replicant-vendor_cmsdk/cm/res/AndroidManifest.xml

132 lines
6.9 KiB
XML
Raw Normal View History

<?xml version="1.0" encoding="utf-8"?>
<!--
/**
* Copyright 2015, CyanogenMod Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
-->
<manifest xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:androidprv="http://schemas.android.com/apk/prv/res/android"
package="cyanogenmod.platform"
coreApp="true" android:sharedUserId="android.uid.system"
android:sharedUserLabel="@string/cyanogenmod_system_label">
<!-- Must be required by an, to ensure that only the system can bind to it.
@hide -->
<permission android:name="cyanogenmod.permission.BIND_CUSTOM_TILE_LISTENER_SERVICE"
android:label="@string/permlab_bindCustomTileListenerService"
android:description="@string/permdesc_bindCustomTileListenerService"
android:protectionLevel="signature" />
<!-- Allows a 3rd party application to publish or unpublish a quick settings tile -->
<permission android:name="cyanogenmod.permission.PUBLISH_CUSTOM_TILE"
android:label="@string/permlab_publishCustomTile"
android:description="@string/permdesc_publishCustomTile"
android:icon="@drawable/ic_launcher_cyanogenmod"
android:protectionLevel="normal" />
<!-- Allows system applications to make changes to a subset of system network settings -->
<permission android:name="cyanogenmod.permission.MODIFY_NETWORK_SETTINGS"
android:label="@string/permlab_modifyNetworkSettings"
android:description="@string/permdesc_modifyNetworkSettings"
android:icon="@drawable/ic_launcher_cyanogenmod"
androidprv:allowViaWhitelist="true"
android:protectionLevel="system|signature" />
<!-- Allows system applications to make changes to a subset of system sound settings -->
<permission android:name="cyanogenmod.permission.MODIFY_SOUND_SETTINGS"
android:label="@string/permlab_modifySoundSettings"
android:description="@string/permdesc_modifySoundSettings"
android:icon="@drawable/ic_launcher_cyanogenmod"
android:protectionLevel="normal" />
<!-- Allows a 3rd party to view the phone SIM states and data connection -->
<permission android:name="cyanogenmod.permission.READ_MSIM_PHONE_STATE"
android:label="@string/permlab_readMSPhoneState"
android:description="@string/permdesc_readMSPhoneState"
android:icon="@drawable/ic_launcher_cyanogenmod"
android:protectionLevel="normal" />
<!-- Allows a 3rd party to modify the phone SIM states and data connection -->
<permission android:name="cyanogenmod.permission.MODIFY_MSIM_PHONE_STATE"
android:label="@string/permlab_modifyMSPhoneState"
android:description="@string/permdesc_modifyMSPhoneState"
android:icon="@drawable/ic_launcher_cyanogenmod"
android:protectionLevel="normal" />
<!-- Allows an application access to the CM hardware abstraction framework
<p>Not for use by third-party applications. -->
<permission android:name="cyanogenmod.permission.HARDWARE_ABSTRACTION_ACCESS"
android:label="@string/permlab_useHardwareFramework"
android:description="@string/permdesc_useHardwareFramework"
android:protectionLevel="system|signature" />
<!-- Allows an application to write to CM system settings -->
<permission android:name="cyanogenmod.permission.WRITE_SETTINGS"
android:label="@string/permlab_writeSettings"
android:description="@string/permdesc_writeSettings"
android:protectionLevel="normal" />
<!-- Allows an application to modify system profiles -->
<permission android:name="cyanogenmod.permission.MODIFY_PROFILES"
android:label="@string/permlab_modifyProfiles"
android:description="@string/permdesc_modifyProfiles"
android:protectionLevel="normal" />
<!-- Allows an application to write to secure CM system settings.
<p>Not for use by third-party applications. -->
<permission android:name="cyanogenmod.permission.WRITE_SECURE_SETTINGS"
android:label="@string/permlab_writeSecureSettings"
android:description="@string/permdesc_writeSecureSettings"
android:protectionLevel="signature|system|development" />
<!-- Allows an application to write alarms to the default alarm clock application
<p>Not for use by third-party applications. -->
<permission android:name="cyanogenmod.permission.WRITE_ALARMS"
android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
android:protectionLevel="system|signature"
android:label="@string/permlab_write_alarms"
android:description="@string/permdesc_write_alarms"/>
<!-- Allows an application to manage alarms on the default alarm clock application -->
<permission android:name="cyanogenmod.permission.MANAGE_ALARMS"
android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
android:protectionLevel="normal"
android:label="@string/permlab_manage_alarms"
android:description="@string/permdesc_manage_alarms"/>
<!-- Allows an application to read alarms from the default alarm clock application -->
<permission android:name="cyanogenmod.permission.READ_ALARMS"
android:permissionGroup="android.permission-group.SYSTEM_CLOCK"
android:protectionLevel="normal"
android:label="@string/permlab_read_alarms"
android:description="@string/permdesc_read_alarms"/>
<!-- Allows an application to access persistent property storage
<p>Not for use by third-party applications. -->
<permission android:name="cyanogenmod.permission.MANAGE_PERSISTENT_STORAGE"
android:label="@string/permlab_managePersistentStorage"
android:description="@string/permdesc_managePersistentStorage"
android:protectionLevel="system|signature" />
<application android:process="system"
android:persistent="true"
android:hasCode="false"
android:label="@string/cyanogenmod_system_label"
android:allowClearUserData="false"
android:killAfterRestore="false"
android:supportsRtl="true"/>
</manifest>