Skip to content
This repository was archived by the owner on Dec 23, 2024. It is now read-only.

Commit 39a015c

Browse files
Fixups + Churn
Signed-off-by: Tavi <[email protected]>
1 parent ba9e22d commit 39a015c

30 files changed

+109
-109
lines changed

Logs/resetWorkspace-LineageOS-18.1.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ external/cblas d82c5f4ae14b2a5468303985070f7dadc15d4094
135135
external/cbor-java f81e576298790c97498311e99a0b0b34653c3dd8
136136
external/chromium-libpac 169c93e00a00605346a68d39d3f4713735bdb61e
137137
external/chromium-trace e524766cad26d677a9a1ec8c00c512d4cac2cf5e
138-
external/chromium-webview 18024297bc95fb233a92b15d8bf26c9b987bda66
138+
external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23
139139
external/clang 0a1c53a5d295109bd4702ad13c0f2a5510ca1b26
140140
external/cldr 38850463abd624d5b2293be75fddc43cf6b55ae2
141141
external/cn-cbor 696530332036f5518681d3c450cdbc3ee412004a
@@ -858,7 +858,7 @@ tools/loganalysis 915dbf1d7ed0f684d2d1bc3a6be9ef417c93527d
858858
tools/metalava 21659a2683eed66e16aeafeb8d9c40916946a51b
859859
tools/ndkports d0ec81e4b134f4b1446d3fd5a6dfbf095475597c
860860
tools/platform-compat b553fea7dd2aa8dcc26f4d8f91effd86e55dd72e
861-
tools/repohooks 6ca9412c1ba65e255924a403165d60949bfebd50
861+
tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff
862862
tools/security a5c3644bd83674858e0b9d5da3e6014a3cbf3ba6
863863
tools/test/connectivity 38ccb70b61038b0be21da87ae626b01a3d162bf8
864864
tools/test/graphicsbenchmark 7c31a9c1f32d602e1b50446951088d3beddedb84

Logs/resetWorkspace-LineageOS-19.1.txt

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ bootable/libbootloader b44eeefd365e023a96ea36682cc60b46827a47cc
55
bootable/recovery 7c1eb300fbcf789024da690c96adb167d31aa5a5
66
build/bazel f3015c3bbd520d95216123e6761a2860e17acebf
77
build/blueprint c24408d5ae37cbcbec15205a02812b7d6c563b90
8-
build/make b7fd9639201c3842d7e0d91e4c303dc92df6fe4f
8+
build/make 722c54d2ddc48d914e10769348ae4381b4f47427
99
build/pesto 0f35caa8191635ace102f6d8c96318c5ed52dfe3
1010
build/soong 59d5b37cce358e0d300392676d64191d3938608f
1111
compatibility/cdd 43611a0b6d2c62ae1d08d951fccf8f2ab8dc60c6
@@ -94,7 +94,7 @@ external/catch2 2b2e0e9540defee10f28ea0fc97750490fa238b5
9494
external/cblas 2b24922070cb6d45edd5f5b533db0637099a2b17
9595
external/cbor-java 00c4a382dd3810f9c1b363eaad339cff34a3f6fe
9696
external/chromium-trace 138ade68f9d3388a1b0a6d9ce5e091ff6f7e7448
97-
external/chromium-webview 18024297bc95fb233a92b15d8bf26c9b987bda66
97+
external/chromium-webview b796168b7ca30f621e1c85271044bd56d74bde23
9898
external/clang f1cef8e77ae220c9379303bdc9896e0c2366bd6f
9999
external/cldr 242ecd0dcb21f3376f825119ec0b36fcb15e7bb8
100100
external/cn-cbor 6a0f6a5375b8cd9b495e91c11d21ed257ec9a905
@@ -875,7 +875,7 @@ packages/apps/Traceur b5e983189ce82742037f76e3ae1340e4cb74d80e
875875
packages/apps/Trebuchet 660a409e818d44701af28669cc2e42acb316d267
876876
packages/apps/TvSettings f8fb67eccca677e57c96a872c032c131b04d0409
877877
packages/apps/UniversalMediaPlayer 3a912bc775d662a075ed7c8d278e77d780c57213
878-
packages/apps/Updater fbeda0aa43cd7053a2dcab70a9dc964ad135cd3d
878+
packages/apps/Updater 1546e90f1a619a39b384267d845a0b57d42e9c50
879879
packages/apps/WallpaperPicker2 ee2174f46338aca760e6ce61235cca191619be74
880880
packages/inputmethods/LatinIME 59669cfd005f1827c8096c6ac60a7df28af1cd31
881881
packages/inputmethods/LeanbackIME 3aa34644aff68909411087d79e4fc07406be6ca5
@@ -1082,7 +1082,7 @@ tools/extract-utils c12d3941893a6d1187986d85be04308104d13269
10821082
tools/metalava 0d8be7040dceaf9b084e909b6907e463ab7d3237
10831083
tools/ndkports a181fe59a34803a1ba7300bd1a32532b6dc3e9fb
10841084
tools/platform-compat cfa5a189e9671992ba7ad5b8de5d59826544a592
1085-
tools/repohooks 6ca9412c1ba65e255924a403165d60949bfebd50
1085+
tools/repohooks eee438b68bc9c55036016d681269ee8c261c94ff
10861086
tools/security 4af6777ed4b7a9c09508a600349e0e548174361f
10871087
tools/test/connectivity a74e9d3afee07e92cc9f74345f91ea7cbe29d44d
10881088
tools/test/graphicsbenchmark 6404f16911f96d9253847c1390fd81f1923954cd

