| /* |
| * Copyright (C) 2015 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package android.appsecurity.cts; |
| |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertFalse; |
| import static org.junit.Assert.assertNotNull; |
| import static org.junit.Assert.assertNull; |
| import static org.junit.Assert.assertTrue; |
| |
| import android.platform.test.annotations.Presubmit; |
| |
| import com.android.compatibility.common.tradefed.build.CompatibilityBuildHelper; |
| import com.android.ddmlib.Log; |
| import com.android.tradefed.device.DeviceNotAvailableException; |
| import com.android.tradefed.device.ITestDevice; |
| import com.android.tradefed.testtype.DeviceJUnit4ClassRunner; |
| import com.android.tradefed.testtype.junit4.BaseHostJUnit4Test; |
| import com.android.tradefed.util.AbiUtils; |
| import com.android.tradefed.util.RunUtil; |
| |
| import org.junit.After; |
| import org.junit.Assume; |
| import org.junit.Before; |
| import org.junit.Test; |
| import org.junit.runner.RunWith; |
| |
| import java.io.File; |
| import java.io.FileNotFoundException; |
| import java.util.ArrayList; |
| import java.util.List; |
| |
| /** |
| * Set of tests that verify behavior of external storage devices. |
| */ |
| @Presubmit |
| @RunWith(DeviceJUnit4ClassRunner.class) |
| public class ExternalStorageHostTest extends BaseHostJUnit4Test { |
| private static final String TAG = "ExternalStorageHostTest"; |
| |
| private static class Config { |
| public final String apk; |
| public final String pkg; |
| public final String clazz; |
| |
| public Config(String apk, String pkg, String clazz) { |
| this.apk = apk; |
| this.pkg = pkg; |
| this.clazz = clazz; |
| } |
| } |
| |
| private static final String COMMON_CLASS = |
| "com.android.cts.externalstorageapp.CommonExternalStorageTest"; |
| |
| private static final String NONE_APK = "CtsExternalStorageApp.apk"; |
| private static final String NONE_PKG = "com.android.cts.externalstorageapp"; |
| private static final String NONE_CLASS = NONE_PKG + ".ExternalStorageTest"; |
| private static final String READ_APK = "CtsReadExternalStorageApp.apk"; |
| private static final String READ_PKG = "com.android.cts.readexternalstorageapp"; |
| private static final String READ_CLASS = READ_PKG + ".ReadExternalStorageTest"; |
| private static final String WRITE_APK = "CtsWriteExternalStorageApp.apk"; |
| private static final String WRITE_PKG = "com.android.cts.writeexternalstorageapp"; |
| private static final String WRITE_CLASS = WRITE_PKG + ".WriteExternalStorageTest"; |
| private static final String WRITE_APK_2 = "CtsWriteExternalStorageApp2.apk"; |
| private static final String WRITE_PKG_2 = "com.android.cts.writeexternalstorageapp2"; |
| private static final String MULTIUSER_APK = "CtsMultiUserStorageApp.apk"; |
| private static final String MULTIUSER_PKG = "com.android.cts.multiuserstorageapp"; |
| private static final String MULTIUSER_CLASS = MULTIUSER_PKG + ".MultiUserStorageTest"; |
| |
| private static final String MEDIA_CLAZZ = "com.android.cts.mediastorageapp.MediaStorageTest"; |
| |
| private static final Config MEDIA = new Config("CtsMediaStorageApp.apk", |
| "com.android.cts.mediastorageapp", MEDIA_CLAZZ); |
| private static final Config MEDIA_28 = new Config("CtsMediaStorageApp28.apk", |
| "com.android.cts.mediastorageapp28", MEDIA_CLAZZ); |
| private static final Config MEDIA_29 = new Config("CtsMediaStorageApp29.apk", |
| "com.android.cts.mediastorageapp29", MEDIA_CLAZZ); |
| private static final Config MEDIA_31 = new Config("CtsMediaStorageApp31.apk", |
| "com.android.cts.mediastorageapp31", MEDIA_CLAZZ); |
| |
| private static final String PERM_ACCESS_MEDIA_LOCATION = |
| "android.permission.ACCESS_MEDIA_LOCATION"; |
| private static final String PERM_READ_EXTERNAL_STORAGE = |
| "android.permission.READ_EXTERNAL_STORAGE"; |
| private static final String PERM_READ_MEDIA_IMAGES = |
| "android.permission.READ_MEDIA_IMAGES"; |
| private static final String PERM_READ_MEDIA_AUDIO = |
| "android.permission.READ_MEDIA_AUDIO"; |
| private static final String PERM_READ_MEDIA_VIDEO = |
| "android.permission.READ_MEDIA_VIDEO"; |
| private static final String PERM_READ_MEDIA_VISUAL_USER_SELECTED = |
| "android.permission.READ_MEDIA_VISUAL_USER_SELECTED"; |
| private static final String PERM_WRITE_EXTERNAL_STORAGE = |
| "android.permission.WRITE_EXTERNAL_STORAGE"; |
| |
| private static final String APP_OPS_MANAGE_EXTERNAL_STORAGE = "android:manage_external_storage"; |
| private static final String APP_OPS_MANAGE_MEDIA = "android:manage_media"; |
| |
| /** Copied from PackageManager*/ |
