summaryrefslogtreecommitdiff
path: root/flags
AgeCommit message (Collapse)Author
2025-03-05Fix other call sites of SafetyCenterTouchTarget. Elliot Sisteron
Bug: 399872661 Test: atest SafetyCenterSubpagesTest && atest SafetyCenterActivityTest Flag: com.android.permission.flags.fix_safety_center_touch_target Relnote: Touch target accessibility fix for Safety Center Change-Id: I4e9f10eb8562b5a9ecbf68e5349eccf790eed0d6
2025-02-05Remove livedata_refactor_permission_timeline_enabled flag mrulhania
The code has been already cleaned up for this flag. Although the flag was marked incorrectly as exported flag, we don't expect anyone to use that flag, so removing it. Bug: 354234946 Test: atest PermissionUsageDetailsViewModelTest Test: atest PermissionHistoryTest FLAG: EXEMPT flag removal Relnote: code cleanup NO_EXPORTED_FLAG_DELETION_CHECK=internal flag marked as exported incorrectly. LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: Id3d238bc65c714d31fe81c569fde95e574454d01
2025-01-24Show profilegroup exclusive roles in defaultapps Richard MacGregor
Fix bug where default apps list opened using work profile context wouldn't show profilegroup exclusive roles when full-user is set as active user LOW_COVERAGE_REASON=FLAG_NOT_ENABLED Bug: 385424712 Flag: com.android.permission.flags.cross_user_role_ux_bugfix_enabled Relnote: N/A Test: atest RoleManagerMultiUserTest Change-Id: I35bb290179432ff44b60bcab53cdf0952aa7573c
2025-01-16Merge "Change WALLET role exclusivity=profileGroup" into main James Willcox
2025-01-14Add flag default_apps_recommendation_enabled Hai Zhang
LOW_COVERAGE_REASON=NON_CODE_ONLY Bug: 388234667 Flag: com.android.permission.flags.default_apps_recommendation_enabled Relnote: N/A Test: presubmit Change-Id: I0204bf6f0d54151b40e7af39120da98c7ccfaa2e
2025-01-09Change WALLET role exclusivity=profileGroup James Willcox
Bug: 356107987 Test: manual Flag: android.permission.flags.wallet_role_cross_user_enabled Relnote: Allow wallet role to be used in profiles Change-Id: I5191a2f260173a8bf836a1b0ad673b82062f1bba
2024-10-26Merge "[EXP] Add flag: expressive_design_enabled" into main Treehugger Robot
2024-10-26[EXP] Add flag: expressive_design_enabled Jay Thomas Sullivan
In order for PermissionController to display the expressive UI changes, this flag must be enabled. Test: presubmit Flag: com.android.permission.flags.expressive_design_enabled Relnote: N/A Bug: 375480184 LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: I7e87cfdac43178d3bc46ceb91875f74968f04486
2024-10-25Update flag comments Jay Sullivan
Bug: 375668440 Relnote: N/A Test: manual Flag: NONE "comment only" LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: Iedbc48845903ad4969bb7598fc708c3361db19a0
2024-10-14Merge "Add flag for decluttering permission manager page" into main Md Shahadat Hossain Shahin
2024-10-14Add flag for decluttering permission manager page Md Shahadat Hossain Shahin
When this flag is enabled, unused permission groups are displayed in the additional page, instead of in the main permission manager page. Bug: 365823624 Test: build Flag: com.android.permission.flags.decluttered_permission_manager_enabled Relnote: N/A LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: I582cf803ea4abbc357e3afc3275c7c21453114bd
2024-10-10Add Cross-user role support flag Richard MacGregor
This flag enables cross-user role support and related APIs LOW_COVERAGE_REASON=NON_CODE_ONLY Relnote: "N/A" Flag: NONE "adding new flag" Test: Manual Bug: 371589710 Change-Id: I747963161228600b41224126f1730fc4fda44cba
2024-10-03Adding Flags for wear Material 3 migration vignesh ramanathan
This flag enables material3 design system for wear ui components (to support BC25) BUG: b/370489422 Relnote: "N/A" Test: Manual. Existing Test passes. Flag: NONE "adding new flag" LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: I7ec7f84f26d4e544f650834112c155a23713b183
