The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 1 | <?xml version="1.0" encoding="utf-8"?> |
| 2 | <!-- Copyright (C) 2008 The Android Open Source Project |
| 3 | |
| 4 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | you may not use this file except in compliance with the License. |
| 6 | You may obtain a copy of the License at |
| 7 | |
| 8 | http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | |
| 10 | Unless required by applicable law or agreed to in writing, software |
| 11 | distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | See the License for the specific language governing permissions and |
| 14 | limitations under the License. |
| 15 | --> |
| 16 | |
| 17 | <!-- This file is used to define the mappings between lower-level system |
| 18 | user and group IDs and the higher-level permission names managed |
| 19 | by the platform. |
| 20 | |
| 21 | Be VERY careful when editing this file! Mistakes made here can open |
| 22 | big security holes. |
| 23 | --> |
| 24 | <permissions> |
| 25 | |
| 26 | <!-- ================================================================== --> |
| 27 | <!-- ================================================================== --> |
| 28 | <!-- ================================================================== --> |
| 29 | |
| 30 | <!-- The following tags are associating low-level group IDs with |
| 31 | permission names. By specifying such a mapping, you are saying |
| 32 | that any application process granted the given permission will |
| 33 | also be running with the given group ID attached to its process, |
| 34 | so it can perform any filesystem (read, write, execute) operations |
| 35 | allowed for that group. --> |
| 36 | |
| 37 | <permission name="android.permission.BLUETOOTH_ADMIN" > |
| 38 | <group gid="net_bt_admin" /> |
| 39 | </permission> |
| 40 | |
| 41 | <permission name="android.permission.BLUETOOTH" > |
| 42 | <group gid="net_bt" /> |
| 43 | </permission> |
| 44 | |
| 45 | <permission name="android.permission.INTERNET" > |
| 46 | <group gid="inet" /> |
| 47 | </permission> |
| 48 | |
| 49 | <permission name="android.permission.CAMERA" > |
| 50 | <group gid="camera" /> |
| 51 | </permission> |
| 52 | |
| 53 | <permission name="android.permission.READ_LOGS" > |
| 54 | <group gid="log" /> |
| 55 | </permission> |
| 56 | |
San Mehat | 5a3a77d | 2009-06-01 09:25:28 -0700 | [diff] [blame] | 57 | <permission name="android.permission.WRITE_EXTERNAL_STORAGE" > |
San Mehat | 29b57e6 | 2009-04-23 09:18:32 -0700 | [diff] [blame] | 58 | <group gid="sdcard_rw" /> |
| 59 | </permission> |
| 60 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 61 | <!-- The group that /cache belongs to, linked to the permission |
| 62 | set on the applications that can access /cache --> |
| 63 | <permission name="android.permission.ACCESS_CACHE_FILESYSTEM" > |
| 64 | <group gid="cache" /> |
| 65 | </permission> |
| 66 | |
| 67 | <!-- RW permissions to any system resources owned by group 'diag'. |
| 68 | This is for carrier and manufacture diagnostics tools that must be |
| 69 | installable from the framework. Be careful. --> |
| 70 | <permission name="android.permission.DIAGNOSTIC" > |
| 71 | <group gid="input" /> |
| 72 | <group gid="diag" /> |
| 73 | </permission> |
| 74 | |
| 75 | <!-- ================================================================== --> |
| 76 | <!-- ================================================================== --> |
| 77 | <!-- ================================================================== --> |
| 78 | |
| 79 | <!-- The following tags are assigning high-level permissions to specific |
| 80 | user IDs. These are used to allow specific core system users to |
| 81 | perform the given operations with the higher-level framework. For |
| 82 | example, we give a wide variety of permissions to the shell user |
| 83 | since that is the user the adb shell runs under and developers and |
| 84 | others should have a fairly open environment in which to |
| 85 | interact with the system. --> |
| 86 | |
Dianne Hackborn | a96cbb4 | 2009-05-13 15:06:13 -0700 | [diff] [blame] | 87 | <!-- Standard permissions granted to the shell. --> |
San Mehat | 5a3a77d | 2009-06-01 09:25:28 -0700 | [diff] [blame] | 88 | <assign-permission name="android.permission.WRITE_EXTERNAL_STORAGE" uid="shell" /> |
Dianne Hackborn | a96cbb4 | 2009-05-13 15:06:13 -0700 | [diff] [blame] | 89 | <assign-permission name="android.permission.SEND_SMS" uid="shell" /> |
| 90 | <assign-permission name="android.permission.CALL_PHONE" uid="shell" /> |
| 91 | <assign-permission name="android.permission.READ_CONTACTS" uid="shell" /> |
| 92 | <assign-permission name="android.permission.WRITE_CONTACTS" uid="shell" /> |
Dianne Hackborn | a96cbb4 | 2009-05-13 15:06:13 -0700 | [diff] [blame] | 93 | <assign-permission name="android.permission.READ_CALENDAR" uid="shell" /> |
