<?xml version="1.0" encoding="utf-8"?> <!-- /** * Copyright 2015, CyanogenMod Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ --> <manifest xmlns:android="http://schemas.android.com/apk/res/android" xmlns:androidprv="http://schemas.android.com/apk/prv/res/android" package="cyanogenmod.platform" coreApp="true" android:sharedUserId="android.uid.system" android:sharedUserLabel="@string/cyanogenmod_system_label"> <protected-broadcast android:name="cyanogenmod.intent.action.SCREEN_CAMERA_GESTURE" /> <protected-broadcast android:name="cyanogenmod.intent.action.INITIALIZE_CM_HARDWARE" /> <protected-broadcast android:name="cyanogenmod.intent.action.ACTION_AUDIO_SESSIONS_CHANGED" /> <!-- Must be required by an, to ensure that only the system can bind to it. @hide --> <permission android:name="cyanogenmod.permission.BIND_CUSTOM_TILE_LISTENER_SERVICE" android:label="@string/permlab_bindCustomTileListenerService" android:description="@string/permdesc_bindCustomTileListenerService" android:protectionLevel="signature" /> <!-- Allows a 3rd party application to publish or unpublish a quick settings tile --> <permission android:name="cyanogenmod.permission.PUBLISH_CUSTOM_TILE" android:label="@string/permlab_publishCustomTile" android:description="@string/permdesc_publishCustomTile" android:icon="@drawable/ic_launcher_cyanogenmod" android:protectionLevel="normal" /> <!-- Allows an app to make changes to the airplane mode and mobile data network settings --> <permission android:name="cyanogenmod.permission.MODIFY_NETWORK_SETTINGS" android:label="@string/permlab_modifyNetworkSettings" android:description="@string/permdesc_modifyNetworkSettings" android:icon="@drawable/ic_launcher_cyanogenmod" androidprv:allowViaWhitelist="true" android:protectionLevel="signature|privileged" /> <!-- Allows an app to make changes to the interruption mode sound settings --> <permission android:name="cyanogenmod.permission.MODIFY_SOUND_SETTINGS" android:label="@string/permlab_modifySoundSettings" android:description="@string/permdesc_modifySoundSettings" android:icon="@drawable/ic_launcher_cyanogenmod" android:protectionLevel="normal" /> <!-- Allows a 3rd party to view the phone SIM states and data connection --> <permission android:name="cyanogenmod.permission.READ_MSIM_PHONE_STATE" android:label="@string/permlab_readMSPhoneState" android:description="@string/permdesc_readMSPhoneState" android:icon="@drawable/ic_launcher_cyanogenmod" android:protectionLevel="normal" /> <!-- Allows a 3rd party to modify the phone SIM states and data connection --> <permission android:name="cyanogenmod.permission.MODIFY_MSIM_PHONE_STATE" android:label="@string/permlab_modifyMSPhoneState" android:description="@string/permdesc_modifyMSPhoneState" android:icon="@drawable/ic_launcher_cyanogenmod" android:protectionLevel="normal" /> <!-- Allows an application access to the CM hardware abstraction framework <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.HARDWARE_ABSTRACTION_ACCESS" android:label="@string/permlab_useHardwareFramework" android:description="@string/permdesc_useHardwareFramework" android:protectionLevel="signature|privileged" /> <!-- Allows an application to write to CM system settings --> <permission android:name="cyanogenmod.permission.WRITE_SETTINGS" android:label="@string/permlab_writeSettings" android:description="@string/permdesc_writeSettings" android:protectionLevel="normal" /> <!-- Allows an application to modify system profiles --> <permission android:name="cyanogenmod.permission.MODIFY_PROFILES" android:label="@string/permlab_modifyProfiles" android:description="@string/permdesc_modifyProfiles" android:protectionLevel="normal" /> <!-- Allows an application to write to secure CM system settings. <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.WRITE_SECURE_SETTINGS" android:label="@string/permlab_writeSecureSettings" android:description="@string/permdesc_writeSecureSettings" android:protectionLevel="signature|privileged|development" /> <!-- Allows an application to write alarms to the default alarm clock application <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.WRITE_ALARMS" android:permissionGroup="android.permission-group.SYSTEM_CLOCK" android:protectionLevel="signature|privileged" android:label="@string/permlab_write_alarms" android:description="@string/permdesc_write_alarms"/> <!-- Allows an application to manage alarms on the default alarm clock application --> <permission android:name="cyanogenmod.permission.MANAGE_ALARMS" android:permissionGroup="android.permission-group.SYSTEM_CLOCK" android:protectionLevel="normal" android:label="@string/permlab_manage_alarms" android:description="@string/permdesc_manage_alarms"/> <!-- Allows an application to read alarms from the default alarm clock application --> <permission android:name="cyanogenmod.permission.READ_ALARMS" android:permissionGroup="android.permission-group.SYSTEM_CLOCK" android:protectionLevel="normal" android:label="@string/permlab_read_alarms" android:description="@string/permdesc_read_alarms"/> <!-- Allows an application to access persistent property storage <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.MANAGE_PERSISTENT_STORAGE" android:label="@string/permlab_managePersistentStorage" android:description="@string/permdesc_managePersistentStorage" android:protectionLevel="signature|privileged" /> <!-- Permission for accessing a provider of app suggestions <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.ACCESS_APP_SUGGESTIONS" android:label="@string/permlab_accessAppSuggestions" android:description="@string/permdesc_accessAppSuggestions" android:protectionLevel="signature|privileged|development" /> <!