blob: 473aec60da8482ab80e825dc93efea73eb1d3125 [file] [log] [blame]
Dianne Hackbornd6847842010-01-12 18:14:19 -08001/*
2 * Copyright (C) 2010 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Dianne Hackborn87bba1e2010-02-26 17:25:54 -080017package android.app.admin;
Dianne Hackbornd6847842010-01-12 18:14:19 -080018
19import android.annotation.SdkConstant;
20import android.annotation.SdkConstant.SdkConstantType;
Dianne Hackborn87bba1e2010-02-26 17:25:54 -080021import android.app.Service;
Dianne Hackbornd6847842010-01-12 18:14:19 -080022import android.content.BroadcastReceiver;
23import android.content.ComponentName;
24import android.content.Context;
25import android.content.Intent;
Dianne Hackborn8ea138c2010-01-26 18:01:04 -080026import android.os.Bundle;
Dianne Hackbornd6847842010-01-12 18:14:19 -080027
28/**
29 * Base class for implementing a device administration component. This
30 * class provides a convenience for interpreting the raw intent actions
31 * that are sent by the system.
32 *
Dianne Hackbornef6b22f2010-02-16 20:38:49 -080033 * <p>The callback methods, like the base
34 * {@link BroadcastReceiver#onReceive(Context, Intent) BroadcastReceiver.onReceive()}
35 * method, happen on the main thread of the process. Thus long running
36 * operations must be done on another thread. Note that because a receiver
37 * is done once returning from its receive function, such long-running operations
38 * should probably be done in a {@link Service}.
39 *
Dianne Hackbornd6847842010-01-12 18:14:19 -080040 * <p>When publishing your DeviceAdmin subclass as a receiver, it must
41 * handle {@link #ACTION_DEVICE_ADMIN_ENABLED} and require the
42 * {@link android.Manifest.permission#BIND_DEVICE_ADMIN} permission. A typical
43 * manifest entry would look like:</p>
44 *
Dianne Hackbornab8a8ed2010-01-29 19:03:06 -080045 * {@sample development/samples/ApiDemos/AndroidManifest.xml device_admin_declaration}
Dianne Hackbornd6847842010-01-12 18:14:19 -080046 *
47 * <p>The meta-data referenced here provides addition information specific
48 * to the device administrator, as parsed by the {@link DeviceAdminInfo} class.
49 * A typical file would be:</p>
50 *
Andrew Stadler88209d12010-02-08 22:59:36 -080051 * {@sample development/samples/ApiDemos/res/xml/device_admin_sample.xml meta_data}
Dianne Hackbornd6847842010-01-12 18:14:19 -080052 */
Dianne Hackbornef6b22f2010-02-16 20:38:49 -080053public class DeviceAdminReceiver extends BroadcastReceiver {
Dianne Hackbornd6847842010-01-12 18:14:19 -080054 private static String TAG = "DevicePolicy";
Joe Onorato43a17652011-04-06 19:22:23 -070055 private static boolean localLOGV = false;
Dianne Hackbornd6847842010-01-12 18:14:19 -080056
57 /**
58 * This is the primary action that a device administrator must implement to be
59 * allowed to manage a device. This will be set to the receiver
60 * when the user enables it for administration. You will generally
Dianne Hackbornef6b22f2010-02-16 20:38:49 -080061 * handle this in {@link DeviceAdminReceiver#onEnabled(Context, Intent)}. To be
Dianne Hackbornd6847842010-01-12 18:14:19 -080062 * supported, the receiver must also require the
63 * {@link android.Manifest.permission#BIND_DEVICE_ADMIN} permission so
64 * that other applications can not abuse it.
65 */
66 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
67 public static final String ACTION_DEVICE_ADMIN_ENABLED
68 = "android.app.action.DEVICE_ADMIN_ENABLED";
69
70 /**
Dianne Hackborn8ea138c2010-01-26 18:01:04 -080071 * Action sent to a device administrator when the user has requested to
72 * disable it, but before this has actually been done. This gives you
73 * a chance to supply a message to the user about the impact of
74 * disabling your admin, by setting the extra field
75 * {@link #EXTRA_DISABLE_WARNING} in the result Intent. If not set,
76 * no warning will be displayed. If set, the given text will be shown
77 * to the user before they disable your admin.
