| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
|
| |
Add a remote call addBluetoothDevice() using AIDL.
This was needed because onBind() is only called once.
Bug: 23219556
Bug: 23760886
Change-Id: Id7554ca55d596352d11dbd6ae3e403138a29c864
Signed-off-by: Phil Burk <philburk@google.com>
(cherry picked from commit 7cd06c0b9e087a555d2c5dd4cab5b7eac8497526)
|
|\ |
|
| |
| |
| |
| |
| | |
Bug: 23256614
Change-Id: I6e5d636c24a84846cfad84da800911a469689dda
|
| |
| |
| |
| |
| |
| |
| |
| | |
SystemUI uses it to start authentication again after lockout reset
expired.
Bug: 22846755
Change-Id: I90a987c6aa4ac52cc7e7aff1bce262d1db3f12ee
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
Add a callback-based mechanism for GmsCore to connect to Hardware Activity
Recognition. This allows GmsCore to stop polling to identify if the Android
platform supports the functionality or not.
Bug: 17112184
Change-Id: I8f9459cbd15eecd70f6919c6551e6f7a663c732f
|
|/
|
|
|
|
| |
Bug: 22846469
Bug: 22115393
Change-Id: I6ef5322d02e540fc043e7f20d3aabf595ce7c224
|
|
|
|
| |
Change-Id: I1bb9c37cafdfc7c78c23099a0fde2914f3068485
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
- Add onFingerprintAcquired, so Keyguard can grab a wakelock to prevent
the device from sleeping.
- If we get a successful fingerprint, wake the device up, immediately
dismiss the keyguard and tell PWM that we kicked off our frame that
will represent the correct state.
- PWM then waits for this frame to be drawn, and then turns on the
screen, which results in unlocking directly to the previsouly
opened app.
Bug: 21855614
Change-Id: I5f43df17fa5e4e9c6a6392eef4a4590b07df4f96
|
|\ |
|
| |
| |
| |
| |
| |
| | |
Bug 22175560
Change-Id: Ie57e0b77cade4b994ca2ef80cbf1a4c615a943f8
|
|/
|
|
|
|
|
|
| |
This new class replaces the awkward string token and ConnectivityManager APIs
used by apps handling captive portals.
Bug:21343774
Change-Id: I1a2c69edb17322715bf8422bb4216b0ea60bfd59
|
|
|
|
|
|
|
|
|
|
|
|
| |
The default SMS, Phone, Browser are selected in the UI and we
grant default permissions to these. We do this regardless if
they are on the system image as the user has made an explicit
choice in the UI and the permission we grant are considered
essential for such type of a core app to operate properly.
bug:22104986
Change-Id: Ide8caeb524b43dde11a20460666cf34c4d35f84b
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Grant permissions in the PHONE and LOCATION buckets to default carrier
apps as defined by the telephony stack. Provide a system API to grant
default permissions for carrier apps, as the set of apps may change
when a new SIM is inserted.
Since the phone process is separate from the system process, we need
to allow for binder calls to these APIs.
Also fix a log tag that is too long (android.util.Log drops messages
silently if the tag is > 23 characters).
Bug: 21696731
Change-Id: I98ca0c49c69f621f835ba57c1fd0505f2cec0d0d
|
|
|
|
| |
Change-Id: I1ce450a59fb326c14848f46732d877dea33f33c7
|
|\
| |
| |
| |
| |
| | |
* changes:
API for get modem activity info
Activity info and stats from modem
|
| |
| |
| |
| | |
Change-Id: Ifa8e520673c7e5549b0066a16a744810f1f0730c
|
|\ \
| | |
| | |
| | | |
into mnc-dev
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Previously when a MidiManager client opened a virtual or Bluetooth device,
the client bound directly to the virtual device's MidiDeviceService
or BluetoothMidiDevice's IMidiDeviceServer for the given BluetoothDevice.
Only USB devices were opened in MidiService.
