| Commit message (Collapse) | Author | Age | Files | Lines |
| |\
| |
| |
| |
| |
| | |
https://github.com/LineageOS/android_device_google_redbull into HEAD
Change-Id: Id1674e5642bd5911e86265679d8fcfe529eab5cc
|
| | |
| |
| |
| |
| |
| |
| |
| |
| | |
- Pregrant BLUETOOTH_CONNECT for settingsintelligence for Bramble,
redin, and Barbet
Test: NA
Bug: 277269994
Change-Id: Idabfc8d9b330d1bfe912ef38d9598128e5764203
|
| | |\
| | |
| | |
| | |
| | |
| | |
| | | |
Original change: https://googleplex-android-review.googlesource.com/c/device/google/redbull/+/20579162
Change-Id: I7e66c8f9584d0af921f30512be7c9eebb6adc81c
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
refer to b/237497128
Bug: 251705860
Test: manual
Change-Id: I7422932f8567bb926c6e5214ecc663919757da08
|
| | |/
| |
| |
| |
| |
| |
| |
| | |
With Android T, GoogleRestore uses NEARBY_WIFI_DEVICES to create a hotspot. ACCESS_FINE_LOCATION was used in Android S and no longer needed in Android T.
Bug: 231966826
Test: Manual tested on Bramble. Used a GoogleRestore APK which declares the use of the ACCESS_FINE_LOCATION permission but the permission is not granted by default.
Change-Id: I9bcf9f4922dd7ea5f52c0db0fdafc37e175663de
|
| | |
| |
| |
| |
| |
| | |
Bug: 233903326
Test: manual
Change-Id: I0cd31717cfb954154077e8bc12981f91539c8917
|
| | |
| |
| |
| |
| |
| | |
Bug: 233243584
Change-Id: I7ab9dc3a1ced82c500046e787c3401f385ccf410
Test: manual
|
| | |
| |
| |
| |
| |
| | |
Bug: 232002666
Change-Id: I4cb4e49d2755f0216b826942643365366aaa0a07
Test: manual
|
| | |
| |
| |
| |
| |
| |
| |
| | |
Bug: 232469538
Bug: 232470607
Bug: 232470323
Test: manual
Change-Id: I503420f60ed88fbf2177e61c573effde44193dad
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
We used ACCESS_FINE_LOCATION to start a WiFi P2P connection. From
Android T, the required permission is changed to NEARBY_WIFI_DERVICES
instead.
Bug: 219855567
Test: Manual tested on Oriole. Used a local built Restore APK which
declares the use of the permission. Push that APK to the test Oriole and
validate the permission is granted by default.
Change-Id: Ie257179c6f0e533b99ed163294c660e8b6fd9393
|
| | |
| |
| |
| |
| |
| | |
Test: build
Bug: 218409412
Change-Id: I0de4ef628c4c028ef1f4005c42dbe5b5676df75a
|
| | |\
| | |
| | |
| | | |
into sc-v2-dev
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Revert "pregrant coarse and background location permission to scone"
Revert submission 15820535-cherrypick-repregrantLocationToScone-5hvcs25t6g
Reason for revert: Unintended location usage issue not fixed.
Reverted Changes:
I1c2209112:pregrant coarse and background location permission...
I1b9370bdc:pregrant coarse and background location permission...
I0fbb20b3e:pregrant coarse and background location permission...
I2d4681b9a:pregrant coarse and background location permission...
Bug: 210152490
Change-Id: Iaeea5e46422f98975242a472d8d60fe7909ee40f
|
| | |\ \
| | |/
| |/| |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
as per https://developer.android.com/about/versions/12/approximate-location If your app targets Android 12 and you request the ACCESS_FINE_LOCATION permission, you must also request the ACCESS_COARSE_LOCATION permission.
Pregrant also given in cl/396867561.
Bug: 189868097
Bug: 123422575
Test: b/199306063
Change-Id: I5d8c785cbe8ecaf52fa6b0c56fbe965ff37c5ee8
|
| | |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
CBRS is ramping up so we need to make sure the necessary location permissions are granted before it launches
Bug: 188832088
Bug: 123422575
Test: b/199306063
Change-Id: I2d4681b9a500b7841814696d2085acbb8cc80084
|
| | |
| |
| |
| |
| | |
Bug: 183533362
Change-Id: I1c49c92fa4133692337d67691bcd7ddca0147ff8
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
-. RECEIVE_SMS and READ_PHONE_NUMBERS permissions are no longer used.
-. Add the ACCESS_FINE_LOCATION permission for iOS WiFi D2D which was approved in b/188150877.
Bug: 188150877
Fix: 162937804
Test: Manual tested on Barbet.
