blob: d3f07d80b5ef2a93c5a1861a602880a0281c9b0d [file] [log] [blame]
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package android.net;
17
18import static android.annotation.SystemApi.Client.MODULE_LIBRARIES;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090019import static android.net.NetworkRequest.Type.BACKGROUND_REQUEST;
20import static android.net.NetworkRequest.Type.LISTEN;
21import static android.net.NetworkRequest.Type.REQUEST;
junyulai5a5c99b2021-03-05 15:51:17 +080022import static android.net.NetworkRequest.Type.TRACK_BEST;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090023import static android.net.NetworkRequest.Type.TRACK_DEFAULT;
Lorenzo Colittia77d05e2021-01-29 20:14:04 +090024import static android.net.NetworkRequest.Type.TRACK_SYSTEM_DEFAULT;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090025import static android.net.QosCallback.QosCallbackRegistrationException;
26
27import android.annotation.CallbackExecutor;
28import android.annotation.IntDef;
29import android.annotation.NonNull;
30import android.annotation.Nullable;
31import android.annotation.RequiresPermission;
32import android.annotation.SdkConstant;
33import android.annotation.SdkConstant.SdkConstantType;
34import android.annotation.SuppressLint;
35import android.annotation.SystemApi;
36import android.annotation.SystemService;
37import android.app.PendingIntent;
38import android.compat.annotation.UnsupportedAppUsage;
39import android.content.Context;
40import android.content.Intent;
41import android.net.IpSecManager.UdpEncapsulationSocket;
42import android.net.SocketKeepalive.Callback;
43import android.net.TetheringManager.StartTetheringCallback;
44import android.net.TetheringManager.TetheringEventCallback;
45import android.net.TetheringManager.TetheringRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -080046import android.net.wifi.WifiNetworkSuggestion;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090047import android.os.Binder;
48import android.os.Build;
49import android.os.Build.VERSION_CODES;
50import android.os.Bundle;
51import android.os.Handler;
52import android.os.IBinder;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090053import android.os.Looper;
54import android.os.Message;
55import android.os.Messenger;
56import android.os.ParcelFileDescriptor;
57import android.os.PersistableBundle;
58import android.os.Process;
59import android.os.RemoteException;
60import android.os.ResultReceiver;
61import android.os.ServiceManager;
62import android.os.ServiceSpecificException;
63import android.provider.Settings;
64import android.telephony.SubscriptionManager;
65import android.telephony.TelephonyManager;
66import android.util.ArrayMap;
67import android.util.Log;
68import android.util.Range;
69import android.util.SparseIntArray;
70
71import com.android.connectivity.aidl.INetworkAgent;
72import com.android.internal.annotations.GuardedBy;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090073import com.android.internal.util.Protocol;
74
75import libcore.net.event.NetworkEventDispatcher;
76
77import java.io.IOException;
78import java.io.UncheckedIOException;
79import java.lang.annotation.Retention;
80import java.lang.annotation.RetentionPolicy;
81import java.net.DatagramSocket;
82import java.net.InetAddress;
83import java.net.InetSocketAddress;
84import java.net.Socket;
85import java.util.ArrayList;
86import java.util.Collection;
87import java.util.HashMap;
88import java.util.List;
89import java.util.Map;
90import java.util.Objects;
91import java.util.concurrent.Executor;
92import java.util.concurrent.ExecutorService;
93import java.util.concurrent.Executors;
94import java.util.concurrent.RejectedExecutionException;
95
96/**
97 * Class that answers queries about the state of network connectivity. It also
98 * notifies applications when network connectivity changes.
99 * <p>
100 * The primary responsibilities of this class are to:
101 * <ol>
102 * <li>Monitor network connections (Wi-Fi, GPRS, UMTS, etc.)</li>
103 * <li>Send broadcast intents when network connectivity changes</li>
104 * <li>Attempt to "fail over" to another network when connectivity to a network
105 * is lost</li>
106 * <li>Provide an API that allows applications to query the coarse-grained or fine-grained
107 * state of the available networks</li>
108 * <li>Provide an API that allows applications to request and select networks for their data
109 * traffic</li>
110 * </ol>
111 */
112@SystemService(Context.CONNECTIVITY_SERVICE)
113public class ConnectivityManager {
114 private static final String TAG = "ConnectivityManager";
115 private static final boolean DEBUG = Log.isLoggable(TAG, Log.DEBUG);
116
117 /**
118 * A change in network connectivity has occurred. A default connection has either
119 * been established or lost. The NetworkInfo for the affected network is
120 * sent as an extra; it should be consulted to see what kind of
121 * connectivity event occurred.
122 * <p/>
123 * Apps targeting Android 7.0 (API level 24) and higher do not receive this
124 * broadcast if they declare the broadcast receiver in their manifest. Apps
125 * will still receive broadcasts if they register their
126 * {@link android.content.BroadcastReceiver} with
127 * {@link android.content.Context#registerReceiver Context.registerReceiver()}
128 * and that context is still valid.
129 * <p/>
130 * If this is a connection that was the result of failing over from a
131 * disconnected network, then the FAILOVER_CONNECTION boolean extra is
132 * set to true.
133 * <p/>
134 * For a loss of connectivity, if the connectivity manager is attempting
135 * to connect (or has already connected) to another network, the
136 * NetworkInfo for the new network is also passed as an extra. This lets
137 * any receivers of the broadcast know that they should not necessarily
138 * tell the user that no data traffic will be possible. Instead, the
139 * receiver should expect another broadcast soon, indicating either that
140 * the failover attempt succeeded (and so there is still overall data
141 * connectivity), or that the failover attempt failed, meaning that all
142 * connectivity has been lost.
