summaryrefslogtreecommitdiff
path: root/core/java/android/net/WebAddress.java
Commit message (Collapse)AuthorAgeFilesLines
* Add maxTargetSdk restriction to unused APIs.Mathew Inwood2020-10-291-2/+2
| | | | | | | | | | | | | | | | | | | These are APIs that have @UnsupportedAppUsage but for which we don't have any evidence of them currently being used, so should be safe to remove from the unsupported list. This is a resubmit of ag/12929664 with some APIs excluded that caused test failures; see bugs 171886397, 171888296, 171864568. APIs excluded: Landroid/bluetooth/le/ScanRecord;->parseFromBytes([B)Landroid/bluetooth/le/ScanRecord; Landroid/os/Process;->myPpid()I Landroid/os/SharedMemory;->getFd()I Landroid/hardware/input/InputManager;->INJECT_INPUT_EVENT_MODE_WAIT_FOR_FINISH:I Bug: 170729553 Test: Treehugger Change-Id: I8285daa8530260251ecad6f3f38f98e263629ca7
* Revert "Add maxTargetSdk restriction to unused APIs."Hongwei Wang2020-10-281-2/+2
| | | | | | | | | This reverts commit 72f07d6a8a32db4a0dedd7682a0b3385be2b9cd6. Reason for revert: Droidcop-triggered revert due to breakage https://android-build.googleplex.com/builds/quarterdeck?testMethod=testAppZygotePreload&testClass=android.app.cts.ServiceTest&atpConfigName=suite%2Ftest-mapping-presubmit-retry_cloud-tf&testModule=CtsAppTestCases&fkbb=6936597&lkbb=6936969&lkgb=6936551&testResults=true&branch=git_master&target=cf_x86_phone-userdebug>, bug b/171886397 Bug: 171886397 Change-Id: Ibe0f0430a3451477c1ee8ef56a596e91ea1e7672
* Add maxTargetSdk restriction to unused APIs.Mathew Inwood2020-10-271-2/+2
| | | | | | | | | | These are APIs that have @UnsupportedAppUsage but for which we don't have any evidence of them currently being used, so should be safe to remove from the unsupported list. Bug: 170729553 Test: Treehugger Change-Id: I4c8fd0006f950de9955242e93968fb0996ceb372
* Use new UnsupportedAppUsage annotation.Artur Satayev2020-01-061-1/+1
| | | | | | | | Existing annotations in libcore/ and frameworks/ will deleted after the migration. This also means that any java library that compiles @UnsupportedAppUsage requires a direct dependency on "unsupportedappusage" java_library. Bug: 145132366 Test: m && diff unsupportedappusage_index.csv Change-Id: I0c336de56bc4a041dc97ff9b7927f62f0b44b457
* Add missing nullability annotations.Aurimas Liutikas2019-08-291-0/+2
| | | | | | | | | | | | | | To prepare for enabling MissingNullability Metalava check this CL works on adding missing nullability issues that metalava flags if we tell it to flag new things since API 29. This is not a complete CL, mostly addresses public api and toString/equals for @SystemApi Exempt-From-Owner-Approval: Large scale nullability clean up Bug: 124515653 Test: make -j checkapi Change-Id: I109260842cfc25f06e40694997fcbb4afa02c867
* Limit access to suspected false positives.Mathew Inwood2018-12-281-1/+2
| | | | | | | | | | | | | | | | | | | | | Members modified herein are suspected to be false positives: i.e. things that were added to the greylist in P, but subsequent data analysis suggests that they are not, in fact, used after all. Add a maxTargetSdk=P to these APIs. This is lower-risk that simply removing these things from the greylist, as none of out data sources are perfect nor complete. For APIs that are not supported yet by annotations, move them to hiddenapi-greylist-max-p.txt instead which has the same effect. Exempted-From-Owner-Approval: Automatic changes to the codebase affecting only @UnsupportedAppUsage annotations, themselves added without requiring owners approval earlier. Bug: 115609023 Test: m Change-Id: I020a9c09672ebcae64c5357abc4993e07e744687
* Add @UnsupportedAppUsage annotationsMathew Inwood2018-08-141-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | For packages: android.net.wimax android.net.wifi.p2p.nsd android.net.wifi.p2p android.net.wifi.hotspot2.pps android.net.wifi.hotspot2.omadm android.net.wifi.hotspot2 android.net.wifi.aware android.net.wifi android.net.util android.net.sip android.net.rtp android.net.nsd android.net.metrics android.net.lowpan android.net.http android.net.captiveportal android.net This is an automatically generated CL. See go/UnsupportedAppUsage for more details. Exempted-From-Owner-Approval: Mechanical changes to the codebase which have been approved by Android API council and announced on android-eng@ Bug: 110868826 Test: m Change-Id: I520be7a4c79e68310c12e4f55bf66acaa94145a1
