auto import from //depot/cupcake/@135843
diff --git a/packages/SettingsProvider/src/com/android/providers/settings/DatabaseHelper.java b/packages/SettingsProvider/src/com/android/providers/settings/DatabaseHelper.java
new file mode 100644
index 0000000..f8b5700
--- /dev/null
+++ b/packages/SettingsProvider/src/com/android/providers/settings/DatabaseHelper.java
@@ -0,0 +1,680 @@
+/*
+ * Copyright (C) 2007 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.android.providers.settings;
+
+import android.content.ComponentName;
+import android.content.ContentValues;
+import android.content.Context;
+import android.content.Intent;
+import android.content.pm.ActivityInfo;
+import android.content.pm.PackageManager;
+import android.content.res.Resources;
+import android.database.Cursor;
+import android.database.sqlite.SQLiteDatabase;
+import android.database.sqlite.SQLiteOpenHelper;
+import android.database.sqlite.SQLiteStatement;
+import android.media.AudioManager;
+import android.media.AudioService;
+import android.net.ConnectivityManager;
+import android.os.Environment;
+import android.os.SystemProperties;
+import android.provider.Settings;
+import android.text.TextUtils;
+import android.util.Config;
+import android.util.Log;
+import android.util.Xml;
+import com.android.internal.util.XmlUtils;
+
+import com.android.internal.widget.LockPatternUtils;
+import com.android.internal.widget.LockPatternView;
+
+import org.xmlpull.v1.XmlPullParser;
+import org.xmlpull.v1.XmlPullParserException;
+
+import java.io.File;
+import java.io.FileNotFoundException;
+import java.io.FileReader;
+import java.io.IOException;
+import java.util.List;
+
+/**
+ * Database helper class for {@link SettingsProvider}.
+ * Mostly just has a bit {@link #onCreate} to initialize the database.
+ */
+class DatabaseHelper extends SQLiteOpenHelper {
+ /**
+ * Path to file containing default bookmarks, relative to ANDROID_ROOT.
+ */
+ private static final String DEFAULT_BOOKMARKS_PATH = "etc/bookmarks.xml";
+
+ private static final String TAG = "SettingsProvider";
+ private static final String DATABASE_NAME = "settings.db";
+ private static final int DATABASE_VERSION = 33;
+
+ private Context mContext;
+
+ public DatabaseHelper(Context context) {
+ super(context, DATABASE_NAME, null, DATABASE_VERSION);
+ mContext = context;
+ }
+
+ private void createSecureTable(SQLiteDatabase db) {
+ db.execSQL("CREATE TABLE secure (" +
+ "_id INTEGER PRIMARY KEY AUTOINCREMENT," +
+ "name TEXT UNIQUE ON CONFLICT REPLACE," +
+ "value TEXT" +
+ ");");
+ db.execSQL("CREATE INDEX secureIndex1 ON secure (name);");
+ }
+
+ @Override
+ public void onCreate(SQLiteDatabase db) {
+ db.execSQL("CREATE TABLE system (" +
+ "_id INTEGER PRIMARY KEY AUTOINCREMENT," +
+ "name TEXT UNIQUE ON CONFLICT REPLACE," +
+ "value TEXT" +
+ ");");
+ db.execSQL("CREATE INDEX systemIndex1 ON system (name);");
+
+ createSecureTable(db);
+
+ db.execSQL("CREATE TABLE gservices (" +
+ "_id INTEGER PRIMARY KEY AUTOINCREMENT," +
+ "name TEXT UNIQUE ON CONFLICT REPLACE," +
+ "value TEXT" +
+ ");");
+ db.execSQL("CREATE INDEX gservicesIndex1 ON gservices (name);");
+
+ db.execSQL("CREATE TABLE bluetooth_devices (" +
+ "_id INTEGER PRIMARY KEY," +
+ "name TEXT," +
+ "addr TEXT," +
+ "channel INTEGER," +
+ "type INTEGER" +
+ ");");
+
+ db.execSQL("CREATE TABLE bookmarks (" +
+ "_id INTEGER PRIMARY KEY," +
+ "title TEXT," +
+ "folder TEXT," +
+ "intent TEXT," +
+ "shortcut INTEGER," +
+ "ordering INTEGER" +
+ ");");
+
+ db.execSQL("CREATE INDEX bookmarksIndex1 ON bookmarks (folder);");
+ db.execSQL("CREATE INDEX bookmarksIndex2 ON bookmarks (shortcut);");
+
+ // Populate bookmarks table with initial bookmarks
+ loadBookmarks(db);
+
+ // Load initial volume levels into DB
+ loadVolumeLevels(db);
+
+ // Load inital settings values
+ loadSettings(db);
+ }
+
+ @Override
+ public void onUpgrade(SQLiteDatabase db, int oldVersion, int currentVersion) {
+ Log.w(TAG, "Upgrading settings database from version " + oldVersion + " to "
+ + currentVersion);
+
+ int upgradeVersion = oldVersion;
+
+ // Pattern for upgrade blocks:
+ //
+ // if (upgradeVersion == [the DATABASE_VERSION you set] - 1) {
+ // .. your upgrade logic..