| private static final String FEATURE_AUTOMOTIVE = "android.hardware.type.automotive"; |
| private static final String FEATURE_EMBEDDED = "android.hardware.type.embedded"; |
| private static final String FEATURE_LEANBACK_ONLY = "android.software.leanback_only"; |
| private static final String FEATURE_WATCH = "android.hardware.type.watch"; |
| |
| private int[] mUsers; |
| private boolean mAdbWasRoot; |
| |
| private File getTestAppFile(String fileName) throws FileNotFoundException { |
| CompatibilityBuildHelper buildHelper = new CompatibilityBuildHelper(getBuild()); |
| return buildHelper.getTestFile(fileName); |
| } |
| |
| @Before |
| public void setUp() throws Exception { |
| mUsers = Utils.prepareMultipleUsers(getDevice()); |
| assertNotNull(getAbi()); |
| assertNotNull(getBuild()); |
| |
| ITestDevice device = getDevice(); |
| mAdbWasRoot = device.isAdbRoot(); |
| if (mAdbWasRoot) { |
| // This test assumes that the test is not run with root privileges. But this test runs |
| // as a part of appsecurity test suite which contains a lot of other tests. Some of |
| // which may enable adb root, make sure that this test is run without root access. |
| device.disableAdbRoot(); |
| assertFalse("adb root is enabled", device.isAdbRoot()); |
| } |
| } |
| |
| @Before |
| @After |
| public void cleanUp() throws DeviceNotAvailableException { |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(READ_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| getDevice().uninstallPackage(MULTIUSER_PKG); |
| |
| wipePrimaryExternalStorage(); |
| } |
| |
| @After |
| public void tearDown() throws DeviceNotAvailableException { |
| ITestDevice device = getDevice(); |
| if (mAdbWasRoot) { |
| device.enableAdbRoot(); |
| } else { |
| device.disableAdbRoot(); |
| } |
| } |
| |
| @Test |
| public void testExternalStorageRename() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(WRITE_PKG); |
| installPackage(WRITE_APK); |
| |
| // Make sure user initialization is complete before testing |
| waitForBroadcastIdle(); |
| |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG, WRITE_CLASS, "testExternalStorageRename", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(WRITE_PKG); |
| } |
| } |
| |
| /** |
| * Verify that app with no external storage permissions works correctly. |
| */ |
| @Test |
| public void testExternalStorageNone29() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(NONE_PKG); |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| assertNull(getDevice().installPackage(getTestAppFile(NONE_APK), false, options)); |
| |
| for (int user : mUsers) { |
| runDeviceTests(NONE_PKG, COMMON_CLASS, user); |
| runDeviceTests(NONE_PKG, NONE_CLASS, user); |
| } |
| } finally { |
| getDevice().uninstallPackage(NONE_PKG); |
| } |
| } |
| |
| /** |
| * Verify that app with |
| * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} works |
| * correctly. |
| */ |
| @Test |
| public void testExternalStorageRead29() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(READ_PKG); |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| assertNull(getDevice().installPackage(getTestAppFile(READ_APK), false, options)); |
| |
| for (int user : mUsers) { |
| runDeviceTests(READ_PKG, COMMON_CLASS, user); |
| runDeviceTests(READ_PKG, READ_CLASS, user); |
| } |
| } finally { |
| getDevice().uninstallPackage(READ_PKG); |
| } |
| } |
| |
| /** |
| * Verify that app with |
| * {@link android.Manifest.permission#WRITE_EXTERNAL_STORAGE} works |
| * correctly. |
| */ |
| @Test |
| public void testExternalStorageWrite() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(WRITE_PKG); |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG, COMMON_CLASS, user); |
| runDeviceTests(WRITE_PKG, WRITE_CLASS, user); |
| } |
| } finally { |
| getDevice().uninstallPackage(WRITE_PKG); |
| } |
| } |
| |
| /** |
| * Verify that apps can't leave gifts in package specific external storage |
| * directories belonging to other apps. Apps can only create files in their |
| * external storage directories. |
| */ |
| @Test |
| public void testExternalStorageNoGifts() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(READ_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| final String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| assertNull(getDevice().installPackage(getTestAppFile(NONE_APK), false, options)); |
| assertNull(getDevice().installPackage(getTestAppFile(READ_APK), false, options)); |
| for (int user : mUsers) { |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testStageNonGifts", user); |