Patches/LineageOS-18.1/android_frameworks_base/0013-Network_Permission-1.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,10 @@ index eb64db7493cc..31b960716b4b 100644
2323
<!-- Allows applications to access information about networks.
2424
<p>Protection level: normal
2525
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
26-
index e827b7616a10..92de1b844efa 100644
26+
index 0320c4b20c93..374fa4ea084e 100644
2727
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
2828
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
29-
@@ -2649,7 +2649,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
29+
@@ -2650,7 +2650,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
3030
}
3131

3232
public static boolean isSpecialRuntimePermission(final String permission) {

Patches/LineageOS-18.1/android_frameworks_base/0013-Sensors_Permission.patch

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,10 +128,10 @@ index 189544f98594..9badc8c4d9c0 100644
128128
field public static final String SENSORS = "android.permission-group.SENSORS";
129129
field public static final String SMS = "android.permission-group.SMS";
130130
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
131-
index 92de1b844efa..499e5b199554 100644
131+
index 374fa4ea084e..182679b779e9 100644
132132
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
133133
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
134-
@@ -2649,7 +2649,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
134+
@@ -2650,7 +2650,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
135135
}
136136

137137
public static boolean isSpecialRuntimePermission(final String permission) {

Patches/LineageOS-18.1/android_frameworks_base/0013-Special_Permissions.patch

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -17,10 +17,10 @@ As a result, PackageManagerService is no longer modified.
1717
1 file changed, 19 insertions(+), 5 deletions(-)
1818

1919
diff --git a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
20-
index f83c3d5145cc..e827b7616a10 100644
20+
index eb27a13523ba..0320c4b20c93 100644
2121
--- a/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
2222
+++ b/services/core/java/com/android/server/pm/permission/PermissionManagerService.java
23-
@@ -1461,7 +1461,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
23+
@@ -1462,7 +1462,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
2424
// to keep the review required permission flag per user while an
2525
// install permission's state is shared across all users.
2626
if (pkg.getTargetSdkVersion() < Build.VERSION_CODES.M
@@ -29,7 +29,7 @@ index f83c3d5145cc..e827b7616a10 100644
2929
return;
3030
}
3131

32-
@@ -1513,7 +1513,8 @@ public class PermissionManagerService extends IPermissionManager.Stub {
32+
@@ -1514,7 +1514,8 @@ public class PermissionManagerService extends IPermissionManager.Stub {
3333
+ permName + " for package " + packageName);
3434
}
3535

@@ -39,7 +39,7 @@ index f83c3d5145cc..e827b7616a10 100644
3939
Slog.w(TAG, "Cannot grant runtime permission to a legacy app");
4040
return;
4141
}
42-
@@ -1623,7 +1624,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
42+
@@ -1624,7 +1625,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
4343
// to keep the review required permission flag per user while an
4444
// install permission's state is shared across all users.
4545
if (pkg.getTargetSdkVersion() < Build.VERSION_CODES.M
@@ -48,7 +48,7 @@ index f83c3d5145cc..e827b7616a10 100644
4848
return;
4949
}
5050

51-
@@ -1847,7 +1848,8 @@ public class PermissionManagerService extends IPermissionManager.Stub {
51+
@@ -1848,7 +1849,8 @@ public class PermissionManagerService extends IPermissionManager.Stub {
5252

