summaryrefslogtreecommitdiff
path: root/tools/aapt2/java/JavaClassGenerator_test.cpp
diff options
context:
space:
mode:
authorJeff Sharkey <jsharkey@android.com>2018-10-27 17:58:44 -0600
committerJeff Sharkey <jsharkey@android.com>2018-10-29 15:03:28 -0600
commit669e6b11789fd47757aa7e4365294ddcecfacb2f (patch)
treef803bb775d477fb531167f08e1858863f9ddf35c /tools/aapt2/java/JavaClassGenerator_test.cpp
parent02bf0475938c9b4cc2f3125e4377757262d02af2 (diff)
Force apps to request permissions for teamfooding.
To support teamfooding of the new storage privacy features coming in Q, we need apps to request new AUDIO/VIDEO/IMAGES permissions, but most of those apps are prebuilts that won't land updates until several months in the future. So add system properties so teamfooders can "force" apps to request these permissions, making them work on Q builds. Only takes effect when isolated feature is enabled, and guarded with STOPSHIP to ensure we remove it. Here's a typical set of commands to use with this CL: adb shell setprop persist.fw.force_legacy 1 - or - adb shell setprop persist.fw.force_audio com.google.android.music adb shell setprop persist.fw.force_video com.google.android.apps.photos adb shell setprop persist.fw.force_images com.google.android.apps.photos,com.google.android.apps.messaging - then - adb shell setprop persist.sys.isolated_storage 1 adb reboot Bug: 118504670 Test: manual Change-Id: I631819648334994255256b6046bb4c8aec07ce3a
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator_test.cpp')
0 files changed, 0 insertions, 0 deletions