Add Traditional Chinese translations#2
Open
nnn950711 wants to merge 191 commits intoLunaris-AOSP:16.2from
Open
Add Traditional Chinese translations#2nnn950711 wants to merge 191 commits intoLunaris-AOSP:16.2from
nnn950711 wants to merge 191 commits intoLunaris-AOSP:16.2from
Conversation
Commit "frameworks: Add unlinked ringtone and notification volumes" introduced STREAM_NOTIFICATION. However, this stream type, although marked as important, was not added to the list in shouldBeVisibleH. As a result, the volume panel behavior of STREAM_NOTIFICATION deviates from other user-facing streams like media, call and ring. This change adds STREAM_NOTIFICATION so the behavior becomes consistent. Change-Id: I092c5bf0ae8cbee85af6adfa0da308dfdb60e66a Signed-off-by: Jesse Chan <jc@lineageos.org> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…sic stream
If there are two visible rows and the user touches the default (music)
row, the other row disappears immediately. Avoid this behaviour by
tracking the row with which this panel was created and keep showing
that row if the user adjusts the music stream.
Test: While receiving a call both rows are touchable and the additional
row does not disappear when adjusting the music stream.
Change-Id: I4e14a0ea50c5cc41cb279c6fbfc8a7d6e6d1ba61
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
We shouldn't be playing volume dialog specific haptic feedback
when the dialog is not visible.
Test: Call am.setRingerModeInternal(AudioManager.RINGER_MODE_VIBRATE)
from external application, observe that there's no vibration.
Change-Id: I10ad1e0259092c2297d96f083161395275467781
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I20aacbda4e1a90cad3120ed6f4a65c8c884521cf Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…left These layouts are already in layouts which set gravity to the same value, making the layout gravity set here redundant. Additionally, invert the gravities when the gravitiy is set to left by R.integer.volume_dialog_gravity. Change-Id: Ia989ab507512443949b3a7994166d56f97dde9df Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I025ae38963d7ca929e01cec26c209d86718ce0e7 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I2cc18aea9bf4afb51c5faee7af6437f6c047416b Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I23ffc447f512446688a20bad5639f1a1719f7660 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I8159e029f14896e1bae3bd1047618ffa69724ba9 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Co-authored-by: Alex Cruz <alex@dirtyunicorns.com> Co-authored-by: Arian <arian.kulmer@web.de> Co-authored-by: Bruno Martins <bgcngm@gmail.com> Co-authored-by: LuK1337 <priv.luk@gmail.com> Co-authored-by: programminghoch10 <hoch10@kabelbw.de> Co-authored-by: Sam Mortimer <sam@mortimer.me.uk> Change-Id: If22c97eb1ce4cfb13396d182d90786f4b7acaee7 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Co-authored-by: Christian Hoffmann <chrmhoffmann@gmail.com> Change-Id: I780a9851eaa209204b6be2ad26506e4eab4dc84e Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: Ia851c70871ef561398203b358e8c4b32995f30cd Signed-off-by: Ghosuto <clash.raja10@gmail.com>
To simplify the handling of expanded volume rows with the dialog on the left and right side, we use the layout direction to ensure the first row is the outmost one. However, when the system layout direction was set again but did not change its actual value after initDialog, this setting was overriden and since no config change was indicated (mConfigChanged), the system layout direction was used when opening the dialog the next time. This lead to the first row not being the outmost one. To solve that issue, just ignore system layout direction changes. Test: 1. Open volume dialog 2. Eject and insert SIM card 3. Enter PIN, wait a second until the locale is set 4. Open the dialog and verify the the main row is the outmost one. Change-Id: I0b9f15972d0416647ba045b7776bed8e6250d57f Signed-off-by: danielml <daniel@danielml.dev> Signed-off-by: Arian <arian.kulmer@web.de> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
When a row is added while the dialog was open, for example when a remote stream
is started, the row is added as the innermost row. Due to the hidden expandable
rows we need to set the x-translation for the new row for it to not be in the
middle of the screen.
