This CL continues the finalization of UI layout and strings for the enterprise privacy page: * Turn footer into a header * Update strings * Dynamically generate summaries for entry points in security page Bug: 32692748 Test: m RunSettingsRoboTests Change-Id: Ibf248ac269380fb1b919b01f88f721130060b7f9
328 lines
15 KiB
Java
328 lines
15 KiB
Java
/*
|
|
* Copyright (C) 2016 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package com.android.settings.enterprise;
|
|
|
|
import android.content.ComponentName;
|
|
import android.content.Context;
|
|
import android.content.pm.ApplicationInfo;
|
|
import android.content.pm.PackageManager;
|
|
import android.content.pm.UserInfo;
|
|
import android.content.res.Resources;
|
|
import android.net.ProxyInfo;
|
|
import android.os.UserHandle;
|
|
import android.os.UserManager;
|
|
import android.provider.Settings;
|
|
import android.text.SpannableStringBuilder;
|
|
|
|
import com.android.settings.R;
|
|
import com.android.settings.SettingsRobolectricTestRunner;
|
|
import com.android.settings.TestConfig;
|
|
import com.android.settings.applications.PackageManagerWrapper;
|
|
import com.android.settings.vpn2.ConnectivityManagerWrapper;
|
|
|
|
import org.junit.Before;
|
|
import org.junit.Test;
|
|
import org.junit.runner.RunWith;
|
|
import org.mockito.Mock;
|
|
import org.mockito.MockitoAnnotations;
|
|
import org.robolectric.annotation.Config;
|
|
import org.robolectric.shadows.ShadowApplication;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.Arrays;
|
|
import java.util.Date;
|
|
import java.util.List;
|
|
|
|
import static com.google.common.truth.Truth.assertThat;
|
|
import static org.mockito.Mockito.mock;
|
|
import static org.mockito.Mockito.reset;
|
|
import static org.mockito.Mockito.when;
|
|
|
|
/**
|
|
* Tests for {@link EnterprisePrivacyFeatureProviderImpl}.
|
|
*/
|
|
@RunWith(SettingsRobolectricTestRunner.class)
|
|
@Config(manifest = TestConfig.MANIFEST_PATH, sdk = TestConfig.SDK_VERSION)
|
|
public final class EnterprisePrivacyFeatureProviderImplTest {
|
|
|
|
private final ComponentName OWNER = new ComponentName("dummy", "component");
|
|
private final ComponentName ADMIN_1 = new ComponentName("dummy", "admin1");
|
|
private final ComponentName ADMIN_2 = new ComponentName("dummy", "admin2");
|
|
private final String OWNER_ORGANIZATION = new String("ACME");
|
|
private final Date TIMESTAMP = new Date(2011, 11, 11);
|
|
private final int MY_USER_ID = UserHandle.myUserId();
|
|
private final int MANAGED_PROFILE_USER_ID = MY_USER_ID + 1;
|
|
private final String VPN_PACKAGE_ID = "com.example.vpn";
|
|
private final String IME_PACKAGE_ID = "com.example.ime";
|
|
private final String OTHER_PACKAGE_ID = "com.example.other";
|
|
private final String IME_PACKAGE_LABEL = "Test IME";
|
|
|
|
private List<UserInfo> mProfiles = new ArrayList();
|
|
|
|
private @Mock Context mContext;
|
|
private @Mock DevicePolicyManagerWrapper mDevicePolicyManager;
|
|
private @Mock PackageManagerWrapper mPackageManagerWrapper;
|
|
private @Mock PackageManager mPackageManager;
|
|
private @Mock UserManager mUserManager;
|
|
private @Mock ConnectivityManagerWrapper mConnectivityManger;
|
|
private Resources mResources;
|
|
|
|
private EnterprisePrivacyFeatureProvider mProvider;
|
|
|
|
@Before
|
|
public void setUp() {
|
|
MockitoAnnotations.initMocks(this);
|
|
|
|
when(mContext.getApplicationContext()).thenReturn(mContext);
|
|
resetAndInitializePackageManagerWrapper();
|
|
when(mUserManager.getProfiles(MY_USER_ID)).thenReturn(mProfiles);
|
|