Change-Id: I96643f648d72b50a20dc72ac7052ecb7495ab2cb
Merged-In: I96643f648d72b50a20dc72ac7052ecb7495ab2cb
|
| | |
| |
| |
| |
| |
| | |
Bug: 186731327
Test: atest DefaultPermissionGrantPolicyTest
Change-Id: I0e7f5c573c5d61264748e7768fe394e35ef1a9ab
|
| | |\ |
|
| | | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Will revert once issue fixed and CBRS will launch.
Bug: 188236995
Test: manual
Change-Id: I134fad5710497e2907ddfc5916f95b352936cf6d
|
| | |/
| |
| |
| |
| |
| | |
Bug: 186759659
Test: Compiled
Change-Id: I34d4631bf0c0be7f4615349ead32fb1ad576a738
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Location access is not needed for physical channel configuration changes
anymore
Bug: 185247832
Test: On Device
Test: atest ConnectivityThermalPowerManagerTests
Change-Id: Idabce5c868fb66327d239a7e9d64ba2f26640647
|
| | |
| |
| |
| |
| | |
Bug: 184195079
Change-Id: I5f29f34117160779bd636dea51420bd21394272a
|
| | |
| |
| |
| |
| |
| |
| |
| | |
Enables location permissions needed for GnssPixelMonitor.
Bug: 178015947, 178015951
Test: atest -c GnssPixelMonitorTests
Change-Id: Ieed7efc845315d92a3dd2f2d02065017b7e788f5
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Location permissions default enabled for 5G power manager. This is
needed for physical channel configuration changes. Physical channel
configuration is needed to determine the current mode the device is in.
For example: LTE+FR1 or FR1+FR2
Bug: 171090297
Test: atest ConnectivityThermalPowerTests
Change-Id: I0e3cf48ffdd68576e06e9d01c6e3698304386300
|
| | |
| |
| |
| |
| |
| |
| | |
Bug: 134997071
Bug: 166143587
Test: Code builds
Change-Id: Iea4cf399ed67ae59100d360fc2d3e316239db738
|
| | |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Android 13.0.0 release 35
# -----BEGIN PGP SIGNATURE-----
#
# iF0EABECAB0WIQRDQNE1cO+UXoOBCWTorT+BmrEOeAUCZA9jsAAKCRDorT+BmrEO
# eNhgAJ9pGuCad1Tqumwt6ZuZM3LX0mzcwACggCk3aTZC7Gr60i2su7FrDNiU14A=
# =i0Qw
# -----END PGP SIGNATURE-----
# gpg: Signature made Mon Mar 13 19:56:00 2023 EET
# gpg: using DSA key 4340D13570EF945E83810964E8AD3F819AB10E78
# gpg: Good signature from "The Android Open Source Project <initial-contribution@android.com>" [marginal]
# gpg: initial-contribution@android.com: Verified 1601 signatures in the past
# 16 months. Encrypted 4 messages in the past 14 months.
# gpg: WARNING: This key is not certified with sufficiently trusted signatures!
# gpg: It is not certain that the signature belongs to the owner.
# Primary key fingerprint: 4340 D135 70EF 945E 8381 0964 E8AD 3F81 9AB1 0E78
# By Steve Berbary (5) and others
# Via Android Build Coastguard Worker (9) and others
* tag 'android-13.0.0_r35':
Update redbull SVN to 60
Update redbull SVN to 59
Update redbull SVN to 58
Update redbull SVN to 57
[LPA][Redbull] Add notification pregrant
Add stpreprocess and update streset path
Update redbull SVN to 56
Update redbull SVN to 55
Conflicts:
device-common.mk
Change-Id: Icfbb79a30ba7396461e2c6728b41a5ab46a6a686
|
| | |
| |
| |
| |
| |
| | |
* from https://github.com/Siluxsept/device_google_redbull
Change-Id: I35f5155ade89319b492e51ad01c84dcd0748cf34
|
| |/
|
|
| |
Change-Id: I11d0f557cc480215b33bbc52cf7bc6ed3de09c74
|
| |
|
|
|
|
| |
Test: make
Bug: 169099856
Change-Id: Ie7f7a29565170ecda3ec12563fed460a2c8f010e
|
| |
|
|
|
|
|
| |
Bug: 159732550
Test: Treehugger, b/160624147
Change-Id: Ic71e1dd80d2857467a820c3f45519ef5424bbe1c
|
| |\
| |
| |
| | |
Change-Id: I4dface7c1a1f379ae093f5bc16fe3479d54e6719
|
| | |
| |
| |
| |
| |
| |
| |
| |
| | |
Bramble and Redfin device reuse same default-permissions file in
Redbull, so we change the permission configuration here.
