Commit Graph

11708 Commits

Author SHA1 Message Date
Todd Kennedy
0681d29966 Merge "Add new API to retrieve app names in a batch" into oc-mr1-dev am: 5e049eb884
am: a1cb029caf

Change-Id: I9454b85835e0deb8264f7371748aad90cf04a42d
2017-08-02 14:43:36 +00:00
Todd Kennedy
5e049eb884 Merge "Add new API to retrieve app names in a batch" into oc-mr1-dev 2017-08-02 14:23:16 +00:00
Andrew Solovay
7d266520b9 Merge "docs: Noted that JobIntentService is usually a better choice" into oc-dev am: d71cc3b72e am: 9e1b7759dc am: 6ff61dbc51
am: 49f6afe2f8

Change-Id: I0fd57ed371ae915ee33aa77e198b17eb9e9c8df9
2017-08-01 21:48:14 +00:00
Andrew Solovay
6ff61dbc51 Merge "docs: Noted that JobIntentService is usually a better choice" into oc-dev am: d71cc3b72e
am: 9e1b7759dc

Change-Id: I9b6e9c02f2237c48fdac4fd6f0c4afc4eb8b03cd
2017-08-01 21:31:59 +00:00
Andrew Solovay
9e1b7759dc Merge "docs: Noted that JobIntentService is usually a better choice" into oc-dev
am: d71cc3b72e

Change-Id: I8130d71136078d17196e198db6ff36f7f8489a5c
2017-08-01 21:21:58 +00:00
Calin Juravle
565cab11ff Merge changes from topic 'class-loaders-mr1' into oc-mr1-dev
* changes:
  Use the class loader context when optimizing secondary dex files
  Add DexClassLoader to the list of supported class loaders
2017-08-01 18:38:05 +00:00
Andrew Solovay
494f1a4dfa docs: Noted that JobIntentService is usually a better choice
Since IntentService is subject to the O background restrictions,
most devs are better off switching to the new JobIntentService.
(I assume IntentService is not actually deprecated; if it is, tell
me and I'll change this to a @deprecated tag!)

See first comment for doc stage location.

Test: make ds-docs
Bug: 64159987
Change-Id: I83a53d1e6336c2134bf4c61bedd2ae42cd80493a
2017-07-31 19:41:01 -07:00
Adam Lesinski
45053367ba Merge "Remove extraneous invalidate call that unregisters AssetManagers" into oc-dr1-dev am: defdb1fd70 am: 80454c2c88
am: 4733bcaa76

Change-Id: I95bbfb04d83b270de47c7a7143b68b6b94eeabf4
2017-07-31 22:36:23 +00:00
Adam Lesinski
80454c2c88 Merge "Remove extraneous invalidate call that unregisters AssetManagers" into oc-dr1-dev
am: defdb1fd70

Change-Id: I6878ca92b2bd8b2e9569147dde007ae657adc87c
2017-07-31 22:17:27 +00:00
Adam Lesinski
defdb1fd70 Merge "Remove extraneous invalidate call that unregisters AssetManagers" into oc-dr1-dev 2017-07-31 22:08:30 +00:00
Bryce Lee
d2ed053f6e Merge "Do not call onConfigurationChanged for appBound position changes." into oc-dr1-dev am: 33d4702a12 am: 05865fb40a
am: 94795bcaf8

Change-Id: Ifb914ce593e914e83db9cea9c9c574c627216d6f
2017-07-31 19:00:08 +00:00
Bryce Lee
94795bcaf8 Merge "Do not call onConfigurationChanged for appBound position changes." into oc-dr1-dev am: 33d4702a12
am: 05865fb40a

Change-Id: Ia5817040ce14ee6dbd995bd83444f34e78bef375
2017-07-31 18:53:39 +00:00
Bryce Lee
05865fb40a Merge "Do not call onConfigurationChanged for appBound position changes." into oc-dr1-dev
am: 33d4702a12

Change-Id: I990a3554730cc07440c7d4bc0236e0aeb00e2980
2017-07-31 18:46:20 +00:00
Bryce Lee
69aac0a7b6 Merge "Do not call onConfigurationChanged for appBound position changes." into oc-dr1-dev
am: 33d4702a12

