This reverts commit 86f3500439.
Reason for revert: Real flow is not ready yet, so we still need the fallback activity.
Change-Id: I34dc5386ff8c18a62b4b11e25fd355a62602329f
Rollback the changes done in ag/16388725 and ag/16709333
Bug: 209659998
Test: croot && make RunSettingsRoboTests -j40 ROBOTEST_FILTER="com.android.settings.users.UserSettingsTest"
Change-Id: I75b85df50a3caff55375ad261a97225377644a38
Fallback Home gets launched multiple times due to
CONFIG_KEYBOARD_HIDDEN, which is irrelevant for it. So we mark the
activity to not be restarted on this config change.
Test: manual
Bug: 215439232
Change-Id: I558091979840a6b664e39f6b8bd22957d1b2b729
To improve user clarity of the storage permission and
reduce the number of apps with broad file access,
we will update the Files & Media permission model
for apps targeting API 32.
Apps must now request permission for images, videos,
or audio files independently.
Test: Build apk and see Storage page works.
Fix: 220259725
Change-Id: I8f14cf5b4b48c6b28374ba7266c62a3897cdda8e
Enable this to detect memory bugs.
Fixes: 220248277
Test: Local start up time test and memory usage test.
Change-Id: I529507931f372f1e1f7bf6ae580fdb35651e6bd0
- Add the entry to "Anything else?" screen
1) Add the new activity-alias tag ".TextReadingForSetupWizardActivity", including the fragment class, action, and targetActivity.
2) Temporarily use the “DISPLAY_SETTINGS” category to trigger “.TextReadingForSetupWizardActivity” to ensure the backward compatibility.
3) Add the text reading settings page entry into SettingsGateway to be successfully launched from SuW.
Bug: 211503117
Test: manual test
Change-Id: I5c35df3c33c713342a7a0cfad786b7ae48ad941f
SystemUI also needs also to this activity in order to support
supervised user creation. This activity is temporary and is scheduled
to be removed.
Fixes: 218310361
Test: atest UserSwitcherControllerTest KeyguardUserSwitcherAdapterTest UserDetailViewAdapterTest KeyguardSecurityContainerTest
Change-Id: Ib79dcde2c726cc9508aef667b43662152d047137
If OP_ACCESS_RESTRICTED_SETTINGS is rejected, it means accessibility page
for that app is gray out and app info won't show "unlock restricted settings menu"
If OP_ACCESS_RESTRICTED_SETTINGS is ignored, it means accessibility page
for that app is gray out, but app info shows "unlock restricted settings menu"
If OP_ACCESS_RESTRICTED_SETTINGS is allowed(default), it means users can
access accessibility page for that app.
OP_ACCESS_RESTRICTED_SETTINGS will be changed to ignored if user visited
the restricted settings dialog.
OP_ACCESS_RESTRICTED_SETTINGS will be changed to allowed if user passes
the confirmation screen.
Bug: 202130031
Test: Tested the UI and it works correctly
Change-Id: I3dfb94cee440658b4726a1c3f7265f93cd19ed3e
- Add CHANGE_WIFI_STATE permission to WifiPickerActivity
Bug: 183410556
Test: manual test
Use b/183410556#comment4 app-debug.apk to verify the solution
Change-Id: Ie9295c129bc87cb66c67377db64ba716046e9daf
* changes:
Remove FDE support from accessibility settings
Rename crypt_keeper_* strings that are still used
Remove CryptKeeperSettings
Remove CryptKeeper
FDE support has been removed in favor of FBE, so remove the FDE settings
from the "Encryption & credentials" page of the Settings app.
For now I didn't change the way the page appears on devices that don't
use FDE; as before, it still lists "Encrypt phone", followed by either
"Encrypted" or "Phone not encrypted" with no changeable settings. Note
that the strings used for this have "crypt_keeper" in their names but
aren't specific to FDE; the next CL will rename them.
Test: On Cuttlefish with and without encryption enabled, tested visiting
the "Encryption & credentials" settings.
Bug: 208476087
Change-Id: I3ce9894291ea1f1886f21980a86a92bfce38038a
Since Android 10, new devices have been required to use FBE (File Based
Encryption) instead of FDE (Full Disk Encryption). FDE support was
already removed from system components such as init and vold.
Therefore, the CryptKeeper activity is no longer needed. Remove it.
Note: this CL only removes CryptKeeper itself, i.e. the activity which
runs at boot time on devices that are using FDE or are being encrypted
with FDE in-place. Later CLs will remove FDE-specific code from the
Settings app.
Bug: 208476087
Change-Id: I4aaf795e8cee1ff3cdd55a41c975273c8faeefa9
This reverts commit ee8365ca8e.
Reason for revert: <The breaked gts test b/213434244 is fixed by ag/16578964>
Change-Id: I2ddf20646b55e5833d3026bcbda308e2036780d9
From Android 11, apps need the permission QUERY_ALL_PACKAGES
to probe existence of arbitrary installed packages.
However, an Activity which declares android:scheme="package
in intent-filter may be vulnerable and attacker app can
use it to probe installed packages.
This change add permission QUERY_ALL_PACKAGES to protect
vulnerable Activity.
Bug: 185477439
Test: Install POC and check if it can probe installed packages
by each vulnerable Activity.
Change-Id: I521545436102f72f2e0c5053e30fd03bd6bc756f
- Use uri to pass the package name.
- Allow adb command to start this function
Bug: 211856852
Test: see b/211856852#2
Change-Id: I3d73d32d7546bf0e3db25d952b2caee934f523dc