Merge "RestrictedLockUtils was split into ...Internal"
This commit is contained in:
committed by
Android (Google) Code Review
commit
8a33bd5947
@@ -62,6 +62,7 @@ import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
|||||||
import com.android.settings.password.ChooseLockSettingsHelper;
|
import com.android.settings.password.ChooseLockSettingsHelper;
|
||||||
import com.android.settings.password.ConfirmLockPattern;
|
import com.android.settings.password.ConfirmLockPattern;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
@@ -499,11 +500,12 @@ public class MasterClear extends InstrumentedFragment implements OnGlobalLayoutL
|
|||||||
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
||||||
Bundle savedInstanceState) {
|
Bundle savedInstanceState) {
|
||||||
final Context context = getContext();
|
final Context context = getContext();
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(context,
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(context,
|
||||||
UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId());
|
UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId());
|
||||||
final UserManager um = UserManager.get(context);
|
final UserManager um = UserManager.get(context);
|
||||||
final boolean disallow = !um.isAdminUser() || RestrictedLockUtils.hasBaseUserRestriction(
|
final boolean disallow = !um.isAdminUser() || RestrictedLockUtilsInternal
|
||||||
context, UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId());
|
.hasBaseUserRestriction(context, UserManager.DISALLOW_FACTORY_RESET,
|
||||||
|
UserHandle.myUserId());
|
||||||
if (disallow && !Utils.isDemoUser(context)) {
|
if (disallow && !Utils.isDemoUser(context)) {
|
||||||
return inflater.inflate(R.layout.master_clear_disallowed_screen, null);
|
return inflater.inflate(R.layout.master_clear_disallowed_screen, null);
|
||||||
} else if (admin != null) {
|
} else if (admin != null) {
|
||||||
|
@@ -38,6 +38,7 @@ import com.android.internal.logging.nano.MetricsProto.MetricsEvent;
|
|||||||
import com.android.settings.core.InstrumentedFragment;
|
import com.android.settings.core.InstrumentedFragment;
|
||||||
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Confirm and execute a reset of the device to a clean "just out of the box"
|
* Confirm and execute a reset of the device to a clean "just out of the box"
|
||||||
@@ -146,9 +147,9 @@ public class MasterClearConfirm extends InstrumentedFragment {
|
|||||||
@Override
|
@Override
|
||||||
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
||||||
Bundle savedInstanceState) {
|
Bundle savedInstanceState) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
getActivity(), UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId());
|
getActivity(), UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId());
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(getActivity(),
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(getActivity(),
|
||||||
UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId())) {
|
UserManager.DISALLOW_FACTORY_RESET, UserHandle.myUserId())) {
|
||||||
return inflater.inflate(R.layout.master_clear_disallowed_screen, null);
|
return inflater.inflate(R.layout.master_clear_disallowed_screen, null);
|
||||||
} else if (admin != null) {
|
} else if (admin != null) {
|
||||||
|
@@ -50,6 +50,7 @@ import com.android.settings.password.ChooseLockSettingsHelper;
|
|||||||
import com.android.settings.password.ConfirmLockPattern;
|
import com.android.settings.password.ConfirmLockPattern;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
@@ -240,9 +241,9 @@ public class ResetNetwork extends InstrumentedFragment {
|
|||||||
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
||||||
Bundle savedInstanceState) {
|
Bundle savedInstanceState) {
|
||||||
final UserManager um = UserManager.get(getActivity());
|
final UserManager um = UserManager.get(getActivity());
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
getActivity(), UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
getActivity(), UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
||||||
if (!um.isAdminUser() || RestrictedLockUtils.hasBaseUserRestriction(getActivity(),
|
if (!um.isAdminUser() || RestrictedLockUtilsInternal.hasBaseUserRestriction(getActivity(),
|
||||||
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId())) {
|
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId())) {
|
||||||
return inflater.inflate(R.layout.network_reset_disallowed_screen, null);
|
return inflater.inflate(R.layout.network_reset_disallowed_screen, null);
|
||||||
} else if (admin != null) {
|
} else if (admin != null) {
|
||||||
|
@@ -50,6 +50,7 @@ import com.android.settings.core.InstrumentedFragment;
|
|||||||
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
||||||
import com.android.settings.network.ApnSettings;
|
import com.android.settings.network.ApnSettings;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Confirm and execute a reset of the network settings to a clean "just out of the box"
|
* Confirm and execute a reset of the network settings to a clean "just out of the box"
|
||||||
@@ -204,9 +205,9 @@ public class ResetNetworkConfirm extends InstrumentedFragment {
|
|||||||
@Override
|
@Override
|
||||||
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
||||||
Bundle savedInstanceState) {
|
Bundle savedInstanceState) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
getActivity(), UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
getActivity(), UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(getActivity(),
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(getActivity(),
|
||||||
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId())) {
|
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId())) {
|
||||||
return inflater.inflate(R.layout.network_reset_disallowed_screen, null);
|
return inflater.inflate(R.layout.network_reset_disallowed_screen, null);
|
||||||
} else if (admin != null) {
|
} else if (admin != null) {
|
||||||
|
@@ -24,6 +24,7 @@ import android.util.AttributeSet;
|
|||||||
import android.widget.CheckBox;
|
import android.widget.CheckBox;
|
||||||
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A checkbox that can be restricted by device policy, in which case it shows a dialog explaining
|
* A checkbox that can be restricted by device policy, in which case it shows a dialog explaining
|
||||||
@@ -57,7 +58,8 @@ public class RestrictedCheckBox extends CheckBox {
|
|||||||
mEnforcedAdmin = admin;
|
mEnforcedAdmin = admin;
|
||||||
if (mDisabledByAdmin != disabled) {
|
if (mDisabledByAdmin != disabled) {
|
||||||
mDisabledByAdmin = disabled;
|
mDisabledByAdmin = disabled;
|
||||||
RestrictedLockUtils.setTextViewAsDisabledByAdmin(mContext, this, mDisabledByAdmin);
|
RestrictedLockUtilsInternal.setTextViewAsDisabledByAdmin(mContext, this,
|
||||||
|
mDisabledByAdmin);
|
||||||
if (mDisabledByAdmin) {
|
if (mDisabledByAdmin) {
|
||||||
getButtonDrawable().setColorFilter(mContext.getColor(R.color.disabled_text_color),
|
getButtonDrawable().setColorFilter(mContext.getColor(R.color.disabled_text_color),
|
||||||
PorterDuff.Mode.MULTIPLY);
|
PorterDuff.Mode.MULTIPLY);
|
||||||
|
@@ -25,6 +25,7 @@ import android.widget.RadioButton;
|
|||||||
import android.widget.TextView;
|
import android.widget.TextView;
|
||||||
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class RestrictedRadioButton extends RadioButton {
|
public class RestrictedRadioButton extends RadioButton {
|
||||||
private Context mContext;
|
private Context mContext;
|
||||||
@@ -63,7 +64,7 @@ public class RestrictedRadioButton extends RadioButton {
|
|||||||
mEnforcedAdmin = admin;
|
mEnforcedAdmin = admin;
|
||||||
if (mDisabledByAdmin != disabled) {
|
if (mDisabledByAdmin != disabled) {
|
||||||
mDisabledByAdmin = disabled;
|
mDisabledByAdmin = disabled;
|
||||||
RestrictedLockUtils.setTextViewAsDisabledByAdmin(mContext,
|
RestrictedLockUtilsInternal.setTextViewAsDisabledByAdmin(mContext,
|
||||||
(TextView) this, mDisabledByAdmin);
|
(TextView) this, mDisabledByAdmin);
|
||||||
if (mDisabledByAdmin) {
|
if (mDisabledByAdmin) {
|
||||||
getButtonDrawable().setColorFilter(mContext.getColor(R.color.disabled_text_color),
|
getButtonDrawable().setColorFilter(mContext.getColor(R.color.disabled_text_color),
|
||||||
|
@@ -37,6 +37,7 @@ import androidx.appcompat.app.AlertDialog;
|
|||||||
import com.android.settings.dashboard.RestrictedDashboardFragment;
|
import com.android.settings.dashboard.RestrictedDashboardFragment;
|
||||||
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Base class for settings screens that should be pin protected when in restricted mode or
|
* Base class for settings screens that should be pin protected when in restricted mode or
|
||||||
@@ -219,7 +220,7 @@ public abstract class RestrictedSettingsFragment extends SettingsPreferenceFragm
|
|||||||
}
|
}
|
||||||
|
|
||||||
public EnforcedAdmin getRestrictionEnforcedAdmin() {
|
public EnforcedAdmin getRestrictionEnforcedAdmin() {
|
||||||
mEnforcedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(getActivity(),
|
mEnforcedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(getActivity(),
|
||||||
mRestrictionKey, UserHandle.myUserId());
|
mRestrictionKey, UserHandle.myUserId());
|
||||||
if (mEnforcedAdmin != null && mEnforcedAdmin.userId == UserHandle.USER_NULL) {
|
if (mEnforcedAdmin != null && mEnforcedAdmin.userId == UserHandle.USER_NULL) {
|
||||||
mEnforcedAdmin.userId = UserHandle.myUserId();
|
mEnforcedAdmin.userId = UserHandle.myUserId();
|
||||||
|
@@ -53,6 +53,7 @@ import com.android.internal.widget.LockPatternUtils;
|
|||||||
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.security.UnrecoverableKeyException;
|
import java.security.UnrecoverableKeyException;
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
@@ -137,11 +138,12 @@ public class UserCredentialsSettings extends SettingsPreferenceFragment
|
|||||||
|
|
||||||
final String restriction = UserManager.DISALLOW_CONFIG_CREDENTIALS;
|
final String restriction = UserManager.DISALLOW_CONFIG_CREDENTIALS;
|
||||||
final int myUserId = UserHandle.myUserId();
|
final int myUserId = UserHandle.myUserId();
|
||||||
if (!RestrictedLockUtils.hasBaseUserRestriction(getContext(), restriction, myUserId)) {
|
if (!RestrictedLockUtilsInternal.hasBaseUserRestriction(getContext(), restriction,
|
||||||
|
myUserId)) {
|
||||||
DialogInterface.OnClickListener listener = new DialogInterface.OnClickListener() {
|
DialogInterface.OnClickListener listener = new DialogInterface.OnClickListener() {
|
||||||
@Override public void onClick(DialogInterface dialog, int id) {
|
@Override public void onClick(DialogInterface dialog, int id) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal
|
||||||
getContext(), restriction, myUserId);
|
.checkIfRestrictionEnforced(getContext(), restriction, myUserId);
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
||||||
admin);
|
admin);
|
||||||
|
@@ -56,8 +56,8 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.SettingsPreferenceFragment;
|
import com.android.settings.SettingsPreferenceFragment;
|
||||||
import com.android.settings.Utils;
|
import com.android.settings.Utils;
|
||||||
import com.android.settings.search.BaseSearchIndexProvider;
|
import com.android.settings.search.BaseSearchIndexProvider;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.accessibility.AccessibilityUtils;
|
import com.android.settingslib.accessibility.AccessibilityUtils;
|
||||||
import com.android.settingslib.search.SearchIndexable;
|
import com.android.settingslib.search.SearchIndexable;
|
||||||
@@ -584,7 +584,7 @@ public class AccessibilitySettings extends SettingsPreferenceFragment implements
|
|||||||
permittedServices == null || permittedServices.contains(packageName);
|
permittedServices == null || permittedServices.contains(packageName);
|
||||||
if (!serviceAllowed && !serviceEnabled) {
|
if (!serviceAllowed && !serviceEnabled) {
|
||||||
final EnforcedAdmin admin =
|
final EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfAccessibilityServiceDisallowed(
|
RestrictedLockUtilsInternal.checkIfAccessibilityServiceDisallowed(
|
||||||
getActivity(), packageName, UserHandle.myUserId());
|
getActivity(), packageName, UserHandle.myUserId());
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
preference.setDisabledByAdmin(admin);
|
preference.setDisabledByAdmin(admin);
|
||||||
|
@@ -19,7 +19,7 @@ import android.annotation.UserIdInt;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import com.android.settings.AccessiblePreferenceCategory;
|
import com.android.settings.AccessiblePreferenceCategory;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
@@ -51,7 +51,8 @@ public class AccountRestrictionHelper {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public boolean hasBaseUserRestriction(String userRestriction, @UserIdInt int userId) {
|
public boolean hasBaseUserRestriction(String userRestriction, @UserIdInt int userId) {
|
||||||
return RestrictedLockUtils.hasBaseUserRestriction(mContext, userRestriction, userId);
|
return RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext, userRestriction,
|
||||||
|
userId);
|
||||||
}
|
}
|
||||||
|
|
||||||
public AccessiblePreferenceCategory createAccessiblePreferenceCategory(Context context) {
|
public AccessiblePreferenceCategory createAccessiblePreferenceCategory(Context context) {
|
||||||
|
@@ -39,6 +39,7 @@ import androidx.preference.PreferenceScreen;
|
|||||||
|
|
||||||
import com.android.settings.core.BasePreferenceController;
|
import com.android.settings.core.BasePreferenceController;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import com.google.android.collect.Maps;
|
import com.google.android.collect.Maps;
|
||||||
|
|
||||||
@@ -167,7 +168,7 @@ public class ChooseAccountPreferenceController extends BasePreferenceController
|
|||||||
// There's only one provider that matches. If it is disabled by admin show the
|
// There's only one provider that matches. If it is disabled by admin show the
|
||||||
// support dialog otherwise run it.
|
// support dialog otherwise run it.