Test: 1. Start a remote stream in spotify
2. Force close spotify
3. Open spotify and immediately open the volume dialog by pressing a volume key
4. Ensure the row is placed next to the default row
Change-Id: I8d5731acf85cad9b50a00c0bed116fcb1cff4f92
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…ew Volmue Panel is enabled" This reverts commit 0e0bc10. Reason: * Live caption is now shown in the new volume panel but we don't use it so it's not available to the user. * So bring it back as like 14 on the bottom of the volume dialog. Change-Id: Ia54cccf50c2b9b625d376a0a0165417f0c665184 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
- in combined data 5/5 looks good but not in qs or non-combined Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Allows non-factory packages to be used. Fixes: https://gitlab.com/LineageOS/issues/android/-/issues/8764 Change-Id: I318ae9402c7d55ecf2d400a22050d0cb4053ed2b Signed-off-by: Ghosuto <clash.raja10@gmail.com>
- Thanks crdroid for icon Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Signed-off-by: Dmitrii <bankersenator@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Signed-off-by: Dmitrii <bankersenator@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
after google changes in QPR2 Signed-off-by: Dmitrii <bankersenator@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
… settings Change-Id: I329d640625642cf99da168f431d9e9dadd926ae3 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…1/2] - Allow to hide battery in doze - Add a method to determine CPU temperature, battery temp Co-authored-by: Aston-Martinn <advaithbhat9@gmail.com> Co-authored-by: eyosen <abittin@gmail.com> Change-Id: I2c55f607a9ad1a9693618d5f23ff65a2a203efa1 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I879dc943394d7c1f11170619ca07c356fbda7852 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…aches charging threshold Change-Id: I40011190d3d9ad5264afdde5bd0720bb60ee38fe Signed-off-by: rmp22 <195054967+rmp22@users.noreply.github.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I6888160583757474cde6c18b1992ac0498ab0c4b Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Signed-off-by: Dmitrii <bankersenator@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: Ib9034fd8f14ffb149c2255c93c0b6de695314f7c Signed-off-by: rmp22 <195054967+rmp22@users.noreply.github.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Change-Id: I9e4b3f33e58377afb8f4114c2429bdcf4fdc6da4 Signed-off-by: rmp22 <195054967+rmp22@users.noreply.github.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Bug: b/366405211 Test: atest LockTaskControllerTest.java Flag: EXEMPT BUGFIX (cherry picked from commit 575845147cb48d71893f12665bae2e8892aa7e06) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:8a0f8df37587f1677cc6ab80a567d8f82ff78121 Merged-In: Ia9f54b229b998e29da53436ed6ed64214903724c Change-Id: Ia9f54b229b998e29da53436ed6ed64214903724c Signed-off-by: Ghosuto <clash.raja10@gmail.com>
They should not be considered "system" app for the purposes of attribution tag vaildation Bug: 443742082 Test: atest AppOpsMemoryUsageTest Flag: EXEMPT CVE_FIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:1bc6b146137f76589146dff5cd82363de7ccfb7d Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:9cacc6180df8eb4451a23f122f457e413a299911 Merged-In: I0c4ac8eaa8966027ad01375dde58b05febec3ffb Change-Id: I0c4ac8eaa8966027ad01375dde58b05febec3ffb Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Only trusted proxies should be allowed to specify tags. Also prevents startOperationDryRun from editing the know attribution tags, as the dry run should change no state. Bug: 445917646 Test: atest AttributionTest Flag: EXEMPT CVE_FIX (cherry picked from commit 110db0acb84cbd21f9da9391ab242d141ebf390c) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:fe871e3cd3fb956814f97acecfaf3b84fd0df7b8 Merged-In: I14ab1389384fd28009edd9cceceaacdb97fb96e5 Change-Id: I14ab1389384fd28009edd9cceceaacdb97fb96e5 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Bug: 453649815 Test: atest AppSecurityTests Flag: EXEMPT CVE_FIX (cherry picked from commit 595cf99ecd42927eebf804638a4623313f3f14db) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:63f06715cc924477ccb043e99df0592c75f2bbfc Merged-In: I673ad83d05c9825177967e4f0a960e8841610b71 Change-Id: I673ad83d05c9825177967e4f0a960e8841610b71 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Get the valid a11y tile services outside of the lock mechanism to prevent AccessibilityManagerService holding the lock for a long time while processing valid tile services by calling PackageManager Bug: 449392803 Bug: 441506794 Test: manual Test: atest AccessibilityUserStateTest Test: atest AccessibilityTileUtilsTest Test: atest AccessibilityManagerServiceTest Flag: EXEMPT CVE_FIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:637f5b4aa4fbc87010f49f69555f6d14caef6a1f Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:25fdbe5f215f24201f4c2e526cbfa801f6f1d10b Merged-In: Id05b4fe4ee0619d2bdc0421e8bfc5b4d62e322e0 Change-Id: Id05b4fe4ee0619d2bdc0421e8bfc5b4d62e322e0 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
If the new setting key is not set, we should use the value of the old ones as the default value. Bug: 444673089 Test: atest BiometricServiceTest Flag: EXEMPT BUGFIX (cherry picked from commit a3799e443e9fdbbcbc96824b8d2fc1e4c683bb7e) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:2b8bc2b15f2aceb4e2a379209997afce16427e76 Merged-In: I902c7fd9781037ba05b30821b4fa22aa1509f3fd Change-Id: I902c7fd9781037ba05b30821b4fa22aa1509f3fd Signed-off-by: Ghosuto <clash.raja10@gmail.com>
An IME's metadata can reference arbitrarily large strings (e.g.,
@string/large_text), which can lead to OOM or large Binder transactions
during parsing. The previous check only validated the raw XML file
size, failing to account for the size of these resolved string
references.