78 */
79 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
80 public static final String ACTION_DEVICE_ADMIN_DISABLE_REQUESTED
81 = "android.app.action.DEVICE_ADMIN_DISABLE_REQUESTED";
82
83 /**
84 * A CharSequence that can be shown to the user informing them of the
85 * impact of disabling your admin.
86 *
87 * @see #ACTION_DEVICE_ADMIN_DISABLE_REQUESTED
88 */
89 public static final String EXTRA_DISABLE_WARNING = "android.app.extra.DISABLE_WARNING";
90
91 /**
Dianne Hackbornd6847842010-01-12 18:14:19 -080092 * Action sent to a device administrator when the user has disabled
93 * it. Upon return, the application no longer has access to the
94 * protected device policy manager APIs. You will generally
Dianne Hackbornef6b22f2010-02-16 20:38:49 -080095 * handle this in {@link DeviceAdminReceiver#onDisabled(Context, Intent)}. Note
Dianne Hackbornd6847842010-01-12 18:14:19 -080096 * that this action will be
97 * sent the receiver regardless of whether it is explicitly listed in
98 * its intent filter.
99 */
100 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
101 public static final String ACTION_DEVICE_ADMIN_DISABLED
102 = "android.app.action.DEVICE_ADMIN_DISABLED";
103
104 /**
105 * Action sent to a device administrator when the user has changed the
106 * password of their device. You can at this point check the characteristics
Dianne Hackborn254cb442010-01-27 19:23:59 -0800107 * of the new password with {@link DevicePolicyManager#isActivePasswordSufficient()
108 * DevicePolicyManager.isActivePasswordSufficient()}.
109 * You will generally
Dianne Hackbornef6b22f2010-02-16 20:38:49 -0800110 * handle this in {@link DeviceAdminReceiver#onPasswordChanged}.
Dianne Hackborn8aa2e892010-01-22 11:31:30 -0800111 *
112 * <p>The calling device admin must have requested
113 * {@link DeviceAdminInfo#USES_POLICY_LIMIT_PASSWORD} to receive
114 * this broadcast.
Dianne Hackbornd6847842010-01-12 18:14:19 -0800115 */
116 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
117 public static final String ACTION_PASSWORD_CHANGED
118 = "android.app.action.ACTION_PASSWORD_CHANGED";
119
120 /**
121 * Action sent to a device administrator when the user has failed at
122 * attempted to enter the password. You can at this point check the
123 * number of failed password attempts there have been with
Dianne Hackborn254cb442010-01-27 19:23:59 -0800124 * {@link DevicePolicyManager#getCurrentFailedPasswordAttempts
Dianne Hackbornd6847842010-01-12 18:14:19 -0800125 * DevicePolicyManager.getCurrentFailedPasswordAttempts()}. You will generally
Dianne Hackbornef6b22f2010-02-16 20:38:49 -0800126 * handle this in {@link DeviceAdminReceiver#onPasswordFailed}.
Dianne Hackborn8aa2e892010-01-22 11:31:30 -0800127 *
128 * <p>The calling device admin must have requested
129 * {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} to receive
130 * this broadcast.
Dianne Hackbornd6847842010-01-12 18:14:19 -0800131 */
132 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
133 public static final String ACTION_PASSWORD_FAILED
134 = "android.app.action.ACTION_PASSWORD_FAILED";
135
136 /**
137 * Action sent to a device administrator when the user has successfully
138 * entered their password, after failing one or more times.
Dianne Hackborn8aa2e892010-01-22 11:31:30 -0800139 *
140 * <p>The calling device admin must have requested
141 * {@link DeviceAdminInfo#USES_POLICY_WATCH_LOGIN} to receive
142 * this broadcast.
