Age | Commit message (Collapse) | Author |
|
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1519384
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: Ifdc390f5ae046c515a30158f3f55b831be147547
|
|
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1519382
MUST ONLY BE SUBMITTED BY AUTOMERGER
Change-Id: I1218107820d89a570b55768ed6f9b223cd0db5fc
|
|
As general background, OWNERS files expedite code reviews by helping
code authors quickly find relevant reviewers, and they also ensure
that stakeholders are involved in code changes in their areas.
Some teams under frameworks/base/ have been using OWNERS files
successfully for many years, and we're ready to expand them to cover
more areas. Here's the historical coverage statistics for the last
two years of changes before these new OWNERS changes land:
-- 56% of changes are fully covered by OWNERS
-- 17% of changes are partially covered by OWNERS
-- 25% of changes have no OWNERS coverage
Working closely with team leads, we've now identified clear OWNERS on
a per-package basis, and we're using "include" directives whenever
possible to to simplify future maintenance. With this extensive
effort, we've now improved our coverage as follows:
-- 98% of changes are fully covered by OWNERS
-- 1% of changes are partially covered by OWNERS
-- 1% of changes have no OWNERS coverage
This specific change is automatically generated by a script that
identifies relevant "include" directives.
Bug: 174932174
Test: manual
Exempt-From-Owner-Approval: refactoring with team leads buy-in
Merged-In: I3480ddf2fe7ba3dfb922b459d4da01fa17a2c813
Change-Id: I3480ddf2fe7ba3dfb922b459d4da01fa17a2c813
|
|
As general background, OWNERS files expedite code reviews by helping
code authors quickly find relevant reviewers, and they also ensure
that stakeholders are involved in code changes in their areas.
Some teams under frameworks/base/ have been using OWNERS files
successfully for many years, and we're ready to expand them to cover
more areas. Here's the historical coverage statistics for the last
two years of changes before these new OWNERS changes land:
-- 56% of changes are fully covered by OWNERS
-- 17% of changes are partially covered by OWNERS
-- 25% of changes have no OWNERS coverage
Working closely with team leads, we've now identified clear OWNERS on
a per-package basis, and we're using "include" directives whenever
possible to to simplify future maintenance. With this extensive
effort, we've now improved our coverage as follows:
-- 98% of changes are fully covered by OWNERS
-- 1% of changes are partially covered by OWNERS
-- 1% of changes have no OWNERS coverage
This specific change begins defining top-level OWNERS lists,
including a general catch-all for string translations.
Bug: 174932174
Test: manual
Exempt-From-Owner-Approval: refactoring with team leads buy-in
Change-Id: Ie7ac3302d40a717fa048115cca2ea4359de64959
|
|
This change facilitates configuration makefile conversion to starlark.
Test: treehugger
Bug: 172923994
Change-Id: I2e965a8568f9cd94f171e32c2fa444400ec868cb
|
|
Bug: 172690556
Merged-In: I78222391b83a4add8e964340ec08bb8a1306e1c6
Change-Id: I28bbf40820674675ccf765c912aa8140d3f74ab2
|
|
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1500510
Change-Id: Ie88e8640db85513fd16c383833731f4a014d97e7
|
|
d9541fb81b
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/13090678
Change-Id: Ic4b416a6e3220b041c0336d1d905dd45a806eb48
|
|
|
|
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/13073453
Change-Id: I8e9ec32c16457e0356762dc95e5ea2440e066de8
|
|
Bug: 173532101
Test: make && emulator
Change-Id: Iddaf0dfc25df76f8b3492fb293ccb3910ae2898e
Merged-In: Iddaf0dfc25df76f8b3492fb293ccb3910ae2898e
|
|
Settings application needs the previleged permission to
get AoD supression status by using PowerManager API
Bug: 173425264
Change-Id: I5da006b7c88dc36d3eefebc559f2a2f3ab50823f
Test: Manual & bootup device
(cherry picked from commit 8a888b9745f0483dbb80131ae15bf92b189af07b)
Merged-In: I5da006b7c88dc36d3eefebc559f2a2f3ab50823f
|
|
The new permission will protect the UI traces, allowing only wanted
development tools to start the tracing. At the moment, the permission is
planned to be used for WindowManager and InputMethod traces.