2024-09-27Show attribution label from location provider only on permission timeline page mrulhania
Bug: 369606734 Test: atest PermissionHistoryTest Test: atest PermissionControllerMockingTests FLAG: com.android.permission.flags.permission_timeline_attribution_label_fix Relnote: bug fix Change-Id: Ic3f9256d3fef0c19f557142f332364fbe0aadab3
2024-09-12Make java_sdk_library dependencies explicit am: e5cb6c1584 am: 356a933164 Jihoon Kang
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Permission/+/3260758 Change-Id: I0e8b0b4ecd4f8f283084bfb7ca7cbcb12a3d05f4 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-11Make java_sdk_library dependencies explicit Jihoon Kang
modules should specify the submodule of java_sdk_library that the module actually depends on Test: CI Flag: EXEMPT build dependency cleanup Bug: 358613520 Change-Id: If421b1b17cef11c86608bbda16f3fe0ef2f55b07
2024-09-07Merge "Merge 24Q3 to AOSP main" into main Xin Li
2024-09-06Make java_sdk_library dependencies explicit am: 7dbb337dd1 am: 06cb7b81d9 Jihoon Kang
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Permission/+/3250833 Change-Id: Ia23f7c8193c595ece316094526a2add2a4e53634 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-06Make java_sdk_library dependencies explicit am: 7dbb337dd1 Jihoon Kang
Original change: https://android-review.googlesource.com/c/platform/packages/modules/Permission/+/3250833 Change-Id: I6e7675fd7c8793d98a98beac6222c53f4e1cfc25 Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
2024-09-06Make java_sdk_library dependencies explicit Jihoon Kang
modules should specify the submodule of java_sdk_library that the module actually depends on Test: CI Bug: 358613520 Change-Id: Iba7229eb19e30dfedaff1c140f85dcfda669f1e0
2024-09-04[BC25] Add flag app_permission_fragment_uses_preferences Jay Thomas Sullivan
This flag will, when enabled (and after the implementation is complete), ensure that AppPermissionFragment uses Preferences rather than custom views. The motivation of this is to support the BC25 project. Bug: 364476654 Test: atest CtsPermissionUiTestCases Flag: com.android.permission.flags.app_permission_fragment_uses_preferences Relnote: N/A LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: I807cba8929eedfcaebb05f9ba88bb34db64139f2
2024-08-19Stop using DeviceConfig to enable / disable SafetyCenter on UDC+. Elliot Sisteron
Rely solely on the XML configuration instead. This flag is true on UDC+ on 100% of devices, so this change should technically be a no-op. This is done for a few reasons: - Don’t run through the DeviceConfig code path when it’s not necessary - Avoid potential regressions where we wrongly turn this flag off server-side - Avoid issues such as b/341315099 where the flag ends up being false server-side for some reason Bug: 354670125 Test: atest CtsSafetyCenterTestCases Relnote: Stop using DeviceConfig to enable / disable SafetyCenter on UDC+ Flag: com.android.permission.flags.safety_center_enabled_no_device_config LOW_COVERAGE_REASON=b/360423897 Change-Id: I56a1e2927cf3f33d24f2f249bbecfbeeffe04e2a
2024-08-16Make issue-only source affect the status light of group. Elliot Sisteron
Requested by UX for ODAD integration. Bug: 356910111 Test: atest SafetyCenterFunctionalTestCases Relnote: N/A Flag: com.android.permission.flags.safety_center_issue_only_affects_group_status Change-Id: I20baa3bcf185220834173c940423ca9591494c1f LOW_COVERAGE_REASON=b/356910111
2024-08-14Add ODAD to safety center notifications allowed hack. Elliot Sisteron
We can't roll this change out remotely (as per existing comment), so rolling this out in code instead. Bug: 356910008 Test: atest CtsSafetyCenterTestCases Relnote: N/A Flag: com.android.permission.flags.odad_notifications_supported Change-Id: I3d4dff60bf0adf40c3a157a557a5ea917be4454c LOW_COVERAGE_REASON=b/356910008