+ // upgradeVersion = [the DATABASE_VERSION you set]
+ // }
+
+ if (upgradeVersion == 20) {
+ /*
+ * Version 21 is part of the volume control refresh. There is no
+ * longer a UI-visible for setting notification vibrate on/off (in
+ * our design), but the functionality still exists. Force the
+ * notification vibrate to on.
+ */
+ loadVibrateSetting(db, true);
+ if (Config.LOGD) Log.d(TAG, "Reset system vibrate setting");
+
+ upgradeVersion = 21;
+ }
+
+ if (upgradeVersion < 22) {
+ upgradeVersion = 22;
+ // Upgrade the lock gesture storage location and format
+ upgradeLockPatternLocation(db);
+ }
+
+ if (upgradeVersion < 23) {
+ db.execSQL("UPDATE favorites SET iconResource=0 WHERE iconType=0");
+ upgradeVersion = 23;
+ }
+
+ if (upgradeVersion == 23) {
+ db.beginTransaction();
+ try {
+ db.execSQL("ALTER TABLE favorites ADD spanX INTEGER");
+ db.execSQL("ALTER TABLE favorites ADD spanY INTEGER");
+ // Shortcuts, applications, folders
+ db.execSQL("UPDATE favorites SET spanX=1, spanY=1 WHERE itemType<=0");
+ // Photo frames, clocks
+ db.execSQL("UPDATE favorites SET spanX=2, spanY=2 WHERE itemType=1000 or itemType=1002");
+ // Search boxes
+ db.execSQL("UPDATE favorites SET spanX=4, spanY=1 WHERE itemType=1001");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 24;
+ }
+
+ if (upgradeVersion == 24) {
+ db.beginTransaction();
+ try {
+ // The value of the constants for preferring wifi or preferring mobile have been
+ // swapped, so reload the default.
+ db.execSQL("DELETE FROM system WHERE name='network_preference'");
+ db.execSQL("INSERT INTO system ('name', 'value') values ('network_preference', '" +
+ ConnectivityManager.DEFAULT_NETWORK_PREFERENCE + "')");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 25;
+ }
+
+ if (upgradeVersion == 25) {
+ db.beginTransaction();
+ try {
+ db.execSQL("ALTER TABLE favorites ADD uri TEXT");
+ db.execSQL("ALTER TABLE favorites ADD displayMode INTEGER");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 26;
+ }
+
+ if (upgradeVersion == 26) {
+ // This introduces the new secure settings table.
+ db.beginTransaction();
+ try {
+ createSecureTable(db);
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 27;
+ }
+
+ if (upgradeVersion == 27) {
+ // Copy settings values from 'system' to 'secure' and delete them from 'system'
+ SQLiteStatement insertStmt = null;
+ SQLiteStatement deleteStmt = null;
+
+ db.beginTransaction();
+ try {
+ insertStmt =
+ db.compileStatement("INSERT INTO secure (name,value) SELECT name,value FROM "
+ + "system WHERE name=?");
+ deleteStmt = db.compileStatement("DELETE FROM system WHERE name=?");
+
+ String[] settingsToMove = {
+ Settings.Secure.ADB_ENABLED,
+ Settings.Secure.ANDROID_ID,
+ Settings.Secure.BLUETOOTH_ON,
+ Settings.Secure.DATA_ROAMING,
+ Settings.Secure.DEVICE_PROVISIONED,
+ Settings.Secure.HTTP_PROXY,
+ Settings.Secure.INSTALL_NON_MARKET_APPS,
+ Settings.Secure.LOCATION_PROVIDERS_ALLOWED,
+ Settings.Secure.LOGGING_ID,
+ Settings.Secure.NETWORK_PREFERENCE,
+ Settings.Secure.PARENTAL_CONTROL_ENABLED,
+ Settings.Secure.PARENTAL_CONTROL_LAST_UPDATE,
+ Settings.Secure.PARENTAL_CONTROL_REDIRECT_URL,
+ Settings.Secure.SETTINGS_CLASSNAME,
+ Settings.Secure.USB_MASS_STORAGE_ENABLED,
+ Settings.Secure.USE_GOOGLE_MAIL,
+ Settings.Secure.WIFI_NETWORKS_AVAILABLE_NOTIFICATION_ON,
+ Settings.Secure.WIFI_NETWORKS_AVAILABLE_REPEAT_DELAY,
+ Settings.Secure.WIFI_NUM_OPEN_NETWORKS_KEPT,
+ Settings.Secure.WIFI_ON,
+ Settings.Secure.WIFI_WATCHDOG_ACCEPTABLE_PACKET_LOSS_PERCENTAGE,
+ Settings.Secure.WIFI_WATCHDOG_AP_COUNT,
+ Settings.Secure.WIFI_WATCHDOG_BACKGROUND_CHECK_DELAY_MS,
+ Settings.Secure.WIFI_WATCHDOG_BACKGROUND_CHECK_ENABLED,
+ Settings.Secure.WIFI_WATCHDOG_BACKGROUND_CHECK_TIMEOUT_MS,
+ Settings.Secure.WIFI_WATCHDOG_INITIAL_IGNORED_PING_COUNT,
+ Settings.Secure.WIFI_WATCHDOG_MAX_AP_CHECKS,
+ Settings.Secure.WIFI_WATCHDOG_ON,
+ Settings.Secure.WIFI_WATCHDOG_PING_COUNT,
+ Settings.Secure.WIFI_WATCHDOG_PING_DELAY_MS,
+ Settings.Secure.WIFI_WATCHDOG_PING_TIMEOUT_MS,
+ };
+
+ for (String setting : settingsToMove) {
+ insertStmt.bindString(1, setting);
+ insertStmt.execute();
+
+ deleteStmt.bindString(1, setting);
+ deleteStmt.execute();
+ }
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ if (insertStmt != null) {
+ insertStmt.close();
+ }
+ if (deleteStmt != null) {
+ deleteStmt.close();
+ }
+ }
+ upgradeVersion = 28;
+ }
+
+ if (upgradeVersion == 28 || upgradeVersion == 29) {
+ // Note: The upgrade to 28 was flawed since it didn't delete the old
+ // setting first before inserting. Combining 28 and 29 with the
+ // fixed version.
