summaryrefslogtreecommitdiff
path: root/core/java/android
diff options
context:
space:
mode:
authorBookatz <bookatz@google.com>2019-08-22 18:26:49 -0700
committerBookatz <bookatz@google.com>2019-12-11 18:25:05 -0800
commitfe4eb2b193544c9c4f55db6fd72f367ec9e85cdb (patch)
tree2dff7ba76c9019f1e8c2d25459a6fe4ecb379807 /core/java/android
parentaa22ba6b5c2a212c307bb4633e8b3c0db22dade1 (diff)
UM.isUserNameSet is SystemApi
getUserName is already accessible, so isUserNameSet can be too. Since it covers a similar topic, it makes sense to also lock it down with the same permissions (even though the information is not nearly as sensitive). Test: atest UserManagerServiceUserInfoTest Bug: 135582166 Change-Id: I84bc4ec97462b90f0bd1a721e0e41cc14b190e2c
Diffstat (limited to 'core/java/android')
-rw-r--r--core/java/android/os/UserManager.java3
1 files changed, 3 insertions, 0 deletions
diff --git a/core/java/android/os/UserManager.java b/core/java/android/os/UserManager.java
index 137f53782124..f92de42e061e 100644
--- a/core/java/android/os/UserManager.java
+++ b/core/java/android/os/UserManager.java
@@ -1540,6 +1540,9 @@ public class UserManager {
* set by the user and is not a placeholder string provided by the system.
* @hide
*/
+ @SystemApi
+ @RequiresPermission(anyOf = {Manifest.permission.MANAGE_USERS,
+ Manifest.permission.GET_ACCOUNTS_PRIVILEGED})
public boolean isUserNameSet() {
try {
return mService.isUserNameSet(getUserHandle());