Snap for 12991197 from 3d0d0f9d66 to 25Q2-release
Change-Id: Ifc3a44c01d2dcc45bc5e8662685ada1248254f38
This commit is contained in:
@@ -6,7 +6,10 @@
|
|||||||
-keepattributes Exceptions
|
-keepattributes Exceptions
|
||||||
|
|
||||||
# Keep all Fragments in this package, which are used by reflection.
|
# Keep all Fragments in this package, which are used by reflection.
|
||||||
-keep public class com.android.settings*.** extends androidx.fragment.app.Fragment
|
# TODO(b/373579455): Evaluate if <init> needs to be kept.
|
||||||
|
-keep public class com.android.settings*.** extends androidx.fragment.app.Fragment {
|
||||||
|
void <init>();
|
||||||
|
}
|
||||||
|
|
||||||
# Keep all preference controllers needed by slice and DashboardFragment.
|
# Keep all preference controllers needed by slice and DashboardFragment.
|
||||||
-keep class * extends com.android.settings.core.BasePreferenceController {
|
-keep class * extends com.android.settings.core.BasePreferenceController {
|
||||||
@@ -49,7 +52,10 @@
|
|||||||
public static ** SEARCH_INDEX_DATA_PROVIDER;
|
public static ** SEARCH_INDEX_DATA_PROVIDER;
|
||||||
public static ** SUMMARY_PROVIDER_FACTORY;
|
public static ** SUMMARY_PROVIDER_FACTORY;
|
||||||
}
|
}
|
||||||
-keep class androidx.core.app.CoreComponentFactory
|
# TODO(b/373579455): Evaluate if <init> needs to be kept.
|
||||||
|
-keep class androidx.core.app.CoreComponentFactory {
|
||||||
|
void <init>();
|
||||||
|
}
|
||||||
|
|
||||||
# Keep classes that implements CustomSliceable, which are used by reflection.
|
# Keep classes that implements CustomSliceable, which are used by reflection.
|
||||||
-keepclasseswithmembers class * implements com.android.settings.slices.CustomSliceable {
|
-keepclasseswithmembers class * implements com.android.settings.slices.CustomSliceable {
|
||||||
|
|||||||
@@ -12027,6 +12027,9 @@
|
|||||||
<!-- Help URI, action disabled by restricted settings [DO NOT TRANSLATE] -->
|
<!-- Help URI, action disabled by restricted settings [DO NOT TRANSLATE] -->
|
||||||
<string name="help_url_action_disabled_by_restricted_settings" translatable="false"></string>
|
<string name="help_url_action_disabled_by_restricted_settings" translatable="false"></string>
|
||||||
|
|
||||||
|
<!-- Help URI, action disabled by advanced protection [DO NOT TRANSLATE] -->
|
||||||
|
<string name="help_url_action_disabled_by_advanced_protection" translatable="false"></string>
|
||||||
|
|
||||||
<!-- Title label for dnd suggestion, which is displayed in Settings homepage [CHAR LIMIT=100] -->
|
<!-- Title label for dnd suggestion, which is displayed in Settings homepage [CHAR LIMIT=100] -->
|
||||||
<string name="zen_suggestion_title">Update Do Not Disturb</string>
|
<string name="zen_suggestion_title">Update Do Not Disturb</string>
|
||||||
|
|
||||||
|
|||||||
@@ -246,6 +246,8 @@ public class FaceSettings extends DashboardFragment {
|
|||||||
final PreferenceCategory category =
|
final PreferenceCategory category =
|
||||||
findPreference(PREF_KEY_USE_FACE_TO_CATEGORY);
|
findPreference(PREF_KEY_USE_FACE_TO_CATEGORY);
|
||||||
category.setVisible(true);
|
category.setVisible(true);
|
||||||
|
use(FaceSettingsKeyguardUnlockPreferenceController.class).setUserId(mUserId);
|
||||||
|
use(FaceSettingsAppsPreferenceController.class).setUserId(mUserId);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -72,7 +72,6 @@ public class CellularSecurityPreferenceController extends BasePreferenceControll
|
|||||||
@Override
|
@Override
|
||||||
public int getAvailabilityStatus() {
|
public int getAvailabilityStatus() {
|
||||||
if (!mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_TELEPHONY)
|
if (!mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_TELEPHONY)
|
||||||
|| !Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
|
||||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
||||||
|| !Flags.enableModemCipherTransparency()) {
|
|| !Flags.enableModemCipherTransparency()) {
|
||||||
return UNSUPPORTED_ON_DEVICE;
|
return UNSUPPORTED_ON_DEVICE;
|
||||||
|
|||||||
@@ -60,8 +60,7 @@ public class CellularSecurityNotificationsDividerController extends
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public int getAvailabilityStatus() {
|
public int getAvailabilityStatus() {
|
||||||
if (!Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
if (!Flags.enableModemCipherTransparencyUnsolEvents()
|
||||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
|
||||||
|| !Flags.enableModemCipherTransparency()) {
|
|| !Flags.enableModemCipherTransparency()) {
|
||||||
return UNSUPPORTED_ON_DEVICE;
|
