Java tutorial
/* * Copyright (C) 2014 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package com.android.cts.intent.sender; import android.content.ClipData; import android.content.ContentResolver; import android.content.Context; import android.content.Intent; import android.net.Uri; import android.support.v4.content.FileProvider; import android.test.InstrumentationTestCase; import android.util.Log; import java.io.BufferedReader; import java.io.File; import java.io.FileWriter; import java.io.IOException; import java.io.InputStream; import java.io.InputStreamReader; public class IntentSenderTest extends InstrumentationTestCase { private static final String MESSAGE = "Sample Message"; private static final String ACTION_READ_FROM_URI = "com.android.cts.action.READ_FROM_URI"; private static final String ACTION_WRITE_TO_URI = "com.android.cts.action.WRITE_TO_URI"; private static final String ACTION_TAKE_PERSISTABLE_URI_PERMISSION = "com.android.cts.action.TAKE_PERSISTABLE_URI_PERMISSION"; private static final String TAG = "CrossProfileContentTest"; private Context mContext; private IntentSenderActivity mActivity; @Override protected void setUp() throws Exception { super.setUp(); mContext = getInstrumentation().getTargetContext(); mActivity = launchActivity(mContext.getPackageName(), IntentSenderActivity.class, null); } @Override public void tearDown() throws Exception { super.tearDown(); mActivity.finish(); } /** * This method will send an intent to a receiver in another profile. * This intent will have, in the ClipData, a uri whose associated file stores a message. * The receiver will read the message from the uri, and put it inside the result intent. */ public void testReceiverCanRead() throws Exception { Uri uri = getUriWithTextInFile("reading_test", MESSAGE); assertTrue(uri != null); Intent intent = new Intent(ACTION_READ_FROM_URI); intent.setClipData(ClipData.newRawUri("", uri)); intent.addFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION); final Intent result = mActivity.getResult(intent); assertNotNull(result); assertEquals(MESSAGE, result.getStringExtra("extra_response")); } /** * This method will send an intent to a receiver in another profile. * This intent will have a message in an extra, and a uri specified by the ClipData. * The receiver will read the message from the extra, and write it to the uri in * the ClipData. */ public void testReceiverCanWrite() throws Exception { // It's the receiver of the intent that should write to the uri, not us. So, for now, we // write an empty string. Uri uri = getUriWithTextInFile("writing_test", ""); assertTrue(uri != null); Intent intent = new Intent(ACTION_WRITE_TO_URI); intent.setClipData(ClipData.newRawUri("", uri)); intent.putExtra("extra_message", MESSAGE); intent.addFlags(Intent.FLAG_GRANT_WRITE_URI_PERMISSION | Intent.FLAG_GRANT_READ_URI_PERMISSION); mActivity.getResult(intent); assertEquals(MESSAGE, getFirstLineFromUri(uri)); } public void testPersistablePermission() throws Exception { Uri uri = getUriWithTextInFile("persistable_test", MESSAGE); grantPersistableReadPermission(uri); // Now checking if the receiver can read this uri, without re-granting the read permission. Intent intent = new Intent(ACTION_READ_FROM_URI); intent.setClipData(ClipData.newRawUri("", uri)); final Intent result = mActivity.getResult(intent); assertNotNull(result); assertEquals(MESSAGE, result.getStringExtra("extra_response")); } /** * The intent receiver will try to read uriNotGranted. * Inside the same user, this uri can be read if the receiver has the * com.android.cts.managedprofile.permission.SAMPLE permission. But since we cross * user-boundaries, it should not be able to (only uri grants work accross users for apps * without special permission). * We also grant uriGranted to the receiver (this uri belongs to the same content provider as * uriNotGranted), to enforce that even if an app has permission to one uri of a * ContentProvider, it still cannot access a uri it does not have access to. */ public void testAppPermissionsDontWorkAcrossProfiles() throws Exception { // The FileProvider does not allow to use app permissions. So we need to use another // ContentProvider. Uri uriGranted = getBasicContentProviderUri("uri_granted"); Uri uriNotGranted = getBasicContentProviderUri("uri_not_granted"); // Granting uriGranted to the receiver // Using a persistable permission so that it is kept even after we restart the receiver // activity with another intent. grantPersistableReadPermission(uriGranted); Intent notGrant = new Intent(ACTION_READ_FROM_URI); notGrant.setClipData(ClipData.newRawUri("", uriNotGranted)); final Intent result = mActivity.getResult(notGrant); assertNotNull(result); // The receiver did not have permission to read the uri. So it should have caught a security // exception. assertTrue(result.getBooleanExtra("extra_caught_security_exception", false)); } /** * Ensure that sender is only able to send data that it has access to. */ public void testSecurity() throws Exception { // Pick a URI that neither of us have access to; it doens't matter if // its missing, since we expect a SE before a FNFE. final Uri uri = Uri.parse("content://media/external/images/media/10240"); final Intent intent = new Intent(ACTION_READ_FROM_URI); intent.setClipData(ClipData.newRawUri("", uri)); intent.addFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION); // We're expecting to run into a security exception final Intent result = mActivity.getResult(intent); if (result == null) { // This is fine; probably of a SecurityException when off in the // system somewhere. } else { // But if we somehow came through, make sure they threw. assertTrue(result.getBooleanExtra("extra_caught_security_exception", false)); } } private void grantPersistableReadPermission(Uri uri) throws Exception { Intent grantPersistable = new Intent(ACTION_TAKE_PERSISTABLE_URI_PERMISSION); grantPersistable.setClipData(ClipData.newRawUri("", uri)); grantPersistable .addFlags(Intent.FLAG_GRANT_READ_URI_PERMISSION | Intent.FLAG_GRANT_PERSISTABLE_URI_PERMISSION); mActivity.getResult(grantPersistable); } private Uri getBasicContentProviderUri(String path) { // The uris created here are not associated with any data. But this does not prevent us from // granting these uris to other apps, or these apps from trying to access these uris. return new Uri.Builder().scheme(ContentResolver.SCHEME_CONTENT) .authority("com.android.cts.intent.sender.provider").path(path).build(); } private Uri getUriWithTextInFile(String name, String text) { String filename = mContext.getFilesDir() + File.separator + "texts" + File.separator + name + ".txt"; Log.i(TAG, "Creating file " + filename + " with text \"" + text + "\""); final File file = new File(filename); file.getParentFile().mkdirs(); // If the folder doesn't exists it is created try { FileWriter writer = new FileWriter(file); writer.write(text); writer.close(); } catch (IOException e) { Log.e(TAG, "Could not create file " + filename + " with text " + text); return null; } return FileProvider.getUriForFile(mContext, "com.android.cts.intent.sender.fileprovider", file); } /** * Returns the first line of the file associated with uri. */ private String getFirstLineFromUri(Uri uri) { try { InputStream is = mContext.getContentResolver().openInputStream(uri); BufferedReader r = new BufferedReader(new InputStreamReader(is)); return r.readLine(); } catch (IOException e) { Log.e(TAG, "could not read the uri " + uri); return null; } } }