If /system is empty, /tmp/addon.d/ will not exist, "*sh" won't be
expanded, md5sum will not generate any output and the variable $s
will be empty. Therefore grep, which will receive only one arg, will
start to read the standard input and never exit, causing the
installation to never end. Fix this checking whether we have files
to read or not.
Change-Id: I656eab42e54b3f81da8c5ac81374b9deddcf8484
Considering sensitive phone numbers to be, hotlines dealing with
violence against women.
In the EU, these numbers do not show up in the phone bill.
In order to avoid these phone numbers to be listed in the Call Log, we
have implemented a new XML file which is parsed with phone numbers
from different countries to be filtered. This file needs to be copied to
device via desired Android.mk file in order to be able to process it.
The comparison is made checking the network MCC the SIM is connected to
in order to consider roaming and multisim scenarios.
Test: CallLogManagerTest.testDontLogCallsToSensitivePhoneNumber PASS
Change-Id: I2e78d0f3e13d1ad1298613651ece136e30b86dfe
Signed-off-by: Olaia Segovia <olaia.segovia@bq.com>
Globally enable full alarm info in quick settings drawer.
Screenshots: https://goo.gl/photos/ycuvZZFD1ssyWu8B6
This detailed info is pretty useful why not enable it for all devices.
Change-Id: I46ccc3547922b6ab5fdcf8798bd5269b7465a92d
Signed-off-by: Sebastian Haderecker <sebastian.haderecker@gmail.com>
When a line from the XML file contains a character which grep classifies
as a binary one, it will omit this line at all. Moreover it will append
'Binary file matches' to the stdout. This behavior breaks some XML files.
To fix this issue, let's tell grep to process a binary file as if it were
text.
Change-Id: I6ec5689f73a0926870e502f3f8ee77346b47d05f
* Jelly is more lightweight and much easier to maintain. Gello can
live on if someone decides they want to compile it and host it
somewhere.
Change-Id: Ifbd611056892dc8627edcb1d2bf3eadb6ac25b15
* Aosp browser is really old and insecure, remove it
* Jelly is a simple webview-based browser, so it relies on installed webview,
which makes it secure as long as webview is updated
* Gello is still alive, it overrides Jelly instead of Browser target
Change-Id: Idd1dbe37879e1c1d466b93f5e754f1108f4dcfa6
Signed-off-by: Joey Rizzoli <joey@lineageos.org>
Run 'make addonsu' to make a flashable zip to install the addon and
'make addonsu-remove' for a flashable zip that removes it.
Change-Id: I5b2fe67f98f2474b923c074dc6025b47c6db2ae0
Commit 7fb9251dfc modified
the expansion in an illegal way.
Fix the broken env variable.
Change-Id: Ib3029fa995d6a4b0416887a2ef2e4792c9e6bb27
(cherry picked from commit 90b437e784c19fc428c24891cc96705b89b786df)
The easiest and best way to get openssl on darwin is using homebrew,
however homebrew refuses to link openssl (and for good reason) in
order to prevent conflicts with Apple's homegrown version. Include
the openssl headers and dylibs from the dir that homebrew installs
openssl to let 4.4 kernels compile.
Change-Id: I06b66768fbdd4855fd57b88100d646ed6e311a59
This change correctly handles devices with underscores in their
name even if there is a device with the same name after the last
underscore (spyder, umts_spyder) by not allowing any underscores
in the manufacturers name.
Without this change, spyder gets resolved to:
device/motorola_umts/spyder
device/motorola/spyder
Only the last one is valid.
With this change, both spyder and umts_spyder get resolved correctly.
Change-Id: I0c95ff126d827a2d6b58875dfcb9327e999f4913
* Specify the ota zip name as the only parameter to extract-files.sh
* Will extract to $CM_ROOT/system_dump
* Bail out on A/B OTA zips. We cannot support these.
* Handles block based OTA zips by using sdat2img.py
* Store the zip's MD5 and check if its already extracted. If so, don't
bother extracting again
Change-Id: I03038e38dac51e6cb60d493c7e6362754d1daf02
An user-installed app with the cmfm package name could take advantage of this
Change-Id: I707df3043b9cd73cefcdea4ad0a28632f78089be
Signed-off-by: Joey Rizzoli <joey@lineageos.org>
avc: denied { find } for service=profile pid=7970 uid=10086 scontext=u:r:untrusted_app:s0:c512,c768
tcontext=u:object_r:cm_profile_service:s0 tclass=service_manager permissive=1
java.lang.RuntimeException: Unable to start activity ComponentInfo{foo.bar/foo.bar.Activity}: java.lang.SecurityException:
You do not have permissions to change the Profile Manager.: Neither user 10086 nor current process has cyanogenmod.permission.MODIFY_PROFILES.
Ticket: BUGBASH-174
Change-Id: If8706177bf6eef8d5e4c73da4f00cc053987d1ed
Signed-off-by: Joey Rizzoli <joey@lineageos.org>