diff options
author | 2025-05-07 16:56:54 +0000 | |
---|---|---|
committer | 2025-05-07 13:07:24 -0700 | |
commit | 5da94f17b7a143d754a3b250c08bff210d3b046b (patch) | |
tree | cb54e866045a4506d304490daf1dbbbacaf90ac1 /aconfig/bp2a/android.permission.flags | |
parent | e1003b0b091c2c8dc501ee7add5319d50c1d30e7 (diff) |
Update bp2a aconfig flags to align with BP2A.250605.015.
Testing: https://android-build.corp.google.com/abtd/run/L32500030011891204
Change-Id: I865a0bb9240c6708335cdb6273d2752cd984041f
Diffstat (limited to 'aconfig/bp2a/android.permission.flags')
21 files changed, 126 insertions, 6 deletions
diff --git a/aconfig/bp2a/android.permission.flags/Android.bp b/aconfig/bp2a/android.permission.flags/Android.bp index 61d60f32..2f335636 100644 --- a/aconfig/bp2a/android.permission.flags/Android.bp +++ b/aconfig/bp2a/android.permission.flags/Android.bp @@ -1,4 +1,4 @@ -// Copyright 2024 Google Inc. All rights reserved. +// Copyright 2025 Google Inc. All rights reserved. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. @@ -13,9 +13,9 @@ // limitations under the License. aconfig_values { - name: "aconfig-values-platform_build_release-bp2a-android.permission.flags-all", - package: "android.permission.flags", - srcs: [ - "*_flag_values.textproto", - ], + name: "aconfig-values-platform_build_release-bp2a-android.permission.flags-all", + package: "android.permission.flags", + srcs: [ + "*_flag_values.textproto", + ] } diff --git a/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto new file mode 100644 index 00000000..85f984ff --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/device_aware_permission_apis_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "device_aware_permission_apis_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto new file mode 100644 index 00000000..cd7276e6 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/device_aware_permissions_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "device_aware_permissions_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto b/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto new file mode 100644 index 00000000..2a72f614 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/dont_remove_existing_uid_states_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "dont_remove_existing_uid_states" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto new file mode 100644 index 00000000..c3d5a4ac --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/enhanced_confirmation_mode_apis_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "enhanced_confirmation_mode_apis_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto b/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto new file mode 100644 index 00000000..b1be3f7d --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/factory_reset_prep_permission_apis_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "factory_reset_prep_permission_apis" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto b/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto new file mode 100644 index 00000000..bbeb429d --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/finish_running_ops_for_killed_packages_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "finish_running_ops_for_killed_packages" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto new file mode 100644 index 00000000..e5802cbe --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/get_emergency_role_holder_api_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "get_emergency_role_holder_api_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto new file mode 100644 index 00000000..4b6964fb --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/location_bypass_privacy_dashboard_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "location_bypass_privacy_dashboard_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto b/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto new file mode 100644 index 00000000..c3b850f9 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/op_enable_mobile_data_by_user_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "op_enable_mobile_data_by_user" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto new file mode 100644 index 00000000..4b6e5fb1 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/retail_demo_role_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "retail_demo_role_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto new file mode 100644 index 00000000..83217147 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/runtime_permission_appops_mapping_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "runtime_permission_appops_mapping_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto new file mode 100644 index 00000000..c88be813 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/sensitive_content_improvements_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "sensitive_content_improvements" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto new file mode 100644 index 00000000..bc5cd6aa --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/sensitive_content_metrics_bugfix_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "sensitive_content_metrics_bugfix" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto new file mode 100644 index 00000000..dea1f11e --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/sensitive_content_recents_screenshot_bugfix_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "sensitive_content_recents_screenshot_bugfix" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto b/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto new file mode 100644 index 00000000..1bfcdfb9 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/sensitive_notification_app_protection_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "sensitive_notification_app_protection" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto b/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto new file mode 100644 index 00000000..e2838c92 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/server_side_attribution_registration_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "server_side_attribution_registration" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto b/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto new file mode 100644 index 00000000..d1666ba6 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/should_register_attribution_source_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "should_register_attribution_source" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto new file mode 100644 index 00000000..87fda097 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/signature_permission_allowlist_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "signature_permission_allowlist_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto new file mode 100644 index 00000000..19a882e7 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/system_server_role_controller_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "system_server_role_controller_enabled" + state: ENABLED + permission: READ_ONLY +} diff --git a/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto b/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto new file mode 100644 index 00000000..3a0d8088 --- /dev/null +++ b/aconfig/bp2a/android.permission.flags/wallet_role_enabled_flag_values.textproto @@ -0,0 +1,6 @@ +flag_value { + package: "android.permission.flags" + name: "wallet_role_enabled" + state: ENABLED + permission: READ_ONLY +} |