICE_LIGHTS permission to the shell
Bug: 144979010
Bug: 144978691
Test: atest LightsManagerTest
Change-Id: I2b4224e79e013bae27ee068b0a0898b5afa5489a
2020-01-24 21:57:36 +01:00
Steven Ng
8f00f6a2ca Merge "Grant READ_DREAM_STATE & WRITE_DREAM_STATE permissions to shell" 2020-01-24 09:41:00 +00:00
TreeHugger Robot
4a4a32c8d7 Merge "Allow DownloadProvider to have WRITE_MEDIA_STORAGE." 2020-01-24 08:17:34 +00:00
TreeHugger Robot
12ce8338cc Merge "Add INTERACT_ACROSS_USERS permission for DocsUI" 2020-01-23 17:18:49 +00:00
Martijn Coenen
3585d12c0f Allow DownloadProvider to have WRITE_MEDIA_STORAGE.
It previously got this permission by sharing a UID with the
MediaProvider, but now that that has become a mainline module, ask for
it explicitly.

Bug: 146378784
Test: boots
Change-Id: I678efac65c8521ea9b7bec59aa193e637272cd57
2020-01-23 16:52:04 +01:00
Kelvin Kwan
f533034e77 Add INTERACT_ACROSS_USERS permission for DocsUI
Test: make aosp_x86_64-eng
Test: check INTERACT_ACROSS_USERS in /system/etc/permissions/com.android.documentsui.xml
Test: check INTERACT_ACROSS_USERS grant to DocumentsUI.apk
Test: atest DocumentsUITests:com.android.documentsui.PermissionsTest
Bug: 148198996
Change-Id: I6bcef56c508b3fad7a56cdc629089a36f4cdbec5
2020-01-23 15:35:16 +00:00
Steven Ng
38e58dea36 Grant READ_DREAM_STATE & WRITE_DREAM_STATE permissions to shell
This is required for ambient display tests.

NOTE: This CL is manually cherry-picked from aosp/1215115 due to
merge conflict.

Bug: 147874708
Test: Run newly added ambient display tests.
Change-Id: I61c28e15c4e5c3d0ffee4137ecb86e33f7e8f64d
2020-01-23 14:22:09 +00:00
Zim
7da9f80d6a Deprecate WRITE_MEDIA_STORAGE permission
Previously, this permission would give the holder the media_rw gid
thereby granting access to the following file paths on disk:
1. /data/media
2. /mnt/media_rw
3. /mnt/expand/<uuid>/data/media

With the introduction of a stacked FUSE filesystem on external
storage, modifying any files directly on the lower filesystem (the
paths listed above) could lead to VFS cache inconsistencies and file
corruption.

To mitigate this risk, this cl blocks unneeded access to the lower
filesystem. Apps relying on this permission should instead use
android.permission.MANAGE_EXTERNAL_STORAGE.

Test: cat /proc/<pid>/status of mediaprovider doesn't have media_rw
Bug: 144914977

Change-Id: I8335d18067231657ac9793f7b1dcf6adb617ecfc
2020-01-22 19:29:29 +00:00
Soonil Nagarkar
4c0b85ba06 Overhaul FusedLocationProvider
Fix some minor bugs and ensure fused location provider correctly
supports location bypass. This is especially important for when
location bypass is invoked in direct boot.

The added UPDATE_DEVICE_STATS permission is necessary for FusedLocation
to correctly update WorkSources. FusedLocation receives work from LMS and
then further delegates that work to other location providers. The other
location providers should be informed of the correct applications for
battery blame, and should not be blaming the FusedLocation package.
1) This is the minimally scoped permission necessary to battery blame
correctly.
2) There is no way to attribute battery blame without this permission.
3) This is the correct permission - as required by LocationManager, and
this permission will likely never be removed (FusedLocation will always
need to battery blame).

