blob: 1ede7d8532424b2745171ce94616e45790c80651 [file] [log] [blame]
/*
* Copyright (C) 2021 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.android.bedstead.nene.permissions;
import android.app.UiAutomation;
import android.content.Context;
import android.content.pm.PackageManager;
import android.content.pm.PermissionInfo;
import android.os.Build;
import android.util.Log;
import com.android.bedstead.nene.TestApis;
import com.android.bedstead.nene.exceptions.NeneException;
import com.android.bedstead.nene.packages.Package;
import com.android.bedstead.nene.packages.PackageReference;
import com.android.bedstead.nene.users.UserReference;
import com.android.bedstead.nene.utils.ShellCommandUtils;
import com.android.bedstead.nene.utils.Versions;
import java.util.ArrayList;
import java.util.HashSet;
import java.util.List;
import java.util.Set;
/** Permission manager for tests. */
public class Permissions {
public static final String MANAGE_PROFILE_AND_DEVICE_OWNERS =
"android.permission.MANAGE_PROFILE_AND_DEVICE_OWNERS";
public static final String MANAGE_DEVICE_ADMINS = "android.permission.MANAGE_DEVICE_ADMINS";
private static final String LOG_TAG = "Permissions";
private List<PermissionContextImpl> mPermissionContexts = new ArrayList<>();
private static final TestApis sTestApis = new TestApis();
private static final Context sContext = sTestApis.context().instrumentedContext();
private static final PackageManager sPackageManager = sContext.getPackageManager();
private static final PackageReference sInstrumentedPackage =
sTestApis.packages().find(sContext.getPackageName());
private static final UserReference sUser = sTestApis.users().instrumented();
private static final Package sShellPackage =
sTestApis.packages().find("com.android.shell").resolve();
private static final boolean SUPPORTS_ADOPT_SHELL_PERMISSIONS =
Build.VERSION.SDK_INT >= Build.VERSION_CODES.Q;
// Permissions is a singleton as permission state must be application wide
public static final Permissions sInstance = new Permissions();
private Set<String> mExistingPermissions;
private Permissions() {
}
/**
* Enter a {@link PermissionContext} where the given permissions are granted.
*
* <p>If the permissions cannot be granted, and are not already granted, an exception will be
* thrown.
*
* <p>Recommended usage:
* {@code
*
* try (PermissionContext p = mTestApis.permissions().withPermission(PERMISSION1, PERMISSION2) {
* // Code which needs the permissions goes here
* }
* }
*/
public PermissionContextImpl withPermission(String... permissions) {
if (mPermissionContexts.isEmpty()) {
recordExistingPermissions();
}
PermissionContextImpl permissionContext = new PermissionContextImpl(this);
mPermissionContexts.add(permissionContext);
permissionContext.withPermission(permissions);
return permissionContext;
}
/**
* Enter a {@link PermissionContext} where the given permissions are not granted.
*
* <p>If the permissions cannot be denied, and are not already denied, an exception will be
* thrown.
