Merge "Document restricted permissions" into qt-dev
This commit is contained in:
committed by
Android (Google) Code Review
commit
b2017ccba4
@@ -724,6 +724,10 @@
|
||||
|
||||
<!-- Allows an application to send SMS messages.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.SEND_SMS"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -734,6 +738,10 @@
|
||||
|
||||
<!-- Allows an application to receive SMS messages.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.RECEIVE_SMS"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -744,6 +752,10 @@
|
||||
|
||||
<!-- Allows an application to read SMS messages.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.READ_SMS"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -754,6 +766,10 @@
|
||||
|
||||
<!-- Allows an application to receive WAP push messages.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.RECEIVE_WAP_PUSH"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -763,7 +779,11 @@
|
||||
android:protectionLevel="dangerous" />
|
||||
|
||||
<!-- Allows an application to monitor incoming MMS messages.
|
||||
<p>Protection level: dangerous
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.RECEIVE_MMS"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -783,6 +803,11 @@
|
||||
when the alert is first received, and to delay presenting the info
|
||||
to the user until after the initial alert dialog is dismissed.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
|
||||
@hide Pending API council approval -->
|
||||
<permission android:name="android.permission.READ_CELL_BROADCASTS"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -805,30 +830,35 @@
|
||||
android:priority="900" />
|
||||
|
||||
<!-- Allows an application to read from external storage.
|
||||
<p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
|
||||
granted this permission.</p>
|
||||
<p>This permission is enforced starting in API level 19. Before API level 19, this
|
||||
permission is not enforced and all apps still have access to read from external storage.
|
||||
You can test your app with the permission enforced by enabling <em>Protect USB
|
||||
storage</em> under Developer options in the Settings app on a device running Android 4.1 or
|
||||
higher.</p>
|
||||
<p>Also starting in API level 19, this permission is <em>not</em> required to
|
||||
read/write files in your application-specific directories returned by
|
||||
{@link android.content.Context#getExternalFilesDir} and
|
||||
{@link android.content.Context#getExternalCacheDir}.
|
||||
<p class="note"><strong>Note:</strong> If <em>both</em> your <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
||||
minSdkVersion}</a> and <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
|
||||
grants your app this permission. If you don't need this permission, be sure your <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> is 4 or higher.
|
||||
<p>Is this permission is not whitelisted for an app that targets an API level before
|
||||
{@link android.os.Build.VERSION_CODES#Q} this permission cannot be granted to apps.</p>
|
||||
<p>Is this permission is not whitelisted for an app that targets an API level
|
||||
{@link android.os.Build.VERSION_CODES#Q} or later the app will be forced into isolated storage.
|
||||
</p>
|
||||
<p>Any app that declares the {@link #WRITE_EXTERNAL_STORAGE} permission is implicitly
|
||||
granted this permission.</p>
|
||||
<p>This permission is enforced starting in API level 19. Before API level 19, this
|
||||
permission is not enforced and all apps still have access to read from external storage.
|
||||
You can test your app with the permission enforced by enabling <em>Protect USB
|
||||
storage</em> under Developer options in the Settings app on a device running Android 4.1 or
|
||||
higher.</p>
|
||||
<p>Also starting in API level 19, this permission is <em>not</em> required to
|
||||
read/write files in your application-specific directories returned by
|
||||
{@link android.content.Context#getExternalFilesDir} and
|
||||
{@link android.content.Context#getExternalCacheDir}.
|
||||
<p class="note"><strong>Note:</strong> If <em>both</em> your <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#min">{@code
|
||||
minSdkVersion}</a> and <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> values are set to 3 or lower, the system implicitly
|
||||
grants your app this permission. If you don't need this permission, be sure your <a
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> is 4 or higher.
|
||||
|
||||
<p> This is a soft restricted permission which cannot be held by an app it its
|
||||
full form until the installer on record did not whitelist the permission.
|
||||
Specifically, if the permission is whitelisted the holder app can access
|
||||
external storage and the visual and aural media collections while if the
|
||||
permission is not whitelisted the holder app can only access to the visual
|
||||
and aural medial collections. Also the permission is immutably restricted
|
||||
meaning that the whitelist state can be specified only at install time and
|
||||
cannot change until the app is installed. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.READ_EXTERNAL_STORAGE"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -916,6 +946,10 @@
|
||||
{@link #ACCESS_FINE_LOCATION}. Requesting this permission by itself doesn't give you
|
||||
location access.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.ACCESS_BACKGROUND_LOCATION"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -958,6 +992,10 @@
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> is 16 or higher.</p>
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.READ_CALL_LOG"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -978,6 +1016,10 @@
|
||||
href="{@docRoot}guide/topics/manifest/uses-sdk-element.html#target">{@code
|
||||
targetSdkVersion}</a> is 16 or higher.</p>
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
-->
|
||||
<permission android:name="android.permission.WRITE_CALL_LOG"
|
||||
android:permissionGroup="android.permission-group.UNDEFINED"
|
||||
@@ -991,6 +1033,10 @@
|
||||
abort the call altogether.
|
||||
<p>Protection level: dangerous
|
||||
|
||||
<p> This is a hard restricted permission which cannot be held by an app until
|
||||
the installer on record did not whitelist the permission. For more details see
|
||||
{@link android.content.pm.PackageInstaller.SessionParams#setWhitelistedRestrictedPermissions(Set)}.
|
||||
|
||||
@deprecated Applications should use {@link android.telecom.CallRedirectionService} instead
|
||||
of the {@link android.content.Intent#ACTION_NEW_OUTGOING_CALL} broadcast.
|
||||
-->
|
||||
|
||||
Reference in New Issue
Block a user