<feed xmlns='http://www.w3.org/2005/Atom'>
<title>platform_packages_services_Mtp/AndroidManifest.xml, branch master</title>
<subtitle>Unnamed repository; edit this file 'description' to name the repository.
</subtitle>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/'/>
<entry>
<title>Add an exported flag in manifest</title>
<updated>2020-05-28T19:22:32+00:00</updated>
<author>
<name>Ashwini Oruganti</name>
<email>ashfall@google.com</email>
</author>
<published>2020-05-28T19:22:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=14152d7764230d0ff7b64ec162f460cc1441013c'/>
<id>14152d7764230d0ff7b64ec162f460cc1441013c</id>
<content type='text'>
With b/150232615, we will need an explicit value set for the exported
flag when intent filters are present, as the default behavior is
changing for future versions. This change adds the value reflecting the
previous default to the manifest.

These changes were made using an automated tool, the xml file may be
reformatted slightly creating a larger diff. The only "real" change is
the addition of "android:exported" to activities, services, and
receivers that have one or more intent-filters.

Bug: 150232615
Test: TH
Exempt-From-Owner-Approval: mechanical refactoring
Change-Id: I94a73c7d2c68ee5514b22f42c321b9fdad643c50
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
With b/150232615, we will need an explicit value set for the exported
flag when intent filters are present, as the default behavior is
changing for future versions. This change adds the value reflecting the
previous default to the manifest.

These changes were made using an automated tool, the xml file may be
reformatted slightly creating a larger diff. The only "real" change is
the addition of "android:exported" to activities, services, and
receivers that have one or more intent-filters.

Bug: 150232615
Test: TH
Exempt-From-Owner-Approval: mechanical refactoring
Change-Id: I94a73c7d2c68ee5514b22f42c321b9fdad643c50
</pre>
</div>
</content>
</entry>
<entry>
<title>Request MANAGE_EXTERNAL_STORAGE permission</title>
<updated>2020-01-24T15:31:53+00:00</updated>
<author>
<name>Zim</name>
<email>zezeozue@google.com</email>
</author>
<published>2020-01-24T15:31:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=048a8c1ed66a409b72174f98d3a1bb8eaabdc567'/>
<id>048a8c1ed66a409b72174f98d3a1bb8eaabdc567</id>
<content type='text'>
With the deprecation of WRITE_MEDIA_STORAGE in R. Apps should migrate
to requesting MANAGE_EXTERNAL_STORAGE permission

Test: m
Bug: 144914977
Change-Id: Idbcee2a29a3656cc1d48719f5cbd74ae97d6dc3e
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
With the deprecation of WRITE_MEDIA_STORAGE in R. Apps should migrate
to requesting MANAGE_EXTERNAL_STORAGE permission

Test: m
Bug: 144914977
Change-Id: Idbcee2a29a3656cc1d48719f5cbd74ae97d6dc3e
</pre>
</div>
</content>
</entry>
<entry>
<title>Progress towards splitting MediaProvider UID.</title>
<updated>2019-11-12T22:22:54+00:00</updated>
<author>
<name>Jeff Sharkey</name>
<email>jsharkey@android.com</email>
</author>
<published>2019-11-11T04:25:47+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=26d325262519db1b93d3fbba73392bafc8e0e905'/>
<id>26d325262519db1b93d3fbba73392bafc8e0e905</id>
<content type='text'>
We're working towards making MediaProvider into a Mainline module,
which means it can no longer share the "android.media" UID built
into the OS.  The major reason for this is because they're signed
with separate keys, but a secondary reason is that we don't know what
database customizations an OEM has performed in their MediaProvider.

Ensure that packages are requesting the permissions they actually
depend on, instead of relying on permissions requested by other
packages under the shared UID.

Bug: 144247087
Test: atest --test-mapping packages/providers/MediaProvider
Change-Id: I1593d64f8a240be66301e01b632ad0ff9b3f8f18
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
We're working towards making MediaProvider into a Mainline module,
which means it can no longer share the "android.media" UID built
into the OS.  The major reason for this is because they're signed
with separate keys, but a secondary reason is that we don't know what
database customizations an OEM has performed in their MediaProvider.

Ensure that packages are requesting the permissions they actually
depend on, instead of relying on permissions requested by other
packages under the shared UID.

Bug: 144247087
Test: atest --test-mapping packages/providers/MediaProvider
Change-Id: I1593d64f8a240be66301e01b632ad0ff9b3f8f18
</pre>
</div>
</content>
</entry>
<entry>
<title>Enable usesClearTextTraffic for com.android.mtp.</title>
<updated>2019-10-25T22:09:39+00:00</updated>
<author>
<name>Sudheer Shanka</name>
<email>sudheersai@google.com</email>
</author>
<published>2019-10-25T21:46:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=9812381217d2911a7016393ed77a572639169975'/>
<id>9812381217d2911a7016393ed77a572639169975</id>
<content type='text'>
If com.android.mtp is the first package to get started in the shared
media process, then its manifest entry dictates whether clear text
traffic should be permitted or not. That's why we try to ensure
usesClearTextTraffic="true" for all packages sharing
android.process.media.

Fixes: 140749044
Test: atest cts/tests/app/src/android/app/cts/DownloadManagerTest.java
Change-Id: I42471fb2f8e7eb9747bffa3807e47d139097211a
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
If com.android.mtp is the first package to get started in the shared
media process, then its manifest entry dictates whether clear text
traffic should be permitted or not. That's why we try to ensure
usesClearTextTraffic="true" for all packages sharing
android.process.media.