*
* <p>Recommended usage:
* {@code
*
* try (PermissionContext p =
* mTestApis.permissions().withoutPermission(PERMISSION1, PERMISSION2) {
* // Code which needs the permissions goes here
* }
*/
public PermissionContextImpl withoutPermission(String... permissions) {
if (mPermissionContexts.isEmpty()) {
recordExistingPermissions();
}
PermissionContextImpl permissionContext = new PermissionContextImpl(this);
mPermissionContexts.add(permissionContext);
permissionContext.withoutPermission(permissions);
return permissionContext;
}
void undoPermission(PermissionContext permissionContext) {
mPermissionContexts.remove(permissionContext);
applyPermissions();
}
void applyPermissions() {
if (mPermissionContexts.isEmpty()) {
restoreExistingPermissions();
return;
}
Package resolvedInstrumentedPackage = sInstrumentedPackage.resolve();
if (SUPPORTS_ADOPT_SHELL_PERMISSIONS) {
ShellCommandUtils.uiAutomation().dropShellPermissionIdentity();
}
Set<String> grantedPermissions = new HashSet<>();
Set<String> deniedPermissions = new HashSet<>();
for (PermissionContextImpl permissionContext : mPermissionContexts) {
for (String permission : permissionContext.grantedPermissions()) {
grantedPermissions.add(permission);
deniedPermissions.remove(permission);
}
for (String permission : permissionContext.deniedPermissions()) {
grantedPermissions.remove(permission);
deniedPermissions.add(permission);
}
}
Log.d(LOG_TAG, "Applying permissions granting: "
+ grantedPermissions + " denying: " + deniedPermissions);
// We first try to use shell permissions, because they can be revoked/etc. much more easily
Set<String> adoptedShellPermissions = new HashSet<>();
for (String permission : grantedPermissions) {
Log.d(LOG_TAG , "Trying to grant " + permission);
if (resolvedInstrumentedPackage.grantedPermissions(sUser).contains(permission)) {
// Already granted, can skip
Log.d(LOG_TAG, permission + " already granted");
} else if (SUPPORTS_ADOPT_SHELL_PERMISSIONS
&& sShellPackage.requestedPermissions().contains(permission)) {
adoptedShellPermissions.add(permission);
Log.d(LOG_TAG, "will adopt " + permission);
} else if (canGrantPermission(permission)) {
Log.d(LOG_TAG, "Granting " + permission);
sInstrumentedPackage.grantPermission(sUser, permission);
} else {
Log.d(LOG_TAG, "Can not grant " + permission);
removePermissionContextsUntilCanApply();
throw new NeneException("PermissionContext requires granting "
+ permission + " but cannot.");
}
}
for (String permission : deniedPermissions) {
Log.d(LOG_TAG , "Trying to deny " + permission);
if (!resolvedInstrumentedPackage.grantedPermissions(sUser).contains(permission)) {
// Already denied, can skip
Log.d(LOG_TAG, permission + " already denied");
} else if (SUPPORTS_ADOPT_SHELL_PERMISSIONS
&& !sShellPackage.requestedPermissions().contains(permission)) {
adoptedShellPermissions.add(permission);
Log.d(LOG_TAG, "will adopt " + permission);
} else { // We can't deny a permission to ourselves
Log.d(LOG_TAG, "Can not deny " + permission);
removePermissionContextsUntilCanApply();
throw new NeneException("PermissionContext requires denying "
+ permission + " but cannot.");
}
}
if (!adoptedShellPermissions.isEmpty()) {
Log.d(LOG_TAG, "Adopting " + adoptedShellPermissions);
ShellCommandUtils.uiAutomation().adoptShellPermissionIdentity(
adoptedShellPermissions.toArray(new String[0]));
}
}
void clearPermissions() {
mPermissionContexts.clear();
applyPermissions();
}
private void removePermissionContextsUntilCanApply() {
try {
mPermissionContexts.remove(mPermissionContexts.size() - 1);
applyPermissions();
} catch (NeneException e) {
// Suppress NeneException here as we may get a few as we pop through the stack
}
}
private boolean canGrantPermission(String permission) {
try {
PermissionInfo p = sPackageManager.getPermissionInfo(permission, /* flags= */ 0);
if ((p.protectionLevel & PermissionInfo.PROTECTION_FLAG_DEVELOPMENT) > 0) {
return true;
}
if ((p.protectionLevel & PermissionInfo.PROTECTION_DANGEROUS) > 0) {
return true;
}
return false;
} catch (PackageManager.NameNotFoundException e) {
return false;
}
}
private void recordExistingPermissions() {
if (!Versions.meetsMinimumSdkVersionRequirement(Build.VERSION_CODES.S)) {
return;
}
mExistingPermissions = ShellCommandUtils.uiAutomation().getAdoptedShellPermissions();
}
private void restoreExistingPermissions() {
if (!Versions.meetsMinimumSdkVersionRequirement(Build.VERSION_CODES.S)) {
return;
}
if (mExistingPermissions.isEmpty()) {
ShellCommandUtils.uiAutomation().dropShellPermissionIdentity();
} else if (mExistingPermissions == UiAutomation.ALL_PERMISSIONS) {
ShellCommandUtils.uiAutomation().adoptShellPermissionIdentity();
} else {
ShellCommandUtils.uiAutomation().adoptShellPermissionIdentity(
mExistingPermissions.toArray(new String[0]));
}
mExistingPermissions = null;
}
}