blob: 259c8e4c7891b2f8375a3006a40921a9b9c2a110 [file] [log] [blame]
/*
* Copyright (C) 2015 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.android.cts.deviceandprofileowner;
import android.app.Activity;
import android.app.admin.DevicePolicyManager;
import android.content.Intent;
import android.content.pm.PackageManager.NameNotFoundException;
import android.os.Bundle;
import android.os.Process;
import android.util.Log;
import com.android.bedstead.dpmwrapper.TestAppSystemServiceFactory;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.List;
/**
* Simple activity that sets or unsets a policy depending on the value of the extras.
*/
public class SetPolicyActivity extends Activity {
private static final String TAG = SetPolicyActivity.class.getSimpleName();
private static final String EXTRA_RESTRICTION_KEY = "extra-restriction-key";
private static final String EXTRA_COMMAND = "extra-command";
private static final String EXTRA_ACCOUNT_TYPE = "extra-account-type";
private static final String EXTRA_PACKAGE_NAME = "extra-package-name";
private static final String EXTRA_SCOPES_LIST = "extra-scopes-list";
private static final String EXTRA_ADMIN_TYPE = "extra-admin-type";
private static final String COMMAND_ADD_USER_RESTRICTION = "add-restriction";
private static final String COMMAND_CLEAR_USER_RESTRICTION = "clear-restriction";
private static final String COMMAND_BLOCK_ACCOUNT_TYPE = "block-accounttype";
private static final String COMMAND_UNBLOCK_ACCOUNT_TYPE = "unblock-accounttype";
private static final String COMMAND_SET_APP_RESTRICTIONS_MANAGER =
"set-app-restrictions-manager";
private static final String COMMAND_SET_DELEGATED_SCOPES = "set-delegated-scopes";
@Override
public void onCreate(Bundle savedInstanceState) {
Log.v(TAG, "onCreate(): uid=" + Process.myUid());
super.onCreate(savedInstanceState);
handleIntent(getIntent());
}
// Overriding this method in case another intent is sent to this activity before finish()
@Override
public void onNewIntent(Intent intent) {
super.onNewIntent(intent);
handleIntent(intent);
}
private void handleIntent(Intent intent) {
boolean isDeviceOwnerTest = "DeviceOwner".equals(intent.getStringExtra(EXTRA_ADMIN_TYPE));
DevicePolicyManager dpm = TestAppSystemServiceFactory.getDevicePolicyManager(this,
BaseDeviceAdminTest.BasicAdminReceiver.class, isDeviceOwnerTest);
String command = intent.getStringExtra(EXTRA_COMMAND);
Log.i(TAG, "Command: " + command + " UID: " + Process.myUid() + " DPM: " + dpm);
if (COMMAND_ADD_USER_RESTRICTION.equals(command)) {
String restrictionKey = intent.getStringExtra(EXTRA_RESTRICTION_KEY);
dpm.addUserRestriction(BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT, restrictionKey);
Log.i(TAG, "Added user restriction " + restrictionKey
+ " for user " + Process.myUserHandle());
} else if (COMMAND_CLEAR_USER_RESTRICTION.equals(command)) {
String restrictionKey = intent.getStringExtra(EXTRA_RESTRICTION_KEY);
dpm.clearUserRestriction(
BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT, restrictionKey);
Log.i(TAG, "Cleared user restriction " + restrictionKey
+ " for user " + Process.myUserHandle());
} else if (COMMAND_BLOCK_ACCOUNT_TYPE.equals(command)) {
String accountType = intent.getStringExtra(EXTRA_ACCOUNT_TYPE);
dpm.setAccountManagementDisabled(BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT,
accountType, true);
Log.i(TAG, "Blocking account management for account type: " + accountType
+ " for user " + Process.myUserHandle());
} else if (COMMAND_UNBLOCK_ACCOUNT_TYPE.equals(command)) {
String accountType = intent.getStringExtra(EXTRA_ACCOUNT_TYPE);
dpm.setAccountManagementDisabled(BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT,
accountType, false);
Log.i(TAG, "Unblocking account management for account type: " + accountType
+ " for user " + Process.myUserHandle());
} else if (COMMAND_SET_APP_RESTRICTIONS_MANAGER.equals(command)) {
String packageName = intent.getStringExtra(EXTRA_PACKAGE_NAME);
try {
dpm.setApplicationRestrictionsManagingPackage(
BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT, packageName);
} catch (NameNotFoundException e) {
throw new IllegalArgumentException(e);
}
Log.i(TAG, "Setting the application restrictions managing package to " + packageName);
} else if (COMMAND_SET_DELEGATED_SCOPES.equals(command)) {
String packageName = intent.getStringExtra(EXTRA_PACKAGE_NAME);
String scopeArray[] = intent.getStringArrayExtra(EXTRA_SCOPES_LIST);
List<String> scopes = scopeArray == null ? new ArrayList<>()
: Arrays.asList(scopeArray);
Log.i(TAG, "Setting delegated scopes for package: " + packageName + " " + scopes);
dpm.setDelegatedScopes(BaseDeviceAdminTest.ADMIN_RECEIVER_COMPONENT,
packageName, scopes);
} else {
Log.e(TAG, "Invalid command: " + command);
}
}
}