Change-Id: Id6748aab9ee83844303324ea397d4ac699fb5839
2017-07-31 18:45:19 +00:00
Todd Kennedy
9da8b8a7fc Add new API to retrieve app names in a batch
Change-Id: I57e5c132bc58a32d70007a7a105775b526ff7bb9
Fixes: 62805090
Test: cts-tradefed run commandAndExit cts-dev -m CtsContentTestCases -t android.content.pm.cts.PackageManagerTest#testGetNamesForUids_null
Test: cts-tradefed run commandAndExit cts-dev -m CtsContentTestCases -t android.content.pm.cts.PackageManagerTest#testGetNamesForUids_empty
Test: cts-tradefed run commandAndExit cts-dev -m CtsContentTestCases -t android.content.pm.cts.PackageManagerTest#testGetNamesForUids_valid
2017-07-31 11:29:37 -07:00
Bryce Lee
658d984f04 Do not call onConfigurationChanged for appBound position changes.
Since appBounds encodes both dimensions and positions, movement will
cause a diff change. This happens in situations where the dimensions
stay constant, such as dragging a PiP window around.

To avoid flooding the client side with configuration changes, this CL
checks whether the new configuration is equivalent to the existing
configuration with the exception of the position of the appBounds
before sending to the registered callbacks.

Change-Id: I8fbc94458fd9ed3b39494c3587f25e704ec02a7d
Fixes: 63927944
Test: bit FrameworksServicesTests:com.android.server.wm.AppBoundsTests
Test: go/wm-smoke
2017-07-31 08:46:00 -07:00
Adam Lesinski
662153740d Remove extraneous invalidate call that unregisters AssetManagers
We are already taking care of updating AssetManagers affected by
path changes to a running app's ApplicationInfo. There is no need
to invalidate ALL AssetManagers, thereby unregistering them
from ResourcesManager and preventing configuration changes from
reaching them.

Bug: 64004601
Test: manual
Change-Id: I39311ec9b1dfd34eb7025836f75c92e0516bc36b
2017-07-28 16:33:11 -07:00
Svetoslav Ganov
2cfc752278 Merge "Report permission flags for all protections based on SDK am: adb8c522a8 am: fc862c9f86" into oc-dr1-dev-plus-aosp am: bccc7625ec
am: bd0cf0ab06

Change-Id: I5bdb9b5d5ff91652a2bd4395bc4f7f783e25eb66
2017-07-28 17:27:57 +00:00
Svetoslav Ganov
bd0cf0ab06 Merge "Report permission flags for all protections based on SDK am: adb8c522a8 am: fc862c9f86" into oc-dr1-dev-plus-aosp
am: bccc7625ec

Change-Id: Idf1e289d5e70246433e5eccf286026b48e57282f
2017-07-28 17:06:59 +00:00
Svetoslav Ganov
899f54da72 Report permission flags for all protections based on SDK am: adb8c522a8
am: 436b901dbb

Change-Id: Ibe7cecd60242f1895434d586af30c2081d451f0b
2017-07-28 16:59:55 +00:00
Svetoslav Ganov
70ec94fd12 Report permission flags for all protections based on SDK am: adb8c522a8
am: fc862c9f86

Change-Id: Ie08845d6e5afa8f75e1cc5392a1f5c2166d06d20
2017-07-28 16:54:06 +00:00
Svetoslav Ganov
436b901dbb Report permission flags for all protections based on SDK
am: adb8c522a8

Change-Id: Ia30269ec2097d5978ae3e0b3930a38b3f4441ea4
2017-07-28 16:42:59 +00:00
Svetoslav Ganov
fc862c9f86 Report permission flags for all protections based on SDK
am: adb8c522a8

Change-Id: I259df147b8345f6bdba5a1ed31d01d3c42e90518
2017-07-28 16:42:09 +00:00
Geoffrey Pitsch
84752fd7f2 Merge "Merge "Revert "Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev"" into oc-mr1-dev am: a6b8e4503e" into oc-mr1-dev-plus-aosp
am: 3697def242

Change-Id: I934d3681051d16a989278ba40316eb2f1ee23472
2017-07-28 15:44:26 +00:00
Svetoslav Ganov
adb8c522a8 Report permission flags for all protections based on SDK
We added a couple of protection flags that also apply to
normal and dangerous permissions. These flags are folded
in the protection level breaking apps that directly and
compare against the protection constants. Apps that target
older than O SDK don't get protection flags folded into
the protection level.