| runDeviceTests(READ_PKG, READ_PKG + ".ReadGiftTest", "testStageNonGifts", user); |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testStageNonGifts", user); |
| |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testNoGifts", user); |
| runDeviceTests(READ_PKG, READ_PKG + ".ReadGiftTest", "testNoGifts", user); |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testNoGifts", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(READ_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| } |
| } |
| |
| /** |
| * Verify that app with REQUEST_INSTALL_PACKAGES can leave gifts in obb |
| * directories belonging to other apps, and those apps can read. |
| */ |
| @Test |
| public void testCanAccessOtherObbDirs() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(WRITE_PKG_2); |
| getDevice().uninstallPackage(NONE_PKG); |
| final String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| // We purposefully delay the installation of the reading apps to |
| // verify that the daemon correctly invalidates any caches. |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK_2), false, options)); |
| for (int user : mUsers) { |
| updateAppOp(WRITE_PKG_2, user, "android:request_install_packages", true); |
| updatePermissions(WRITE_PKG_2, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, true); |
| } |
| |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG_2, WRITE_PKG + ".WriteGiftTest", "testObbGifts", user); |
| } |
| |
| assertNull(getDevice().installPackage(getTestAppFile(NONE_APK), false, options)); |
| for (int user : mUsers) { |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testObbGifts", user); |
| } |
| |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG_2, WRITE_PKG + ".WriteGiftTest", |
| "testAccessObbGifts", user); |
| updateAppOp(WRITE_PKG_2, user, "android:request_install_packages", false); |
| runDeviceTests(WRITE_PKG_2, WRITE_PKG + ".WriteGiftTest", |
| "testCantAccessObbGifts", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(WRITE_PKG_2); |
| getDevice().uninstallPackage(NONE_PKG); |
| } |
| } |
| |
| @Test |
| public void testExternalStorageUnsharedObb() throws Exception { |
| final int numUsers = mUsers.length; |
| Assume.assumeTrue(numUsers > 1); |
| |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| final String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| // We purposefully delay the installation of the reading apps to |
| // verify that the daemon correctly invalidates any caches. |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| updateAppOp(WRITE_PKG, mUsers[0], "android:request_install_packages", true); |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testObbGifts", mUsers[0]); |
| |
| // Create a file in one user and verify that file is not accessible to other users. |
| assertNull(getDevice().installPackage(getTestAppFile(NONE_APK), false, options)); |
| for (int i = 1; i < numUsers; ++i) { |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testNoObbGifts", mUsers[i]); |
| updateAppOp(WRITE_PKG, mUsers[i], "android:request_install_packages", true); |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testObbGifts", mUsers[i]); |
| } |
| |
| // Delete a file in one user and verify that it doesn't affect files accessible to |
| // other users. |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testRemoveObbGifts", mUsers[0]); |
| for (int i = 1; i < numUsers; ++i) { |
| runDeviceTests(NONE_PKG, NONE_PKG + ".GiftTest", "testObbGifts", mUsers[i]); |
| } |
| |
| } finally { |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| } |
| } |
| |
| /** |
| * Test multi-user emulated storage environment, ensuring that each user has |
| * isolated storage. |
| */ |
| @Test |
| public void testMultiUserStorageIsolated() throws Exception { |
| try { |
| if (mUsers.length == 1) { |
| Log.d(TAG, "Single user device; skipping isolated storage tests"); |
| return; |
| } |
| |
| final int owner = mUsers[0]; |
| final int secondary = mUsers[1]; |
| |
| // Install our test app |
| getDevice().uninstallPackage(MULTIUSER_PKG); |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| final String installResult = getDevice() |
| .installPackage(getTestAppFile(MULTIUSER_APK), false, options); |
| assertNull("Failed to install: " + installResult, installResult); |
| |
| // Clear data from previous tests |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testCleanIsolatedStorage", owner); |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testCleanIsolatedStorage", secondary); |
| |
