1. Accessibility events for change in the window content are sent
with a delay and code performing the send does not check the
accessibilitys state before sending the event.
bug:4980754
Change-Id: Ice68037ebab9c5dcd0dece927765585e13959c0c
Better activation experience:
- Hold off on switching out targets until current animation has finished.
- Hide unselected targets when a target is selected.
Code simplification:
- Use explicit callback objects to handle animation updates instead of having MWV implement the interface.
- More compact chevron-loading code.
- Don't use animations for properties that need to change immediately.
Other minor timing tweaks.
Change-Id: I328533e8ab7b4c69c7ba51c8c55002765dcbbd46
Fix bug 4976004 - bad title measurement for split action modes
Fix bug 4902960 - action modes leaving a hidden action bar in a bad state
Sync with design for the behavior of various permutations of action
bar configuration + modes.
Change-Id: Id75f6b5911b761fabc5fef2cc2600ce197cf9a92
In case of non-standard load such as reload, currently the ZoomManager's
onFirstLayout will not be triggered, hence initial zoom overview will not
be set.
This change provides a fix to set initial zoom overview in case of
non-standard load for the new picture after first layout.
issue: 4975315
Change-Id: If2ba3e472f2bb7b6fc4c52024d18a66dc1e41a23
Fixed a warning identified by the InputEventConsistencyVerifier
due to some code that synthesizes a touch event which it sends
to onTouchEvent with no input device source specified.
This is generally harmless but a fake source is better than
none in this case.
Change-Id: I44cfa36a4746f598f8fde3086084af3896e2ba2a
Location manager now checks for such intents, and logs a warning when
they are given to it. Nothing thrown yet, it needs to check the
targetSdkVersion of the caller somehow.
When sending the pending intent, we require that the recipient hold the
appropriate permission. This should pretty much close the security hole.
Includes a bunch of infrastructure in the activity manager needed to
support all this.
Change-Id: I4dba7a98a7b8bbb9e347666451aa9cb1efad1848
Connect up netd penalty box through NMS, and enforce the existing
background data flag by putting all UIDs in penalty box. Allow
platform applications to have policy applied. Only dispatch unique
rules to netd, avoiding any repeats.
Bug: 4598463, 4965677
Change-Id: Ibf9beff998ba7a1ea92f5e2f7eeba7b483d4b918