gms: Update blobs from tegu BP2A.250605.031.A2

This commit is contained in:
Joey Huab 2025-07-03 07:10:56 +09:00
parent 949b1d6c76
commit 88547b5768
15 changed files with 134 additions and 42 deletions

View file

@ -58,12 +58,12 @@ PRODUCT_PACKAGES += \
talkback talkback
# product/priv-app # product/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
SCONE SCONE
endif endif
ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
DreamlinerDreamsPrebuilt \ DreamlinerDreamsPrebuilt \
DreamlinerPrebuilt \ DreamlinerPrebuilt \
@ -133,7 +133,7 @@ PRODUCT_PACKAGES += \
Flipendo Flipendo
# system_ext/priv-app # system_ext/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
DeviceConnectivityServicePrebuilt_25.01.00 DeviceConnectivityServicePrebuilt_25.01.00
endif endif

View file

@ -95,7 +95,7 @@ PRODUCT_PACKAGES += \
WellbeingPrebuilt WellbeingPrebuilt
# product/priv-app # product/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
SCONE SCONE
endif endif
@ -131,7 +131,7 @@ PRODUCT_PACKAGES += \
WallpaperPickerGoogleRelease WallpaperPickerGoogleRelease
# system_ext/priv-app # system_ext/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
DeviceConnectivityServicePrebuilt_25.01.00 DeviceConnectivityServicePrebuilt_25.01.00
endif endif

View file

@ -73,12 +73,12 @@ PRODUCT_PACKAGES += \
WellbeingPrebuilt WellbeingPrebuilt
# product/priv-app # product/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
SCONE SCONE
endif endif
ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
DreamlinerDreamsPrebuilt \ DreamlinerDreamsPrebuilt \
DreamlinerPrebuilt \ DreamlinerPrebuilt \

View file

@ -66,12 +66,12 @@ PRODUCT_PACKAGES += \
WellbeingPrebuilt WellbeingPrebuilt
# product/priv-app # product/priv-app
ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter sailfish marlin walleye taimen blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
SCONE SCONE
endif endif
ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo frankel blazer mustang, $(LINEAGE_BUILD)),) ifneq ($(filter flame coral redfin oriole raven panther cheetah lynx felix shiba husky akita tokay caiman komodo tegu frankel blazer mustang, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
DreamlinerDreamsPrebuilt \ DreamlinerDreamsPrebuilt \
DreamlinerPrebuilt \ DreamlinerPrebuilt \

View file

@ -86,6 +86,14 @@ prebuilt_etc {
filename_from_src: true, filename_from_src: true,
} }
prebuilt_etc {
name: "com.google.android.apps.pixel.familyspace",
product_specific: true,
sub_dir: "permissions",
src: "com.google.android.apps.pixel.familyspace.xml",
filename_from_src: true,
}
prebuilt_etc { prebuilt_etc {
name: "com.google.android.apps.setupwizard.searchselector", name: "com.google.android.apps.setupwizard.searchselector",
product_specific: true, product_specific: true,

View file

@ -0,0 +1,7 @@
<?xml version="1.0" encoding="utf-8"?>
<permissions>
<privapp-permissions package="com.google.android.apps.pixel.familyspace">
<permission name="android.permission.GET_ACCOUNTS_PRIVILEGED"/>
<permission name="android.permission.WRITE_SECURE_SETTINGS"/>
</privapp-permissions>
</permissions>