Test: All permission tests pass
      Added a new test to ensure no protection flags reported
      for normal and dangerous permissions

Change-Id: I87b10a7695d8ecfa7156525d6f3d101fc0639513
bug:62755026
2017-07-28 05:46:53 +00:00
Bart Sears
a65dd2515a Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6 am: 1a5a9be9ad am: 20c93bfe75
am: 6f1fa441be

Change-Id: I6f1fea5f5c0ede0fe3579f7419a3aee1af065900
2017-07-28 05:46:27 +00:00
Bart Sears
6f1fa441be Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6 am: 1a5a9be9ad
am: 20c93bfe75

Change-Id: Ie4791e7740eba35e0b171c11a424364a45358117
2017-07-28 05:36:17 +00:00
Bart Sears
20c93bfe75 Revert "Report permission flags for all protections based on SDK" am: 784b56e1e6
am: 1a5a9be9ad

Change-Id: Iac6546b48308836b7a4bf41295a363032326d990
2017-07-28 05:26:30 +00:00
Bart Sears
076d6f7669 Revert "Report permission flags for all protections based on SDK"
am: 784b56e1e6

Change-Id: Ice7dde53c5613f48d013424a7e99203fd854e532
2017-07-28 05:17:52 +00:00
Bart Sears
1a5a9be9ad Revert "Report permission flags for all protections based on SDK"
am: 784b56e1e6

Change-Id: I80086249438fff193dc64d9c4d1a6b1468f8c4a1
2017-07-28 05:17:48 +00:00
Bart Sears
784b56e1e6 Revert "Report permission flags for all protections based on SDK"
This reverts commit 852cf98cb8.

Change-Id: I62763bf85ec95a02a245c6b503aa34bb0e9d997a
2017-07-28 05:05:38 +00:00
Svetoslav Ganov
c44bccd588 Merge "Report permission flags for all protections based on SDK am: 852cf98cb8 am: 3cf283558a am: 2dfbbb3aa4" into oc-mr1-dev-plus-aosp
am: df55e3ce42

Change-Id: Icaa464dc5f064605f555c3b9bb09b9443a2eb028
2017-07-28 03:40:41 +00:00
Svetoslav Ganov
2dfbbb3aa4 Report permission flags for all protections based on SDK am: 852cf98cb8
am: 3cf283558a

Change-Id: Iba5b20a777e4cf8953b73e523f25175d7b274a34
2017-07-28 03:03:51 +00:00
Svetoslav Ganov
31cab0e52f Report permission flags for all protections based on SDK am: 852cf98cb8
am: 3cf283558a

Change-Id: I09b1f8573c6e2103fa66ae56352173e64b5ed8b7
2017-07-28 02:58:37 +00:00
Svetoslav Ganov
3cf283558a Report permission flags for all protections based on SDK
am: 852cf98cb8

Change-Id: I6e87c8f40fa466f2a50f41549be41ea4fb598824
2017-07-28 02:49:30 +00:00
Svetoslav Ganov
546320e506 Report permission flags for all protections based on SDK
am: 852cf98cb8

Change-Id: Id83fa00277f6262139024eee46312bf18cd7b691
2017-07-28 02:48:37 +00:00
Svetoslav Ganov
852cf98cb8 Report permission flags for all protections based on SDK
We added a couple of protection flags that also apply to
normal and dangerous permissions. These flags are folded
in the protection level breaking apps that directly and
compare against the protection constants. Apps that target
older than O SDK don't get protection flags folded into
the protection level.

