summaryrefslogtreecommitdiff
path: root/data
AgeCommit message (Collapse)Author
2025-03-21Merge "Add new permission android.permission.READ_UPDATE_ENGINE_LOGS" into main David Anderson
2025-03-21Merge "DPM/MTE: Fix MTE developer Option when AAPM is on" into main Eran Messeri
2025-03-20Merge "Revert "Convert PRODUCT_COPY_FILES for keyboards data to Android.bp"" ↵ Sadiq Sada
into main am: eee659508c Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3554852 Change-Id: Ic93da31c5479074dcf3e83361c6b49635212e3ed Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-03-20Merge "Revert "Convert PRODUCT_COPY_FILES for keyboards data to Android.bp"" ↵ Sadiq Sada
into main
2025-03-20Revert "Convert PRODUCT_COPY_FILES for keyboards data to Android.bp" Sadiq Sada
This reverts commit 2415c43a8bf5e683555fcaa48d1dad522db62229. Reason for revert: Potential culprit for b/405191766. Will merge after verifying with ABTD. Change-Id: Ia89aa852c3fcae0e040a911b4e9de8172b4ac177
2025-03-20Merge "Revert "Convert PRODUCT_COPY_FILES for frameworks sounds files to ↵ Priyanka Advani (xWF)
Android.bp"" into main am: 3070b84f7d Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3555583 Change-Id: I7f5a2a713f2fb64560321aac4d58c1f0f4f05d82 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-03-20Merge "Revert "Convert PRODUCT_COPY_FILES for frameworks sounds files to ↵ Priyanka Advani (xWF)
Android.bp"" into main
2025-03-20Revert "Convert PRODUCT_COPY_FILES for frameworks sounds files to Android.bp" Priyanka Advani (xWF)
This reverts commit 29b36a471b9fec8cade9ee7fa60b031f23884094. Reason for revert: Droidmonitor created revert due to b/405179425. Will be verifying through ABTD before submission. Change-Id: I00b9fe274365080d7def6264f13a46070381d6f4
2025-03-20Merge "Rename the new limited VDM role." into main Vladimir Komsiyski
2025-03-20Merge "Convert PRODUCT_COPY_FILES for frameworks sounds files to Android.bp" ↵ Wei Li
into main am: 20ddf54e76 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3540939 Change-Id: Ib55f6df613b8dd9946950ad35f7aa9d8f006fae6 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-03-20Merge "Convert PRODUCT_COPY_FILES for keyboards data to Android.bp" into ↵ Wei Li
main am: b2af58f0c7 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3550700 Change-Id: Idf82a8d7cd5e16f904f9832fb616e0545d5751dc Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-03-20Merge "Convert PRODUCT_COPY_FILES for frameworks sounds files to Android.bp" ↵ Wei Li
into main
2025-03-20Merge "Convert PRODUCT_COPY_FILES for keyboards data to Android.bp" into main Wei Li
2025-03-20DPM/MTE: Fix MTE developer Option when AAPM is on Eran Messeri
This change fixes the Memory Tagging Extension developer option Settings to be greyed out if the MTE state is controlled by AAPM. The fix consists of: * A change to the DevicePolicyManagerService to return the MTE policy regardless of the caller identity - as the getMtePolicy metthod does not care which admin has set the MTE policy, just the resolved policy for the device. * A change to RestrictedLockUtilsInternal to return an EnfocredAdmin representing that the MTE policy is managed somehow. Other code in the RestrictedLockUtilsInternal knows how to resolve the right admin from the EnforcedAdmin. To test the fix, the MANAGE_DEVICE_POLICY_MTE permission was added to the shell. It is safe for the shell to have this permission because: * A human can query and modify the state of the Memory Tagging Extension policy via Developer Options. * If the device is managed and the user tries to disable MTE, there is an additional check in the DevicePolicyManagerService that only the device policy client (DPC) can disable MTE. Bug: 402456665 Test: Manual, turn on AAPM with adb commands and observe the toggle in Settings. Test: atest CtsSecurityTestCases:android.security.cts.advancedprotection.MemoryTaggingExtensionTest Test: atest CtsDevicePolicyTestCases:android.devicepolicy.cts.MtePolicyTest Test: atest CtsDevicePolicyTestCases:android.devicepolicy.cts.DeviceManagementCoexistenceTest Flag: EXEMPT bugfix Change-Id: I55ffdec9b7abc29be503d85a7ae2607ba81938de
2025-03-19Convert PRODUCT_COPY_FILES for keyboards data to Android.bp Wei Li