mProfiles.add(new UserInfo(MY_USER_ID, "", "", 0 /* flags */));
|
|
mResources = ShadowApplication.getInstance().getApplicationContext().getResources();
|
|
|
|
mProvider = new EnterprisePrivacyFeatureProviderImpl(mContext, mDevicePolicyManager,
|
|
mPackageManagerWrapper, mUserManager, mConnectivityManger, mResources);
|
|
}
|
|
|
|
@Test
|
|
public void testHasDeviceOwner() {
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(null);
|
|
assertThat(mProvider.hasDeviceOwner()).isFalse();
|
|
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(OWNER);
|
|
assertThat(mProvider.hasDeviceOwner()).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testIsInCompMode() {
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(OWNER);
|
|
assertThat(mProvider.isInCompMode()).isFalse();
|
|
|
|
mProfiles.add(new UserInfo(MANAGED_PROFILE_USER_ID, "", "", UserInfo.FLAG_MANAGED_PROFILE));
|
|
assertThat(mProvider.isInCompMode()).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testGetDeviceOwnerOrganizationName() {
|
|
when(mDevicePolicyManager.getDeviceOwnerOrganizationName()).thenReturn(null);
|
|
assertThat(mProvider.getDeviceOwnerOrganizationName()).isNull();
|
|
|
|
when(mDevicePolicyManager.getDeviceOwnerOrganizationName()).thenReturn(OWNER_ORGANIZATION);
|
|
assertThat(mProvider.getDeviceOwnerOrganizationName()).isEqualTo(OWNER_ORGANIZATION);
|
|
}
|
|
|
|
@Test
|
|
public void testGetDeviceOwnerDisclosure() {
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(null);
|
|
assertThat(mProvider.getDeviceOwnerDisclosure()).isNull();
|
|
|
|
SpannableStringBuilder disclosure = new SpannableStringBuilder();
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_generic));
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_learn_more_separator));
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_learn_more),
|
|
new EnterprisePrivacyFeatureProviderImpl.EnterprisePrivacySpan(mContext), 0);
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(OWNER);
|
|
when(mDevicePolicyManager.getDeviceOwnerOrganizationName()).thenReturn(null);
|
|
assertThat(mProvider.getDeviceOwnerDisclosure()).isEqualTo(disclosure);
|
|
|
|
disclosure = new SpannableStringBuilder();
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_with_name,
|
|
OWNER_ORGANIZATION));
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_learn_more_separator));
|
|
disclosure.append(mResources.getString(R.string.do_disclosure_learn_more),
|
|
new EnterprisePrivacyFeatureProviderImpl.EnterprisePrivacySpan(mContext), 0);
|
|
when(mDevicePolicyManager.getDeviceOwnerOrganizationName()).thenReturn(OWNER_ORGANIZATION);
|
|
assertThat(mProvider.getDeviceOwnerDisclosure()).isEqualTo(disclosure);
|
|
}
|
|
|
|
@Test
|
|
public void testGetLastSecurityLogRetrievalTime() {
|
|
when(mDevicePolicyManager.getLastSecurityLogRetrievalTime()).thenReturn(-1L);
|
|
assertThat(mProvider.getLastSecurityLogRetrievalTime()).isNull();
|
|
|
|
when(mDevicePolicyManager.getLastSecurityLogRetrievalTime())
|
|
.thenReturn(TIMESTAMP.getTime());
|
|
assertThat(mProvider.getLastSecurityLogRetrievalTime()).isEqualTo(TIMESTAMP);
|
|
}
|
|
|
|
@Test
|
|
public void testGetLastBugReportRequestTime() {
|
|
when(mDevicePolicyManager.getLastBugReportRequestTime()).thenReturn(-1L);
|
|
assertThat(mProvider.getLastBugReportRequestTime()).isNull();
|
|
|
|
when(mDevicePolicyManager.getLastBugReportRequestTime()).thenReturn(TIMESTAMP.getTime());
|
|
assertThat(mProvider.getLastBugReportRequestTime()).isEqualTo(TIMESTAMP);
|
|
}
|
|
|
|
@Test
|
|
public void testGetLastNetworkLogRetrievalTime() {
|
