Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit edd137b9 authored by Svetoslav Ganov's avatar Svetoslav Ganov Committed by android-build-merger
Browse files

Merge "Change signature|system permissions to signature|privileged" am: cfed01af

am: 3dee9db6

* commit '3dee9db6':
  Change signature|system permissions to signature|privileged
parents 55f90c1c 3dee9db6
Loading
Loading
Loading
Loading
+22 −22
Original line number Diff line number Diff line
@@ -643,14 +643,14 @@

    <!-- Allows an application to access the IMS call service: making and
         modifying a call
        <p>Protection level: signature|system
        <p>Protection level: signature|privileged
        @hide
    -->
    <permission android:name="android.permission.ACCESS_IMS_CALL_SERVICE"
        android:permissionGroup="android.permission-group.PHONE"
        android:label="@string/permlab_accessImsCallService"
        android:description="@string/permdesc_accessImsCallService"
        android:protectionLevel="signature|system" />
        android:protectionLevel="signature|privileged" />

    <!-- Allows an application to read the user's call log.
         <p class="note"><strong>Note:</strong> If your app uses the
@@ -927,7 +927,7 @@
    <!-- @SystemApi @hide Allows an application to modify cell broadcasts through the content provider.
         <p>Not for use by third-party applications. -->
    <permission android:name="android.permission.MODIFY_CELL_BROADCASTS"
                android:protectionLevel="signature|system" />
                android:protectionLevel="signature|privileged" />

    <!-- =============================================================== -->
    <!-- Permissions for setting the device alarm                        -->
@@ -948,16 +948,16 @@
    <eat-comment />

    <!-- Allows an application to modify and remove existing voicemails in the system
        <p>Protection level: system|signature
        <p>Protection level: signature|privileged
    -->
    <permission android:name="com.android.voicemail.permission.WRITE_VOICEMAIL"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Allows an application to read voicemails in the system.
         <p>Protection level: system|signature
         <p>Protection level: signature|privileged
    -->
    <permission android:name="com.android.voicemail.permission.READ_VOICEMAIL"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- ======================================= -->
    <!-- Permissions for accessing location info -->
@@ -1093,7 +1093,7 @@
         allow or disallow phonebook access or message access.
         This is not available to third party applications. -->
    <permission android:name="android.permission.BLUETOOTH_PRIVILEGED"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Control access to email providers exclusively for Bluetooth
         @hide
@@ -1331,26 +1331,26 @@
         corresponds to a device SIM.
         @hide -->
    <permission android:name="android.permission.REGISTER_SIM_SUBSCRIPTION"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- @SystemApi Protects the ability to register any PhoneAccount with
         PhoneAccount#CAPABILITY_CALL_PROVIDER.
         @hide -->
    <permission android:name="android.permission.REGISTER_CALL_PROVIDER"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- @SystemApi Protects the ability to register any PhoneAccount with
         PhoneAccount#CAPABILITY_CONNECTION_MANAGER
         @hide -->
    <permission android:name="android.permission.REGISTER_CONNECTION_MANAGER"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Must be required by a {@link android.telecom.InCallService},
         to ensure that only the system can bind to it.
         <p>Protection level: system|signature
         <p>Protection level: signature|privileged
    -->
    <permission android:name="android.permission.BIND_INCALL_SERVICE"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Must be required by a {@link android.telecom.ConnectionService},
         to ensure that only the system can bind to it.
@@ -1359,24 +1359,24 @@
         @SystemApi
         @hide -->
    <permission android:name="android.permission.BIND_CONNECTION_SERVICE"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Must be required by a {@link android.telecom.ConnectionService},
         to ensure that only the system can bind to it.
         <p>Protection level: system|signature
         <p>Protection level: signature|privileged
    -->
    <permission android:name="android.permission.BIND_TELECOM_CONNECTION_SERVICE"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- @SystemApi Allows an application to control the in-call experience.
         @hide -->
    <permission android:name="android.permission.CONTROL_INCALL_EXPERIENCE"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Allows an application to receive STK related commands.
         @hide -->
    <permission android:name="android.permission.RECEIVE_STK_COMMANDS"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- ================================== -->
    <!-- Permissions for sdcard interaction -->
@@ -1731,12 +1731,12 @@
    <!-- @SystemApi Allows mounting and unmounting file systems for removable storage.
    <p>Not for use by third-party applications.-->
    <permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- @SystemApi Allows formatting file systems for removable storage.
    <p>Not for use by third-party applications. -->
    <permission android:name="android.permission.MOUNT_FORMAT_FILESYSTEMS"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- @hide -->
    <permission android:name="android.permission.STORAGE_INTERNAL"
@@ -2399,7 +2399,7 @@
         access the network and acquire wakelocks.
         <p>Not for use by third-party applications. -->
    <permission android:name="android.permission.CHANGE_DEVICE_IDLE_TEMP_WHITELIST"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Permission an application must hold in order to use
         {@link android.provider.Settings#ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS}.
@@ -2613,7 +2613,7 @@

    <!-- Allows managing (adding, removing) fingerprint templates. Reserved for the system. @hide -->
    <permission android:name="android.permission.MANAGE_FINGERPRINT"
        android:protectionLevel="system|signature" />
        android:protectionLevel="signature|privileged" />

    <!-- Allows an app to reset fingerprint attempt counter. Reserved for the system. @hide -->
    <permission android:name="android.permission.RESET_FINGERPRINT_LOCKOUT"