+
+ // This upgrade adds the STREAM_NOTIFICATION type to the list of
+ // types affected by ringer modes (silent, vibrate, etc.)
+ db.beginTransaction();
+ try {
+ db.execSQL("DELETE FROM system WHERE name='"
+ + Settings.System.MODE_RINGER_STREAMS_AFFECTED + "'");
+ int newValue = (1 << AudioManager.STREAM_RING)
+ | (1 << AudioManager.STREAM_NOTIFICATION)
+ | (1 << AudioManager.STREAM_SYSTEM);
+ db.execSQL("INSERT INTO system ('name', 'value') values ('"
+ + Settings.System.MODE_RINGER_STREAMS_AFFECTED + "', '"
+ + String.valueOf(newValue) + "')");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+
+ upgradeVersion = 30;
+ }
+
+ if (upgradeVersion == 30) {
+ /*
+ * Upgrade 31 clears the title for all quick launch shortcuts so the
+ * activities' titles will be resolved at display time. Also, the
+ * folder is changed to '@quicklaunch'.
+ */
+ db.beginTransaction();
+ try {
+ db.execSQL("UPDATE bookmarks SET folder = '@quicklaunch'");
+ db.execSQL("UPDATE bookmarks SET title = ''");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 31;
+ }
+
+ if (upgradeVersion == 31) {
+ /*
+ * Animations are now turned off by default.
+ */
+ db.beginTransaction();
+ try {
+ db.execSQL("DELETE FROM system WHERE name='"
+ + Settings.System.WINDOW_ANIMATION_SCALE + "'");
+ db.execSQL("DELETE FROM system WHERE name='"
+ + Settings.System.TRANSITION_ANIMATION_SCALE + "'");
+ SQLiteStatement stmt = db.compileStatement("INSERT INTO system(name,value)"
+ + " VALUES(?,?);");
+ loadDefaultAnimationSettings(stmt);
+ stmt.close();
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ upgradeVersion = 32;
+ }
+
+ if (upgradeVersion == 32) {
+ // The Wi-Fi watchdog SSID list is now seeded with the value of
+ // the property ro.com.android.wifi-watchlist
+ String wifiWatchList = SystemProperties.get("ro.com.android.wifi-watchlist");
+ if (!TextUtils.isEmpty(wifiWatchList)) {
+ db.beginTransaction();
+ try {
+ db.execSQL("INSERT OR IGNORE INTO secure(name,value) values('" +
+ Settings.Secure.WIFI_WATCHDOG_WATCH_LIST + "','" +
+ wifiWatchList + "');");
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+ }
+ upgradeVersion = 33;
+ }
+
+ if (upgradeVersion != currentVersion) {
+ Log.w(TAG, "Got stuck trying to upgrade from version " + upgradeVersion
+ + ", must wipe the settings provider");
+ db.execSQL("DROP TABLE IF EXISTS system");
+ db.execSQL("DROP INDEX IF EXISTS systemIndex1");
+ db.execSQL("DROP TABLE IF EXISTS secure");
+ db.execSQL("DROP INDEX IF EXISTS secureIndex1");
+ db.execSQL("DROP TABLE IF EXISTS gservices");
+ db.execSQL("DROP INDEX IF EXISTS gservicesIndex1");
+ db.execSQL("DROP TABLE IF EXISTS bluetooth_devices");
+ db.execSQL("DROP TABLE IF EXISTS bookmarks");
+ db.execSQL("DROP INDEX IF EXISTS bookmarksIndex1");
+ db.execSQL("DROP INDEX IF EXISTS bookmarksIndex2");
+ db.execSQL("DROP TABLE IF EXISTS favorites");
+ onCreate(db);
+ }
+ }
+
+ private void upgradeLockPatternLocation(SQLiteDatabase db) {
+ Cursor c = db.query("system", new String[] {"_id", "value"}, "name='lock_pattern'",
+ null, null, null, null);
+ if (c.getCount() > 0) {
+ c.moveToFirst();
+ String lockPattern = c.getString(1);
+ if (!TextUtils.isEmpty(lockPattern)) {
+ // Convert lock pattern
+ try {
+ LockPatternUtils lpu = new LockPatternUtils(mContext.getContentResolver());
+ List<LockPatternView.Cell> cellPattern =
+ LockPatternUtils.stringToPattern(lockPattern);
+ lpu.saveLockPattern(cellPattern);
+ } catch (IllegalArgumentException e) {
+ // Don't want corrupted lock pattern to hang the reboot process
+ }
+ }
+ c.close();
+ db.delete("system", "name='lock_pattern'", null);
+ } else {
+ c.close();
+ }
+ }
+
+ /**
+ * Loads the default set of bookmarked shortcuts from an xml file.
