Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump ws from 8.11.0 to 8.17.1 in /packages/SystemUI/scripts/token_alignment #27

Open
wants to merge 1,053 commits into
base: universe
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jun 17, 2024

Bumps ws from 8.11.0 to 8.17.1.

Release notes

Sourced from ws's releases.

8.17.1

Bug fixes

  • Fixed a DoS vulnerability (#2231).

A request with a number of headers exceeding the[server.maxHeadersCount][] threshold could be used to crash a ws server.

const http = require('http');
const WebSocket = require('ws');
const wss = new WebSocket.Server({ port: 0 }, function () {
const chars = "!#$%&'*+-.0123456789abcdefghijklmnopqrstuvwxyz^_`|~".split('');
const headers = {};
let count = 0;
for (let i = 0; i < chars.length; i++) {
if (count === 2000) break;
for (let j = 0; j &lt; chars.length; j++) {
  const key = chars[i] + chars[j];
  headers[key] = 'x';
if (++count === 2000) break;
}

}
headers.Connection = 'Upgrade';
headers.Upgrade = 'websocket';
headers['Sec-WebSocket-Key'] = 'dGhlIHNhbXBsZSBub25jZQ==';
headers['Sec-WebSocket-Version'] = '13';
const request = http.request({
headers: headers,
host: '127.0.0.1',
port: wss.address().port
});
request.end();
});

The vulnerability was reported by Ryan LaPointe in websockets/ws#2230.

In vulnerable versions of ws, the issue can be mitigated in the following ways:

  1. Reduce the maximum allowed length of the request headers using the [--max-http-header-size=size][] and/or the [maxHeaderSize][] options so that no more headers than the server.maxHeadersCount limit can be sent.

... (truncated)

Commits
  • 3c56601 [dist] 8.17.1
  • e55e510 [security] Fix crash when the Upgrade header cannot be read (#2231)
  • 6a00029 [test] Increase code coverage
  • ddfe4a8 [perf] Reduce the amount of crypto.randomFillSync() calls
  • b73b118 [dist] 8.17.0
  • 29694a5 [test] Use the highWaterMark variable
  • 934c9d6 [ci] Test on node 22
  • 1817bac [ci] Do not test on node 21
  • 96c9b3d [major] Flip the default value of allowSynchronousEvents (#2221)
  • e5f32c7 [fix] Emit at most one event per event loop iteration (#2218)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

minaripenguin and others added 30 commits April 16, 2024 12:16
Signed-off-by: minaripenguin <[email protected]>
Signed-off-by: S I P U N <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Use a limited number of IPC threads, as the Permission module does.
Some code is taken directly from AOSP's Permission module.

This prevents Settings from crashing due to binder buffer space
exhaustion when interacting with the apps list or its apps.

See these relevant changes by Nate Myren <[email protected]>:
- Title: Create "IPC" coroutine dispatcher
  Change-Id: Ia3423c97ad5e75cd0636c2cf3c0bbd8a2737391f
- Title: Flush binders in Async LiveData
  Change-Id: If4561fd304adace419e27e871980322b3ccb8c04

Issue: calyxos#2012
Change-Id: If66ef779829791488b30cdf142e1b1d66b07c0fd
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Fixes:
java.lang.NullPointerException: Attempt to invoke virtual method 'int java.util.ArrayList.size()' on a null object reference
Caused by: android.os.RemoteException: Remote stack trace:
at com.android.server.wm.Task.lambda$applyAnimationUnchecked$13(Task.java:3355)

Change-Id: I580ecac54de4bad9a3af4e68e73477a0b3bdc2d5
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Improves the UX while dragging the brightness slider.

[someone5678]: Adapt to current brightness slider changes

Change-Id: I79d9d8fd1133a9e166821ff8f7135ccb761edd58
Signed-off-by: Vaisakh Murali <[email protected]>
Signed-off-by: someone5678 <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
* This null check causes crashing problems instead, DO NOT MAKE Vibrator NULL!

Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: Ic42c037da8d7cc8378f084ed20205fafc52b95e5
Signed-off-by: someone5678 <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: I7b5ffcf8a44427a33f0f33bebee294cd47007afe
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
[someone5678] Unify style with Brightness slider haptic

Change-Id: Ieb2dc23eb1e8237b230591066901acbb19c94fd6
Signed-off-by: someone5678 <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
[someone5678] Unify styles with other haptic settings

Change-Id: I792a00a2689a572110963db00362f8e9d77b316e
Signed-off-by: Jason Edson <[email protected]>
Signed-off-by: someone5678 <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
…r QSTile

Change-Id: I532190cf4c082faaecce57dc7c4b4423f679ef2c
Signed-off-by: Krishnakant Shedge <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
- The device vibrates with a click effect on reaching the edge of the view after a successfull fling scroll
- Add a permission check to prevent apps without vibrate permission from crashing

Change-Id: Ib5281e274794ee73a29c2dd38c483de8d9c796f1
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
- Based onn [1]
- Nuked uneeded code
- Modify code to not restrict function to single app

[1] PixysOS/frameworks_base@f479a95

Change-Id: I61eb13cfaa362986ef0e6e9a75b6590f54b47bd2
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Pranav Temkar <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
- Breaks UDFPS on Pixels
- Also tunable via device tree overlays so keep it default

This reverts commit c9ad7ca446ec0b991e75d04efbf39d798a932665.

Change-Id: I8915152c83b3366cdab1b1ca9f9c49e40bb3339b
Change-Id: Icbbf26b70fbc6e215691f6dcba6b8c30e60a853f
Signed-off-by: Jis G Jacob <[email protected]>
* commit d2ea421fa6b47f6ba1bac314f77939e5ec514afc (by rmp) introduced a fix for preventing systemui crashes caused by invalid regex pattern,
  however, this change broke the filtering method for some instances, we've also noticed that the filtering doesnt work on words/numbers with symbols
  this CL attempts to fix the breakage caused by d2ea421fa6b47f6ba1bac314f77939e5ec514afc and finally resolve the inconsistencies of island notification text
  with applications that appends the same text used in Notification.EXTRA_TITLE and Notification.EXTRA_TEXT (as starting text/headline)

attempts to resolve the following types of notification text contents/samples:

  +123456: +123456: hello -> +123456: hello
  +123456: +123456 hello -> +123456: hello
  youtube: youtube: new video -> youtube: new video
  youtube: youtube new video -> youtube: new video
  User: user: hi -> User: hi
  Whatsapp: Whatsapp+: 1 notification --> 6. Whatsapp: 1 notification

test: manual/visual

Change-Id: Ib9a93ee633af165913026d04fc1165879f36d8d3
Signed-off-by: minaripenguin <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: I28fea0124c91b8efc206a940761e77fa61d1fefc
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: Ia1859c51d71ef9d01cec2d13c6468ed89c6ac53e
Contributor: jonasl

- Add system setting

Author: Tim Schumacher <[email protected]>
Date:   Wed Nov 28 21:44:18 2018 +0100

    Add back ACCELEROMETER_ROTATION_ANGLES and update references

    This needed to move back into fw/b, because it needs to be
    accessed from inside the RotationPolicy. Previously
    (when this constant and Setting were located in lineage-sdk),
    the settings for the display rotation had no effect, because we
    couldn't query the correct set of settings.

    Change-Id: Icce249925a578c328db3884e5d332b20d6e7db6c
    Fixes: BUGBASH-2042

Author: eray orçunus <[email protected]>
Date:   Mon Jun 22 22:47:40 2015 +0300

    Rotation related corrections

    - There are some conditions deleted while placing rotation angles code, I added them.