-- Permission for adding/removing applications to protected apps <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.PROTECTED_APP" android:label="@string/permlab_protectedApp" android:description="@string/permdesc_protectedApp" android:protectionLevel="signature|privileged" /> <!-- Allows an application to be used as a third party keyguard --> <permission android:name="cyanogenmod.permission.THIRD_PARTY_KEYGUARD" android:label="@string/permlab_thirdPartyKeyguard" android:description="@string/permdesc_thirdPartyKeyguard" android:protectionLevel="normal" /> <!-- Allows an application to use ThemeManager --> <permission android:name="cyanogenmod.permission.ACCESS_THEME_MANAGER" android:label="@string/permlab_accessThemeService" android:description="@string/permdesc_accessThemeService" android:protectionLevel="normal" /> <!-- Allows an application to read the current theme configuration and get information about the various themes currently installed --> <permission android:name="cyanogenmod.permission.READ_THEMES" android:label="@string/permlab_readThemes" android:description="@string/permdesc_readThemesDesc" android:protectionLevel="normal" /> <!-- Allows an application to write the current theme configuration and write information about the various themes currently installed. Changing themes should be done through the service ACCESS_THEME_MANAGER --> <permission android:name="cyanogenmod.permission.WRITE_THEMES" android:label="@string/permlab_writeThemes" android:description="@string/permdesc_writeThemesDesc" android:protectionLevel="normal" /> <!-- Allows low-level access to performance management. <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.PERFORMANCE_ACCESS" android:label="@string/permlab_perfAccess" android:description="@string/permdesc_perfAccessDesc" android:protectionLevel="signature|privileged" /> <!-- Allows an application to access the live lock screen manager. --> <permission android:name="cyanogenmod.permission.LIVE_LOCK_SCREEN_MANAGER_ACCESS" android:label="@string/permlab_accessLiveLockScreenService" android:description="@string/permdesc_accessLiveLockScreenService" android:protectionLevel="dangerous" /> <!-- Allows system apps privileged access to the live lock screen manager. @hide --> <permission android:name="cyanogenmod.permission.LIVE_LOCK_SCREEN_MANAGER_ACCESS_PRIVATE" android:label="@string/permlab_accessLiveLockScreenServicePrivate" android:description="@string/permdesc_accessLiveLockScreenServicePrivate" android:protectionLevel="signature|privileged" androidprv:allowViaWhitelist="true" /> <!-- Permission required to be held for a service that provides a LiveLockScreenManagerService @hide --> <permission android:name="cyanogenmod.permission.LIVE_LOCK_SCREEN_MANAGER_PROVIDER" android:label="@string/permlab_accessLiveLockScreenServiceProvider" android:description="@string/permdesc_accessLiveLockScreenServiceProvider" android:protectionLevel="signature|privileged" /> <!-- Allows an application to read the weather content from the provider--> <permission android:name="cyanogenmod.permission.READ_WEATHER" android:label="@string/permlab_weather_read" android:description="@string/permdesc_weather_read" android:protectionLevel="normal"/> <!-- Allows an application to update the content of the weather provider <p>Not for use by third-party applications. --> <permission android:name="cyanogenmod.permission.WRITE_WEATHER" android:label="@string/permlab_weather_write" android:description="@string/permdesc_weather_write" android:protectionLevel="signature|privileged" /> <!-- Allows an application to be identified as a weather provider service --> <permission android:name="cyanogenmod.permission.BIND_WEATHER_PROVIDER_SERVICE" android:label="@string/permlab_weather_bind" android:description="@string/permdesc_weather_bind" android:protectionLevel="signature"/> <!-- Allows an application to observe system-wide changes to audio sessions @hide --> <permission android:name="cyanogenmod.permission.OBSERVE_AUDIO_SESSIONS" android:label="@string/permlab_observe_audio_sessions" android:description="@string/permdesc_observe_audio_sessions" android:protectionLevel="normal"/> <!-- Allows an application to access the weather service. <p>Although the protection is normal, this permission should be required ONLY by those apps meant to do something meaningful with the data provided by the service (LockClock, SysUI)--> <permission android:name="cyanogenmod.permission.ACCESS_WEATHER_MANAGER" android:label="@string/permlab_weather_access_mgr" android:description="@string/permdesc_weather_access_mgr" android:protectionLevel="normal"/> <!-- Allows an application to manage LiveDisplay --> <permission android:name="cyanogenmod.permission.MANAGE_LIVEDISPLAY" android:label="@string/permlab_manageLiveDisplay" android:description="@string/permdesc_manageLiveDisplay" android:icon="@drawable/ic_launcher_cyanogenmod" android:protectionLevel="normal" /> <application android:process="system" android:persistent="true" android:hasCode="false" android:label="@string/cyanogenmod_system_label" android:allowClearUserData="false" android:killAfterRestore="false" android:supportsRtl="true"/> <!-- Permission for reading the DataUsage database --> <permission android:name="cyanogenmod.permission.READ_DATAUSAGE" android:label="@string/permlab_dataUsageRead" android:description="@string/permdesc_dataUsageRead" android:protectionLevel="signature|privileged" /> <!-- Permission for writing the DataUsage database --> <permission android:name="cyanogenmod.permission.WRITE_DATAUSAGE" android:label="@string/permlab_dataUsageWrite" android:description="@string/permdesc_dataUsageWrite" android:protectionLevel="signature|privileged" /> </manifest>