182 Commits

Author SHA1 Message Date
Mathew Inwood
25be36376b Amend package whitelist.
Now that Antons cleanup of all packages is complete, we can generate this
whitelist from those packages that specify

  LOCAL_PRIVATE_PLATFORM_APIS := true

This is the resulting list of packages. This change also includes fixes to
the method; previously, packges that didn't specify any certificate may
have been exluded.

Test: Verify that device boots.
Change-Id: I1f578322135274b80708d4bb7664f7732ac33cc7
2018-03-15 14:06:29 +00:00
David Brazdil
06c8a439f7 Add PrintRecommendationService to hidden API package whitelist
This app builds directly against the platform. Add it to the whitelist.

Bug: 64382372
Test: make
Test: device boots
Change-Id: I16574374d2c233221cd1305f031f78aca1947f05
2018-03-13 16:14:03 +00:00
David Brazdil
2ed5548a61 Add PrintSpooler to system app whitelist
This app builds directly against the platform. Add it to the whitelist.

Bug: 64382372
Test: make
Test: device boots
Change-Id: Ia77df2db78adf62a525f08549d71360924f1a3f6
Merged-In: I4c308d93d66391da2d3691eb45e5d7b1c1fdd582
(cherry picked from commit f7e625c19c8fbf0fc6cac5b7a724fe6548d5821f)
2018-03-12 13:19:47 +00:00
Mathew Inwood
2f09c3bc5b Populate hiddenapi whitelist.
This list of packages is derived from all packages in the tree that do not
specify LOCAL_SDK_VERSION in their Android.mk. It was done by:

1.  Modifying biuld/core/package_internal.mk to output a warning for all
    packages that do not specify LOCAL_SDK_VERSION, including some
    metadata about the target.

2.  Parsing the output fom the build, then filtering out those that specify
    a test certificate, or with LOCAL_MODULE_TAGS := tests, that depend
    on android.test.runner or whose name includes "Test"

3.  Look up the java package name of each & build the list from these.

Test: N/A, this change is a no-op while all system apps are excluded
from the checks.

BUG: 73244707

Change-Id: Ie3dcb1b4b83c32e93609bc58dc7a1cd513eeea64
2018-02-22 11:05:15 +00:00
Mathew Inwood
787c193ee5 Package whitelist for hiddenapi checks.
Some packages in the system image are not built against the SDK, so
enforcing hiddenapi checks for these will break them. Add a whitelist
for such packages.

For now, just add the contacts provider to the whitelist. The list will be
further populated later.

Test: Added test app package name to whitelist to verify.

Bug: 73244707

Merged-In: I94746b7f12dd9371d5068bb235eb853f63ee4d97
Change-Id: I1cbbd220c61b1b4b767c301f97096607ee902a7b
2018-02-22 11:05:14 +00:00
Hall Liu
31230bb193 Merge "Check for location access on TelephonyRegistry" 2018-02-21 22:42:08 +00:00
Holly Jiuyu Sun
052fbabc35 Public EuiccManager APIs.
Public EuiccManager and other related necessary files.
Mark EuiccCardManager and other related necessary files as @SystemApi.
Solve lint errors and warnings.

Bug: 35851809
Test: test on phone
Change-Id: I8a2c78804cae56b679d311d613edca5be4bc2522
Merged-In: I68853e134e1e31fa9b91a83af6c491a2a8cca971
2018-02-13 12:53:45 -08:00
Hall Liu
5fb337ff85 Check for location access on TelephonyRegistry
When sending outbound callbacks on CELL_INFO and CELL_LOCATION, check to
make sure that the user has authorized us and the receiving app to get
information on their location.

Bug: 69637693
Test: manual: telephony testapp
Change-Id: Iacfc894428b11a7ec973567d7a797eedb281355f
2018-02-06 14:01:47 -08:00
Hall Liu
39393f889a Merge "Revert "Check for location access on TelephonyRegistry"" 2018-02-06 21:15:42 +00:00
Hall Liu
3d30946e8e Revert "Check for location access on TelephonyRegistry"
This reverts commit 8d584f0a91b0709b28ebc64abf0a6063429c8d58.

Reason for revert: b/72967560

Change-Id: I9ca3c4a586e740a7b7d4cc5940ca8d4e4ebf3654
2018-02-06 18:13:36 +00:00
Treehugger Robot
0276f4290f Merge "Added permission for binding data service" 2018-02-03 04:40:06 +00:00
Jack Yu
87b6963740 Added permission for binding data service
This is to make sure only the system can bind the data service.

