Home | History | Annotate | Download | only in settings

Lines Matching defs:setting

82 import com.android.providers.settings.SettingsState.Setting;
122 * key derived from the setting type in the most significant bits and user
359 for (String setting : settingsToBackup) {
360 if (validators.get(setting) == null) {
361 offenders.append(setting).append(" ");
384 Setting setting = getGlobalSetting(name);
385 return packageValueForCallResult(setting, isTrackingGeneration(args));
389 Setting setting = getSecureSetting(name, requestingUserId,
391 return packageValueForCallResult(setting, isTrackingGeneration(args));
395 Setting setting = getSystemSetting(name, requestingUserId);
396 return packageValueForCallResult(setting, isTrackingGeneration(args));
471 Setting setting = getGlobalSetting(args.name);
472 return packageSettingForQuery(setting, normalizedProjection);
481 Setting setting = getSecureSetting(args.name, userId);
482 return packageSettingForQuery(setting, normalizedProjection);
491 Setting setting = getSystemSetting(args.name, userId);
492 return packageSettingForQuery(setting, normalizedProjection);
679 // Redirect cache to parent if ringtone setting is owned by profile parent
763 Setting setting = settingsState.getSettingLocked(name);
764 pw.print("_id:"); pw.print(toDumpString(setting.getId()));
766 if (setting.getPackageName() != null) {
767 pw.print(" pkg:"); pw.print(setting.getPackageName());
769 pw.print(" value:"); pw.print(toDumpString(setting.getValue()));
770 if (setting.getDefaultValue() != null) {
771 pw.print(" default:"); pw.print(setting.getDefaultValue());
772 pw.print(" defaultSystemSet:"); pw.print(setting.isDefaultFromSystem());
774 if (setting.getTag() != null) {
775 pw.print(" tag:"); pw.print(setting.getTag());
839 // should be reworked to keep them separate and system code should check the setting
853 Setting setting = getSecureSetting(
856 setting != null ? setting.getValue() : null, null,
868 Setting setting = getGlobalSetting(Settings.Global.INSTALL_NON_MARKET_APPS);
869 String value = setting != null ? setting.getValue() : null;
882 Setting setting = getGlobalSetting(Settings.Global.ADB_ENABLED);
883 String value = setting != null ? setting.getValue() : null;
896 Setting enable = getGlobalSetting(
901 Setting include = getGlobalSetting(
916 Setting setting = getGlobalSetting(
918 String value = setting != null ? setting.getValue() : null;
950 Setting setting = settingsState.getSettingLocked(name);
951 appendSettingToCursor(result, setting);
958 private Setting getGlobalSetting(String name) {
963 // Ensure the caller can access the setting.
1022 // If this is a setting that is currently restricted for this user, do not allow
1098 // This caller is not permitted to access this setting. Pretend the setting
1105 final Setting setting;
1107 setting = getSsaidSettingLocked(ssaidCallingPkg, owningUserId);
1109 setting = mSettingsRegistry.getSettingLocked(SETTINGS_TYPE_SECURE, owningUserId,
1112 appendSettingToCursor(result, setting);
1119 private Setting getSecureSetting(String name, int requestingUserId) {
1123 private Setting getSecureSetting(String name, int requestingUserId, boolean enableOverride) {
1131 // Ensure the caller can access the setting.
1138 // This caller is not permitted to access this setting. Pretend the setting doesn't
1155 final Setting overridden = getLocationProvidersAllowedSetting(owningUserId);
1174 private Setting getSsaidSettingLocked(PackageInfo callingPkg, int owningUserId) {
1184 final Setting ssaid = mSettingsRegistry.getSettingLocked(SETTINGS_TYPE_SSAID, owningUserId,
1213 Setting setting = mSettingsRegistry.getSettingLocked(SETTINGS_TYPE_SSAID,
1215 return mascaradeSsaidSetting(ssaidSettings, setting);
1220 Setting setting = mSettingsRegistry.generateSsaidLocked(callingPkg, owningUserId);
1221 return mascaradeSsaidSetting(ssaidSettings, setting);
1227 private Setting mascaradeSsaidSetting(SettingsState settingsState, Setting ssaidSetting) {
1233 return settingsState.new Setting(ssaidSetting) {
1249 private Setting getLocationProvidersAllowedSetting(int owningUserId) {
1251 final Setting setting = getGlobalSetting(
1253 if (!"1".equals(setting.getValue())) {
1259 return settingsState.new Setting(
1330 // If this is a setting that is currently restricted for this user, do not allow
1340 // Only the owning user can change the setting.
1404 Setting setting = mSettingsRegistry.getSettingLocked(
1406 appendSettingToCursor(result, setting);
1413 private Setting getSystemSetting(String name, int requestingUserId) {
1421 // Ensure the caller can access the setting.
1484 // Only the owning user id can change the setting.
1545 + " for setting: " + name);
1550 * Returns {@code true} if the specified secure setting should be accessible to the caller.
1564 // address in this secure setting. Secure settings can normally be read by any app,
1567 // To mitigate this we make this setting available only to callers privileged to see
1591 private int resolveOwningUserIdForSecureSettingLocked(int userId, String setting) {
1592 return resolveOwningUserIdLocked(userId, sSecureCloneToManagedSettings, setting);
1595 private int resolveOwningUserIdForSystemSettingLocked(int userId, String setting) {
1597 // Resolves dependency if setting has a dependency and the calling user has a parent
1598 if (sSystemCloneFromParentOnDependency.containsKey(setting)
1600 // The setting has a dependency and the profile has a parent
1601 String dependency = sSystemCloneFromParentOnDependency.get(setting);
1602 // Lookup the dependency setting as ourselves, some callers may not have access to it.