+ *
+ * @param db The database to write the values into
+ * @param startingIndex The zero-based position at which bookmarks in this file should begin
+ * @param subPath The relative path from ANDROID_ROOT to the file to read
+ * @param quiet If true, do no complain if the file is missing
+ */
+ private int loadBookmarks(SQLiteDatabase db, int startingIndex, String subPath,
+ boolean quiet) {
+ FileReader bookmarksReader;
+
+ // Environment.getRootDirectory() is a fancy way of saying ANDROID_ROOT or "/system".
+ final File favFile = new File(Environment.getRootDirectory(), subPath);
+ try {
+ bookmarksReader = new FileReader(favFile);
+ } catch (FileNotFoundException e) {
+ if (!quiet) {
+ Log.e(TAG, "Couldn't find or open bookmarks file " + favFile);
+ }
+ return 0;
+ }
+
+ Intent intent = new Intent(Intent.ACTION_MAIN, null);
+ intent.addCategory(Intent.CATEGORY_LAUNCHER);
+ ContentValues values = new ContentValues();
+
+ PackageManager packageManager = mContext.getPackageManager();
+ ActivityInfo info;
+ int i = startingIndex;
+ try {
+ XmlPullParser parser = Xml.newPullParser();
+ parser.setInput(bookmarksReader);
+
+ XmlUtils.beginDocument(parser, "bookmarks");
+
+ while (true) {
+ XmlUtils.nextElement(parser);
+
+ String name = parser.getName();
+ if (!"bookmark".equals(name)) {
+ break;
+ }
+
+ String pkg = parser.getAttributeValue(null, "package");
+ String cls = parser.getAttributeValue(null, "class");
+ String shortcutStr = parser.getAttributeValue(null, "shortcut");
+ int shortcutValue = (int) shortcutStr.charAt(0);
+ if (TextUtils.isEmpty(shortcutStr)) {
+ Log.w(TAG, "Unable to get shortcut for: " + pkg + "/" + cls);
+ }
+ try {
+ ComponentName cn = new ComponentName(pkg, cls);
+ info = packageManager.getActivityInfo(cn, 0);
+ intent.setComponent(cn);
+ intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK);
+ values.put(Settings.Bookmarks.INTENT, intent.toURI());
+ values.put(Settings.Bookmarks.TITLE,
+ info.loadLabel(packageManager).toString());
+ values.put(Settings.Bookmarks.SHORTCUT, shortcutValue);
+ db.insert("bookmarks", null, values);
+ i++;
+ } catch (PackageManager.NameNotFoundException e) {
+ Log.w(TAG, "Unable to add bookmark: " + pkg + "/" + cls, e);
+ }
+ }
+ } catch (XmlPullParserException e) {
+ Log.w(TAG, "Got execption parsing bookmarks.", e);
+ } catch (IOException e) {
+ Log.w(TAG, "Got execption parsing bookmarks.", e);
+ }
+
+ return i;
+ }
+
+ /**
+ * Loads the default set of bookmark packages.
+ *
+ * @param db The database to write the values into
+ */
+ private void loadBookmarks(SQLiteDatabase db) {
+ loadBookmarks(db, 0, DEFAULT_BOOKMARKS_PATH, false);
+ }
+
+ /**
+ * Loads the default volume levels. It is actually inserting the index of
+ * the volume array for each of the volume controls.