| 94 | <assign-permission name="android.permission.WRITE_CALENDAR" uid="shell" /> |
| 95 | <assign-permission name="android.permission.READ_USER_DICTIONARY" uid="shell" /> |
| 96 | <assign-permission name="android.permission.WRITE_USER_DICTIONARY" uid="shell" /> |
| 97 | <assign-permission name="android.permission.ACCESS_FINE_LOCATION" uid="shell" /> |
| 98 | <assign-permission name="android.permission.ACCESS_COARSE_LOCATION" uid="shell" /> |
| 99 | <assign-permission name="android.permission.ACCESS_LOCATION_EXTRA_COMMANDS" uid="shell" /> |
| 100 | <assign-permission name="android.permission.ACCESS_NETWORK_STATE" uid="shell" /> |
| 101 | <assign-permission name="android.permission.ACCESS_WIFI_STATE" uid="shell" /> |
| 102 | <assign-permission name="android.permission.BLUETOOTH" uid="shell" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 103 | <!-- System tool permissions granted to the shell. --> |
| 104 | <assign-permission name="android.permission.GET_TASKS" uid="shell" /> |
| 105 | <assign-permission name="android.permission.CHANGE_CONFIGURATION" uid="shell" /> |
| 106 | <assign-permission name="android.permission.REORDER_TASKS" uid="shell" /> |
| 107 | <assign-permission name="android.permission.SET_ANIMATION_SCALE" uid="shell" /> |
| 108 | <assign-permission name="android.permission.SET_PREFERRED_APPLICATIONS" uid="shell" /> |
| 109 | <assign-permission name="android.permission.WRITE_SETTINGS" uid="shell" /> |
| 110 | <assign-permission name="android.permission.WRITE_SECURE_SETTINGS" uid="shell" /> |
| 111 | <assign-permission name="android.permission.BROADCAST_STICKY" uid="shell" /> |
| 112 | <!-- Development tool permissions granted to the shell. --> |
| 113 | <assign-permission name="android.permission.SET_DEBUG_APP" uid="shell" /> |
| 114 | <assign-permission name="android.permission.SET_PROCESS_LIMIT" uid="shell" /> |
| 115 | <assign-permission name="android.permission.SET_ALWAYS_FINISH" uid="shell" /> |
| 116 | <assign-permission name="android.permission.DUMP" uid="shell" /> |
| 117 | <assign-permission name="android.permission.SIGNAL_PERSISTENT_PROCESSES" uid="shell" /> |
| 118 | <!-- Internal permissions granted to the shell. --> |
| 119 | <assign-permission name="android.permission.FORCE_BACK" uid="shell" /> |
| 120 | <assign-permission name="android.permission.BATTERY_STATS" uid="shell" /> |
| 121 | <assign-permission name="android.permission.INTERNAL_SYSTEM_WINDOW" uid="shell" /> |
| 122 | <assign-permission name="android.permission.INJECT_EVENTS" uid="shell" /> |
| 123 | <assign-permission name="android.permission.SET_ACTIVITY_WATCHER" uid="shell" /> |
| 124 | <assign-permission name="android.permission.READ_INPUT_STATE" uid="shell" /> |
| 125 | <assign-permission name="android.permission.SET_ORIENTATION" uid="shell" /> |
| 126 | <assign-permission name="android.permission.INSTALL_PACKAGES" uid="shell" /> |
| 127 | <assign-permission name="android.permission.CLEAR_APP_USER_DATA" uid="shell" /> |
| 128 | <assign-permission name="android.permission.DELETE_CACHE_FILES" uid="shell" /> |
| 129 | <assign-permission name="android.permission.DELETE_PACKAGES" uid="shell" /> |
| 130 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="shell" /> |
| 131 | <assign-permission name="android.permission.READ_FRAME_BUFFER" uid="shell" /> |
| 132 | <assign-permission name="android.permission.DEVICE_POWER" uid="shell" /> |
Dianne Hackborn | a96cbb4 | 2009-05-13 15:06:13 -0700 | [diff] [blame] | 133 | <assign-permission name="android.permission.INSTALL_LOCATION_PROVIDER" uid="shell" /> |
Christopher Tate | de83ab9 | 2009-07-14 15:38:07 -0700 | [diff] [blame] | 134 | <assign-permission name="android.permission.BACKUP" uid="shell" /> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 135 | |
| 136 | <assign-permission name="android.permission.MODIFY_AUDIO_SETTINGS" uid="media" /> |
| 137 | <assign-permission name="android.permission.ACCESS_DRM" uid="media" /> |
| 138 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="media" /> |
| 139 | |
Mathias Agopian | 627e7b5 | 2009-05-21 19:21:59 -0700 | [diff] [blame] | 140 | <assign-permission name="android.permission.ACCESS_SURFACE_FLINGER" uid="graphics" /> |
| 141 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 142 | <!-- This is a list of all the libraries available for application |
| 143 | code to link against. --> |
| 144 | |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 145 | <library name="android.test.runner" |
| 146 | file="/system/framework/android.test.runner.jar" /> |
Tao Liejun | 05ff98bb | 2009-07-13 15:57:11 -0700 | [diff] [blame] | 147 | <library name="javax.obex" |
| 148 | file="/system/framework/javax.obex.jar"/> |
The Android Open Source Project | 9066cfe | 2009-03-03 19:31:44 -0800 | [diff] [blame] | 149 | |
| 150 | </permissions> |