This activity is started by launching an intent with the action
android.settings.MANAGE_APP_ALL_FILES_ACCESS_PERMISSION and the package
name.
Previously, we required launching package to be granted the permission
MANAGE_EXTERNAL_STORAGE. This is not WAI because we want any app that
requests the permission to be able to launch the activity.
Because the activity allows apps that have requested the permission to
toggle the special app access anyway, this CL drops the requirement
mentioned above and now any app can launch the activity.
Test: manual - a normal app that doesn't request the permission can
launch the intent, and it can't toggle the special app access.
Test: manual - a normal app that requests the permission can launch the
intent, and it can toggle the special app access.
Fixes: 147906545
Change-Id: I605a5b03f9be1b4b11d94e121a18bbd316404590
Adds 2 activities with the appropriate intent-filters to handle intents
used to control OP_MANAGE_EXTERNAL_STORAGE:
* Generic activity to handle ACTION_MANAGE_ALL_FILES_ACCESS_PERMISSION
which control all apps (that request MANAGE_EXTERNAL_STORAGE).
* App specific activity to handle
ACTION_MANAGE_APP_ALL_FILES_ACCESS_PERMISSION. The intent filter
expects the name of the package as data in the intent.
Test: manual
Bug: 146425146
Change-Id: Iebc7d153eac6ffe0b9bd75196bc8ecf9cb687939
Fixes: 144909960
Test: adb shell am start --user 10 -a
android.settings.USAGE_ACCESS_SETTINGS should start Settings and
focus on work tab.
Change-Id: I3473d74e73e3b9e8a8bbaf83065a28a4b964e8ac
Each eUICC has its own EID. The same EID retrieved from the default
eUICC shall not be displayed for all the SIM status dialogs when the
device supports multiple UICCs.
Bug: 141256483
Test: Manual and SimStatusDialogControllerTest
Change-Id: I367ae3a5f97ff92e03312bed6fe37727ae3798ab
- This setting let user determines which app handles the Bug Report
shortcut on device.
BUG:143017534
Test: make -j56 RunSettingsRoboTests
Test: Ensure bug report handler setting shows correct handler apps.
Change-Id: I6160dadcd048e6c79f422e58fcd8defa04f991bb
Dark theme settings is now launchable as an activity
Test: launch activity android.settings.DARK_THEME_SETTINGS
Fixes: 145560830
Change-Id: I24b8d3211e9d6e7a5b1f226001882573ae7fb311
Track system server permission change around setting time / time zone
manually.
Bug: 140712361
Test: treehugger
Change-Id: Id1038b6ccc9480d8f7541fd421067a90f5c3a729
Handle adding multiple networks case, add UI components and process saving flow.
Bug: 136472483
Test: Add unit test cases to test filterSavedNetworks API.
Change-Id: I222e2f8294793796e293de49acdb96ecd6a57b0d
The Generic System Image (GSI) is a pure Android implementation with unmodified
Android Open Source Project (AOSP) code. The Dynamic System Updates (DSU) is a
Android Q feature that can download a system image and boot into it without the
factory rom being corrupted. This CL adds a DSU Loader which is a friendly
front-end that offers developers the ability to boot into GSI with one-click.
The DSU loader also offers the flexibility to overwrite the default setting
and load OEMs owned images.
Bug: 140090894
Test: click settings->developer option->debug::DSU Loader
make -j32 RunSettingsRoboTests
Change-Id: Ia2a1b69b52047dd841dedf7f07b07f7ad3e65d46
The new certificate can be installed from Settings ("Install a
certificate > App Source certificate"). The installation flow includes
a warning with user authorization to proceed, then a prompt for reboot
(now or later).
Installed certificate can be managed in "User credentials". The name is
currently a hash of hex numbers.
Upon deletion, there will also be a promot for reboot (now or later).
Test: Only see the new setting entry if feature is enabled
Test: Install from Settings, see the expected file name in
/data/misc/keysetore/user_0. Reboot also works.
