Removing api status to several apis created during telephony mainline in R.
Bug: 147465477
Test: make
Change-Id: I6d394fae478ef62769147beaeb944771a67aca70
This is already effectively an API the way it is documented.
Updating all the references of the hard-coded constant.
Test: make update-api && make
Bug: 151112929
Change-Id: Iadeb03c516215cfc51bc8604b67250348d5a4375
The permission annotation is stale. Only the
CONFIGURE_WIFI_DISPLAY permission is checked.
Bug: 151091657
Test: compiles
Change-Id: I6f7cbf8910e5f9e6830d3cb8ba686ca17616fb19
Remove support for SAE Password identifier from API surface due to
privacy vulnerabilities that exist in the protocol.
Bug: 150897608
Test: atest WifiConfigurationTest
Test: Manually connect to SAE network without password id
Change-Id: I40ebf7720ee51ddf264d4f256a1a75b03f1a6ca6
Starting in R, there is a new public API overload that delivers a
flags argument. Some apps may be relying on a previous hidden API
that delivered a userId argument, and this change is used to control
delivery of the new flags argument in its place.
There are dozens of these hidden API users are in the system UID,
either in the system process or the Settings app, so we hard-code
giving them the legacy behavior, since refactoring would be messy
between internal and AOSP branches.
Also adjust incoming and outgoing method signatures to use slightly
more flexible Collection<Uri>, which has handy methods like
contains() and isEmpty().
Bug: 150939131
Test: atest --test-mapping packages/providers/MediaProvider
Test: atest FrameworksServicesTests:com.android.server.devicepolicy.DevicePolicyManagerTest
Exempt-From-Owner-Approval: trivial refactoring
Change-Id: If6a77449e19215cf1c60d4217e62fc04b0959bfc
CONNECTIVITY_INTERNAL permission is not checked,
instead NETWORK_SETTINGS is checked.
Updated the annotation accordingly.
Bug: 151091657
Test: compiles
Change-Id: I20b73d695feefdd666be4e6894db981c39ad6b06
Undid carrier constants as @SystemApis. Also had to move
constants out of annotation.java because any references in
that specific file need to be to public APIs.
Bug: 148170690
Test: make, flash
Change-Id: Ie4b827563dbc373c58ec805bc5400e0950b5b81e
- Extend the concept if "isPrivilidged" to a generic "RestrictionBypass"
class so that we can add more variants of bypassing.
- Add a new way of bypassing by using a new permission.
- Always except resolvable UIDs (root, shell, media_uid, audioserver,
cameraserver, system server) from restrictions.
Fixes: 141210120
Test: atest -m CtsAppOpsTestCases FrameworksMockingServicesTests:AppOpsServiceTest FrameworksMockingServicesTests:AppOpsUpgradeTest
Change-Id: I3ca555e9370aa0003400429ee7ab12e95c62a042
Write data to an installation file requires INSTALL_PACKAGES permission.
Test: builds
BUG: 149299379
Change-Id: I8e6d6681cc26b748375cc1a0569033a18c3bb670
It's useful for apps to know which inset types they can currently
control, as otherwise they have to poll by calling
controlInsetsAnimation repeatedly.
This can be used when apps want to apply a custom animation
immediately during startup as soon as possible.
Fixes: 150780468
Test: InsetsControllerTest
Test: CTS will be added soon
Test: WindowInsetsActivity
Change-Id: Ic0388c11d759843d3ac9edd8ef23904c9ce05c46
This is a fix in response to developers' feedback on DP1.
Add Environment API that enables apps to check whether they have All
Files Access special app access. The API encapsulates the actual
mechanics of the check, which are as follows:
* First check MANAGE_EXTERNAL_STORAGE app-op,
if it's allowed, return true. If it's denied (ignored or errored),
return false.
* If the mode is default, then check for MANAGE_EXTERNAL_STORAGE
permission, if it's GRANTED (not just declared), then return true,
else return false.
Also add test.
Test: atest EnvironmentTest # not CTS
Fix: 150115615
Merged-In: I0574827c22960bf8f074313d983f289be7142149
Change-Id: I0574827c22960bf8f074313d983f289be7142149
Per API feedback on clarifying that while we strive our best to provide
excellent service to our customers, we cannot fulfil all of their orders
at once.
Fix: 150332011
Change-Id: Iac156ea5cb312cce16fbaf10fc1f8bcd6743d377