Bug: 172444310
Test: N/A
Change-Id: Ibdeb38dc9a066cb8ed2904adcdac29014b166526
|
|
|
|
742771fdd7 am: e798d05a73
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1467918
Change-Id: I053f441b90c710a7fed75705b3e170b890acb193
|
|
742771fdd7
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1467918
Change-Id: If25601a8cd9024de12655c73ac587ab116ad845c
|
|
|
|
This dependency is fictitious: hidl manager actually contains a static
copy of hidl base for convenience. Separate libraries were created
later (e.g. android.hidl.manager-java-shallow) in order for users of
these libraries to specify the exact deps they need.
Fixes: 170710203
Test: boot and check logs
:) adb logcat | grep android.hidl.manager-V1.0-java.jar
10-21 00:42:53.173 328 328 D ApplicationLoaders: Created zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
10-21 00:43:17.322 329 329 D ApplicationLoaders: Created zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
10-21 00:43:31.920 2250 2250 D ApplicationLoaders: Returning zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
10-21 00:43:38.884 2847 2847 D ApplicationLoaders: Returning zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
10-21 00:43:41.010 2923 2923 D ApplicationLoaders: Returning zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
10-21 00:43:42.146 3044 3044 D ApplicationLoaders: Returning zygote-cached class loader: /system/framework/android.hidl.manager-V1.0-java.jar
Change-Id: I024a1b16570bdceb7bef5b2e718c65155c675b4a
|
|
f068a1c665
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12865656
Change-Id: I1cf1a67e136ee838aa4461c3d4c0da1bb561b7ba
|
|
Needed to give KitchenSink control over enabling/disabling rotary
functionality.
Bug: 170232080
Test: manual
Change-Id: Ic69222642884444597e7411b17b6c6f363076981
|
|
30951b0666 am: 94fc36d8fc am: 3b458c921c
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1446730
Change-Id: I264db17eaf594758ae997a18b5f27688d3458465
|
|
30951b0666 am: 94fc36d8fc
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1446730
Change-Id: Ia418515b0c1f4b270cf07885f9c089d8ab146df8
|
|
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1446730
Change-Id: I760c959c891a12b5ea096ed9f8de56209ec45233
|
|
Bug: 167233921
Merged-In: Iecef31f7bf10ad97b7e0075cf302ae94e248474a
Change-Id: I9e9c873bc2e05a0cfe3af0bf74725500f3f108db
|
|
Add media buttons like play/pause/record etc, for OnLive
Universal Controller.
Bug: 114679349
Test: Connect OnLive Universal Controller and play with media
buttons.
Change-Id: Ie69b3f7f8f13c778208454fb789113126c04966a
Merged-In: Ie69b3f7f8f13c778208454fb789113126c04966a
|
|
8a0ce64177 am: 75ae324fb9
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1440636
Change-Id: Id9f67ecab2beabe967660b5a4407ef0f20d8efad
|
|
8a0ce64177
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1440636
Change-Id: I0c4deb866e86feb77fe898e4bf643cd45ad9f086
|
|
This adds a new permission in AOSP, so it can be referenced by the Shell
command, which presubmit suggests has to be maintained in AOSP.
Bug: 159891384
Test: build only
Exempt-From-Owner-Approval: jsharkey@ approved but it appears to have reset...?
Change-Id: Ic7d403e20731e9d6bd82d5b2e2758cc61989cc59
|
|
rvc-d1-dev am: 76b7c3ccb4
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12691247
Change-Id: Iab79d997aaeec0524cf9f2d9fb61f3c1ce0afa71
|
|
Add permissions for Phone process to access SubscriptionPlans for
meteredness
Test: manual verification
Bug: 169187737
Change-Id: Ib821590a573db87b22619cfe7ebe64c0230c5031
Merged-In: Ib821590a573db87b22619cfe7ebe64c0230c5031
|
|
am: c1795594fc am: 007c395a60 am: 2b7e712e28
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1415308
Change-Id: Icf6dcb3545876cc1f1fa55648d4af4912e8e18ac
|
|
rvc-qpr-dev am: 93e0bd19fc
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12672465
Change-Id: I45e6d253a09a7d82b454d869895b54d8631cc24b
|
|
am: c1795594fc am: 007c395a60
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1415308
Change-Id: I848a84ba27f4577b2744703943eb09d49b9922fa
|
|
Add permissions for Phone process to access SubscriptionPlans for
meteredness
Test: manual verification
Bug: 169187737
Change-Id: Ib821590a573db87b22619cfe7ebe64c0230c5031
|
|
|
|
Modifies the privapp allowlist to allow Traceur to grant Traceur the
STATUS_BAR permission, which is needed for quick settings tile functionality, and dump which is needed for the BUGREPORT_STARTED intent.