* [WebView] Allow the WebView to be compiled against the system SDK.Ignacio Solla2014-11-121-0/+15
| | | | | BUG:18152150 Change-Id: Ifd6dcac17663631058d895c61bb6e8018c5aeecc
* If frameworks wants ASCII casing, it should explicity ask for it.Elliott Hughes2013-08-021-1/+2
| | | | | | | http://elliotth.blogspot.com/2012/01/beware-convenience-methods.html Bug: https://code.google.com/p/android/issues/detail?id=58359 Change-Id: Iaab02e718a7be7bda22e626dca05d79bfd2a8fc4
* Make fields in WebAddress private, add getters/settersBjorn Bringert2010-10-131-7/+46
| | | | Change-Id: Iceaf3d648289344e53c37273f7324a79676fbef7
* Fixes a problem with URL parsing when the host ends with a dotSteve Block2010-09-071-1/+1
| | | | | | | | | | | | | | | | The WebAddress class provides a lenient parser for URLs. Currently, it identifies the host portion with the regex [<chars>]+(\.[<chars>]+)* where <chars> is the set of characters valid for the host name. This pattern excludes the case where the host ends with a dot, which is valid possibility. As a result, any trailing dot is pushed into the path component. Since we add a leading slash to the path if one is missing, the result is a path that begins with '/.'. This fix changes the host regex to [<chars>]+[<chars>\.]* which allows trailing dots and fixes the problem. Bug: 2337042 Change-Id: I310512531787e0f742988f5d815ad944fd39e059
* Use case insensitive matching.Patrick Scott2010-03-311-3/+3
| | | | | | | Use the lowercase version of the protocol. Bug: 2560217 Change-Id: Ibfadf4ba363968df9caf22c9ab36f666ee44d1db
* Updates WebAddress to ignore the colon after the host component of a URL if ↵Steve Block2010-03-081-2/+3
| | | | | | | | | | | | | | | | | no port is specified Currently, the regex used to extract the port matches ':' followed by 1 or more digits. This means that when passed a malformed URL of type <host>:<path>, no match is made for the port and the ':' is matched as part of the path. Since the handling of the path adds a leading '/' where absent (see http://b/1011602), this leads to the URL being converted to <host>/:<path>. This change updates the port regex to match ':' followed by zero or more digits. This means that the ':' is always matched, so it does not leak into the path and the result is <host><path>. This matches the behavior of desktop browsers. Bug: 2494876 Change-Id: I34b47c8187cf03aa7674c14cd6593de53dce3169
* Re-arrange android-common so framework no longer links with it.Dianne Hackborn2010-02-251-1/+1
| | | | | | | This is the framework part, moving classes around so the framework no longer needs to link to android-common. Makes some APIs public, others that didn't need to be public are private in the framework, some small things are copied.
* Do not include the fragement identifier in the path.Patrick Scott2010-02-161-1/+2
| | | | Bug: 2435741
* Enhance URL regular expression to match more Unicode chars.Shimeng (Simon) Wang2010-02-111-1/+3
| | | | | | | | | | | | | | | Enhance URL regular expression to match legal one byte Unicode characters in Internationalized Resource Identifiers as detailed in RFC 3987. Specifically two byte Unicode characters are not included. Not all things in RFC 3987 is implemented, this is just an enhancement for recognizing more common used one byte Unicode characters. This change helps Browser address bar identify more valid URL without scheme typed in, such as 현금영수증.kr make-iana-tld-pattern.py is modified to contain only Top Level Domain regular expression generation. Other parts of WEB_URL pattern are in solely in Patters.java for better consistency and maintenance.
* Support IPv6 literal URLs, e.g., http://[2001:4860:b004::68]/ as per RFC 3896Lorenzo Colitti2009-09-231-1/+1
| | | | | | section 3.2.2. Change-Id: I6166753fac2c141440fc3c860ab644b29b188d76
* Add '_' to the allowable characters in a host name.Patrick Scott2009-04-271-1/+1
| | | | | This does not fix the underscore problem in host names but it moves it from a Browser issue to a libc issue.
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-031-0/+134
|
* auto import from //depot/cupcake/@135843The Android Open Source Project2009-03-031-134/+0
|
* Initial ContributionThe Android Open Source Project2008-10-211-0/+134