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin =
|
final RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfAccountManagementDisabled(
|
RestrictedLockUtilsInternal.checkIfAccountManagementDisabled(
|
||||||
context, mProviderList.get(0).getType(), mUserHandle.getIdentifier());
|
context, mProviderList.get(0).getType(), mUserHandle.getIdentifier());
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
mActivity.setResult(RESULT_CANCELED,
|
mActivity.setResult(RESULT_CANCELED,
|
||||||
|
@@ -24,6 +24,7 @@ import androidx.preference.Preference;
|
|||||||
import com.android.settings.core.BasePreferenceController;
|
import com.android.settings.core.BasePreferenceController;
|
||||||
import com.android.settings.slices.SliceData;
|
import com.android.settings.slices.SliceData;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
|
|
||||||
public class ContactSearchPreferenceController extends BasePreferenceController implements
|
public class ContactSearchPreferenceController extends BasePreferenceController implements
|
||||||
@@ -52,7 +53,7 @@ public class ContactSearchPreferenceController extends BasePreferenceController
|
|||||||
pref.setChecked(isChecked());
|
pref.setChecked(isChecked());
|
||||||
if (mManagedUser != null) {
|
if (mManagedUser != null) {
|
||||||
final RestrictedLockUtils.EnforcedAdmin enforcedAdmin =
|
final RestrictedLockUtils.EnforcedAdmin enforcedAdmin =
|
||||||
RestrictedLockUtils.checkIfRemoteContactSearchDisallowed(
|
RestrictedLockUtilsInternal.checkIfRemoteContactSearchDisallowed(
|
||||||
mContext, mManagedUser.getIdentifier());
|
mContext, mManagedUser.getIdentifier());
|
||||||
pref.setDisabledByAdmin(enforcedAdmin);
|
pref.setDisabledByAdmin(enforcedAdmin);
|
||||||
}
|
}
|
||||||
|
@@ -21,7 +21,7 @@ import static com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.graphics.drawable.Drawable;
|
import android.graphics.drawable.Drawable;
|
||||||
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -47,7 +47,7 @@ public class ProviderPreference extends RestrictedPreference {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void checkAccountManagementAndSetDisabled(int userId) {
|
public void checkAccountManagementAndSetDisabled(int userId) {
|
||||||
EnforcedAdmin admin = RestrictedLockUtils.checkIfAccountManagementDisabled(
|
EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfAccountManagementDisabled(
|
||||||
getContext(), getAccountType(), userId);
|
getContext(), getAccountType(), userId);
|
||||||
setDisabledByAdmin(admin);
|
setDisabledByAdmin(admin);
|
||||||
}
|
}
|
||||||
|
@@ -44,6 +44,7 @@ import com.android.settings.core.PreferenceControllerMixin;
|
|||||||
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
@@ -84,8 +85,8 @@ public class RemoveAccountPreferenceController extends AbstractPreferenceControl
|
|||||||
@Override
|
@Override
|
||||||
public void onClick(View v) {
|
public void onClick(View v) {
|
||||||
if (mUserHandle != null) {
|
if (mUserHandle != null) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext,
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
UserManager.DISALLOW_MODIFY_ACCOUNTS, mUserHandle.getIdentifier());
|
mContext, UserManager.DISALLOW_MODIFY_ACCOUNTS, mUserHandle.getIdentifier());
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mContext, admin);
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mContext, admin);
|
||||||
return;
|
return;
|
||||||
|
@@ -48,7 +48,7 @@ import com.android.settings.applications.manageapplications.ManageApplications;
|
|||||||
import com.android.settings.core.SubSettingLauncher;
|
import com.android.settings.core.SubSettingLauncher;
|
||||||
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.applications.ApplicationsState;
|
import com.android.settingslib.applications.ApplicationsState;
|
||||||
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
||||||
|
|
||||||
@@ -107,10 +107,10 @@ public abstract class AppInfoBase extends SettingsPreferenceFragment
|
|||||||
@Override
|
@Override
|
||||||
public void onResume() {
|
public void onResume() {
|
||||||
super.onResume();
|
super.onResume();
|
||||||
mAppsControlDisallowedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(getActivity(),
|
mAppsControlDisallowedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
getActivity(), UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
mAppsControlDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(getActivity(),
|
mAppsControlDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
getActivity(), UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
|
|
||||||
if (!refreshUi()) {
|
if (!refreshUi()) {
|
||||||
setIntentAndFinish(true, true);
|
setIntentAndFinish(true, true);
|
||||||
|
@@ -55,6 +55,7 @@ import com.android.settings.core.PreferenceControllerMixin;
|
|||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settings.widget.ActionButtonPreference;
|
import com.android.settings.widget.ActionButtonPreference;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.applications.AppUtils;
|
import com.android.settingslib.applications.AppUtils;
|
||||||
import com.android.settingslib.applications.ApplicationsState;
|
import com.android.settingslib.applications.ApplicationsState;
|
||||||
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
||||||
@@ -181,10 +182,10 @@ public class AppButtonsPreferenceController extends BasePreferenceController imp
|
|||||||
@Override
|
@Override
|
||||||
public void onResume() {
|
public void onResume() {
|
||||||
if (isAvailable() && !mFinishing) {
|
if (isAvailable() && !mFinishing) {
|
||||||
mAppsControlDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(mActivity,
|
mAppsControlDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
mActivity, UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
mAppsControlDisallowedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(mActivity,
|
mAppsControlDisallowedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
mActivity, UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
|
|
||||||
if (!refreshUi()) {
|
if (!refreshUi()) {
|
||||||
setIntentAndFinish(true);
|
setIntentAndFinish(true);
|
||||||
@@ -214,10 +215,11 @@ public class AppButtonsPreferenceController extends BasePreferenceController imp
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
RestrictedLockUtils.EnforcedAdmin admin =
|
RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfUninstallBlocked(mActivity,
|
RestrictedLockUtilsInternal.checkIfUninstallBlocked(mActivity,
|
||||||
packageName, mUserId);
|
packageName, mUserId);
|
||||||
boolean uninstallBlockedBySystem = mAppsControlDisallowedBySystem ||
|
boolean uninstallBlockedBySystem = mAppsControlDisallowedBySystem ||
|
||||||
RestrictedLockUtils.hasBaseUserRestriction(mActivity, packageName, mUserId);
|
RestrictedLockUtilsInternal.hasBaseUserRestriction(mActivity, packageName,
|
||||||
|
mUserId);
|
||||||
if (admin != null && !uninstallBlockedBySystem) {
|
if (admin != null && !uninstallBlockedBySystem) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mActivity, admin);
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mActivity, admin);
|
||||||
} else if ((mAppEntry.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
|
} else if ((mAppEntry.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0) {
|
||||||
|
@@ -50,7 +50,7 @@ import com.android.settings.applications.specialaccess.pictureinpicture
|
|||||||
.PictureInPictureDetailPreferenceController;
|
.PictureInPictureDetailPreferenceController;
|
||||||
import com.android.settings.core.SubSettingLauncher;
|
import com.android.settings.core.SubSettingLauncher;
|
||||||
import com.android.settings.dashboard.DashboardFragment;
|
import com.android.settings.dashboard.DashboardFragment;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.applications.AppUtils;
|
import com.android.settingslib.applications.AppUtils;
|
||||||
import com.android.settingslib.applications.ApplicationsState;
|
import com.android.settingslib.applications.ApplicationsState;
|
||||||
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
||||||
@@ -210,10 +210,10 @@ public class AppInfoDashboardFragment extends DashboardFragment
|
|||||||
public void onResume() {
|
public void onResume() {
|
||||||
super.onResume();
|
super.onResume();
|
||||||
final Activity activity = getActivity();
|
final Activity activity = getActivity();
|
||||||
mAppsControlDisallowedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(activity,
|
mAppsControlDisallowedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
activity, UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
mAppsControlDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(activity,
|
mAppsControlDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
activity, UserManager.DISALLOW_APPS_CONTROL, mUserId);
|
||||||
|
|
||||||
if (!refreshUi()) {
|
if (!refreshUi()) {
|
||||||
setIntentAndFinish(true, true);
|
setIntentAndFinish(true, true);
|
||||||
@@ -338,7 +338,7 @@ public class AppInfoDashboardFragment extends DashboardFragment
|
|||||||
&& !mAppsControlDisallowedBySystem
|
&& !mAppsControlDisallowedBySystem
|
||||||
&& !uninstallUpdateDisabled);
|
&& !uninstallUpdateDisabled);
|
||||||
if (uninstallUpdatesItem.isVisible()) {
|
if (uninstallUpdatesItem.isVisible()) {
|
||||||
RestrictedLockUtils.setMenuItemAsDisabledByAdmin(getActivity(),
|
RestrictedLockUtilsInternal.setMenuItemAsDisabledByAdmin(getActivity(),
|
||||||
uninstallUpdatesItem, mAppsControlDisallowedAdmin);
|
uninstallUpdatesItem, mAppsControlDisallowedAdmin);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -67,6 +67,7 @@ import com.android.settings.overlay.FeatureFactory;
|
|||||||
import com.android.settings.users.UserDialogs;
|
import com.android.settings.users.UserDialogs;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import org.xmlpull.v1.XmlPullParserException;
|
import org.xmlpull.v1.XmlPullParserException;
|
||||||
|
|
||||||
@@ -645,12 +646,12 @@ public class DeviceAdminAdd extends Activity {
|
|||||||
private EnforcedAdmin getAdminEnforcingCantRemoveProfile() {
|
private EnforcedAdmin getAdminEnforcingCantRemoveProfile() {
|
||||||
// Removing a managed profile is disallowed if DISALLOW_REMOVE_MANAGED_PROFILE
|
// Removing a managed profile is disallowed if DISALLOW_REMOVE_MANAGED_PROFILE
|
||||||
// is set in the parent rather than the user itself.
|
// is set in the parent rather than the user itself.
|
||||||
return RestrictedLockUtils.checkIfRestrictionEnforced(this,
|
return RestrictedLockUtilsInternal.checkIfRestrictionEnforced(this,
|
||||||
UserManager.DISALLOW_REMOVE_MANAGED_PROFILE, getParentUserId());
|
UserManager.DISALLOW_REMOVE_MANAGED_PROFILE, getParentUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
private boolean hasBaseCantRemoveProfileRestriction() {
|
private boolean hasBaseCantRemoveProfileRestriction() {
|
||||||
return RestrictedLockUtils.hasBaseUserRestriction(this,
|
return RestrictedLockUtilsInternal.hasBaseUserRestriction(this,
|
||||||
UserManager.DISALLOW_REMOVE_MANAGED_PROFILE, getParentUserId());
|
UserManager.DISALLOW_REMOVE_MANAGED_PROFILE, getParentUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -28,7 +28,7 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.Utils;
|
import com.android.settings.Utils;
|
||||||
import com.android.settings.biometrics.BiometricEnrollIntroduction;
|
import com.android.settings.biometrics.BiometricEnrollIntroduction;
|
||||||
import com.android.settings.password.ChooseLockSettingsHelper;
|
import com.android.settings.password.ChooseLockSettingsHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.setupwizardlib.span.LinkSpan;
|
import com.android.setupwizardlib.span.LinkSpan;
|
||||||
|
|
||||||
public class FaceEnrollIntroduction extends BiometricEnrollIntroduction {
|
public class FaceEnrollIntroduction extends BiometricEnrollIntroduction {
|
||||||
@@ -45,7 +45,7 @@ public class FaceEnrollIntroduction extends BiometricEnrollIntroduction {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean isDisabledByAdmin() {
|
protected boolean isDisabledByAdmin() {
|
||||||
return RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
return RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
this, DevicePolicyManager.KEYGUARD_DISABLE_FACE, mUserId) != null;
|
this, DevicePolicyManager.KEYGUARD_DISABLE_FACE, mUserId) != null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -31,7 +31,7 @@ import com.android.settings.Utils;
|
|||||||
import com.android.settings.biometrics.BiometricEnrollIntroduction;
|
import com.android.settings.biometrics.BiometricEnrollIntroduction;
|
||||||
import com.android.settings.password.ChooseLockSettingsHelper;
|
import com.android.settings.password.ChooseLockSettingsHelper;
|
||||||
import com.android.settingslib.HelpUtils;
|
import com.android.settingslib.HelpUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.setupwizardlib.span.LinkSpan;
|
import com.android.setupwizardlib.span.LinkSpan;
|
||||||
|
|
||||||
public class FingerprintEnrollIntroduction extends BiometricEnrollIntroduction {
|
public class FingerprintEnrollIntroduction extends BiometricEnrollIntroduction {
|
||||||
@@ -48,7 +48,7 @@ public class FingerprintEnrollIntroduction extends BiometricEnrollIntroduction {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected boolean isDisabledByAdmin() {
|
protected boolean isDisabledByAdmin() {
|
||||||
return RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
return RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
this, DevicePolicyManager.KEYGUARD_DISABLE_FINGERPRINT, mUserId) != null;
|
this, DevicePolicyManager.KEYGUARD_DISABLE_FINGERPRINT, mUserId) != null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -58,6 +58,7 @@ import com.android.settings.utils.AnnotationSpan;
|
|||||||
import com.android.settingslib.HelpUtils;
|
import com.android.settingslib.HelpUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.TwoTargetPreference;
|
import com.android.settingslib.TwoTargetPreference;
|
||||||
import com.android.settingslib.widget.FooterPreference;
|
import com.android.settingslib.widget.FooterPreference;
|
||||||
|
|
||||||
@@ -319,7 +320,7 @@ public class FingerprintSettings extends SubSettings {
|
|||||||
}
|
}
|
||||||
|
|
||||||
final FooterPreference pref = mFooterPreferenceMixin.createFooterPreference();
|
final FooterPreference pref = mFooterPreferenceMixin.createFooterPreference();
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
activity, DevicePolicyManager.KEYGUARD_DISABLE_FINGERPRINT, mUserId);
|
activity, DevicePolicyManager.KEYGUARD_DISABLE_FINGERPRINT, mUserId);
|
||||||
final AnnotationSpan.LinkInfo adminLinkInfo = new AnnotationSpan.LinkInfo(
|
final AnnotationSpan.LinkInfo adminLinkInfo = new AnnotationSpan.LinkInfo(
|
||||||
ANNOTATION_ADMIN_DETAILS, (view) -> {
|
ANNOTATION_ADMIN_DETAILS, (view) -> {
|
||||||
|
@@ -19,8 +19,8 @@ package com.android.settings.bluetooth;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.os.UserHandle;
|
import android.os.UserHandle;
|
||||||
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A utility class to aid testing.
|
* A utility class to aid testing.
|
||||||
@@ -36,7 +36,7 @@ public class RestrictionUtils {
|
|||||||
* API.
|
* API.
