mirror of
https://github.com/Divested-Mobile/DivestOS-Build.git
synced 2024-10-01 01:35:54 -04:00
7f00fd1dde
Signed-off-by: Tavi <tavi@divested.dev>
135 lines
7.5 KiB
Diff
135 lines
7.5 KiB
Diff
From c0c16283997bbca63edc79d820652587cbde15bb Mon Sep 17 00:00:00 2001
|
|
From: Valentin Iftime <valiiftime@google.com>
|
|
Date: Thu, 1 Feb 2024 13:58:49 +0100
|
|
Subject: [PATCH] Verify URI permission for channel sound update from
|
|
NotificationListenerService
|
|
|
|
Check that a privileged NotificationListenerService (CDM) has the permission to access the sound URI
|
|
when updating a notification channel.
|
|
|
|
Test: atest com.android.server.notification.NotificationManagerServiceTest#testUpdateNotificationChannelFromPrivilegedListener_noSoundUriPermission
|
|
Bug: 317357401
|
|
(cherry picked from commit 9b7bbbf5ad542ecf9ecbf8cd819b468791b443c0)
|
|
(cherry picked from https://googleplex-android-review.googlesource.com/q/commit:2f26c0def503d3b8032c99adc8a11be87e35cdeb)
|
|
Merged-In: Ic7d2e96e43565e98d2aa29b8f2ba35c142387ba9
|
|
Change-Id: Ic7d2e96e43565e98d2aa29b8f2ba35c142387ba9
|
|
---
|
|
.../NotificationManagerService.java | 22 +++++++
|
|
.../NotificationManagerServiceTest.java | 63 +++++++++++++++++++
|
|
2 files changed, 85 insertions(+)
|
|
|
|
diff --git a/services/core/java/com/android/server/notification/NotificationManagerService.java b/services/core/java/com/android/server/notification/NotificationManagerService.java
|
|
index ecd446519c09..4d1abc61aa73 100755
|
|
--- a/services/core/java/com/android/server/notification/NotificationManagerService.java
|
|
+++ b/services/core/java/com/android/server/notification/NotificationManagerService.java
|
|
@@ -5705,6 +5705,10 @@ public void updateNotificationChannelFromPrivilegedListener(INotificationListene
|
|
Objects.requireNonNull(user);
|
|
|
|
verifyPrivilegedListener(token, user, false);
|
|
+
|
|
+ final NotificationChannel originalChannel = mPreferencesHelper.getNotificationChannel(
|
|
+ pkg, getUidForPackageAndUser(pkg, user), channel.getId(), true);
|
|
+ verifyPrivilegedListenerUriPermission(Binder.getCallingUid(), channel, originalChannel);
|
|
updateNotificationChannelInt(pkg, getUidForPackageAndUser(pkg, user), channel, true);
|
|
}
|
|
|
|
@@ -5796,6 +5800,24 @@ private void verifyPrivilegedListener(INotificationListener token, UserHandle us
|
|
}
|
|
}
|
|
|
|
+ private void verifyPrivilegedListenerUriPermission(int sourceUid,
|
|
+ @NonNull NotificationChannel updateChannel,
|
|
+ @Nullable NotificationChannel originalChannel) {
|
|
+ // Check that the NLS has the required permissions to access the channel
|
|
+ final Uri soundUri = updateChannel.getSound();
|
|
+ final Uri originalSoundUri =
|
|
+ (originalChannel != null) ? originalChannel.getSound() : null;
|
|
+ if (soundUri != null && !Objects.equals(originalSoundUri, soundUri)) {
|
|
+ Binder.withCleanCallingIdentity(() -> {
|
|
+ mUgmInternal.checkGrantUriPermission(sourceUid, null,
|
|
+ ContentProvider.getUriWithoutUserId(soundUri),
|
|
+ Intent.FLAG_GRANT_READ_URI_PERMISSION,
|
|
+ ContentProvider.getUserIdFromUri(soundUri,
|
|
+ UserHandle.getUserId(sourceUid)));
|
|
+ });
|
|
+ }
|
|
+ }
|
|
+
|
|
private int getUidForPackageAndUser(String pkg, UserHandle user) throws RemoteException {
|
|
int uid = INVALID_UID;
|
|
final long identity = Binder.clearCallingIdentity();
|
|
diff --git a/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java b/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
|
|
index 4f0a7ca0ad51..755bc1d35cf3 100755
|
|
--- a/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
|
|
