Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 6d0e10a7 authored by Marvin Ramin's avatar Marvin Ramin
Browse files

Rename computer control access permission

Based on permission team feadback renaming to ACCESS_COMPUTER_CONTROL

Bug: 410570802
Flag: android.companion.virtualdevice.flags.computer_control_access
Test: atest android.permissionpolicy.cts.PermissionPolicyTest#platformPermissionPolicyIsUnaltered
Change-Id: I7a091f347860520e04e5cbe2d898970148e6f920
parent 04fb5fa3
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -50,7 +50,7 @@ interface IVirtualDeviceManager {
            in VirtualDeviceParams params, in IVirtualDeviceActivityListener activityListener,
            in IVirtualDeviceSoundEffectListener soundEffectListener);

    @EnforcePermission("COMPUTER_CONTROL_ACCESS")
    @EnforcePermission("ACCESS_COMPUTER_CONTROL")
    IVirtualDevice createLocalVirtualDevice(
            in IBinder token, in AttributionSource attributionSource,
            in VirtualDeviceParams params, in IVirtualDeviceActivityListener activityListener,
+1 −1
Original line number Diff line number Diff line
@@ -217,7 +217,7 @@ public class VirtualDeviceInternal {
                mSoundEffectListener);
    }

    @RequiresPermission(Manifest.permission.COMPUTER_CONTROL_ACCESS)
    @RequiresPermission(Manifest.permission.ACCESS_COMPUTER_CONTROL)
    VirtualDeviceInternal(
            IVirtualDeviceManager service,
            Context context,
+2 −2
Original line number Diff line number Diff line
@@ -223,7 +223,7 @@ public final class VirtualDeviceManager {
    /**
     * @hide
     */
    @RequiresPermission(android.Manifest.permission.COMPUTER_CONTROL_ACCESS)
    @RequiresPermission(android.Manifest.permission.ACCESS_COMPUTER_CONTROL)
    @NonNull
    public VirtualDevice createVirtualDevice(@NonNull VirtualDeviceParams params) {
        Objects.requireNonNull(params, "params must not be null");
@@ -587,7 +587,7 @@ public final class VirtualDeviceManager {
                    new VirtualDeviceInternal(service, context, associationId, params);
        }

        @RequiresPermission(Manifest.permission.COMPUTER_CONTROL_ACCESS)
        @RequiresPermission(Manifest.permission.ACCESS_COMPUTER_CONTROL)
        private VirtualDevice(
                IVirtualDeviceManager service,
                Context context,
+2 −2
Original line number Diff line number Diff line
@@ -8540,9 +8540,9 @@

    <!-- Allows an application access to computer control features.
     @hide -->
    <permission android:name="android.permission.COMPUTER_CONTROL_ACCESS"
    <permission android:name="android.permission.ACCESS_COMPUTER_CONTROL"
        android:protectionLevel="internal|knownSigner"
        android:knownCerts="@array/config_computerControlAccessKnownSigners"
        android:knownCerts="@array/config_accessComputerControlKnownSigners"
        android:featureFlag="android.companion.virtualdevice.flags.computer_control_access"/>

    <!-- @SystemApi Must be required by a safety source to send an update using the
+1 −1
Original line number Diff line number Diff line
@@ -7240,7 +7240,7 @@
    <!-- Certificate digests for trusted apps that will be allowed to obtain the knownSigner
         permission for computer control access. The digest should be computed over the
         DER encoding of the trusted certificate using the SHA-256 digest algorithm. -->
    <string-array name="config_computerControlAccessKnownSigners">
    <string-array name="config_accessComputerControlKnownSigners">
    </string-array>

    <!-- Certificate digests for trusted apps that will be allowed to obtain the knownSigner
Loading