diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2018-06-04 04:51:10 +0200 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2018-06-04 07:06:28 +0200 |
commit | c4e32328fc44b79fd45a2634180a1789a35297de (patch) | |
tree | 3afd51c83212b0861ce887a5718d40cddb1670dd /app/src/main/java/com/wireguard | |
parent | a2ccbf003cc10369c177a3a354558f903df44e39 (diff) |
TunnelManager: disable dangerous intents for now
We need to think about how to allow this securely. It's not okay for all
apps to be allowed to twiddle with VPN settings.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Diffstat (limited to 'app/src/main/java/com/wireguard')
-rw-r--r-- | app/src/main/java/com/wireguard/android/model/TunnelManager.java | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/app/src/main/java/com/wireguard/android/model/TunnelManager.java b/app/src/main/java/com/wireguard/android/model/TunnelManager.java index 4267e76c..91d98842 100644 --- a/app/src/main/java/com/wireguard/android/model/TunnelManager.java +++ b/app/src/main/java/com/wireguard/android/model/TunnelManager.java @@ -284,6 +284,12 @@ public final class TunnelManager extends BaseObservable { return; } + /* We disable the below, for now, as the security model of allowing this + * might take a bit more consideration. + */ + if (true) + return; + final State state; if ("com.wireguard.android.action.SET_TUNNEL_UP".equals(action)) state = State.UP; |