+ *
+ * @param db the database to insert the volume levels into
+ */
+ private void loadVolumeLevels(SQLiteDatabase db) {
+ SQLiteStatement stmt = db.compileStatement("INSERT OR IGNORE INTO system(name,value)"
+ + " VALUES(?,?);");
+
+ loadSetting(stmt, Settings.System.VOLUME_MUSIC,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_MUSIC]);
+ loadSetting(stmt, Settings.System.VOLUME_RING,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_RING]);
+ loadSetting(stmt, Settings.System.VOLUME_SYSTEM,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_SYSTEM]);
+ loadSetting(
+ stmt,
+ Settings.System.VOLUME_VOICE,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_VOICE_CALL]);
+ loadSetting(stmt, Settings.System.VOLUME_ALARM,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_ALARM]);
+ loadSetting(
+ stmt,
+ Settings.System.VOLUME_NOTIFICATION,
+ AudioManager.DEFAULT_STREAM_VOLUME[AudioManager.STREAM_NOTIFICATION]);
+ loadSetting(stmt, Settings.System.MODE_RINGER,
+ AudioManager.RINGER_MODE_NORMAL);
+
+ loadVibrateSetting(db, false);
+
+ // By default, only the ring/notification and system streams are affected
+ loadSetting(stmt, Settings.System.MODE_RINGER_STREAMS_AFFECTED,
+ (1 << AudioManager.STREAM_RING) | (1 << AudioManager.STREAM_NOTIFICATION) |
+ (1 << AudioManager.STREAM_SYSTEM));
+
+ loadSetting(stmt, Settings.System.MUTE_STREAMS_AFFECTED,
+ ((1 << AudioManager.STREAM_MUSIC) |
+ (1 << AudioManager.STREAM_RING) |
+ (1 << AudioManager.STREAM_NOTIFICATION) |
+ (1 << AudioManager.STREAM_SYSTEM)));
+
+ stmt.close();
+ }
+
+ private void loadVibrateSetting(SQLiteDatabase db, boolean deleteOld) {
+ if (deleteOld) {
+ db.execSQL("DELETE FROM system WHERE name='" + Settings.System.VIBRATE_ON + "'");
+ }
+
+ SQLiteStatement stmt = db.compileStatement("INSERT OR IGNORE INTO system(name,value)"
+ + " VALUES(?,?);");
+
+ // Vibrate off by default for ringer, on for notification
+ int vibrate = 0;
+ vibrate = AudioService.getValueForVibrateSetting(vibrate,
+ AudioManager.VIBRATE_TYPE_NOTIFICATION, AudioManager.VIBRATE_SETTING_ON);
+ vibrate = AudioService.getValueForVibrateSetting(vibrate,
+ AudioManager.VIBRATE_TYPE_RINGER, AudioManager.VIBRATE_SETTING_OFF);
+ loadSetting(stmt, Settings.System.VIBRATE_ON, vibrate);
+ }
+
+ private void loadSettings(SQLiteDatabase db) {
+ loadSystemSettings(db);
+ loadSecureSettings(db);
+ }
+
+ private void loadSystemSettings(SQLiteDatabase db) {
+ SQLiteStatement stmt = db.compileStatement("INSERT OR IGNORE INTO system(name,value)"
+ + " VALUES(?,?);");
+
+ Resources r = mContext.getResources();
+ loadBooleanSetting(stmt, Settings.System.DIM_SCREEN,
+ R.bool.def_dim_screen);
+ loadSetting(stmt, Settings.System.STAY_ON_WHILE_PLUGGED_IN,
+ "1".equals(SystemProperties.get("ro.kernel.qemu")) ? 1 : 0);
+ loadIntegerSetting(stmt, Settings.System.SCREEN_OFF_TIMEOUT,
+ R.integer.def_screen_off_timeout);
+
+ loadBooleanSetting(stmt, Settings.System.AIRPLANE_MODE_ON,
+ R.bool.def_airplane_mode_on);
+
+ loadStringSetting(stmt, Settings.System.AIRPLANE_MODE_RADIOS,
+ R.string.def_airplane_mode_radios);
+
+ loadBooleanSetting(stmt, Settings.System.AUTO_TIME,
+ R.bool.def_auto_time); // Sync time to NITZ
+
+ loadIntegerSetting(stmt, Settings.System.SCREEN_BRIGHTNESS,
+ R.integer.def_screen_brightness);
+
+ loadDefaultAnimationSettings(stmt);
+
+ loadBooleanSetting(stmt, Settings.System.ACCELEROMETER_ROTATION,
+ R.bool.def_accelerometer_rotation);
+
+ // Default date format based on build
+ loadSetting(stmt, Settings.System.DATE_FORMAT,
+ SystemProperties.get("ro.com.android.dateformat",
+ "MM-dd-yyyy"));
+ stmt.close();
+ }
+
+ private void loadDefaultAnimationSettings(SQLiteStatement stmt) {
+ loadFractionSetting(stmt, Settings.System.WINDOW_ANIMATION_SCALE,
+ R.fraction.def_window_animation_scale, 1);
+ loadFractionSetting(stmt, Settings.System.TRANSITION_ANIMATION_SCALE,
+ R.fraction.def_window_transition_scale, 1);
+ }
+
+ private void loadSecureSettings(SQLiteDatabase db) {
+ SQLiteStatement stmt = db.compileStatement("INSERT OR IGNORE INTO secure(name,value)"
+ + " VALUES(?,?);");
+
+ loadBooleanSetting(stmt, Settings.Secure.BLUETOOTH_ON,
+ R.bool.def_bluetooth_on);
+
+ // Data roaming default, based on build
+ loadSetting(stmt, Settings.Secure.DATA_ROAMING,
+ "true".equalsIgnoreCase(
+ SystemProperties.get("ro.com.android.dataroaming",
+ "false")) ? 1 : 0);
+
+ loadBooleanSetting(stmt, Settings.Secure.INSTALL_NON_MARKET_APPS,
+ R.bool.def_install_non_market_apps);
+
+ loadStringSetting(stmt, Settings.Secure.LOCATION_PROVIDERS_ALLOWED,
+ R.string.def_location_providers_allowed);
+
+ loadIntegerSetting(stmt, Settings.Secure.NETWORK_PREFERENCE,
+ R.integer.def_network_preference);
+
+ loadBooleanSetting(stmt, Settings.Secure.USB_MASS_STORAGE_ENABLED,
+ R.bool.def_usb_mass_storage_enabled);
+
+ loadBooleanSetting(stmt, Settings.Secure.WIFI_ON,
+ R.bool.def_wifi_on);
+ loadBooleanSetting(stmt, Settings.Secure.WIFI_NETWORKS_AVAILABLE_NOTIFICATION_ON,
+ R.bool.def_networks_available_notification_on);
+
+ String wifiWatchList = SystemProperties.get("ro.com.android.wifi-watchlist");
+ if (!TextUtils.isEmpty(wifiWatchList)) {
+ loadSetting(stmt, Settings.Secure.WIFI_WATCHDOG_WATCH_LIST, wifiWatchList);
+ }
+
+ // Don't do this. The SystemServer will initialize ADB_ENABLED from a
+ // persistent system property instead.