View file

@ -99,6 +99,9 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.READ_DROPBOX_DATA"/> <permission name="android.permission.READ_DROPBOX_DATA"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/> <permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.READ_LOGS"/> <permission name="android.permission.READ_LOGS"/>
<permission name="android.permission.START_FOREGROUND_SERVICES_FROM_BACKGROUND"/>
<permission name="android.permission.LOCAL_MAC_ADDRESS"/>
<permission name="android.permission.BLUETOOTH_PRIVILEGED"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.apps.gmm.dev"> <privapp-permissions package="com.google.android.apps.gmm.dev">
@ -125,6 +128,14 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.INTERACT_ACROSS_USERS"/> <permission name="android.permission.INTERACT_ACROSS_USERS"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.apps.pixel.customizationbundle">
<permission name="android.permission.SET_WALLPAPER_COMPONENT"/>
<permission name="android.permission.READ_WALLPAPER_INTERNAL"/>
<permission name="android.permission.BIND_WALLPAPER"/>
<permission name="android.permission.WRITE_SETTINGS"/>
<permission name="android.permission.START_FOREGROUND_SERVICES_FROM_BACKGROUND"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.apps.restore"> <privapp-permissions package="com.google.android.apps.restore">
<permission name="android.permission.BACKUP"/> <permission name="android.permission.BACKUP"/>
<permission name="android.permission.MANAGE_USB"/> <permission name="android.permission.MANAGE_USB"/>
@ -171,6 +182,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.OVERRIDE_WIFI_CONFIG"/> <permission name="android.permission.OVERRIDE_WIFI_CONFIG"/>
<permission name="android.permission.READ_PRECISE_PHONE_STATE"/> <permission name="android.permission.READ_PRECISE_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/> <permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.READ_WIFI_CREDENTIAL"/>
<permission name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"/> <permission name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"/>
<permission name="android.permission.WIFI_UPDATE_USABILITY_STATS_SCORE"/> <permission name="android.permission.WIFI_UPDATE_USABILITY_STATS_SCORE"/>
<permission name="android.permission.WIFI_SET_DEVICE_MOBILITY_STATE"/> <permission name="android.permission.WIFI_SET_DEVICE_MOBILITY_STATE"/>
@ -196,6 +208,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="com.google.android.apps.stargate.endpointservice.ACCESS_ENDPOINT_SERVICE"/> <permission name="com.google.android.apps.stargate.endpointservice.ACCESS_ENDPOINT_SERVICE"/>
<permission name="com.google.android.permission.USE_GRIL"/> <permission name="com.google.android.permission.USE_GRIL"/>
<permission name="com.google.android.rilextension.permission.REPORT_RIL_ISSUE"/> <permission name="com.google.android.rilextension.permission.REPORT_RIL_ISSUE"/>
<permission name="com.google.pixel.iwlan.permission.RESTART_IWLAN"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.apps.wearables.maestro.companion"> <privapp-permissions package="com.google.android.apps.wearables.maestro.companion">
@ -230,6 +243,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<privapp-permissions package="com.google.android.as"> <privapp-permissions package="com.google.android.as">
<permission name="android.permission.ACCESS_CONTEXT_HUB"/> <permission name="android.permission.ACCESS_CONTEXT_HUB"/>
<permission name="android.permission.ACCESS_HIDDEN_PROFILES_FULL"/> <permission name="android.permission.ACCESS_HIDDEN_PROFILES_FULL"/>
<permission name="android.permission.ACCESS_TEXT_CLASSIFIER_BY_TYPE"/>
<permission name="android.permission.ACCESS_ULTRASOUND"/> <permission name="android.permission.ACCESS_ULTRASOUND"/>
<permission name="android.permission.BLUETOOTH_PRIVILEGED"/> <permission name="android.permission.BLUETOOTH_PRIVILEGED"/>
<permission name="android.permission.CAPTURE_AUDIO_HOTWORD"/> <permission name="android.permission.CAPTURE_AUDIO_HOTWORD"/>
@ -368,6 +382,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<privapp-permissions package="com.google.android.wallpaper.effects"> <privapp-permissions package="com.google.android.wallpaper.effects">
<permission name="android.permission.MANAGE_WALLPAPER_EFFECTS_GENERATION"/> <permission name="android.permission.MANAGE_WALLPAPER_EFFECTS_GENERATION"/>
