summaryrefslogtreecommitdiffstats
path: root/src/com/android/messaging
Commit message (Collapse)AuthorAgeFilesLines
* Messaging: change Avatar fontFamily to sans-serif-mediumAltaf-Mahdi2016-12-301-1/+1
| | | | | | Match the changes in ContactsCommon Change-Id: Ica94f00e6121c550ea0bc1dfe73a52162dccda71
* Messaging: Implement option for swipe to delete.Adnan Begovic2016-12-302-1/+24
| | | | | | No one wants to swipe to archive, that's stupid. Change-Id: Ia8f0fc675582ef343311e60b755e284322f25102
* Show badge icon if any participant in the conversation is work contactTony Mak2016-06-295-14/+99
| | | | | | | Precompute is_enterprise and stored the value in conversation table. Include is_enterprise in the ConversationList view. Change-Id: I2e31bd61c08d25a296aaa3e99cb24631ae2e7976
* Add badge in conversation view if the participant is a work contactTony Mak2016-06-282-0/+22
| | | | | | | TODO: To handle conversation having more than one participants. Bug: 29065176 Change-Id: I3820454bf2b76c151dc3a13d9be270502029160d
* Messenger refuses all file:///data/ urisTavis Bohne2016-05-172-5/+7
| | | | | | | | | | | | | We've been informed it's possible for an app to create a world readable hardlink in L in its own /data directory that links to another apps private data, including Messenger data. The hardlink bypassed our existing checks. So now we simply refuse all file: uris in the /data/ directory. Other apps shouldn't be sending file uris anyway, and we dont know of any that send file:///data/ uris. Bug: 28793303 Change-Id: I778bb2bcb9e11185357093c59fc1fa3f6caa26a1
* Merge "Messaging doesn't allow sharing of its own files" into nyc-devTavis Bohne2016-05-162-2/+24
|\
| * Messaging doesn't allow sharing of its own filesTavis Bohne2016-04-292-2/+24
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | -Previously, Messaging allowed sharing of any file it had permission to reach. This meant that bad apps could share a link to file:///data/data/com.android.messaging/databases/bugle_db and Messaging would happily send all this sensitive information to the target. Worse, a bad app could share a softlink to this file, where the symlink was picture.jpg with the image/jpg type. -Now, when sanitizing attachments, we make sure any filepaths don't lead to any Bugle-specific directories. -getApplicationInfo().dataDir is a symlink to /data/data/com.android.messaging, and appears to be the only directory where we store personal data. -Most apps share as contentUris, including Messaging, so Messaging can still share to itself. Change-Id: Ic464bc1f099029a030793c478aaf88b957d8bad1 Fixes:28076752
* | Add badge icon for work contact in search resultTony Mak2016-05-163-5/+28
| | | | | | | | | | | | | | | | BUG=26021888 BUG=28016344 (cherry picked from commit 6e00763823cd1b27ff88d25d0eb11f8addc3b2e6) Change-Id: If0e2f7b1c58cd064ebfdae8a9b735b391c5009fc
* | Cleanup enterprise feature in ContactUtilTony Mak2016-05-161-15/+4
| | | | | | | | | | | | | | | | | | | | | | 1. Remove isWorkProfileSupported checking, api level checking is enough. 2. Replace the hardcoded uri with the corresponding api. BUG=26797244 BUG=28016344 (cherry picked from commit 0d7a1cce157e4ffb26d5fefb9908bbeffcb1d03c) Change-Id: I76edad19dc6a19aa77b523cb960f716fca08944d
* | Separate work and personal contacts search resultTony Mak2016-05-161-61/+196
| | | | | | | | | | | | | | | | | | | | | | | | | | This change allows sms app to show search result of different directories in different partitions. Currently, only personal default and enterprise default directory are searched. BUG=26021888 BUG=28016344 (cherry picked from commit 59666b32c192bd28807ccd2f9153c796668bdf13) Change-Id: I733ceaae806d13661861126ce61c34108ac7e662
* | Search enterprise directory as well in SMS appTony Mak2016-05-162-24/+101
| | | | | | | | | | | | | | | | | | TODO: Update the UI to show enterprise result separately (b/26021888) Bug: 28016344, 25977180 (cherry picked from commit 5c621e57256f5068a43f1456f9bab1194f0d27b2) Change-Id: I7130ae5e057ed750a29f64c5497a04b868613579
* | Add isAtLeastN in OsUtilVictor Chang2016-05-111-0/+11
|/ | | | | Bug: 28016344 Change-Id: I431b4fed3f2114d1f1b311416a892f608a846e4c
* Messaging app ClassCastException (DecorContext -> Activity) when SMSoIMS is ↵Tom Taylor2016-03-211-2/+1
| | | | | | | | initiated Bug 27649619 Change-Id: I1c0de7c14abd255ceb9d61a377db3276c32fede0
* Access incoming audio files after user taps PlayShri Borde2015-08-216-23/+90
| | | | | | | For platforms with insecure handling of media files, media files should be opened only after the user chooses to play the media. Change-Id: I5f9bbd1f8468a704a5962f0dddd3c8b11bba8bea
* Fix build for latest Guava.Mike Dodd2015-08-121-24/+0
| | | | | | b/23110861 Change-Id: Iccd6e66f996fd00880cc3024085c838235da0adb
* Initial checkin of AOSP Messaging app.Mike Dodd2015-08-12425-0/+102274
| | | | | | b/23110861 Change-Id: I11db999bd10656801e618f78ab2b2ef74136fff1
* Revert "Initial checkin of AOSP Messaging app."Mike Dodd2015-08-12425-102274/+0
| | | | | | This reverts commit 461a34b466cb4b13dbbc2ec6330b31e217b2ac4e. Change-Id: Iac4ca77eeaa94989e91dead49a7959c905bd3078
* Initial checkin of AOSP Messaging app.Mike Dodd2015-08-12425-0/+102274
b/23110861 Change-Id: I9aa980d7569247d6b2ca78f5dcb4502e1eaadb8a