Bug: 166768816
Test: Built user and userdebug, exercised regular and long trace
functionality
Change-Id: I180527a9a1a30ef6a214b628f37affc69f9ae2f0
|
|
Add permissions for Phone process to access SubscriptionPlans for
meteredness
Test: manual verification
Bug: 169187737
Change-Id: Ib821590a573db87b22619cfe7ebe64c0230c5031
|
|
f08e8871d4 am: 72003fb685 am: 10e02f55c0 am: 2dc7803823
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1434135
Change-Id: Ided901188cdaee6a0bc7cafe751e9344bcba8d9b
|
|
f08e8871d4 am: 72003fb685 am: 10e02f55c0
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1434135
Change-Id: I2739873d55b2cff1f5ecc722e1877603ba6e22c6
|
|
|
|
DownloadProvider" am: 41344e427c am: a5bd8f91f5 am: 451ab5646b
Original change: https://android-review.googlesource.com/c/platform/frameworks/base/+/1431470
Change-Id: I44f2db6b3563cf002372a2e97cb6849275d139fd
|
|
There should be no such dependency.
Test: lunch aosp_cf_x86_phone-userdebug && m
Bug: 169137403
Bug: 132357300
Change-Id: Iaa7414be66581c01c6acbf367dc165cd8af78615
|
|
- DownloadManager will use the requestor app's default network to
open a connection. When the VPN app lists the DownloadProvider as
a disallowed application, this will fail with EPERM.
- This is because in R, the DownloadProvider lost its privileges
due to the removal of the CONNECTIVITY_INTERNAL permission. It's
removed without considering the corner case where the
DownloadProvider is excluded from using the VPN. It's the only
case where this makes a difference.
- Adding CONNECTIVITY_USE_RESTRICTED_NETWORKS will give
DownloadProvider the ability to use the VPN again in this case,
fixing the issue.
Bug: 165774987
Test: Build, flash rom and boot to home. Manully test that
DownloadProvider can download file via VPN.
Change-Id: If8fa785568ace1f15f53daec67c06e1207d5dc9c
Merged-In: If8fa785568ace1f15f53daec67c06e1207d5dc9c
|
|
DownloadProvider" into rvc-qpr-dev am: 8b9d40586b
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12533920
Change-Id: I1d881a0c74870c700597e3ef3280ba349640591e
|
|
- DownloadManager will use the requestor app's default network to
open a connection. When the VPN app lists the DownloadProvider as
a disallowed application, this will fail with EPERM.
- This is because in R, the DownloadProvider lost its privileges
due to the removal of the CONNECTIVITY_INTERNAL permission. It's
removed without considering the corner case where the
DownloadProvider is excluded from using the VPN. It's the only
case where this makes a difference.
- Adding CONNECTIVITY_USE_RESTRICTED_NETWORKS will give
DownloadProvider the ability to use the VPN again in this case,
fixing the issue.
Bug: 165774987
Test: Build, flash rom and boot to home. Manully test that
DownloadProvider can download file via VPN.
Change-Id: If8fa785568ace1f15f53daec67c06e1207d5dc9c
|
|
Bug: 166295507
Merged-In: I3d92a6de21a938f6b352ec26dc23420c0fe02b27
Change-Id: Ifdb80563ef042738778ebb8a7581a97c4e3d96e2
|
|
d951edaa48
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12378082
Change-Id: I2d29f6eec37ad75c83fd8e96351061116929a54a
|
|
|
|
am: d029933aa5
Original change: https://googleplex-android-review.googlesource.com/c/platform/frameworks/base/+/12330563
Change-Id: I559c3cd33280083f88f4d9f7f2324153e49527ce
|
|
Removing car permissions that were added into common shell so that they
can be re-evaulated to include into CarShell. Adding car permissions to
shell should be reviewed by car frameworks team to determine what can be
allowed to the end-user and in terms of car safety.
Bug: 160339243
Test: make then check permission for shell user with adb shell pm dump
com.android.shell
Change-Id: I5a3b2086f605ba31f4231ec425cb2cb7c51ea7e6
(cherry picked from commit 89e5cfe9d8f9eb179ba3c3e2d4a3260ba3f0c470)
Merged-In: I5a3b2086f605ba31f4231ec425cb2cb7c51ea7e6
|