top button
Flag Notify
    Connect to us
      Site Registration

Site Registration

Can android.googlesource.com provide git:// access way?

+1 vote
188 views

Now we should use "repo init -u https://android.googlesource.com/platform/manifest" to download the sourcecode of android,but in China these ports like http/https are being watching by GFW more carefully.
I have problem with download andorid source code by https way now,beause at first it is ok but wait some time I will get many errors so I can not complete the download process.And I think there are many people got these error except that they use vpn to access.
I do not have problem when I downloaded android source code with git://,I think GFW do not pay so much attention to the port of git://.So can android.googlesource.com provide git:// access way?

posted May 14, 2013 by anonymous

Looking for an answer?  Promote on:
Facebook Share Button Twitter Share Button LinkedIn Share Button

Similar Questions
+1 vote

I have a web application written in PHP. It have been running for several years. Now I want to run it as a stand-alone application on an Android smartphone or tablet. How can I do it?

+2 votes

I would like to access, from the framework level, the stored preferences of an application, is it possible to do?

I've thought about creating a Content Provider. Will I be able then to retrieve its content from the framework level? Would the retrieving procedure be the same than the one in the application level?

+2 votes

I want to create an alertbox whenever any app creates an camera object. But I am not able to access to activity in frameworks/base/core/java/android/hardware/Camera.java to create an alertbox.

Could you help me out how can I capture activity related to camera in frameworks/base/core/java/android/hardware/Camera.java.

+2 votes

I'm facing an issue with permissions to write system properties in a multi-user scenario, specifically the fact that they are only available to the primary user ("owner").

In the check_perms method @ property_service.c the prefix of the property is mapped to a UID which is compared to that of the caller, but the userid bits are not masked out. This means that an app running as e.g. AID_SYSTEM will not be able to access system permissions granted for this UID when it's running as a secondary user.

I'm curious as to what is the reason for this limitation? Is this deliberate? Is there a security concern here that I am missing? If an app is allowed to run as system, doesn’t it make sense to grant it the same rights regardless of the current user of the device?

What makes me even more curious is that there is a previous patch that solves this issue for the AID_BLUETOOTH user specifically:

static int check_perms(const char *name, unsigned int uid, unsigned int gid, char *sctx){ [...]
 app_id = multiuser_get_app_id(uid); if (app_id == AID_BLUETOOTH) { uid = app_id; }

Is there a reason for not *always* using the app id rather than the full uid including user id bits when checking system property permissions?

I'm considering uploading a patch that either adds (app_id == AID_BLUETOOTH || app_id == AID_SYSTEM), or simply removes the check altogether (meaning always using the app id). Would that have any chance of being accepted?

0 votes

In my Android system, if I want to setup up some network traffic rules sort of like a firewall to disallow certain access points should I use iptables for this. What is the best approach to do something like this?

...