|
when(mDevicePolicyManager.getLastNetworkLogRetrievalTime()).thenReturn(-1L);
|
|
assertThat(mProvider.getLastNetworkLogRetrievalTime()).isNull();
|
|
|
|
when(mDevicePolicyManager.getLastNetworkLogRetrievalTime()).thenReturn(TIMESTAMP.getTime());
|
|
assertThat(mProvider.getLastNetworkLogRetrievalTime()).isEqualTo(TIMESTAMP);
|
|
}
|
|
|
|
@Test
|
|
public void testIsAlwaysOnVpnSetInPrimaryUser() {
|
|
when(mConnectivityManger.getAlwaysOnVpnPackageForUser(MY_USER_ID)).thenReturn(null);
|
|
assertThat(mProvider.isAlwaysOnVpnSetInPrimaryUser()).isFalse();
|
|
|
|
when(mConnectivityManger.getAlwaysOnVpnPackageForUser(MY_USER_ID))
|
|
.thenReturn(VPN_PACKAGE_ID);
|
|
assertThat(mProvider.isAlwaysOnVpnSetInPrimaryUser()).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testIsAlwaysOnVpnSetInManagedProfileProfile() {
|
|
assertThat(mProvider.isAlwaysOnVpnSetInManagedProfile()).isFalse();
|
|
|
|
mProfiles.add(new UserInfo(MANAGED_PROFILE_USER_ID, "", "", UserInfo.FLAG_MANAGED_PROFILE));
|
|
|
|
when(mConnectivityManger.getAlwaysOnVpnPackageForUser(MANAGED_PROFILE_USER_ID))
|
|
.thenReturn(null);
|
|
assertThat(mProvider.isAlwaysOnVpnSetInManagedProfile()).isFalse();
|
|
|
|
when(mConnectivityManger.getAlwaysOnVpnPackageForUser(MANAGED_PROFILE_USER_ID))
|
|
.thenReturn(VPN_PACKAGE_ID);
|
|
assertThat(mProvider.isAlwaysOnVpnSetInManagedProfile()).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testIsGlobalHttpProxySet() {
|
|
when(mConnectivityManger.getGlobalProxy()).thenReturn(null);
|
|
assertThat(mProvider.isGlobalHttpProxySet()).isFalse();
|
|
|
|
when(mConnectivityManger.getGlobalProxy()).thenReturn(
|
|
ProxyInfo.buildDirectProxy("localhost", 123));
|
|
assertThat(mProvider.isGlobalHttpProxySet()).isTrue();
|
|
}
|
|
|
|
@Test
|
|
public void testGetMaximumFailedPasswordsForWipeInPrimaryUser() {
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(null);
|
|
when(mDevicePolicyManager.getDeviceOwnerUserId()).thenReturn(UserHandle.USER_NULL);
|
|
assertThat(mProvider.getMaximumFailedPasswordsBeforeWipeInPrimaryUser()).isEqualTo(0);
|
|
|
|
when(mDevicePolicyManager.getDeviceOwnerComponentOnAnyUser()).thenReturn(OWNER);
|
|
when(mDevicePolicyManager.getDeviceOwnerUserId()).thenReturn(UserHandle.USER_SYSTEM);
|
|
when(mDevicePolicyManager.getMaximumFailedPasswordsForWipe(OWNER, UserHandle.USER_SYSTEM))
|
|
.thenReturn(10);
|
|
assertThat(mProvider.getMaximumFailedPasswordsBeforeWipeInPrimaryUser()).isEqualTo(10);
|
|
}
|
|
|
|
@Test
|
|
public void testGetMaximumFailedPasswordsForWipeInManagedProfile() {
|
|
when(mDevicePolicyManager.getProfileOwnerAsUser(MANAGED_PROFILE_USER_ID)).thenReturn(OWNER);
|
|
when(mDevicePolicyManager.getMaximumFailedPasswordsForWipe(OWNER, MANAGED_PROFILE_USER_ID))
|
|
.thenReturn(10);
|
|
|
|
assertThat(mProvider.getMaximumFailedPasswordsBeforeWipeInManagedProfile()).isEqualTo(0);
|
|
|
|
mProfiles.add(new UserInfo(MANAGED_PROFILE_USER_ID, "", "", UserInfo.FLAG_MANAGED_PROFILE));
|
|
assertThat(mProvider.getMaximumFailedPasswordsBeforeWipeInManagedProfile()).isEqualTo(10);
|
|
}
|
|
|
|
@Test
|
|
public void testGetImeLabelIfOwnerSet() throws Exception {
|
|
final ApplicationInfo applicationInfo = mock(ApplicationInfo.class);
|
|
when(applicationInfo.loadLabel(mPackageManager)).thenReturn(IME_PACKAGE_LABEL);
|
|
|
|
Settings.Secure.putString(null, Settings.Secure.DEFAULT_INPUT_METHOD, IME_PACKAGE_ID);
|
|
when(mPackageManagerWrapper.getApplicationInfoAsUser(IME_PACKAGE_ID, 0, MY_USER_ID))
|
|
.thenReturn(applicationInfo);
|
|
|
|
// IME not set by Device Owner.
