Merge "Revert "Fix issue #72116995: Add permission guarding Service#startForeground""
This commit is contained in:
committed by
Android (Google) Code Review
commit
8dddeb98f5
@@ -73,7 +73,6 @@ package android {
|
||||
field public static final java.lang.String DUMP = "android.permission.DUMP";
|
||||
field public static final java.lang.String EXPAND_STATUS_BAR = "android.permission.EXPAND_STATUS_BAR";
|
||||
field public static final java.lang.String FACTORY_TEST = "android.permission.FACTORY_TEST";
|
||||
field public static final java.lang.String FOREGROUND_SERVICE = "android.permission.FOREGROUND_SERVICE";
|
||||
field public static final java.lang.String GET_ACCOUNTS = "android.permission.GET_ACCOUNTS";
|
||||
field public static final java.lang.String GET_ACCOUNTS_PRIVILEGED = "android.permission.GET_ACCOUNTS_PRIVILEGED";
|
||||
field public static final java.lang.String GET_PACKAGE_SIZE = "android.permission.GET_PACKAGE_SIZE";
|
||||
|
||||
@@ -471,6 +471,14 @@ public abstract class Service extends ContextWrapper implements ComponentCallbac
|
||||
* {@link #onStart} and returns either {@link #START_STICKY}
|
||||
* or {@link #START_STICKY_COMPATIBILITY}.
|
||||
*
|
||||
* <p>If you need your application to run on platform versions prior to API
|
||||
* level 5, you can use the following model to handle the older {@link #onStart}
|
||||
* callback in that case. The <code>handleCommand</code> method is implemented by
|
||||
* you as appropriate:
|
||||
*
|
||||
* {@sample development/samples/ApiDemos/src/com/example/android/apis/app/ForegroundService.java
|
||||
* start_compatibility}
|
||||
*
|
||||
* <p class="caution">Note that the system calls this on your
|
||||
* service's main thread. A service's main thread is the same
|
||||
* thread where UI operations take place for Activities running in the
|
||||
@@ -679,10 +687,6 @@ public abstract class Service extends ContextWrapper implements ComponentCallbac
|
||||
* {@link #startService(Intent)} first to tell the system it should keep the service running,
|
||||
* and then use this method to tell it to keep it running harder.</p>
|
||||
*
|
||||
* <p>Apps targeting API {@link android.os.Build.VERSION_CODES#P} or later must request
|
||||
* the permission {@link android.Manifest.permission#FOREGROUND_SERVICE} in order to use
|
||||
* this API.</p>
|
||||
*
|
||||
* @param id The identifier for this notification as per
|
||||
* {@link NotificationManager#notify(int, Notification)
|
||||
* NotificationManager.notify(int, Notification)}; must not be 0.
|
||||
|
||||
@@ -894,14 +894,6 @@ public class Build {
|
||||
|
||||
/**
|
||||
* P.
|
||||
*
|
||||
* <p>Applications targeting this or a later release will get these
|
||||
* new changes in behavior:</p>
|
||||
* <ul>
|
||||
* <li>{@link android.app.Service#startForeground Service.startForeground} requires
|
||||
* that apps hold the permission
|
||||
* {@link android.Manifest.permission#FOREGROUND_SERVICE}.</li>
|
||||
* </ul>
|
||||
*/
|
||||
public static final int P = CUR_DEVELOPMENT; // STOPSHIP Replace with the real version.
|
||||
}
|
||||
|
||||
@@ -3805,15 +3805,6 @@
|
||||
<permission android:name="android.permission.INSTANT_APP_FOREGROUND_SERVICE"
|
||||
android:protectionLevel="signature|development|instant|appop" />
|
||||
|
||||
<!-- Allows a regular application to use {@link android.app.Service#startForeground
|
||||
Service.startForeground}.
