diff options
author | The Android Open Source Project <initial-contribution@android.com> | 2008-10-21 07:00:00 -0700 |
---|---|---|
committer | The Android Open Source Project <initial-contribution@android.com> | 2008-10-21 07:00:00 -0700 |
commit | 54b6cfa9a9e5b861a9930af873580d6dc20f773c (patch) | |
tree | 35051494d2af230dce54d6b31c6af8fc24091316 /data/etc | |
download | frameworks_base-54b6cfa9a9e5b861a9930af873580d6dc20f773c.zip frameworks_base-54b6cfa9a9e5b861a9930af873580d6dc20f773c.tar.gz frameworks_base-54b6cfa9a9e5b861a9930af873580d6dc20f773c.tar.bz2 |
Initial Contribution
Diffstat (limited to 'data/etc')
-rw-r--r-- | data/etc/Android.mk | 32 | ||||
-rw-r--r-- | data/etc/permissions.xml | 130 |
2 files changed, 162 insertions, 0 deletions
diff --git a/data/etc/Android.mk b/data/etc/Android.mk new file mode 100644 index 0000000..fe4a222 --- /dev/null +++ b/data/etc/Android.mk @@ -0,0 +1,32 @@ +# +# Copyright (C) 2008 The Android Open Source Project +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# + +LOCAL_PATH := $(my-dir) + +######################## +include $(CLEAR_VARS) + +LOCAL_MODULE := permissions.xml + +LOCAL_MODULE_TAGS := user development + +# This will install the file in /system/etc +# +LOCAL_MODULE_CLASS := ETC + +LOCAL_SRC_FILES := $(LOCAL_MODULE) + +include $(BUILD_PREBUILT) diff --git a/data/etc/permissions.xml b/data/etc/permissions.xml new file mode 100644 index 0000000..bdaefff --- /dev/null +++ b/data/etc/permissions.xml @@ -0,0 +1,130 @@ +<?xml version="1.0" encoding="utf-8"?> +<!-- Copyright (C) 2008 The Android Open Source Project + + Licensed under the Apache License, Version 2.0 (the "License"); + you may not use this file except in compliance with the License. + You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + + Unless required by applicable law or agreed to in writing, software + distributed under the License is distributed on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + See the License for the specific language governing permissions and + limitations under the License. +--> + +<!-- This file is used to define the mappings between lower-level system + user and group IDs and the higher-level permission names managed + by the platform. + + Be VERY careful when editing this file! Mistakes made here can open + big security holes. +--> +<permissions> + + <!-- ================================================================== --> + <!-- ================================================================== --> + <!-- ================================================================== --> + + <!-- The following tags are associating low-level group IDs with + permission names. By specifying such a mapping, you are saying + that any application process granted the given permission will + also be running with the given group ID attached to its process, + so it can perform any filesystem (read, write, execute) operations + allowed for that group. --> + + <permission name="android.permission.BLUETOOTH_ADMIN" > + <group gid="net_bt_admin" /> + </permission> + + <permission name="android.permission.BLUETOOTH" > + <group gid="net_bt" /> + </permission> + + <permission name="android.permission.INTERNET" > + <group gid="inet" /> + </permission> + + <permission name="android.permission.CAMERA" > + <group gid="camera" /> + </permission> + + <permission name="android.permission.READ_LOGS" > + <group gid="log" /> + </permission> + + <!-- The group that /cache belongs to, linked to the permission + set on the applications that can access /cache --> + <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" > + <group gid="cache" /> + </permission> + + <!-- RW permissions to any system resources owned by group 'diag'. + This is for carrier and manufacture diagnostics tools that must be + installable from the framework. Be careful. --> + <permission name="android.permission.DIAGNOSTIC" > + <group gid="input" /> + <group gid="diag" /> + </permission> + + <!-- ================================================================== --> + <!-- ================================================================== --> + <!-- ================================================================== --> + + <!-- The following tags are assigning high-level permissions to specific + user IDs. These are used to allow specific core system users to + perform the given operations with the higher-level framework. For + example, we give a wide variety of permissions to the shell user + since that is the user the adb shell runs under and developers and + others should have a fairly open environment in which to + interact with the system. --> + + <!-- System tool permissions granted to the shell. --> + <assign-permission name="android.permission.GET_TASKS" uid="shell" /> + <assign-permission name="android.permission.CHANGE_CONFIGURATION" uid="shell" /> + <assign-permission name="android.permission.REORDER_TASKS" uid="shell" /> + <assign-permission name="android.permission.SET_ANIMATION_SCALE" uid="shell" /> + <assign-permission name="android.permission.SET_PREFERRED_APPLICATIONS" uid="shell" /> + <assign-permission name="android.permission.WRITE_SETTINGS" uid="shell" /> + <assign-permission name="android.permission.BROADCAST_STICKY" uid="shell" /> + <!-- Development tool permissions granted to the shell. --> + <assign-permission name="android.permission.SET_DEBUG_APP" uid="shell" /> + <assign-permission name="android.permission.SET_PROCESS_LIMIT" uid="shell" /> + <assign-permission name="android.permission.SET_ALWAYS_FINISH" uid="shell" /> + <assign-permission name="android.permission.DUMP" uid="shell" /> + <assign-permission name="android.permission.SIGNAL_PERSISTENT_PROCESSES" uid="shell" /> + <!-- Internal permissions granted to the shell. --> + <assign-permission name="android.permission.FORCE_BACK" uid="shell" /> + <assign-permission name="android.permission.BATTERY_STATS" uid="shell" /> + <assign-permission name="android.permission.INTERNAL_SYSTEM_WINDOW" uid="shell" /> + <assign-permission name="android.permission.INJECT_EVENTS" uid="shell" /> + <assign-permission name="android.permission.SET_ACTIVITY_WATCHER" uid="shell" /> + <assign-permission name="android.permission.READ_INPUT_STATE" uid="shell" /> + <assign-permission name="android.permission.SET_ORIENTATION" uid="shell" /> + <assign-permission name="android.permission.INSTALL_PACKAGES" uid="shell" /> + <assign-permission name="android.permission.CLEAR_APP_USER_DATA" uid="shell" /> + <assign-permission name="android.permission.DELETE_CACHE_FILES" uid="shell" /> + <assign-permission name="android.permission.DELETE_PACKAGES" uid="shell" /> + <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="shell" /> + <assign-permission name="android.permission.READ_FRAME_BUFFER" uid="shell" /> + <assign-permission name="android.permission.DEVICE_POWER" uid="shell" /> + + <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" /> + <assign-permission name="android.permission.ACCESS_DRM" uid="media" /> + + <!-- This is a list of all the libraries available for application + code to link against. --> + + <library name="com.google.android.maps" + file="/system/framework/com.google.android.maps.jar" /> + <library name="com.google.android.gtalkservice" + file="/system/framework/com.google.android.gtalkservice.jar" /> + <library name="android.awt" + file="/system/framework/android.awt.jar" /> + <library name="android.test.runner" + file="/system/framework/android.test.runner.jar" /> + <library name="com.android.im.plugin" + file="/system/framework/com.android.im.plugin.jar"/> + +</permissions> |