Test: All permission tests pass
      Added a new test to ensure no protection flags reproted
      for normal and dangerous permissions

bug:62755026

Change-Id: I72547b0146e6b6919803e33ff64b7208c4a255ad
2017-07-28 01:46:04 +00:00
Richard Coles
727e6a9d82 Merge "Improve ActivityManagerInternal.startIsolatedProcess." 2017-07-27 14:58:04 +00:00
Geoffrey Pitsch
76a3aa06dc Revert "Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev"
This reverts commit d691f1a200, reversing
changes made to d6a2ed194c.

Test: runtest systemui-notification
Fixes: 63920384
2017-07-26 15:07:34 -04:00
Geoffrey Pitsch
ed8e7dbee5 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev am: 0d5c1490ce am: b65450e135
am: 86a2f0bb74

Change-Id: I69289bcd1a7ce9c80e879f2488915c93c221bbd7
2017-07-26 16:50:58 +00:00
Geoffrey Pitsch
86a2f0bb74 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev am: 0d5c1490ce
am: b65450e135

Change-Id: I204c5d4080ceb4f87b2c3477f0eff4b7ee749eff
2017-07-26 16:30:46 +00:00
Geoffrey Pitsch
d691f1a200 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev
am: 0d5c1490ce

Change-Id: I130816097bc68d1978b035cb2cfb0a3c678f9291
2017-07-26 16:29:01 +00:00
Geoffrey Pitsch
b65450e135 Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev
am: 0d5c1490ce

Change-Id: Iff93082f1d38becfc498fd7ba0d417ed88955c25
2017-07-26 14:39:17 +00:00
Geoffrey Pitsch
0d5c1490ce Merge "Remove ability to downgrade importance of existing channel." into oc-dr1-dev 2017-07-26 14:31:23 +00:00
Geoffrey Pitsch
1556495e28 Remove ability to downgrade importance of existing channel.
Test: runtest systemui-notification
Bug: 63920384
Change-Id: Ic9f5c50c3d2a36ccd4ba9686dad1eb415b559215
2017-07-26 10:27:02 -04:00
Christine Franks
eb1c6cd633 Merge "Remove RetailDemoModeServiceInternal" into oc-mr1-dev am: cfb5d97c3f
am: a35b696054

Change-Id: I84e499f7bd6b2d5442f0cae5cfe0d6221f62bbbe
2017-07-26 03:43:04 +00:00
Christine Franks
e9e9fb257f Remove RetailDemoModeServiceInternal
Bug: 62712426
Test: make -j100
Change-Id: I0b852aef30a8cadcda08fcff1dcf861aac2a4d7e
2017-07-26 00:40:53 +00:00
Christine Franks
cb03504d21 Merge "DO NOT MERGE - Remove RetailDemoModeServiceInternal" into oc-dr1-dev
am: 4ac942f140

Change-Id: I3d09e6fe436ae1ced8f9ed88e919f1d9bb5e52db
2017-07-26 00:16:28 +00:00
Christine Franks
4ac942f140 Merge "DO NOT MERGE - Remove RetailDemoModeServiceInternal" into oc-dr1-dev 2017-07-26 00:07:14 +00:00
Calin Juravle
f1ff36f0f9 Use the class loader context when optimizing secondary dex files
Record the class loader context for secondary dex loads and pass it to
dexopt during compilation.

The class loader context is passed from libcore every time a
BaseDexClassLoader is created and its recorded in the package dex usage
file.

Note that the context may be:
- unknown: if the dex file was not use after the the upgrade and its
context was not yet updated
- unsupported: if any of the class loaders from the loading context is
unsupported (only PathClassLoader and DelegateLastClassLoader are
supported).
- variable: if it changes over time, form one run to another.

In all the above cases the old compilation behavior is preserved for
now.(i.e. the dex file with be compiled with SKIP_SHARED_LIBRARY_CHECK)

Bug: 38138251
Test: runtest -x
services/tests/servicestests/src/com/android/server/pm/dex/
      adb shell cmd package compile -f -m quicken ^Csecondary-dex
com.google.android.gms

(cherry picked from commit 3bec94d78b)

Change-Id: Ie8b78c7c0d5de43733b3d116f8dcb3a65324cca8
2017-07-25 14:21:49 -07:00