|
||||||
*/
|
*/
|
||||||
public EnforcedAdmin checkIfRestrictionEnforced(Context context, String restriction) {
|
public EnforcedAdmin checkIfRestrictionEnforced(Context context, String restriction) {
|
||||||
return RestrictedLockUtils.checkIfRestrictionEnforced(
|
return RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
context, restriction, UserHandle.myUserId());
|
context, restriction, UserHandle.myUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -36,7 +36,7 @@ import androidx.appcompat.app.AlertDialog;
|
|||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.RestrictedSettingsFragment;
|
import com.android.settings.RestrictedSettingsFragment;
|
||||||
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Base class for settings screens that should be pin protected when in restricted mode or
|
* Base class for settings screens that should be pin protected when in restricted mode or
|
||||||
@@ -213,7 +213,7 @@ public abstract class RestrictedDashboardFragment extends DashboardFragment {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public EnforcedAdmin getRestrictionEnforcedAdmin() {
|
public EnforcedAdmin getRestrictionEnforcedAdmin() {
|
||||||
mEnforcedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(getActivity(),
|
mEnforcedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(getActivity(),
|
||||||
mRestrictionKey, UserHandle.myUserId());
|
mRestrictionKey, UserHandle.myUserId());
|
||||||
if (mEnforcedAdmin != null && mEnforcedAdmin.userId == UserHandle.USER_NULL) {
|
if (mEnforcedAdmin != null && mEnforcedAdmin.userId == UserHandle.USER_NULL) {
|
||||||
mEnforcedAdmin.userId = UserHandle.myUserId();
|
mEnforcedAdmin.userId = UserHandle.myUserId();
|
||||||
|
@@ -48,8 +48,8 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.applications.AppInfoBase;
|
import com.android.settings.applications.AppInfoBase;
|
||||||
import com.android.settings.widget.EntityHeaderController;
|
import com.android.settings.widget.EntityHeaderController;
|
||||||
import com.android.settingslib.AppItem;
|
import com.android.settingslib.AppItem;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.net.ChartData;
|
import com.android.settingslib.net.ChartData;
|
||||||
import com.android.settingslib.net.ChartDataLoaderCompat;
|
import com.android.settingslib.net.ChartDataLoaderCompat;
|
||||||
@@ -274,7 +274,7 @@ public class AppDataUsage extends DataUsageBaseFragment implements OnPreferenceC
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void updatePrefs(boolean restrictBackground, boolean unrestrictData) {
|
private void updatePrefs(boolean restrictBackground, boolean unrestrictData) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfMeteredDataRestricted(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfMeteredDataRestricted(
|
||||||
getContext(), mPackageName, UserHandle.getUserId(mAppItem.key));
|
getContext(), mPackageName, UserHandle.getUserId(mAppItem.key));
|
||||||
if (mRestrictBackground != null) {
|
if (mRestrictBackground != null) {
|
||||||
mRestrictBackground.setChecked(!restrictBackground);
|
mRestrictBackground.setChecked(!restrictBackground);
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
*/
|
*/
|
||||||
package com.android.settings.datausage;
|
package com.android.settings.datausage;
|
||||||
|
|
||||||
import static com.android.settingslib.RestrictedLockUtils.checkIfMeteredDataRestricted;
|
import static com.android.settingslib.RestrictedLockUtilsInternal.checkIfMeteredDataRestricted;
|
||||||
|
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
import android.os.UserHandle;
|
import android.os.UserHandle;
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
*/
|
*/
|
||||||
package com.android.settings.datausage;
|
package com.android.settings.datausage;
|
||||||
|
|
||||||
import static com.android.settingslib.RestrictedLockUtils.checkIfMeteredDataRestricted;
|
import static com.android.settingslib.RestrictedLockUtilsInternal.checkIfMeteredDataRestricted;
|
||||||
|
|
||||||
import android.app.Application;
|
import android.app.Application;
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
@@ -23,6 +23,7 @@ import androidx.preference.Preference;
|
|||||||
|
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
@@ -74,6 +75,6 @@ public class AutoTimePreferenceController extends AbstractPreferenceController
|
|||||||
}
|
}
|
||||||
|
|
||||||
private RestrictedLockUtils.EnforcedAdmin getEnforcedAdminProperty() {
|
private RestrictedLockUtils.EnforcedAdmin getEnforcedAdminProperty() {
|
||||||
return RestrictedLockUtils.checkIfAutoTimeRequired(mContext);
|
return RestrictedLockUtilsInternal.checkIfAutoTimeRequired(mContext);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -30,6 +30,7 @@ import androidx.preference.PreferenceScreen;
|
|||||||
|
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.core.lifecycle.Lifecycle;
|
import com.android.settingslib.core.lifecycle.Lifecycle;
|
||||||
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
||||||
@@ -130,7 +131,7 @@ public class StayAwakePreferenceController extends DeveloperOptionsPreferenceCon
|
|||||||
// will lock... in this case we can't allow the user to turn
|
// will lock... in this case we can't allow the user to turn
|
||||||
// on "stay awake when plugged in" because that would defeat the
|
// on "stay awake when plugged in" because that would defeat the
|
||||||
// restriction.
|
// restriction.
|
||||||
return RestrictedLockUtils.checkIfMaximumTimeToLockIsSet(mContext);
|
return RestrictedLockUtilsInternal.checkIfMaximumTimeToLockIsSet(mContext);
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
|
@@ -28,8 +28,8 @@ import androidx.annotation.VisibleForTesting;
|
|||||||
import androidx.preference.Preference;
|
import androidx.preference.Preference;
|
||||||
|
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.development.DeveloperOptionsPreferenceController;
|
import com.android.settingslib.development.DeveloperOptionsPreferenceController;
|
||||||
|
|
||||||
@@ -57,7 +57,8 @@ public class VerifyAppsOverUsbPreferenceController extends DeveloperOptionsPrefe
|
|||||||
class RestrictedLockUtilsDelegate {
|
class RestrictedLockUtilsDelegate {
|
||||||
public EnforcedAdmin checkIfRestrictionEnforced(
|
public EnforcedAdmin checkIfRestrictionEnforced(
|
||||||
Context context, String userRestriction, int userId) {
|
Context context, String userRestriction, int userId) {
|
||||||
return RestrictedLockUtils.checkIfRestrictionEnforced(context, userRestriction, userId);
|
return RestrictedLockUtilsInternal.checkIfRestrictionEnforced(context, userRestriction,
|
||||||
|
userId);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -40,6 +40,7 @@ import com.android.settings.core.PreferenceControllerMixin;
|
|||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settings.password.ChooseLockSettingsHelper;
|
import com.android.settings.password.ChooseLockSettingsHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
||||||
import com.android.settingslib.core.lifecycle.Lifecycle;
|
import com.android.settingslib.core.lifecycle.Lifecycle;
|
||||||
@@ -104,9 +105,9 @@ public class BuildNumberPreferenceController extends AbstractPreferenceControlle
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void onResume() {
|
public void onResume() {
|
||||||
mDebuggingFeaturesDisallowedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
mDebuggingFeaturesDisallowedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mContext, UserManager.DISALLOW_DEBUGGING_FEATURES, UserHandle.myUserId());
|
mContext, UserManager.DISALLOW_DEBUGGING_FEATURES, UserHandle.myUserId());
|
||||||
mDebuggingFeaturesDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(
|
mDebuggingFeaturesDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
mContext, UserManager.DISALLOW_DEBUGGING_FEATURES, UserHandle.myUserId());
|
mContext, UserManager.DISALLOW_DEBUGGING_FEATURES, UserHandle.myUserId());
|
||||||
mDevHitCountdown = DevelopmentSettingsEnabler.isDevelopmentSettingsEnabled(mContext)
|
mDevHitCountdown = DevelopmentSettingsEnabler.isDevelopmentSettingsEnabled(mContext)
|
||||||
? -1 : TAPS_TO_BE_A_DEVELOPER;
|
? -1 : TAPS_TO_BE_A_DEVELOPER;
|
||||||
|
@@ -56,6 +56,7 @@ import com.android.settings.search.BaseSearchIndexProvider;
|
|||||||
import com.android.settings.search.Indexable;
|
import com.android.settings.search.Indexable;
|
||||||
import com.android.settings.search.SearchIndexableRaw;
|
import com.android.settings.search.SearchIndexableRaw;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.deviceinfo.PrivateStorageInfo;
|
import com.android.settingslib.deviceinfo.PrivateStorageInfo;
|
||||||
import com.android.settingslib.deviceinfo.StorageManagerVolumeProvider;
|
import com.android.settingslib.deviceinfo.StorageManagerVolumeProvider;
|
||||||
import com.android.settingslib.search.SearchIndexable;
|
import com.android.settingslib.search.SearchIndexable;
|
||||||
@@ -460,10 +461,11 @@ public class StorageSettings extends SettingsPreferenceFragment implements Index
|
|||||||
* @return {@code true} iff a intent was shown.
|
* @return {@code true} iff a intent was shown.
|
||||||
*/
|
*/
|
||||||
private boolean wasAdminSupportIntentShown(@NonNull String restriction) {
|
private boolean wasAdminSupportIntentShown(@NonNull String restriction) {
|
||||||
EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
EnforcedAdmin admin = RestrictedLockUtilsInternal
|
||||||
getActivity(), restriction, UserHandle.myUserId());
|
.checkIfRestrictionEnforced(getActivity(), restriction,
|
||||||
|
UserHandle.myUserId());
|
||||||
boolean hasBaseUserRestriction =
|
boolean hasBaseUserRestriction =
|
||||||
RestrictedLockUtils.hasBaseUserRestriction(
|
RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
getActivity(), restriction, UserHandle.myUserId());
|
getActivity(), restriction, UserHandle.myUserId());
|
||||||
if (admin != null && !hasBaseUserRestriction) {
|
if (admin != null && !hasBaseUserRestriction) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(),
|
||||||
|
@@ -29,6 +29,7 @@ import androidx.annotation.VisibleForTesting;
|
|||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class FirmwareVersionDialogController implements View.OnClickListener {
|
public class FirmwareVersionDialogController implements View.OnClickListener {
|
||||||
|
|
||||||
@@ -105,9 +106,9 @@ public class FirmwareVersionDialogController implements View.OnClickListener {
|
|||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
void initializeAdminPermissions() {
|
void initializeAdminPermissions() {
|
||||||
mFunDisallowedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
mFunDisallowedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mContext, UserManager.DISALLOW_FUN, UserHandle.myUserId());
|
mContext, UserManager.DISALLOW_FUN, UserHandle.myUserId());
|
||||||
mFunDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(
|
mFunDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
mContext, UserManager.DISALLOW_FUN, UserHandle.myUserId());
|
mContext, UserManager.DISALLOW_FUN, UserHandle.myUserId());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -28,6 +28,7 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
public class TimeoutPreferenceController extends AbstractPreferenceController implements
|
public class TimeoutPreferenceController extends AbstractPreferenceController implements
|
||||||
@@ -65,7 +66,7 @@ public class TimeoutPreferenceController extends AbstractPreferenceController im
|
|||||||
(DevicePolicyManager) mContext.getSystemService(Context.DEVICE_POLICY_SERVICE);
|
(DevicePolicyManager) mContext.getSystemService(Context.DEVICE_POLICY_SERVICE);
|
||||||
if (dpm != null) {
|
if (dpm != null) {
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin =
|
final RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfMaximumTimeToLockIsSet(mContext);
|
RestrictedLockUtilsInternal.checkIfMaximumTimeToLockIsSet(mContext);
|
||||||
final long maxTimeout =
|
final long maxTimeout =
|
||||||
dpm.getMaximumTimeToLock(null /* admin */, UserHandle.myUserId());
|
dpm.getMaximumTimeToLock(null /* admin */, UserHandle.myUserId());
|
||||||
timeoutListPreference.removeUnusableTimeouts(maxTimeout, admin);
|
timeoutListPreference.removeUnusableTimeouts(maxTimeout, admin);
|
||||||
@@ -73,7 +74,7 @@ public class TimeoutPreferenceController extends AbstractPreferenceController im
|
|||||||
updateTimeoutPreferenceDescription(timeoutListPreference,
|
updateTimeoutPreferenceDescription(timeoutListPreference,
|
||||||
Long.parseLong(timeoutListPreference.getValue()));
|
Long.parseLong(timeoutListPreference.getValue()));
|
||||||
|
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mContext, UserManager.DISALLOW_CONFIG_SCREEN_TIMEOUT,
|
mContext, UserManager.DISALLOW_CONFIG_SCREEN_TIMEOUT,
|
||||||
UserHandle.myUserId());
|
UserHandle.myUserId());
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
|
@@ -28,7 +28,7 @@ import androidx.preference.Preference;
|
|||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
@@ -80,7 +80,7 @@ public class WallpaperPreferenceController extends AbstractPreferenceController
|
|||||||
final String restriction = DISALLOW_SET_WALLPAPER;
|
final String restriction = DISALLOW_SET_WALLPAPER;
|
||||||
if (pref != null) {
|
if (pref != null) {
|
||||||
pref.setDisabledByAdmin(null);
|
pref.setDisabledByAdmin(null);
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
restriction, UserHandle.myUserId())) {
|
restriction, UserHandle.myUserId())) {
|
||||||
pref.setEnabled(false);
|
pref.setEnabled(false);
|
||||||
} else {
|
} else {
|
||||||
|
@@ -41,6 +41,7 @@ import com.android.settings.Utils;
|
|||||||
import com.android.settings.applications.specialaccess.deviceadmin.DeviceAdminAdd;
|
import com.android.settings.applications.specialaccess.deviceadmin.DeviceAdminAdd;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.Objects;
|
import java.util.Objects;
|
||||||
|
|
||||||
@@ -94,7 +95,7 @@ public class ActionDisabledByAdminDialogHelper {
|
|||||||
if (admin == null) {
|
if (admin == null) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
if (!RestrictedLockUtils.isAdminInCurrentUserOrProfile(mActivity, admin)
|
if (!RestrictedLockUtilsInternal.isAdminInCurrentUserOrProfile(mActivity, admin)
|
||||||
|| !RestrictedLockUtils.isCurrentUserOrProfile(mActivity, userId)) {
|
|| !RestrictedLockUtils.isCurrentUserOrProfile(mActivity, userId)) {
|
||||||
admin = null;
|
admin = null;
|
||||||
} else {
|
} else {
|
||||||
@@ -156,7 +157,7 @@ public class ActionDisabledByAdminDialogHelper {
|
|||||||
}
|
}
|
||||||
final DevicePolicyManager dpm = (DevicePolicyManager) activity.getSystemService(
|
final DevicePolicyManager dpm = (DevicePolicyManager) activity.getSystemService(
|
||||||
Context.DEVICE_POLICY_SERVICE);
|
Context.DEVICE_POLICY_SERVICE);
|
||||||
if (!RestrictedLockUtils.isAdminInCurrentUserOrProfile(activity,
|
if (!RestrictedLockUtilsInternal.isAdminInCurrentUserOrProfile(activity,
|
||||||
enforcedAdmin.component) || !RestrictedLockUtils.isCurrentUserOrProfile(
|
enforcedAdmin.component) || !RestrictedLockUtils.isCurrentUserOrProfile(
|
||||||
activity, enforcedAdmin.userId)) {
|
activity, enforcedAdmin.userId)) {
|
||||||
enforcedAdmin.component = null;
|
enforcedAdmin.component = null;
|
||||||
|
@@ -23,7 +23,7 @@ import android.os.UserManager;
|
|||||||
|
|
||||||
import com.android.internal.logging.nano.MetricsProto;
|
import com.android.internal.logging.nano.MetricsProto;
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class HotspotConditionCard implements ConditionalCard {
|
public class HotspotConditionCard implements ConditionalCard {
|
||||||
|
|
||||||
@@ -42,7 +42,7 @@ public class HotspotConditionCard implements ConditionalCard {
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public CharSequence getActionText() {
|
public CharSequence getActionText() {
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(mAppContext,
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(mAppContext,
|
||||||
UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId())) {
|
UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId())) {
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
@@ -31,6 +31,7 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.TetherSettings;
|
import com.android.settings.TetherSettings;
|
||||||
import com.android.settings.core.SubSettingLauncher;
|
import com.android.settings.core.SubSettingLauncher;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.Objects;
|
import java.util.Objects;
|
||||||
|
|
||||||
@@ -75,7 +76,7 @@ public class HotspotConditionController implements ConditionalCardController {
|
|||||||
@Override
|
@Override
|
||||||
public void onActionClick() {