Bug: 401370820 Test: presubmits Change-Id: Ibaaf34b8116a746fd2262d53fd4fc6fbc5b012ec
2025-03-19Convert PRODUCT_COPY_FILES for frameworks sounds files to Android.bp Wei Li
Bug: 401370820 Test: presubmits Change-Id: I8444799641245923ff570361262e0396812c8642
2025-03-19Merge "StatementService is not an Android system module" into main am: ↵ Treehugger Robot
e4f7d26846 am: 33a3095926 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3546263 Change-Id: I26888b8d45d7f06af3824edf00bfef6d1cd6a013 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-03-17StatementService is not an Android system module Justin Yun
StatementService is not installed when a target has GMS core. As the installation of this app depends on the build target, move it to system_ext. system image must not include target specific modules. Bug: 401090620 Test: atest StatementServiceTests Change-Id: I138981cd8fe98157098eba9efc3a0684d7ffbe76
2025-03-11Configure the PrivateSpace app to only be installed in private profiles Kasia Krejszeff
Test: manually Flag: EXEMPT file not eligible Bug: 394019582 Change-Id: I0b38fb96eda366ff7f608a303cca07da31e1e8dd
2025-03-04Rename the new limited VDM role. Vladimir Komsiyski
A more generic name is much better as it could still be used for creating trusted displays and input injection in the future, not only for sensors. And make it non-self-managed. Bug: 368633836 Test: presubmit Flag: android.companion.virtualdevice.flags.enable_limited_vdm_role Change-Id: Iaa73b23231aa8a0faba6605edb9a87abb8799475
2025-02-27Merge 25Q1 (ab/12770256) to aosp-main-future Xin Li
Bug: 385190204 Merged-In: Ibc80f09d54bec2c83814874d94a8f8eb22b5075f Change-Id: If7779ae57fd91631d08bd8af5434c2ddd963aad7
2025-02-27Merge "Made permission privileged to grant access to ExtServices" into main Kiran Ramachandra
2025-02-26Merge "[owners] Remove cbrubaker@google.com from data/etc/OWNERS" into main ↵ Ronald Braunstein
am: 17b492cd4e am: b79b82f8af Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3507846 Change-Id: I2bdf2af842c039e2b059d0eed803763056c30b3b Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-02-25[owners] Remove cbrubaker@google.com from data/etc/OWNERS Owner Cleanup Bot
This suggested change is automatically generated based on group memberships and affiliations. Please approve this change and vote the highest CR. This will keep the OWNERs file tidy. We ask that you do not ignore this change and approve it unless you know a reason the OWNER should remain. It can always be reverted if needed. If this change is in error, vote the lowest CR value (i.e. reject the CL) and the bot will abandon it. See the owner's recent review activity for context: https://android-review.googlesource.com/q/cbrubaker@google.com To report an issue, file a bug in the Infra>Codereview component. Change-Id: Ida80c895dfa0228392977a7bc1422afe06358328
2025-02-25Made permission privileged to grant access to ExtServices Kiran Ramachandra
To enable OTP detection, ExtServices requires the ACCESS_TEXT_CLASSIFIER_BY_TYPE permission to access specific TextClassifier. Because ExtServices cannot utilize the role, the permission is being added as privileged to allow its granting. Bug: 377229653 Bug: 388899782 Test: atest FrameworksCoreTests:TextClassificationManagerTest CtsTextClassifierTestCases:TextClassificationManagerTest CtsPermissionPolicyTestCases:PermissionPolicyTest Flag: android.permission.flags.text_classifier_choice_api_enabled Change-Id: I606227245a6c80f5717df92bfd3760f21ee11d11
2025-02-21Add new permission android.permission.READ_UPDATE_ENGINE_LOGS Håkan Kvist
This permission is used to gain access to update_engine_log directory. This is a subset of android.permission.READ_LOGS and is intended to limit the log access for components that only want to access update engine logs. Flag: com.android.update_engine.minor_changes_2025q4 Bug: 397893018 Test: Flash software, check permissions of directory Flash software without this patch. Flash software with this CL on top. Confirm permission. Confirm log files included in bugreport. Change-Id: I517c8aab3159cdb970c9499d2aad89cc262b68e2
2025-02-20Send KEYCODE_POWER instead of KEYCODE_TV_POWER. Winni Chang