1605 Setting settingObj = getSecureSetting(dependency, userId);
1613 return resolveOwningUserIdLocked(userId, sSystemCloneToManagedSettings, setting);
1723 + " trying to access unexposed setting, this will be an error in the future.");
1786 * This setting contains a list of the currently enabled location providers.
1801 Setting oldSetting = getSecureSetting(
1876 "get/set setting for user", null);
1879 private Bundle packageValueForCallResult(Setting setting,
1882 if (setting == null || setting.isNull()) {
1885 return Bundle.forPair(Settings.NameValueTable.VALUE, setting.getValue());
1889 !setting.isNull() ? setting.getValue() : null);
1891 mSettingsRegistry.mGenerationRegistry.addGenerationData(result, setting.getKey());
1965 private static MatrixCursor packageSettingForQuery(Setting setting, String[] projection) {
1966 if (setting.isNull()) {
1970 appendSettingToCursor(cursor, setting);
1990 private static void appendSettingToCursor(MatrixCursor cursor, Setting setting) {
1991 if (setting == null || setting.isNull()) {
2003 values[i] = setting.getId();
2007 values[i] = setting.getName();
2011 values[i] = setting.getValue();
2163 public Setting generateSsaidLocked(PackageInfo callingPkg, int userId) {
2165 Setting userKeySetting = getSettingLocked(SETTINGS_TYPE_SSAID, userId, SSAID_USER_KEY);
2287 // Migrate the setting for this user if needed.
2450 public Setting getSettingLocked(int type, int userId, String name) {
2474 Setting setting = settingsState.getSettingLocked(name);
2475 if (packageName.equals(setting.getPackageName())) {
2476 if (tag != null && !tag.equals(setting.getTag())) {
2493 Setting setting = settingsState.getSettingLocked(name);
2495 setting.getPackageName())) {
2510 Setting setting = settingsState.getSettingLocked(name);
2512 setting.getPackageName())) {
2513 if (setting.isDefaultFromSystem()) {
2531 Setting setting = settingsState.getSettingLocked(name);
2533 if (setting.isDefaultFromSystem()) {
2714 Setting value = secureSettings.getSettingLocked(Settings.Secure.ANDROID_ID);
2761 // change notification for the location setting.
3024 * This is an example of moving a setting from secure to global.
3066 // v120: Add double tap to wake setting.
3090 Setting currentSetting = secureSettings.getSettingLocked(
3106 Setting currentSetting = globalSettings.getSettingLocked(
3132 Setting currentSetting = secureSettings.getSettingLocked(
3148 Setting currentSetting = secureSettings.getSettingLocked(
3180 final Setting showNotifications = systemSecureSettings.getSettingLocked(
3190 final Setting allowPrivate = systemSecureSettings.getSettingLocked(
3287 // Remove setting that specifies if magnification values should be preserved.
3288 // This setting defaulted to true and never has a UI.
3313 final Setting legacySsaidSetting = getSettingLocked(SETTINGS_TYPE_SECURE,
3335 final Setting ssaid = ssaidSettings.getSettingLocked(uid);
3353 // setting through the UI.
3378 // the user can no longer change the value of this setting through the UI.
3392 // This implementation was incorrectly setting the current value of
3404 Setting currentSetting = globalSettings.getSettingLocked(
3421 final Setting currentSetting = secureSettings
3427 Slog.d(LOG_TAG, "Setting [" + defaultValue + "] as Autofill Service "
3469 // "wifi_wakeup_available" setting).
3470 // The setting that was added here is deleted in 153.
3478 final Setting currentSetting = globalSettings.getSettingLocked(
3511 final Setting currentSetting = globalSettings.getSettingLocked(
3530 // Version 152: Removed. (This version made the setting for wifi_wakeup enabled
3532 // The setting updated here is deleted in 153.
3545 final Setting showNotificationBadges = systemSecureSettings.getSettingLocked(
3600 final Setting currentSetting = globalSettings.getSettingLocked(
3631 // Remove setting that specifies wifi bgscan throttling params
3646 Setting showNotifications = secureSettings.getSettingLocked(
3655 // The setting is no longer valid for managed profiles, it should be
3693 final Setting currentSetting = secureSettings.getSettingLocked(
3714 final Setting currentSetting = settings.getSettingLocked(
3731 final Setting currentSetting = settings.getSettingLocked(
3746 final Setting currentSetting = settings.getSettingLocked(
3754 final Setting currentUpdatedSetting = settings.getSettingLocked(
3762 final Setting currentSettingSuggestionViewed = settings.getSettingLocked(
3777 Setting currentHushUsedSetting = secureSettings.getSettingLocked(
3785 Setting currentRingerToggleCountSetting = secureSettings.getSettingLocked(
3798 final Setting currentSetting = globalSettings.getSettingLocked(
3811 final Setting currentSetting = systemSettings.getSettingLocked(
3847 Setting setting = settings.getSettingLocked(name);
3850 // that made the last change to the setting to properly determine
3854 callingUid = mPackageManager.getPackageUid(setting.getPackageName(), 0, userId);
3859 Slog.e(LOG_TAG, "Unknown package: " + setting.getPackageName());
3864 setting.getPackageName(), callingUid);
3866 settings.insertSettingLocked(name, setting.getValue(),
3867 setting.getTag(), true, setting.getPackageName());
3868 } else if (setting.getDefaultValue() != null && setting.isDefaultFromSystem()) {
3871 // the package changed the setting last is not a system one but the
3872 // setting is marked as its default coming from the system we clear
3879 Slog.e(LOG_TAG, "Error upgrading setting: " + setting.getName(), e);