This patch hardens the InputMethodInfo constructor by enforcing a 200KB
cumulative limit on all resolved metadata attributes. A new
MetadataReadBytesTracker now sums the actual size of all read
attributes, including the full length of any strings, and parsing is
aborted if this 200KB limit is exceeded.
Bug: 449416164
Bug: 449181366
Bug: 449393786
Bug: 449227003
Test: CtsInputMethodTestCases:{InputMethodRegistrationTest,InputMethodInfoTest}
Test: InputMethodCoreTests:{InputMethodSubtypeArrayTest,InputMethodInfoTest}
Flag: EXEMPT BUGFIX
(cherry picked from commit 7afc13faace7cfafd0353482db33504c5e269d69)
Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:75fd0e67bd2945d7314b56c24850bd9f1c2c4dbf
Merged-In: I43f7be8eb80abeb39863a3b01d3a606beb90120c
Change-Id: I43f7be8eb80abeb39863a3b01d3a606beb90120c
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
IMM#getEnabledInputMethodSubtypeList() can return a large list of
subtypes, which may cause a TransactionTooLargeException.
This patch introduces InputMethodSubtypeSafeList to wrap the list as a
byte array, avoiding the exception. This mirrors the existing
InputMethodInfoSafeList pattern introduced in [1].
Additionally, this change extracts the common marshalling logic from
InputMethodInfoSafeList into a new AbstractSafeList and refactors both
SafeList classes to extend it.
[1] I0a7667070fcdf17d34b248a5988c38064588718a
DISABLE_TOPIC_PROTECTOR
Bug: 449416164
Bug: 449181366
Bug: 449393786
Bug: 449227003
Test: CtsInputMethodTestCases:{InputMethodRegistrationTest,InputMethodInfoTest}
Test: InputMethodCoreTests
Flag: EXEMPT BUGFIX
(cherry picked from commit 1d68a1099be2b99e8410dad01822851287994682)
Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:46388aba14b1698df8c98e96d97b50130d1ce085
Merged-In: Ied64a9f018fd3e79cfc51ccd82d361b43e5f29dc
Change-Id: Ied64a9f018fd3e79cfc51ccd82d361b43e5f29dc
Signed-off-by: Ghosuto <clash.raja10@gmail.com>
loadDescription was potentially vulnerable to an attack which causes a DoS exploit by injecting a maliciously large string into the Receiver's label. Bug: 443062265 Test: manual Flag: EXEMPT BUGFIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:06a5b2327caa3aa8843496458e98b9bb070df6e5 Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:2e378635be2c25ffe8c065ae771fc6d1ba74b5c8 Merged-In: Icab26c4b77e73f0fcb9a560e3211482ebe2f37bf Change-Id: Icab26c4b77e73f0fcb9a560e3211482ebe2f37bf Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Bug: 457742426 Test: atest ActivityStarterTests Test: Verified via test app Flag: EXEMPT CVE_FIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:3bb240273822e41f3c6911c60d15983a600308f7 Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:8e6622267809c37fa7989e4f07af3834f39f09e2 Merged-In: Ic9637c56803b00acc9fca59f8092ed02dd46a4fb Change-Id: Ic9637c56803b00acc9fca59f8092ed02dd46a4fb Signed-off-by: Ghosuto <clash.raja10@gmail.com>
If the flag is not explicitly unset, an app could set this flag, leading to unexpected behaviour if the install is not actually from a managed user or profile. Bug: 459461121 Test: atest PackageManagerShellCommandInstallTest#testSessionCreationWithManagedUserOrProfileFlag_notFromManagedProfile Flag: EXEMPT BUGFIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:a1435a13275c31df38f90f0e2790723a3cb6177a Change-Id: I21bbbf628e97244d469eb23ce0558dbf560b7618 Merged-In: I21bbbf628e97244d469eb23ce0558dbf560b7618 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