|
public void onActionClick() {
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin =
|
final RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfRestrictionEnforced(
|
RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mAppContext, UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId());
|
mAppContext, UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId());
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mAppContext, admin);
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(mAppContext, admin);
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
*/
|
*/
|
||||||
package com.android.settings.location;
|
package com.android.settings.location;
|
||||||
|
|
||||||
import static com.android.settingslib.RestrictedLockUtils.checkIfRestrictionEnforced;
|
import static com.android.settingslib.RestrictedLockUtilsInternal.checkIfRestrictionEnforced;
|
||||||
import static com.android.settingslib.Utils.updateLocationEnabled;
|
import static com.android.settingslib.Utils.updateLocationEnabled;
|
||||||
import static com.android.settingslib.Utils.updateLocationMode;
|
import static com.android.settingslib.Utils.updateLocationMode;
|
||||||
|
|
||||||
@@ -32,6 +32,7 @@ import androidx.annotation.VisibleForTesting;
|
|||||||
|
|
||||||
import com.android.settings.Utils;
|
import com.android.settings.Utils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.lifecycle.Lifecycle;
|
import com.android.settingslib.core.lifecycle.Lifecycle;
|
||||||
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
||||||
import com.android.settingslib.core.lifecycle.events.OnPause;
|
import com.android.settingslib.core.lifecycle.events.OnPause;
|
||||||
@@ -168,14 +169,14 @@ public class LocationEnabler implements LifecycleObserver, OnResume, OnPause {
|
|||||||
mContext, UserManager.DISALLOW_SHARE_LOCATION, userId);
|
mContext, UserManager.DISALLOW_SHARE_LOCATION, userId);
|
||||||
|
|
||||||
if (admin == null) {
|
if (admin == null) {
|
||||||
admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mContext, UserManager.DISALLOW_CONFIG_LOCATION, userId);
|
mContext, UserManager.DISALLOW_CONFIG_LOCATION, userId);
|
||||||
}
|
}
|
||||||
return admin;
|
return admin;
|
||||||
}
|
}
|
||||||
|
|
||||||
boolean hasShareLocationRestriction(int userId) {
|
boolean hasShareLocationRestriction(int userId) {
|
||||||
return RestrictedLockUtils.hasBaseUserRestriction(
|
return RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
mContext, UserManager.DISALLOW_SHARE_LOCATION, userId);
|
mContext, UserManager.DISALLOW_SHARE_LOCATION, userId);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -36,7 +36,7 @@ import androidx.preference.PreferenceScreen;
|
|||||||
|
|
||||||
import com.android.settings.core.FeatureFlags;
|
import com.android.settings.core.FeatureFlags;
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.Utils;
|
import com.android.settingslib.Utils;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
@@ -84,7 +84,7 @@ public class MobileNetworkPreferenceController extends AbstractPreferenceControl
|
|||||||
|
|
||||||
public boolean isUserRestricted() {
|
public boolean isUserRestricted() {
|
||||||
return mIsSecondaryUser ||
|
return mIsSecondaryUser ||
|
||||||
RestrictedLockUtils.hasBaseUserRestriction(
|
RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
mContext,
|
mContext,
|
||||||
DISALLOW_CONFIG_MOBILE_NETWORKS,
|
DISALLOW_CONFIG_MOBILE_NETWORKS,
|
||||||
myUserId());
|
myUserId());
|
||||||
|
@@ -20,7 +20,7 @@ import static android.content.Intent.FLAG_ACTIVITY_NEW_TASK;
|
|||||||
import static android.os.UserHandle.myUserId;
|
import static android.os.UserHandle.myUserId;
|
||||||
import static android.os.UserManager.DISALLOW_CONFIG_MOBILE_NETWORKS;
|
import static android.os.UserManager.DISALLOW_CONFIG_MOBILE_NETWORKS;
|
||||||
|
|
||||||
import static com.android.settingslib.RestrictedLockUtils.hasBaseUserRestriction;
|
import static com.android.settingslib.RestrictedLockUtilsInternal.hasBaseUserRestriction;
|
||||||
|
|
||||||
import android.content.ActivityNotFoundException;
|
import android.content.ActivityNotFoundException;
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
@@ -22,7 +22,7 @@ import android.os.UserManager;
|
|||||||
|
|
||||||
import androidx.annotation.VisibleForTesting;
|
import androidx.annotation.VisibleForTesting;
|
||||||
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class NetworkResetRestrictionChecker {
|
public class NetworkResetRestrictionChecker {
|
||||||
|
|
||||||
@@ -36,13 +36,13 @@ public class NetworkResetRestrictionChecker {
|
|||||||
|
|
||||||
@VisibleForTesting(otherwise = VisibleForTesting.PRIVATE)
|
@VisibleForTesting(otherwise = VisibleForTesting.PRIVATE)
|
||||||
boolean hasUserBaseRestriction() {
|
boolean hasUserBaseRestriction() {
|
||||||
return RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
return RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting(otherwise = VisibleForTesting.PRIVATE)
|
@VisibleForTesting(otherwise = VisibleForTesting.PRIVATE)
|
||||||
boolean isRestrictionEnforcedByAdmin() {
|
boolean isRestrictionEnforcedByAdmin() {
|
||||||
return RestrictedLockUtils.checkIfRestrictionEnforced(
|
return RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
mContext, UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId()) != null;
|
mContext, UserManager.DISALLOW_NETWORK_RESET, UserHandle.myUserId()) != null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -17,7 +17,7 @@ package com.android.settings.network;
|
|||||||
|
|
||||||
import static android.os.UserManager.DISALLOW_CONFIG_TETHERING;
|
import static android.os.UserManager.DISALLOW_CONFIG_TETHERING;
|
||||||
|
|
||||||
import static com.android.settingslib.RestrictedLockUtils.checkIfRestrictionEnforced;
|
import static com.android.settingslib.RestrictedLockUtilsInternal.checkIfRestrictionEnforced;
|
||||||
|
|
||||||
import android.bluetooth.BluetoothAdapter;
|
import android.bluetooth.BluetoothAdapter;
|
||||||
import android.bluetooth.BluetoothPan;
|
import android.bluetooth.BluetoothPan;
|
||||||
|
@@ -40,7 +40,7 @@ import com.android.internal.net.LegacyVpnInfo;
|
|||||||
import com.android.internal.net.VpnConfig;
|
import com.android.internal.net.VpnConfig;
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
||||||
import com.android.settingslib.core.lifecycle.events.OnPause;
|
import com.android.settingslib.core.lifecycle.events.OnPause;
|
||||||
@@ -92,7 +92,7 @@ public class VpnPreferenceController extends AbstractPreferenceController
|
|||||||
|
|
||||||
@Override
|
@Override
|
||||||
public boolean isAvailable() {
|
public boolean isAvailable() {
|
||||||
return !RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
return !RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
UserManager.DISALLOW_CONFIG_VPN, UserHandle.myUserId());
|
UserManager.DISALLOW_CONFIG_VPN, UserHandle.myUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -38,7 +38,7 @@ import com.android.settings.core.InstrumentedFragment;
|
|||||||
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
import com.android.settings.enterprise.ActionDisabledByAdminDialogHelper;
|
||||||
import com.android.settings.widget.SwitchBar;
|
import com.android.settings.widget.SwitchBar;
|
||||||
import com.android.settingslib.HelpUtils;
|
import com.android.settingslib.HelpUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class AndroidBeam extends InstrumentedFragment
|
public class AndroidBeam extends InstrumentedFragment
|
||||||
implements SwitchBar.OnSwitchChangeListener {
|
implements SwitchBar.OnSwitchChangeListener {
|
||||||
@@ -68,10 +68,10 @@ public class AndroidBeam extends InstrumentedFragment
|
|||||||
@Override
|
@Override
|
||||||
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
public View onCreateView(LayoutInflater inflater, ViewGroup container,
|
||||||
Bundle savedInstanceState) {
|
Bundle savedInstanceState) {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
getActivity(), UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
getActivity(), UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
||||||
final UserManager um = UserManager.get(getActivity());
|
final UserManager um = UserManager.get(getActivity());
|
||||||
mBeamDisallowedByBase = RestrictedLockUtils.hasBaseUserRestriction(getActivity(),
|
mBeamDisallowedByBase = RestrictedLockUtilsInternal.hasBaseUserRestriction(getActivity(),
|
||||||
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
||||||
if (!mBeamDisallowedByBase && admin != null) {
|
if (!mBeamDisallowedByBase && admin != null) {
|
||||||
new ActionDisabledByAdminDialogHelper(getActivity())
|
new ActionDisabledByAdminDialogHelper(getActivity())
|
||||||
|
@@ -22,7 +22,7 @@ import android.os.UserHandle;
|
|||||||
import android.os.UserManager;
|
import android.os.UserManager;
|
||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -36,7 +36,7 @@ public class AndroidBeamEnabler extends BaseNfcEnabler {
|
|||||||
public AndroidBeamEnabler(Context context, RestrictedPreference preference) {
|
public AndroidBeamEnabler(Context context, RestrictedPreference preference) {
|
||||||
super(context);
|
super(context);
|
||||||
mPreference = preference;
|
mPreference = preference;
|
||||||
mBeamDisallowedBySystem = RestrictedLockUtils.hasBaseUserRestriction(context,
|
mBeamDisallowedBySystem = RestrictedLockUtilsInternal.hasBaseUserRestriction(context,
|
||||||
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId());
|
||||||
if (!isNfcAvailable()) {
|
if (!isNfcAvailable()) {
|
||||||
// NFC is not supported
|
// NFC is not supported
|
||||||
|
@@ -41,6 +41,7 @@ import com.android.settings.Utils;
|
|||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
||||||
import com.android.settingslib.core.lifecycle.events.OnPause;
|
import com.android.settingslib.core.lifecycle.events.OnPause;
|
||||||
@@ -246,7 +247,7 @@ public class LockScreenNotificationPreferenceController extends AbstractPreferen
|
|||||||
private void setRestrictedIfNotificationFeaturesDisabled(CharSequence entry,
|
private void setRestrictedIfNotificationFeaturesDisabled(CharSequence entry,
|
||||||
CharSequence entryValue, int keyguardNotificationFeatures) {
|
CharSequence entryValue, int keyguardNotificationFeatures) {
|
||||||
RestrictedLockUtils.EnforcedAdmin admin =
|
RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
mContext, keyguardNotificationFeatures, UserHandle.myUserId());
|
mContext, keyguardNotificationFeatures, UserHandle.myUserId());
|
||||||
if (admin != null && mLockscreen != null) {
|
if (admin != null && mLockscreen != null) {
|
||||||
RestrictedListPreference.RestrictedItem item =
|
RestrictedListPreference.RestrictedItem item =
|
||||||
@@ -255,7 +256,7 @@ public class LockScreenNotificationPreferenceController extends AbstractPreferen
|
|||||||
}
|
}
|
||||||
if (mProfileUserId != UserHandle.USER_NULL) {
|
if (mProfileUserId != UserHandle.USER_NULL) {
|
||||||
RestrictedLockUtils.EnforcedAdmin profileAdmin =
|
RestrictedLockUtils.EnforcedAdmin profileAdmin =
|
||||||
RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
mContext, keyguardNotificationFeatures, mProfileUserId);
|
mContext, keyguardNotificationFeatures, mProfileUserId);
|
||||||
if (profileAdmin != null && mLockscreenProfile != null) {
|
if (profileAdmin != null && mLockscreenProfile != null) {
|
||||||
RestrictedListPreference.RestrictedItem item =
|
RestrictedListPreference.RestrictedItem item =
|
||||||
|
@@ -51,7 +51,7 @@ import com.android.settings.applications.AppInfoBase;
|
|||||||
import com.android.settings.core.SubSettingLauncher;
|
import com.android.settings.core.SubSettingLauncher;
|
||||||
import com.android.settings.dashboard.DashboardFragment;
|
import com.android.settings.dashboard.DashboardFragment;
|
||||||
import com.android.settings.widget.MasterCheckBoxPreference;
|
import com.android.settings.widget.MasterCheckBoxPreference;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
import java.util.Comparator;
|
import java.util.Comparator;
|
||||||
@@ -113,7 +113,7 @@ abstract public class NotificationSettingsBase extends DashboardFragment {
|
|||||||
mPkgInfo = findPackageInfo(mPkg, mUid);
|
mPkgInfo = findPackageInfo(mPkg, mUid);
|
||||||
|
|
||||||
mUserId = UserHandle.getUserId(mUid);
|
mUserId = UserHandle.getUserId(mUid);
|
||||||
mSuspendedAppsAdmin = RestrictedLockUtils.checkIfApplicationIsSuspended(
|
mSuspendedAppsAdmin = RestrictedLockUtilsInternal.checkIfApplicationIsSuspended(
|
||||||
mContext, mPkg, mUserId);
|
mContext, mPkg, mUserId);
|
||||||
|
|
||||||
loadChannel();
|
loadChannel();
|
||||||
|
@@ -47,6 +47,7 @@ import com.android.settings.SetupRedactionInterstitial;
|
|||||||
import com.android.settings.SetupWizardUtils;
|
import com.android.settings.SetupWizardUtils;
|
||||||
import com.android.settings.Utils;
|
import com.android.settings.Utils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class RedactionInterstitial extends SettingsActivity {
|
public class RedactionInterstitial extends SettingsActivity {
|
||||||
|
|
||||||
@@ -160,7 +161,7 @@ public class RedactionInterstitial extends SettingsActivity {
|
|||||||
|
|
||||||
private void checkNotificationFeaturesAndSetDisabled(RestrictedRadioButton button,
|
private void checkNotificationFeaturesAndSetDisabled(RestrictedRadioButton button,
|
||||||
int keyguardNotifications) {
|
int keyguardNotifications) {
|
||||||
EnforcedAdmin admin = RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
getActivity(), keyguardNotifications, mUserId);
|
getActivity(), keyguardNotifications, mUserId);
|
||||||
button.setDisabledByAdmin(admin);
|
button.setDisabledByAdmin(admin);
|
||||||
}
|
}
|
||||||
|
@@ -33,6 +33,7 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.RestrictedListPreference;
|
import com.android.settings.RestrictedListPreference;
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
import java.util.ArrayList;
|
||||||
|
|
||||||
@@ -128,7 +129,7 @@ public class VisibilityPreferenceController extends NotificationPreferenceContro
|
|||||||
private void setRestrictedIfNotificationFeaturesDisabled(RestrictedListPreference pref,
|
private void setRestrictedIfNotificationFeaturesDisabled(RestrictedListPreference pref,
|
||||||
CharSequence entry, CharSequence entryValue, int keyguardNotificationFeatures) {
|
CharSequence entry, CharSequence entryValue, int keyguardNotificationFeatures) {
|
||||||
RestrictedLockUtils.EnforcedAdmin admin =
|
RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(
|
RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
mContext, keyguardNotificationFeatures, mAppRow.userId);
|
mContext, keyguardNotificationFeatures, mAppRow.userId);
|
||||||
if (admin != null) {
|
if (admin != null) {
|
||||||
RestrictedListPreference.RestrictedItem item =
|
RestrictedListPreference.RestrictedItem item =
|
||||||
|
@@ -64,8 +64,8 @@ import com.android.settings.biometrics.BiometricEnrollBase;
|
|||||||
import com.android.settings.biometrics.fingerprint.FingerprintEnrollFindSensor;
|
import com.android.settings.biometrics.fingerprint.FingerprintEnrollFindSensor;
|
||||||
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
import com.android.settings.core.instrumentation.InstrumentedDialogFragment;
|
||||||
import com.android.settings.search.SearchFeatureProvider;
|
import com.android.settings.search.SearchFeatureProvider;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
@@ -562,7 +562,7 @@ public class ChooseLockGeneric extends SettingsActivity {
|
|||||||
final PreferenceScreen entries = getPreferenceScreen();
|
final PreferenceScreen entries = getPreferenceScreen();
|
||||||
|
|
||||||
int adminEnforcedQuality = mDPM.getPasswordQuality(null, mUserId);
|
int adminEnforcedQuality = mDPM.getPasswordQuality(null, mUserId);
|
||||||
EnforcedAdmin enforcedAdmin = RestrictedLockUtils.checkIfPasswordQualityIsSet(
|
EnforcedAdmin enforcedAdmin = RestrictedLockUtilsInternal.checkIfPasswordQualityIsSet(
|
||||||
getActivity(), mUserId);
|
getActivity(), mUserId);
|
||||||
|
|
||||||
for (ScreenLockType lock : ScreenLockType.values()) {
|
for (ScreenLockType lock : ScreenLockType.values()) {
|
||||||
|
@@ -36,6 +36,7 @@ import com.android.settings.password.ChooseLockGeneric;
|
|||||||
import com.android.settings.security.screenlock.ScreenLockSettings;
|
import com.android.settings.security.screenlock.ScreenLockSettings;
|
||||||
import com.android.settings.widget.GearPreference;
|
import com.android.settings.widget.GearPreference;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
@@ -170,7 +171,7 @@ public class ChangeScreenLockPreferenceController extends AbstractPreferenceCont
|
|||||||
* DO or PO installed in the user may disallow to change password.
