These actions are owned by the system and should not be sent by
third-party apps for security reasons.
Bug: 27171917, 27169730, 27172357, 27163393
Change-Id: I3161cd3c1c37d26a92723b22878dc5aef6f30c47
Since intents can come in from older apps, don't let them crash us
by including file:// Uris. This narrows the relaxation to only apply
when starting the requested intent.
Bug: 27070755
Change-Id: Ifcf9068424e072f52758c8feeab5fbf23d678a2e
* changes:
Have unified setter/getter for Secure Settings.
Remove redundant arguments.
Use Context#getSystemService(Class<T>) in IMMS.
Use Java7 diamond operator in InputMethodUtils.
This class captures provisioning request parameters to be passed to
IpManager#startProvisioning().
Bug: 26991160
Change-Id: I56652bbc4b9ae6cfca3f225a8d99cdfc01bb54d9
- Rename add and remove in Subscription putCallback and removeCallback
for better readability.
- Fix a broken link of javadoc.
Change-Id: If41941d1134d4ee6ef953932ca572f5d445a2aff
We were previously only doing it for SCREEN_ORIENTATION_UNSPECIFIED,
but there are other orientation settings that aren't fixed that we
need to handle.
Change-Id: If21fcd8312b6267407d94b6646158ac6eae44b44
- When there is no focused task, focus the next task closest to the
stack scroll in the focus direction.
- Fixing small regression where no task would focus when alt-tabbing
because the index was out of bounds.
Change-Id: I2555c9340f40affc371f52d51d88af0eeda53b2e
The old getSharedPreferences() API had a side-effect behavior that
subsequent calls wouldn't touch disk if there was a cache hit. Now
that we're using File as the cache key, we were generating the path
every time, which resulted in touching disk.
To bring back the old behavior, let's add yet another cache!
Bug: 26979210
Change-Id: Ib8346c6f69ae25f8f164e3b7e05bc6358de38906
We're starting to see more instances of device features that will
increment separately from the SDK API level, such as camera HAL,
GPU capabilities, Bluetooth, and other hardware standards.
This change adds the ability for device features to specify a
version, which is defined to be backwards compatible. That is, apps
requesting an older version of a feature must continue working on
devices with a newer version of that same feature.
When a version is undefined, we assume the default version "0".
Bug: 27162500
Change-Id: If890bf3f3dbb715e8feb80e7059a0d65618482ea
- Properly setting view outline alpha
- Ensuring that dismissing while in focused state will return to
non-focused state
- Fixing mis-calculation with bottom stack area
Change-Id: I281b7707421ffde4225180c63c7d40bf325f7f72
When device is in safe mode, we're trying to keep third-party code
from running to give us a stable platform. The ideal approach would
be to treat these apps as temporarily "uninstalled" when in safe mode,
but not all system internals are ready for this.
Instead, go back to previous behavior where we simply filtered
non-system components. This isn't perfect, since there are still
cracks through which components can leak out (GET_ACTIVITIES, etc).
So as a last-ditch sanity effort, refuse to fork any third-party apps
while running in safe mode.
Bug: 27165374
Change-Id: I044ede02e923c499159faf59b12e79b97fe77fba
BootReceiver was using SharedPreferences to record the timestamp that a
log file was lastly added to the dropbox. It no longer works after the
cleanup of the ContextImpl, because Context storage APIs are designed
for app data storage (as opposed to the system server). This CL switches
to writing its own xml file instead (/data/system/log-files.xml).
Bug: 26966507
Change-Id: Ife6b7544a7636b37dd239f059d1ca8c9c28f81a3
Apps typically have a umask() that prevents the mkdir() from setting
the requested permissions.
Bug: 27116987
Change-Id: Ia14e7e31531328ab36e902a864b3d2891feec544