Now opening any type of MIDI device is done via IMidiManager.openDevice() or
IMidiManager.openBluetoothDevice(). MidiService tracks all connnections between
clients and devices.
Services that implement virtual devices must now require android.permission.BIND_MIDI_DEVICE_SERVICE
so only MidiService can bind to these services.
Bug: 21044677
Change-Id: I7172f7b1e0cbfe4a2a87dff376c32dc9b41aa563
|
|\ \ \
| |_|/
|/| | |
|
| |/
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
- User flow is now similar to requesting access to notification
content, namely prompting the user to visit a settings page
for enabling/disabling apps access.
- New ACTION_NOTIFICATION_POLICY_ACCESS_GRANTED_CHANGED intent
for apps to listen to this state change.
- Removed obsolete request method and associated internal callback
aidl.
- Added new android.permission.ACCESS_NOTIFICATION_POLICY permission
for apps to include as a signal that they want to request this access
(and therefore appear in the list on the settings page).
- Improve javadocs, outline the user flow in NotificationManager#isNotificationPolicyAccessGranted
and link to this method elsewhere.
- NoManService now persists the user-enabled package list across reboots
and does so per-user.
- Rename public settings intent to correspond with the noman api.
Bug: 21621663
Change-Id: I72cbc21cd736e6a157b6be5d1d0ba0b4a8e7ef4e
|
|/
|
|
|
|
|
|
|
|
|
|
|
| |
Start moving Assist* stuff to android.app.assist.
Clean up some more of the VoiceInteractionSession APIs.
Clearly document that finish() is not the same as hide(),
always call hide() instead, and fix the finish() path to
also always do a hide to make sure everything is cleaned
up correctly.
Change-Id: I962d4069fcb34fe89547a95d395ae1b9fa3b4148
|
|\ |
|
| |
| |
| |
| |
| |
| | |
b/21308727
Change-Id: I6515888c7804349ecd07c4dd74575ef89a4bea59
|
|\ \
| |/
|/|
| |
| |
| |
| | |
browser
* commit '29649e27a3c73d4470dc41e4c9614da55fac1c54':
Add 'System' group to DAC sample browser
|
| |\
| | |
| | |
| | |
| | | |
* commit '4cbe359abe26d749b1dbc9cf489a825af0cad005':
Add 'System' group to DAC sample browser
|
| | |
| | |
| | |
| | |
| | | |
Bug: 19708211
Change-Id: I55ad484647b859fce6c59f0e147523a8a709a527
|
|\ \ \
| |/ /
| | |
| | |
| | | |
* commit '0140854a636ed7def204d769dbc4eb7857d009be':
Doc change: updated images, landings, and ndk updates.
|
| |/
| |
| |
| | |
Change-Id: If128f8394438471365db6f7c0a42e6b38d25d250
|
|\ \
| | |
| | |
| | | |
into mnc-dev
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This adds a new service, fingerprintd, that manages fingerprint
hardware from a separate process. It provides a binder interface that
FingerprintManager uses to talk to the fingerprint HAL.
Change-Id: I84d8e407c1f1a7d1a396e246c382459ad38810ae
|
|\ \ \
| |/ /
|/| | |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
- Adds an AIDL interface to allow the proxy camera service
running in system server to accept RPCs from the camera
service running in mediaserver.
- Request an update to the valid user set from the proxy
camera service when mediaserver restarts to initialize
properly + avoid DOS after a crash.
Bug: 21267484
Change-Id: Ib821582794ddd1e3574b5dc6c79f7cb197b57f10
|
|/ /
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
To follow the correct semantics for when restricts due to
device idle can be applied, power manager need to know about
uid process states like net policy so that it can allow
wake locks from apps that are in the foreground.
Since this is being added to a second place, I reworked things
so that the activity manager now keeps track of per-uid process
states and allows apps to register to listen to those, rather
than having to track lower-level process states and transform
them into an overall uid state. Both net policy and power
manager use this new facility.