|
* DO or PO installed in the user may disallow to change password.
|
||||||
*/
|
*/
|
||||||
void disableIfPasswordQualityManaged(int userId) {
|
void disableIfPasswordQualityManaged(int userId) {
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin = RestrictedLockUtils
|
final RestrictedLockUtils.EnforcedAdmin admin = RestrictedLockUtilsInternal
|
||||||
.checkIfPasswordQualityIsSet(mContext, userId);
|
.checkIfPasswordQualityIsSet(mContext, userId);
|
||||||
final DevicePolicyManager dpm = (DevicePolicyManager) mContext
|
final DevicePolicyManager dpm = (DevicePolicyManager) mContext
|
||||||
.getSystemService(Context.DEVICE_POLICY_SERVICE);
|
.getSystemService(Context.DEVICE_POLICY_SERVICE);
|
||||||
|
@@ -39,7 +39,7 @@ import com.android.settings.core.SubSettingLauncher;
|
|||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settings.password.ChooseLockGeneric;
|
import com.android.settings.password.ChooseLockGeneric;
|
||||||
import com.android.settings.password.ChooseLockSettingsHelper;
|
import com.android.settings.password.ChooseLockSettingsHelper;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
@@ -136,8 +136,9 @@ public class LockUnificationPreferenceController extends AbstractPreferenceContr
|
|||||||
mLockPatternUtils.isSeparateProfileChallengeEnabled(mProfileUserId);
|
mLockPatternUtils.isSeparateProfileChallengeEnabled(mProfileUserId);
|
||||||
mUnifyProfile.setChecked(!separate);
|
mUnifyProfile.setChecked(!separate);
|
||||||
if (separate) {
|
if (separate) {
|
||||||
mUnifyProfile.setDisabledByAdmin(RestrictedLockUtils.checkIfRestrictionEnforced(
|
mUnifyProfile.setDisabledByAdmin(RestrictedLockUtilsInternal
|
||||||
mContext, UserManager.DISALLOW_UNIFIED_PASSWORD, mProfileUserId));
|
.checkIfRestrictionEnforced(mContext, UserManager.DISALLOW_UNIFIED_PASSWORD,
|
||||||
|
mProfileUserId));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -27,8 +27,8 @@ import androidx.preference.PreferenceScreen;
|
|||||||
import com.android.internal.widget.LockPatternUtils;
|
import com.android.internal.widget.LockPatternUtils;
|
||||||
import com.android.settings.core.PreferenceControllerMixin;
|
import com.android.settings.core.PreferenceControllerMixin;
|
||||||
import com.android.settings.users.OwnerInfoSettings;
|
import com.android.settings.users.OwnerInfoSettings;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
import com.android.settingslib.core.lifecycle.Lifecycle;
|
import com.android.settingslib.core.lifecycle.Lifecycle;
|
||||||
@@ -140,6 +140,6 @@ public class OwnerInfoPreferenceController extends AbstractPreferenceController
|
|||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
EnforcedAdmin getDeviceOwner() {
|
EnforcedAdmin getDeviceOwner() {
|
||||||
return RestrictedLockUtils.getDeviceOwner(mContext);
|
return RestrictedLockUtilsInternal.getDeviceOwner(mContext);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -34,6 +34,7 @@ import com.android.settings.display.TimeoutListPreference;
|
|||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settings.security.trustagent.TrustAgentManager;
|
import com.android.settings.security.trustagent.TrustAgentManager;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
|
|
||||||
public class LockAfterTimeoutPreferenceController extends AbstractPreferenceController
|
public class LockAfterTimeoutPreferenceController extends AbstractPreferenceController
|
||||||
@@ -106,7 +107,7 @@ public class LockAfterTimeoutPreferenceController extends AbstractPreferenceCont
|
|||||||
preference.setValue(String.valueOf(currentTimeout));
|
preference.setValue(String.valueOf(currentTimeout));
|
||||||
if (mDPM != null) {
|
if (mDPM != null) {
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin =
|
final RestrictedLockUtils.EnforcedAdmin admin =
|
||||||
RestrictedLockUtils.checkIfMaximumTimeToLockIsSet(mContext);
|
RestrictedLockUtilsInternal.checkIfMaximumTimeToLockIsSet(mContext);
|
||||||
final long adminTimeout =
|
final long adminTimeout =
|
||||||
mDPM.getMaximumTimeToLock(null /* admin */, UserHandle.myUserId());
|
mDPM.getMaximumTimeToLock(null /* admin */, UserHandle.myUserId());
|
||||||
final long displayTimeout = Math.max(0,
|
final long displayTimeout = Math.max(0,
|
||||||
|
@@ -39,6 +39,7 @@ import androidx.annotation.VisibleForTesting;
|
|||||||
|
|
||||||
import com.android.internal.widget.LockPatternUtils;
|
import com.android.internal.widget.LockPatternUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import org.xmlpull.v1.XmlPullParser;
|
import org.xmlpull.v1.XmlPullParser;
|
||||||
import org.xmlpull.v1.XmlPullParserException;
|
import org.xmlpull.v1.XmlPullParserException;
|
||||||
@@ -113,7 +114,7 @@ public class TrustAgentManager {
|
|||||||
final List<ResolveInfo> resolveInfos = pm.queryIntentServices(TRUST_AGENT_INTENT,
|
final List<ResolveInfo> resolveInfos = pm.queryIntentServices(TRUST_AGENT_INTENT,
|
||||||
PackageManager.GET_META_DATA);
|
PackageManager.GET_META_DATA);
|
||||||
final List<ComponentName> enabledTrustAgents = utils.getEnabledTrustAgents(myUserId);
|
final List<ComponentName> enabledTrustAgents = utils.getEnabledTrustAgents(myUserId);
|
||||||
final RestrictedLockUtils.EnforcedAdmin admin = RestrictedLockUtils
|
final RestrictedLockUtils.EnforcedAdmin admin = RestrictedLockUtilsInternal
|
||||||
.checkIfKeyguardFeaturesDisabled(
|
.checkIfKeyguardFeaturesDisabled(
|
||||||
context, DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS, myUserId);
|
context, DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS, myUserId);
|
||||||
|
|
||||||
|
@@ -40,7 +40,7 @@ import com.android.internal.widget.LockPatternUtils;
|
|||||||
import com.android.settings.core.BasePreferenceController;
|
import com.android.settings.core.BasePreferenceController;
|
||||||
import com.android.settings.overlay.FeatureFactory;
|
import com.android.settings.overlay.FeatureFactory;
|
||||||
import com.android.settings.security.SecurityFeatureProvider;
|
import com.android.settings.security.SecurityFeatureProvider;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
import com.android.settingslib.core.lifecycle.LifecycleObserver;
|
||||||
import com.android.settingslib.core.lifecycle.events.OnStart;
|
import com.android.settingslib.core.lifecycle.events.OnStart;
|
||||||
@@ -97,8 +97,8 @@ public class TrustAgentsPreferenceController extends BasePreferenceController
|
|||||||
loadActiveAgents();
|
loadActiveAgents();
|
||||||
removeUselessExistingPreferences();
|
removeUselessExistingPreferences();
|
||||||
|
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfKeyguardFeaturesDisabled(mContext,
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfKeyguardFeaturesDisabled(
|
||||||
DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS, UserHandle.myUserId());
|
mContext, DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS, UserHandle.myUserId());
|
||||||
|
|
||||||
for (TrustAgentInfo agent : mAvailableAgents.values()) {
|
for (TrustAgentInfo agent : mAvailableAgents.values()) {
|
||||||
final ComponentName componentName = agent.getComponentName();
|
final ComponentName componentName = agent.getComponentName();
|
||||||
|
@@ -53,6 +53,7 @@ import androidx.fragment.app.Fragment;
|
|||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.drawable.CircleFramedDrawable;
|
import com.android.settingslib.drawable.CircleFramedDrawable;
|
||||||
|
|
||||||
import libcore.io.Streams;
|
import libcore.io.Streams;
|
||||||
@@ -419,9 +420,9 @@ public class EditUserPhotoController {
|
|||||||
mAction = action;
|
mAction = action;
|
||||||
|
|
||||||
final int myUserId = UserHandle.myUserId();
|
final int myUserId = UserHandle.myUserId();
|
||||||
mAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(context,
|
mAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(context,
|
||||||
restriction, myUserId);
|
restriction, myUserId);
|
||||||
mIsRestrictedByBase = RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
mIsRestrictedByBase = RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
restriction, myUserId);
|
restriction, myUserId);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -25,6 +25,7 @@ import android.provider.Settings;
|
|||||||
|
|
||||||
import com.android.settings.Utils;
|
import com.android.settings.Utils;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
public class UserCapabilities {
|
public class UserCapabilities {
|
||||||
boolean mEnabled = true;
|
boolean mEnabled = true;
|
||||||
@@ -67,9 +68,9 @@ public class UserCapabilities {
|
|||||||
public void updateAddUserCapabilities(Context context) {
|
public void updateAddUserCapabilities(Context context) {
|
||||||
final UserManager userManager =
|
final UserManager userManager =
|
||||||
(UserManager) context.getSystemService(Context.USER_SERVICE);
|
(UserManager) context.getSystemService(Context.USER_SERVICE);
|
||||||
mEnforcedAdmin = RestrictedLockUtils.checkIfRestrictionEnforced(context,
|
mEnforcedAdmin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(context,
|
||||||
UserManager.DISALLOW_ADD_USER, UserHandle.myUserId());
|
UserManager.DISALLOW_ADD_USER, UserHandle.myUserId());
|
||||||
final boolean hasBaseUserRestriction = RestrictedLockUtils.hasBaseUserRestriction(
|
final boolean hasBaseUserRestriction = RestrictedLockUtilsInternal.hasBaseUserRestriction(
|
||||||
context, UserManager.DISALLOW_ADD_USER, UserHandle.myUserId());
|
context, UserManager.DISALLOW_ADD_USER, UserHandle.myUserId());
|
||||||
mDisallowAddUserSetByAdmin = mEnforcedAdmin != null && !hasBaseUserRestriction;
|
mDisallowAddUserSetByAdmin = mEnforcedAdmin != null && !hasBaseUserRestriction;
|
||||||
mDisallowAddUser = (mEnforcedAdmin != null || hasBaseUserRestriction);
|
mDisallowAddUser = (mEnforcedAdmin != null || hasBaseUserRestriction);
|
||||||
|
@@ -31,7 +31,7 @@ import com.android.internal.logging.nano.MetricsProto;
|
|||||||
import com.android.internal.logging.nano.MetricsProto.MetricsEvent;
|
import com.android.internal.logging.nano.MetricsProto.MetricsEvent;
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.SettingsPreferenceFragment;
|
import com.android.settings.SettingsPreferenceFragment;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
|
|
||||||
@@ -105,7 +105,7 @@ public class UserDetailsSettings extends SettingsPreferenceFragment
|
|||||||
mPhonePref.setChecked(
|
mPhonePref.setChecked(
|
||||||
!mDefaultGuestRestrictions.getBoolean(UserManager.DISALLOW_OUTGOING_CALLS));
|
!mDefaultGuestRestrictions.getBoolean(UserManager.DISALLOW_OUTGOING_CALLS));
|
||||||
}
|
}
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(context,
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(context,
|
||||||
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId())) {
|
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId())) {
|
||||||
removePreference(KEY_REMOVE_USER);
|
removePreference(KEY_REMOVE_USER);
|
||||||
}
|
}
|
||||||
|
@@ -28,7 +28,7 @@ import android.widget.ImageView;
|
|||||||
import androidx.preference.PreferenceViewHolder;
|
import androidx.preference.PreferenceViewHolder;
|
||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
import java.util.Comparator;
|
import java.util.Comparator;
|
||||||
@@ -142,7 +142,7 @@ public class UserPreference extends RestrictedPreference {
|
|||||||
|
|
||||||
private boolean canDeleteUser() {
|
private boolean canDeleteUser() {
|
||||||
return mDeleteClickListener != null
|
return mDeleteClickListener != null
|
||||||
&& !RestrictedLockUtils.hasBaseUserRestriction(getContext(),
|
&& !RestrictedLockUtilsInternal.hasBaseUserRestriction(getContext(),
|
||||||
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId());
|
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -72,6 +72,7 @@ import com.android.settings.widget.SwitchBar;
|
|||||||
import com.android.settings.widget.SwitchBarController;
|
import com.android.settings.widget.SwitchBarController;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
import com.android.settingslib.drawable.CircleFramedDrawable;
|
import com.android.settingslib.drawable.CircleFramedDrawable;
|
||||||
import com.android.settingslib.search.SearchIndexable;
|
import com.android.settingslib.search.SearchIndexable;
|
||||||
@@ -912,7 +913,7 @@ public class UserSettings extends SettingsPreferenceFragment
|
|||||||
if (mUserCaps.mDisallowAddUser) {
|
if (mUserCaps.mDisallowAddUser) {
|
||||||
pref.setDisabledByAdmin(mUserCaps.mEnforcedAdmin);
|
pref.setDisabledByAdmin(mUserCaps.mEnforcedAdmin);
|
||||||
} else if (mUserCaps.mDisallowSwitchUser) {
|
} else if (mUserCaps.mDisallowSwitchUser) {
|
||||||
pref.setDisabledByAdmin(RestrictedLockUtils.getDeviceOwner(context));
|
pref.setDisabledByAdmin(RestrictedLockUtilsInternal.getDeviceOwner(context));
|
||||||
} else {
|
} else {
|
||||||
pref.setDisabledByAdmin(null);
|
pref.setDisabledByAdmin(null);
|
||||||
}
|
}
|
||||||
@@ -1090,7 +1091,7 @@ public class UserSettings extends SettingsPreferenceFragment
|
|||||||
switch (v.getId()) {
|
switch (v.getId()) {
|
||||||
case UserPreference.DELETE_ID:
|
case UserPreference.DELETE_ID:
|
||||||
final EnforcedAdmin removeDisallowedAdmin =