Test: atest FusedLocationTests
Change-Id: If7126fffaae5577ddf8e366a0b5c17b3e5286582
2020-01-22 17:22:54 +00:00
Automerger Merge Worker
b492f4e347 Merge "Remove CONNECTIVITY_INTERNAL permission" am: a785f7bf4c am: eb5bee128c am: dbbdc8b6f4
Change-Id: I691de648a1f99555423ec0ab04c0a68bb7ab5c81
2020-01-21 11:33:20 +00:00
Paul Hu
a785f7bf4c Merge "Remove CONNECTIVITY_INTERNAL permission" 2020-01-21 11:03:59 +00:00
Hall Liu
6392e2548d Merge "Add system service for accessing SystemConfig" 2020-01-20 21:34:28 +00:00
Treehugger Robot
046d939399 Merge changes from topic "apps_to_system_ext"
* changes:
  Move the app to /system_ext
  Set sdk_version "current" in test package
  Move the permission.xml to /system_ext
  Move SystemUI to /system_ext
  move privapp_whitelist_com.android.storagemanager to system_ext
  Move 'privapp_whitelist_com.android.launcher3' to system_ext
  Move 'privapp_whitelist_com.android.settings' to system_ext
  move privapp_whitelist_com.android.provision to system_ext
  privapp_whitelist_com.android.emergency to system_ext
  privapp_whitelist_com.android.carrierconfig to system_ext
2020-01-17 11:44:42 +00:00
Jeongik Cha
45ebd05bea Move the permission.xml to /system_ext
As mentioned in b/132780927, we plan to forbid hidden APIs usage in /product partition,
in other word, apps in /product are allowed to use only either public API or system API.
So, this app will be moved to /system_ext, of course, it is not permanent,
they can be moved back to /product if they don't use hidden API anymore.

Bug: 137908189
Test: m
Test: check whether device boots successfully
Change-Id: I623e0dcc1d3bc1a2a69a6cad34ace1f79532654e
Merged-In: I623e0dcc1d3bc1a2a69a6cad34ace1f79532654e
2020-01-17 09:15:53 +00:00
Ruchir Rastogi
25e6dd3ed1 Merge "Migrate DeviceCalculcatedPower pullers to new API" 2020-01-16 19:16:50 +00:00
Automerger Merge Worker
2a7b367d06 Merge "Replace CONNECTIVITY_INTERNAL in SystemUI" am: 3950a24dca am: 8d82c3cbd9 am: 8e92458626
Change-Id: Id94e38dafad3dd6a5316c53ba357a8004a7d7b9e
2020-01-16 07:58:53 +00:00
Paul Hu
3950a24dca Merge "Replace CONNECTIVITY_INTERNAL in SystemUI" 2020-01-16 07:23:17 +00:00
Jeongik Cha
e4ac0ac9ad Move SystemUI to /system_ext
we plan to forbid hidden API in product partition.
So this app should be moved to /system_ext because it uses hidden API.
It is not permanent, so they can be moved back to /product due to
needs if there isn't hidden usage anymore.

Bug: 137908189
Test: m
Test: check whether device boots successfully
Test: atest SystemUITests
Exempt-From-Owner-Approval: cherry-pick from internal
Change-Id: I54f86496d4a0045af3576091cce00e5cd285b4f8
Merged-In: I54f86496d4a0045af3576091cce00e5cd285b4f8
2020-01-16 06:50:41 +00:00
paulhu
f53b338e63 Remove CONNECTIVITY_INTERNAL permission
After check the usage of those apps who declared
CONNECTIVITY_INTERNAL permission, they don't access any API which
protected by CONNECTIVITY_INTERNAL. And CONNECTIVITY_INTERNAL
has been removed from their AndroidManifest.xml. So remove the
redudant permission from privapp-permissions-platform.xml.

Bug: 32963470
Test: build, flash, boot to home w/o any permission problem.
Change-Id: I3f31d16163e359b0b16f06129452a758ea149fc1
2020-01-16 14:33:38 +08:00
Heemin Seog
3f338317e7 Add new permission to privapp-permissions
Fix: 147751923
Test: manual
Change-Id: Iba966baa91558a57c1e1bd2809eaab05151ac13b
2020-01-15 23:43:59 +00:00
Ruchir Rastogi
5ea3163325 Migrate DeviceCalculcatedPower pullers to new API
As part of migrating the pullers to the new API, we modify
permission checks within BatteryStatsService. Previously, a Binder
thread within StatsCompanionService (with statsd's calling identity)
called BatteryStatsService functions, which was why statsd was assigned
the BATTERY_STATS permission. Now, that call is being made from the
system process Background thread. Because enforceCallingPermission
outside of Binder threads, we switched to enforceCallingOrSelfPermission.