Test: Rebuilt rom and see permission screen
Fix: 155841558
Change-Id: I70a60631f8eef4cdc257bf2d8ff30c1e61adbd90
|
| |\|
| |
| |
| |
| |
| | |
rvc-dev am: dae410f40e
Change-Id: I24f8635ae0d86f1a3f9e419c1aeea880b54f5f6d
|
| | |
| |
| |
| |
| |
| |
| |
| |
| | |
This reverts commit c67d4a4e71209c672f84f2b5648c224b09258df9.
Reason for revert: PixelMigrate won't have ALT UI because it would run during SetupWizard, so no need to add it anymore.
Bug: 153708933
Bug: 155064929
Change-Id: I95eb35a38d8b04b371dc7ae189e5696685621554
|
| |\|
| |
| |
| |
| |
| | |
am: dadf8132f0
Change-Id: I529eee57b3f2e3ea6a2dab1773416505904c3058
|
| | |
| |
| |
| |
| |
| |
| |
| | |
The permission is used to get configured wifi list.
Test: manual (The permission is granted in runtime permission)
Bug: 153708933
Change-Id: Ia2e46a33290059b874c966c8ce52af98d26f271d
|
| |/
|
|
|
|
|
|
|
|
|
|
| |
<permission name="android.permission.CAMERA" fixed="false"/>
<permission name="android.permission.RECORD_AUDIO" fixed="false"/>
<permission name="android.permission.READ_EXTERNAL_STORAGE" fixed="false"/>
<permission name="android.permission.WRITE_EXTERNAL_STORAGE" fixed="false"/>
Bug: 152715044
Bug: 152389933
Bug: 138742253
Change-Id: I9e87e2a82a356720b5eaae47e4a94517307cb563
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
MVS and WfcActivation should have some pre-grant permission
Bug: 152686841
Bug: 152687107
Test: adb shell "dumpsys package com.google.android.wfcactivation | grep RECEIVE_WAP_PUSH"
android.permission.RECEIVE_WAP_PUSH: restricted=true
android.permission.RECEIVE_WAP_PUSH: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
adb shell "dumpsys package com.verizon.mips.services | grep PROCESS_OUTGOING_CALLS"
android.permission.PROCESS_OUTGOING_CALLS: restricted=true
android.permission.PROCESS_OUTGOING_CALLS: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
adb shell "dumpsys package com.verizon.mips.services | grep READ_PHONE_STATE"
android.permission.READ_PHONE_STATE
android.permission.READ_PHONE_STATE: granted=true, flags=[ USER_SENSITIVE_WHEN_GRANTED]
adb shell "dumpsys package com.verizon.mips.services | grep RECEIVE_SMS"
android.permission.RECEIVE_SMS: restricted=true
android.permission.RECEIVE_SMS: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
Change-Id: If748e89b93541806d70dc0a304f2dd4b5737c880
|
| |
|
|
|
|
|
|
| |
- Adding READ_CALENDAR.
Bug: 144437725
Test: Build/flashed device and confirmed pregrant
Change-Id: I45c8c426681ccb7163ee521e89e5f30bd4d75457
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Test: manually verify permissions are granted.
$ adb shell dumpsys package packages | grep -A40 'com.google.android.apps.pixelmigrate'
Output contains:
runtime permissions:
android.permission.READ_CALL_LOG: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
android.permission.READ_PHONE_NUMBERS: granted=true, flags=[ GRANTED_BY_DEFAULT]
android.permission.READ_EXTERNAL_STORAGE: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
android.permission.WRITE_CONTACTS: granted=true, flags=[ GRANTED_BY_DEFAULT]
android.permission.WRITE_CALL_LOG: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
android.permission.WRITE_EXTERNAL_STORAGE: granted=true, flags=[ GRANTED_BY_DEFAULT|RESTRICTION_SYSTEM_EXEMPT|RESTRICTION_UPGRADE_EXEMPT]
android.permission.READ_CONTACTS: granted=true, flags=[ GRANTED_BY_DEFAULT
Bug: 149682811
Change-Id: I8b4c218d941aed1f8b6d09e746b4ec784ed1078b
|
| |
|
|
|
|
|
| |
Pre-granting permissions that present in Pixel 4
Bug: 147032035
Change-Id: I652950abb9835fa3242c45031801e0f18affefd8
|
| |
|
|
|
|
|
|
| |
Sync from C2/F2
Bug: 141219585
Test: Check log for any permission denied.
Change-Id: I504f140f6d00e4b0b26d75bb05afde9dbcfef186
|
|
|
Bug: 140363359
Change-Id: I13e2279257f509080cccb5bf91c0843b3a978bdd
|