Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit d6618dde authored by Pavel Grafov's avatar Pavel Grafov
Browse files

Clean up fully rolled out PolicyEngineMigrationV2Enabled

Flag was rolled out in Android V. Keeping the flag definition since it is exported.

Bug: 335663055
Test: TH
Flag: EXEMPT flag cleanup
Change-Id: I27f5b443b42c86be3040893b21913d63a51a53cf
parent cc862807
Loading
Loading
Loading
Loading
+2 −2
Original line number Diff line number Diff line
@@ -7964,13 +7964,13 @@ package android.app.admin {
    field public static final String LOCK_TASK_POLICY = "lockTask";
    field public static final String PACKAGES_SUSPENDED_POLICY = "packagesSuspended";
    field public static final String PACKAGE_UNINSTALL_BLOCKED_POLICY = "packageUninstallBlocked";
    field @FlaggedApi("android.app.admin.flags.policy_engine_migration_v2_enabled") public static final String PASSWORD_COMPLEXITY_POLICY = "passwordComplexity";
    field public static final String PASSWORD_COMPLEXITY_POLICY = "passwordComplexity";
    field public static final String PERMISSION_GRANT_POLICY = "permissionGrant";
    field public static final String PERSISTENT_PREFERRED_ACTIVITY_POLICY = "persistentPreferredActivity";
    field public static final String RESET_PASSWORD_TOKEN_POLICY = "resetPasswordToken";
    field public static final String SECURITY_LOGGING_POLICY = "securityLogging";
    field public static final String STATUS_BAR_DISABLED_POLICY = "statusBarDisabled";
    field @FlaggedApi("android.app.admin.flags.policy_engine_migration_v2_enabled") public static final String USB_DATA_SIGNALING_POLICY = "usbDataSignaling";
    field public static final String USB_DATA_SIGNALING_POLICY = "usbDataSignaling";
    field public static final String USER_CONTROL_DISABLED_PACKAGES_POLICY = "userControlDisabledPackages";
  }
+0 −4
Original line number Diff line number Diff line
@@ -16,8 +16,6 @@

package android.app.admin;

import static android.app.admin.flags.Flags.FLAG_POLICY_ENGINE_MIGRATION_V2_ENABLED;

import android.annotation.FlaggedApi;
import android.annotation.NonNull;
import android.annotation.SystemApi;
@@ -185,13 +183,11 @@ public final class DevicePolicyIdentifiers {
    /**
     * String identifier for {@link DevicePolicyManager#setUsbDataSignalingEnabled}.
     */
    @FlaggedApi(FLAG_POLICY_ENGINE_MIGRATION_V2_ENABLED)
    public static final String USB_DATA_SIGNALING_POLICY = "usbDataSignaling";

    /**
     * String identifier for {@link DevicePolicyManager#setRequiredPasswordComplexity}.
     */
    @FlaggedApi(FLAG_POLICY_ENGINE_MIGRATION_V2_ENABLED)
    public static final String PASSWORD_COMPLEXITY_POLICY = "passwordComplexity";

    /**
+1 −0
Original line number Diff line number Diff line
@@ -4,6 +4,7 @@
package: "android.app.admin.flags"
container: "system"

# Fully rolled out and must not be used.
flag {
  name: "policy_engine_migration_v2_enabled"
  is_exported: true
+0 −5
Original line number Diff line number Diff line
@@ -1325,11 +1325,6 @@ class ActiveAdmin {
        pw.print("encryptionRequested=");
        pw.println(encryptionRequested);

        if (!Flags.policyEngineMigrationV2Enabled()) {
            pw.print("mUsbDataSignaling=");
            pw.println(mUsbDataSignalingEnabled);
        }

        pw.print("disableCallerId=");
        pw.println(disableCallerId);

+13 −48
Original line number Diff line number Diff line
@@ -3695,9 +3695,6 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub {
            }
            revertTransferOwnershipIfNecessaryLocked();
            if (!Flags.policyEngineMigrationV2Enabled()) {
                updateUsbDataSignal(mContext, isUsbDataSignalingEnabledInternalLocked());
            }
        }
        // Check whether work apps were paused via suspension and unsuspend if necessary.
@@ -22455,17 +22452,7 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub {
        Objects.requireNonNull(packageName, "Admin package name must be provided");
        final CallerIdentity caller = getCallerIdentity(packageName);
        if (!Flags.policyEngineMigrationV2Enabled()) {
            Preconditions.checkCallAuthorization(
                    isDefaultDeviceOwner(caller) || isProfileOwnerOfOrganizationOwnedDevice(caller),
                    "USB data signaling can only be controlled by a device owner or "
                            + "a profile owner on an organization-owned device.");
            Preconditions.checkState(canUsbDataSignalingBeDisabled(),
                    "USB data signaling cannot be disabled.");
        }
        synchronized (getLockObject()) {
            if (Flags.policyEngineMigrationV2Enabled()) {
            EnforcingAdmin enforcingAdmin = enforcePermissionAndGetEnforcingAdmin(
                    /* admin= */ null, MANAGE_DEVICE_POLICY_USB_DATA_SIGNALLING,
                    caller.getPackageName(),
@@ -22476,14 +22463,6 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub {
                    PolicyDefinition.USB_DATA_SIGNALING,
                    enforcingAdmin,
                    new BooleanPolicyValue(enabled));
            } else {
                ActiveAdmin admin = getProfileOwnerOrDeviceOwnerLocked(caller.getUserId());
                if (admin.mUsbDataSignalingEnabled != enabled) {
                    admin.mUsbDataSignalingEnabled = enabled;
                    saveSettingsLocked(caller.getUserId());
                    updateUsbDataSignal(mContext, isUsbDataSignalingEnabledInternalLocked());
                }
            }
        }
        DevicePolicyEventLogger
                .createEvent(DevicePolicyEnums.SET_USB_DATA_SIGNALING)
@@ -22505,24 +22484,10 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub {
    @Override
    public boolean isUsbDataSignalingEnabled(String packageName) {
        final CallerIdentity caller = getCallerIdentity(packageName);
        if (Flags.policyEngineMigrationV2Enabled()) {
        Boolean enabled = mDevicePolicyEngine.getResolvedPolicy(
                PolicyDefinition.USB_DATA_SIGNALING,
                caller.getUserId());
        return enabled == null || enabled;
        } else {
            synchronized (getLockObject()) {
                // If the caller is an admin, return the policy set by itself. Otherwise
                // return the device-wide policy.
                if (isDefaultDeviceOwner(caller) || isProfileOwnerOfOrganizationOwnedDevice(
                        caller)) {
                    return getProfileOwnerOrDeviceOwnerLocked(
                            caller.getUserId()).mUsbDataSignalingEnabled;
                } else {
                    return isUsbDataSignalingEnabledInternalLocked();
                }
            }
        }
    }
    private boolean isUsbDataSignalingEnabledInternalLocked() {