| // Have both users try writing into isolated storage |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testWriteIsolatedStorage", owner); |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testWriteIsolatedStorage", secondary); |
| |
| // Verify they both have isolated view of storage |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testReadIsolatedStorage", owner); |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testReadIsolatedStorage", secondary); |
| |
| // Verify they can't poke at each other |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testUserIsolation", owner); |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testUserIsolation", secondary); |
| |
| // Verify they can't access other users' content using media provider |
| runDeviceTests(MULTIUSER_PKG, MULTIUSER_CLASS, "testMediaProviderUserIsolation", owner); |
| runDeviceTests( |
| MULTIUSER_PKG, MULTIUSER_CLASS, "testMediaProviderUserIsolation", secondary); |
| } finally { |
| getDevice().uninstallPackage(MULTIUSER_PKG); |
| } |
| } |
| |
| /** |
| * Test that apps with read permissions see the appropriate permissions. |
| */ |
| @Test |
| public void testMultiViewMoveConsistency() throws Exception { |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(READ_PKG); |
| final String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| assertNull(getDevice().installPackage(getTestAppFile(READ_APK), false, options)); |
| |
| for (int user : mUsers) { |
| runDeviceTests(READ_PKG, READ_PKG + ".ReadMultiViewTest", "testFolderSetup", user); |
| } |
| for (int user : mUsers) { |
| runDeviceTests(READ_PKG, READ_PKG + ".ReadMultiViewTest", "testRWAccess", user); |
| } |
| |
| // for fuse file system |
| RunUtil.getDefault().sleep(10000); |
| for (int user : mUsers) { |
| runDeviceTests(READ_PKG, READ_PKG + ".ReadMultiViewTest", "testRWAccess", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(READ_PKG); |
| } |
| } |
| |
| /** Verify that app without READ_EXTERNAL can play default URIs in external storage. */ |
| @Test |
| public void testExternalStorageReadDefaultUris() throws Exception { |
| Throwable existingException = null; |
| try { |
| wipePrimaryExternalStorage(); |
| |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| final String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| assertNull(getDevice().installPackage(getTestAppFile(NONE_APK), false, options)); |
| |
| for (int user : mUsers) { |
| updateAppOp(WRITE_PKG, user, "android:write_settings", true); |
| runDeviceTests( |
| WRITE_PKG, WRITE_PKG + ".ChangeDefaultUris", "testChangeDefaultUris", user); |
| |
| runDeviceTests( |
| NONE_PKG, NONE_PKG + ".ReadDefaultUris", "testPlayDefaultUris", user); |
| } |
| } catch (Throwable t) { |
| Log.e(TAG, "Test exception: " + t); |
| // Don't rethrow if there is already an exception. |
| if (existingException == null) { |
| existingException = t; |
| throw t; |
| } |
| } finally { |
| try { |
| // Make sure the provider and uris are reset on failure. |
| for (int user : mUsers) { |
| runDeviceTests( |
| WRITE_PKG, WRITE_PKG + ".ChangeDefaultUris", "testResetDefaultUris", |
| user); |
| } |
| getDevice().uninstallPackage(NONE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG); |
| } catch (Throwable t) { |
| Log.e(TAG, "Cleanup exception: " + t); |
| // Don't rethrow if there is already an exception. |
| if (existingException == null) { |
| existingException = t; |
| throw t; |
| } |
| } |
| } |
| } |
| |
| /** |
| * For security reasons, the shell user cannot access the shared storage of |
| * secondary users. Instead, developers should use the {@code content} shell |
| * tool to read/write files in those locations. |
| */ |
| @Test |
| public void testSecondaryUsersInaccessible() throws Exception { |
| List<String> mounts = new ArrayList<>(); |
| for (String line : getDevice().executeShellCommand("cat /proc/mounts").split("\n")) { |
| String[] split = line.split(" "); |
| if (split[1].startsWith("/storage/") || split[1].startsWith("/mnt/")) { |
| mounts.add(split[1]); |
| } |
| } |
| |
| for (int user : mUsers) { |
| String probe = "/sdcard/../" + user; |
| if (user == Utils.USER_SYSTEM) { |
| // Primary user should always be visible. Skip checking raw |
| // mount points, since we'd get false-positives for physical |
| // devices that aren't multi-user aware. |
| assertTrue(probe, access(probe)); |
| } else { |
| // Secondary user should never be visible. |
| assertFalse(probe, access(probe)); |
| for (String mount : mounts) { |
| probe = mount + "/" + user; |
| assertFalse(probe, access(probe)); |
| } |
| } |
| } |
| } |
| |
| @Test |
| public void testMediaLegacy28() throws Exception { |
