Commit Graph

1339 Commits

Author SHA1 Message Date
Hall Liu
6392e2548d Merge "Add system service for accessing SystemConfig" 2020-01-20 21:34:28 +00:00
Ruchir Rastogi
25e6dd3ed1 Merge "Migrate DeviceCalculcatedPower pullers to new API" 2020-01-16 19:16:50 +00:00
Automerger Merge Worker
2a7b367d06 Merge "Replace CONNECTIVITY_INTERNAL in SystemUI" am: 3950a24dca am: 8d82c3cbd9 am: 8e92458626
Change-Id: Id94e38dafad3dd6a5316c53ba357a8004a7d7b9e
2020-01-16 07:58:53 +00:00
Paul Hu
3950a24dca Merge "Replace CONNECTIVITY_INTERNAL in SystemUI" 2020-01-16 07:23:17 +00:00
Heemin Seog
3f338317e7 Add new permission to privapp-permissions
Fix: 147751923
Test: manual
Change-Id: Iba966baa91558a57c1e1bd2809eaab05151ac13b
2020-01-15 23:43:59 +00:00
Ruchir Rastogi
5ea3163325 Migrate DeviceCalculcatedPower pullers to new API
As part of migrating the pullers to the new API, we modify
permission checks within BatteryStatsService. Previously, a Binder
thread within StatsCompanionService (with statsd's calling identity)
called BatteryStatsService functions, which was why statsd was assigned
the BATTERY_STATS permission. Now, that call is being made from the
system process Background thread. Because enforceCallingPermission
outside of Binder threads, we switched to enforceCallingOrSelfPermission.

Test: m -j
Test: adb shell cmd stats pull-source 10039
Test: adb shell cmd stats pull-source 10040
Test: adb shell cmd stats pull-source 10041
Test: atest CtsStatsdHostTestCases:UidAtomTests#testDeviceCalculatedPowerUse
Test: atest
CtsStatsdHostTestCases:UidAtomTests#testDeviceCalculatedPowerBlameUid
Test: atest CtsStatsdHostTestCases:BatteryStatsValidationTests#testPowerUse
Bug: 145565211
Change-Id: Ie009e6eead3e48ecee6b40d9a38c9d571d4d4117
2020-01-15 15:39:56 -08:00
Automerger Merge Worker
4e37fa7cb3 Merge changes from topic "sp06-offloadcontroller" am: 01d30a4ce0 am: b61116705a am: c6a841b77b
Change-Id: I4e7924ebb2d37ecffb8facce0ec51643afb12264
2020-01-15 05:33:32 +00:00
Saeid Farivar Asanjan
7440af3dc8 Whitelist Paintbooth
Test: manually
Change-Id: I5ed9a31ab1af9eb5353038e82418cfe7fad89dfe
2020-01-14 15:58:49 -08:00
junyulai
37ed835f3a [SP06.1] Add UPDATE_DEVICE_STATS permission to Tethering
Add corresponding permission to allow tether offload to update
network usage through new API that requires UPDATE_DEVICE_STATS
permission.

This is the minimum permission that required to update network
usage with the new system api.

Test: atest FrameworksNetTests OffloadControllerTest TetheringTest
Bug: 130855321
Change-Id: I9c0c86e20d4797ea3570feed741be3a07f839c7d
2020-01-14 20:14:47 +08:00
Automerger Merge Worker
9cea835311 Merge "Add Lorenzo to OWNERS for privileged permissions whitelist" am: 0fd118f5bb am: b310a107b7 am: 124ec9325e
Change-Id: Ia181cf99a9c4668e4b198d5088136f08350d8e93
2020-01-10 23:14:56 +00:00
Treehugger Robot
0fd118f5bb Merge "Add Lorenzo to OWNERS for privileged permissions whitelist" 2020-01-10 22:46:10 +00:00
Jeff Vander Stoep
641dc190b9 Add Lorenzo to OWNERS for privileged permissions whitelist
Test: With great power comes great responsibility.
Change-Id: I885baf50b2d901c4f052f2197c0d58386aae80b2
2020-01-10 20:34:26 +01:00
Automerger Merge Worker
d65e33cd15 Merge "Give tethering TETHER_PRIVILEGED permission" am: b5d04cb6cd am: 3e8731d00e am: 2a1f6055db
Change-Id: Ide3a2e84c7511d79115e6f2065033a38db8d6447
2020-01-10 10:52:57 +00:00
markchien
36aea56160 Give tethering TETHER_PRIVILEGED permission
This fix the crash when perform "Reset Wi-Fi,mobile & Bluetooth"

