This repository has been archived by the owner on Nov 8, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 6.2k
Android10 s3 release #589
Open
MrR0990
wants to merge
6
commits into
master
Choose a base branch
from
android10-s3-release
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Android10 s3 release #589
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
KeyguardMonitor#canSkipBouncer was not updated properly when the phone was unlocked using fingerprint. This CL removes that method and changes UserSwitcherController to query UnlockMethodCache directly, as it was KeyguardMonitor's only client for that method. Test: manual unlocking with FP and with pattern Test: no automated test yet Bug: 140486529 Merged-In: Idbff4fbabca962c632ff5d78b25418c0502db9a7 Change-Id: Idbff4fbabca962c632ff5d78b25418c0502db9a7 (cherry picked from commit d2eb34b)
Revert Myanmar fonts to those on Android P. Instead NotoSansMyanmar*-ZawDecode (Unicode-Zawgyi hybrid) fonts, go back to NotoSansMyanmar and NotoSansMyanmarUI (pure Unicode) fonts. Bug: 141019225 Change-Id: Ib2494b9b5cb148f598e69271c5676e7104f66ae3 (cherry picked from commit 0aeafab)
We had accidental usages of the PermissionChecker for cases where no private data was provided to the app but the checkPermission API on the latter also did blame data access on the app. The PermissionChecker was designed to handle IPC calls and not for generic API checks. To avoid future accidental incorrect PermissionChecker usages this change renames the existing APIs of the latter to clearly indicate that they should be used for data delivery and also adds sibling methods for doing the same permission checks for preflight purposes. Also the documentation is improved to furhter assist developers. In addition, this change fixes accidental permission checker usages that blame when they should not by using the new preflight flavor of the permission check APIs. Test: atest com.android.settingslib.location.RecentLocationAppsTest atest CtsPermissionTestCases added: LocationAccessCheckTest#notificationOnlyForAccessesSinceFeatureWasEnabled added: LocationAccessCheckTest#noNotificationIfFeatureDisabled added: LocationAccessCheckTest#noNotificationIfBlamerNotSystemOrLocationProvider added: LocationAccessCheckTest#testOpeningLocationSettingsDoesNotTriggerAccess bug:141028068 Merged-In: I65c71569d0dd8a40bc6fecabb22c5373dd6e806e Change-Id: I65c71569d0dd8a40bc6fecabb22c5373dd6e806e (cherry picked from commit 7fe065e)
Also fixes setting the consolidated zen policy logging. Fixes: 140329813 Test: android.app.cts.NotificationManagerTest#testTotalSilenceOnlyMuteStreams Test: android.app.cts.NotificationManagerTest#testAlarmsOnlyMuteStreams Change-Id: I43d503ac23d7b0b141930d77cb76f1f589b22525 (cherry picked from commit dcc5cfc) (cherry picked from commit 51563b5)
And also pre-grant it to all apps that currently get any storage permission pre-granted Test: atest SplitPermissionTest m -j gts && gts-tradefed run commandAndExit gts-dev -m GtsPermissionTestCases --test=com.google.android.permission.gts.DefaultPermissionGrantPolicyTest#testDefaultGrantsWithRemoteExceptions Manual testing: All combinations of - App targetSdk = 28 and 29 (and 22 for extra credit) - App having the <uses-permission> tag for ACCESS_MEDIA_LOCATION or not - Upgrade from P->Q-QPR and from vanilla Q->Q-QPR Further upgrade of targetSdk from 28->29 while on Q-QPR ==> All permission behavior should make sense. Sometimes there are weird, but expected behaviors. Hence we need to collect the results and then look at the unexpected ones. See SplitPermissionTest for some tests I added for the location-background permission which was split from the fine/coarse-location permissions Fixes: 141048840,140961754 Change-Id: Ib9f50d25c002036f13cf2d42fc4d1b214f20920c (cherry picked from commit ac7b10c) (cherry picked from commit f3ff750)
…18398, 9618399, 9618036, 9618159, 9618160, 9617854, 9617855, 9617999, 9618000, 9618405, 9618406, 9618161, 9618401, 9618342] into sparse-5908163-L04300000381828225 Change-Id: Icd3bd822f5503840b3cc3bd28c896a1172125d68
这是来自QQ邮箱的自动回复邮件。
您好,现在无法回复您的邮件。我将尽快给您回复。
|
Dlaniel34
approved these changes
May 14, 2023
Hello,我已收到邮件,待我仔细阅读后再回复。
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
pull request