Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 603af61a authored by Subir Jhanb's avatar Subir Jhanb Committed by Android (Google) Code Review
Browse files

Add a new permission to have access to Gal Provider

BUG:6897999

Change-Id: Ie60963b7f3911b402b971e794178754e1b4f0a43
parent 9951b7c4
Loading
Loading
Loading
Loading
+4 −4
Original line number Diff line number Diff line
@@ -345,10 +345,10 @@ public final class ContactsContract {
     * directory provider URIs by themselves. This level of indirection allows
     * Contacts Provider to implement additional system-level features and
     * optimizations. Access to Contacts Provider is protected by the
     * READ_CONTACTS permission, but access to the directory provider is not.
     * Therefore directory providers must reject requests coming from clients
     * other than the Contacts Provider itself. An easy way to prevent such
     * unauthorized access is to check the name of the calling package:
     * READ_CONTACTS permission, but access to the directory provider is protected by
     * BIND_DIRECTORY_SEARCH. This permission was introduced at the API level 17, for previous
     * platform versions the provider should perform the following check to make sure the call
     * is coming from the ContactsProvider:
     * <pre>
     * private boolean isCallerAllowed() {
     *   PackageManager pm = getContext().getPackageManager();
+7 −0
Original line number Diff line number Diff line
@@ -278,6 +278,13 @@
        android:label="@string/permlab_writeContacts"
        android:description="@string/permdesc_writeContacts" />

    <!-- Allows an application to execute contacts directory search.
         This should only be used by ContactsProvider. -->
    <!-- @hide -->
    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
        android:permissionGroup="android.permission-group.PERSONAL_INFO"
        android:protectionLevel="signature" />

    <!-- Allows an application to read the user's call log. -->
    <permission android:name="android.permission.READ_CALL_LOG"
        android:permissionGroup="android.permission-group.PERSONAL_INFO"