Commit Graph

1958 Commits

Author SHA1 Message Date
Andrew Sapperstein
8e6710d768 Merge "Hide system apps until installed (1/2)" 2018-06-26 19:48:05 +00:00
TreeHugger Robot
abe78cd313 Merge changes from topic "biometrics-face"
* changes:
  5/n: Move FaceService to biometrics directory
  4/n: Add face authentication framework
2018-06-22 18:44:27 +00:00
Kevin Chyn
2ffadb38bc 5/n: Move FaceService to biometrics directory
Bug: 110387294

Test: builds, observable effect on devices (as expected)
Change-Id: Iaf0814c3c19aa9fa448e250cb3a161bd11fd935e
2018-06-21 17:00:07 -07:00
Gilad Bretter
cb51b8b847 4/n: Add face authentication framework
This change is cherry-picked and rebased from AOSP
https://android-review.googlesource.com/c/platform/frameworks/base/+/660242

Add face recognition as an identification method, following fingerprint
design. Unlike fingerprint, only one face template can be enrolled per
user, and a vendor message is passed from the HAL all the way to the
client callback to allow GUI indication about the enrolled face
templates.

Add FaceAuthenticationManager and FaceService.
Add face authentication capability to TrustManager and Keyguard.
Modify TrustManager and KeyguardUpdateMonitorCallback fingerprint code
to support generic biometric method to eliminate duplications.
Add BiometricSourceType enum to keep track of the specific biometric
method.

Test: biometric authentication still works on the device

Fixes: 110385761

Change-Id: I5d04fe69a112c13d3ef7330b9c08c146e36c5335
Signed-off-by: Gilad Bretter <gilad.bretter@intel.com>
2018-06-21 17:00:07 -07:00
Kevin Hufnagle
c310a1fe62 Merge "docs: Edited UNINSTALL_SHORTCUT permission desc." 2018-06-21 21:25:31 +00:00
TreeHugger Robot
3f61a66cf1 Merge "Make MICROPHONE_MUTE_CHANGED broadcast protected" 2018-06-21 20:14:29 +00:00
Rhed Jao
cd47c26d74 Hide system apps until installed (1/2)
Applying this mechanism for system carrier apps to make visibility
reasonable from the user's perspective. In other words, before
hidden system apps have been installed, they wouldn't be listed
via APIs in PackageManager which are used at all apps list and
search in Settings and so on.

Test: atest CarrierAppUtilsTest
Test: atest PackageManagerTest
Test: cts DeviceOwnerTest
Test: gts ManagedProfileProvisioningHostsideTest
Bug: 74068582
Change-Id: I1f23aba589b98351a1871a44a3058b67c416f351
2018-06-21 20:39:23 +08:00
TreeHugger Robot
054ca07fe3 Merge "Define a permission to read emergency info name" 2018-06-21 08:58:47 +00:00
Nobuaki Tanaka
c4218a0c0e Make MICROPHONE_MUTE_CHANGED broadcast protected
Bug: 109856153
Test: Build, Ensure broadcast does not cause error.

Change-Id: I1f329eb7df36fc921f6d10a2fcb00c32d7bd3d1d
2018-06-20 12:09:51 -07:00
Billy Chi
3f523d2bd3 Define a permission to read emergency info name
Define com.android.emergency.permission.READ_EMERGENCY_INFO_NAME permission for an application to read emergency info name.

Test: Build pass.
Bug: 80406149
Change-Id: I85ec6cc857efcc06e95dac53ab293798f97e4e4f
2018-06-20 12:19:19 +08:00
Kevin Chyn
551767618e Merge changes from topic "biometric-refactor"
* changes:
  2/n: Refactor out common BiometricService code
  1/n: Move fingerprint-service related code to biometrics/fingerprint
2018-06-20 03:47:53 +00:00
Kevin Chyn
95d628ef86 1/n: Move fingerprint-service related code to biometrics/fingerprint
Bug: 109900227

Test: builds
Change-Id: I973c816d75c48ed838c1638c45d728b9df4d11ef
2018-06-19 16:09:06 -07:00
Kevin Hufnagle
789879a1f8 docs: Edited UNINSTALL_SHORTCUT permission desc.
Added a callout and a message that more strongly discourages use of
the UNINSTALL_SHORTCUT permission.