5353
// If this permission was granted by default or role, make sure it is.
5454
if ((oldFlags & FLAG_PERMISSION_GRANTED_BY_DEFAULT) != 0
@@ -58,7 +58,7 @@ index f83c3d5145cc..e827b7616a10 100644
5858
// PermissionPolicyService will handle the app op for runtime permissions later.
5959
grantRuntimePermissionInternal(permName, packageName, false,
6060
Process.SYSTEM_UID, userId, delayingPermCallback);
61-
@@ -2646,6 +2648,10 @@ public class PermissionManagerService extends IPermissionManager.Stub {
61+
@@ -2647,6 +2649,10 @@ public class PermissionManagerService extends IPermissionManager.Stub {
6262
}
6363
}
6464

@@ -69,7 +69,7 @@ index f83c3d5145cc..e827b7616a10 100644
6969
/**
7070
* Restore the permission state for a package.
7171
*
72-
@@ -2998,6 +3004,14 @@ public class PermissionManagerService extends IPermissionManager.Stub {
72+
@@ -2999,6 +3005,14 @@ public class PermissionManagerService extends IPermissionManager.Stub {
7373
}
7474
}
7575
}
@@ -84,7 +84,7 @@ index f83c3d5145cc..e827b7616a10 100644
8484
} else {
8585
if (permState == null) {
8686
// New permission
87-
@@ -3960,7 +3974,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
87+
@@ -3961,7 +3975,7 @@ public class PermissionManagerService extends IPermissionManager.Stub {
8888
&& (grantedPermissions == null
8989
|| ArrayUtils.contains(grantedPermissions, permission))) {
9090
final int flags = permissionsState.getPermissionFlags(permission, userId);

Patches/LineageOS-18.1/android_frameworks_base/394553.patch

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
From 00961ad29e26dde5d4f56de90ac333ceb2fc8d34 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Jing Ji <[email protected]>
33
Date: Tue, 25 Oct 2022 22:39:52 -0700
44
Subject: [PATCH] DO NOT MERGE: ActivityManager#killBackgroundProcesses can
@@ -19,10 +19,10 @@ Change-Id: I41cd6fa1f71e950db18a9fd450355c4e6f80ec7d
1919
1 file changed, 16 insertions(+)
2020

2121
diff --git a/services/core/java/com/android/server/am/ActivityManagerService.java b/services/core/java/com/android/server/am/ActivityManagerService.java
22-
index 234b23a996267..815ddf63e565a 100644
22+
index 234b23a99626..815ddf63e565 100644
2323
--- a/services/core/java/com/android/server/am/ActivityManagerService.java
2424
+++ b/services/core/java/com/android/server/am/ActivityManagerService.java
25-
@@ -4486,6 +4486,22 @@ void killAllBackgroundProcessesExcept(int minTargetSdk, int maxProcState) {
25+
@@ -4486,6 +4486,22 @@ public class ActivityManagerService extends IActivityManager.Stub
2626
throw new SecurityException(msg);
2727
}
2828

Patches/LineageOS-18.1/android_frameworks_base/394554.patch

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
From 14804676d97278009b746073e8339374b0cce927 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Jing Ji <[email protected]>
33
Date: Thu, 19 Oct 2023 14:22:58 -0700
44
Subject: [PATCH] DO NOT MERGE: Fix ActivityManager#killBackgroundProcesses
@@ -18,10 +18,10 @@ Change-Id: I9471a77188ee63ec32cd0c81569193e4ccad885b
1818
1 file changed, 16 deletions(-)
1919

2020
diff --git a/services/core/java/com/android/server/am/ActivityManagerService.java b/services/core/java/com/android/server/am/ActivityManagerService.java
21-
index 815ddf63e565a..234b23a996267 100644
21+
index 815ddf63e565..234b23a99626 100644
2222
--- a/services/core/java/com/android/server/am/ActivityManagerService.java
2323
+++ b/services/core/java/com/android/server/am/ActivityManagerService.java
24-
@@ -4486,22 +4486,6 @@ void killAllBackgroundProcessesExcept(int minTargetSdk, int maxProcState) {
24+
@@ -4486,22 +4486,6 @@ public class ActivityManagerService extends IActivityManager.Stub
2525
throw new SecurityException(msg);
2626
}
2727

