diff options
author | Rebecca Silberstein <silberst@google.com> | 2017-06-09 14:55:32 +0000 |
---|---|---|
committer | android-build-merger <android-build-merger@google.com> | 2017-06-09 14:55:32 +0000 |
commit | 519f8b12c73981cbf74920e13453c6570c88ef0f (patch) | |
tree | e54674ebb1b5fa89aca50f9e804e1c11b70844ce | |
parent | 95571223c1eece592650e67c894e4a9f95c2d5ae (diff) | |
parent | 8ec0ba59c20b8266d735912fb71575834c991acc (diff) |
Merge "WifiServiceImpl: check app status for startLOHS" into oc-dev
am: 8ec0ba59c2
Change-Id: Ie607ba700952ccc6ab34b663d86e734fda02852d
3 files changed, 59 insertions, 2 deletions
diff --git a/service/java/com/android/server/wifi/FrameworkFacade.java b/service/java/com/android/server/wifi/FrameworkFacade.java index 2c3e5f7e0..ba114df8a 100644 --- a/service/java/com/android/server/wifi/FrameworkFacade.java +++ b/service/java/com/android/server/wifi/FrameworkFacade.java @@ -16,6 +16,7 @@ package com.android.server.wifi; +import android.app.ActivityManager; import android.app.AppGlobals; import android.app.PendingIntent; import android.content.Context; @@ -161,4 +162,14 @@ public class FrameworkFacade { public boolean inStorageManagerCryptKeeperBounce() { return StorageManager.inCryptKeeperBounce(); } + + /** + * Check if the provided uid is the app in the foreground. + * @param uid the uid to check + * @return true if the app is in the foreground, false otherwise + * @throws RemoteException + */ + public boolean isAppForeground(int uid) throws RemoteException { + return ActivityManager.getService().isAppForeground(uid); + } } diff --git a/service/java/com/android/server/wifi/WifiServiceImpl.java b/service/java/com/android/server/wifi/WifiServiceImpl.java index d3f5b13de..2dff54a50 100644 --- a/service/java/com/android/server/wifi/WifiServiceImpl.java +++ b/service/java/com/android/server/wifi/WifiServiceImpl.java @@ -1160,6 +1160,16 @@ public class WifiServiceImpl extends IWifiManager.Stub { return LocalOnlyHotspotCallback.ERROR_TETHERING_DISALLOWED; } + // the app should be in the foreground + try { + if (!mFrameworkFacade.isAppForeground(uid)) { + return LocalOnlyHotspotCallback.ERROR_INCOMPATIBLE_MODE; + } + } catch (RemoteException e) { + mLog.trace("RemoteException during isAppForeground when calling startLOHS"); + return LocalOnlyHotspotCallback.ERROR_INCOMPATIBLE_MODE; + } + mLog.trace("startLocalOnlyHotspot uid=% pid=%").c(uid).c(pid).flush(); synchronized (mLocalOnlyHotspotRequests) { diff --git a/tests/wifitests/src/com/android/server/wifi/WifiServiceImplTest.java b/tests/wifitests/src/com/android/server/wifi/WifiServiceImplTest.java index 38eb1730b..6d92e7e62 100644 --- a/tests/wifitests/src/com/android/server/wifi/WifiServiceImplTest.java +++ b/tests/wifitests/src/com/android/server/wifi/WifiServiceImplTest.java @@ -74,6 +74,7 @@ import android.os.Message; import android.os.Messenger; import android.os.PowerManager; import android.os.Process; +import android.os.RemoteException; import android.os.UserManager; import android.os.WorkSource; import android.os.test.TestLooper; @@ -761,6 +762,9 @@ public class WifiServiceImplTest { // allow test to proceed without a permission check failure when(mSettingsStore.getLocationModeSetting(mContext)) .thenReturn(LOCATION_MODE_HIGH_ACCURACY); + try { + when(mFrameworkFacade.isAppForeground(anyInt())).thenReturn(true); + } catch (RemoteException e) { } when(mUserManager.hasUserRestriction(UserManager.DISALLOW_CONFIG_TETHERING)) .thenReturn(false); int result = mWifiServiceImpl.startLocalOnlyHotspot(mAppMessenger, mAppBinder, @@ -813,12 +817,43 @@ public class WifiServiceImplTest { } /** + * Only start LocalOnlyHotspot if the caller is the foreground app at the time of the request. + */ + @Test + public void testStartLocalOnlyHotspotFailsIfRequestorNotForegroundApp() throws Exception { + when(mSettingsStore.getLocationModeSetting(mContext)) + .thenReturn(LOCATION_MODE_HIGH_ACCURACY); + + when(mFrameworkFacade.isAppForeground(anyInt())).thenReturn(false); + int result = mWifiServiceImpl.startLocalOnlyHotspot(mAppMessenger, mAppBinder, + TEST_PACKAGE_NAME); + assertEquals(LocalOnlyHotspotCallback.ERROR_INCOMPATIBLE_MODE, result); + } + + /** + * Do not register the LocalOnlyHotspot request if the caller app cannot be verified as the + * foreground app at the time of the request (ie, throws an exception in the check). + */ + @Test + public void testStartLocalOnlyHotspotFailsIfForegroundAppCheckThrowsRemoteException() + throws Exception { + when(mSettingsStore.getLocationModeSetting(mContext)) + .thenReturn(LOCATION_MODE_HIGH_ACCURACY); + + when(mFrameworkFacade.isAppForeground(anyInt())).thenThrow(new RemoteException()); + int result = mWifiServiceImpl.startLocalOnlyHotspot(mAppMessenger, mAppBinder, + TEST_PACKAGE_NAME); + assertEquals(LocalOnlyHotspotCallback.ERROR_INCOMPATIBLE_MODE, result); + } + + /** * Only start LocalOnlyHotspot if we are not tethering. */ @Test - public void testHotspotDoesNotStartWhenAlreadyTethering() { + public void testHotspotDoesNotStartWhenAlreadyTethering() throws Exception { when(mSettingsStore.getLocationModeSetting(mContext)) .thenReturn(LOCATION_MODE_HIGH_ACCURACY); + when(mFrameworkFacade.isAppForeground(anyInt())).thenReturn(true); mWifiServiceImpl.updateInterfaceIpState(WIFI_IFACE_NAME, IFACE_IP_MODE_TETHERED); mLooper.dispatchAll(); int returnCode = mWifiServiceImpl.startLocalOnlyHotspot( @@ -830,9 +865,10 @@ public class WifiServiceImplTest { * Only start LocalOnlyHotspot if admin setting does not disallow tethering. */ @Test - public void testHotspotDoesNotStartWhenTetheringDisallowed() { + public void testHotspotDoesNotStartWhenTetheringDisallowed() throws Exception { when(mSettingsStore.getLocationModeSetting(mContext)) .thenReturn(LOCATION_MODE_HIGH_ACCURACY); + when(mFrameworkFacade.isAppForeground(anyInt())).thenReturn(true); when(mUserManager.hasUserRestriction(UserManager.DISALLOW_CONFIG_TETHERING)) .thenReturn(true); int returnCode = mWifiServiceImpl.startLocalOnlyHotspot( |