    - Rotation lock was screwed up since CM 12. Fixed it by fetching allowed rotations from CM's
    allowed rotations setting.

    - Also, a CAF commit had killed rotation lock ability.

    [port to 15.1]:
     - ACCELEROMETER_ROTATION_ANGLES moved to LineageSDK
     - Slight change of the WindowManager API

    [port to 16.0]:
     - adjust context
     - ACCELEROMETER_ROTATION_ANGLES moved to Settings
     - Use the configstore API

    Change-Id: I8f1b468249c68e7b6514d1a96bdb3fc638af84fd
    Signed-off-by: eray orçunus <[email protected]>
    (cherry picked from commit a62720d51e9d8f3a3c9992ea0bdb707b64e865b5)

Author: Tim Schumacher <[email protected]>
Date:   Thu May 2 19:48:39 2019 +0200

    RotationPolicy: Don't crash if configstore 1.1 isn't available

    Change-Id: I77301ec8c72393daa0003ca310eee07b767d4e69

Change-Id: Ia7bf8cb64258e1d602230a8f9ea227d3b56a4dab
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Current functionality:
- Disable 5G in battery saver mode
- Disable 5G when not on mobile data (such as wifi)
- Disable 5G on non-active data sim

Not smart enough yet, but we'll get there.

Change-Id: Iac71c1de51429e2287162bb9e45ff4aba3bd0ac9
Signed-off-by: Daniel Jacob Chittoor <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
idoybh edits: Add settings value to backup array

Change-Id: I9622c17a1969598af71bcee573a576b752b96c5e
Signed-off-by: rituj <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: I0d00f94b185a1032deb3e8413720d47a411cd6f7
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
*allow setting vibration when call is connected
*allow setting vibration when call is disconnected
*allow setting vibration for call waiting
*this works with google and aosp dialer :)

idoybh: Adapted to A11's settings backup
Change-Id: I3d7a23b9608cd25d4759b79d3157963bfb18254f
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
- There are tons of apps out there on playstore which replicate the same
  iOS behaviour. Let's just add it in system keeping it disabled by default.

Squashed:

    From: Ido Ben-Hur <[email protected]>
    Date: Wed, 10 Jun 2020 21:37:59 +0300
    Subject: base: Allow to flash on call only when entirely silent [1/3]

Change-Id: Ib598ad7b249e784a8da6c2d8da7832015cb811dc
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: I23f19787bca6fd2918c3f5be50b012cf2cfdbc89
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Add below changes to handle default phone ringtone for slot2.
1. Add Settings.System.RINGTONE2 as the key in SettingsProvider to
save ringtone for slot2.
2. Support "ro.config.ringtone" for Multi SIM device.
3. Adapt ringtone for slot2 in current ringtone related APIs.

Bug: 118735436
Test: Manual
Change-Id: I9c6ccff938122332d222853d469ad9a623c7d193
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
not sure what went wrong here. Its basically the same as
for docked.

Change-Id: I93da70ef4b397a3dc25dd129e23ea4843f5e1d5c
Signed-off-by: mukesh22584 <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
This fits better with Material You, especially when the default shadow
gets clipped at the edges.

Change-Id: If1f421692bcc737882f76fc7929b9f9dd0dd71f0
Signed-off-by: mukesh22584 <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Jared Penner and others added 27 commits May 8, 2024 08:37
Set the baseX and baseY in SecondFingerMultiTap to be the second finger
instead of the first finger. Otherwise, the gesture is impossible to
perform because isSecondFingerInsideSlop() always returns false in
SecondFingerMultiTap.onMove().

Verified that a SecondFingerMultiTap triggers a double tap event.

Google: 3014734
Change-Id: I451c6b9982344c1d560a0643fe0dcdfcc81968ef
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
This change makes sure that the consecutive delimiters at the
beginning of the just refilled buffer are consumed.