Test: Manual
Bug: 64132030
Merged-In: Iaf4e4a604396ec37c83516f1d1f163614ef23c3d
Change-Id: Iaf4e4a604396ec37c83516f1d1f163614ef23c3d
2018-02-02 13:52:20 -08:00
Hall Liu
871202da2f Merge "Check for location access on TelephonyRegistry" 2018-02-01 23:05:22 +00:00
Hall Liu
8d584f0a91 Check for location access on TelephonyRegistry
When sending outbound callbacks on CELL_INFO and CELL_LOCATION, check to
make sure that the user has authorized us and the receiving app to get
information on their location.

Bug: 69637693
Test: manual: telephony testapp
Change-Id: Ib4c8c6a9765f504823016e538dd46768d1032792
2018-02-01 01:00:52 +00:00
Tyler Gunn
acdb686635 Add call recording tone support.
Adding carrier configuration option to specify whether the carrier requires
the incall recording tone be played.
Added phone account extra used in Telephony to communicate this to
Telecom.
Added permission pregrant for Telecom for MODIFY_AUDIO_ROUTING; this is
needed as Telecom listening to the AudioRecordingConfiguration callback
from the audio framework.  It needs the permission so that it can be
informed of the package names of recording apps.

Test: Manually enabled for local carrier and confirmed that recording
tone plays to remote party when a recording app is started on the device.
Bug: 64138141

Change-Id: I1ab521b79cbeeb4ff4dcbf83de7c17c539637bdc
2018-01-30 11:38:54 -08:00
Xin Li
220871a697 Merge commit '98e12851336b7db16e583f9afac63ecc97465980' from
oc-mr1-dev-plus-aosp-without-vendor into stage-aosp-master.

Change-Id: Ia7b8da4a00d215160e4a4fa40f6044208d1297b7
Merged-In: I19846d2a3ee27aecbae2367a74ee49082eea154d
2017-11-14 12:31:11 -08:00
Jeff Sharkey
e40d8409bd Define OWNERS for permission grant changes.
Permission grant changes need explicit approval from product and
SWE leadership to ensure that CTS/CDD requirements are met.

Change-Id: I0a84712b5c5b4e11e72bf5921b72ef6a47e7fdc1
2017-10-29 19:32:02 -06:00
Shubang
d06de348b6 Add permissions for LiveTv (AOSP)
It crashes without the permissions

Bug: 67474061
Test: make; flashall; install and open LiveTv;
Change-Id: Ifec8bfb4ee93ac6b9189a9c337fdd2ef9ec34537
2017-10-06 14:06:26 -07:00
Sunny Goyal
71d4bcc053 Fixing Launcher package name for privilege permission
Test: None
Bug: 67017745
Change-Id: I37b903c0c771e54a68bf4dac42a0ce39641b7933
2017-09-29 20:08:15 +00:00
Sudheer Shanka
93bfd052a8 Add PACKAGE_USAGE_STATS permission to shell.
This is needed for calling AM.registerUidObserver.

Fixes: 64400666
Test: cts-tradefed run singleCommand cts-dev -m CtsAppTestCases -t \
      android.app.cts.ActivityManagerProcessStateTest
Change-Id: I4f500d0d8d516b6b8961ea2f8c083add3ae949a9
2017-09-01 16:48:05 -07:00
Christopher Tate
615b37fbac Add Audio effect session intent to config file
Currently audio effect panel can't receive session
intent if app targetSdkVersion is Android O or later.
Because the intent is limited on background.
However this kind of application needs to receive
the intent when application plays music.

Bug: 62777192
Test: manual

Cherrypick of partner CL 870245

Change-Id: Ibcebb938fa9177a9b0a7be079b1c7374ba9424ee
2017-08-17 17:24:09 -07:00
fionaxu
a40b8b7431 Merge "app link handling under restricted mobile data" into oc-dr1-dev
am: 93bf6200eb

Change-Id: I1a506e9f8dae6fd76c74c3f9d7f93c40ce64a387
2017-08-08 09:02:23 +00:00
fionaxu
d60a9d0e58 app link handling under restricted mobile data
1. new actions to allow default carrier app dynamically enable/disable
app-link filtering
2. new intent to notify registered carrier apps of other default
networks
3. signal-to-actions config to sepcify carrier actions on default
network change
default network available -> disable intent filter for app-link
defaut network lost -> enable intent filter for app-link
4. new carrier actions to allow carrier apps to register/unregister
other network status dynmacially

Bug: 62487488
Test: Manual
Change-Id: Ie9fa9f3f4ca38f9f26a90a3dbf95f7f20a8ad773
2017-08-04 18:13:12 -07:00
Tomasz Wasilczyk
68a0dafc13 Merge "Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission." into oc-mr1-dev 2017-07-25 17:18:50 +00:00
Tomasz Wasilczyk
df77643cd8 Rename ACCESS_FM_RADIO to ACCESS_BROADCAST_RADIO permission.
This is a backwards incompatible change against System API,
but as there are no existing radio apps, nobody uses it.

