Commit graph

65 commits

Author SHA1 Message Date
Gegham Zakaryan
4fe28bcfb9 config: Add globalactions service permissions
The service won't start without this.

Signed-off-by: Gegham Zakaryan <zakaryan.2004@outlook.com>
Change-Id: I377a45aceb76d0a94504ef799f9c33782185ca1f
2021-05-23 15:17:35 +02:00
Han Wang
0b4e410703 config: Remove weather related targets
Change-Id: Ie4af798cb6d36229d1e47a435c8d848d3f5fc422
2020-11-01 12:36:41 +01:00
Michael Bestas
b901116d5e Remove deprecated backup overlay
* This lives in a different package now and it is
  included in framework-sysconfig.xml

Change-Id: I0ec218b2cb91476efe62ad4a9578ac850b5f22ef
2020-07-12 19:50:10 +03:00
Michael Bestas
b838db5dec config: Move permission xml to apps
Move required permissions to the respective apps.
This allows people to use a lot of our apps outside lineage
without extra changes.

Change-Id: I840a9edeae38e94ff6592c4817fcea6f5e4a7e8f
2020-05-10 23:49:59 +02:00
Michael Bestas
2d5bb63ff4 config: Remove unused Recorder privapp permissions
Change-Id: I560fe385f1fb93c4f1f3a4d44f970e8770c2b1c5
2020-05-10 23:40:04 +02:00
Michael Bestas
561146fdfe Revert "Add rules for non platform apps that use hidden APIs"
* No longer needed

This reverts commit dab1569b81.

Change-Id: Iea17996d735e49181a2537ae0cbc4f8e5af457f9
2020-05-10 23:40:04 +02:00
Pranav Vashi
c8bd3fe4de privapp-permissions: Update PREVENT_POWER_KEY permission for Camera
* Required after: https://review.lineageos.org/q/topic:%22power_key_prevent_cts%22+(status:open%20OR%20status:merged)

Signed-off-by: Pranav Vashi <neobuddy89@gmail.com>
Change-Id: I6797fd38ac3da9fa70fc42cef1cf626aa48030a8
2020-04-28 04:36:09 +05:30
LuK1337
4827e3ba36 default-permissions: Don't grant custom permission by default
* We can survive without granting this permission
  out of box, also fixes Exchange-less boot up
  exception.

D AndroidRuntime: Shutting down VM
E AndroidRuntime: *** FATAL EXCEPTION IN SYSTEM PROCESS: main
E AndroidRuntime: java.lang.IllegalArgumentException: Unknown permission: com.android.email.permission.READ_ATTACHMENT
E AndroidRuntime: 	at com.android.server.pm.permission.PermissionManagerService.grantRuntimePermission(PermissionManagerService.java:2103)
E AndroidRuntime: 	at com.android.server.pm.permission.PermissionManagerService.access$900(PermissionManagerService.java:121)
E AndroidRuntime: 	at com.android.server.pm.permission.PermissionManagerService$PermissionManagerServiceInternalImpl.grantRuntimePermission(PermissionManagerService.java:3032)
E AndroidRuntime: 	at com.android.server.pm.PackageManagerService.grantRuntimePermission(PackageManagerService.java:5800)
E AndroidRuntime: 	at android.app.ApplicationPackageManager.grantRuntimePermission(ApplicationPackageManager.java:684)
E AndroidRuntime: 	at com.android.server.pm.permission.DefaultPermissionGrantPolicy.grantRuntimePermissions(DefaultPermissionGrantPolicy.java:1217)
E AndroidRuntime: 	at com.android.server.pm.permission.DefaultPermissionGrantPolicy.grantDefaultPermissionExceptions(DefaultPermissionGrantPolicy.java:1381)
E AndroidRuntime: 	at com.android.server.pm.permission.DefaultPermissionGrantPolicy.grantDefaultPermissions(DefaultPermissionGrantPolicy.java:297)
E AndroidRuntime: 	at com.android.server.pm.PackageManagerService.systemReady(PackageManagerService.java:21731)
E AndroidRuntime: 	at com.android.server.SystemServer.startOtherServices(SystemServer.java:2037)
E AndroidRuntime: 	at com.android.server.SystemServer.run(SystemServer.java:529)
E AndroidRuntime: 	at com.android.server.SystemServer.main(SystemServer.java:356)
E AndroidRuntime: 	at java.lang.reflect.Method.invoke(Native Method)
E AndroidRuntime: 	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:491)
E AndroidRuntime: 	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:908)

