summaryrefslogtreecommitdiff
path: root/tools/aapt2/java/JavaClassGenerator_test.cpp
diff options
context:
space:
mode:
authorJeff Davidson <jpd@google.com>2014-11-11 13:20:01 -0800
committerJeff Davidson <jpd@google.com>2014-11-12 08:56:20 -0800
commitbc19c181c8c058c824e4fee907a05129e142c388 (patch)
tree666427f56a5be8afe891bc975343240f9ffbe654 /tools/aapt2/java/JavaClassGenerator_test.cpp
parentda772234f6f9498bf02f31448bda16e9fcbd6bd2 (diff)
Enforce VPN control "permission" with an actual permission.
The current implementation uses a whitelist of package names. Use a system|signature permission instead of rolling our own security and add that permission to the existing set of whitelisted packages (SystemUI and VpnDialogs). In addition to being less of a security risk (using well-known methods like Context.enforceCallingPermission rather than manually querying PackageManager and checking UIDs for package names), this enables other system-privileged apps to control VPN as needed per the below bug. Bug: 18327583 Change-Id: I38617965c40d62cf1ac28e3cb382c0877fb1275d
Diffstat (limited to 'tools/aapt2/java/JavaClassGenerator_test.cpp')
0 files changed, 0 insertions, 0 deletions