This repository has been archived by the owner on Sep 6, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 527
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Separate global settings for each Android user
Closes #1563
- Loading branch information
M66B
committed
Mar 16, 2014
1 parent
e95c4f0
commit 8700d42
Showing
12 changed files
with
213 additions
and
141 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
8700d42
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Concerning dangerous functions. Only the primary user can set them, and I don't understand why. Why not let the secondary user set his own dangerous functions.
If I read this right, given that userId is given wherever cDangerousSetting is checked, the secondary users are stuck with the developer's defaults for dangerous functions.
8700d42
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The problem is to get the userId here:
https://github.com/M66B/XPrivacy/blob/master/src/biz/bokhorst/xprivacy/Hook.java#L78
8700d42
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Isn't hook.toggleDangerous run in the app process?
In which case, why is getting the userId a problem?
8700d42
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
'toggle' is not the problem, but 'is' is. This could be solved by passing the uid.