Patches/LineageOS-18.1/android_frameworks_base/394555.patch

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
From 179a5a7b48c4ec3ffebbf53b9833f6be6ef4e2b1 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Valentin Iftime <[email protected]>
33
Date: Thu, 1 Feb 2024 13:58:49 +0100
44
Subject: [PATCH] Verify URI permission for channel sound update from
@@ -19,10 +19,10 @@ Change-Id: Ic7d2e96e43565e98d2aa29b8f2ba35c142387ba9
1919
2 files changed, 89 insertions(+)
2020

2121
diff --git a/services/core/java/com/android/server/notification/NotificationManagerService.java b/services/core/java/com/android/server/notification/NotificationManagerService.java
22-
index dfc9c135c7da7..40f6ed45174e2 100755
22+
index dfc9c135c7da..40f6ed45174e 100755
2323
--- a/services/core/java/com/android/server/notification/NotificationManagerService.java
2424
+++ b/services/core/java/com/android/server/notification/NotificationManagerService.java
25-
@@ -5151,6 +5151,10 @@ public void updateNotificationChannelFromPrivilegedListener(INotificationListene
25+
@@ -5151,6 +5151,10 @@ public class NotificationManagerService extends SystemService {
2626
Objects.requireNonNull(user);
2727

2828
verifyPrivilegedListener(token, user, false);
@@ -33,7 +33,7 @@ index dfc9c135c7da7..40f6ed45174e2 100755
3333
updateNotificationChannelInt(pkg, getUidForPackageAndUser(pkg, user), channel, true);
3434
}
3535

36-
@@ -5230,6 +5234,24 @@ private void verifyPrivilegedListener(INotificationListener token, UserHandle us
36+
@@ -5230,6 +5234,24 @@ public class NotificationManagerService extends SystemService {
3737
}
3838
}
3939

@@ -59,10 +59,10 @@ index dfc9c135c7da7..40f6ed45174e2 100755
5959
int uid = 0;
6060
long identity = Binder.clearCallingIdentity();
6161
diff --git a/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java b/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
62-
index 011c408492fa3..a1d6b56ff9cdb 100755
62+
index 011c408492fa..a1d6b56ff9cd 100755
6363
--- a/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
6464
+++ b/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
65-
@@ -2664,6 +2664,73 @@ public void testUpdateNotificationChannelFromPrivilegedListener_badUser() throws
65+
@@ -2664,6 +2664,73 @@ public class NotificationManagerServiceTest extends UiServiceTestCase {
6666
eq(NotificationListenerService.NOTIFICATION_CHANNEL_OR_GROUP_UPDATED));
6767
}
6868

Patches/LineageOS-18.1/android_frameworks_base/394556.patch

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
From 1ac8480b3163815253b07d5e2ffa5ae3d5065a07 Mon Sep 17 00:00:00 2001
1+
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
22
From: Valentin Iftime <[email protected]>
33
Date: Thu, 22 Feb 2024 10:51:58 +0100
44
Subject: [PATCH] Check for NLS bind permission when rebinding services
@@ -19,7 +19,7 @@ Change-Id: I11901755ec430c6e3145def9d67e4e63cda00806
1919
2 files changed, 139 insertions(+), 23 deletions(-)
2020

2121
diff --git a/services/core/java/com/android/server/notification/ManagedServices.java b/services/core/java/com/android/server/notification/ManagedServices.java
22-
index a604625460a77..e5686dc3f0759 100644
22+
index a604625460a7..e5686dc3f075 100644
2323
--- a/services/core/java/com/android/server/notification/ManagedServices.java
2424
+++ b/services/core/java/com/android/server/notification/ManagedServices.java
2525
@@ -150,7 +150,9 @@ abstract public class ManagedServices {
@@ -33,7 +33,7 @@ index a604625460a77..e5686dc3f0759 100644
3333

3434
// True if approved services are stored in xml, not settings.
3535
private boolean mUseXml;
36-
@@ -761,6 +763,23 @@ protected boolean isPackageOrComponentAllowed(String pkgOrComponent, int userId)
36+
@@ -761,6 +763,23 @@ abstract public class ManagedServices {
3737
return false;
3838
}
3939