Change-Id: I77359164c40d0f36fe1ef296dd9f9c3062431148
|
|\ \ |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
This old interface has been replaced with a new interface for Trusted
Face in MNC.
Bug: 16139545
Change-Id: I195d9f3e1b183ad39fbee64bdef9a8dbf1d68df3
|
|\ \ \ |
|
| |/ /
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Knowledge of the various modes of a display is now available to apps, and they can request a specific mode for their windows.
b/18241736
Change-Id: I8eb16ff713e878512faca3ca6662254f08a9be7f
(cherry picked from commit 5c7773d86484aac5737667c604bd8fe8150c2136)
|
|/ /
| |
| |
| |
| |
| |
| |
| | |
Make SystemUpdatePolicy Parcelable; hide public constructor and
expose static builder methods.
Bug: 20820025
Change-Id: I594ba3c7e5514551134ba6c866b24498b66506bf
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
This CL has broken all builds on mnc-dev.
Reverting until Jeff can take a look at it.
This reverts commit 2e5a2051de54e64612e1357d4534c7ec851aa508.
Change-Id: Ib9b3569bfebdc7bbfbcb7aee82733b93736c5bb5
|
| |
| |
| |
| |
| | |
Bug: 20641986
Change-Id: I310fadafb5a6b8190a32e5d87f3e1823c87bcef7
|
| |
| |
| |
| |
| |
| |
| | |
This reverts commit 1a937b04e63539cb1fab1bde601031d415c7156f.
Bug: 20641986
Change-Id: I035d945d1561e5fc7c914aa9362635f763c83cfd
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The whitelist is now maintained by DeviceIdleController,
which is moving out into its own independent system service.
Network stats now queries it for the whitelist, instead of
collecting that itself.
Also did a few improvements in alarm manager -- made the
code for moving alarms out of the pending list more robust,
and fixed the debug output to always print the contents of
the pending list even if we aren't in a pending state. (That
would have helped me identify the problem much earlier.)
Change-Id: I0f7119d4c553c3af4d77b2f71246fa6e2c13c561
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
UICC privileged carrier apps will extend CarrierConfigService to provide
carrier-specific configuration. Apps/services will use
CarrierConfigManager to read the current configuration.
CarrierConfigManager also defines the set of configuration variables and
their default values.
Bug: b/19483786
Change-Id: I027211b43276afd6fe893ae50048c52f2aed5cf5
|
| |
| |
| |
| | |
Change-Id: I6c634aa38d31a7b5a98c9089840557257fd58209
|
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| | |
- Allow apps to read and modify notification policy (currently
which items are prioritized in "priority only" mode), but only
after they've been granted access by noman.
- Access to read/modify notification policy requires a token provided
by noman. Enabled notification listeners are automatically given
tokens (new getter on NLS), but any other app can also request them.
- Currently, all requests are granted.
- Also add a new change intent when the public policy changes.
Bug: 18541928
Change-Id: I482d1c39852d0d961931515e0f0e059a8faee4ed
|
|\ \
| | |
| | |
| | |
| | |
| | | |
* changes:
Add challenge to IGateKeeperService
Wire up GateKeeper to LockSettingsService
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Adds:
- Communication to GKService
- password upgrade flow
- enroll takes previous credential
Change-Id: I0161b64642be3d0e34ff4a9e6e3ca8569f2d7c0a
|
|\ \ \
| |/ /
|/| /
| |/
| |
| |
| | |
d60649c5: Merge "initial batch of NDK files for skeleton site build" into lmp-docs
* commit 'f46c8f5bfcb30d7f9d8b91e6f193d7ab574e05e9':
initial batch of NDK files for skeleton site build
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
NDK files for skeleton site build" into lmp-docs
* commit '2b92e18b4bf70c88662dfa1137c4901daae4d4d5':
initial batch of NDK files for skeleton site build
|
| | |
| | |
| | |
| | | |
Change-Id: I00152e817377c072f529940743499a3b6d91f80d
|