Previously, if there were consecutive delimiters at the beginning
of the just refilled buffer, they were not being consumed and were
causing parsing errors. This was also causing fatal exceptions.

```
04-22 12:37:53.077   607   707 E AndroidRuntime: *** FATAL EXCEPTION IN SYSTEM PROCESS: CachedAppOptimizerThread
04-22 12:37:53.077   607   707 E AndroidRuntime: java.lang.NumberFormatException: invalid long: READ
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.util.ProcFileReader.invalidLong(ProcFileReader.java:238)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.util.ProcFileReader.parseAndConsumeLong(ProcFileReader.java:220)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.util.ProcFileReader.nextLong(ProcFileReader.java:183)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.util.ProcFileReader.nextLong(ProcFileReader.java:172)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.util.ProcFileReader.nextInt(ProcFileReader.java:246)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.internal.os.ProcLocksReader.handleBlockingFileLocks(ProcLocksReader.java:111)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at com.android.server.am.CachedAppOptimizer$FreezeHandler.handleMessage(CachedAppOptimizer.java:2267)
04-22 12:37:53.077   607   707 E AndroidRuntime: 	at android.os.Handler.dispatchMessage(Handler.java:107)
04-22 12
```

Bug: 336208153
Bug: 338416108
Bug: 331988929
Test: atest --host-unit-test-only -c  ProcFileReaderTest
Google: 3073613
Change-Id: I12813fa204d53d53687ffe6e8e3c0a85595b7e25
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
…EY_MISSING

Bug: 337174893
Test: manual, connect to paired but just factory reseted headset
Flag: EXEMPT, xml file change
Change-Id: I3ff5698f896b7b8caee02bf2d5f7b398c6fad418
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
We found that the light sensor and cached auto brightness value were
invalidated when entering doze mode, regardless of the value of
config_allowAutoBrightnessWhileDozing.

AutomaticBrightnessStrategy already checks for dozing state, using it
to decide the `state` arg to AutomaticBrightnessController.configure();
the controller should not second-guess it.

Bug: 304339170
Test: manual; go into Doze in a dark environment
Change-Id: I85d6b5872d475b164aa469ab18bb7034b073161e
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
After broadcasting a new USB_STATE that includes MTP or PTP, we now
also bind to the MtpService. This elevates the MTP process
(android.process.media) to a foreground process (without adding an
extra notification). I.e. it inherits the foreground status from
UsbDeviceManager. The MTP process needs this to prevent it from
getting frozen by the ActivityManager while the connection is active.

Before this change the error could easily be reproduced:
1. Connect and disconnect a USB device providing
   "mClass=255,mSubclass=255,mProtocol=0" (many docking stations with a
   LAN device do this).
2. Connect the phone to your PC.
3. Set "File transfer" mode.
4. File access via MTP on your PC should work for about 10 seconds but
   then stops responding.

The first step makes com.android.mtp show UI, making ActivityManager
push it down to cached state more eagerly.

This error did in practice not show up before Android U since:
* The MTP process was kept warm (unfrozen) by periodically receiving
  the BATTERY_CHANGED intent (most often at least once per minute).
* The freeze timeout, DEFAULT_FREEZER_DEBOUNCE_TIMEOUT, was 600 seconds
  (changed to 10 seconds in Android U).
* The broadcast queue did deliver BATTERY_CHANGED intents also to
  frozen processes even with the option deliveryGroupPolicy=1
  (DELIVERY_GROUP_POLICY_MOST_RECENT). This is not the case in
  Android U with the new broadcast queue (BroadcastQueueModernImpl).

Bug: 301232841
Test: manual, according to steps listed above
Change-Id: Ic570381dd55152dbecb338372692bfc5caf5d7de
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
When deciding whether brightness change should be slow or fast we use
"hasAppliedAutoBrightness()". However, this value is always reset to
true by "setAutoBrightnessState()". The correct way is to save
"hasAppliedAutoBrightness()" before "setAutoBrightnessState()" and use
the saved value.