|
final EnforcedAdmin removeDisallowedAdmin =
|
||||||
RestrictedLockUtils.checkIfRestrictionEnforced(getContext(),
|
RestrictedLockUtilsInternal.checkIfRestrictionEnforced(getContext(),
|
||||||
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId());
|
UserManager.DISALLOW_REMOVE_USER, UserHandle.myUserId());
|
||||||
if (removeDisallowedAdmin != null) {
|
if (removeDisallowedAdmin != null) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
||||||
|
@@ -63,7 +63,7 @@ import com.android.settings.R;
|
|||||||
import com.android.settings.RestrictedSettingsFragment;
|
import com.android.settings.RestrictedSettingsFragment;
|
||||||
import com.android.settings.widget.GearPreference;
|
import com.android.settings.widget.GearPreference;
|
||||||
import com.android.settings.widget.GearPreference.OnGearClickListener;
|
import com.android.settings.widget.GearPreference.OnGearClickListener;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import com.google.android.collect.Lists;
|
import com.google.android.collect.Lists;
|
||||||
|
|
||||||
@@ -143,7 +143,7 @@ public class VpnSettings extends RestrictedSettingsFragment implements
|
|||||||
// Disable all actions if VPN configuration has been disallowed
|
// Disable all actions if VPN configuration has been disallowed
|
||||||
for (int i = 0; i < menu.size(); i++) {
|
for (int i = 0; i < menu.size(); i++) {
|
||||||
if (isUiRestrictedByOnlyAdmin()) {
|
if (isUiRestrictedByOnlyAdmin()) {
|
||||||
RestrictedLockUtils.setMenuItemAsDisabledByAdmin(getPrefContext(),
|
RestrictedLockUtilsInternal.setMenuItemAsDisabledByAdmin(getPrefContext(),
|
||||||
menu.getItem(i), getRestrictionEnforcedAdmin());
|
menu.getItem(i), getRestrictionEnforcedAdmin());
|
||||||
} else {
|
} else {
|
||||||
menu.getItem(i).setEnabled(!mUnavailable);
|
menu.getItem(i).setEnabled(!mUnavailable);
|
||||||
|
@@ -26,6 +26,7 @@ import androidx.appcompat.app.AlertDialog;
|
|||||||
|
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.wifi.AccessPoint;
|
import com.android.settingslib.wifi.AccessPoint;
|
||||||
|
|
||||||
public class WifiDialog extends AlertDialog implements WifiConfigUiBase,
|
public class WifiDialog extends AlertDialog implements WifiConfigUiBase,
|
||||||
@@ -117,7 +118,7 @@ public class WifiDialog extends AlertDialog implements WifiConfigUiBase,
|
|||||||
case BUTTON_FORGET:
|
case BUTTON_FORGET:
|
||||||
if (WifiUtils.isNetworkLockedDown(getContext(), mAccessPoint.getConfig())) {
|
if (WifiUtils.isNetworkLockedDown(getContext(), mAccessPoint.getConfig())) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
||||||
RestrictedLockUtils.getDeviceOwner(getContext()));
|
RestrictedLockUtilsInternal.getDeviceOwner(getContext()));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
mListener.onForget(this);
|
mListener.onForget(this);
|
||||||
|
@@ -35,8 +35,8 @@ import androidx.annotation.VisibleForTesting;
|
|||||||
import com.android.internal.logging.nano.MetricsProto.MetricsEvent;
|
import com.android.internal.logging.nano.MetricsProto.MetricsEvent;
|
||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.widget.SwitchWidgetController;
|
import com.android.settings.widget.SwitchWidgetController;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.WirelessUtils;
|
import com.android.settingslib.WirelessUtils;
|
||||||
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
||||||
|
|
||||||
@@ -162,12 +162,12 @@ public class WifiEnabler implements SwitchWidgetController.OnSwitchChangeListene
|
|||||||
mSwitchWidget.setEnabled(true);
|
mSwitchWidget.setEnabled(true);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
if (RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId())) {
|
UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId())) {
|
||||||
mSwitchWidget.setEnabled(false);
|
mSwitchWidget.setEnabled(false);
|
||||||
} else {
|
} else {
|
||||||
final EnforcedAdmin admin = RestrictedLockUtils.checkIfRestrictionEnforced(mContext,
|
final EnforcedAdmin admin = RestrictedLockUtilsInternal.checkIfRestrictionEnforced(
|
||||||
UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId());
|
mContext, UserManager.DISALLOW_CONFIG_TETHERING, UserHandle.myUserId());
|
||||||
mSwitchWidget.setDisabledByAdmin(admin);
|
mSwitchWidget.setDisabledByAdmin(admin);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -67,6 +67,7 @@ import com.android.settings.widget.SummaryUpdater.OnSummaryChangeListener;
|
|||||||
import com.android.settings.widget.SwitchBarController;
|
import com.android.settings.widget.SwitchBarController;
|
||||||
import com.android.settings.wifi.details.WifiNetworkDetailsFragment;
|
import com.android.settings.wifi.details.WifiNetworkDetailsFragment;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.search.SearchIndexable;
|
import com.android.settingslib.search.SearchIndexable;
|
||||||
import com.android.settingslib.wifi.AccessPoint;
|
import com.android.settingslib.wifi.AccessPoint;
|
||||||
import com.android.settingslib.wifi.AccessPoint.AccessPointListener;
|
import com.android.settingslib.wifi.AccessPoint.AccessPointListener;
|
||||||
@@ -578,7 +579,7 @@ public class WifiSettings extends RestrictedSettingsFragment
|
|||||||
WifiConfiguration config = accessPoint.getConfig();
|
WifiConfiguration config = accessPoint.getConfig();
|
||||||
if (WifiUtils.isNetworkLockedDown(getActivity(), config) && accessPoint.isActive()) {
|
if (WifiUtils.isNetworkLockedDown(getActivity(), config) && accessPoint.isActive()) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getActivity(),
|
||||||
RestrictedLockUtils.getDeviceOwner(getActivity()));
|
RestrictedLockUtilsInternal.getDeviceOwner(getActivity()));
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@@ -35,6 +35,7 @@ import com.android.settings.dashboard.DashboardFragment;
|
|||||||
import com.android.settings.wifi.WifiConfigUiBase;
|
import com.android.settings.wifi.WifiConfigUiBase;
|
||||||
import com.android.settings.wifi.WifiDialog;
|
import com.android.settings.wifi.WifiDialog;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.core.AbstractPreferenceController;
|
import com.android.settingslib.core.AbstractPreferenceController;
|
||||||
import com.android.settingslib.wifi.AccessPoint;
|
import com.android.settingslib.wifi.AccessPoint;
|
||||||
|
|
||||||
@@ -108,7 +109,7 @@ public class WifiNetworkDetailsFragment extends DashboardFragment {
|
|||||||
case Menu.FIRST:
|
case Menu.FIRST:
|
||||||
if (!mWifiDetailPreferenceController.canModifyNetwork()) {
|
if (!mWifiDetailPreferenceController.canModifyNetwork()) {
|
||||||
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
RestrictedLockUtils.sendShowAdminSupportDetailsIntent(getContext(),
|
||||||
RestrictedLockUtils.getDeviceOwner(getContext()));
|
RestrictedLockUtilsInternal.getDeviceOwner(getContext()));
|
||||||
} else {
|
} else {
|
||||||
showDialog(WIFI_DIALOG_ID);
|
showDialog(WIFI_DIALOG_ID);
|
||||||
}
|
}
|
||||||
|
@@ -41,7 +41,7 @@ import com.android.settings.core.BasePreferenceController;
|
|||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowAccountManager;
|
import com.android.settings.testutils.shadow.ShadowAccountManager;
|
||||||
import com.android.settings.testutils.shadow.ShadowContentResolver;
|
import com.android.settings.testutils.shadow.ShadowContentResolver;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
|
|
||||||
import org.junit.After;
|
import org.junit.After;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
@@ -54,7 +54,7 @@ import org.robolectric.annotation.Config;
|
|||||||
|
|
||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = {ShadowAccountManager.class, ShadowContentResolver.class,
|
@Config(shadows = {ShadowAccountManager.class, ShadowContentResolver.class,
|
||||||
ShadowRestrictedLockUtils.class})
|
ShadowRestrictedLockUtilsInternal.class})
|
||||||
public class ChooseAccountPreferenceControllerTest {
|
public class ChooseAccountPreferenceControllerTest {
|
||||||
|
|
||||||
private Context mContext;
|
private Context mContext;
|
||||||
@@ -77,7 +77,7 @@ public class ChooseAccountPreferenceControllerTest {
|
|||||||
public void tearDown() {
|
public void tearDown() {
|
||||||
ShadowContentResolver.reset();
|
ShadowContentResolver.reset();
|
||||||
ShadowAccountManager.resetAuthenticator();
|
ShadowAccountManager.resetAuthenticator();
|
||||||
ShadowRestrictedLockUtils.clearDisabledTypes();
|
ShadowRestrictedLockUtilsInternal.clearDisabledTypes();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -115,9 +115,9 @@ public class ChooseAccountPreferenceControllerTest {
|
|||||||
true /* supportsUploading */)};
|
true /* supportsUploading */)};
|
||||||
ShadowContentResolver.setSyncAdapterTypes(syncAdapters);
|
ShadowContentResolver.setSyncAdapterTypes(syncAdapters);
|
||||||
|
|
||||||
ShadowRestrictedLockUtils.setHasSystemFeature(true);
|
ShadowRestrictedLockUtilsInternal.setHasSystemFeature(true);
|
||||||
ShadowRestrictedLockUtils.setDevicePolicyManager(mock(DevicePolicyManager.class));
|
ShadowRestrictedLockUtilsInternal.setDevicePolicyManager(mock(DevicePolicyManager.class));
|
||||||
ShadowRestrictedLockUtils.setDisabledTypes(new String[] {"test_type"});
|
ShadowRestrictedLockUtilsInternal.setDisabledTypes(new String[] {"test_type"});
|
||||||
|
|
||||||
doReturn("label").when(mController).getLabelForType(anyString());
|
doReturn("label").when(mController).getLabelForType(anyString());
|
||||||
|
|
||||||
@@ -140,9 +140,9 @@ public class ChooseAccountPreferenceControllerTest {
|
|||||||
true /* supportsUploading */)};
|
true /* supportsUploading */)};
|
||||||
ShadowContentResolver.setSyncAdapterTypes(syncAdapters);
|
ShadowContentResolver.setSyncAdapterTypes(syncAdapters);
|
||||||
|
|
||||||
ShadowRestrictedLockUtils.setHasSystemFeature(true);
|
ShadowRestrictedLockUtilsInternal.setHasSystemFeature(true);
|
||||||
ShadowRestrictedLockUtils.setDevicePolicyManager(mock(DevicePolicyManager.class));
|
ShadowRestrictedLockUtilsInternal.setDevicePolicyManager(mock(DevicePolicyManager.class));
|
||||||
ShadowRestrictedLockUtils.setDisabledTypes(new String[] {"com.acct1"});
|
ShadowRestrictedLockUtilsInternal.setDisabledTypes(new String[] {"com.acct1"});
|
||||||
|
|
||||||
doReturn("label").when(mController).getLabelForType(anyString());
|
doReturn("label").when(mController).getLabelForType(anyString());
|
||||||
|
|
||||||
|
@@ -40,7 +40,7 @@ import androidx.preference.PreferenceScreen;
|
|||||||
import com.android.settings.testutils.FakeFeatureFactory;
|
import com.android.settings.testutils.FakeFeatureFactory;
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowEntityHeaderController;
|
import com.android.settings.testutils.shadow.ShadowEntityHeaderController;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settings.widget.EntityHeaderController;
|
import com.android.settings.widget.EntityHeaderController;
|
||||||
import com.android.settingslib.AppItem;
|
import com.android.settingslib.AppItem;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
@@ -58,7 +58,7 @@ import org.robolectric.annotation.Config;
|
|||||||
import org.robolectric.util.ReflectionHelpers;
|
import org.robolectric.util.ReflectionHelpers;
|
||||||
|
|
||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = {ShadowEntityHeaderController.class, ShadowRestrictedLockUtils.class})
|
@Config(shadows = {ShadowEntityHeaderController.class, ShadowRestrictedLockUtilsInternal.class})
|
||||||
public class AppDataUsageTest {
|
public class AppDataUsageTest {
|
||||||
|
|
||||||
@Mock(answer = Answers.RETURNS_DEEP_STUBS)
|
@Mock(answer = Answers.RETURNS_DEEP_STUBS)
|
||||||
@@ -163,7 +163,7 @@ public class AppDataUsageTest {
|
|||||||
ReflectionHelpers.setField(mFragment, "mDataSaverBackend", dataSaverBackend);
|
ReflectionHelpers.setField(mFragment, "mDataSaverBackend", dataSaverBackend);
|
||||||
ReflectionHelpers.setField(mFragment.services, "mPolicyManager", networkPolicyManager);
|
ReflectionHelpers.setField(mFragment.services, "mPolicyManager", networkPolicyManager);
|
||||||
|
|
||||||
ShadowRestrictedLockUtils.setRestricted(true);
|
ShadowRestrictedLockUtilsInternal.setRestricted(true);
|
||||||
doReturn(NetworkPolicyManager.POLICY_NONE).when(networkPolicyManager)
|
doReturn(NetworkPolicyManager.POLICY_NONE).when(networkPolicyManager)
|
||||||
.getUidPolicy(testUid);
|
.getUidPolicy(testUid);
|
||||||
|
|
||||||
|
@@ -43,6 +43,7 @@ import com.android.settings.datausage.AppStateDataUsageBridge.DataUsageState;
|
|||||||
import com.android.settings.testutils.FakeFeatureFactory;
|
import com.android.settings.testutils.FakeFeatureFactory;
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
||||||
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.applications.ApplicationsState;
|
import com.android.settingslib.applications.ApplicationsState;
|
||||||
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
import com.android.settingslib.applications.ApplicationsState.AppEntry;
|
||||||
|
|
||||||
@@ -61,6 +62,7 @@ import java.util.ArrayList;
|
|||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = {
|
@Config(shadows = {
|
||||||
ShadowRestrictedLockUtils.class,
|