2024-07-30Fix typo in flag for permission timeline page refactor Manjeet Rulhania
Bug: 354234946 Test: build Flag: com.android.permission.flags.livedata_refactor_permission_timeline_enabled LOW_COVERAGE_REASON=NON_CODE_ONLY Change-Id: I3b81dcd069f1c9c6f965aef7edba15469c4e4222
2024-07-24[ECM Backport] Add allow restricted settings into options menu of App Faye Yan
permissions. This change implements the UX change for ECM Backport to T and U builds. In V, no UX change, "allow restricted settings" is in the options menu of AppInfo screen. In U, the "allow restricted settings" is added into the options menu of App permissions screen. In T, the "allow restricted settings" is added into the options menu of App permisisons screen. Flag: com.android.permission.flags.enhanced_confirmation_backport_enabled Bug: 347876543 Test: Manual tested on T, U, V devices, atest to be added Test: atest EnhancedConfirmationBackportTest LOW_COVERAGE_REASON=FLAG_NOT_ENABLED Change-Id: I6aee8baccb2ea60c39d6c67b097f8d2dcfc2c757
2024-07-22Add flag for permission timeline page refactor mrulhania
Bug: 354234946 Test: build Flag: com.android.permission.flags.livevdata_refactor_permission_timeline_enabled Change-Id: Ifa09c8e20f51fd8cc909f068939da575b98cb411 LOW_COVERAGE_REASON=NON_CODE_ONLY
2024-07-16Adds switch for downgrading to coarse location Samuel
Within the updated permission prompt, users will have the ability to downgrade an app to use coarse location. To ensure consistency after the main location permission prompt update, a switch view has been added to the AutoAppPermissionFragment, so that users can maintain control over these permission levels. Bug: b/346369736 Flag: com.android.permission.flags.enable_coarse_fine_location_prompt_for_aaos Test: manuel testing LOW_COVERAGE_REASON=(FLAG_NOT_ENABLED| b/346369736) Change-Id: I295c35099444b11af883d8cc0cddf598e7e91b42
2024-05-23Merge "Revert "Use APIs for clipboard in PrivacyControlsViewModel"" into main Pechetty Sravani
2024-05-23Revert "Use APIs for clipboard in PrivacyControlsViewModel" Pechetty Sravani
This reverts commit 36041be02ddb10e087dd299863c962bf30cbcc84. Reason for revert: Droidmonitor triggered revert due to build breakage in b/342269215. Will be verifying through ABTD before submission. Change-Id: I6b3fcdc672029a57cde997dd2dfb91bb1216d3d3
2024-05-23Merge "Use APIs for clipboard in PrivacyControlsViewModel" into main Treehugger Robot
2024-05-22Use APIs for clipboard in PrivacyControlsViewModel Nate Myren
Replace old, hardcoded strings with API calls Bug: 263305143 Test: Manual Change-Id: I9e3a19a75708696634d4930e21b7c165bf15ba01
2024-05-22Migrate permission flags for Permission to be exported flags Yi-an Chen
LOW_COVERAGE_REASON=NON_CODE_ONLY Bug: 336313566 Test: All existing automation tests Change-Id: If7d6e21eea10d7aa638a3965af84f25bc91f9e19
2024-05-16Add flag for displaying warning banners on automotive Aaqib Ismail
LOW_COVERAGE_REASON=NON_CODE_ONLY Flag: com.android.permission.flags.add_banners_to_privacy_sensitive_apps_for_aaos Bug: 327489942 Test: m Change-Id: I894e2cd3c0f6428d5a342e9f06dd653b3aec45a8
2024-03-21Export flags used in FlaggedApi annotations Oriol Prieto Gasco
Before calling a flagged API, client code must check the value of the flag which gates it. Those flags must be exported in order to be accessible from containers other than the container where the flag and the API are hosted. Bug: 320984775 Bug: 322839671 Test: m all_aconfig_declarations Test: printflags --format='{fully_qualified_name}:{is_exported}' | grep true Change-Id: Ib1af8bb4bb656ed30174a55a399f65da1f8e2a73
2024-03-19Revert^2 "Conditionally show permission grant dialog on a remote device" Yuting Fang
This reverts commit fd02606476660e030c090fb6a83b198ec8e63c1d. Reason for revert: Fixed the test failure caused by the original change in ag/26622490. Merge original change again. Change-Id: Ida2f62868f635472ff3fd8a87340683b37c530b3 LOW_COVERAGE_REASON=322876988