…llation" This reverts commit 29962260bd043c197e411b690e862a318b31bae5. Fix the issues and reland the patch. Bypass the unknown source user restrictions check when either of the following two conditions is met: 1. An installer with the INSTALL_PACKAGES permission initiated the installation via the PackageInstaller APIs and not via an ACTION_VIEW or ACTION_INSTALL_PACKAGE intent. 2. An installer is a privileged app and initiated the installer via the ACTION_INSTALL_PACKAGE or ACTION_VIEW intent, but it has set the EXTRA_NOT_UNKNOWN_SOURCE flag to be true in the intent. Flag: EXEMPT BUGFIX Bug: 438352252 Test: atest CtsDevicePolicyManagerTestCases:MixedProfileOwnerTest#testPackageInstallUserRestrictions Test: atest CtsDevicePolicyManagerTestCases:MixedManagedProfileOwnerTest#testPackageInstallUserRestrictions Test: atest CtsPackageInstallTestCases:IntentTest Test: atest CtsPackageInstallSessionTestCases:SessionTest Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:81f83fdb0944d0d8a3337d2578d73dd77d60143b Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:6e0b7c02e54a0c8f26ecb2eefd136677df7decfc Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:9d20d0ae8fef770df8788e287feee1bdaa1d82fe Merged-In: Ib917acb2c4738f6a4758b8ca149b80943f00acca Change-Id: Ib917acb2c4738f6a4758b8ca149b80943f00acca Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Bypass the unknown source check for the device policy and the AppOps permission when either of the following two conditions is met: 1. An installer with the INSTALL_PACKAGES permission initiated the installation via the PackageInstaller APIs and not via an ACTION_VIEW or ACTION_INSTALL_PACKAGE intent. 2. An installer is a privileged app and it has set the EXTRA_NOT_UNKNOWN_SOURCE flag to be true in the intent. Flag: EXEMPT BUGFIX Bug: 461467954 Test: atest CtsDevicePolicyManagerTestCases:MixedProfileOwnerTest#testPackageInstallUserRestrictions Test: atest CtsDevicePolicyManagerTestCases:MixedManagedProfileOwnerTest#testPackageInstallUserRestrictions Test: atest CtsPackageInstallTestCases:IntentTest Test: atest CtsPackageInstallSessionTestCases:SessionTest Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:3a8cafbc916bb16f08093cd138a4f3d4dc71b5a0 DISABLE_TOPIC_PROTECTOR Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:2037b1942fa03b2bcef1a594391a9066843e12b9 Merged-In: I66e863cf06566ddc08ad78a61dd82a548cde5e4c Change-Id: I66e863cf06566ddc08ad78a61dd82a548cde5e4c Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Test: NotificationGutsManagerTest Bug: 378087531 Flag: EXEMPT BUGFIX (cherry picked from commit a6280c4ccf96685eed5dc57c2bd9cbbe04209bf1) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:2533e349017a749e8b6bf3039958c3cc7428f754 Merged-In: Ic4ab842763d2d9473adcfc426a64434aec5c6ed2 Change-Id: Ic4ab842763d2d9473adcfc426a64434aec5c6ed2 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Now with fewer class cast exceptions Test: ConversationNotification Test: NotificationManagerServiceTest Bug: 433746973 Flag: EXEMPT BUGFIX (cherry picked from commit 71d4afae00c7d6d9238f8ec82303e1e13da50fbb) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:f64c1e377842d9a8df814bcbad831bd4ce01583d Merged-In: I3022e010de95f14dcd0d09d123684ee265101e0a Change-Id: I3022e010de95f14dcd0d09d123684ee265101e0a Signed-off-by: Ghosuto <clash.raja10@gmail.com>
The previous change in ag/35590474 only checked the length of component names set via MediaSession.setMediaButtonReceiver(PendingIntent) [1] and not via MediaSession.setMediaButtonBroadcastReceiver(android.content.ComponentName) [2] as highlighted in b/433250316#comment72. [1] https://developer.android.com/reference/android/media/session/MediaSession#setMediaButtonBroadcastReceiver(android.content.ComponentName) [2] https://developer.android.com/reference/android/media/session/MediaSession#setMediaButtonBroadcastReceiver(android.content.ComponentName) Bug: 433250316 Test: Presubmit Flag: EXEMPT BUGFIX Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:d09400d72573c2e6124ae28dd9bb68139c9598a5 Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:23c44648eaddf4cb17ff6b77975a5f43c1293048 