Test: m -j
Test: adb shell cmd stats pull-source 10039
Test: adb shell cmd stats pull-source 10040
Test: adb shell cmd stats pull-source 10041
Test: atest CtsStatsdHostTestCases:UidAtomTests#testDeviceCalculatedPowerUse
Test: atest
CtsStatsdHostTestCases:UidAtomTests#testDeviceCalculatedPowerBlameUid
Test: atest CtsStatsdHostTestCases:BatteryStatsValidationTests#testPowerUse
Bug: 145565211
Change-Id: Ie009e6eead3e48ecee6b40d9a38c9d571d4d4117
2020-01-15 15:39:56 -08:00
Automerger Merge Worker
4e37fa7cb3 Merge changes from topic "sp06-offloadcontroller" am: 01d30a4ce0 am: b61116705a am: c6a841b77b
Change-Id: I4e7924ebb2d37ecffb8facce0ec51643afb12264
2020-01-15 05:33:32 +00:00
Saeid Farivar Asanjan
7440af3dc8 Whitelist Paintbooth
Test: manually
Change-Id: I5ed9a31ab1af9eb5353038e82418cfe7fad89dfe
2020-01-14 15:58:49 -08:00
junyulai
37ed835f3a [SP06.1] Add UPDATE_DEVICE_STATS permission to Tethering
Add corresponding permission to allow tether offload to update
network usage through new API that requires UPDATE_DEVICE_STATS
permission.

This is the minimum permission that required to update network
usage with the new system api.

Test: atest FrameworksNetTests OffloadControllerTest TetheringTest
Bug: 130855321
Change-Id: I9c0c86e20d4797ea3570feed741be3a07f839c7d
2020-01-14 20:14:47 +08:00
Automerger Merge Worker
9cea835311 Merge "Add Lorenzo to OWNERS for privileged permissions whitelist" am: 0fd118f5bb am: b310a107b7 am: 124ec9325e
Change-Id: Ia181cf99a9c4668e4b198d5088136f08350d8e93
2020-01-10 23:14:56 +00:00
Treehugger Robot
0fd118f5bb Merge "Add Lorenzo to OWNERS for privileged permissions whitelist" 2020-01-10 22:46:10 +00:00
Jeff Vander Stoep
641dc190b9 Add Lorenzo to OWNERS for privileged permissions whitelist
Test: With great power comes great responsibility.
Change-Id: I885baf50b2d901c4f052f2197c0d58386aae80b2
2020-01-10 20:34:26 +01:00
Automerger Merge Worker
d65e33cd15 Merge "Give tethering TETHER_PRIVILEGED permission" am: b5d04cb6cd am: 3e8731d00e am: 2a1f6055db
Change-Id: Ide3a2e84c7511d79115e6f2065033a38db8d6447
2020-01-10 10:52:57 +00:00
markchien
36aea56160 Give tethering TETHER_PRIVILEGED permission
This fix the crash when perform "Reset Wi-Fi,mobile & Bluetooth"

Bug: 146900199
Test: -build, flash, boot
      -atest TetheringTests
      -atest CtsTetheringTest
      -manual perform "Reset Wi-Fi,mobile & Bluetooth"

Change-Id: I036409358ed15a797bdb751bb66513425350d066
2020-01-10 14:49:24 +08:00
Hall Liu
b38ad5f563 Add system service for accessing SystemConfig
Add SystemConfigService and associated AIDLs and permissions for
accessing SystemConfig. The service returns values obtained from a
static instance of com.android.server.SystemConfig.

Bug: 143112379
Test: atest SystemConfigTest
Change-Id: I1a863ae9f53db21d698376008e5b1da83309b141
2020-01-07 15:17:40 -08:00
Automerger Merge Worker
070e602547 Merge "Add new permissions" am: 62ace8c46a am: c0f9b27214 am: ec776dfda9
Change-Id: I8193a10bef4d829f41fd2609b571c9fa52365783
2020-01-06 21:35:59 +00:00
Neil Fuller
62ace8c46a Merge "Add new permissions" 2020-01-06 19:38:25 +00:00
Evan Severson
43e17e0369 Create permission for managing one-time permission sessions
Test: Manual
Bug: 136219229
Change-Id: I6870c7782f2dd51c655eea37bcb2487e5e29dfff
2020-01-03 13:49:33 -08:00
Jeongik Cha
5d6fe03467 move privapp_whitelist_com.android.storagemanager to system_ext
As StorageManager, permissions.xml should follow the app's partition.

Test: m && check booting
Bug: 137908189
Change-Id: Ie791b5fbe1b1906537a57e8f1c34029c0f092afc
Merged-In: Ie791b5fbe1b1906537a57e8f1c34029c0f092afc
2019-12-27 17:44:45 +09:00
Jeongik Cha
25656d80e0 Move 'privapp_whitelist_com.android.launcher3' to system_ext
As AOSP launcher is moved to system_ext, its permission files will follow the app location.

