Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 95c29a8b authored by Subir Jhanb's avatar Subir Jhanb Committed by Android Git Automerger
Browse files

am 603af61a: Add a new permission to have access to Gal Provider BUG:6897999

* commit '603af61a':
  Add a new permission to have access to Gal Provider BUG:6897999
parents c366e198 603af61a
Loading
Loading
Loading
Loading
+4 −4
Original line number Diff line number Diff line
@@ -345,10 +345,10 @@ public final class ContactsContract {
     * directory provider URIs by themselves. This level of indirection allows
     * Contacts Provider to implement additional system-level features and
     * optimizations. Access to Contacts Provider is protected by the
     * READ_CONTACTS permission, but access to the directory provider is not.
     * Therefore directory providers must reject requests coming from clients
     * other than the Contacts Provider itself. An easy way to prevent such
     * unauthorized access is to check the name of the calling package:
     * READ_CONTACTS permission, but access to the directory provider is protected by
     * BIND_DIRECTORY_SEARCH. This permission was introduced at the API level 17, for previous
     * platform versions the provider should perform the following check to make sure the call
     * is coming from the ContactsProvider:
     * <pre>
     * private boolean isCallerAllowed() {
     *   PackageManager pm = getContext().getPackageManager();
+7 −0
Original line number Diff line number Diff line
@@ -278,6 +278,13 @@
        android:label="@string/permlab_writeContacts"
        android:description="@string/permdesc_writeContacts" />

    <!-- Allows an application to execute contacts directory search.
         This should only be used by ContactsProvider. -->
    <!-- @hide -->
    <permission android:name="android.permission.BIND_DIRECTORY_SEARCH"
        android:permissionGroup="android.permission-group.PERSONAL_INFO"
        android:protectionLevel="signature" />

    <!-- Allows an application to read the user's call log. -->
    <permission android:name="android.permission.READ_CALL_LOG"
        android:permissionGroup="android.permission-group.PERSONAL_INFO"