ShadowRestrictedLockUtils.class,
|
||||||
|
ShadowRestrictedLockUtilsInternal.class,
|
||||||
UnrestrictedDataAccessPreferenceControllerTest.ShadowAppStateBaseBridge.class
|
UnrestrictedDataAccessPreferenceControllerTest.ShadowAppStateBaseBridge.class
|
||||||
})
|
})
|
||||||
public class UnrestrictedDataAccessPreferenceControllerTest {
|
public class UnrestrictedDataAccessPreferenceControllerTest {
|
||||||
@@ -127,7 +129,7 @@ public class UnrestrictedDataAccessPreferenceControllerTest {
|
|||||||
|
|
||||||
final String testPkg1 = "com.example.one";
|
final String testPkg1 = "com.example.one";
|
||||||
final String testPkg2 = "com.example.two";
|
final String testPkg2 = "com.example.two";
|
||||||
ShadowRestrictedLockUtils.setRestrictedPkgs(testPkg2);
|
ShadowRestrictedLockUtilsInternal.setRestrictedPkgs(testPkg2);
|
||||||
|
|
||||||
doAnswer((invocation) -> {
|
doAnswer((invocation) -> {
|
||||||
final UnrestrictedDataAccessPreference preference = invocation.getArgument(0);
|
final UnrestrictedDataAccessPreference preference = invocation.getArgument(0);
|
||||||
|
@@ -34,7 +34,7 @@ import android.provider.Settings;
|
|||||||
import com.android.settings.R;
|
import com.android.settings.R;
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowDevicePolicyManager;
|
import com.android.settings.testutils.shadow.ShadowDevicePolicyManager;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
|
||||||
import org.junit.After;
|
import org.junit.After;
|
||||||
@@ -78,7 +78,7 @@ public class TimeoutPreferenceControllerTest {
|
|||||||
|
|
||||||
@After
|
@After
|
||||||
public void tearDown() {
|
public void tearDown() {
|
||||||
ShadowRestrictedLockUtils.reset();
|
ShadowRestrictedLockUtilsInternal.reset();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -139,13 +139,13 @@ public class TimeoutPreferenceControllerTest {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@Config(shadows = ShadowRestrictedLockUtils.class)
|
@Config(shadows = ShadowRestrictedLockUtilsInternal.class)
|
||||||
public void updateState_selectedTimeoutLargerThanAdminMax_shouldSetSummaryToUpdatedPrefValue() {
|
public void updateState_selectedTimeoutLargerThanAdminMax_shouldSetSummaryToUpdatedPrefValue() {
|
||||||
final int profileUserId = UserHandle.myUserId();
|
final int profileUserId = UserHandle.myUserId();
|
||||||
final long allowedTimeout = 480000L; // 8 minutes
|
final long allowedTimeout = 480000L; // 8 minutes
|
||||||
when(mUserManager.getProfiles(profileUserId)).thenReturn(Collections.emptyList());
|
when(mUserManager.getProfiles(profileUserId)).thenReturn(Collections.emptyList());
|
||||||
ShadowDevicePolicyManager.getShadow().setMaximumTimeToLock(profileUserId, allowedTimeout);
|
ShadowDevicePolicyManager.getShadow().setMaximumTimeToLock(profileUserId, allowedTimeout);
|
||||||
ShadowRestrictedLockUtils.setMaximumTimeToLockIsSet(true);
|
ShadowRestrictedLockUtilsInternal.setMaximumTimeToLockIsSet(true);
|
||||||
final CharSequence[] timeouts = {"15000", "30000", "60000", "120000", "300000", "600000"};
|
final CharSequence[] timeouts = {"15000", "30000", "60000", "120000", "300000", "600000"};
|
||||||
final CharSequence[] summaries = {"15s", "30s", "1m", "2m", "5m", "10m"};
|
final CharSequence[] summaries = {"15s", "30s", "1m", "2m", "5m", "10m"};
|
||||||
// set current timeout to be 10 minutes, which is longer than the allowed 8 minutes
|
// set current timeout to be 10 minutes, which is longer than the allowed 8 minutes
|
||||||
|
@@ -23,7 +23,7 @@ import static org.mockito.Mockito.when;
|
|||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settings.wifi.WifiMasterSwitchPreferenceController;
|
import com.android.settings.wifi.WifiMasterSwitchPreferenceController;
|
||||||
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
@@ -36,7 +36,7 @@ import org.robolectric.annotation.Config;
|
|||||||
import org.robolectric.util.ReflectionHelpers;
|
import org.robolectric.util.ReflectionHelpers;
|
||||||
|
|
||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = ShadowRestrictedLockUtils.class)
|
@Config(shadows = ShadowRestrictedLockUtilsInternal.class)
|
||||||
public class TopLevelNetworkEntryPreferenceControllerTest {
|
public class TopLevelNetworkEntryPreferenceControllerTest {
|
||||||
|
|
||||||
@Mock
|
@Mock
|
||||||
|
@@ -31,7 +31,7 @@ import android.provider.Settings;
|
|||||||
import androidx.preference.PreferenceScreen;
|
import androidx.preference.PreferenceScreen;
|
||||||
|
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedPreference;
|
import com.android.settingslib.RestrictedPreference;
|
||||||
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
@@ -69,7 +69,7 @@ public class AndroidBeamPreferenceControllerTest {
|
|||||||
when(mContext.getApplicationContext()).thenReturn(mContext);
|
when(mContext.getApplicationContext()).thenReturn(mContext);
|
||||||
when(mContext.getSystemService(Context.USER_SERVICE)).thenReturn(mUserManager);
|
when(mContext.getSystemService(Context.USER_SERVICE)).thenReturn(mUserManager);
|
||||||
when(mContext.getSystemService(Context.NFC_SERVICE)).thenReturn(mManager);
|
when(mContext.getSystemService(Context.NFC_SERVICE)).thenReturn(mManager);
|
||||||
when(RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
when(RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId())).thenReturn(false);
|
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId())).thenReturn(false);
|
||||||
when(NfcAdapter.getDefaultAdapter(mContext)).thenReturn(mNfcAdapter);
|
when(NfcAdapter.getDefaultAdapter(mContext)).thenReturn(mNfcAdapter);
|
||||||
|
|
||||||
@@ -104,7 +104,7 @@ public class AndroidBeamPreferenceControllerTest {
|
|||||||
public void isBeamEnable_disAllowBeam_shouldReturnFalse() {
|
public void isBeamEnable_disAllowBeam_shouldReturnFalse() {
|
||||||
when(mNfcAdapter.getAdapterState()).thenReturn(NfcAdapter.STATE_OFF);
|
when(mNfcAdapter.getAdapterState()).thenReturn(NfcAdapter.STATE_OFF);
|
||||||
|
|
||||||
when(RestrictedLockUtils.hasBaseUserRestriction(mContext,
|
when(RestrictedLockUtilsInternal.hasBaseUserRestriction(mContext,
|
||||||
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId())).thenReturn(true);
|
UserManager.DISALLOW_OUTGOING_BEAM, UserHandle.myUserId())).thenReturn(true);
|
||||||
mAndroidBeamController.displayPreference(mScreen);
|
mAndroidBeamController.displayPreference(mScreen);
|
||||||
|
|
||||||
|
@@ -22,7 +22,7 @@ import com.android.settings.notification.RedactionInterstitial.RedactionIntersti
|
|||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.SettingsShadowResources;
|
import com.android.settings.testutils.shadow.SettingsShadowResources;
|
||||||
import com.android.settings.testutils.shadow.SettingsShadowResourcesImpl;
|
import com.android.settings.testutils.shadow.SettingsShadowResourcesImpl;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settings.testutils.shadow.ShadowUserManager;
|
import com.android.settings.testutils.shadow.ShadowUserManager;
|
||||||
import com.android.settings.testutils.shadow.ShadowUtils;
|
import com.android.settings.testutils.shadow.ShadowUtils;
|
||||||
|
|
||||||
@@ -39,7 +39,7 @@ import org.robolectric.annotation.Config;
|
|||||||
SettingsShadowResourcesImpl.class,
|
SettingsShadowResourcesImpl.class,
|
||||||
SettingsShadowResources.SettingsShadowTheme.class,
|
SettingsShadowResources.SettingsShadowTheme.class,
|
||||||
ShadowUtils.class,
|
ShadowUtils.class,
|
||||||
ShadowRestrictedLockUtils.class,
|
ShadowRestrictedLockUtilsInternal.class,
|
||||||
ShadowUserManager.class,
|
ShadowUserManager.class,
|
||||||
})
|
})
|
||||||
public class RedactionInterstitialTest {
|
public class RedactionInterstitialTest {
|
||||||
@@ -49,7 +49,7 @@ public class RedactionInterstitialTest {
|
|||||||
@After
|
@After
|
||||||
public void tearDown() {
|
public void tearDown() {
|
||||||
ShadowUserManager.getShadow().reset();
|
ShadowUserManager.getShadow().reset();
|
||||||
ShadowRestrictedLockUtils.reset();
|
ShadowRestrictedLockUtilsInternal.reset();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
@@ -85,7 +85,7 @@ public class RedactionInterstitialTest {
|
|||||||
@Test
|
@Test
|
||||||
public void primaryUserUnredactedRestrictionTest() {
|
public void primaryUserUnredactedRestrictionTest() {
|
||||||
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
||||||
ShadowRestrictedLockUtils.setKeyguardDisabledFeatures(
|
ShadowRestrictedLockUtilsInternal.setKeyguardDisabledFeatures(
|
||||||
KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS);
|
KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS);
|
||||||
setupActivity();
|
setupActivity();
|
||||||
|
|
||||||
@@ -97,7 +97,7 @@ public class RedactionInterstitialTest {
|
|||||||
@Test
|
@Test
|
||||||
public void primaryUserNotificationRestrictionTest() {
|
public void primaryUserNotificationRestrictionTest() {
|
||||||
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
||||||
ShadowRestrictedLockUtils.setKeyguardDisabledFeatures(
|
ShadowRestrictedLockUtilsInternal.setKeyguardDisabledFeatures(
|
||||||
KEYGUARD_DISABLE_SECURE_NOTIFICATIONS);
|
KEYGUARD_DISABLE_SECURE_NOTIFICATIONS);
|
||||||
setupActivity();
|
setupActivity();
|
||||||
|
|
||||||
@@ -121,7 +121,7 @@ public class RedactionInterstitialTest {
|
|||||||
public void managedProfileUnredactedRestrictionTest() {
|
public void managedProfileUnredactedRestrictionTest() {
|
||||||
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
setupSettings(1 /* show */, 1 /* showUnredacted */);
|
||||||
ShadowUserManager.getShadow().addManagedProfile(UserHandle.myUserId());
|
ShadowUserManager.getShadow().addManagedProfile(UserHandle.myUserId());
|
||||||
ShadowRestrictedLockUtils.setKeyguardDisabledFeatures(
|
ShadowRestrictedLockUtilsInternal.setKeyguardDisabledFeatures(
|
||||||
KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS);
|
KEYGUARD_DISABLE_UNREDACTED_NOTIFICATIONS);
|
||||||
setupActivity();
|
setupActivity();
|
||||||
|
|
||||||
|
@@ -35,7 +35,7 @@ import com.android.settings.core.BasePreferenceController;
|
|||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowDevicePolicyManager;
|
import com.android.settings.testutils.shadow.ShadowDevicePolicyManager;
|
||||||
import com.android.settings.testutils.shadow.ShadowLockPatternUtils;
|
import com.android.settings.testutils.shadow.ShadowLockPatternUtils;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settingslib.RestrictedSwitchPreference;
|
import com.android.settingslib.RestrictedSwitchPreference;
|
||||||
|
|
||||||
import org.junit.After;
|
import org.junit.After;
|
||||||
@@ -55,7 +55,7 @@ import java.util.List;
|
|||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = {
|
@Config(shadows = {
|
||||||
ShadowLockPatternUtils.class,
|
ShadowLockPatternUtils.class,
|
||||||
ShadowRestrictedLockUtils.class,
|
ShadowRestrictedLockUtilsInternal.class,
|
||||||
ShadowDevicePolicyManager.class,
|
ShadowDevicePolicyManager.class,
|
||||||
ShadowApplicationPackageManager.class,
|
ShadowApplicationPackageManager.class,
|
||||||
TrustAgentsPreferenceControllerTest.ShadowTrustAgentManager.class
|
TrustAgentsPreferenceControllerTest.ShadowTrustAgentManager.class
|
||||||
@@ -145,7 +145,7 @@ public class TrustAgentsPreferenceControllerTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void onStart_hasUnrestrictedTrustAgent_shouldAddThreeChangeablePreferences() {
|
public void onStart_hasUnrestrictedTrustAgent_shouldAddThreeChangeablePreferences() {
|
||||||
ShadowRestrictedLockUtils.setKeyguardDisabledFeatures(0);
|
ShadowRestrictedLockUtilsInternal.setKeyguardDisabledFeatures(0);
|
||||||
final List<ResolveInfo> availableAgents = createFakeAvailableAgents();
|
final List<ResolveInfo> availableAgents = createFakeAvailableAgents();
|
||||||
for (ResolveInfo rInfo : availableAgents) {
|
for (ResolveInfo rInfo : availableAgents) {
|
||||||
ShadowTrustAgentManager.grantPermissionToResolveInfo(rInfo);
|
ShadowTrustAgentManager.grantPermissionToResolveInfo(rInfo);
|
||||||
@@ -170,7 +170,7 @@ public class TrustAgentsPreferenceControllerTest {
|
|||||||
ShadowTrustAgentManager.grantPermissionToResolveInfo(rInfo);
|
ShadowTrustAgentManager.grantPermissionToResolveInfo(rInfo);
|
||||||
}
|
}
|
||||||
mPackageManager.addResolveInfoForIntent(TEST_INTENT, availableAgents);
|
mPackageManager.addResolveInfoForIntent(TEST_INTENT, availableAgents);
|
||||||
ShadowRestrictedLockUtils.setKeyguardDisabledFeatures(
|
ShadowRestrictedLockUtilsInternal.setKeyguardDisabledFeatures(
|
||||||
DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS);
|
DevicePolicyManager.KEYGUARD_DISABLE_TRUST_AGENTS);
|
||||||
|
|
||||||
mController.displayPreference(mPreferenceScreen);
|
mController.displayPreference(mPreferenceScreen);
|
||||||
|
@@ -15,99 +15,24 @@
|
|||||||
*/
|
*/
|
||||||
package com.android.settings.testutils.shadow;
|
package com.android.settings.testutils.shadow;
|
||||||
|
|
||||||
import android.annotation.UserIdInt;
|
|
||||||
import android.app.admin.DevicePolicyManager;
|
|
||||||
import android.content.Context;
|
import android.content.Context;
|
||||||
|
|
||||||
import com.android.internal.util.ArrayUtils;
