commit | 3e46d7e1a16f04e3624a93907e99cc400a230535 | [log] [tgz] |
---|---|---|
author | Winson <chiuwinson@google.com> | Tue Jun 16 15:12:57 2020 -0700 |
committer | Winson <chiuwinson@google.com> | Tue Jun 16 15:12:57 2020 -0700 |
tree | 459335936704a0a629b5a6c89c2ff96efe5e1892 | |
parent | 26dfdc587fcaef5f68187b6bf1343fd7e2914d32 [diff] |
Revert "Ignores protected broadcasts if not priv-app" Revert of I5bd2bf3bd7c38fd9cc563a02b24bc569495d79ed For now, allow all system apps to declare protected broadcasts. This will be cleaned up in a future change. Bug: 158570769 Change-Id: I54d236c0a6daaa934bd64a3bd05e2654e0e868fe
diff --git a/services/core/java/com/android/server/pm/PackageManagerService.java b/services/core/java/com/android/server/pm/PackageManagerService.java index ae8b3a0..91d9d17 100644 --- a/services/core/java/com/android/server/pm/PackageManagerService.java +++ b/services/core/java/com/android/server/pm/PackageManagerService.java
@@ -11729,6 +11729,8 @@ } } else { parsedPackage + // Non system apps cannot mark any broadcast as protected + .clearProtectedBroadcasts() // non system apps can't be flagged as core .setCoreApp(false) // clear flags not applicable to regular apps @@ -11740,7 +11742,6 @@ } if ((scanFlags & SCAN_AS_PRIVILEGED) == 0) { parsedPackage - .clearProtectedBroadcasts() .markNotActivitiesAsNotExportedIfSingleUser(); }