diff options
author | Ted Bauer <tedbauer@google.com> | 2022-12-19 20:03:32 +0000 |
---|---|---|
committer | Ted Bauer <tedbauer@google.com> | 2023-02-14 14:32:39 +0000 |
commit | 6c45da161633cc04da9a976da75643b1d6558a72 (patch) | |
tree | 69fee7c5951000bbaa248cb6de160d61aeed56f3 /framework/java/android/provider/WritableFlags.java | |
parent | 1de860ac5ff34ef498022e9108ea6090435be8ea (diff) | |
download | ConfigInfrastructure-6c45da161633cc04da9a976da75643b1d6558a72.tar.gz |
Add DeviceConfig `adb`-writable allowlist.
Test: m
Bug: 262432843
Change-Id: I26aa3aab9b62283293927a5ca139155759e5ee38
Diffstat (limited to 'framework/java/android/provider/WritableFlags.java')
-rw-r--r-- | framework/java/android/provider/WritableFlags.java | 73 |
1 files changed, 73 insertions, 0 deletions
diff --git a/framework/java/android/provider/WritableFlags.java b/framework/java/android/provider/WritableFlags.java new file mode 100644 index 0000000..33675bc --- /dev/null +++ b/framework/java/android/provider/WritableFlags.java @@ -0,0 +1,73 @@ +package android.provider; + +import java.util.Arrays; +import java.util.List; + +/** + * Contains the list of flags that can be written with ALLOWLISTED_WRITE_DEVICE_CONFIG. + * <p> + * A security review is required for any flag that's added to this list. To add to the + * list, create a change and tag the OWNER. In the change description, include a + * description of the flag's functionality, and a justification for why it needs to be + * allowlisted. + */ +final class WritableFlags { + public static final List<String> ALLOWLIST = + Arrays.asList( + "adservices/disable_sdk_sandbox", + "adservices/enforce_broadcast_receiver_restrictions", + "adservices/fledge_ad_selection_enforce_foreground_status_custom_audience", + "adservices/fledge_custom_audience_max_count", + "adservices/fledge_custom_audience_max_num_ads", + "adservices/fledge_custom_audience_max_owner_count", + "adservices/fledge_custom_audience_per_app_max_count", + "adservices/fledge_js_isolate_enforce_max_heap_size", + "adservices/fledge_js_isolate_max_heap_size_bytes", + "adservices/sdk_request_permits_per_second", + "adservices/sdksandbox_customized_sdk_context_enabled", + "configuration/namespace_to_package_mapping", + "constrain_display_apis/always_constrain_display_apis", + "constrain_display_apis/never_constrain_display_apis", + "constrain_display_apis/never_constrain_display_apis_all_packages", + "device_policy_manager/disable_resources_updatability", + "flipendo/default_savings_mode_launch", + "flipendo/essential_apps", + "flipendo/flipendo_enabled_launch", + "flipendo/grayscale_enabled_launch", + "flipendo/lever_ble_scanning_enabled_launch", + "flipendo/lever_hotspot_enabled_launch", + "flipendo/lever_work_profile_enabled_launch", + "flipendo/resuspend_delay_minutes", + "namespace1/key1", + "namespace1/key2", + "namespace2/key1", + "namespace2/key2", + "namespace/key", + "package_manager_service/incfs_default_timeouts", + "package_manager_service/known_digesters_list", + "rollback/enable_rollback_timeout", + "rollback/watchdog_explicit_health_check_enabled", + "rollback/watchdog_request_timeout_millis", + "rollback/watchdog_trigger_failure_count", + "rollback/watchdog_trigger_failure_duration_millis", + "rollback_boot/rollback_lifetime_in_millis", + "systemui/nas_generate_actions", + "systemui/nas_generate_replies", + "systemui/nas_max_messages_to_extract", + "systemui/nas_max_suggestions", + "testspace/another", + "testspace/flagname", + "textclassifier/config_updater_model_enabled", + "textclassifier/key", + "textclassifier/key2", + "textclassifier/manifest_url_annotator_en", + "textclassifier/manifest_url_annotator_ru", + "textclassifier/model_download_backoff_delay_in_millis", + "textclassifier/model_download_manager_enabled", + "textclassifier/multi_language_support_enabled", + "textclassifier/testing_locale_list_override", + "textclassifier/textclassifier_service_package_override", + "window_manager/enable_default_rescind_bal_privileges_from_pending_intent_sender", + "wrong/nas_generate_replies" + ); +} |