Bug: b/63405337
Test: manual
Change-Id: Iaf6085914434be01e1c1e363609e5b0087ffe127
2017-07-21 14:22:05 -07:00
Andrii Kulian
02689a7884 DO NOT MERGE Add permission to launch activities on VD
1. Added permission ACTIVITY_EMBEDDING which allows apps to launch
activities on virtual displays.
2. Allow owner of display to launch activities from same app without
permission check to owned display.
3. Added permission checks for launching on secondary displays to
more target task/stack resolution paths in ActivityStarter.

Bug: 63117330
Test: android.server.cts.ActivityManagerDisplayTests
Test: go/wm-smoke
Change-Id: If169a77fb56241e06f7de20168dc38c4b0a217f5
(cherry picked from commit 71587649836d8e97c2ca00d968fc95293b59b0d3)
2017-07-21 18:31:20 +00:00
Jeff Sharkey
9f09e6a73d Unify permissions under UPDATE_DEVICE_STATS.
The UPDATE_DEVICE_STATS permission has become the de-facto mechanism
that platform components use to shift blame for resource usage, so
it's confusing to also have a separate MODIFY_NETWORK_ACCOUNTING
permission.  So this change replaces MODIFY_NETWORK_ACCOUNTING with
UPDATE_DEVICE_STATS.

Bug: 62483389
Test: builds, boots
Exempt-From-Owner-Approval: Bug 63673347
Change-Id: I872759f02327b6d531ec2338bd876890aded60ad
2017-07-17 16:10:55 -06:00
Jeff Davidson
c8d6ad8b70 Merge "Move eUICC permissions to com.android namespace." into oc-dr1-dev am: 3fc57019bb
am: aa7f92dc6a

Change-Id: Ibd65e174e4067a8d45c8b9d45a7f020a48e1cdab
2017-07-11 02:03:11 +00:00
Paul Duffin
6ed04553ef Add android.test.mock to the optional runtime libraries
This is needed in order to make the following manifest entry work
properly.
  <uses-library android:name="android.test.mock"/>

Tested by adding the entry to an APK and installing it which caused an
error about an unknown library. Then updated this file, rebuilt,
reflashed and installed APK again at which point it worked.

Follow up change to cts/tests/signature will add proper test for this
library.

Bug: 30188076
Test: see above
Change-Id: I630b7bc48a50ab1c52bb5feed54c2e4deb876339
2017-07-07 12:12:06 +01:00
Jeff Davidson
3b16d3fc1e Move eUICC permissions to com.android namespace.
Change-Id: I3457fbb29d04ec82cb5bf819ca479bfe707e3e3f
Test: eSIM sanity check + CTS PermissionPolicyTest
Fixes: 62375320
2017-07-05 23:42:54 +00:00
Malcolm Chen
2106254088 Adding "Mobile data" and "Data usage" button in mobile settings.
Grant "READ_NETWORK_USAGE_HISTORY" permission to phone because
"Datat usage" button summary needs it. Settings provides new
intent to open mobile data usage page.

Bug: 62201918
Test: Manual
Change-Id: Ie317109c723f3946ace4d34c743081a7ae046462
2017-06-29 16:32:24 -07:00
Jeff Davidson
fa028b4145 Merge "Declare new permission for Phone process." 2017-05-24 01:01:32 +00:00
Lucas Dupin
8b3d839a5e Add change_overlay permission to systemui
SystemUI needs to be able to enable and disable
overlays in order to invert text and surface colors.

Bug: 38164700
Test: make
Change-Id: I7685d5fddb5a476e10012dab2d6e7ee5da206f80
2017-05-23 15:43:54 -07:00
Jeff Davidson
c1ef5336bc Declare new permission for Phone process.
Bug: 37480432
Test: TreeHugger + E2E IPC test
Change-Id: I7881651986b73ec6e21f121a8c5c2b85c9e52c3f
2017-05-15 17:57:51 -07:00
Siarhei Vishniakou
d2b712fae9 Merge "Merge "Adding 'uhid' permission for bluetooth stack." am: 3e010d1353 am: 96d3b668bb am: 50c5253c2d" into oc-dev-plus-aosp
am: b78aad827c

Change-Id: Ifbef6c022fc9d944e6126051977f181eca49a29a
2017-05-12 03:49:55 +00:00
Dianne Hackborn
b1080dbf95 Merge "Merge "Finish issue #37815224: DeviceManagementService is incorrectly..." into oc-dev am: 8d0ba598cf" into oc-dev-plus-aosp
am: e0375adaaf

Change-Id: I675107ab7e7cb5a497e56ca10307aed50e6df735
2017-05-12 03:43:09 +00:00
Siarhei Vishniakou
4bb8bea04a Merge "Adding 'uhid' permission for bluetooth stack." am: 3e010d1353 am: 96d3b668bb
am: 50c5253c2d

Change-Id: I965b2ad6b603dba82116180a43fc20684d2f1b59
2017-05-12 01:00:34 +00:00
Dianne Hackborn
06640fea7b Finish issue #37815224: DeviceManagementService is incorrectly...
...starting services from jobs

Remove dmagent from whitelist.