Change-Id: If2caad2b004820b10b7095a4bb4307d0f065c723
2020-02-02 23:31:04 +01:00
Arne Coucheron
95b8fa97ba default-permissions: Grant default permissions to com.android.exchange
Change-Id: I9dfcecde0e662b9e481696b661e16ac7e131a75c
2020-01-27 19:49:27 +01:00
Bruno Martins
315e2450f3 Revert "vendor: add style api"
Styles API was nuked from the SDK.

This reverts commit 6cf7640e96.

Change-Id: I99405c493b57045c5c7c6331ab64fad49d160840
2019-11-22 17:18:47 +01:00
Bruno Martins
ff7657bc0b Revert "privapp-permissions: Whitelist CHANGE_OVERLAY_PACKAGES permission"
Permission no longer required because Styles handling was
removed from LineageParts. ThemePicker is our best friend now.

This reverts commit a7b0cf7ec3.

Change-Id: I003cd2281de9f7edbd81a15e0c1b1258e537ccb3
2019-11-22 17:18:47 +01:00
LuK1337
cca50fea7a privapp-permissions: Grant START_ACTIVITIES_FROM_BACKGROUND perm to Snap
Change-Id: I3e36efbbd0c3c049cb18abe6e931372ade6e7f53
2019-11-12 11:07:25 +01:00
Arne Coucheron
70143a64fc vendor: Add messaging app to power whitelist
* The messaging app is notorious for late notifications
  of messages. Whitelist it so it can be active during doze.

Change-Id: I932c89b27d76c114be67eaed62a3c021c219ca3a
2019-10-30 20:41:59 +01:00
LuK1337
4f0ad57275 common: Bring back Android Beam
* While this feature is deprecated all code
  for it is still alive ^.^

Change-Id: I36fac374e43ceddab1438255654bb541937041ff
2019-10-29 19:18:23 +01:00
Michael Bestas
57dcffc43f privapp-permissions: Allow Gallery2 to use android.permission.MODIFY_AUDIO_ROUTING
Change-Id: I8c838e63473c908eacd649e5249f346a1c37d4ba
2019-10-23 01:34:01 +02:00
Han Wang
ed76afdfd3 config: Restore org.lineageos.hardware.xml
* Though there is no LineageHW anymore, don't forget
   LineageHardwareService in our sdk depends on it to start.

Change-Id: I8befe1a75b66f54d9ffd7b88871c187a21b08497
2019-09-21 17:31:43 +02:00
Luca Stefani
f012c7e744 Remove duplicated priv-app permission
* In Q SystemUI is already whitelisted for this

Change-Id: I2c5b65dc0decfcdc22bebd14cd23c9e730994c34
2019-09-19 21:39:16 +02:00
Han Wang
89521b1d7a config: Split priv-app permission whitelist
* As there are some apps in /product now, do the following
   whitelist changes.

Change-Id: I4314c5dc8266ea7bb805399a92ab05f2ef49b920
2019-09-17 21:31:29 +03:00
LuK1337
276e7770bf vendor: Add vendor.lineage.biometrics.fingerprint.inscreen permission
Change-Id: I149508317c4f0312e88faf5324275867e79e35e9
2019-08-24 10:25:55 +02:00
LuK1337
a5e776e514 privapp-permissions: Allow Trebuchet to use android.permission.STATUS_BAR
* cough * someone forgot to update permissions whitelist again.

Change-Id: Iedcdb0568ea1b9924144841a8d20ca6f05bbe29b
2019-07-25 15:31:29 +02:00
LuK1337
40ab94de5f privapp-permissions: Regenerate permissions list
* Regenerated using development/tools/privapp_permissions/privapp_permissions.py

Change-Id: I9f49e92dbf92dc545dee782124d45db1e70df471
2019-06-25 23:54:57 +02:00
Michael Bestas
fcc1e1967a Whitelist permissions for AOSP FM radio app
* Sort the file while we are at it.