Bug: 146900199
Test: -build, flash, boot
      -atest TetheringTests
      -atest CtsTetheringTest
      -manual perform "Reset Wi-Fi,mobile & Bluetooth"

Change-Id: I036409358ed15a797bdb751bb66513425350d066
2020-01-10 14:49:24 +08:00
Hall Liu
b38ad5f563 Add system service for accessing SystemConfig
Add SystemConfigService and associated AIDLs and permissions for
accessing SystemConfig. The service returns values obtained from a
static instance of com.android.server.SystemConfig.

Bug: 143112379
Test: atest SystemConfigTest
Change-Id: I1a863ae9f53db21d698376008e5b1da83309b141
2020-01-07 15:17:40 -08:00
Automerger Merge Worker
070e602547 Merge "Add new permissions" am: 62ace8c46a am: c0f9b27214 am: ec776dfda9
Change-Id: I8193a10bef4d829f41fd2609b571c9fa52365783
2020-01-06 21:35:59 +00:00
Neil Fuller
62ace8c46a Merge "Add new permissions" 2020-01-06 19:38:25 +00:00
Evan Severson
43e17e0369 Create permission for managing one-time permission sessions
Test: Manual
Bug: 136219229
Change-Id: I6870c7782f2dd51c655eea37bcb2487e5e29dfff
2020-01-03 13:49:33 -08:00
TreeHugger Robot
9682046756 Merge "preinstalled-packages-platform for profiles" 2019-12-23 22:38:48 +00:00
Bonian Chen
62a1827a74 Merge "Add READ_PRIVILEGED_PHONE_STATE to the settings whitelist" 2019-12-23 05:53:14 +00:00
Issei Suzuki
8cac70a65e Merge "Promote app transition target its ancestor if possible." 2019-12-20 12:44:09 +00:00
Issei Suzuki
0ae90d0cca Promote app transition target its ancestor if possible.
Previously we only animated ActivityRecord. When hierarchical animation
is enabled, we find the top most entity from the window hierarchy (i.e.
ActivityRecord < Task < ActivityStack) which we can animate without
user visible changes, and set app transition animation on it.

The hierarchical animation is disabled by default. To enable it,
system property "persist.wm.hierarchical_animations" must be set.

Test: atest AppTransitionControllerTest
Bug: 131661052
Change-Id: I4709fd178de09d289d72cf1833b056b4e34fc92b
2019-12-20 11:05:33 +01:00
TreeHugger Robot
996c6b12f6 Merge "Move the permission.xml to /system_ext" 2019-12-20 07:26:42 +00:00
markchien
ae8aa646dc [Tether13] Move TetheringManager into framework
Move tethering out of ConnectivityService. All client would
use TetheringManager to talk with TetheringService directly.

Bug: 144320246
Test: -build, flash, boot
      -atest TetheringTests

Change-Id: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
2019-12-20 10:31:31 +08:00
Jay Aliomer
27221263df Merge "Persist dark mode when set" 2019-12-19 19:51:08 +00:00
Bookatz
6d31ac184d preinstalled-packages-platform for profiles
Unwhitelist packages that are not needed on profiles, such as wallpaper,
navbar, and cutout apps. These system packages will therefore not be
pre-installed on profile users.

Bug: 134605778
Test: Confirmed that these packages do not appear in a profile
Change-Id: Icefbcf8def31450a0f2d93cca12f6fcbf6803cb7
2019-12-19 11:48:28 -08:00
Vadim Caen
85e9d45cd8 Merge "Better debbugging message for orientation" 2019-12-19 16:12:33 +00:00
markchien
6d06f6d51a [Tether13] Move TetheringManager into framework
Move tethering out of ConnectivityService. All client would
use TetheringManager to talk with TetheringService directly.