| doMediaLegacy(MEDIA_28); |
| } |
| @Test |
| public void testMediaLegacy29() throws Exception { |
| doMediaLegacy(MEDIA_29); |
| } |
| |
| private void doMediaLegacy(Config config) throws Exception { |
| installPackage(config.apk); |
| installPackage(MEDIA_29.apk); |
| // Make sure user initialization is complete before updating permission |
| waitForBroadcastIdle(); |
| for (int user : mUsers) { |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, true); |
| updatePermissions(MEDIA_29.pkg, user, new String[] { |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, true); |
| |
| // Create the files needed for the test from MEDIA_29 pkg since shell |
| // can't access secondary user's storage. |
| runDeviceTests(MEDIA_29.pkg, MEDIA_29.clazz, "testStageFiles", user); |
| runDeviceTests(config.pkg, config.clazz, "testLegacy", user); |
| runDeviceTests(MEDIA_29.pkg, MEDIA_29.clazz, "testClearFiles", user); |
| } |
| } |
| |
| /** |
| * b/197302116. The apps can't be granted prefix UriPermissions to the uri, when the query |
| * result of the uri is 1. |
| */ |
| @Test |
| public void testOwningOneFileNotGrantPrefixUriPermission() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| |
| // revoke permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_EXTERNAL_STORAGE, false); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testOwningOneFileNotGrantPrefixUriPermission", user); |
| } |
| |
| /** |
| * If the app grants read UriPermission to the uri without id (E.g. |
| * MediaStore.Audio.Media.EXTERNAL_CONTENT_URI), the query result of the uri should be the same |
| * without granting permission. |
| */ |
| @Test |
| public void testReadUriPermissionOnUriWithoutId_sameQueryResult() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| |
| // revoke permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_EXTERNAL_STORAGE, false); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testReadUriPermissionOnUriWithoutId_sameQueryResult", user); |
| } |
| |
| @Test |
| public void testGrantUriPermission() throws Exception { |
| doGrantUriPermission(MEDIA, "testGrantUriPermission", new String[]{}); |
| doGrantUriPermission(MEDIA, "testGrantUriPermission", |
| new String[]{PERM_READ_MEDIA_IMAGES, PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, PERM_READ_EXTERNAL_STORAGE}); |
| doGrantUriPermission(MEDIA, "testGrantUriPermission", |
| new String[]{PERM_READ_EXTERNAL_STORAGE, PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, PERM_READ_MEDIA_AUDIO, PERM_WRITE_EXTERNAL_STORAGE}); |
| } |
| |
| @Test |
| public void testGrantUriPermission29() throws Exception { |
| doGrantUriPermission(MEDIA_29, "testGrantUriPermission", new String[]{}); |
| doGrantUriPermission(MEDIA_29, "testGrantUriPermission", |
| new String[]{PERM_READ_EXTERNAL_STORAGE}); |
| doGrantUriPermission(MEDIA_29, "testGrantUriPermission", |
| new String[]{PERM_READ_EXTERNAL_STORAGE, PERM_WRITE_EXTERNAL_STORAGE}); |
| } |
| |
| private void doGrantUriPermission(Config config, String method, String[] grantPermissions) |
| throws Exception { |
| uninstallPackage(config.apk); |
| installPackage(config.apk); |
| for (int user : mUsers) { |
| // Over revoke all permissions and grant necessary permissions later. |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| updatePermissions(config.pkg, user, grantPermissions, true); |
| runDeviceTests(config.pkg, config.clazz, method, user); |
| } |
| } |
| |
| @Test |
| public void testMediaNone() throws Exception { |
| doMediaNone(MEDIA); |
| } |
| @Test |
| public void testMediaNone28() throws Exception { |
| doMediaNone(MEDIA_28); |
| } |
| @Test |
| public void testMediaNone29() throws Exception { |
| doMediaNone(MEDIA_29); |
| } |
| |
| private void doMediaNone(Config config) throws Exception { |
| installPackage(config.apk); |
| for (int user : mUsers) { |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| runDeviceTests(config.pkg, config.clazz, "testMediaNone", user); |
| } |
| } |
| |
| @Test |
| public void testMediaRead() throws Exception { |
| doMediaRead(MEDIA); |
| } |
| @Test |
| public void testMediaRead28() throws Exception { |
| doMediaRead(MEDIA_28); |
| } |
| @Test |
| public void testMediaRead29() throws Exception { |
| doMediaRead(MEDIA_29); |
| } |
| |
| private void doMediaRead(Config config) throws Exception { |
| installPackage(config.apk); |
| for (int user : mUsers) { |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| }, true); |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| runDeviceTests(config.pkg, config.clazz, "testMediaRead", user); |