|
|
||||||
import com.android.settingslib.RestrictedLockUtils;
|
import com.android.settingslib.RestrictedLockUtils;
|
||||||
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
|
||||||
import org.robolectric.annotation.Implementation;
|
import org.robolectric.annotation.Implementation;
|
||||||
import org.robolectric.annotation.Implements;
|
import org.robolectric.annotation.Implements;
|
||||||
import org.robolectric.annotation.Resetter;
|
|
||||||
|
|
||||||
@Implements(RestrictedLockUtils.class)
|
@Implements(RestrictedLockUtils.class)
|
||||||
public class ShadowRestrictedLockUtils {
|
public class ShadowRestrictedLockUtils {
|
||||||
|
|
||||||
private static boolean sIsRestricted;
|
|
||||||
private static boolean sAdminSupportDetailsIntentLaunched;
|
private static boolean sAdminSupportDetailsIntentLaunched;
|
||||||
private static boolean sHasSystemFeature;
|
|
||||||
private static boolean sMaximumTimeToLockIsSet;
|
|
||||||
private static String[] sRestrictedPkgs;
|
|
||||||
private static DevicePolicyManager sDevicePolicyManager;
|
|
||||||
private static String[] sDisabledTypes;
|
|
||||||
private static int sKeyguardDisabledFeatures;
|
|
||||||
|
|
||||||
@Resetter
|
|
||||||
public static void reset() {
|
|
||||||
sIsRestricted = false;
|
|
||||||
sRestrictedPkgs = null;
|
|
||||||
sAdminSupportDetailsIntentLaunched = false;
|
|
||||||
sKeyguardDisabledFeatures = 0;
|
|
||||||
sDisabledTypes = new String[0];
|
|
||||||
sMaximumTimeToLockIsSet = false;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static EnforcedAdmin checkIfMeteredDataRestricted(Context context,
|
|
||||||
String packageName, int userId) {
|
|
||||||
if (sIsRestricted) {
|
|
||||||
return new EnforcedAdmin();
|
|
||||||
}
|
|
||||||
if (ArrayUtils.contains(sRestrictedPkgs, packageName)) {
|
|
||||||
return new EnforcedAdmin();
|
|
||||||
}
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
@Implementation
|
||||||
public static void sendShowAdminSupportDetailsIntent(Context context, EnforcedAdmin admin) {
|
public static void sendShowAdminSupportDetailsIntent(Context context, EnforcedAdmin admin) {
|
||||||
sAdminSupportDetailsIntentLaunched = true;
|
sAdminSupportDetailsIntentLaunched = true;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static EnforcedAdmin checkIfAccountManagementDisabled(Context context,
|
|
||||||
String accountType, int userId) {
|
|
||||||
if (accountType == null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
if (!sHasSystemFeature || sDevicePolicyManager == null) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
boolean isAccountTypeDisabled = false;
|
|
||||||
if (ArrayUtils.contains(sDisabledTypes, accountType)) {
|
|
||||||
isAccountTypeDisabled = true;
|
|
||||||
}
|
|
||||||
if (!isAccountTypeDisabled) {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
return new EnforcedAdmin();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static EnforcedAdmin checkIfKeyguardFeaturesDisabled(Context context,
|
|
||||||
int features, final @UserIdInt int userId) {
|
|
||||||
return (sKeyguardDisabledFeatures & features) == 0 ? null : new EnforcedAdmin();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static boolean hasBaseUserRestriction(Context context,
|
|
||||||
String userRestriction, int userId) {
|
|
||||||
return sIsRestricted;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static EnforcedAdmin checkIfRestrictionEnforced(Context context,
|
|
||||||
String userRestriction, int userId) {
|
|
||||||
return sIsRestricted ? new EnforcedAdmin() : null;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Implementation
|
|
||||||
public static EnforcedAdmin checkIfMaximumTimeToLockIsSet(Context context) {
|
|
||||||
return sMaximumTimeToLockIsSet ? new EnforcedAdmin() : null;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static boolean hasAdminSupportDetailsIntentLaunched() {
|
public static boolean hasAdminSupportDetailsIntentLaunched() {
|
||||||
return sAdminSupportDetailsIntentLaunched;
|
return sAdminSupportDetailsIntentLaunched;
|
||||||
}
|
}
|
||||||
@@ -116,36 +41,5 @@ public class ShadowRestrictedLockUtils {
|
|||||||
sAdminSupportDetailsIntentLaunched = false;
|
sAdminSupportDetailsIntentLaunched = false;
|
||||||
}
|
}
|
||||||
|
|
||||||
public static void setRestricted(boolean restricted) {
|
|
||||||
sIsRestricted = restricted;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setRestrictedPkgs(String... pkgs) {
|
|
||||||
sRestrictedPkgs = pkgs;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setHasSystemFeature(boolean hasSystemFeature) {
|
|
||||||
sHasSystemFeature = hasSystemFeature;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setDevicePolicyManager(DevicePolicyManager dpm) {
|
|
||||||
sDevicePolicyManager = dpm;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setDisabledTypes(String[] disabledTypes) {
|
|
||||||
sDisabledTypes = disabledTypes;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void clearDisabledTypes() {
|
|
||||||
sDisabledTypes = new String[0];
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setKeyguardDisabledFeatures(int features) {
|
|
||||||
sKeyguardDisabledFeatures = features;
|
|
||||||
}
|
|
||||||
|
|
||||||
public static void setMaximumTimeToLockIsSet(boolean isSet) {
|
|
||||||
sMaximumTimeToLockIsSet = isSet;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -0,0 +1,136 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2018 The Android Open Source Project
|
||||||
|
*
|
||||||
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
* you may not use this file except in compliance with the License.
|
||||||
|
* You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package com.android.settings.testutils.shadow;
|
||||||
|
|
||||||
|
import android.annotation.UserIdInt;
|
||||||
|
import android.app.admin.DevicePolicyManager;
|
||||||
|
import android.content.Context;
|
||||||
|
|
||||||
|
import com.android.internal.util.ArrayUtils;
|
||||||
|
import com.android.settingslib.RestrictedLockUtils.EnforcedAdmin;
|
||||||
|
import com.android.settingslib.RestrictedLockUtilsInternal;
|
||||||
|
|
||||||
|
import org.robolectric.annotation.Implementation;
|
||||||
|
import org.robolectric.annotation.Implements;
|
||||||
|
import org.robolectric.annotation.Resetter;
|
||||||
|
|
||||||
|
@Implements(RestrictedLockUtilsInternal.class)
|
||||||
|
public class ShadowRestrictedLockUtilsInternal {
|
||||||
|
|
||||||
|
private static boolean sIsRestricted;
|
||||||
|
private static boolean sHasSystemFeature;
|
||||||
|
private static boolean sMaximumTimeToLockIsSet;
|
||||||
|
private static String[] sRestrictedPkgs;
|
||||||
|
private static DevicePolicyManager sDevicePolicyManager;
|
||||||
|
private static String[] sDisabledTypes;
|
||||||
|
private static int sKeyguardDisabledFeatures;
|
||||||
|
|
||||||
|
@Resetter
|
||||||
|
public static void reset() {
|
||||||
|
sIsRestricted = false;
|
||||||
|
sRestrictedPkgs = null;
|
||||||
|
sKeyguardDisabledFeatures = 0;
|
||||||
|
sDisabledTypes = new String[0];
|
||||||
|
sMaximumTimeToLockIsSet = false;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static EnforcedAdmin checkIfMeteredDataRestricted(Context context,
|
||||||
|
String packageName, int userId) {
|
||||||
|
if (sIsRestricted) {
|
||||||
|
return new EnforcedAdmin();
|
||||||
|
}
|
||||||
|
if (ArrayUtils.contains(sRestrictedPkgs, packageName)) {
|
||||||
|
return new EnforcedAdmin();
|
||||||
|
}
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static EnforcedAdmin checkIfAccountManagementDisabled(Context context,
|
||||||
|
String accountType, int userId) {
|
||||||
|
if (accountType == null) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
if (!sHasSystemFeature || sDevicePolicyManager == null) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
boolean isAccountTypeDisabled = false;
|
||||||
|
if (ArrayUtils.contains(sDisabledTypes, accountType)) {
|
||||||
|
isAccountTypeDisabled = true;
|
||||||
|
}
|
||||||
|
if (!isAccountTypeDisabled) {
|
||||||
|
return null;
|
||||||
|
}
|
||||||
|
return new EnforcedAdmin();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static EnforcedAdmin checkIfKeyguardFeaturesDisabled(Context context,
|
||||||
|
int features, final @UserIdInt int userId) {
|
||||||
|
return (sKeyguardDisabledFeatures & features) == 0 ? null : new EnforcedAdmin();
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static boolean hasBaseUserRestriction(Context context,
|
||||||
|
String userRestriction, int userId) {
|
||||||
|
return sIsRestricted;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static EnforcedAdmin checkIfRestrictionEnforced(Context context,
|
||||||
|
String userRestriction, int userId) {
|
||||||
|
return sIsRestricted ? new EnforcedAdmin() : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public static EnforcedAdmin checkIfMaximumTimeToLockIsSet(Context context) {
|
||||||
|
return sMaximumTimeToLockIsSet ? new EnforcedAdmin() : null;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setRestricted(boolean restricted) {
|
||||||
|
sIsRestricted = restricted;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setRestrictedPkgs(String... pkgs) {
|
||||||
|
sRestrictedPkgs = pkgs;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setHasSystemFeature(boolean hasSystemFeature) {
|
||||||
|
sHasSystemFeature = hasSystemFeature;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setDevicePolicyManager(DevicePolicyManager dpm) {
|
||||||
|
sDevicePolicyManager = dpm;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setDisabledTypes(String[] disabledTypes) {
|
||||||
|
sDisabledTypes = disabledTypes;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void clearDisabledTypes() {
|
||||||
|
sDisabledTypes = new String[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setKeyguardDisabledFeatures(int features) {
|
||||||
|
sKeyguardDisabledFeatures = features;
|
||||||
|
}
|
||||||
|
|
||||||
|
public static void setMaximumTimeToLockIsSet(boolean isSet) {
|
||||||
|
sMaximumTimeToLockIsSet = isSet;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -79,6 +79,15 @@ public class ShadowUserManager extends org.robolectric.shadows.ShadowUserManager
|
|||||||
return mUserProfileInfos;
|
return mUserProfileInfos;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Implementation
|
||||||
|
public int[] getProfileIds(@UserIdInt int userHandle, boolean enabledOnly) {
|
||||||
|
int[] ids = new int[mUserProfileInfos.size()];
|
||||||
|
for (int i = 0; i < mUserProfileInfos.size(); i++) {
|
||||||
|
ids[i] = mUserProfileInfos.get(i).id;
|
||||||
|
}
|
||||||
|
return ids;
|
||||||
|
}
|
||||||
|
|
||||||
@Implementation
|
@Implementation
|
||||||
public int getCredentialOwnerProfile(@UserIdInt int userHandle) {
|
public int getCredentialOwnerProfile(@UserIdInt int userHandle) {
|
||||||
return userHandle;
|
return userHandle;
|
||||||
|
@@ -26,7 +26,7 @@ import android.net.ConnectivityManager;
|
|||||||
import android.net.wifi.WifiManager;
|
import android.net.wifi.WifiManager;
|
||||||
|
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settings.widget.SwitchWidgetController;
|
import com.android.settings.widget.SwitchWidgetController;
|
||||||
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
||||||
|
|
||||||
@@ -38,7 +38,7 @@ import org.mockito.MockitoAnnotations;
|
|||||||
import org.robolectric.annotation.Config;
|
import org.robolectric.annotation.Config;
|
||||||
|
|
||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = ShadowRestrictedLockUtils.class)
|
@Config(shadows = ShadowRestrictedLockUtilsInternal.class)
|
||||||
public class WifiEnablerTest {
|
public class WifiEnablerTest {
|
||||||
|
|
||||||
@Mock
|
@Mock
|
||||||
|
@@ -37,7 +37,7 @@ import androidx.preference.PreferenceScreen;
|
|||||||
|
|
||||||
import com.android.settings.testutils.FakeFeatureFactory;
|
import com.android.settings.testutils.FakeFeatureFactory;
|
||||||
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
import com.android.settings.testutils.SettingsRobolectricTestRunner;
|
||||||
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtils;
|
import com.android.settings.testutils.shadow.ShadowRestrictedLockUtilsInternal;
|
||||||
import com.android.settings.widget.MasterSwitchPreference;
|
import com.android.settings.widget.MasterSwitchPreference;
|
||||||
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
import com.android.settingslib.core.instrumentation.MetricsFeatureProvider;
|
||||||
|
|
||||||
@@ -50,7 +50,7 @@ import org.robolectric.RuntimeEnvironment;
|
|||||||
import org.robolectric.annotation.Config;
|
import org.robolectric.annotation.Config;
|
||||||
|
|
||||||
@RunWith(SettingsRobolectricTestRunner.class)
|
@RunWith(SettingsRobolectricTestRunner.class)
|
||||||
@Config(shadows = ShadowRestrictedLockUtils.class)
|
@Config(shadows = ShadowRestrictedLockUtilsInternal.class)
|
||||||
public class WifiMasterSwitchPreferenceControllerTest {
|
public class WifiMasterSwitchPreferenceControllerTest {
|
||||||
|
|
||||||
@Mock
|
@Mock
|
||||||
|
Reference in New Issue
Block a user