From b/291854577, KEYCODE_TV_POWER has some problem as interoperability issues where the TV doesn't act on the HDMI-CEC messages as expected. Also, if the set-top box's and TV's power state are not in sync (one is ON and the other is OFF), the power control could be wrong. From https://developer.android.com/reference/android/view/KeyEvent#KEYCODE_TV_POWER, it seems this is only for like set-top box to use HDMI-CEC to control TV power or not. But both TV and STB support KEYCODE_POWER. Bug: 390553665 Change-Id: If664d7a6dd680579c7e6d69e1fcd900edb3530f0 Flag: EXEMPT bugfix
2025-02-14Add Free TV button for more projects. Winni Chang
Flag: EXEMPT add free TV key support Bug: 394931597 Change-Id: I7cb6f99a153667d5308ce12f592ded71dc50480a
2025-02-12Merge "Allow mmd to register pulled atoms" into main am: 8388a8a6ee am: ↵ Shin Kawamura
feb3a51ed2 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3491471 Change-Id: Icfb54d155c50a670e447bd846373ec253ab1d28c Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-02-12Merge "Allow mmd to register pulled atoms" into main Shin Kawamura
2025-02-12Allow mmd to register pulled atoms Shintaro Kawamura
aosp/3486210 supports pulled atoms from mmd. Bug: 392783537 Test: manual Change-Id: I9b90a68012097a8b95bcb2a31047c283c3dd723c
2025-02-11Merge "Remove long-deprecated assertEquals uses" into main am: 91edc7f69a ↵ Treehugger Robot
am: 73e47e18b3 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3490911 Change-Id: Ifc1ee8dcefb3f7db8bf974490e15878602038b81 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-02-11Remove long-deprecated assertEquals uses Dan Willemsen
These have been removed in Python 3.12: https://docs.python.org/3/whatsnew/3.12.html#id3 Bug: 388344853 Test: atest generate_fonts_xml_test -- --abi x86_64 Change-Id: Iaef6fbaa5033443b232dabc90888eb5d6bef64cb
2025-02-06Merge "Remove jsharkey@google.com from data/etc/OWNERS" into main am: ↵ Treehugger Robot
ca5c29f62b am: b0c7c9916c Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3265331 Change-Id: I006ba03904a925c99e990db7ea3a3bf5f804373c Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-02-06Merge "Remove jsharkey@google.com from data/etc/OWNERS" into main Treehugger Robot
2025-02-03Merge changes from topic "permission-flags-for-user-activeness" into main Maitri Mangal
* changes: Adding attribute to the new permisison LISTEN_FOR_KEY_ACTIVITY Adding Permission for a global listener that will notify on user activeness events in InputManager
2025-01-31Add helper functions for testing trade-in mode. David Anderson
Trade-in mode is difficult to test in automation because it is inherently a user build feature. If it were enabled on ro.debuggable=1 builds, "TIM adb" would conflict with normal adb. So, it is one or the other, and we have to pick "normal adb" to not break all CI and developer workflows. To work around this, we are adding new APIs to ITradeInMode to enable testing TIM when ro.debuggable=1. This will allow us to test certain aspects of the SUW machinery and the "getstatus" command. We do this by setting a new persist property that is read on the next reboot. On next reboot, normal adb is forbidden from starting, and trade-in mode adb is allowed to start instead. disableTesting() unsets the persist property. These APIs are only allowed when ro.debuggable=1. Finally, we add a test method to schedule the same factory reset procedure that occurs within "tradeinmode evaluate". All the testing methods are restricted to ENTER_TRADE_IN_MODE privileges and require ro.debuggable=1. Test: adb shell tradeinmode testing start Bug: 379970773 Flag: com.android.tradeinmode.flags.enable_trade_in_mode Change-Id: I58234d4d2202e0be347e1a0486b7a0869a7867d2
2025-01-30Adding Permission for a global listener that will notify on user activeness ↵ Maitri Mangal
events in InputManager bug: 356412905 Flag: NONE FF will be added in a later CL Change-Id: I4190965c96b4885c6877c28aa8ba8c9f8b5a3e4d
2025-01-29Remove EXECUTE_APP_FUNCTIONS_TRUSTED Tony Mak
Bug: 393122219 Test: atest CtsAppFunctionTestCases Flag: android.app.appfunctions.flags.enable_app_function_manager Change-Id: I1038766dc66375c5f9038d88d06b934ed0abc758