Bug: 144320246
Test: -build, flash, boot
      -atest TetheringTests

Change-Id: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
Merged-In: Ib051bea724a256f9c4572b566e46ae7b9c4abe6e
2019-12-19 20:53:06 +08:00
Treehugger Robot
7b2a29361c Merge "Change Tethering package name" 2019-12-19 12:35:49 +00:00
Vadim Caen
1096f11e21 Better debbugging message for orientation
Test: N/A
Bug: N/A
Change-Id: Iefe688c3aa10857a6d7d87236a095605a62d1ff0
2019-12-19 12:47:10 +01:00
Neil Fuller
09e8b7d841 Add new permissions
This adds new permissions required when setting the time /zone in
response to telephony signals and when setting the time / zone manually
along the lines of "principle of least privilege".

The intent is to later restrict the number of distinct processes that
can manipulate the device system clock / time zone property directly so
that all time changes go through the time / time zone detector services,
which can enforce policy, log the reasons for changes, and so on.

Bug: 140712361
Test: atest com.android.server.timedetector
Change-Id: Iabd3a5f449ad2ef2b6581475ef2535a4a8a88ef9
2019-12-19 11:11:48 +00:00
markchien
5a9d9f6935 Change Tethering package name
".apex" is easy to confuse.
Rename as below:
apex: com.android.tethering.apex -> com.android.tethering
apk: com.android.tethering -> com.android.networkstack.tethering

Bug: 146471733
Test: build

Change-Id: I2c7647abb996539a3af6cfe0e0214a5e8927c0d6
Merged-In: I2c7647abb996539a3af6cfe0e0214a5e8927c0d6
2019-12-19 13:06:50 +08:00
Mark Chien
30642b395c Merge "Add TETHER_PRIVILEGED permission to shell for CTS test." 2019-12-19 04:59:02 +00:00
markchien
58b0f233c5 Change Tethering package name
".apex" is easy to confuse.
Rename as below:
apex: com.android.tethering.apex -> com.android.tethering
apk: com.android.tethering -> com.android.networkstack.tethering

Bug: 146471733
Test: build

Change-Id: I2c7647abb996539a3af6cfe0e0214a5e8927c0d6
2019-12-19 12:57:39 +08:00
TreeHugger Robot
a1d5731beb Merge "Move SystemUI to /system_ext" 2019-12-19 02:17:02 +00:00
Jeongik Cha
f0b0eafabb Move the permission.xml to /system_ext
As mentioned in b/132780927, we plan to forbid hidden APIs usage in /product partition,
in other word, apps in /product are allowed to use only either public API or system API.
So, this app will be moved to /system_ext, of course, it is not permanent,
they can be moved back to /product if they don't use hidden API anymore.

Bug: 137908189
Test: m
Test: check whether device boots successfully
Change-Id: I623e0dcc1d3bc1a2a69a6cad34ace1f79532654e
2019-12-18 21:16:25 +09:00
Automerger Merge Worker
5dfe7b9e51 Merge "[Tether11] Grant privileged permissions for tethering" am: b04cf17d71 am: 906a909c32 am: 323d51382a
Change-Id: I633592a7304130cd660ea861348141f02cdf9e52
2019-12-18 00:32:59 +00:00
Mark Chien
b04cf17d71 Merge "[Tether11] Grant privileged permissions for tethering" 2019-12-18 00:11:43 +00:00
Mark Chien
a6a6915f1c Merge "Add TETHER_PRIVILEGED permission to shell for CTS test." 2019-12-18 00:08:58 +00:00
Ytai Ben-tsvi
0d52f4202c Merge changes from topic "soundtrigger_refactor"
* changes:
  Migrate SoundTrigger implementation to new service
  Implement the soundtrigger_middlewware service
  Add a permission for preempting sound trigger sessions
  Sound trigger middleware service definition
  Add audio.common types AIDL definition
2019-12-17 22:33:55 +00:00
Jay Aliomer
e2815f22c8 Persist dark mode when set
When setting dark mode, the changes dont persist