Fixes: 140749044
Test: atest cts/tests/app/src/android/app/cts/DownloadManagerTest.java
Change-Id: I42471fb2f8e7eb9747bffa3807e47d139097211a
</pre>
</div>
</content>
</entry>
<entry>
<title>Migrate MTP service into separate project.</title>
<updated>2019-08-12T19:45:42+00:00</updated>
<author>
<name>Jeff Sharkey</name>
<email>jsharkey@android.com</email>
</author>
<published>2019-08-12T17:38:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=8b65d6713c9a8a79ed90207a56544a23036a9620'/>
<id>8b65d6713c9a8a79ed90207a56544a23036a9620</id>
<content type='text'>
As part of getting MediaProvider to compile against supported APIs,
we're moving MTP related logic into its own repository.

Bug: 135340257
Test: manual
Change-Id: I437d2b7f52c0ecbb54b992f3f4eedc73f23729c8
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
As part of getting MediaProvider to compile against supported APIs,
we're moving MTP related logic into its own repository.

Bug: 135340257
Test: manual
Change-Id: I437d2b7f52c0ecbb54b992f3f4eedc73f23729c8
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix issue #72116995: Add permission guarding Service#startForeground</title>
<updated>2018-03-06T00:59:21+00:00</updated>
<author>
<name>Dianne Hackborn</name>
<email>hackbod@google.com</email>
</author>
<published>2018-01-20T01:44:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=a4f5be232f4b32c0a7870b001c632469e4a2a59e'/>
<id>a4f5be232f4b32c0a7870b001c632469e4a2a59e</id>
<content type='text'>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: I883c9515c307ed8e39f0bf888c4045944c8183ac
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: I883c9515c307ed8e39f0bf888c4045944c8183ac
</pre>
</div>
</content>
</entry>
<entry>
<title>Revert "Fix issue #72116995: Add permission guarding Service#startForeground"</title>
<updated>2018-02-12T16:12:33+00:00</updated>
<author>
<name>Ian Pedowitz</name>
<email>ijpedowitz@google.com</email>
</author>
<published>2018-02-12T16:12:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=9a75887d57d6b98bcb2fcfbc4ab36a3d5c8b4601'/>
<id>9a75887d57d6b98bcb2fcfbc4ab36a3d5c8b4601</id>
<content type='text'>
This reverts commit a9da85fde4675ed0b03557e448b1cc67f1d391fe.

Reason for revert: b/73224471

Bug: 73224471
Bug: 72116995
Change-Id: I1485305f40d47fdb138cb1e484c329cf20892a6b
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This reverts commit a9da85fde4675ed0b03557e448b1cc67f1d391fe.

Reason for revert: b/73224471

Bug: 73224471
Bug: 72116995
Change-Id: I1485305f40d47fdb138cb1e484c329cf20892a6b
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix issue #72116995: Add permission guarding Service#startForeground</title>
<updated>2018-02-07T22:02:02+00:00</updated>
<author>
<name>Dianne Hackborn</name>
<email>hackbod@google.com</email>
</author>
<published>2018-01-20T01:44:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=8f0b20047206f6d902f01aa774c8514f94e71b6e'/>
<id>8f0b20047206f6d902f01aa774c8514f94e71b6e</id>
<content type='text'>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: I95afb7185742b82c525e775ca20bb36015510b43
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: I95afb7185742b82c525e775ca20bb36015510b43
</pre>
</div>
</content>
</entry>
<entry>
<title>Revert "Fix issue #72116995: Add permission guarding Service#startForeground"</title>
<updated>2018-01-25T18:43:28+00:00</updated>
<author>
<name>Dianne Hackborn</name>
<email>hackbod@google.com</email>
</author>
<published>2018-01-25T18:40:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=151e489930f003ef3c3e1904b3e7d4d13f3b905f'/>
<id>151e489930f003ef3c3e1904b3e7d4d13f3b905f</id>
<content type='text'>
This reverts commit 994b5ad737831854ac3ba119abba533adca774fc.

Waiting for Chrome prebuilt.

Test: NA
Bug: 72116995
Change-Id: Ifcfea94ddefda27267640283038c9d0f933ea1d8
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This reverts commit 994b5ad737831854ac3ba119abba533adca774fc.

Waiting for Chrome prebuilt.

Test: NA
Bug: 72116995
Change-Id: Ifcfea94ddefda27267640283038c9d0f933ea1d8
</pre>
</div>
</content>
</entry>
<entry>
<title>Fix issue #72116995: Add permission guarding Service#startForeground</title>
<updated>2018-01-24T17:58:24+00:00</updated>
<author>
<name>Dianne Hackborn</name>
<email>hackbod@google.com</email>
</author>
<published>2018-01-20T01:44:46+00:00</published>
<link rel='alternate' type='text/html' href='https://git.replicant.us/mirrors/AOSP/platform_packages_services_Mtp/commit/?id=1a8f943660c00808d2dc4454ba52b864751394fa'/>
<id>1a8f943660c00808d2dc4454ba52b864751394fa</id>
<content type='text'>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: If5a79e7ed5ab9e0edc77410315eb4d2df8ac850b
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Now requires permission if targeting P.

Note that this is a separate permission from the existing one
that is required for instant apps to use foreground services.  The
reason for this is that their semantics are different (the instant
apps permission is associated with an app op for control over what
the app is allowed, while the regular app permission is just a
normal permission that is always granted and only there for
auditing of apps), and there are probably going to be cases where
a developer will want to use a foreground service in the full
version of their app but not as an instant app.

Bug: 72116995
Test: atest CtsAppTestCases
Change-Id: If5a79e7ed5ab9e0edc77410315eb4d2df8ac850b
</pre>
</div>
</content>
</entry>
</feed>
