script-astra/Android/Sdk/sources/android-35/android/os/PermissionEnforcer.java
localadmin 4380f00a78 init
2025-01-20 18:15:20 +03:00

215 lines
8.0 KiB
Java

/*
* Copyright (C) 2022 The Android Open Source Project
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package android.os;
import android.annotation.NonNull;
import android.annotation.SystemService;
import android.app.AppOpsManager;
import android.content.AttributionSource;
import android.content.Context;
import android.content.PermissionChecker;
import android.content.pm.PackageManager;
import android.permission.PermissionCheckerManager;
import android.permission.PermissionManager;
/**
* PermissionEnforcer check permissions for AIDL-generated services which use
* the @EnforcePermission annotation.
*
* <p>AIDL services may be annotated with @EnforcePermission which will trigger
* the generation of permission check code. This generated code relies on
* PermissionEnforcer to validate the permissions. The methods available are
* purposely similar to the AIDL annotation syntax.
*
* <p>The constructor of the Stub generated by AIDL expects a
* PermissionEnforcer. It can be based on the current Context. For example:
*
* <pre>{@code
* class MyFoo extends Foo.Stub {
* MyFoo(Context context) {
* super(PermissionEnforcer.fromContext(context));
* }
*
* @Override
* @EnforcePermission(android.Manifest.permission.INTERNET)
* public MyMethod() {
* MyMethod_enforcePermission();
* }
* }
* }</pre>
*
* <p>A {@link android.os.test.FakePermissionEnforcer} is available for unit
* testing. It can be attached to a mocked Context using:
* <pre>{@code
* @Mock private Context mContext;
*
* @Before
* public setUp() {
* fakeEnforcer = new FakePermissionEnforcer();
* fakeEnforcer.grant(android.Manifest.permission.INTERNET);
*
* doReturn(fakeEnforcer).when(mContext).getSystemService(
eq(Context.PERMISSION_ENFORCER_SERVICE));
* }
* }</pre>
*
* @see android.permission.PermissionManager
*
* @hide
*/
@SystemService(Context.PERMISSION_ENFORCER_SERVICE)
@android.ravenwood.annotation.RavenwoodKeepWholeClass
public class PermissionEnforcer {
private final Context mContext;
private static final String ACCESS_DENIED = "Access denied, requires: ";
/** Protected constructor. Allows subclasses to instantiate an object
* without using a Context.
*/
protected PermissionEnforcer() {
mContext = null;
}
/** Constructor, prefer using the fromContext static method when possible */
@android.ravenwood.annotation.RavenwoodThrow(blockedBy = PermissionManager.class,
reason = "Use subclass for unit tests, such as FakePermissionEnforcer")
public PermissionEnforcer(@NonNull Context context) {
mContext = context;
}
@PermissionCheckerManager.PermissionResult
protected int checkPermission(@NonNull String permission, @NonNull AttributionSource source) {
return PermissionChecker.checkPermissionForDataDelivery(
mContext, permission, PermissionChecker.PID_UNKNOWN, source, "" /* message */);
}
@SuppressWarnings("AndroidFrameworkClientSidePermissionCheck")
@PermissionCheckerManager.PermissionResult
protected int checkPermission(@NonNull String permission, int pid, int uid) {
if (mContext.checkPermission(permission, pid, uid) == PackageManager.PERMISSION_GRANTED) {
return PermissionCheckerManager.PERMISSION_GRANTED;
}
return PermissionCheckerManager.PERMISSION_HARD_DENIED;
}
@android.ravenwood.annotation.RavenwoodReplace(blockedBy = AppOpsManager.class,
reason = "Blocked on Mainline dependencies")
private static int permissionToOpCode(String permission) {
return AppOpsManager.permissionToOpCode(permission);
}
private static int permissionToOpCode$ravenwood(String permission) {
return AppOpsManager.OP_NONE;
}
private boolean anyAppOps(@NonNull String[] permissions) {
for (String permission : permissions) {
if (permissionToOpCode(permission) != AppOpsManager.OP_NONE) {
return true;
}
}
return false;
}
public void enforcePermission(@NonNull String permission, @NonNull
AttributionSource source) throws SecurityException {
int result = checkPermission(permission, source);
if (result != PermissionCheckerManager.PERMISSION_GRANTED) {
throw new SecurityException(ACCESS_DENIED + permission);
}
}
public void enforcePermission(@NonNull String permission, int pid, int uid)
throws SecurityException {
if (permissionToOpCode(permission) != AppOpsManager.OP_NONE) {
AttributionSource source = new AttributionSource(uid, null, null);
enforcePermission(permission, source);
return;
}
int result = checkPermission(permission, pid, uid);
if (result != PermissionCheckerManager.PERMISSION_GRANTED) {
throw new SecurityException(ACCESS_DENIED + permission);
}
}
public void enforcePermissionAllOf(@NonNull String[] permissions,
@NonNull AttributionSource source) throws SecurityException {
for (String permission : permissions) {
int result = checkPermission(permission, source);
if (result != PermissionCheckerManager.PERMISSION_GRANTED) {
throw new SecurityException(ACCESS_DENIED + "allOf={"
+ String.join(", ", permissions) + "}");
}
}
}
public void enforcePermissionAllOf(@NonNull String[] permissions,
int pid, int uid) throws SecurityException {
if (anyAppOps(permissions)) {
AttributionSource source = new AttributionSource(uid, null, null);
enforcePermissionAllOf(permissions, source);
return;
}
for (String permission : permissions) {
int result = checkPermission(permission, pid, uid);
if (result != PermissionCheckerManager.PERMISSION_GRANTED) {
throw new SecurityException(ACCESS_DENIED + "allOf={"
+ String.join(", ", permissions) + "}");
}
}
}
public void enforcePermissionAnyOf(@NonNull String[] permissions,
@NonNull AttributionSource source) throws SecurityException {
for (String permission : permissions) {
int result = checkPermission(permission, source);
if (result == PermissionCheckerManager.PERMISSION_GRANTED) {
return;
}
}
throw new SecurityException(ACCESS_DENIED + "anyOf={"
+ String.join(", ", permissions) + "}");
}
public void enforcePermissionAnyOf(@NonNull String[] permissions,
int pid, int uid) throws SecurityException {
if (anyAppOps(permissions)) {
AttributionSource source = new AttributionSource(uid, null, null);
enforcePermissionAnyOf(permissions, source);
return;
}
for (String permission : permissions) {
int result = checkPermission(permission, pid, uid);
if (result == PermissionCheckerManager.PERMISSION_GRANTED) {
return;
}
}
throw new SecurityException(ACCESS_DENIED + "anyOf={"
+ String.join(", ", permissions) + "}");
}
/**
* Returns a new PermissionEnforcer based on a Context.
*
* @hide
*/
public static PermissionEnforcer fromContext(@NonNull Context context) {
return (PermissionEnforcer) context.getSystemService(Context.PERMISSION_ENFORCER_SERVICE);
}
}