| } |
| } |
| |
| @Test |
| public void testMediaWrite() throws Exception { |
| doMediaWrite(MEDIA); |
| } |
| @Test |
| public void testMediaWrite28() throws Exception { |
| doMediaWrite(MEDIA_28); |
| } |
| @Test |
| public void testMediaWrite29() throws Exception { |
| doMediaWrite(MEDIA_29); |
| } |
| |
| private void doMediaWrite(Config config) throws Exception { |
| installPackage(config.apk); |
| for (int user : mUsers) { |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, true); |
| |
| runDeviceTests(config.pkg, config.clazz, "testMediaWrite", user); |
| } |
| } |
| |
| @Test |
| public void testMediaEscalation_RequestWriteFilePathSupport() throws Exception { |
| // Not adding tests for MEDIA_28 and MEDIA_29 as they need W_E_S for write access via file |
| // path for shared files, and will always have access as they have W_E_S. |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| // revoke all permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_ACCESS_MEDIA_LOCATION, |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_MEDIA, false); |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_EXTERNAL_STORAGE, false); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, "testMediaEscalation_RequestWriteFilePathSupport", |
| user); |
| } |
| |
| @Test |
| public void testMediaEscalation() throws Exception { |
| doMediaEscalation(MEDIA); |
| } |
| @Test |
| public void testMediaEscalation28() throws Exception { |
| doMediaEscalation(MEDIA_28); |
| } |
| @Test |
| public void testMediaEscalation29() throws Exception { |
| doMediaEscalation(MEDIA_29); |
| } |
| |
| private void doMediaEscalation(Config config) throws Exception { |
| installPackage(config.apk); |
| |
| // TODO: extend test to exercise secondary users |
| int user = getDevice().getCurrentUser(); |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| }, true); |
| updatePermissions(config.pkg, user, new String[] { |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_Open", user); |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_Update", user); |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_Delete", user); |
| |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_RequestWrite", user); |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_RequestTrash", user); |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_RequestFavorite", user); |
| runDeviceTests(config.pkg, config.clazz, "testMediaEscalation_RequestDelete", user); |
| } |
| |
| @Test |
| public void testExternalStorageClearing() throws Exception { |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| try { |
| getDevice().uninstallPackage(WRITE_PKG); |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testClearingWrite", user); |
| } |
| |
| // Uninstall and reinstall means all storage should be cleared |
| getDevice().uninstallPackage(WRITE_PKG); |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", "testClearingRead", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(WRITE_PKG); |
| } |
| } |
| |
| @Test |
| public void testIsExternalStorageLegacy() throws Exception { |
| String[] options = {AbiUtils.createAbiFlag(getAbi().getName())}; |
| |
| try { |
| getDevice().uninstallPackage(WRITE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG_2); |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK), false, options)); |
| assertNull(getDevice().installPackage(getTestAppFile(WRITE_APK_2), false, options)); |
| for (int user : mUsers) { |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", |
| "testIsExternalStorageLegacy", user); |
| updatePermissions(WRITE_PKG, user, new String[] { |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| runDeviceTests(WRITE_PKG, WRITE_PKG + ".WriteGiftTest", |
| "testIsExternalStorageLegacy", user); |
| |
| runDeviceTests(WRITE_PKG_2, WRITE_PKG + ".WriteGiftTest", |
| "testNotIsExternalStorageLegacy", user); |
| } |
| } finally { |
| getDevice().uninstallPackage(WRITE_PKG); |
| getDevice().uninstallPackage(WRITE_PKG_2); |
| } |
| } |
| |
| /** |
| * Check the behavior when the app calls MediaStore#createTrashRequest, |
| * MediaStore#createDeleteRequest or MediaStore#createWriteRequest, the user |
| * click the deny button on confirmation dialog. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_userDenied() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalationWithDenied_RequestWrite", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalationWithDenied_RequestDelete", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalationWithDenied_RequestTrash", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalationWithDenied_RequestUnTrash", user); |