|
||||
<p>Protection level: normal
|
||||
-->
|
||||
<permission android:name="android.permission.FOREGROUND_SERVICE"
|
||||
android:description="@string/permdesc_foregroundService"
|
||||
android:label="@string/permlab_foregroundService"
|
||||
android:protectionLevel="normal|instant" />
|
||||
|
||||
<!-- @hide Allows system components to access all app shortcuts. -->
|
||||
<permission android:name="android.permission.ACCESS_SHORTCUTS"
|
||||
android:protectionLevel="signature" />
|
||||
|
||||
@@ -915,11 +915,6 @@
|
||||
<string name="permdesc_persistentActivity" product="tv">Allows the app to make parts of itself persistent in memory. This can limit memory available to other apps slowing down the TV.</string>
|
||||
<string name="permdesc_persistentActivity" product="default">Allows the app to make parts of itself persistent in memory. This can limit memory available to other apps slowing down the phone.</string>
|
||||
|
||||
<!-- Title of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
||||
<string name="permlab_foregroundService">run foreground service</string>
|
||||
<!-- Description of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
||||
<string name="permdesc_foregroundService">Allows the app to make use of foreground services.</string>
|
||||
|
||||
<!-- Title of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
||||
<string name="permlab_getPackageSize">measure app storage space</string>
|
||||
<!-- Description of an application permission, listed so the user can choose whether they want to allow the application to do this. -->
|
||||
|
||||
@@ -51,7 +51,6 @@
|
||||
<uses-permission android:name="android.permission.CLEAR_APP_USER_DATA" />
|
||||
<uses-permission android:name="android.permission.DELETE_CACHE_FILES" />
|
||||
<uses-permission android:name="android.permission.DOWNLOAD_CACHE_NON_PURGEABLE" />
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
<uses-permission android:name="android.permission.GET_PACKAGE_SIZE" />
|
||||
<uses-permission android:name="android.permission.INTERNET" />
|
||||
<uses-permission android:name="android.permission.INJECT_EVENTS" />
|
||||
|
||||
@@ -3,7 +3,6 @@
|
||||
package="com.android.mtp"
|
||||
android:sharedUserId="android.media">
|
||||
<uses-feature android:name="android.hardware.usb.host" />
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
<uses-permission android:name="android.permission.MANAGE_USB" />
|
||||
<application android:label="@string/app_label">
|
||||
<provider
|
||||
|
||||
@@ -44,7 +44,6 @@
|
||||
<uses-permission android:name="android.permission.MANAGE_NETWORK_POLICY" />
|
||||
<uses-permission android:name="android.permission.MANAGE_USB" />
|
||||
<uses-permission android:name="android.permission.USE_RESERVED_DISK" />
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
<!-- System tool permissions granted to the shell. -->
|
||||
<uses-permission android:name="android.permission.REAL_GET_TASKS" />
|
||||
<uses-permission android:name="android.permission.CHANGE_CONFIGURATION" />
|
||||
|
||||
@@ -1043,14 +1043,20 @@ public final class ActiveServices {
|
||||
throw new SecurityException("Instant app " + r.appInfo.packageName
|
||||
+ " does not have permission to create foreground services");
|
||||
default:
|
||||
mAm.enforcePermission(
|
||||
android.Manifest.permission.INSTANT_APP_FOREGROUND_SERVICE,
|
||||
r.app.pid, r.appInfo.uid, "startForeground");
|
||||
try {
|
||||
if (AppGlobals.getPackageManager().checkPermission(
|
||||
android.Manifest.permission.INSTANT_APP_FOREGROUND_SERVICE,
|
||||
r.appInfo.packageName, UserHandle.getUserId(r.appInfo.uid))
|
||||
!= PackageManager.PERMISSION_GRANTED) {
|
||||
throw new SecurityException("Instant app " + r.appInfo.packageName
|
||||
+ " does not have permission to create foreground"
|
||||
+ "services");
|
||||
}
|
||||
} catch (RemoteException e) {
|
||||
throw new SecurityException("Failed to check instant app permission." ,
|
||||
e);
|
||||
}
|
||||
}
|
||||
} else if (r.appInfo.targetSdkVersion >= Build.VERSION_CODES.P) {
|
||||
mAm.enforcePermission(
|
||||
android.Manifest.permission.FOREGROUND_SERVICE,
|
||||
r.app.pid, r.appInfo.uid, "startForeground");
|
||||
}
|
||||
if (r.fgRequired) {
|
||||
if (DEBUG_SERVICE || DEBUG_BACKGROUND_CHECK) {
|
||||
|
||||
@@ -8886,20 +8886,6 @@ public class ActivityManagerService extends IActivityManager.Stub
|
||||
throw new SecurityException(msg);
|
||||
}
|
||||
|
||||
/**
|
||||
* This can be called with or without the global lock held.
|
||||
*/
|
||||
void enforcePermission(String permission, int pid, int uid, String func) {
|
||||
if (checkPermission(permission, pid, uid) == PackageManager.PERMISSION_GRANTED) {
|
||||
return;
|
||||
}
|
||||
|
||||
String msg = "Permission Denial: " + func + " from pid=" + pid + ", uid=" + uid
|
||||
+ " requires " + permission;
|
||||
Slog.w(TAG, msg);
|
||||
throw new SecurityException(msg);
|
||||
}
|
||||
|
||||
/**
|
||||
* This can be called with or without the global lock held.
|
||||
*/
|
||||
|
||||
@@ -60,7 +60,6 @@
|
||||
<uses-permission android:name="android.permission.ACCESS_SURFACE_FLINGER" />
|
||||
<uses-permission android:name="android.permission.READ_FRAME_BUFFER" />
|
||||
<uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE" />
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
|
||||
<!-- Uses API introduced in O (26) -->
|
||||
<uses-sdk android:minSdkVersion="1"
|
||||
|
||||
@@ -1,6 +1,5 @@
|
||||
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
|
||||
package="com.android.frameworkperf">
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
<uses-permission android:name="android.permission.WAKE_LOCK" />
|
||||
<uses-sdk android:minSdkVersion="5" />
|
||||
|
||||
|
||||
@@ -5,7 +5,6 @@
|
||||
android:versionName="1.0" >
|
||||
|
||||
<uses-sdk android:minSdkVersion="19"/>
|
||||
<uses-permission android:name="android.permission.FOREGROUND_SERVICE"/>
|
||||
<uses-permission android:name="android.permission.INTERNET" />
|
||||
<uses-permission android:name="android.permission.READ_EXTERNAL_STORAGE" />
|
||||
|
||||
|
||||
Reference in New Issue
Block a user