Snap for 12991197 from 3d0d0f9d66 to 25Q2-release
Change-Id: Ifc3a44c01d2dcc45bc5e8662685ada1248254f38
This commit is contained in:
@@ -6,7 +6,10 @@
|
||||
-keepattributes Exceptions
|
||||
|
||||
# Keep all Fragments in this package, which are used by reflection.
|
||||
-keep public class com.android.settings*.** extends androidx.fragment.app.Fragment
|
||||
# TODO(b/373579455): Evaluate if <init> needs to be kept.
|
||||
-keep public class com.android.settings*.** extends androidx.fragment.app.Fragment {
|
||||
void <init>();
|
||||
}
|
||||
|
||||
# Keep all preference controllers needed by slice and DashboardFragment.
|
||||
-keep class * extends com.android.settings.core.BasePreferenceController {
|
||||
@@ -49,7 +52,10 @@
|
||||
public static ** SEARCH_INDEX_DATA_PROVIDER;
|
||||
public static ** SUMMARY_PROVIDER_FACTORY;
|
||||
}
|
||||
-keep class androidx.core.app.CoreComponentFactory
|
||||
# TODO(b/373579455): Evaluate if <init> needs to be kept.
|
||||
-keep class androidx.core.app.CoreComponentFactory {
|
||||
void <init>();
|
||||
}
|
||||
|
||||
# Keep classes that implements CustomSliceable, which are used by reflection.
|
||||
-keepclasseswithmembers class * implements com.android.settings.slices.CustomSliceable {
|
||||
|
||||
@@ -12027,6 +12027,9 @@
|
||||
<!-- Help URI, action disabled by restricted settings [DO NOT TRANSLATE] -->
|
||||
<string name="help_url_action_disabled_by_restricted_settings" translatable="false"></string>
|
||||
|
||||
<!-- Help URI, action disabled by advanced protection [DO NOT TRANSLATE] -->
|
||||
<string name="help_url_action_disabled_by_advanced_protection" translatable="false"></string>
|
||||
|
||||
<!-- Title label for dnd suggestion, which is displayed in Settings homepage [CHAR LIMIT=100] -->
|
||||
<string name="zen_suggestion_title">Update Do Not Disturb</string>
|
||||
|
||||
|
||||
@@ -246,6 +246,8 @@ public class FaceSettings extends DashboardFragment {
|
||||
final PreferenceCategory category =
|
||||
findPreference(PREF_KEY_USE_FACE_TO_CATEGORY);
|
||||
category.setVisible(true);
|
||||
use(FaceSettingsKeyguardUnlockPreferenceController.class).setUserId(mUserId);
|
||||
use(FaceSettingsAppsPreferenceController.class).setUserId(mUserId);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
@@ -72,7 +72,6 @@ public class CellularSecurityPreferenceController extends BasePreferenceControll
|
||||
@Override
|
||||
public int getAvailabilityStatus() {
|
||||
if (!mContext.getPackageManager().hasSystemFeature(PackageManager.FEATURE_TELEPHONY)
|
||||
|| !Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparency()) {
|
||||
return UNSUPPORTED_ON_DEVICE;
|
||||
|
||||
@@ -60,8 +60,7 @@ public class CellularSecurityNotificationsDividerController extends
|
||||
|
||||
@Override
|
||||
public int getAvailabilityStatus() {
|
||||
if (!Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
||||
if (!Flags.enableModemCipherTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparency()) {
|
||||
return UNSUPPORTED_ON_DEVICE;
|
||||
}
|
||||
|
||||
@@ -178,8 +178,7 @@ public class CellularSecurityNotificationsPreferenceController extends
|
||||
}
|
||||
|
||||
private boolean areFlagsEnabled() {
|
||||
if (!Flags.enableIdentifierDisclosureTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparencyUnsolEvents()
|
||||
if (!Flags.enableModemCipherTransparencyUnsolEvents()
|
||||
|| !Flags.enableModemCipherTransparency()) {
|
||||
return false;
|
||||
}
|
||||
|
||||
@@ -95,7 +95,13 @@ public class SatelliteSettingPreferenceController extends
|
||||
return UNSUPPORTED_ON_DEVICE;
|
||||
}
|
||||
|
||||
return mIsCarrierSatelliteAttachSupported ? AVAILABLE : CONDITIONALLY_UNAVAILABLE;
|
||||
int availabilityStatus = mIsCarrierSatelliteAttachSupported
|
||||
? AVAILABLE : CONDITIONALLY_UNAVAILABLE;
|
||||
if (availabilityStatus == AVAILABLE && mIsCarrierRoamingNtnConnectedTypeManual
|
||||
&& !mIsSatelliteSmsAvailableForManualType) {
|
||||
availabilityStatus = CONDITIONALLY_UNAVAILABLE;
|
||||
}
|
||||
return availabilityStatus;
|
||||
}
|
||||
|
||||
@Override
|
||||
|
||||
@@ -123,7 +123,7 @@ public class NotificationAccessConfirmationActivity extends Activity
|
||||
NLSIntent, /* flags */ 0, mUserId);
|
||||
boolean hasNLSIntentFilter = false;
|
||||
for (ResolveInfo service : matchedServiceList) {
|
||||
if (service.serviceInfo.packageName.equals(mComponentName.getPackageName())) {
|
||||
if (service.serviceInfo.getComponentName().equals(mComponentName)) {
|
||||
if (!requiredPermission.equals(service.serviceInfo.permission)) {
|
||||
Slog.e(LOG_TAG, "Service " + mComponentName + " lacks permission "
|
||||
+ requiredPermission);
|
||||
|
||||
@@ -134,28 +134,11 @@ public final class CellularSecurityPreferenceControllerTest {
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
||||
// Both flags disabled
|
||||
enableFlags(false);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
|
||||
// One flag is disabled
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
private void enableFlags(boolean enabled) {
|
||||
if (enabled) {
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
} else {
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -111,28 +111,12 @@ public class CellularSecurityNotificationsDividerControllerTest {
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
||||
// Both flags disabled
|
||||
enableFlags(false);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
|
||||
// One flag is disabled
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
private void enableFlags(boolean enabled) {
|
||||
if (enabled) {
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
} else {
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
}
|
||||
}
|
||||
|
||||
@@ -112,19 +112,6 @@ public class CellularSecurityNotificationsPreferenceControllerTest {
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void getAvailabilityStatus_flagsDisabled_shouldReturnFalse() {
|
||||
// All flags disabled
|
||||
enableFlags(false);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
|
||||
// One flag is disabled
|
||||
enableFlags(true);
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
assertThat(mController.getAvailabilityStatus()).isEqualTo(UNSUPPORTED_ON_DEVICE);
|
||||
}
|
||||
|
||||
@Test
|
||||
public void setChecked_flagsDisabled_shouldReturnFalse() {
|
||||
// Flags disabled
|
||||
@@ -230,13 +217,9 @@ public class CellularSecurityNotificationsPreferenceControllerTest {
|
||||
private void enableFlags(boolean enabled) {
|
||||
if (enabled) {
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.enableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
} else {
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(
|
||||
Flags.FLAG_ENABLE_IDENTIFIER_DISCLOSURE_TRANSPARENCY_UNSOL_EVENTS);
|
||||
mSetFlagsRule.disableFlags(Flags.FLAG_ENABLE_MODEM_CIPHER_TRANSPARENCY);
|
||||
}
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user