* changes:
Have unified setter/getter for Secure Settings.
Remove redundant arguments.
Use Context#getSystemService(Class<T>) in IMMS.
Use Java7 diamond operator in InputMethodUtils.
We're starting to see more instances of device features that will
increment separately from the SDK API level, such as camera HAL,
GPU capabilities, Bluetooth, and other hardware standards.
This change adds the ability for device features to specify a
version, which is defined to be backwards compatible. That is, apps
requesting an older version of a feature must continue working on
devices with a newer version of that same feature.
When a version is undefined, we assume the default version "0".
Bug: 27162500
Change-Id: If890bf3f3dbb715e8feb80e7059a0d65618482ea
When device is in safe mode, we're trying to keep third-party code
from running to give us a stable platform. The ideal approach would
be to treat these apps as temporarily "uninstalled" when in safe mode,
but not all system internals are ready for this.
Instead, go back to previous behavior where we simply filtered
non-system components. This isn't perfect, since there are still
cracks through which components can leak out (GET_ACTIVITIES, etc).
So as a last-ditch sanity effort, refuse to fork any third-party apps
while running in safe mode.
Bug: 27165374
Change-Id: I044ede02e923c499159faf59b12e79b97fe77fba
Non-FBE startup has a loop which sets up the appropriate lock state
for each user depending on whether FBE is being emulated; this loop
calls unlock_user_keys when emulation is off. I didn't modify this
loop when adding the extra arguemnt to unlock_user_keys.
Bug: 27155768
Change-Id: I825a61552383552eafb88c77c1f30591bdfd077c
This change introduces the ability to have multiple packages per
APK. The feature is currently restricted to privileged apps and
updates to such apps.
In essence the manifest can have multiple child package declarations.
A child package can declare everything an Android package can except
some tags or attributes that are not applicable and instead inherited
from the parent when needed. For example, the target SDK of the parent
applies to all children.
A child package can be updated only through the parent package.
A package with multiple child packages is installed, uninstalled
atomically - no partial installs where some child packages are not
installed.
This change ensures that we send package broadcasts for child packages
when they are updated, removed, disabled, replaced, etc.
Sample app:ag/848432
Change-Id: I25b29c98152dcad9ede4d4eb040cc897b7f93426
The "list" and "map" arguments of IMMS#buildInputMethodListLocked() are
nothing more than synonyms of IMMS#mMethodList and IMMS#mMethodMap,
respectively. There is no reason to pass them as parameters. We can
access them directly as we have done there for other member fields.
This is kind of a mechanical refactoring. No behavior change is
intended.
Bug: 26279466
Change-Id: Ia27e19f9358ba33abbb1e5a27cebe7c9953c998f
This is a mechanical replacement of
Object Context#getSystemService(String)
with
T Context#getSystemService(Class<T>)
in InputMethodManagerService.java.
No behavior change is intended.
Bug: 26279466
Change-Id: Iec6b89f0367140f98d3ca4caa1dae7375e27f3ad
If not cleared window will remain invisible and can't receive inputs,
which coud lead to ANR.
Also continue looking for windows to be destroyed instead of stopping
on first one that's not removed by client.
bug: 27123118
Change-Id: I27048779886c69eb6e7ad5e21210be511416d8b6
Adds a default periodic sync to every
authority on boot so that subscribedfeeds
adapter gets back its periodic sync if lost.
This change will bereverted in the next droidfood
build.
Change-Id: Icae76c2baafb471ad69d01a4c65023dc6f6525c0
When the app doesn't set IN_SCREEN and INSET_DECOR but the window is
still full-screen, we force SYSTEM_UI_FLAG_LAYOUT_FULLSCREEN but then
we still need to communicate the content insets to the DecorView.
In DecorView, we consume these insets in this mode and set it as
layout params so this behavior is completely transparent for the
app.
Bug: 26464646
Change-Id: Ib7332b845767a5bbc0266c380bf6240e322db943
When the device boots up, netd adds rules for applications
which do not have the NETWORK permission to iptables.
Therefore, optimize NetworkPolicyManagerService to not touch
uids that do not have the NETWORK permission.
This modification is similar to Google commit 88e98dfa5.
Cherry picked from AOSP commit to master.
Bug: 27165396
Change-Id: Ic8bb837143b9e349859210654248195d62b73d17
If UserManager.DISALLOW_CROSS_PROFILE_COPY_PASTE is false
then drag and drop is only possible between apps from the same
profile.
This CL also supports cross-profile content URI grants.
Bug:26772503
Change-Id: I2e160cfdc6259fee2ea5e561c6e21fc0547dca2e
Stashing SyncSettings for accounts not added by SUW Restore time
and restoring these settings whenever the account is added.
Bug: 26181613
Change-Id: Ia83e3fd43385a05424a8991115aa21ac90f4cd49
Allow launcher to see and attempt to launch non-crypto
aware application when profile is locked.
Hide unlock notification until parent user is unlocked.
Have unlock notitication use confirm credentials to unlock
the profile.
Updated notification strings as per suggestions in mocks
to make it clearer between users and profiles.
Bug: 27038260
Change-Id: If2d2c8148670d814544f4edd44193d15da32a289
When listening for USER_SETUP_COMPLETE changes, refresh the state for
the affected user instead of the current foreground user which excludes
the active managed profile.
Bug: 27061092
Change-Id: Iae525464d3d3faab9afb76aaf4304b9f10382e01
* changes:
Adding view debug annotations to simplifying debugging state.
Disallow launching third party apps in safe mode.
Drawing thumbnail background color for empty space in view.
Skip writing to disk when a periodic job is
removed from jobStore after it completes
execution.
Change-Id: Ib4f2cf18554bf9c87138c1984c96cc62f8dbf7e2
Bug: 27147454