+ //loadSetting(stmt, Settings.Secure.ADB_ENABLED, 0);
+
+ // Allow mock locations default, based on build
+ loadSetting(stmt, Settings.Secure.ALLOW_MOCK_LOCATION,
+ "1".equals(SystemProperties.get("ro.allow.mock.location")) ? 1 : 0);
+
+ stmt.close();
+ }
+
+ private void loadSetting(SQLiteStatement stmt, String key, Object value) {
+ stmt.bindString(1, key);
+ stmt.bindString(2, value.toString());
+ stmt.execute();
+ }
+
+ private void loadStringSetting(SQLiteStatement stmt, String key, int resid) {
+ loadSetting(stmt, key, mContext.getResources().getString(resid));
+ }
+
+ private void loadBooleanSetting(SQLiteStatement stmt, String key, int resid) {
+ loadSetting(stmt, key,
+ mContext.getResources().getBoolean(resid) ? "1" : "0");
+ }
+
+ private void loadIntegerSetting(SQLiteStatement stmt, String key, int resid) {
+ loadSetting(stmt, key,
+ Integer.toString(mContext.getResources().getInteger(resid)));
+ }
+
+ private void loadFractionSetting(SQLiteStatement stmt, String key, int resid, int base) {
+ loadSetting(stmt, key,
+ Float.toString(mContext.getResources().getFraction(resid, base, base)));
+ }
+}
diff --git a/packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java b/packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
new file mode 100644
index 0000000..333a450
--- /dev/null
+++ b/packages/SettingsProvider/src/com/android/providers/settings/SettingsProvider.java
@@ -0,0 +1,341 @@
+/*
+ * Copyright (C) 2007 The Android Open Source Project
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+
+package com.android.providers.settings;
+
+import android.content.ContentProvider;
+import android.content.ContentUris;
+import android.content.ContentValues;
+import android.content.Context;
+import android.content.pm.PackageManager;
+import android.database.Cursor;
+import android.database.sqlite.SQLiteDatabase;
+import android.database.sqlite.SQLiteQueryBuilder;
+import android.media.RingtoneManager;
+import android.net.Uri;
+import android.os.ParcelFileDescriptor;
+import android.os.SystemProperties;
+import android.provider.DrmStore;
+import android.provider.MediaStore;
+import android.provider.Settings;
+import android.text.TextUtils;
+import android.util.Log;
+
+import java.io.FileNotFoundException;
+
+public class SettingsProvider extends ContentProvider {
+ private static final String TAG = "SettingsProvider";
+ private static final boolean LOCAL_LOGV = false;
+
+ private static final String TABLE_FAVORITES = "favorites";
+ private static final String TABLE_OLD_FAVORITES = "old_favorites";
+
+ private DatabaseHelper mOpenHelper;
+
+ /**
+ * Decode a content URL into the table, projection, and arguments
+ * used to access the corresponding database rows.
+ */
+ private static class SqlArguments {
+ public String table;
+ public final String where;
+ public final String[] args;
+
+ /** Operate on existing rows. */
+ SqlArguments(Uri url, String where, String[] args) {
+ if (url.getPathSegments().size() == 1) {
+ this.table = url.getPathSegments().get(0);
+ this.where = where;
+ this.args = args;
+ } else if (url.getPathSegments().size() != 2) {
+ throw new IllegalArgumentException("Invalid URI: " + url);
+ } else if (!TextUtils.isEmpty(where)) {
+ throw new UnsupportedOperationException("WHERE clause not supported: " + url);
+ } else {
+ this.table = url.getPathSegments().get(0);
+ if ("gservices".equals(this.table) || "system".equals(this.table)
+ || "secure".equals(this.table)) {
+ this.where = Settings.NameValueTable.NAME + "=?";
+ this.args = new String[] { url.getPathSegments().get(1) };
+ } else {
+ this.where = "_id=" + ContentUris.parseId(url);
+ this.args = null;
+ }
+ }
+ }
+
+ /** Insert new rows (no where clause allowed). */
+ SqlArguments(Uri url) {
+ if (url.getPathSegments().size() == 1) {
+ this.table = url.getPathSegments().get(0);
+ this.where = null;
+ this.args = null;
+ } else {
+ throw new IllegalArgumentException("Invalid URI: " + url);
+ }
+ }
+ }
+
+ /**
+ * Get the content URI of a row added to a table.