@@ -57,15 +57,15 @@ index a604625460a77..e5686dc3f0759 100644
5757
protected boolean isPackageAllowed(String pkg, int userId) {
5858
if (pkg == null) {
5959
return false;
60-
@@ -811,6 +830,7 @@ public void onPackagesChanged(boolean removingPackage, String[] pkgList, int[] u
60+
@@ -811,6 +830,7 @@ abstract public class ManagedServices {
6161
for (int uid : uidList) {
6262
if (isPackageAllowed(pkgName, UserHandle.getUserId(uid))) {
6363
anyServicesInvolved = true;
6464
+ trimApprovedListsForInvalidServices(pkgName, UserHandle.getUserId(uid));
6565
}
6666
}
6767
}
68-
@@ -938,8 +958,7 @@ protected void setComponentState(ComponentName component, boolean enabled) {
68+
@@ -938,8 +958,7 @@ abstract public class ManagedServices {
6969
for (int i = 0; i < userIds.size(); i++) {
7070
final int userId = userIds.get(i);
7171
if (enabled) {
@@ -75,7 +75,7 @@ index a604625460a77..e5686dc3f0759 100644
7575
registerServiceLocked(component, userId);
7676
} else {
7777
Slog.d(TAG, component + " no longer has permission to be bound");
78-
@@ -1078,6 +1097,33 @@ private boolean removeUninstalledItemsFromApprovedLists(int uninstalledUserId, S
78+
@@ -1078,6 +1097,33 @@ abstract public class ManagedServices {
7979
return removed;
8080
}
8181

@@ -109,7 +109,7 @@ index a604625460a77..e5686dc3f0759 100644
109109
protected String getPackageName(String packageOrComponent) {
110110
final ComponentName component = ComponentName.unflattenFromString(packageOrComponent);
111111
if (component != null) {
112-
@@ -1237,26 +1283,20 @@ private void bindToServices(SparseArray<Set<ComponentName>> componentsToBind) {
112+
@@ -1237,26 +1283,20 @@ abstract public class ManagedServices {
113113
final int userId = componentsToBind.keyAt(i);
114114
final Set<ComponentName> add = componentsToBind.get(userId);
115115
for (ComponentName component : add) {
@@ -149,7 +149,7 @@ index a604625460a77..e5686dc3f0759 100644
149149
}
150150
}
151151
}
152-
@@ -1270,6 +1310,15 @@ private void registerService(final ComponentName name, final int userid) {
152+
@@ -1270,6 +1310,15 @@ abstract public class ManagedServices {
153153
}
154154
}
155155

@@ -165,7 +165,7 @@ index a604625460a77..e5686dc3f0759 100644
165165
/**
166166
* Inject a system service into the management list.
167167
*/
168-
@@ -1370,7 +1419,7 @@ public void onBindingDied(ComponentName name) {
168+
@@ -1370,7 +1419,7 @@ abstract public class ManagedServices {
169169
mHandler.postDelayed(new Runnable() {
170170
@Override
171171
public void run() {
@@ -174,7 +174,7 @@ index a604625460a77..e5686dc3f0759 100644
174174
}
175175
}, ON_BINDING_DIED_REBIND_DELAY_MS);
176176
} else {
177-
@@ -1502,6 +1551,19 @@ private void unbindService(ServiceConnection connection, ComponentName component
177+
@@ -1502,6 +1551,19 @@ abstract public class ManagedServices {
178178
}
179179
}
180180

@@ -195,10 +195,10 @@ index a604625460a77..e5686dc3f0759 100644
195195
public IInterface service;
196196
public ComponentName component;
197197
diff --git a/services/tests/uiservicestests/src/com/android/server/notification/ManagedServicesTest.java b/services/tests/uiservicestests/src/com/android/server/notification/ManagedServicesTest.java
198-
index 99433a6603c91..e7187f393751d 100644
198+
index 99433a6603c9..e7187f393751 100644
199199
--- a/services/tests/uiservicestests/src/com/android/server/notification/ManagedServicesTest.java
200200
+++ b/services/tests/uiservicestests/src/com/android/server/notification/ManagedServicesTest.java
201-
@@ -27,8 +27,10 @@
201+
@@ -27,8 +27,10 @@ import static org.mockito.ArgumentMatchers.anyString;
202202
import static org.mockito.Matchers.any;
203203
import static org.mockito.Matchers.anyInt;
204204
import static org.mockito.Matchers.eq;
@@ -209,7 +209,7 @@ index 99433a6603c91..e7187f393751d 100644
209209
import static org.mockito.Mockito.times;
210210
import static org.mockito.Mockito.verify;
211211
import static org.mockito.Mockito.when;
212-
@@ -775,6 +777,58 @@ public void testUpgradeAppBindsNewServices() throws Exception {
212+
@@ -775,6 +777,58 @@ public class ManagedServicesTest extends UiServiceTestCase {
213213
}
214214
}
215215

0 commit comments

Comments
 (0)