<permission name="android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE" />
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.wfcactivation"> <privapp-permissions package="com.google.android.wfcactivation">
@ -408,6 +423,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.MANAGE_USERS"/> <permission name="android.permission.MANAGE_USERS"/>
<permission name="android.permission.PACKAGE_USAGE_STATS"/> <permission name="android.permission.PACKAGE_USAGE_STATS"/>
<permission name="android.permission.PACKAGE_VERIFICATION_AGENT"/> <permission name="android.permission.PACKAGE_VERIFICATION_AGENT"/>
<permission name="android.permission.QUERY_ADVANCED_PROTECTION_MODE"/>
<permission name="android.permission.READ_SYSTEM_GRAMMATICAL_GENDER"/> <permission name="android.permission.READ_SYSTEM_GRAMMATICAL_GENDER"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/> <permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<permission name="android.permission.READ_RUNTIME_PROFILES"/> <permission name="android.permission.READ_RUNTIME_PROFILES"/>
@ -496,6 +512,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.ACTIVITY_EMBEDDING"/> <permission name="android.permission.ACTIVITY_EMBEDDING"/>
<permission name="android.permission.ALLOCATE_AGGRESSIVE"/> <permission name="android.permission.ALLOCATE_AGGRESSIVE"/>
<permission name="android.permission.BACKUP"/> <permission name="android.permission.BACKUP"/>
<permission name="android.permission.BIND_INTRUSION_DETECTION_EVENT_TRANSPORT_SERVICE" />
<permission name="android.permission.BLUETOOTH_PRIVILEGED"/> <permission name="android.permission.BLUETOOTH_PRIVILEGED"/>
<permission name="android.permission.BROADCAST_CLOSE_SYSTEM_DIALOGS"/> <permission name="android.permission.BROADCAST_CLOSE_SYSTEM_DIALOGS"/>
<permission name="android.permission.CALL_AUDIO_INTERCEPTION"/> <permission name="android.permission.CALL_AUDIO_INTERCEPTION"/>
@ -532,6 +549,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.MANAGE_FACTORY_RESET_PROTECTION" /> <permission name="android.permission.MANAGE_FACTORY_RESET_PROTECTION" />
<permission name="android.permission.MANAGE_GAME_ACTIVITY" /> <permission name="android.permission.MANAGE_GAME_ACTIVITY" />
<permission name="android.permission.MANAGE_GAME_MODE" /> <permission name="android.permission.MANAGE_GAME_MODE" />
<permission name="android.permission.MANAGE_INTRUSION_DETECTION_STATE" />
<permission name="android.permission.MANAGE_ROLLBACKS"/> <permission name="android.permission.MANAGE_ROLLBACKS"/>
<permission name="android.permission.MANAGE_SOUND_TRIGGER"/> <permission name="android.permission.MANAGE_SOUND_TRIGGER"/>
<permission name="android.permission.MANAGE_SUBSCRIPTION_PLANS"/> <permission name="android.permission.MANAGE_SUBSCRIPTION_PLANS"/>
@ -559,6 +577,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.PROVIDE_TRUST_AGENT"/> <permission name="android.permission.PROVIDE_TRUST_AGENT"/>
<permission name="android.permission.READ_DREAM_STATE"/> <permission name="android.permission.READ_DREAM_STATE"/>
<permission name="android.permission.READ_DROPBOX_DATA"/> <permission name="android.permission.READ_DROPBOX_DATA"/>
<permission name="android.permission.READ_INTRUSION_DETECTION_STATE" />
<permission name="android.permission.READ_LOGS"/> <permission name="android.permission.READ_LOGS"/>
<permission name="android.permission.READ_NEARBY_STREAMING_POLICY"/> <permission name="android.permission.READ_NEARBY_STREAMING_POLICY"/>
<permission name="android.permission.READ_NETWORK_USAGE_HISTORY"/> <permission name="android.permission.READ_NETWORK_USAGE_HISTORY"/>
@ -607,7 +626,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.WRITE_SECURE_SETTINGS"/> <permission name="android.permission.WRITE_SECURE_SETTINGS"/>
<permission name="android.permission.WRITE_VERIFICATION_STATE_E2EE_CONTACT_KEYS"/> <permission name="android.permission.WRITE_VERIFICATION_STATE_E2EE_CONTACT_KEYS"/>
<permission name="com.android.voicemail.permission.READ_VOICEMAIL"/> <permission name="com.android.voicemail.permission.READ_VOICEMAIL"/>
<permission name="com.google.android.permission.USE_GRIL"/> <permission name="android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.gms.supervision"> <privapp-permissions package="com.google.android.gms.supervision">
@ -690,6 +709,8 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.WRITE_APN_SETTINGS"/> <permission name="android.permission.WRITE_APN_SETTINGS"/>