|
|
when(mDevicePolicyManager.isCurrentInputMethodSetByOwner()).thenReturn(false);
|
|
assertThat(mProvider.getImeLabelIfOwnerSet()).isNull();
|
|
|
|
// Device Owner set IME to empty string.
|
|
when(mDevicePolicyManager.isCurrentInputMethodSetByOwner()).thenReturn(true);
|
|
Settings.Secure.putString(null, Settings.Secure.DEFAULT_INPUT_METHOD, null);
|
|
assertThat(mProvider.getImeLabelIfOwnerSet()).isNull();
|
|
|
|
// Device Owner set IME to nonexistent package.
|
|
Settings.Secure.putString(null, Settings.Secure.DEFAULT_INPUT_METHOD, IME_PACKAGE_ID);
|
|
when(mPackageManagerWrapper.getApplicationInfoAsUser(IME_PACKAGE_ID, 0, MY_USER_ID))
|
|
.thenThrow(new PackageManager.NameNotFoundException());
|
|
assertThat(mProvider.getImeLabelIfOwnerSet()).isNull();
|
|
|
|
// Device Owner set IME to existent package.
|
|
resetAndInitializePackageManagerWrapper();
|
|
when(mPackageManagerWrapper.getApplicationInfoAsUser(IME_PACKAGE_ID, 0, MY_USER_ID))
|
|
.thenReturn(applicationInfo);
|
|
assertThat(mProvider.getImeLabelIfOwnerSet()).isEqualTo(IME_PACKAGE_LABEL);
|
|
}
|
|
|
|
@Test
|
|
public void testGetNumberOfOwnerInstalledCaCertsInCurrentUser() {
|
|
final UserHandle userHandle = new UserHandle(UserHandle.USER_SYSTEM);
|
|
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(null);
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInCurrentUser()).isEqualTo(0);
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(new ArrayList<String>());
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInCurrentUser()).isEqualTo(0);
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(Arrays.asList(new String[] {"ca1", "ca2"}));
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInCurrentUser()).isEqualTo(2);
|
|
}
|
|
|
|
@Test
|
|
public void testGetNumberOfOwnerInstalledCaCertsInManagedProfile() {
|
|
final UserHandle userHandle = new UserHandle(MANAGED_PROFILE_USER_ID);
|
|
final UserInfo managedProfile =
|
|
new UserInfo(MANAGED_PROFILE_USER_ID, "", "", UserInfo.FLAG_MANAGED_PROFILE);
|
|
|
|
mProfiles.add(managedProfile);
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(null);
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInManagedProfile()).isEqualTo(0);
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(new ArrayList<String>());
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInManagedProfile()).isEqualTo(0);
|
|
when(mDevicePolicyManager.getOwnerInstalledCaCerts(userHandle))
|
|
.thenReturn(Arrays.asList(new String[] {"ca1", "ca2"}));
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInManagedProfile()).isEqualTo(2);
|
|
|
|
mProfiles.remove(managedProfile);
|
|
assertThat(mProvider.getNumberOfOwnerInstalledCaCertsInManagedProfile()).isEqualTo(0);
|
|
}
|
|
|
|
@Test
|
|
public void testGetNumberOfActiveDeviceAdminsForCurrentUserAndManagedProfile() {
|
|
when(mDevicePolicyManager.getActiveAdminsAsUser(MY_USER_ID))
|
|
.thenReturn(Arrays.asList(new ComponentName[] {ADMIN_1, ADMIN_2}));
|
|
when(mDevicePolicyManager.getActiveAdminsAsUser(MANAGED_PROFILE_USER_ID))
|
|
.thenReturn(Arrays.asList(new ComponentName[] {ADMIN_1}));
|
|
|
|
assertThat(mProvider.getNumberOfActiveDeviceAdminsForCurrentUserAndManagedProfile())
|
|
.isEqualTo(2);
|
|
|
|
mProfiles.add(new UserInfo(MANAGED_PROFILE_USER_ID, "", "", UserInfo.FLAG_MANAGED_PROFILE));
|
|
assertThat(mProvider.getNumberOfActiveDeviceAdminsForCurrentUserAndManagedProfile())
|
|
.isEqualTo(3);
|
|
}
|
|
|
|
private void resetAndInitializePackageManagerWrapper() {
|
|
reset(mPackageManagerWrapper);
|
|
when(mPackageManagerWrapper.hasSystemFeature(PackageManager.FEATURE_DEVICE_ADMIN))
|
|
.thenReturn(true);
|
|
when(mPackageManagerWrapper.getPackageManager()).thenReturn(mPackageManager);
|
|
}
|
|
}
|