Test: atest UiModeManagerServiceTest
Change-Id: I6c18cf096510d79cff9c0d6eac830f7b9209166c
2019-12-17 21:53:58 +00:00
markchien
840abdc14c [Tether11] Grant privileged permissions for tethering
Since tethering is moved from systemServer to networkStack
process, it would lose privileged capability. Grant privileged
permissions for tethering individually. Grant MANAGE_USB to control
usb rndis function. Grant MODIFY_PHONE_STATE to know whether DUN
is required. Grant READ_NETWORK_USAGE_HISTORY to update tethering
usage. Grant UPDATE_APP_OPS_STATS to check WRITE_SETTINGS permission.

Bug: 144320246
Test: -build, flash, boot
      -atest TetheringTests

Change-Id: Id6e71b58e027d6ba90551084367ef881652c2555
2019-12-18 01:06:36 +08:00
Automerger Merge Worker
50682787ba Merge "Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission" am: 8893c6f9ac am: e8f7e5f483 am: 81358e51d0
Change-Id: Ie6d7fe61c21f170bb63c5a22e6f785cffa8f14fc
2019-12-17 14:37:54 +00:00
markchien
9fe658adc3 Add TETHER_PRIVILEGED permission to shell for CTS test.
Grant TETHER_PRIVILEGED permissions to the shell identity
for use within CTS tests.

Bug: 145490751
Test: atest CtsTetheringTest
Change-Id: Ifad265cdc5e0b1b1b2fa8f4f79eeb7dd18493624
Merged-In: Ifad265cdc5e0b1b1b2fa8f4f79eeb7dd18493624
2019-12-17 13:30:26 +00:00
markchien
a2ce459f65 Add TETHER_PRIVILEGED permission to shell for CTS test.
Grant TETHER_PRIVILEGED permissions to the shell identity
for use within CTS tests.

Bug: 145490751
Test: atest CtsTetheringTest
Change-Id: Ifad265cdc5e0b1b1b2fa8f4f79eeb7dd18493624
2019-12-17 21:24:23 +08:00
Jeongik Cha
d45d9e111b Move SystemUI to /system_ext
we plan to forbid hidden API in product partition.
So this app should be moved to /system_ext because it uses hidden API.
It is not permanent, so they can be moved back to /product due to
needs if there isn't hidden usage anymore.

Bug: 137908189
Test: m
Test: check whether device boots successfully
Test: atest SystemUITests
Change-Id: I54f86496d4a0045af3576091cce00e5cd285b4f8
2019-12-17 07:19:45 +00:00
TreeHugger Robot
e754074a05 Merge "move privapp_whitelist_com.android.storagemanager to system_ext" 2019-12-16 09:19:31 +00:00
paulhu
741e513050 Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission
Add CONNECTIVITY_USE_RESTRICTED_NETWORKS permission to phone
package in privapp permission list.

Bug: 146222771
Test: build, flash, boot to home
Change-Id: I1c88b892b1d2f50856b139a5cad5dc8b07a006be
2019-12-16 09:02:36 +00:00
Ytai Ben-Tsvi
0b0441d16c Add a permission for preempting sound trigger sessions
Previously, the power to preempt sound trigger recognition sessions
for the sake of being able to capture audio on platforms that don't
support doing both concurrently, was implicitly granted based on
process (audio_server) co-location with the sound trigger service.
Since this service is now being migrated out of audio_server, a new
permission is introduced and granted to the audio server.

Change-Id: Ifcdfc2a5543d814fb0630a45cdd9bcdba4d92107
Bug: 142070343
2019-12-13 10:45:42 -08:00
Louis Chang
677921fc25 Merge ActivityDisplay and DisplayContent into one class (77/n)
Bug: 80414790
Test: Existing tests pass
Change-Id: I1924af0d353406ad950b9758e19384a579ad1426
2019-12-13 17:51:46 +08:00