<permission name="android.permission.WRITE_DREAM_STATE"/> <permission name="android.permission.WRITE_DREAM_STATE"/>
<permission name="android.permission.SUBSTITUTE_SHARE_TARGET_APP_NAME_AND_ICON"/> <permission name="android.permission.SUBSTITUTE_SHARE_TARGET_APP_NAME_AND_ICON"/>
<permission name="android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE"/>
<permission name="android.permission.EXECUTE_APP_FUNCTIONS"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.settings.intelligence"> <privapp-permissions package="com.google.android.settings.intelligence">
@ -760,6 +781,10 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/> <permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.pcs">
<permission name="android.permission.PACKAGE_USAGE_STATS"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.onetimeinitializer"> <privapp-permissions package="com.google.android.onetimeinitializer">
<permission name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"/> <permission name="android.permission.CHANGE_COMPONENT_ENABLED_STATE"/>
</privapp-permissions> </privapp-permissions>
@ -797,6 +822,8 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.INSTALL_PACKAGE_UPDATES"/> <permission name="android.permission.INSTALL_PACKAGE_UPDATES"/>
<permission name="android.permission.BIND_WALLPAPER"/> <permission name="android.permission.BIND_WALLPAPER"/>
<permission name="android.permission.REBOOT"/> <permission name="android.permission.REBOOT"/>
<permission name="android.permission.MANAGE_WIFI_NETWORK_SELECTION"/>
<permission name="android.permission.LOCAL_MAC_ADDRESS"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.apps.security.securityhub"> <privapp-permissions package="com.google.android.apps.security.securityhub">
@ -879,6 +906,28 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.CAPTURE_CONSENTLESS_BUGREPORT_DELEGATED_CONSENT" /> <permission name="android.permission.CAPTURE_CONSENTLESS_BUGREPORT_DELEGATED_CONSENT" />
<!-- Used to access the Boost Data PSA service --> <!-- Used to access the Boost Data PSA service -->
<permission name="com.google.android.pixel.support.PERMISSION_ACCESS_BOOST_DATA_PSA_SERVICE" /> <permission name="com.google.android.pixel.support.PERMISSION_ACCESS_BOOST_DATA_PSA_SERVICE" />
<!-- Used to access Battery Saver settings -->
<permission name="android.permission.POWER_SAVER" />
<!-- Used to set UI mode i.e. Dark/Light theme -->
<permission name="android.permission.MODIFY_DAY_NIGHT_MODE" />
<!-- Used to set the phone state i.e. Mobile Data -->
<permission name="android.permission.MODIFY_PHONE_STATE" />
<!-- Used to get the phone state i.e. Mobile Data -->
<permission name="android.permission.READ_PRECISE_PHONE_STATE"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
<!-- Used to get the phone state i.e. Wifi Tethering -->
<permission name="android.permission.TETHER_PRIVILEGED"/>
<!-- Used to set the secured phone settings -->
<permission name="android.permission.WRITE_SECURE_SETTINGS"/>
<!-- Used to set the phone settings -->
<permission name="android.permission.WRITE_SETTINGS"/>
<!-- Used to set the Use Wifi settings -->
<permission name="android.permission.CHANGE_WIFI_STATE"/>
<!-- Used to set the Catalyst provided settings -->
<permission name="android.permission.WRITE_SYSTEM_PREFERENCES"/>
<permission name="android.permission.READ_SYSTEM_PREFERENCES"/>
<!-- Used to get pending system update -->
<permission name="android.permission.NOTIFY_PENDING_SYSTEM_UPDATE"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.apps.nest.dockmanager.app"> <privapp-permissions package="com.google.android.apps.nest.dockmanager.app">
@ -915,5 +964,11 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.READ_SYSTEM_GRAMMATICAL_GENDER"/> <permission name="android.permission.READ_SYSTEM_GRAMMATICAL_GENDER"/>
<permission name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"/> <permission name="android.permission.START_ACTIVITIES_FROM_BACKGROUND"/>
<permission name="android.permission.WRITE_SECURE_SETTINGS"/> <permission name="android.permission.WRITE_SECURE_SETTINGS"/>
<!-- Used to read hardware identifiers for support. -->
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions>
<privapp-permissions package="com.google.android.wallpaper.weathereffects">
<permission name="android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE" />
</privapp-permissions> </privapp-permissions>
</permissions> </permissions>