2024-03-18Revert "Conditionally show permission grant dialog on a remote device" Priyanka Advani
This reverts commit 7903df8875d9cac7b7ea5fe673127460fa3af1c1. Reason for revert: Droid-monitor created revert for breakages in b/330213318. Will be verifying through ABTD before submission. Change-Id: Ia257fb5b6e8a2ac7484f51b63eda412bc339a77b
2024-03-18Conditionally show permission grant dialog on a remote device Yuting Fang
This CL includes following changes: 1) Currently we can show the permission grant dialog on a remote device only when the requested permissions are device aware and requested for the remote device. Otherwise we show a warning dialog. Screenshot: https://screenshot.googleplex.com/B6MHCP9MJaA6HNc 2) Check device capability for camera and audio when requesting such permissions for a remote device. 3) Remove feature flag device_aware_permission_grant_enabled due to no flags required for features in mainline module to be released in V. Bug: 324470724 Bug: 325336076 Test: atest DeviceAwarePermissionGrantTest Change-Id: Icb544dc7277750ab5597e60e2a2f5cb134006da1 LOW_COVERAGE_REASON=322876988
2024-02-13Make device_aware_permission_grant feature flag read only Yuting Fang
Flags defined in the permission mainline module should be read only Bug: 320705563 Test: presubmit Change-Id: I5151b6ca490a93bc909cf237ede24642bc5a1120
2024-02-12Clean up wear_privacy_dashboard_enabled YoungJoon Yang
since wear_privacy_dashboard_enabled_read_only was rolled out. Bug: 320702364 Test: manual test Change-Id: Ib31de06102053e3d91d1bc500b3f2776cf162d44
2024-02-12Merge "Set the container field of aconfig flags" into main Oriol Prieto Gascó
2024-02-08Add the titleForPrivateProfile API Manish Singh
This API lets the safety sources set the title for the private profile in the safety center config file. This change also temporarily disables the linter. Safety Center team will look into enabling it later. Bug: 286539356 Test: manual Change-Id: I99ab006240883065d290b2d9976f2a7c9bf7905e
2024-02-07Set the container field of aconfig flags Oriol Prieto Gasco
Please see go/aconfig-flag-containers for more context Test: m Bug: 312769710 Change-Id: Idb119ce54c5416c4130fc6db2f33368a0828e84e
2024-02-06Generalise the code for various profile types - 1 Manish Singh
This code generalises the code for creating safety source entries for any profile type. Currently the code handles the primary profile and the managed profiles specifically. Don't include the private profile when in quiet mode If the private profile is in quiet mode then we don't want to show anything related to it in the safety center. Therefore, UserProfileGroup should not include it in such cases at all. Bug: 286539356 Test: manual Change-Id: I77be00f140a5c7be74caa2dddf673a81562851ef
2024-01-30Create read-only flag for Wear Privacy Dashboard YoungJoon Yang
Bug: 320702364 Test: Manual test Change-Id: Icd9cb141873f89b39ad43aa5f3ca6fb47351e839
2024-01-26Merge "Fix for permission mainline flagging" into main Manish Singh
2024-01-24Fix for permission mainline flagging Richard MacGregor
Reduce complexity by deleting unused file and lib Add library to fix dependency cycle when using in module framework jar Bug: 291791417 Test: manual Flag: Exempt, build change Change-Id: Ia9087718ef2e9fb15a22c6682d7c9f36d05d0a28
2024-01-24Make 'archiving' flag read-only Mark Kim
Test: n/a Bug: 320705443 Change-Id: I62e44edc53bfc6cc44f35d369d64e60a4956e772
2024-01-18Remove redundant flag from Permission module. Faye Yan
Bug: 320705324 Test: presubmit Change-Id: I6cb86be66838d952d17570904e9ce78765f035bd
2024-01-02Change the strings on the opt-out toggle to also account for archiving Mark Kim
Test: n/a Bug: 304257274 Change-Id: Ia96eaabcd9fa20fa2d030d2e09bc5ba388247e52