Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 2738294d authored by Hai Shalom's avatar Hai Shalom Committed by Etan Cohen
Browse files

Add permission MANAGE_WIFI_INTERFACES

Add a new permission for system apps to get notified about Wi-Fi
interface requests that require tearing down other interfaces,
and allow them to approve or reject the request.

Bug: 202813108
Test: compiles
Change-Id: Iee9e00ea56c2d0fb73cb5ec22d50be3e5c6ccb3e
parent b4e46717
Loading
Loading
Loading
Loading
+1 −0
Original line number Diff line number Diff line
@@ -112,6 +112,7 @@ package android {
    field public static final String MANAGE_ONGOING_CALLS = "android.permission.MANAGE_ONGOING_CALLS";
    field public static final String MANAGE_OWN_CALLS = "android.permission.MANAGE_OWN_CALLS";
    field public static final String MANAGE_WIFI_AUTO_JOIN = "android.permission.MANAGE_WIFI_AUTO_JOIN";
    field public static final String MANAGE_WIFI_INTERFACES = "android.permission.MANAGE_WIFI_INTERFACES";
    field public static final String MASTER_CLEAR = "android.permission.MASTER_CLEAR";
    field public static final String MEDIA_CONTENT_CONTROL = "android.permission.MEDIA_CONTENT_CONTROL";
    field public static final String MODIFY_AUDIO_SETTINGS = "android.permission.MODIFY_AUDIO_SETTINGS";
+7 −0
Original line number Diff line number Diff line
@@ -1904,6 +1904,13 @@
    <permission android:name="android.permission.MANAGE_WIFI_AUTO_JOIN"
                android:protectionLevel="signature|privileged" />

    <!-- Allows applications to get notified when a Wi-Fi interface request cannot
         be satisfied without tearing down one or more other interfaces, and provide a decision
         whether to approve the request or reject it.
         <p>Not for use by third-party applications. -->
    <permission android:name="android.permission.MANAGE_WIFI_INTERFACES"
                android:protectionLevel="signature|privileged" />

    <!-- @SystemApi @hide Allows apps to create and manage IPsec tunnels.
         <p>Only granted to applications that are currently bound by the
         system for creating and managing IPsec-based interfaces.