2025-01-20Fix Accessibility Menu Window breaking gesture exclusion API Johannes Gallmann
The gesture exclusion region set by the Accessibility Menu Window counts towards the global exclusion limit. With a few menu items, there is no gesture exclusion margin left to be used by apps. To fix this, the PRIVATE_FLAG_UNRESTRICTED_GESTURE_EXCLUSION flag is set on the Accessibility Menu Window. This ensures that the exclusion region is not counted towards the global limit. Additionally, this fixes the problem that the Accessibility Menu Window itself runs out of exclusion margin when it has many menu items. In that case, it's easy to trigger the back gesture when the intention is to drag the window. Bug: 378425927 Test: Manual, i.e. verified that app's exclusion regions are unaffected by the presence of the Accessibility Menu. Also verified that dragging the Accessibility Menu never triggers the back gesture. Flag: EXEMPT bugfix Change-Id: I8f4171b92acfdeffd0e1bc383587320e15c9ef71
2025-01-16[MediaQuality] Add API implementation for get/set ↵ Preethi Kandhalu
PictureProfile/SoundProfile Allowlist Test: m Fix: 388912026 Fix: 388912004 Fix: 388911800 Fix: 388912061 Flag: android.media.tv.flags.media_quality_fw Change-Id: Icb2d993a8857d8ce71bb1d17ae9da14a5f11d519
2025-01-13Merge "Modify apex_available to Bluetooth apex" into main am: c59652fd20 am: ↵ Treehugger Robot
8b34ce2db5 Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/3445377 Change-Id: I6ae412c55390a07cc32a818b81ac1223cf504a4d Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2025-01-13Merge "Add hidden broadcast to inform system apps about changes in user ↵ Anna Bauza
info." into main
2025-01-09Modify apex_available to Bluetooth apex William Escande
Bluetooth apex name has changed from com.android.btservices to com.android.bt. We now need to update the reference in the code. Updating apex_available in bp and other reference from within the code Bug: 383863941 Flag: Exempt build infra Test: m . Change-Id: I5d71ac2f7df2a876e87934787c820630df890226
2025-01-09Add support for Fine Granularity PowerMonitors Dmitri Plotnikov
Bug: 341941666 Flag: android.permission.flags.fine_power_monitor_permission Test: atest PowerStatsTests; atest android.os.health.cts.PowerMonitorsTest Change-Id: I8f4abf2116d42e07dbc1aa97c15df29b00acead6
2025-01-07Add hidden broadcast to inform system apps about changes in user info. Anna Bauza
Due to new feature of freezing apps including system widgets, there is no updates on system ui when user change profile picture or name. Because some profile pictures are synced in in background we need to make sure we update system ui when it happens. This broadcast is protected by special permission and can be only used by preinstalled system apps. The broadcast will not slow down the system as it is fired on rare occasions. Bug: 383071252 Flag: EXEMPT bugfix Test: manual Change-Id: I97c63d27040c6a313164e657d9bbb62f66cb4a3f
2024-12-12Introduce a new API to fetch contentProviders based on callingUid Sumedh Sen
This API will take a caller's UID to fetch content providers available to it. This will be used to prevent cross user access to content providers. Bug: 334024639 Test: atest CtsContentProviderMultiUserTest Flag: android.content.pm.uid_based_provider_lookup Change-Id: I430d87629a198a3e9dfe19f6ae1b7e01d4005e6d
2024-12-12Add privapp-permissions for wm.shell Michael Groover
The privileged flag was added to the SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE permission. This commit updates the platform's privapp-permissions for the wm.shell package to include this permission. Bug: 380120712 Flag: android.security.subscribe_to_keyguard_locked_state_perm_priv_flag Test: Manually verified device booted with permission flag update Change-Id: I466da2e6af665d1f1e05e30ac9dd1b6672abe7ec
2024-12-11Merge changes from topic ↵ Michael Groover
"SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE-privileged-flag" into main * changes: Update privapp-permissions for shell and systemui Add privileged flag to SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE
2024-12-11Merge "CDM support for the new limited VDM role." into main Vladimir Komsiyski