Test: m
Bug: 137908189
Change-Id: I5d11e3901633be82f375c56a5ef2c79b6e0b0922
Merged-In: I5d11e3901633be82f375c56a5ef2c79b6e0b0922
2019-12-27 17:42:38 +09:00
Jeongik Cha
45e55d1892 Move 'privapp_whitelist_com.android.settings' to system_ext
As Settings is moved to system_ext, its permission files will follow the app location.

Test: m
Bug: 137908189
Change-Id: I58ae29a6454f91f222b15ccbd9d3e5b5d5889289
Merged-In: I58ae29a6454f91f222b15ccbd9d3e5b5d5889289
2019-12-27 17:35:07 +09:00
Jeongik Cha
64bc816852 move privapp_whitelist_com.android.provision to system_ext
Test: m
Bug: 137908189
Change-Id: I183397b6e7e3783e26f1fd345c357af47410bb22
Merged-In: I183397b6e7e3783e26f1fd345c357af47410bb22
2019-12-27 16:32:56 +09:00
Jeongik Cha
b3d1dc096a privapp_whitelist_com.android.emergency to system_ext
Test: m
Bug: 137908189
Change-Id: I50c04967fb5a3e4f3227b50d750f24d3d8deeec4
Merged-In: I50c04967fb5a3e4f3227b50d750f24d3d8deeec4
2019-12-27 16:31:19 +09:00
Jeongik Cha
6350ba9b49 privapp_whitelist_com.android.carrierconfig to system_ext
Test: m
Bug: 137908189
Change-Id: I65cb7cb998d23541c8bcd2cfd81c8a9b94e7eccc
Merged-In: I65cb7cb998d23541c8bcd2cfd81c8a9b94e7eccc
2019-12-27 16:29:27 +09:00
TreeHugger Robot
9682046756 Merge "preinstalled-packages-platform for profiles" 2019-12-23 22:38:48 +00:00
Bonian Chen
62a1827a74 Merge "Add READ_PRIVILEGED_PHONE_STATE to the settings whitelist" 2019-12-23 05:53:14 +00:00
Issei Suzuki
8cac70a65e Merge "Promote app transition target its ancestor if possible." 2019-12-20 12:44:09 +00:00
Issei Suzuki
0ae90d0cca Promote app transition target its ancestor if possible.
Previously we only animated ActivityRecord. When hierarchical animation
is enabled, we find the top most entity from the window hierarchy (i.e.
ActivityRecord < Task < ActivityStack) which we can animate without
user visible changes, and set app transition animation on it.

The hierarchical animation is disabled by default. To enable it,
system property "persist.wm.hierarchical_animations" must be set.

Test: atest AppTransitionControllerTest
Bug: 131661052
Change-Id: I4709fd178de09d289d72cf1833b056b4e34fc92b
2019-12-20 11:05:33 +01:00
TreeHugger Robot
996c6b12f6 Merge "Move the permission.xml to /system_ext" 2019-12-20 07:26:42 +00:00
markchien
ae8aa646dc [Tether13] Move TetheringManager into framework
Move tethering out of ConnectivityService. All client would
use TetheringManager to talk with TetheringService directly.

Bug: 144320246
Test: -build, flash, boot
      -atest TetheringTests

Change-Id: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
2019-12-20 10:31:31 +08:00
Jay Aliomer
27221263df Merge "Persist dark mode when set" 2019-12-19 19:51:08 +00:00
Bookatz
6d31ac184d preinstalled-packages-platform for profiles
Unwhitelist packages that are not needed on profiles, such as wallpaper,
navbar, and cutout apps. These system packages will therefore not be
pre-installed on profile users.

Bug: 134605778
Test: Confirmed that these packages do not appear in a profile
Change-Id: Icefbcf8def31450a0f2d93cca12f6fcbf6803cb7
2019-12-19 11:48:28 -08:00
Vadim Caen
85e9d45cd8 Merge "Better debbugging message for orientation" 2019-12-19 16:12:33 +00:00
markchien
6d06f6d51a [Tether13] Move TetheringManager into framework
Move tethering out of ConnectivityService. All client would
use TetheringManager to talk with TetheringService directly.

Bug: 144320246
Test: -build, flash, boot
      -atest TetheringTests

Change-Id: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
Merged-In: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
2019-12-19 20:53:06 +08:00
Treehugger Robot
7b2a29361c Merge "Change Tethering package name" 2019-12-19 12:35:49 +00:00