View file

@ -270,6 +270,14 @@ prebuilt_etc {
filename_from_src: true, filename_from_src: true,
} }
prebuilt_etc {
name: "pixel_experience_2025_midyear",
product_specific: true,
sub_dir: "sysconfig",
src: "pixel_experience_2025_midyear.xml",
filename_from_src: true,
}
prebuilt_etc { prebuilt_etc {
name: "preinstalled-packages-product-pixel-2017-and-newer", name: "preinstalled-packages-product-pixel-2017-and-newer",
product_specific: true, product_specific: true,
@ -310,6 +318,14 @@ prebuilt_etc {
filename_from_src: true, filename_from_src: true,
} }
prebuilt_etc {
name: "preinstalled-packages-product-pixel-2024-and-newer",
product_specific: true,
sub_dir: "sysconfig",
src: "preinstalled-packages-product-pixel-2024-and-newer.xml",
filename_from_src: true,
}
prebuilt_etc { prebuilt_etc {
name: "quick_tap", name: "quick_tap",
product_specific: true, product_specific: true,

View file

@ -112,6 +112,7 @@
provided by the package. --> provided by the package. -->
<allow-association target="com.google.android.as" allowed="com.android.bluetooth" /> <allow-association target="com.google.android.as" allowed="com.android.bluetooth" />
<allow-association target="com.google.android.as" allowed="com.android.bluetooth.services" /> <allow-association target="com.google.android.as" allowed="com.android.bluetooth.services" />
<allow-association target="com.google.android.as" allowed="com.android.phone" />
<allow-association target="com.google.android.as" allowed="com.android.providers.contacts" /> <allow-association target="com.google.android.as" allowed="com.android.providers.contacts" />
<allow-association target="com.google.android.as" allowed="com.android.providers.media" /> <allow-association target="com.google.android.as" allowed="com.android.providers.media" />
<allow-association target="com.google.android.as" allowed="com.android.providers.telephony" /> <allow-association target="com.google.android.as" allowed="com.android.providers.telephony" />

View file

@ -0,0 +1,7 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- These are configurations that should exist on Google's 2025 mid year and newer devices. -->
<config>
<!-- This is meant to be the canonical feature identifying 2025 mid year and newer devices. -->
<feature name="com.google.android.feature.PIXEL_2025_MIDYEAR_EXPERIENCE" />
</config>

View file

@ -0,0 +1,13 @@
<?xml version="1.0" encoding="utf-8"?>
<!-- System packages to preinstall, per user type,
Documentation at frameworks/base/data/etc/preinstalled-packages-platform.xml
-->
<config>
<!-- When stargate is installed in multiple users, it registers the eSIM
IMSI separately for each user, which the server component does not
support. To avoid this, we restrict stargate to just the SYSTEM user.
Consequently,, stargate will not support HSUM. go/supporting-hsum -->
<install-in-user-type package="com.google.android.apps.stargate">
<install-in user-type="SYSTEM" />
</install-in-user-type>
</config>

