diff options
| author | 2023-11-02 21:18:43 -0700 | |
|---|---|---|
| committer | 2023-11-07 18:21:14 +0000 | |
| commit | 8193fbf49a663f5723ba69eac95f327a9736e8bf (patch) | |
| tree | ebbcfb6a6028ff681e70b5cbcaa3db8ec21ab2b6 | |
| parent | 3c144386a39dfc34229b67b2c61cd1502a9b17d9 (diff) | |
arc: Update installCaCert for upstreaming
Instead of checking for Build.IS_ARC use an injector property.
Bug: 301629133
Test: m
Change-Id: Ie847107bd48244182096198a834fc840480c6c69
| -rw-r--r-- | services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java b/services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java index 1ff117e2c60b..fbedfe3c7b18 100644 --- a/services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java +++ b/services/devicepolicy/java/com/android/server/devicepolicy/DevicePolicyManagerService.java @@ -2011,6 +2011,10 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub { DeviceManagementResourcesProvider getDeviceManagementResourcesProvider() { return new DeviceManagementResourcesProvider(); } + + boolean isAdminInstalledCaCertAutoApproved() { + return false; + } } /** @@ -6145,6 +6149,18 @@ public class DevicePolicyManagerService extends IDevicePolicyManager.Stub { .setAdmin(caller.getPackageName()) .setBoolean(/* isDelegate */ admin == null) .write(); + + if (mInjector.isAdminInstalledCaCertAutoApproved() + && installedAlias != null + && admin != null) { + // If device admin called this, approve cert to avoid notifications + Slogf.i(LOG_TAG, "Approving admin installed cert"); + approveCaCert( + installedAlias, + caller.getUserId(), + /* approved */ true); + } + return installedAlias; }); |