+ * @param tableUri of the entire table
+ * @param values found in the row
+ * @param rowId of the row
+ * @return the content URI for this particular row
+ */
+ private Uri getUriFor(Uri tableUri, ContentValues values, long rowId) {
+ if (tableUri.getPathSegments().size() != 1) {
+ throw new IllegalArgumentException("Invalid URI: " + tableUri);
+ }
+ String table = tableUri.getPathSegments().get(0);
+ if ("gservices".equals(table) || "system".equals(table)
+ || "secure".equals(table)) {
+ String name = values.getAsString(Settings.NameValueTable.NAME);
+ return Uri.withAppendedPath(tableUri, name);
+ } else {
+ return ContentUris.withAppendedId(tableUri, rowId);
+ }
+ }
+
+ /**
+ * Send a notification when a particular content URI changes.
+ * Modify the system property used to communicate the version of
+ * this table, for tables which have such a property. (The Settings
+ * contract class uses these to provide client-side caches.)
+ * @param uri to send notifications for
+ */
+ private void sendNotify(Uri uri) {
+ // Update the system property *first*, so if someone is listening for
+ // a notification and then using the contract class to get their data,
+ // the system property will be updated and they'll get the new data.
+
+ String property = null, table = uri.getPathSegments().get(0);
+ if (table.equals("system")) {
+ property = Settings.System.SYS_PROP_SETTING_VERSION;
+ } else if (table.equals("secure")) {
+ property = Settings.Secure.SYS_PROP_SETTING_VERSION;
+ } else if (table.equals("gservices")) {
+ property = Settings.Gservices.SYS_PROP_SETTING_VERSION;
+ }
+
+ if (property != null) {
+ long version = SystemProperties.getLong(property, 0) + 1;
+ if (LOCAL_LOGV) Log.v(TAG, "property: " + property + "=" + version);
+ SystemProperties.set(property, Long.toString(version));
+ }
+
+ // Now send the notification through the content framework.
+
+ String notify = uri.getQueryParameter("notify");
+ if (notify == null || "true".equals(notify)) {
+ getContext().getContentResolver().notifyChange(uri, null);
+ if (LOCAL_LOGV) Log.v(TAG, "notifying: " + uri);
+ } else {
+ if (LOCAL_LOGV) Log.v(TAG, "notification suppressed: " + uri);
+ }
+ }
+
+ /**
+ * Make sure the caller has permission to write this data.
+ * @param args supplied by the caller
+ * @throws SecurityException if the caller is forbidden to write.
+ */
+ private void checkWritePermissions(SqlArguments args) {
+ if ("secure".equals(args.table) &&
+ getContext().checkCallingOrSelfPermission(
+ android.Manifest.permission.WRITE_SECURE_SETTINGS) !=
+ PackageManager.PERMISSION_GRANTED) {
+ throw new SecurityException("Cannot write secure settings table");
+
+ // TODO: Move gservices into its own provider so we don't need this nonsense.
+ } else if ("gservices".equals(args.table) &&
+ getContext().checkCallingOrSelfPermission(
+ android.Manifest.permission.WRITE_GSERVICES) !=
+ PackageManager.PERMISSION_GRANTED) {
+ throw new SecurityException("Cannot write gservices table");
+ }
+ }
+
+ @Override
+ public boolean onCreate() {
+ mOpenHelper = new DatabaseHelper(getContext());
+ return true;
+ }
+
+ @Override
+ public Cursor query(Uri url, String[] select, String where, String[] whereArgs, String sort) {
+ SqlArguments args = new SqlArguments(url, where, whereArgs);
+ SQLiteDatabase db = mOpenHelper.getReadableDatabase();
+
+ // The favorites table was moved from this provider to a provider inside Home
+ // Home still need to query this table to upgrade from pre-cupcake builds
+ // However, a cupcake+ build with no data does not contain this table which will
+ // cause an exception in the SQL stack. The following line is a special case to
+ // let the caller of the query have a chance to recover and avoid the exception
+ if (TABLE_FAVORITES.equals(args.table)) {
+ return null;
+ } else if (TABLE_OLD_FAVORITES.equals(args.table)) {
+ args.table = TABLE_FAVORITES;
+ Cursor cursor = db.rawQuery("PRAGMA table_info(favorites);", null);
+ if (cursor != null) {
+ boolean exists = cursor.getCount() > 0;
+ cursor.close();
+ if (!exists) return null;
+ } else {
+ return null;
+ }
+ }
+
+ SQLiteQueryBuilder qb = new SQLiteQueryBuilder();
+ qb.setTables(args.table);
+
+ Cursor ret = qb.query(db, select, args.where, args.args, null, null, sort);
+ ret.setNotificationUri(getContext().getContentResolver(), url);
+ return ret;
+ }
+
+ @Override
+ public String getType(Uri url) {
+ // If SqlArguments supplies a where clause, then it must be an item
+ // (because we aren't supplying our own where clause).
