/* * Copyright (C) 2015 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License */ package com.android.providers.contacts.util; import android.content.Context; import android.content.Intent; import android.content.pm.PackageManager; import android.net.Uri; import android.os.Binder; import android.os.Process; import android.util.Log; public class ContactsPermissions { private static final String TAG = "ContactsPermissions"; private static final boolean DEBUG = false; // DO NOT submit with true // Normally, we allow calls from self, *except* in unit tests, where we clear this flag // to emulate calls from other apps. public static boolean ALLOW_SELF_CALL = true; private ContactsPermissions() { } public static boolean hasCallerOrSelfPermission(Context context, String permission) { boolean ok = false; if (ALLOW_SELF_CALL && Binder.getCallingPid() == Process.myPid()) { ok = true; // Called by self; always allow. } else { ok = context.checkCallingOrSelfPermission(permission) == PackageManager.PERMISSION_GRANTED; } if (DEBUG) { Log.d(TAG, "hasCallerOrSelfPermission: " + " perm=" + permission + " caller=" + Binder.getCallingPid() + " self=" + Process.myPid() + " ok=" + ok); } return ok; } public static void enforceCallingOrSelfPermission(Context context, String permission) { final boolean ok = hasCallerOrSelfPermission(context, permission); if (!ok) { throw new SecurityException(String.format("The caller must have the %s permission.", permission)); } } public static boolean hasPackagePermission(Context context, String permission, String pkg) { boolean ok = false; if (ALLOW_SELF_CALL && context.getPackageName().equals(pkg)) { ok = true; // Called by self; always allow. } else { ok = context.getPackageManager().checkPermission(permission, pkg) == PackageManager.PERMISSION_GRANTED; } if (DEBUG) { Log.d(TAG, "hasCallerOrSelfPermission: " + " perm=" + permission + " pkg=" + pkg + " self=" + context.getPackageName() + " ok=" + ok); } return ok; } public static boolean hasCallerUriPermission(Context context, Uri uri, int modeFlags) { boolean ok = false; if (ALLOW_SELF_CALL && Binder.getCallingPid() == Process.myPid()) { ok = true; // Called by self; always allow. } else { ok = context.checkCallingUriPermission(uri, modeFlags) == PackageManager.PERMISSION_GRANTED; } if (DEBUG) { Log.d(TAG, "hasCallerUriPermission: " + " uri=" + uri + " caller=" + Binder.getCallingPid() + " self=" + Process.myPid() + " ok=" + ok); } return ok; } }