summaryrefslogtreecommitdiffstats
path: root/src/com/android/settings/SecuritySettings.java
diff options
context:
space:
mode:
authorAdnan Begovic <adnan@cyngn.com>2016-03-01 12:21:41 -0800
committerAdnan Begovic <adnan@cyngn.com>2016-03-01 14:16:37 -0800
commitab4baeed963cdf31d8d19a877b3953fe39919840 (patch)
tree3cccb2b8437379b72737e91aa84c12474dd43ee2 /src/com/android/settings/SecuritySettings.java
parent23c16975be936c466a9e9b5c86c75049c2023ee2 (diff)
downloadpackages_apps_Settings-ab4baeed963cdf31d8d19a877b3953fe39919840.zip
packages_apps_Settings-ab4baeed963cdf31d8d19a877b3953fe39919840.tar.gz
packages_apps_Settings-ab4baeed963cdf31d8d19a877b3953fe39919840.tar.bz2
Settings: Fix SecuritySettings filtering.
Recent changes to SecuritySettings to appease CTSVerifier expectations broke filtration for the lockscreen intent (would always default as external type). This patch also addresses the "Installed Blocked" settings intent filter not including the unknown sources checkbox. Change-Id: If6ef7a3913ad90f4d018b26f6c3166fe47d2865a TICKET: CYNGNOS-2171
Diffstat (limited to 'src/com/android/settings/SecuritySettings.java')
-rw-r--r--src/com/android/settings/SecuritySettings.java19
1 files changed, 13 insertions, 6 deletions
diff --git a/src/com/android/settings/SecuritySettings.java b/src/com/android/settings/SecuritySettings.java
index 1969dcb..c7096b3 100644
--- a/src/com/android/settings/SecuritySettings.java
+++ b/src/com/android/settings/SecuritySettings.java
@@ -194,7 +194,8 @@ public class SecuritySettings extends SettingsPreferenceFragment
Bundle extras = getActivity().getIntent().getExtras();
// Even uglier hack to make cts verifier expectations make sense.
- if (extras.get(SettingsActivity.EXTRA_SHOW_FRAGMENT_ARGUMENTS) != null) {
+ if (extras.get(SettingsActivity.EXTRA_SHOW_FRAGMENT_ARGUMENTS) != null &&
+ extras.get(SettingsActivity.EXTRA_SHOW_FRAGMENT_AS_SHORTCUT) == null) {
mFilterType = TYPE_EXTERNAL_RESOLUTION;
}
@@ -270,7 +271,12 @@ public class SecuritySettings extends SettingsPreferenceFragment
root.addPreference(mLockscreenDisabledPreference);
}
- if (mFilterType == TYPE_LOCKSCREEN_EXTRA || mFilterType == TYPE_EXTERNAL_RESOLUTION) {
+ final boolean securityOrExternal = mFilterType == TYPE_SECURITY_EXTRA
+ || mFilterType == TYPE_EXTERNAL_RESOLUTION;
+ final boolean lockscreenOrExternal = mFilterType == TYPE_SECURITY_EXTRA
+ || mFilterType == TYPE_EXTERNAL_RESOLUTION;
+
+ if (lockscreenOrExternal) {
// Add options for lock/unlock screen
final int resid = getResIdForLockUnlockScreen(getActivity(), mLockPatternUtils);
addPreferencesFromResource(resid);
@@ -287,8 +293,7 @@ public class SecuritySettings extends SettingsPreferenceFragment
}
}
- if (mIsPrimary && mFilterType == TYPE_SECURITY_EXTRA
- || mFilterType == TYPE_EXTERNAL_RESOLUTION) {
+ if (mIsPrimary && securityOrExternal) {
if (LockPatternUtils.isDeviceEncryptionEnabled()) {
// The device is currently encrypted.
addPreferencesFromResource(R.xml.security_settings_encrypted);
@@ -298,7 +303,7 @@ public class SecuritySettings extends SettingsPreferenceFragment
}
}
- if (mFilterType == TYPE_LOCKSCREEN_EXTRA || mFilterType == TYPE_EXTERNAL_RESOLUTION) {
+ if (lockscreenOrExternal) {
// Fingerprint and trust agents
PreferenceGroup securityCategory = (PreferenceGroup)
root.findPreference(KEY_SECURITY_CATEGORY);
@@ -350,7 +355,9 @@ public class SecuritySettings extends SettingsPreferenceFragment
liveLockPreference.setSummary(R.string.live_lock_screen_summary);
generalCategory.addPreference(liveLockPreference);
}
- } else {
+ }
+
+ if (securityOrExternal) {
// Append the rest of the settings
addPreferencesFromResource(R.xml.security_settings_misc);