blob: 3c876f36d12d2016adc243a76ce80a20ac68486b [file] [log] [blame]
/*
* Copyright (C) 2024 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.provider;
import android.util.ArraySet;
import java.util.Arrays;
import java.util.Set;
/**
* Contains the list of namespaces in which any flag can be written by adb without root
* permissions.
* <p>
* A security review is required for any namespace that's added to this list. To add to
* the list, create a change and tag the OWNER. In the commit message, include a
* description of the flag's functionality, and a justification for why it needs to be
* allowlisted.
* @hide
*/
final class WritableNamespaces {
public static final Set<String> ALLOWLIST =
new ArraySet<String>(Arrays.asList(
"captive_portal_login",
"connectivity",
"exo",
"nearby",
"netd_native",
"network_security",
"on_device_personalization",
"tethering",
"tethering_u_or_later_native",
"thread_network"
));
}