summaryrefslogtreecommitdiff
path: root/libs/androidfw/misc.cpp
diff options
context:
space:
mode:
author fayey <fayey@google.com> 2023-10-12 20:28:15 +0000
committer Faye Yan <fayey@google.com> 2023-10-13 15:16:09 +0000
commit114f018b8168c14655f8b12dcbc670055fc98d20 (patch)
tree137450bcc5f1f9b3b2051b7a2ae8d8c09fc2c89c /libs/androidfw/misc.cpp
parent95e3464bf7d2c5ade20ff2b0b7603702c2746bd6 (diff)
Create app op permission RECEIVE_SANDBOXED_DETECTION_TRAINING_DATA to allow the
privileged assistant apps to receive training data from the sandboxed hotword detection service. Update the OP_RECEIVE_TRUSTED_PROCESS_TRAINING_DATA to OP_RECEIVE_SANDBOXED_DETECTION_TRAINING_DATA per API-review feedback. The naming needs to be consistent with the existing HDS interface SandboxedDetectionInitializer. This permission protection level is internal|appop. The default permission status is PERMISSION_DENIED and the op default mode is MODE_DFAULT so initial access is PERMISSION_HARD_DENIED. The access will only be changed by the users via UI toggles: 1) PERMISSION_GRANTED if the user swtich the op mode to MODE_ALLOWED. 2) PERMISSION_HARD_DENIDED if the user swtich the op mode to MODE_ERRORED. Design option described in https://docs.google.com/document/d/15Rn363JZfe9NCexOWnPYzSkaAo4XqP4JBqCQuj9UyoY/edit?resourcekey=0-EM3T-DFn2ymF7C-1_p-3Ow#bookmark=id.jxt2yolkukk5 Bug: 304832368 Test: presubmit Change-Id: Id9abd620125cf11183dc0d0141ac4fe92c64dba5
Diffstat (limited to 'libs/androidfw/misc.cpp')
0 files changed, 0 insertions, 0 deletions