+++ b/services/tests/uiservicestests/src/com/android/server/notification/NotificationManagerServiceTest.java
|
|
@@ -3319,6 +3319,69 @@ public void testUpdateNotificationChannelFromPrivilegedListener_badUser() throws
|
|
eq(NotificationListenerService.NOTIFICATION_CHANNEL_OR_GROUP_UPDATED));
|
|
}
|
|
|
|
+ @Test
|
|
+ public void testUpdateNotificationChannelFromPrivilegedListener_noSoundUriPermission()
|
|
+ throws Exception {
|
|
+ mService.setPreferencesHelper(mPreferencesHelper);
|
|
+ when(mCompanionMgr.getAssociations(PKG, UserHandle.getUserId(mUid)))
|
|
+ .thenReturn(singletonList(mock(AssociationInfo.class)));
|
|
+ when(mPreferencesHelper.getNotificationChannel(eq(PKG), anyInt(),
|
|
+ eq(mTestNotificationChannel.getId()), anyBoolean()))
|
|
+ .thenReturn(mTestNotificationChannel);
|
|
+
|
|
+ final Uri soundUri = Uri.parse("content://media/test/sound/uri");
|
|
+ final NotificationChannel updatedNotificationChannel = new NotificationChannel(
|
|
+ TEST_CHANNEL_ID, TEST_CHANNEL_ID, IMPORTANCE_DEFAULT);
|
|
+ updatedNotificationChannel.setSound(soundUri,
|
|
+ updatedNotificationChannel.getAudioAttributes());
|
|
+
|
|
+ doThrow(new SecurityException("no access")).when(mUgmInternal)
|
|
+ .checkGrantUriPermission(eq(Process.myUid()), any(), eq(soundUri),
|
|
+ anyInt(), eq(Process.myUserHandle().getIdentifier()));
|
|
+
|
|
+ assertThrows(SecurityException.class,
|
|
+ () -> mBinderService.updateNotificationChannelFromPrivilegedListener(null, PKG,
|
|
+ Process.myUserHandle(), updatedNotificationChannel));
|
|
+
|
|
+ verify(mPreferencesHelper, never()).updateNotificationChannel(
|
|
+ anyString(), anyInt(), any(), anyBoolean());
|
|
+
|
|
+ verify(mListeners, never()).notifyNotificationChannelChanged(eq(PKG),
|
|
+ eq(Process.myUserHandle()), eq(mTestNotificationChannel),
|
|
+ eq(NotificationListenerService.NOTIFICATION_CHANNEL_OR_GROUP_UPDATED));
|
|
+ }
|
|
+
|
|
+ @Test
|
|
+ public void testUpdateNotificationChannelFromPrivilegedListener_noSoundUriPermission_sameSound()
|
|
+ throws Exception {
|
|
+ mService.setPreferencesHelper(mPreferencesHelper);
|
|
+ when(mCompanionMgr.getAssociations(PKG, UserHandle.getUserId(mUid)))
|
|
+ .thenReturn(singletonList(mock(AssociationInfo.class)));
|
|
+ when(mPreferencesHelper.getNotificationChannel(eq(PKG), anyInt(),
|
|
+ eq(mTestNotificationChannel.getId()), anyBoolean()))
|
|
+ .thenReturn(mTestNotificationChannel);
|
|
+
|
|
+ final Uri soundUri = Settings.System.DEFAULT_NOTIFICATION_URI;
|
|
+ final NotificationChannel updatedNotificationChannel = new NotificationChannel(
|
|
+ TEST_CHANNEL_ID, TEST_CHANNEL_ID, IMPORTANCE_DEFAULT);
|
|
+ updatedNotificationChannel.setSound(soundUri,
|
|
+ updatedNotificationChannel.getAudioAttributes());
|
|
+
|
|
+ doThrow(new SecurityException("no access")).when(mUgmInternal)
|
|
+ .checkGrantUriPermission(eq(Process.myUid()), any(), eq(soundUri),
|
|
+ anyInt(), eq(Process.myUserHandle().getIdentifier()));
|
|
+
|
|
+ mBinderService.updateNotificationChannelFromPrivilegedListener(
|
|
+ null, PKG, Process.myUserHandle(), updatedNotificationChannel);
|
|
+
|
|
+ verify(mPreferencesHelper, times(1)).updateNotificationChannel(
|
|
+ anyString(), anyInt(), any(), anyBoolean());
|
|
+
|
|
+ verify(mListeners, never()).notifyNotificationChannelChanged(eq(PKG),
|
|
+ eq(Process.myUserHandle()), eq(mTestNotificationChannel),
|
|
+ eq(NotificationListenerService.NOTIFICATION_CHANNEL_OR_GROUP_UPDATED));
|
|
+ }
|
|
+
|
|
@Test
|
|
public void testGetNotificationChannelFromPrivilegedListener_cdm_success() throws Exception {
|
|
mService.setPreferencesHelper(mPreferencesHelper);
|