| } |
| |
| /** |
| * If the app is NOT granted {@link android.Manifest.permission#READ_EXTERNAL_STORAGE} |
| * and {@link android.Manifest.permission#MANAGE_EXTERNAL_STORAGE} |
| * when it calls MediaStore#createTrashRequest, |
| * MediaStore#createDeleteRequest, or MediaStore#createWriteRequest, |
| * the system will show the user confirmation dialog. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_noRESAndMES_showConfirmDialog() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| |
| // grant permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_ACCESS_MEDIA_LOCATION, |
| }, true); |
| // revoke permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_WRITE_EXTERNAL_STORAGE, |
| }, false); |
| |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_EXTERNAL_STORAGE, false); |
| |
| // grant the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_MEDIA, true); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestWrite_showConfirmDialog", user); |
| } |
| |
| /** |
| * If the app is NOT granted {@link android.Manifest.permission#MANAGE_MEDIA}, |
| * when it calls MediaStore#createTrashRequest, |
| * MediaStore#createDeleteRequest, or MediaStore#createWriteRequest, |
| * the system will show the user confirmation dialog. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_noMANAGEMEDIA_showConfirmDialog() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| // grant permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_ACCESS_MEDIA_LOCATION, |
| }, true); |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_MEDIA, false); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestWrite_showConfirmDialog", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestTrash_showConfirmDialog", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestDelete_showConfirmDialog", user); |
| } |
| |
| /** |
| * If the app is granted {@link android.Manifest.permission#MANAGE_MEDIA}, |
| * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE}, without |
| * {@link android.Manifest.permission#ACCESS_MEDIA_LOCATION}, |
| * when it calls MediaStore#createTrashRequest or |
| * MediaStore#createDeleteRequest, The system will NOT show the user |
| * confirmation dialog. When it calls MediaStore#createWriteRequest, the |
| * system will show the user confirmation dialog. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_withNoAML_showConfirmDialog() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| // grant permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| }, true); |
| // revoke permission |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_ACCESS_MEDIA_LOCATION, |
| }, false); |
| |
| // grant the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_MEDIA, true); |
| |
| // show confirm dialog in requestWrite |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestWrite_showConfirmDialog", user); |
| |
| // not show confirm dialog in requestTrash and requestDelete |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestTrash_notShowConfirmDialog", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestDelete_notShowConfirmDialog", user); |
| } |
| |
| /** |
| * If the app is granted {@link android.Manifest.permission#MANAGE_MEDIA}, {@link |
| * android.Manifest.permission#READ_EXTERNAL_STORAGE}, without {@link |
| * android.Manifest.permission#ACCESS_MEDIA_LOCATION}, when it calls |
| * MediaStore#createTrashRequest or MediaStore#createDeleteRequest, The system will NOT show the |
| * user confirmation dialog. When it calls MediaStore#createWriteRequest, the system will show |
| * the user confirmation dialog. This tests pre-SDK level 33 behavior. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_withNoAML_showConfirmDialog31() throws Exception { |
| installPackage(MEDIA_31.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| // grant permissions |
| updatePermissions(MEDIA_31.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| }, true); |
| // revoke permission |
| updatePermissions(MEDIA_31.pkg, user, new String[] { |
| PERM_ACCESS_MEDIA_LOCATION, |
| }, false); |
| |
| // grant the app ops permission |
| updateAppOp(MEDIA_31.pkg, user, APP_OPS_MANAGE_MEDIA, true); |
| |
| // show confirm dialog in requestWrite |
| runDeviceTests(MEDIA_31.pkg, MEDIA_31.clazz, |
| "testMediaEscalation_RequestWrite_showConfirmDialog", user); |
| |
| // not show confirm dialog in requestTrash and requestDelete |
| runDeviceTests(MEDIA_31.pkg, MEDIA_31.clazz, |
| "testMediaEscalation_RequestTrash_notShowConfirmDialog", user); |