+ SqlArguments args = new SqlArguments(url, null, null);
+ if (TextUtils.isEmpty(args.where)) {
+ return "vnd.android.cursor.dir/" + args.table;
+ } else {
+ return "vnd.android.cursor.item/" + args.table;
+ }
+ }
+
+ @Override
+ public int bulkInsert(Uri uri, ContentValues[] values) {
+ SqlArguments args = new SqlArguments(uri);
+ if (TABLE_FAVORITES.equals(args.table)) {
+ return 0;
+ }
+ checkWritePermissions(args);
+
+ SQLiteDatabase db = mOpenHelper.getWritableDatabase();
+ db.beginTransaction();
+ try {
+ int numValues = values.length;
+ for (int i = 0; i < numValues; i++) {
+ if (db.insert(args.table, null, values[i]) < 0) return 0;
+ if (LOCAL_LOGV) Log.v(TAG, args.table + " <- " + values[i]);
+ }
+ db.setTransactionSuccessful();
+ } finally {
+ db.endTransaction();
+ }
+
+ sendNotify(uri);
+ return values.length;
+ }
+
+ @Override
+ public Uri insert(Uri url, ContentValues initialValues) {
+ SqlArguments args = new SqlArguments(url);
+ if (TABLE_FAVORITES.equals(args.table)) {
+ return null;
+ }
+ checkWritePermissions(args);
+
+ SQLiteDatabase db = mOpenHelper.getWritableDatabase();
+ final long rowId = db.insert(args.table, null, initialValues);
+ if (rowId <= 0) return null;
+
+ if (LOCAL_LOGV) Log.v(TAG, args.table + " <- " + initialValues);
+ url = getUriFor(url, initialValues, rowId);
+ sendNotify(url);
+ return url;
+ }
+
+ @Override
+ public int delete(Uri url, String where, String[] whereArgs) {
+ SqlArguments args = new SqlArguments(url, where, whereArgs);
+ if (TABLE_FAVORITES.equals(args.table)) {
+ return 0;
+ } else if (TABLE_OLD_FAVORITES.equals(args.table)) {
+ args.table = TABLE_FAVORITES;
+ }
+ checkWritePermissions(args);
+
+ SQLiteDatabase db = mOpenHelper.getWritableDatabase();
+ int count = db.delete(args.table, args.where, args.args);
+ if (count > 0) sendNotify(url);
+ if (LOCAL_LOGV) Log.v(TAG, args.table + ": " + count + " row(s) deleted");
+ return count;
+ }
+
+ @Override
+ public int update(Uri url, ContentValues initialValues, String where, String[] whereArgs) {
+ SqlArguments args = new SqlArguments(url, where, whereArgs);
+ if (TABLE_FAVORITES.equals(args.table)) {
+ return 0;
+ }
+ checkWritePermissions(args);
+
+ SQLiteDatabase db = mOpenHelper.getWritableDatabase();
+ int count = db.update(args.table, initialValues, args.where, args.args);
+ if (count > 0) sendNotify(url);
+ if (LOCAL_LOGV) Log.v(TAG, args.table + ": " + count + " row(s) <- " + initialValues);
+ return count;
+ }
+
+ @Override
+ public ParcelFileDescriptor openFile(Uri uri, String mode) throws FileNotFoundException {
+
+ /*
+ * When a client attempts to openFile the default ringtone or
+ * notification setting Uri, we will proxy the call to the current
+ * default ringtone's Uri (if it is in the DRM or media provider).
+ */
+ int ringtoneType = RingtoneManager.getDefaultType(uri);
+ // Above call returns -1 if the Uri doesn't match a default type
+ if (ringtoneType != -1) {
+ Context context = getContext();
+
+ // Get the current value for the default sound
+ Uri soundUri = RingtoneManager.getActualDefaultRingtoneUri(context, ringtoneType);
+ if (soundUri == null) {
+ // Fallback on any valid ringtone Uri
+ soundUri = RingtoneManager.getValidRingtoneUri(context);
+ }
+
+ if (soundUri != null) {
+ // Only proxy the openFile call to drm or media providers
+ String authority = soundUri.getAuthority();
+ boolean isDrmAuthority = authority.equals(DrmStore.AUTHORITY);
+ if (isDrmAuthority || authority.equals(MediaStore.AUTHORITY)) {
+
+ if (isDrmAuthority) {
+ try {
+ // Check DRM access permission here, since once we
+ // do the below call the DRM will be checking our
+ // permission, not our caller's permission
+ DrmStore.enforceAccessDrmPermission(context);
+ } catch (SecurityException e) {
+ throw new FileNotFoundException(e.getMessage());
+ }
+ }
+
+ return context.getContentResolver().openFileDescriptor(soundUri, mode);
+ }
+ }
+ }
+
+ return super.openFile(uri, mode);
+ }
+}