/* * Copyright (C) 2022 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package android.os; import android.annotation.NonNull; import android.annotation.SystemService; import android.app.AppOpsManager; import android.content.AttributionSource; import android.content.Context; import android.content.PermissionChecker; import android.content.pm.PackageManager; import android.permission.PermissionCheckerManager; import android.permission.PermissionManager; /** * PermissionEnforcer check permissions for AIDL-generated services which use * the @EnforcePermission annotation. * *
AIDL services may be annotated with @EnforcePermission which will trigger * the generation of permission check code. This generated code relies on * PermissionEnforcer to validate the permissions. The methods available are * purposely similar to the AIDL annotation syntax. * *
The constructor of the Stub generated by AIDL expects a * PermissionEnforcer. It can be based on the current Context. For example: * *
{@code * class MyFoo extends Foo.Stub { * MyFoo(Context context) { * super(PermissionEnforcer.fromContext(context)); * } * * @Override * @EnforcePermission(android.Manifest.permission.INTERNET) * public MyMethod() { * MyMethod_enforcePermission(); * } * } * }* *
A {@link android.os.test.FakePermissionEnforcer} is available for unit * testing. It can be attached to a mocked Context using: *
{@code * @Mock private Context mContext; * * @Before * public setUp() { * fakeEnforcer = new FakePermissionEnforcer(); * fakeEnforcer.grant(android.Manifest.permission.INTERNET); * * doReturn(fakeEnforcer).when(mContext).getSystemService( eq(Context.PERMISSION_ENFORCER_SERVICE)); * } * }* * @see android.permission.PermissionManager * * @hide */ @SystemService(Context.PERMISSION_ENFORCER_SERVICE) @android.ravenwood.annotation.RavenwoodKeepWholeClass public class PermissionEnforcer { private final Context mContext; private static final String ACCESS_DENIED = "Access denied, requires: "; /** Protected constructor. Allows subclasses to instantiate an object * without using a Context. */ protected PermissionEnforcer() { mContext = null; } /** Constructor, prefer using the fromContext static method when possible */ @android.ravenwood.annotation.RavenwoodThrow(blockedBy = PermissionManager.class, reason = "Use subclass for unit tests, such as FakePermissionEnforcer") public PermissionEnforcer(@NonNull Context context) { mContext = context; } @PermissionCheckerManager.PermissionResult protected int checkPermission(@NonNull String permission, @NonNull AttributionSource source) { return PermissionChecker.checkPermissionForDataDelivery( mContext, permission, PermissionChecker.PID_UNKNOWN, source, "" /* message */); } @SuppressWarnings("AndroidFrameworkClientSidePermissionCheck") @PermissionCheckerManager.PermissionResult protected int checkPermission(@NonNull String permission, int pid, int uid) { if (mContext.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_GRANTED) { return PermissionCheckerManager.PERMISSION_GRANTED; } return PermissionCheckerManager.PERMISSION_HARD_DENIED; } @android.ravenwood.annotation.RavenwoodReplace(blockedBy = AppOpsManager.class, reason = "Blocked on Mainline dependencies") private static int permissionToOpCode(String permission) { return AppOpsManager.permissionToOpCode(permission); } private static int permissionToOpCode$ravenwood(String permission) { return AppOpsManager.OP_NONE; } private boolean anyAppOps(@NonNull String[] permissions) { for (String permission : permissions) { if (permissionToOpCode(permission) != AppOpsManager.OP_NONE) { return true; } } return false; } public void enforcePermission(@NonNull String permission, @NonNull AttributionSource source) throws SecurityException { int result = checkPermission(permission, source); if (result != PermissionCheckerManager.PERMISSION_GRANTED) { throw new SecurityException(ACCESS_DENIED + permission); } } public void enforcePermission(@NonNull String permission, int pid, int uid) throws SecurityException { if (permissionToOpCode(permission) != AppOpsManager.OP_NONE) { AttributionSource source = new AttributionSource(uid, null, null); enforcePermission(permission, source); return; } int result = checkPermission(permission, pid, uid); if (result != PermissionCheckerManager.PERMISSION_GRANTED) { throw new SecurityException(ACCESS_DENIED + permission); } } public void enforcePermissionAllOf(@NonNull String[] permissions, @NonNull AttributionSource source) throws SecurityException { for (String permission : permissions) { int result = checkPermission(permission, source); if (result != PermissionCheckerManager.PERMISSION_GRANTED) { throw new SecurityException(ACCESS_DENIED + "allOf={" + String.join(", ", permissions) + "}"); } } } public void enforcePermissionAllOf(@NonNull String[] permissions, int pid, int uid) throws SecurityException { if (anyAppOps(permissions)) { AttributionSource source = new AttributionSource(uid, null, null); enforcePermissionAllOf(permissions, source); return; } for (String permission : permissions) { int result = checkPermission(permission, pid, uid); if (result != PermissionCheckerManager.PERMISSION_GRANTED) { throw new SecurityException(ACCESS_DENIED + "allOf={" + String.join(", ", permissions) + "}"); } } } public void enforcePermissionAnyOf(@NonNull String[] permissions, @NonNull AttributionSource source) throws SecurityException { for (String permission : permissions) { int result = checkPermission(permission, source); if (result == PermissionCheckerManager.PERMISSION_GRANTED) { return; } } throw new SecurityException(ACCESS_DENIED + "anyOf={" + String.join(", ", permissions) + "}"); } public void enforcePermissionAnyOf(@NonNull String[] permissions, int pid, int uid) throws SecurityException { if (anyAppOps(permissions)) { AttributionSource source = new AttributionSource(uid, null, null); enforcePermissionAnyOf(permissions, source); return; } for (String permission : permissions) { int result = checkPermission(permission, pid, uid); if (result == PermissionCheckerManager.PERMISSION_GRANTED) { return; } } throw new SecurityException(ACCESS_DENIED + "anyOf={" + String.join(", ", permissions) + "}"); } /** * Returns a new PermissionEnforcer based on a Context. * * @hide */ public static PermissionEnforcer fromContext(@NonNull Context context) { return (PermissionEnforcer) context.getSystemService(Context.PERMISSION_ENFORCER_SERVICE); } }