| runDeviceTests(MEDIA_31.pkg, MEDIA_31.clazz, |
| "testMediaEscalation_RequestDelete_notShowConfirmDialog", user); |
| } |
| |
| /** |
| * If the app is granted {@link android.Manifest.permission#MANAGE_MEDIA}, |
| * {@link android.Manifest.permission#READ_EXTERNAL_STORAGE}, and |
| * {@link android.Manifest.permission#ACCESS_MEDIA_LOCATION}, |
| * when it calls MediaStore#createWriteRequest, MediaStore#createTrashRequest or |
| * MediaStore#createDeleteRequest, the system will NOT show the user confirmation dialog. |
| * |
| * @throws Exception |
| */ |
| @Test |
| public void testCreateRequest_withPermission_notShowConfirmDialog() throws Exception { |
| installPackage(MEDIA.apk); |
| |
| int user = getDevice().getCurrentUser(); |
| // grant permissions |
| updatePermissions(MEDIA.pkg, user, new String[] { |
| PERM_READ_MEDIA_IMAGES, |
| PERM_READ_MEDIA_VIDEO, |
| PERM_READ_MEDIA_AUDIO, |
| PERM_READ_EXTERNAL_STORAGE, |
| PERM_ACCESS_MEDIA_LOCATION, |
| PERM_READ_MEDIA_VISUAL_USER_SELECTED, |
| }, true); |
| |
| // revoke the app ops permission |
| updateAppOp(MEDIA.pkg, user, APP_OPS_MANAGE_MEDIA, true); |
| |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestWrite_notShowConfirmDialog", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestTrash_notShowConfirmDialog", user); |
| runDeviceTests(MEDIA.pkg, MEDIA.clazz, |
| "testMediaEscalation_RequestDelete_notShowConfirmDialog", user); |
| } |
| |
| /** |
| * Bypasses the calling test case if ANY of the given features is available in the device. |
| */ |
| private void bypassTestForFeatures(String... features) throws DeviceNotAvailableException { |
| final String featureList = getDevice().executeShellCommand("pm list features"); |
| for (String feature : features) { |
| Assume.assumeFalse(featureList.contains(feature)); |
| } |
| } |
| |
| @Test |
| public void testSystemGalleryExists() throws Exception { |
| // Watches, TVs and IoT devices are not obligated to have a system gallery |
| bypassTestForFeatures(FEATURE_AUTOMOTIVE, FEATURE_EMBEDDED, FEATURE_LEANBACK_ONLY, |
| FEATURE_WATCH); |
| |
| for (int user : mUsers) { |
| final String[] roleHolders = getDevice().executeShellCommand( |
| "cmd role get-role-holders --user " + user |
| + " android.app.role.SYSTEM_GALLERY").trim().split(";"); |
| assertEquals("Expected 1 SYSTEM_GALLERY for user " + user, 1, roleHolders.length); |
| } |
| } |
| |
| private boolean access(String path) throws DeviceNotAvailableException { |
| final long nonce = System.nanoTime(); |
| return getDevice().executeShellCommand("ls -la " + path + " && echo " + nonce) |
| .contains(Long.toString(nonce)); |
| } |
| |
| private void updatePermissions(String packageName, int userId, String[] permissions, |
| boolean grant) throws Exception { |
| final String verb = grant ? "grant" : "revoke"; |
| for (String permission : permissions) { |
| getDevice().executeShellCommand( |
| "cmd package " + verb + " --user " + userId + " --uid " + packageName + " " |
| + permission); |
| } |
| } |
| |
| /** Wait until all broadcast queues are idle. */ |
| private void waitForBroadcastIdle() throws Exception{ |
| getDevice().executeShellCommand("am wait-for-broadcast-idle"); |
| } |
| |
| private void updateAppOp(String packageName, int userId, String appOp, boolean allow) |
| throws Exception { |
| updateAppOp(packageName, false, userId, appOp, allow); |
| } |
| |
| private void updateAppOp(String packageName, boolean targetsUid, int userId, |
| String appOp, boolean allow) |
| throws Exception { |
| final String verb = allow ? "allow" : "default"; |
| getDevice().executeShellCommand( |
| "cmd appops set --user " + userId + (targetsUid ? " --uid " : " ") + packageName |
| + " " + appOp + " " + verb); |
| } |
| |
| private void wipePrimaryExternalStorage() throws DeviceNotAvailableException { |
| // Can't delete everything under /sdcard as that's going to remove the mounts. |
| getDevice().executeShellCommand("find /sdcard -type f -delete"); |
| getDevice().executeShellCommand("rm -rf /sdcard/DCIM/*"); |
| getDevice().executeShellCommand("rm -rf /sdcard/MUST_*"); |
| } |
| |
| private void runDeviceTests(String packageName, String testClassName, int userId) |
| throws DeviceNotAvailableException { |
| runDeviceTests(getDevice(), packageName, testClassName, null, userId, null); |
| } |
| |
| private void runDeviceTests(String packageName, String testClassName, String testMethodName, |
| int userId) throws DeviceNotAvailableException { |
| runDeviceTests(getDevice(), packageName, testClassName, testMethodName, userId, null); |
| } |
| } |