Change-Id: I8dec9ece1c1523dcb77421b6912bbef91efb1485
2019-06-25 21:41:08 +02:00
blunden
f972f5ea63 Whitelist permissions under legacy package names
The lack of these whitelisted permissions causes a bootloop
when upgrading from earlier OS versions on devices that enforce
the whitelist.

Change-Id: I76b8fad5f0c49a7d008d19e7a116b5f19c75f739
2019-05-19 02:32:48 +02:00
razorloves
c832b57f5f privapp-permissions: Remove org.lineageos.trebuchet permissions
Trebuchet package name is now 'com.android.launcher3'.

Change-Id: I8a3f7b3f375069cc7a8d61a98dd51940fce84c0c
2019-01-29 13:19:05 -06:00
razorloves
54c01074ea privapp-permissions: Add new launcher3 permissions
Ref: cf019f2a73

Change-Id: If582910de52920a136dce2e2765825fda9e68a02
2019-01-29 06:39:55 -06:00
Han Wang
bf74b7f3d7 config: Add Deskclock to power whitelist
* Seems sometimes alarm cannot ring because of doze.

Change-Id: I3a35d2f02de365ea1d3a99ea75e0db9905d482a3
2019-01-11 08:35:05 +01:00
Bruno Martins
a7b0cf7ec3 privapp-permissions: Whitelist CHANGE_OVERLAY_PACKAGES permission
* LineageParts now uses AOSP permission CHANGE_OVERLAY_PACKAGES for styles

Change-Id: Iedf4c5165f2512879bcea7d5d28abe2ff20ca0a5
2018-11-14 12:17:29 +01:00
Luca Stefani
dab1569b81 Add rules for non platform apps that use hidden APIs
Change-Id: I483f00cc0735f47665c5cb61ed0a187fb4e7d655
2018-08-30 20:51:09 +02:00
LuK1337
040b292b8d privapp-permissions: Add FlipFlap permissions
Change-Id: I6be90c2558c439d3994f6438690d7b3d84069ef6
2018-08-28 02:14:34 +02:00
chrmhoffmann
1813f415ab lineage: Allow background broadcast for CAMERA_BUTTON
This enables launch of camera app (snap) when pressing the camera button.

Change-Id: I76fd622031f628b20212e8c7a6239b49fd121a2e
2018-08-05 14:38:33 +02:00
LuK1337
03a83c3b9a vendor: Copy org.lineageos.settings permission
Change-Id: Ia662f7789f77bb9b1abe1198db97a5b1767cd3e6
2018-07-31 21:49:17 +02:00
Bruno Martins
cac57c8547 privapp-permissions: Add new Dialer permissions
* Required for call recording

Change-Id: Ie35e872b54feb1d4dca7cee144a1e3ace16439e2
2018-07-18 15:25:06 +01:00
Joey
579241a761 vendor: introduce Trust interface
Change-Id: I1af2e4caab08b6b77db56e1be62247e55cd5a270
Signed-off-by: Joey <joey@lineageos.org>
2018-06-03 21:59:17 +02:00
Giuseppe Barillari
d96e292164 lineage: Camera2 priv-app permissions whitelist
Change-Id: I5247f0640a2b842a9930f0f7a1d1a794751f100f
Signed-off-by: Giuseppe Barillari <joe2k01dev@gmail.com>
2018-04-05 05:12:11 +00:00
Abhisek Devkota
63fb87ba47 vendor: More priv-app whitelist updates
Output of https://source.android.com/devices/tech/config/perms-whitelist

Change-Id: I68ec610cf99399016fe1482730791c9b5e8ae1f5
2018-04-05 05:12:00 +00:00
razorloves
e02d5d5fcc lineage: update our priv-app permissions whitelist
Add android.permission.MODIFY_DAY_NIGHT_MODE for com.android.systemui.
Introduced in styles api change.