Merged-In: I7ef6bb0015f2501559793129ca62881911e7b9eb Change-Id: I7ef6bb0015f2501559793129ca62881911e7b9eb Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Test: manually Bug: 442392902 Flag: EXEMPT bugfix Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:13714bcfaff6ef1c16d0aa3d359b1c8bc1859ac3 Merged-In: I94b96d98608d6702e1d3a9581e135280149bf7e1 Change-Id: I94b96d98608d6702e1d3a9581e135280149bf7e1 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Add a blocklist to CarrierConfigLoader.overrideConfig to prevent certain sensitive carrier config keys from being overridden on user builds. The following keys are now blocklisted: KEY_SATELLITE_ENTITLEMENT_SUPPORTED_BOOL KEY_SATELLITE_DATA_SUPPORT_MODE_INT Attempting to override these keys on a user build will result in a SecurityException. This restriction does not affect userdebug or eng builds, where overriding these values for testing purposes is still allowed. Test: Added CarrierConfigLoaderTest#testOverrideConfig_blockedKeys to verify the new logic. Flag: EXEMPT BUGFIX Bug: 442272360 Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:9127724a48d3cf4386c2ea1f4369f4042b484bbe Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:ebdb85bd47db13c7d4893814c194ee3dbb0176a9 Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:14d4b99129806b97340fd1b6b3db103cef4d5152 Merged-In: I8bc6f72854ce664b70b852f49c4136cbba31d5e5 Change-Id: I8bc6f72854ce664b70b852f49c4136cbba31d5e5 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
Trying to activate additional packages/components will be silently rejected. Bug: 428701593 Test: atest ManagedServicesTest NotificationManagerServiceTest Flag: com.android.server.notification.limit_managed_services_count (cherry picked from commit a132684) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:182548fd95b0f245385e5dc45efd2cbd4cd35b57 Merged-In: Iddd8044997c41f97369b768f4da5e49efc43ad06 Change-Id: Iddd8044997c41f97369b768f4da5e49efc43ad06 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
When a system app is re-enabled after the update is uninstalled, when the system app has shared uid, the current code doesn't support directly reusing the disabled package setting. Instead, the preloaded version is re-scanned and installed as a new app, which can bring breaking behavior of changed UIDs when the manifest has sharedUserMaxSdkVersion. This change fixes the bug where registerExistingAppId fails when it comes to shared uid, therefore directly reuses the disabled package setting, consistent with the behavior for non-shared-uid system apps. FLAG: EXEMPT BUGFIX Test: manually with system-app-test.sh BUG: 454062218 (cherry picked from commit 6b5ea2f7fbf50313d46e54e0d8f8c18c398e4869) Cherrypick-From: https://googleplex-android-review.googlesource.com/q/commit:4b32b0bd6876ecc25d60d95431763bf618699880 Merged-In: I417cec27697a210416027e862a5e5d207d268b82 Change-Id: I417cec27697a210416027e862a5e5d207d268b82 Signed-off-by: Ghosuto <clash.raja10@gmail.com>
* Real vbmeta digest from system property (not random) Co-authored-by: Abhay Singh Gill <abhaygill017@gmail.com> Signed-off-by: Dmitrii <bankersenator@gmail.com> Signed-off-by: Pranav Vashi <neobuddy89@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
* Replace periodic job at every 5 seconds to one-shot timeout that runs only when progress is already finished. * This reduces overhead and performs same clean up but without waking up every 5 seconds. Signed-off-by: Pranav Vashi <neobuddy89@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
* Otherwise, we see compact mode changing to expanded before disappearing. Signed-off-by: Pranav Vashi <neobuddy89@gmail.com> Signed-off-by: Ghosuto <clash.raja10@gmail.com>
f24e30d to
97383a2
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
No description provided.