Bug: 304313764
Test: manual
Change-Id: I0ace4523813099af266a37a984cbd785b462403e
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: minaripenguin <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
This change fixes https://issuetracker.google.com/issues/335003907

This change replaces
GetPrimitiveArrayCritical/ReleasePrimitiveArrayCritical with
GetByteArrayRegion/SetByteArrayRegion.

This change is needed because the critical API variants are not
appropriate for this context. See the JNI docs:

After calling GetPrimitiveArrayCritical, the native code should not run
for an extended period of time before it calls
ReleasePrimitiveArrayCritical.

In bulkTransfer, we call usb_device_bulk_transfer between
GetPrimitiveArrayCritical/ReleasePrimitiveArrayCritical.
usb_device_bulk_transfer is a blocking call so this can lead to GC
hangs.

Instead, we allocate a new buffer with malloc and then call
GetByteArrayRegion/SetByteArrayRegion before/after
usb_device_bulk_transfer, depending on the direction of the endpoint.

Test: I ran UsbTests. I also sent a "TEST UNIT READY" to a USB drive and
verified the response.

Change-Id: I5c82aac3fe99e1f11044f20091bf3a940bc8f6a7
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
 PersistableBundle store the data use the ArrayMap,so the null key may put into the map.So we should make a judgment to prevent the systemserver crash.

Bug: 337781283
Change-Id: I9ce8c86aa9c9142e3b413bdb1eaaf51099592e72
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Bug: 337070728
Change-Id: I63707b4f9fe3bcd705e98ac2e69a5101d092de76
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Bug: 337711090
Change-Id: If20c27c704e3db2b5960af1fe71066e1cbc6eaf4
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
mLatch.notifyAll() will not help wake the thread which is blocked by
mLatch.await, instead, it will cause system server crash.

So, mark state as failed if any package is failed to be deleted, and let
mLatch.countDown work until it comes to 0 and wake the thread blocked by
await.

Change-Id: Ida1c3c128ddef376aaaacda1358717d0d4e9ca8b
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
…ess buckets

Note: This is an upstream from Meta.

Problem:
initializeDefaultsForSystemApps() is not informing listeners of change in uid idleness.
This results in stale idleness values in components such as the network policy manager, which
has listeners to uid changes.

Solution:
call maybeInformListeners() to make sure listeners are informed of the changes

Test: Manual test + New Unit Test

 Manual Test on Meta device:
  Tested on a race condition where network policy manager queried for the idleness of a uid before
  initializeDefaultsForSystemApps() is called.

  Before the fix, network policy manager got STANDBY_BUCKET_NEVER as idleness
  and never got informed of change in uid when initializeDefaultsForSystemApps()
  sets uid idleness bucket to STANDBY_BUCKET_ACTIVE

  After the fix, network policy manager's listener was able to be informed of this change in uid.

Change-Id: Ic6b665eea4a07d133a85789bce1a1af514e7ee96
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Using of 'instanceof' cannot determine whether 'nextParent' is non-null during the first loop in do-while, so when 'focused.getParent()' outside the loop returns null, the loop body will trigger a null pointer exception. Therefore, the conditional judgment needs to be covered in every loop.

Test:UAT
Bug: 336205346

Change-Id: I78374410d928009ea9b99630cae2fbea24ba8ab6
Signed-off-by: zhuning3 <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
When the same SparseMappingTable is referenced by multiple objects as mParent,
when SparseMappingTable executes reset(), it also executes resetTable() on the Table object it holds.
wqThis is used to ensure the correspondence between the two arrays mLongs and mTable.

Test: atest SparseMappingTableTest
Bug: 336154577

Change-Id: I4614a5a38aad4e1316dea09db13407688f6e03d8
Signed-off-by: hupeng3 <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Remote Key Provisioning is an important part of the Android ecosystem
which provides attestation keys. The application needs to be able to
provide on demand attestation keys which is currently not possible in
data saver mode or power saver mode.

