blob: da632bfd8b3794290ea7af33172f3bc53ef5c4f4 [file] [log] [blame]
/*
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.devicepolicy.cts;
import static android.Manifest.permission.READ_NEARBY_STREAMING_POLICY;
import static android.content.pm.PackageManager.FEATURE_DEVICE_ADMIN;
import static com.android.bedstead.nene.permissions.CommonPermissions.INTERACT_ACROSS_USERS;
import static com.android.bedstead.nene.permissions.CommonPermissions.INTERACT_ACROSS_USERS_FULL;
import static com.android.bedstead.nene.types.OptionalBoolean.TRUE;
import static com.google.common.truth.Truth.assertThat;
import static org.testng.Assert.assertThrows;
import android.app.admin.DevicePolicyManager;
import android.app.admin.RemoteDevicePolicyManager;
import android.content.Context;
import com.android.bedstead.harrier.BedsteadJUnit4;
import com.android.bedstead.harrier.DeviceState;
import com.android.bedstead.harrier.annotations.EnsureDoesNotHavePermission;
import com.android.bedstead.harrier.annotations.EnsureHasPermission;
import com.android.bedstead.harrier.annotations.EnsureHasSecondaryUser;
import com.android.bedstead.harrier.annotations.Postsubmit;
import com.android.bedstead.harrier.annotations.RequireFeature;
import com.android.bedstead.harrier.annotations.RequireRunOnPrimaryUser;
import com.android.bedstead.harrier.annotations.enterprise.CannotSetPolicyTest;
import com.android.bedstead.harrier.annotations.enterprise.PolicyAppliesTest;
import com.android.bedstead.harrier.annotations.enterprise.PolicyDoesNotApplyTest;
import com.android.bedstead.harrier.policies.GetNearbyAppStreamingPolicy;
import com.android.bedstead.harrier.policies.SetNearbyAppStreamingPolicy;
import com.android.bedstead.nene.TestApis;
import com.android.bedstead.nene.permissions.PermissionContext;
import org.junit.ClassRule;
import org.junit.Ignore;
import org.junit.Rule;
import org.junit.Test;
import org.junit.runner.RunWith;
@RunWith(BedsteadJUnit4.class)
@RequireFeature(FEATURE_DEVICE_ADMIN)
public class NearbyAppStreamingPolicyTest {
@ClassRule
@Rule
public static final DeviceState sDeviceState = new DeviceState();
private static final Context sContext = TestApis.context().instrumentedContext();
private static final DevicePolicyManager sLocalDevicePolicyManager =
sContext.getSystemService(DevicePolicyManager.class);
@PolicyAppliesTest(policy = GetNearbyAppStreamingPolicy.class)
public void getNearbyAppStreamingPolicy_defaultToSameManagedAccountOnly() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
assertThat(dpm.getNearbyAppStreamingPolicy())
.isEqualTo(DevicePolicyManager.NEARBY_STREAMING_SAME_MANAGED_ACCOUNT_ONLY);
}
@CannotSetPolicyTest(policy = GetNearbyAppStreamingPolicy.class)
@Ignore
// TODO(b/191637162): We cannot reach a state without READ_NEARBY_STREAMING_POLICY because it
// is a normal permission that is requested by all testapps. When we support adopting shell
// permissions in test apps we can re-enable this and remove all normal permissions from
// testapps.
public void getNearbyAppStreamingPolicy_policyIsNotAllowedToBeSet_throwsException() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
assertThrows(SecurityException.class, () -> dpm.getNearbyAppStreamingPolicy());
}
@PolicyAppliesTest(policy = SetNearbyAppStreamingPolicy.class)
public void setNearbyAppStreamingPolicy_policyApplied_works() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
int originalPolicy = dpm.getNearbyAppStreamingPolicy();
dpm.setNearbyAppStreamingPolicy(DevicePolicyManager.NEARBY_STREAMING_DISABLED);
try {
assertThat(dpm.getNearbyAppStreamingPolicy())
.isEqualTo(DevicePolicyManager.NEARBY_STREAMING_DISABLED);
} finally {
dpm.setNearbyAppStreamingPolicy(originalPolicy);
}
}
@PolicyDoesNotApplyTest(policy = SetNearbyAppStreamingPolicy.class)
@EnsureHasPermission(READ_NEARBY_STREAMING_POLICY)
public void setNearbyAppStreamingPolicy_policyApplied_otherUsersUnaffected() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
int originalLocalPolicy = sLocalDevicePolicyManager.getNearbyAppStreamingPolicy();
int originalPolicy = dpm.getNearbyAppStreamingPolicy();
dpm.setNearbyAppStreamingPolicy(DevicePolicyManager.NEARBY_STREAMING_DISABLED);
try {
assertThat(sLocalDevicePolicyManager.getNearbyAppStreamingPolicy())
.isEqualTo(originalLocalPolicy);
} finally {
dpm.setNearbyAppStreamingPolicy(originalPolicy);
}
}
@CannotSetPolicyTest(policy = SetNearbyAppStreamingPolicy.class)
public void setNearbyAppStreamingPolicy_policyIsNotAllowedToBeSet_throwsException() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
assertThrows(SecurityException.class, () ->
dpm.setNearbyAppStreamingPolicy(DevicePolicyManager.NEARBY_STREAMING_DISABLED));
}
@Postsubmit(reason = "new test")
@PolicyDoesNotApplyTest(policy = SetNearbyAppStreamingPolicy.class)
@EnsureHasPermission(READ_NEARBY_STREAMING_POLICY)
public void setNearbyAppStreamingPolicy_setEnabled_doesNotApply() {
RemoteDevicePolicyManager dpm = sDeviceState.dpc().devicePolicyManager();
int originalPolicy = dpm.getNearbyAppStreamingPolicy();
dpm.setNearbyAppStreamingPolicy(DevicePolicyManager.NEARBY_STREAMING_ENABLED);
try {
assertThat(sLocalDevicePolicyManager.getNearbyAppStreamingPolicy()).isNotEqualTo(
DevicePolicyManager.NEARBY_STREAMING_ENABLED);
} finally {
dpm.setNearbyAppStreamingPolicy(originalPolicy);
}
}
@Test
@RequireRunOnPrimaryUser
@EnsureHasSecondaryUser(installInstrumentedApp = TRUE)
@EnsureHasPermission(READ_NEARBY_STREAMING_POLICY)
@EnsureDoesNotHavePermission({INTERACT_ACROSS_USERS, INTERACT_ACROSS_USERS_FULL})
public void getNearbyAppStreamingPolicy_calledAcrossUsers_throwsException() {
DevicePolicyManager dpm;
try (PermissionContext p = TestApis.permissions()
.withPermission(INTERACT_ACROSS_USERS_FULL)) {
dpm = TestApis.context()
.instrumentedContextAsUser(sDeviceState.secondaryUser())
.getSystemService(DevicePolicyManager.class);
}
assertThrows(SecurityException.class, () -> dpm.getNearbyAppStreamingPolicy());
}
}