Test: manual

Change-Id: Id13b95b9ca4f8fa890f4e20cf133a6f4bc0e3cc5
2017-05-11 12:15:08 -07:00
Siarhei Vishniakou
9e089567fd Adding 'uhid' permission for bluetooth stack.
This CL is in support of another CL c/2048848, topic
'Refactor hid command in /frameworks/base/cmds'
in internal master. Adding the permissions for bluetooth
devices here to access uhid_node as part of the new 'uhid'
group.

Bug: 34052337
Test: Tested on angler, bluetooth mouse works OK.

Change-Id: I63963984a0a3dccb4fccc64bb6fef4e809e2737e
2017-05-11 01:35:25 +00:00
Dianne Hackborn
55b4d62c4b Merge "Work on issue #37815224: DeviceManagementService is incorrectly..." into oc-dev am: 72c0ab518a
am: c812cf27ab

Change-Id: I7a7b4b17a4eeeeda7619e6fa9702ef059af7d76f
2017-05-02 18:00:22 +00:00
Dianne Hackborn
d1f3df43c0 Work on issue #37815224: DeviceManagementService is incorrectly...
...starting services from jobs

Bring back the correct bg check restrictions on jobs, but also
bring back whitelisting of dmagent so it doesn't crash.

Test: booted and ran

Change-Id: I78892386bdcd4f39e0b1a6d33b224bdff958af37
2017-05-01 14:33:57 -07:00
Tony Mak
4ac16f9a40 Merge "Revert "Whitelist DMAgent from bg check"" into oc-dev am: 730bf42e44
am: 5cfba6f7ee

Change-Id: I328bea0b7a38822feeea27cc9966815ffb2da013
2017-04-25 20:22:51 +00:00
TreeHugger Robot
730bf42e44 Merge "Revert "Whitelist DMAgent from bg check"" into oc-dev 2017-04-25 18:55:08 +00:00
Tony Mak
39d081015a Revert "Whitelist DMAgent from bg check"
This reverts commit ea00f16c8555c765f921f909974a1a426ea51b24.

Reason for revert: <INSERT REASONING HERE>

Change-Id: Id4ef18c858b320a31273f0b68d2a6c14d34d526d
2017-04-24 15:55:56 +00:00
Kang Li
0f80719a6f Moved LRResolverRankerService to ExtServices, and added a permission to
ensure that ResolverRankerServices are from trust sources.

Test: manually shared images in Camera, and in PTP to confirm it works
as expected.

Change-Id: I3549292d424fec949e9115faea7a0c5bdec06e87
(cherry picked from commit 61cf4d145e3f899ff2ff4500c3e46ea2c39adaf3)
2017-04-21 19:56:59 +00:00
Kang Li
ee8187688e Merge "Moved LRResolverRankerService to ExtServices, and added a permission to ensure that ResolverRankerServices are from trust sources." 2017-04-21 19:53:35 +00:00
Kang Li
61cf4d145e Moved LRResolverRankerService to ExtServices, and added a permission to
ensure that ResolverRankerServices are from trust sources.

Test: manually shared images in Camera, and in PTP to confirm it works
as expected.

Change-Id: I3549292d424fec949e9115faea7a0c5bdec06e87
2017-04-21 15:44:51 +00:00
Andrew Scull
5d7027db6e Add implementation alternatives for OemLockManager.
The OEM lock can be implemented with the persistent data block or the
OemLock HAL.

Test: gts-tradefed run gts -m GtsOemLockServiceTestCases -t com.google.android.oemlock.gts.OemLockServiceTest
Bug: 34766843
Change-Id: I16b31785d9af58212a050a299ef024be3139f0c6
2017-04-19 15:17:34 +01:00
Jeff Sharkey
9a4a457622 Clear identity to handle ALLOCATE_AGGRESSIVE.
We're not actually clearing any files, only deciding how much free
space is available, so we're fine assuming the remote caller has the
permission.

Test: builds, boots
Bug: 37169076
Change-Id: I6cd42f77c43e9d2de40e2b8b937c7f2145f1b869
2017-04-14 16:29:04 -06:00
Jeff Sharkey
a4daf89f0f Grant Shell ability to clear cached app data.
It already has CLEAR_APP_USER_DATA to clear everything inside app
storage, and clearing cached data is a subset of that.

Test: cts-tradefed run commandAndExit cts-dev -m CtsAppSecurityHostTestCases -t android.appsecurity.cts.StorageHostTest
Bug: 36731175
Change-Id: Iefc5be6c80e2562a95424fd6fe413bdb018201a9
2017-04-11 13:03:54 -06:00