Bug: 330929450
Test: Checked the policy after setting data saver and power saver mode
in cuttlefish.
Change-Id: Ibed7d120c99c48cb15f9410b7c5386cda09480ca

Change-Id: I685e461f3d352e28351c721a559139dad21c62f9
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
BackgroundThread is being overused in many scenarios, such as ams and
pms, among others. If it is used excessively in other areas, it may
cause a block in LauncherAppService.

We have experienced several internal failures, such as opening a cloned
account and then installing an application. After the application was
installed, the BackgroundThread became too busy for various reasons, and
LauncherAppService was unable to notify the launcher in time, resulting
in a very slow display of desktop icons. This delay took dozens of
seconds to occur after the application was installed.

To avoid such issues, it is recommended to open a new thread for
LauncherAppService and not share the system's BackgroundThread.

Change-Id: Ib85f973686a0586507a6f76110e3f879be9641b7
Signed-off-by: Jia Jia <[email protected]>
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
…od .

Bug: 338661733
Change-Id: I04ce021ef7838f0574875359daeb8c765d5f6a09
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: rezaadi0105 <[email protected]>
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Should match the change they did for volume panel at 14/QPR2

Signed-off-by: Jis G Jacob <[email protected]>
WTF google??? this was always true by default. you have a config set to 1 as well.
Please stop smoking.
Consistency was killed with this change introduced in QPR2:
https://android.googlesource.com/platform/frameworks/base/+/14a03f2418f4c2c74a9346f435094358b41af308
I expect it to be fixed by google down the road.

Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Signed-off-by: Dmitrii <[email protected]>
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
Change-Id: Ic6cfbb8e5f60b69401fc69ca44e2d879b506003d
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
 color

With dynamic Monet themes, most of the UI has at least a small amount
of color (chroma), so pure white stands out as the sole outlier (e.g.
Settings search bar in light mode). Use the 99% lightness shade instead
to improve consistency.

Change-Id: I7dfe3e483fa207ce4d77349ac97872e0831ef3c8
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
…ckground

This matches the stock Pixel style and makes progress bars look more
integrated, since the active (foreground) part is using the accent
color.

Change-Id: Ife7a79a390f6f9bdb2fd76722cd39adcfc182da1
Signed-off-by: Pranav Vashi <[email protected]>
Signed-off-by: Hưng Phan <[email protected]>
Signed-off-by: Jis G Jacob <[email protected]>
- Since Google migrated keystore to v2 they removed getApplicationContext which is required by Asus Flip Camera MotorService app.
- This fixes following issue

10-14 08:53:32.136  2491  2491 E AndroidRuntime: FATAL EXCEPTION: main
10-14 08:53:32.136  2491  2491 E AndroidRuntime: Process: com.asus.motorservice, PID: 2491
10-14 08:53:32.136  2491  2491 E AndroidRuntime: java.lang.NoSuchMethodError: No static method getApplicationContext()Landroid/content/Context; in class Landroid/security/KeyStore; or its super classes (declaration of 'android.security.KeyStore' appears in /system/framework/framework.jar!classes2.dex)
10-14 08:53:32.136  2491  2491 E AndroidRuntime:   at com.asus.motorservice.t.<init>(Unknown Source:29)

Change-Id: I9c95000a8f3d26022bad4a5db85eb8de48f8aa49
Signed-off-by: Jackeagle <[email protected]>
Bumps [ws](https://github.com/websockets/ws) from 8.11.0 to 8.17.1.
- [Release notes](https://github.com/websockets/ws/releases)
- [Commits](websockets/ws@8.11.0...8.17.1)

---
updated-dependencies:
- dependency-name: ws
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code labels Jun 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file javascript Pull requests that update Javascript code
Projects
None yet
Development

Successfully merging this pull request may close these issues.