Dianne Hackbornd6847842010-01-12 18:14:19 -0800143 */
144 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
145 public static final String ACTION_PASSWORD_SUCCEEDED
146 = "android.app.action.ACTION_PASSWORD_SUCCEEDED";
Jim Millera4e28d12010-11-08 16:15:47 -0800147
148 /**
149 * Action periodically sent to a device administrator when the device password
Jim Miller6b857682011-02-16 16:27:41 -0800150 * is expiring.
Jim Millera4e28d12010-11-08 16:15:47 -0800151 *
152 * <p>The calling device admin must have requested
153 * {@link DeviceAdminInfo#USES_POLICY_EXPIRE_PASSWORD} to receive
154 * this broadcast.
155 */
156 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
157 public static final String ACTION_PASSWORD_EXPIRING
158 = "android.app.action.ACTION_PASSWORD_EXPIRING";
159
Dianne Hackbornd6847842010-01-12 18:14:19 -0800160 /**
161 * Name under which an DevicePolicy component publishes information
162 * about itself. This meta-data must reference an XML resource containing
163 * a device-admin tag. XXX TO DO: describe syntax.
164 */
165 public static final String DEVICE_ADMIN_META_DATA = "android.app.device_admin";
166
167 private DevicePolicyManager mManager;
168 private ComponentName mWho;
169
170 /**
171 * Retrieve the DevicePolicyManager interface for this administrator to work
172 * with the system.
173 */
174 public DevicePolicyManager getManager(Context context) {
175 if (mManager != null) {
176 return mManager;
177 }
178 mManager = (DevicePolicyManager)context.getSystemService(
179 Context.DEVICE_POLICY_SERVICE);
180 return mManager;
181 }
182
183 /**
184 * Retrieve the ComponentName describing who this device administrator is, for
185 * use in {@link DevicePolicyManager} APIs that require the administrator to
186 * identify itself.
187 */
188 public ComponentName getWho(Context context) {
189 if (mWho != null) {
190 return mWho;
191 }
192 mWho = new ComponentName(context, getClass());
193 return mWho;
194 }
195
196 /**
197 * Called after the administrator is first enabled, as a result of
198 * receiving {@link #ACTION_DEVICE_ADMIN_ENABLED}. At this point you
199 * can use {@link DevicePolicyManager} to set your desired policies.
200 * @param context The running context as per {@link #onReceive}.
201 * @param intent The received intent as per {@link #onReceive}.
202 */
203 public void onEnabled(Context context, Intent intent) {
204 }
205
206 /**
Dianne Hackborn8ea138c2010-01-26 18:01:04 -0800207 * Called when the user has asked to disable the administrator, as a result of
208 * receiving {@link #ACTION_DEVICE_ADMIN_DISABLE_REQUESTED}, giving you
209 * a chance to present a warning message to them. The message is returned
210 * as the result; if null is returned (the default implementation), no
211 * message will be displayed.
212 * @param context The running context as per {@link #onReceive}.
213 * @param intent The received intent as per {@link #onReceive}.
214 * @return Return the warning message to display to the user before
215 * being disabled; if null is returned, no message is displayed.
216 */
217 public CharSequence onDisableRequested(Context context, Intent intent) {
218 return null;
219 }
220
221 /**
Dianne Hackbornd6847842010-01-12 18:14:19 -0800222 * Called prior to the administrator being disabled, as a result of
223 * receiving {@link #ACTION_DEVICE_ADMIN_DISABLED}. Upon return, you
224 * can no longer use the protected parts of the {@link DevicePolicyManager}
225 * API.
226 * @param context The running context as per {@link #onReceive}.
227 * @param intent The received intent as per {@link #onReceive}.
228 */
229 public void onDisabled(Context context, Intent intent) {
230 }
231
232 /**
233 * Called after the user has changed their password, as a result of
234 * receiving {@link #ACTION_PASSWORD_CHANGED}. At this point you
235 * can use {@link DevicePolicyManager#getCurrentFailedPasswordAttempts()
236 * DevicePolicyManager.getCurrentFailedPasswordAttempts()}
237 * to retrieve the active password characteristics.