Test: make ds-docs -j16

Bug: 72864896
Change-Id: Iacb7a1718c4688e9061bdfd3b50b7afc8f170abb
2018-06-19 20:13:26 +00:00
Philip P. Moltmann
4a6dff0911 Allow permissions to have background permissions
Some permissions are getting split into foreground and background
variants. If an app only has the foreground version it can only access
the protected resource while the user is using it. Once the background
permission is added to the foreground permission the app can always
access the resource protected by the permission.

- Only having the background permission does grant anything.
- Mutliple foreground permission can share a single background permission,
  but a foreground permission can not have multiple background
  permissions.
- As the implementation of background permissions is based on AppOps
  only the system can declare such foreground/background permissions
- A CTS test enforce that the background is in the same group as the
  matching foreground permission.

Bug: 78788390
Test: Checked declared permission after boot and found new attributes
Change-Id: Ica7ba77b24345607c7467c41c982a58c39199024
2018-06-19 12:23:55 -07:00
TreeHugger Robot
1aadbc2d09 Merge "Add new background location APIs." 2018-06-07 19:32:36 +00:00
Dianne Hackborn
afba81619d Add new background location APIs.
Work on issue #109754053: Implement tri-state location in platform

- New background location permission
- New (temporary?) API level for compatibility with old apps

None of this is exposed yet as a public API, that will be
done in the future.

Bug: 109754053
Test: atest FrameworksServicesTests:AppOpsServiceTest
Test: atest CtsPermissionTestCases:AppOpsTest
Change-Id: I986dc871b9e8ed3bf592d2546eadaefb4fefe099
2018-06-07 11:04:22 -07:00
Andrew Sapperstein
e042fdd61c Merge "Revert "Hide system apps until installed (1/2)"" into pi-dev am: bae9b1a71c
am: 15014a6f4c

Change-Id: I91a5b8e0fde679dfa324f7485fe2216017484872
2018-06-07 09:49:15 -07:00
Andrew Sapperstein
bae9b1a71c Merge "Revert "Hide system apps until installed (1/2)"" into pi-dev 2018-06-07 16:15:57 +00:00
Sanry Huang
afef5daaf9 Revert "Hide system apps until installed (1/2)"
This reverts commit 40ede29ed6.

Bug: 74068582
Bug: 80444486
Bug: 80316870
Bug: 109803325
Bug: 109642189
Bug: 109660260
Bug: 109649585
Bug: 109647120
Bug: 109648512
Bug: 109648513
Bug: 109647122
Change-Id: I0e50ceebeaecae89f461f541450e24d9c148527d
2018-06-06 19:42:39 +00:00
Fan Zhang
608247a46c Merge "Update call log permission group icon." into pi-dev am: 9a184cb7f3
am: c79ed0f09f

Change-Id: I933fc06c7904778486ac63e3edc244f7083ad0dc
2018-05-29 18:04:04 -07:00
Fan Zhang
8e6adb1b46 Update call log permission group icon.
Change-Id: I605ece95cd29405b9d63692d038f36390ac367ef
Fixes: 78230210
Test: visual
2018-05-29 14:27:35 -07:00
sanryhuang
8842f6fe1c Merge "Merge "Hide system apps until installed (1/2)" into pi-dev am: 56cc567dfd" into pi-dev-plus-aosp
am: 984436e530

Change-Id: I24ddd296f8d72fa69c557935156ee6380955f33b
2018-05-24 17:53:48 -07:00
sanryhuang
40ede29ed6 Hide system apps until installed (1/2)
Applying this mechanism for system carrier apps to make visibility
reasonable from the user's perspective. In other words, before
hidden system apps have been installed, they wouldn't be listed
via APIs in PackageManager which are used at all apps list and
search in Settings and so on.

Test: manual
Test: atest CarrierAppUtilsTest
Test: atest PackageManagerTest
Bug: 74068582
Change-Id: Id3ff138ad529b909d9bbf6719af3a553b909ccbb
2018-05-23 16:29:31 -07:00
Bookatz
75158ac57c StatsCompanionService alarms more efficient
Use the OnAlarmListener version of alarms, instead of the broadcast
version, to save on the overhead of broadcasts.

