Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 12a75e87 authored by Janis Danisevskis's avatar Janis Danisevskis Committed by android-build-merger
Browse files

Merge "Clarifies that filesystem permission 0700 is not enforced as an...

Merge "Clarifies that filesystem permission 0700 is not enforced as an invariant" into mnc-mr-docs am: 73813c06 am: d92fe240 am: 38d54f72 am: e0e6cf8e am: 190080e9
am: 3850c9dd

* commit '3850c9dd':
  Clarifies that filesystem permission 0700 is not enforced as an invariant

Change-Id: I1de86d6ec6242e0e0f573c9f30e6e3b2aef87a9d
parents c108acee 3850c9dd
Loading
Loading
Loading
Loading
+8 −2
Original line number Original line Diff line number Diff line
@@ -215,11 +215,17 @@ page.image=images/cards/card-n-changes_2x.png


<ul>
<ul>
  <li>
  <li>
    Private files’ file permissions can no longer be relaxed by the owner, and
    Private files’ file permissions should no longer be relaxed by the owner,
    an attempt to do so using
    and an attempt to do so using
    {@link android.content.Context#MODE_WORLD_READABLE} and/or
    {@link android.content.Context#MODE_WORLD_READABLE} and/or
    {@link android.content.Context#MODE_WORLD_WRITEABLE}, will trigger a
    {@link android.content.Context#MODE_WORLD_WRITEABLE}, will trigger a
    {@link java.lang.SecurityException}.
    {@link java.lang.SecurityException}.
    <p class="note">
      <strong>Note:</strong> As of yet, this restriction is not fully enforced.
      Apps may still modify permissions to their private directory using
      native APIs or the {@link java.io.File File} API. However, we strongly
      discourage relaxing the permissions to the private directory.
    </p>
  </li>
  </li>
  <li>
  <li>
    Passing <code>file://</code> URIs outside the package domain may leave the
    Passing <code>file://</code> URIs outside the package domain may leave the