238 * @param context The running context as per {@link #onReceive}.
239 * @param intent The received intent as per {@link #onReceive}.
240 */
241 public void onPasswordChanged(Context context, Intent intent) {
242 }
243
244 /**
245 * Called after the user has failed at entering their current password, as a result of
246 * receiving {@link #ACTION_PASSWORD_FAILED}. At this point you
247 * can use {@link DevicePolicyManager} to retrieve the number of failed
248 * password attempts.
249 * @param context The running context as per {@link #onReceive}.
250 * @param intent The received intent as per {@link #onReceive}.
251 */
252 public void onPasswordFailed(Context context, Intent intent) {
253 }
254
255 /**
256 * Called after the user has succeeded at entering their current password,
257 * as a result of receiving {@link #ACTION_PASSWORD_SUCCEEDED}. This will
258 * only be received the first time they succeed after having previously
259 * failed.
260 * @param context The running context as per {@link #onReceive}.
261 * @param intent The received intent as per {@link #onReceive}.
262 */
263 public void onPasswordSucceeded(Context context, Intent intent) {
264 }
Jim Millera4e28d12010-11-08 16:15:47 -0800265
266 /**
267 * Called periodically when the password is about to expire or has expired. It will typically
Jim Miller6b857682011-02-16 16:27:41 -0800268 * be called at these times: on device boot, once per day before the password expires,
269 * and at the time when the password expires.
Jim Millera4e28d12010-11-08 16:15:47 -0800270 *
271 * <p>If the password is not updated by the user, this method will continue to be called
272 * once per day until the password is changed or the device admin disables password expiration.
273 *
274 * <p>The admin will typically post a notification requesting the user to change their password
275 * in response to this call. The actual password expiration time can be obtained by calling
276 * {@link DevicePolicyManager#getPasswordExpiration(ComponentName) }
277 *
278 * <p>The admin should be sure to take down any notifications it posted in response to this call
279 * when it receives {@link DeviceAdminReceiver#onPasswordChanged(Context, Intent) }.
280 *
281 * @param context The running context as per {@link #onReceive}.
282 * @param intent The received intent as per {@link #onReceive}.
283 */
284 public void onPasswordExpiring(Context context, Intent intent) {
285 }
286
Dianne Hackbornd6847842010-01-12 18:14:19 -0800287 /**
288 * Intercept standard device administrator broadcasts. Implementations
289 * should not override this method; it is better to implement the
290 * convenience callbacks for each action.
291 */
292 @Override
293 public void onReceive(Context context, Intent intent) {
294 String action = intent.getAction();
295 if (ACTION_PASSWORD_CHANGED.equals(action)) {
296 onPasswordChanged(context, intent);
297 } else if (ACTION_PASSWORD_FAILED.equals(action)) {
298 onPasswordFailed(context, intent);
299 } else if (ACTION_PASSWORD_SUCCEEDED.equals(action)) {
300 onPasswordSucceeded(context, intent);
301 } else if (ACTION_DEVICE_ADMIN_ENABLED.equals(action)) {
302 onEnabled(context, intent);
Dianne Hackborn8ea138c2010-01-26 18:01:04 -0800303 } else if (ACTION_DEVICE_ADMIN_DISABLE_REQUESTED.equals(action)) {
304 CharSequence res = onDisableRequested(context, intent);
305 if (res != null) {
306 Bundle extras = getResultExtras(true);
307 extras.putCharSequence(EXTRA_DISABLE_WARNING, res);
308 }
Dianne Hackbornd6847842010-01-12 18:14:19 -0800309 } else if (ACTION_DEVICE_ADMIN_DISABLED.equals(action)) {
310 onDisabled(context, intent);
Jim Millera4e28d12010-11-08 16:15:47 -0800311 } else if (ACTION_PASSWORD_EXPIRING.equals(action)) {
312 onPasswordExpiring(context, intent);
Dianne Hackbornd6847842010-01-12 18:14:19 -0800313 }
314 }
315}