summaryrefslogtreecommitdiff
path: root/aconfig/bp2a/android.permission.flags
diff options
context:
space:
mode:
author Ian Kasprzak <iankaz@google.com> 2025-05-07 16:56:54 +0000
committer Ian Kasprzak <iankaz@google.com> 2025-05-07 13:07:24 -0700
commit5da94f17b7a143d754a3b250c08bff210d3b046b (patch)
treecb54e866045a4506d304490daf1dbbbacaf90ac1 /aconfig/bp2a/android.permission.flags
parente1003b0b091c2c8dc501ee7add5319d50c1d30e7 (diff)
Update bp2a aconfig flags to align with BP2A.250605.015.
Testing: https://android-build.corp.google.com/abtd/run/L32500030011891204 Change-Id: I865a0bb9240c6708335cdb6273d2752cd984041f
Diffstat (limited to 'aconfig/bp2a/android.permission.flags')
-rw-r--r--aconfig/bp2a/android.permission.flags/Android.bp12
-rw-r--r--aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto6
-rw-r--r--aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto6
21 files changed, 126 insertions, 6 deletions
diff --git a/aconfig/bp2a/android.permission.flags/Android.bp b/aconfig/bp2a/android.permission.flags/Android.bp
index 61d60f32..2f335636 100644
--- a/aconfig/bp2a/android.permission.flags/Android.bp
+++ b/aconfig/bp2a/android.permission.flags/Android.bp
@@ -1,4 +1,4 @@
-// Copyright 2024 Google Inc. All rights reserved.
+// Copyright 2025 Google Inc. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
@@ -13,9 +13,9 @@
// limitations under the License.
aconfig_values {
- name: "aconfig-values-platform_build_release-bp2a-android.permission.flags-all",
- package: "android.permission.flags",
- srcs: [
- "*_flag_values.textproto",
- ],
+ name: "aconfig-values-platform_build_release-bp2a-android.permission.flags-all",
+ package: "android.permission.flags",
+ srcs: [
+ "*_flag_values.textproto",
+ ]
}
diff --git a/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto
new file mode 100644
index 00000000..85f984ff
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "device_aware_permission_apis_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto
new file mode 100644
index 00000000..cd7276e6
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "device_aware_permissions_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto b/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto
new file mode 100644
index 00000000..2a72f614
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "dont_remove_existing_uid_states"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto
new file mode 100644
index 00000000..c3d5a4ac
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "enhanced_confirmation_mode_apis_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto b/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto
new file mode 100644
index 00000000..b1be3f7d
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "factory_reset_prep_permission_apis"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto b/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto
new file mode 100644
index 00000000..bbeb429d
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "finish_running_ops_for_killed_packages"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto
new file mode 100644
index 00000000..e5802cbe
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "get_emergency_role_holder_api_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto
new file mode 100644
index 00000000..4b6964fb
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "location_bypass_privacy_dashboard_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto b/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto
new file mode 100644
index 00000000..c3b850f9
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "op_enable_mobile_data_by_user"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto
new file mode 100644
index 00000000..4b6e5fb1
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "retail_demo_role_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto
new file mode 100644
index 00000000..83217147
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "runtime_permission_appops_mapping_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto
new file mode 100644
index 00000000..c88be813
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "sensitive_content_improvements"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto
new file mode 100644
index 00000000..bc5cd6aa
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "sensitive_content_metrics_bugfix"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto
new file mode 100644
index 00000000..dea1f11e
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "sensitive_content_recents_screenshot_bugfix"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto
new file mode 100644
index 00000000..1bfcdfb9
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "sensitive_notification_app_protection"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto b/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto
new file mode 100644
index 00000000..e2838c92
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "server_side_attribution_registration"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto b/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto
new file mode 100644
index 00000000..d1666ba6
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "should_register_attribution_source"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto
new file mode 100644
index 00000000..87fda097
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "signature_permission_allowlist_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto
new file mode 100644
index 00000000..19a882e7
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "system_server_role_controller_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}
diff --git a/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto
new file mode 100644
index 00000000..3a0d8088
--- /dev/null
+++ b/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto
@@ -0,0 +1,6 @@
+flag_value {
+ package: "android.permission.flags"
+ name: "wallet_role_enabled"
+ state: ENABLED
+ permission: READ_ONLY
+}