am 603af61a: Add a new permission to have access to Gal Provider BUG:6897999
* commit '603af61a7cd49f214743b286520419a3fe460774': Add a new permission to have access to Gal Provider BUG:6897999
This commit is contained in:
@@ -345,10 +345,10 @@ public final class ContactsContract {
|
||||
* directory provider URIs by themselves. This level of indirection allows
|
||||
* Contacts Provider to implement additional system-level features and
|
||||
* optimizations. Access to Contacts Provider is protected by the
|
||||
* READ_CONTACTS permission, but access to the directory provider is not.
|
||||
* Therefore directory providers must reject requests coming from clients
|
||||
* other than the Contacts Provider itself. An easy way to prevent such
|
||||
* unauthorized access is to check the name of the calling package:
|
||||
* READ_CONTACTS permission, but access to the directory provider is protected by
|
||||
* BIND_DIRECTORY_SEARCH. This permission was introduced at the API level 17, for previous
|
||||
* platform versions the provider should perform the following check to make sure the call
|
||||
* is coming from the ContactsProvider:
|
||||
* <pre>
|
||||
* private boolean isCallerAllowed() {
|
||||
* PackageManager pm = getContext().getPackageManager();
|
||||
|
||||
@@ -278,6 +278,13 @@
|
||||
android:label="@string/permlab_writeContacts"
|
||||
android:description="@string/permdesc_writeContacts" />
|
||||
|
||||
<!-- Allows an application to execute contacts directory search.
|
||||
This should only be used by ContactsProvider. -->
|
||||
<!-- @hide -->
|
||||
<permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
|
||||
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
||||
android:protectionLevel="signature" />
|
||||
|
||||
<!-- Allows an application to read the user's call log. -->
|
||||
<permission android:name="android.permission.READ_CALL_LOG"
|
||||
android:permissionGroup="android.permission-group.PERSONAL_INFO"
|
||||
|
||||
Reference in New Issue
Block a user