Test: Able to see the certificate in Settings after installed
Test: Able to delete the certificate, which triggers confirmation dialog
to reboot. Reboot works.
Test: add certificate, see dialog, "not now" / tapping elsewhere does
nothing
Test: atest RestrictedEncryptionPreferenceControllerTest
Bug: 112038744
Change-Id: I7a4494ea0f243730df2212076588074d8774ae23
The notification package was getting too big.
Test: make -j64 RunSettingsRoboTests
Fixes: 145224451
Change-Id: I25ba82f42f7a137d8adcce72dcf8089d0e018bdc
In order to support system use-cases, such as when the user wants do
revoke SYSTEM_ALERT_WINDOW (SAW) permission via notification, we are
introducing a new intent, MANAGE_APP_OVERLAY_PERMISSION (notice the
"APP_"), that directs the user to the app-specific screen to toggle SAW
permission.
This activity can only be started if the caller has
INTERNAL_SYSTEM_WINDOW permission, which sysui and the system have.
Test: atest TestManageOverlayPermissionIntents
(cts in one of the topic CLs)
Test: Let an app draw on top of other apps, via its notification go to
settings, verify that the screen for controlling such capability
for the app is dispayed.
Bug: 135920175
Change-Id: I2f7e02a1242af7a22098359aeb230888fb8d4f3a
Add following changes:
1. Add intent receiver.
2. Add panel UI with icon, title, summary.
3. Add two buttons (save and cancel).
4. Add test case for activity and fragment
Bug: 136472483
Test: Add following test cases for checking button and package name in activity and fragment.
1. AddAppNetworksActivityTest
2. AddAppNetworksFragmentTest
Change-Id: I5515a96fa3feb0e3e6d68159b2c0dec0894c15ee
This reverts commit 6faf8649c7.
Reason for revert: Wifi services no longer plan to be a separate
APK/process for mainline. Will instead become a jar loaded from Apex.
Bug: 144722612
Change-Id: I1d29859866cec3af419fea4f0838d868d2fad8e5
Test: Device boots up & connects to wifi networks.
Before this change, intents with action = MANAGE_OVERLAY_PERMISSION and data =
URI "package:<package>" would redirect the user to the specific app screen with
the toggle to grant SYSTEM_ALERT_WINDOW (SAW) permission.
This makes it too easy for malicious apps to fool the user into enabling
it and we know that exist malware attempts to do so.
This CL redirects that intent to the screen that list all the apps
requesting SAW permission, introducing some friction for the user, which
hopefully will allow more time for consideration.
This is consistent with how other access permission intents work.
Test: Working on CTS
Test: adb shell am start -a
android.settings.action.MANAGE_OVERLAY_PERMISSION -d package:<package>
goes to list of apps screen
Test: adb shell am start -a android.settings.action.MANAGE_OVERLAY_PERMISSION
also goes there
Bug: 135920175
Change-Id: I02fb842106602dab7fc285d0741edb58432ac7ad
This is part of the changes to improve the UX and language for installing certificates.
Previously, the different types of certificate used the same installation flow.
Due to concerns around users installing CA certificates without understanding the conseqences,
this CL introduces a new warning dialog when a CA certificate is installed from settings.
Bug: 139173976
Test: Atest com.android.settings.security
manual testing from Settings by selecting the certificate type
preference and ensuring the installation flow still worked as expected.
Screenshot of the screen: https://hsv.googleplex.com/5046848484016128
Change-Id: If95bffd1e68f14734fb20e8cc4b60eeb1c372358
- use SummaryProvider to provide the summary of UserSettings
- use WifiDisplayPreferenceController to replace the summary loader
in WifiDisplaySettings
- use ConfigureNotificationPreferernceController to replace the
sumary load in ConfigureNotificationSettings
Fixes: 141653158
Test: robolectric
Change-Id: Id5f5ed645707caa0b25ecae5252174cbf017651c
- It can improve performance because we use less injected item
- Also remove summary provider from those fragments
Bug: 141653158
Test: robolectric
Change-Id: I6255f71b3b8300aea064a4fefd6711c1ff59e08a