return UNSUPPORTED_ON_DEVICE;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -178,8 +178,7 @@ public class CellularSecurityNotificationsPreferenceController extends
|
|||||||
}
|
}
|
||||||
|
|
||||||
private boolean areFlagsEnabled() {
|
private boolean areFlagsEnabled() {
|
||||||
if (!Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
if (!Flags.enableModemCipherTransparencyUnsolEvents()
|
||||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
|
||||||
|| !Flags.enableModemCipherTransparency()) {
|
|| !Flags.enableModemCipherTransparency()) {
|
||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -95,7 +95,13 @@ public class SatelliteSettingPreferenceController extends
|
|||||||
return UNSUPPORTED_ON_DEVICE;
|
return UNSUPPORTED_ON_DEVICE;
|
||||||
}
|
}
|
||||||
|
|
||||||
return mIsCarrierSatelliteAttachSupported ? AVAILABLE : CONDITIONALLY_UNAVAILABLE;
|
int availabilityStatus = mIsCarrierSatelliteAttachSupported
|
||||||
|
? AVAILABLE : CONDITIONALLY_UNAVAILABLE;
|
||||||
|
if (availabilityStatus == AVAILABLE && mIsCarrierRoamingNtnConnectedTypeManual
|
||||||
|
&& !mIsSatelliteSmsAvailableForManualType) {
|
||||||
|
availabilityStatus = CONDITIONALLY_UNAVAILABLE;
|
||||||
|
}
|
||||||
|
return availabilityStatus;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
|
|||||||
@@ -123,7 +123,7 @@ public class NotificationAccessConfirmationActivity extends Activity
|
|||||||
NLSIntent, /* flags */ 0, mUserId);
|
NLSIntent, /* flags */ 0, mUserId);
|
||||||
boolean hasNLSIntentFilter = false;
|
boolean hasNLSIntentFilter = false;
|
||||||
for (ResolveInfo service : matchedServiceList) {
|
for (ResolveInfo service : matchedServiceList) {
|
||||||
if (service.serviceInfo.packageName.equals(mComponentName.getPackageName())) {
|
if (service.serviceInfo.getComponentName().equals(mComponentName)) {
|
||||||
if (!requiredPermission.equals(service.serviceInfo.permission)) {
|
if (!requiredPermission.equals(service.serviceInfo.permission)) {
|
||||||
Slog.e(LOG_TAG, "Service " + mComponentName + " lacks permission "
|
Slog.e(LOG_TAG, "Service " + mComponentName + " lacks permission "
|
||||||
+ requiredPermission);
|
+ requiredPermission);
|
||||||
|
|||||||
@@ -134,28 +134,11 @@ public final class CellularSecurityPreferenceControllerTest {
|
|||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
|
||||||
// Both flags disabled
|
|
||||||
enableFlags(false);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
|
|
||||||
// One flag is disabled
|
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void enableFlags(boolean enabled) {
|
private void enableFlags(boolean enabled) {
|
||||||
if (enabled) {
|
if (enabled) {
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.enableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
} else {
|
} else {
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -111,28 +111,12 @@ public class CellularSecurityNotificationsDividerControllerTest {
|
|||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
|
||||||
// Both flags disabled
|
|
||||||
enableFlags(false);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
|
|
||||||
// One flag is disabled
|
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
}
|
|
||||||
|
|
||||||
private void enableFlags(boolean enabled) {
|
private void enableFlags(boolean enabled) {
|
||||||
if (enabled) {
|
if (enabled) {
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||||
mSetFlagsRule.enableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
} else {
|
} else {
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -112,19 +112,6 @@ public class CellularSecurityNotificationsPreferenceControllerTest {
|
|||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
|
||||||
// All flags disabled
|
|
||||||
enableFlags(false);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
|
|
||||||
// One flag is disabled
|
|
||||||
enableFlags(true);
|
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void setChecked_flagsDisabled_shouldReturnFalse() {
|
public void setChecked_flagsDisabled_shouldReturnFalse() {
|
||||||
// Flags disabled
|
// Flags disabled
|
||||||
@@ -230,13 +217,9 @@ public class CellularSecurityNotificationsPreferenceControllerTest {
|
|||||||
private void enableFlags(boolean enabled) {
|
private void enableFlags(boolean enabled) {
|
||||||
if (enabled) {
|
if (enabled) {
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||||
mSetFlagsRule.enableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
} else {
|
} else {
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||||
mSetFlagsRule.disableFlags(
|
|
||||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
|
||||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user