summaryrefslogtreecommitdiffstats
path: root/data/etc
diff options
context:
space:
mode:
authorThe Android Open Source Project <initial-contribution@android.com>2009-03-03 19:31:44 -0800
committerThe Android Open Source Project <initial-contribution@android.com>2009-03-03 19:31:44 -0800
commit9066cfe9886ac131c34d59ed0e2d287b0e3c0087 (patch)
treed88beb88001f2482911e3d28e43833b50e4b4e97 /data/etc
parentd83a98f4ce9cfa908f5c54bbd70f03eec07e7553 (diff)
downloadframeworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.zip
frameworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.tar.gz
frameworks_base-9066cfe9886ac131c34d59ed0e2d287b0e3c0087.tar.bz2
auto import from //depot/cupcake/@135843
Diffstat (limited to 'data/etc')
-rw-r--r--data/etc/Android.mk34
-rw-r--r--data/etc/platform.xml128
2 files changed, 162 insertions, 0 deletions
diff --git a/data/etc/Android.mk b/data/etc/Android.mk
new file mode 100644
index 0000000..4b5464f
--- /dev/null
+++ b/data/etc/Android.mk
@@ -0,0 +1,34 @@
+#
+# Copyright (C) 2008 The Android Open Source Project
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+LOCAL_PATH := $(my-dir)
+
+########################
+include $(CLEAR_VARS)
+
+LOCAL_MODULE := platform.xml
+
+LOCAL_MODULE_TAGS := user development
+
+LOCAL_MODULE_CLASS := ETC
+
+# This will install the file in /system/etc/permissions
+#
+LOCAL_MODULE_PATH := $(TARGET_OUT_ETC)/permissions
+
+LOCAL_SRC_FILES := $(LOCAL_MODULE)
+
+include $(BUILD_PREBUILT)
diff --git a/data/etc/platform.xml b/data/etc/platform.xml
new file mode 100644
index 0000000..b13a292
--- /dev/null
+++ b/data/etc/platform.xml
@@ -0,0 +1,128 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!-- Copyright (C) 2008 The Android Open Source Project
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
+-->
+
+<!-- This file is used to define the mappings between lower-level system
+ user and group IDs and the higher-level permission names managed
+ by the platform.
+
+ Be VERY careful when editing this file! Mistakes made here can open
+ big security holes.
+-->
+<permissions>
+
+ <!-- ================================================================== -->
+ <!-- ================================================================== -->
+ <!-- ================================================================== -->
+
+ <!-- The following tags are associating low-level group IDs with
+ permission names. By specifying such a mapping, you are saying
+ that any application process granted the given permission will
+ also be running with the given group ID attached to its process,
+ so it can perform any filesystem (read, write, execute) operations
+ allowed for that group. -->
+
+ <permission name="android.permission.BLUETOOTH_ADMIN" >
+ <group gid="net_bt_admin" />
+ </permission>
+
+ <permission name="android.permission.BLUETOOTH" >
+ <group gid="net_bt" />
+ </permission>
+
+ <permission name="android.permission.INTERNET" >
+ <group gid="inet" />
+ </permission>
+
+ <permission name="android.permission.CAMERA" >
+ <group gid="camera" />
+ </permission>
+
+ <permission name="android.permission.READ_LOGS" >
+ <group gid="log" />
+ </permission>
+
+ <!-- The group that /cache belongs to, linked to the permission
+ set on the applications that can access /cache -->
+ <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" >
+ <group gid="cache" />
+ </permission>
+
+ <!-- RW permissions to any system resources owned by group 'diag'.
+ This is for carrier and manufacture diagnostics tools that must be
+ installable from the framework. Be careful. -->
+ <permission name="android.permission.DIAGNOSTIC" >
+ <group gid="input" />
+ <group gid="diag" />
+ </permission>
+
+ <!-- ================================================================== -->
+ <!-- ================================================================== -->
+ <!-- ================================================================== -->
+
+ <!-- The following tags are assigning high-level permissions to specific
+ user IDs. These are used to allow specific core system users to
+ perform the given operations with the higher-level framework. For
+ example, we give a wide variety of permissions to the shell user
+ since that is the user the adb shell runs under and developers and
+ others should have a fairly open environment in which to
+ interact with the system. -->
+
+ <!-- System tool permissions granted to the shell. -->
+ <assign-permission name="android.permission.GET_TASKS" uid="shell" />
+ <assign-permission name="android.permission.CHANGE_CONFIGURATION" uid="shell" />
+ <assign-permission name="android.permission.REORDER_TASKS" uid="shell" />
+ <assign-permission name="android.permission.SET_ANIMATION_SCALE" uid="shell" />
+ <assign-permission name="android.permission.SET_PREFERRED_APPLICATIONS" uid="shell" />
+ <assign-permission name="android.permission.WRITE_SETTINGS" uid="shell" />
+ <assign-permission name="android.permission.WRITE_SECURE_SETTINGS" uid="shell" />
+ <assign-permission name="android.permission.BROADCAST_STICKY" uid="shell" />
+ <!-- Development tool permissions granted to the shell. -->
+ <assign-permission name="android.permission.SET_DEBUG_APP" uid="shell" />
+ <assign-permission name="android.permission.SET_PROCESS_LIMIT" uid="shell" />
+ <assign-permission name="android.permission.SET_ALWAYS_FINISH" uid="shell" />
+ <assign-permission name="android.permission.DUMP" uid="shell" />
+ <assign-permission name="android.permission.SIGNAL_PERSISTENT_PROCESSES" uid="shell" />
+ <!-- Internal permissions granted to the shell. -->
+ <assign-permission name="android.permission.FORCE_BACK" uid="shell" />
+ <assign-permission name="android.permission.BATTERY_STATS" uid="shell" />
+ <assign-permission name="android.permission.INTERNAL_SYSTEM_WINDOW" uid="shell" />
+ <assign-permission name="android.permission.INJECT_EVENTS" uid="shell" />
+ <assign-permission name="android.permission.SET_ACTIVITY_WATCHER" uid="shell" />
+ <assign-permission name="android.permission.READ_INPUT_STATE" uid="shell" />
+ <assign-permission name="android.permission.SET_ORIENTATION" uid="shell" />
+ <assign-permission name="android.permission.INSTALL_PACKAGES" uid="shell" />
+ <assign-permission name="android.permission.CLEAR_APP_USER_DATA" uid="shell" />
+ <assign-permission name="android.permission.DELETE_CACHE_FILES" uid="shell" />
+ <assign-permission name="android.permission.DELETE_PACKAGES" uid="shell" />
+ <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="shell" />
+ <assign-permission name="android.permission.READ_FRAME_BUFFER" uid="shell" />
+ <assign-permission name="android.permission.DEVICE_POWER" uid="shell" />
+
+ <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" />
+ <assign-permission name="android.permission.ACCESS_DRM" uid="media" />
+ <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" />
+
+ <!-- This is a list of all the libraries available for application
+ code to link against. -->
+
+ <library name="android.awt"
+ file="/system/framework/android.awt.jar" />
+ <library name="android.test.runner"
+ file="/system/framework/android.test.runner.jar" />
+ <library name="com.android.im.plugin"
+ file="/system/framework/com.android.im.plugin.jar"/>
+
+</permissions>