Change-Id: I95a336324c3042d18fbb547ba3b925811c1494bf
Fixes: 73115955
Test: cts-tradefed run cts-dev -m CtsStatsdHostTestCases
2018-05-22 13:54:30 -07:00
lpeter
d62e8f174f Merge "[IdleController] Support dock scenario on idle or active judgement" into pi-dev am: 86b2581c16
am: 2fdc1b8b13

Change-Id: I0d6e38e4cc8a7f24874956a1382f476c8021e838
2018-05-16 20:27:18 -07:00
lpeter
318abc9324 [IdleController] Support dock scenario on idle or active judgement
In the current design, IdleController of Job service considers devices as ‘idle’ after 71 minutes of screen off. But under docking use scenario, devices screen might remain on for a very long time and it’s not necessary implying the device being interactive with users.
So create a mechanism for device to enter the ‘idle’ state that JobScheduler can kick off idle tasks.

Bug: 79183658
Test: atest DeviceStatesTest
Change-Id: I5b307ca51e28ffca63f79a9c43984c3b76e51629
2018-05-17 02:23:02 +00:00
Nick Chalko
604afcba57 Make TV_INPUT_HARDWARE a vendorPriviliged permission
See goto/systemsdk-design

Change-Id: I35fe191f45bb2064619e5f04632260054a545db0
Test: m; flashall elfin
2018-05-10 13:20:25 -07:00
Nick Chalko
9efce1eb2e Make HDMI_CEC a vendorPriviliged permission
Vendors implement the CEC HAL and put it in
the vendor partition. For the CEC driver to run it
needs android.permission.HDMI_CEC

See goto/systemsdk-design

Change-Id: I88738d08292c450ed6821106e3844feab0b3bcfe
Test: m -j; flashall elfin
2018-05-10 12:25:34 -07:00
fionaxu
f88ba11def Merge "add install action for carrier id to system API" into pi-dev am: 689866352b
am: 907f3cd76b

Change-Id: If16f5f96067f100ecd207164fcd29764414a218f
2018-05-09 16:22:54 -07:00
TreeHugger Robot
689866352b Merge "add install action for carrier id to system API" into pi-dev 2018-05-09 22:47:40 +00:00
fionaxu
2776ed56b8 add install action for carrier id to system API
Bug: 79426800
Test: Manual
Change-Id: Icd3e9ae527dc17ab5762aa57df596f058de08d5b
2018-05-08 15:25:40 -07:00
android-build-team Robot
3bbebdd3c7 Merge "Fix issue #78230210: Strobe: Need separate runtime permission group for READ_CALL_LOG and WRITE_CALL_LOG" into pi-dev am: 06defc2a31
am: 0bd5e9860c

Change-Id: Ie58474a88d616afd698bc1e124262f89bdfa07f1
2018-05-02 14:04:25 -07:00
android-build-team Robot
06defc2a31 Merge "Fix issue #78230210: Strobe: Need separate runtime permission group for READ_CALL_LOG and WRITE_CALL_LOG" into pi-dev 2018-05-02 16:55:15 +00:00
Remi NGUYEN VAN
ee183a2571 Merge "Add NETWORK_BYPASS_PRIVATE_DNS permission" into pi-dev am: d64c07da37
am: 8d1ee96e0e

Change-Id: I0d3429faddc0509781c896608039e4143cb1e8fd
2018-05-01 22:54:34 -07:00
Remi NGUYEN VAN
62594fd499 Add NETWORK_BYPASS_PRIVATE_DNS permission
Have the captive portal app and the MMS service use this new permission
to bypass private DNS.
Bug: b/78494660
Test: manual: captive portal login & MMS sending works

Change-Id: I0a4a8d0105becf6957fd44099bd84eca51e6716f
2018-05-02 10:51:48 +09:00
Dianne Hackborn
ed23b9b12c Fix issue #78230210: Strobe: Need separate runtime permission group for READ_CALL_LOG and WRITE_CALL_LOG
Bug: 78230210
Test: manual
Change-Id: Ie5a0ab3dffd40dc44f7aa5deb81b42fbc2dbd406
2018-05-01 14:00:34 -07:00
android-build-team Robot
8d7b81e67f Merge "Expose APIs used by CtsPermissionTestCases" 2018-04-27 18:56:48 +00:00
Philip P. Moltmann
33115156f9 Expose APIs used by CtsPermissionTestCases
Test: atest CtsPermissionTestCases
Bug: 77604428
Change-Id: Ib5e9b678e98aab86dac90610ed071eb89f14fce9
2018-04-26 09:40:57 -07:00
Roshan Pius
b65a1cf7ee AndroidManifest.xml: Add new network permission for setup wizard
Adding a new permission for setup wizard to access privileged network
operations.