Change-Id: Ic864da8eb01faa270bae22cabaddcb9458c8a6c6
2018-03-20 00:07:57 +00:00
Joey
6cf7640e96 vendor: add style api
Change-Id: I52455cbf827aa5708e1eee6c8469d267979eddc8
Signed-off-by: Joey <joey@lineageos.org>
2018-03-05 13:33:32 +00:00
Abhisek Devkota
735c79cb4d Update our privapp whitelist
Change-Id: I40f0ee9b304d22437c0f3a95df34c7ce8313b41d
2018-02-12 06:49:38 +00:00
Michael Bestas
e6ed50881e lineage: Remove lineage telephony service permission
* Used for old MSIM API which is non-functional since a while

Change-Id: Ica2b9ae119d5972e425082433df3a7b099ae404a
2018-01-24 02:48:28 +02:00
Michael Bestas
4b8df75d5e lineage: Remove lineage status bar service permission
* Used for CM tiles API which is long dead

Change-Id: I4e105190ff32e887a33ad8562dba78cee1fb4dea
2018-01-24 02:48:24 +02:00
Ethan Chen
c3532d9bfb lineage: Add privapp permissions for Lineage applications
Change-Id: I9901e1c6314d0531c1762fc7eba7597f342ef177
2017-11-19 05:03:46 +00:00
Bruno Martins
a1b47e3d10 Whitelist some of our own broadcast actions
* Starting with Oreo, all the apps that target O+ are always subject to
   background restrictions (android/platform_frameworks_base@42a386b771).

   The manifest-registered receivers of apps with a targetSdkVersion
   higher than 25 won't receive the broadcast. Instead, a message similar
   to the following will appear in LogCat:

       10-07 14:13:49.594   719   736 W BroadcastQueue: Background execution not allowed: receiving Intent { act=lineageos.intent.action.LID_STATE_CHANGED flg=0x20000010 (has extras) } to org.lineageos.flipflap/.EventReceiver

 * Exempt some of our broadcast actions so that we can keep targetting
   the latest SDK.

Change-Id: I075608e18994f64db5e89658757dca307f07c417
2017-10-16 18:47:13 +00:00
Sam Mortimer
19ce2d3ad2 vendor/lineage: sdk rebrand: step 2: update file contents
Change-Id: Ib61b9b559c4b0e536979e5cb25fba50aa56c138d
2017-10-12 22:33:59 +00:00
Sam Mortimer
f13a6df311 vendor/lineage: sdk rebrand: step 1: update paths
Change-Id: If51b9122d7d7d0ee25fd77278a808442d461b8a0
2017-10-12 22:33:45 +00:00
Michael Bestas
9c720fd55d
lineage: Remove partner interface
Change-Id: I22ad161f4587703b7f3c2919890a19e69c1a8e0f
2017-09-02 19:39:38 +03:00
Michael Bestas
5eeceeb6a3
lineage: Remove app suggest feature
Change-Id: I3322de2eb8b49fd7b32d03a2c2c0421692c4ff40
2017-09-02 19:38:56 +03:00
Michael Bestas
d0cc480de5
lineage: Remove LiveLockScreenService
Change-Id: I8148e8a6c49f940c23b89e4f5fe697808dd08e93
2017-09-02 19:38:09 +03:00
Michael Bestas
366426fb12
lineage: Remove theme engine leftovers
Change-Id: Ife3fa6d6bfb5994fa120a959e6c5ba1faf6b2416
2017-09-02 19:37:09 +03:00
Zhao Wei Liew
8dcba6834b cm: config: Remove enhanced NFC feature
This was used for the HCE implementation by SimplyTapp in CM 9 - 10.2.
Since then, Android has an HCE implementation and this is no longer used.

Change-Id: Icd9db39829c1863c4962aab53959ad527da28bcd
2016-11-26 01:25:42 -08:00
Abhisek Devkota
f1c5ab81b7 Adapt to 6.0.1_r52 backup whitelist
As of f/b 9b8c6d2df35455ce9e67907edded1e4a2ecb9e28
 we need to whitelist who can be backup services.

Change-Id: I52a004924e6d2651c5ecdec51a8c5a80bdd54a38
2016-07-07 14:52:37 -07:00