View file

@ -34,6 +34,7 @@ PRODUCT_PACKAGES += \
com.android.sdm.plugins.diagmon \ com.android.sdm.plugins.diagmon \
com.customermobile.preload.vzw \ com.customermobile.preload.vzw \
com.google.android.apps.dreamliner \ com.google.android.apps.dreamliner \
com.google.android.apps.pixel.familyspace \
com.google.android.apps.setupwizard.searchselector \ com.google.android.apps.setupwizard.searchselector \
com.google.android.apps.stargate \ com.google.android.apps.stargate \
com.google.android.apps.stargate.support \ com.google.android.apps.stargate.support \
@ -76,9 +77,10 @@ PRODUCT_PACKAGES += \
preinstalled-packages-product-pixel-2018-and-newer \ preinstalled-packages-product-pixel-2018-and-newer \
preinstalled-packages-product-pixel-2019-and-newer \ preinstalled-packages-product-pixel-2019-and-newer \
preinstalled-packages-product-pixel-2022-and-newer \ preinstalled-packages-product-pixel-2022-and-newer \
preinstalled-packages-product-pixel-2023-and-newer preinstalled-packages-product-pixel-2023-and-newer \
preinstalled-packages-product-pixel-2024-and-newer
ifneq ($(filter blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet, $(LINEAGE_BUILD)),) ifneq ($(filter blueline crosshatch sargo bonito flame coral sunfish bramble redfin barbet oriole raven bluejay panther cheetah lynx tangorpro felix shiba husky akita tokay caiman komodo comet tegu, $(LINEAGE_BUILD)),)
PRODUCT_PACKAGES += \ PRODUCT_PACKAGES += \
GoogleCamera_6gb_or_more_ram \ GoogleCamera_6gb_or_more_ram \
adaptivecharging \ adaptivecharging \
@ -114,6 +116,17 @@ PRODUCT_PACKAGES += \
pixel_experience_2024 \ pixel_experience_2024 \
pixel_experience_2024_midyear \ pixel_experience_2024_midyear \
quick_tap quick_tap
else ifeq ($(RELEASE_PIXEL_2025_ENABLED),true)
PRODUCT_PACKAGES += \
pixel_experience_2021 \
pixel_experience_2022 \
pixel_experience_2022_midyear \
pixel_experience_2023 \
pixel_experience_2023_midyear \
pixel_experience_2024 \
pixel_experience_2024_midyear \
pixel_experience_2025_midyear \
quick_tap
endif endif
# GMS Verity Configuration # GMS Verity Configuration

View file

@ -1,30 +0,0 @@
#
# Copyright (C) 2018-2019 The Google Pixel3ROM Project
# Copyright (C) 2024 The hentaiOS Project and its Proprietors
#
# Licensed under the Apache License, Version 2.0 (the License);
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an AS IS BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
#
LOCAL_PATH := $(call my-dir)
include $(CLEAR_VARS)
LOCAL_MODULE := Drive
LOCAL_MODULE_TAGS := optional
LOCAL_SRC_FILES := Drive.apk
LOCAL_CERTIFICATE := PRESIGNED
LOCAL_PRODUCT_MODULE := true
LOCAL_MODULE_CLASS := APPS
LOCAL_OPTIONAL_USES_LIBRARIES := org.apache.http.legacy androidx.window.extensions androidx.window.sidecar
LOCAL_MODULE_SUFFIX := $(COMMON_ANDROID_PACKAGE_SUFFIX)
include $(BUILD_PREBUILT)

View file

@ -149,6 +149,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<permission name="android.permission.SCHEDULE_EXACT_ALARM"/> <permission name="android.permission.SCHEDULE_EXACT_ALARM"/>
<permission name="android.permission.INTERACT_ACROSS_USERS"/> <permission name="android.permission.INTERACT_ACROSS_USERS"/>
<permission name="android.permission.CHANGE_OVERLAY_PACKAGES"/> <permission name="android.permission.CHANGE_OVERLAY_PACKAGES"/>
<permission name="android.permission.READ_PRIVILEGED_PHONE_STATE"/>
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.google.android.grilservice"> <privapp-permissions package="com.google.android.grilservice">
@ -267,6 +268,7 @@ It allows additional grants on top of privapp-permissions-platform.xml
<privapp-permissions package="com.google.android.apps.magicportrait"> <privapp-permissions package="com.google.android.apps.magicportrait">
<permission name="android.permission.MANAGE_WALLPAPER_EFFECTS_GENERATION" /> <permission name="android.permission.MANAGE_WALLPAPER_EFFECTS_GENERATION" />
<permission name="android.permission.ACCESS_SMARTSPACE" /> <permission name="android.permission.ACCESS_SMARTSPACE" />
<permission name="android.permission.SUBSCRIBE_TO_KEYGUARD_LOCKED_STATE" />
</privapp-permissions> </privapp-permissions>
<privapp-permissions package="com.android.multiuser"> <privapp-permissions package="com.android.multiuser">