Bug: 77924407
Test: Compiles
Change-Id: I4203abf62b2b297117b5877c8eb1d5260e30e39a
2018-04-24 11:35:56 -07:00
Mathew Inwood
5f1f29a97a Enforce permission when disabling API checks.
Add a new internal permission required to disable hidden API checks using
"am instrument". Grant this permission to the shell.

Test: $ adb shell am instrument --no-hidden-api-checks mypackage/.MainInstrumentation
Bug: 64382372

Change-Id: I193dba412560f17810ad0c67c733a1eec15fa7b7
2018-04-19 10:08:39 +01:00
Jeff Sharkey
5e0d360411 Merge "API council requested tweaks to SubscriptionPlan." into pi-dev 2018-04-09 23:20:43 +00:00
Suprabh Shukla
3c3af1406e Activity interceptor dialog for suspended apps
Added an AlertActivity to intercept the start for an activity belonging
to a suspended app. More details will be shown if the suspending app
also defines an activity to handle the API action
SHOW_SUSPENDED_APP_DETAILS.

Test: Added tests to existing classes. Can be run via:
atest com.android.server.pm.SuspendPackagesTest
atest com.android.server.pm.PackageManagerSettingsTests
atest com.android.server.pm.PackageUserStateTest

Bug: 75332201
Change-Id: I85dc4e9efd15eedba306ed5b856f651e3abd3e99
2018-04-04 18:40:19 -07:00
Jeff Sharkey
0fc6d03b62 API council requested tweaks to SubscriptionPlan.
Return new shiny Range<> object instead of Pair<>.  Tell developers
what permission to check on refresh broadcast.  Describe what
exceptions might be thrown, and that an empty list is okay.

Allow creation of plans with richer Period object, instead of forcing
them into rigid week or day options.

Protect SubscriptionPlan broadcast.

Test: atest android.util.RecurrenceRuleTest
Test: atest com.android.server.NetworkPolicyManagerServiceTest
Bug: 74945820
Change-Id: I7e555798e0cfaa214ca93d9df627c6443fc5d986
2018-04-04 16:06:27 -06:00
Mike Ma
fbc01fcbd5 Register broadcast receiver at runtime instead
Cannot find class when registering Usb connection broadcast receiver
in AndroidManifest, causing system process to crash. Switch to
register receiver at runtime when boot complete.

Fixes: 77274266
Test: Manually plug & unplug usb cable, and reboot device
Test: Verify usb_data appears in batterystats dump
Test: Verify there is no crash log
Change-Id: If4a9e85aa81173ad6d8cb6ce28cc030814c520a5
2018-04-03 12:32:56 -07:00
Yangster-mac
c04feba805 Move forward the alarm timestamp when config is added to statsd.
Test: statsd test
BUG: b/77344187

Change-Id: Ieacffaa29422829b8956f2b3fcb2c647c8c3eed9
2018-04-02 18:12:36 -07:00
Bryan Mawhinney
462e29da9b Add a SystemApi to control display saturation.
Allows an app with the appropriate permission to reduce
(make more gray) the saturation of colors on the display.

Test: manual
Bug: 77189882
Change-Id: I2b7b065d07bd2ca24730b2e8c52d161c22b307ab
2018-03-29 18:41:03 +01:00
Jeff Sharkey
c8156c6a52 Merge "API for granting/revoking runtime permissions." into pi-dev 2018-03-29 15:14:34 +00:00
TreeHugger Robot
e100329647 Merge "Fix typo on pull alarm broadcast receiver" into pi-dev 2018-03-28 19:33:19 +00:00
Vishwath Mohan
86ed912f5a Merge "Refactor FingerprintDialog to BiometricDialog" into pi-dev 2018-03-28 18:46:34 +00:00
Chenjie Yu
4cef3e4b8e Fix typo on pull alarm broadcast receiver
Bug: 75970648
Test: cts
Change-Id: Iaf64b5e55457c2ade476acbe23bf6d3a0e22f8ec
2018-03-28 09:24:33 -07:00