143 * <p/>
144 * For a disconnect event, the boolean extra EXTRA_NO_CONNECTIVITY
145 * is set to {@code true} if there are no connected networks at all.
146 *
147 * @deprecated apps should use the more versatile {@link #requestNetwork},
148 * {@link #registerNetworkCallback} or {@link #registerDefaultNetworkCallback}
149 * functions instead for faster and more detailed updates about the network
150 * changes they care about.
151 */
152 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
153 @Deprecated
154 public static final String CONNECTIVITY_ACTION = "android.net.conn.CONNECTIVITY_CHANGE";
155
156 /**
157 * The device has connected to a network that has presented a captive
158 * portal, which is blocking Internet connectivity. The user was presented
159 * with a notification that network sign in is required,
160 * and the user invoked the notification's action indicating they
161 * desire to sign in to the network. Apps handling this activity should
162 * facilitate signing in to the network. This action includes a
163 * {@link Network} typed extra called {@link #EXTRA_NETWORK} that represents
164 * the network presenting the captive portal; all communication with the
165 * captive portal must be done using this {@code Network} object.
166 * <p/>
167 * This activity includes a {@link CaptivePortal} extra named
168 * {@link #EXTRA_CAPTIVE_PORTAL} that can be used to indicate different
169 * outcomes of the captive portal sign in to the system:
170 * <ul>
171 * <li> When the app handling this action believes the user has signed in to
172 * the network and the captive portal has been dismissed, the app should
173 * call {@link CaptivePortal#reportCaptivePortalDismissed} so the system can
174 * reevaluate the network. If reevaluation finds the network no longer
175 * subject to a captive portal, the network may become the default active
176 * data network.</li>
177 * <li> When the app handling this action believes the user explicitly wants
178 * to ignore the captive portal and the network, the app should call
179 * {@link CaptivePortal#ignoreNetwork}. </li>
180 * </ul>
181 */
182 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
183 public static final String ACTION_CAPTIVE_PORTAL_SIGN_IN = "android.net.conn.CAPTIVE_PORTAL";
184
185 /**
186 * The lookup key for a {@link NetworkInfo} object. Retrieve with
187 * {@link android.content.Intent#getParcelableExtra(String)}.
188 *
189 * @deprecated The {@link NetworkInfo} object is deprecated, as many of its properties
190 * can't accurately represent modern network characteristics.
191 * Please obtain information about networks from the {@link NetworkCapabilities}
192 * or {@link LinkProperties} objects instead.
193 */
194 @Deprecated
195 public static final String EXTRA_NETWORK_INFO = "networkInfo";
196
197 /**
198 * Network type which triggered a {@link #CONNECTIVITY_ACTION} broadcast.
199 *
200 * @see android.content.Intent#getIntExtra(String, int)
201 * @deprecated The network type is not rich enough to represent the characteristics
202 * of modern networks. Please use {@link NetworkCapabilities} instead,
203 * in particular the transports.
204 */
205 @Deprecated
206 public static final String EXTRA_NETWORK_TYPE = "networkType";
207
208 /**
209 * The lookup key for a boolean that indicates whether a connect event
210 * is for a network to which the connectivity manager was failing over
211 * following a disconnect on another network.
212 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
213 *
214 * @deprecated See {@link NetworkInfo}.
215 */
216 @Deprecated
217 public static final String EXTRA_IS_FAILOVER = "isFailover";
218 /**
219 * The lookup key for a {@link NetworkInfo} object. This is supplied when
220 * there is another network that it may be possible to connect to. Retrieve with
221 * {@link android.content.Intent#getParcelableExtra(String)}.
222 *
223 * @deprecated See {@link NetworkInfo}.
224 */
225 @Deprecated
226 public static final String EXTRA_OTHER_NETWORK_INFO = "otherNetwork";
227 /**
228 * The lookup key for a boolean that indicates whether there is a
229 * complete lack of connectivity, i.e., no network is available.
230 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
231 */
232 public static final String EXTRA_NO_CONNECTIVITY = "noConnectivity";
233 /**
234 * The lookup key for a string that indicates why an attempt to connect
235 * to a network failed. The string has no particular structure. It is
236 * intended to be used in notifications presented to users. Retrieve
237 * it with {@link android.content.Intent#getStringExtra(String)}.
238 */
239 public static final String EXTRA_REASON = "reason";
240 /**
241 * The lookup key for a string that provides optionally supplied
242 * extra information about the network state. The information
243 * may be passed up from the lower networking layers, and its
244 * meaning may be specific to a particular network type. Retrieve
245 * it with {@link android.content.Intent#getStringExtra(String)}.
246 *
247 * @deprecated See {@link NetworkInfo#getExtraInfo()}.
248 */
249 @Deprecated
250 public static final String EXTRA_EXTRA_INFO = "extraInfo";
251 /**
252 * The lookup key for an int that provides information about
253 * our connection to the internet at large. 0 indicates no connection,
254 * 100 indicates a great connection. Retrieve it with
255 * {@link android.content.Intent#getIntExtra(String, int)}.
256 * {@hide}
257 */
258 public static final String EXTRA_INET_CONDITION = "inetCondition";
259 /**
260 * The lookup key for a {@link CaptivePortal} object included with the
261 * {@link #ACTION_CAPTIVE_PORTAL_SIGN_IN} intent. The {@code CaptivePortal}
262 * object can be used to either indicate to the system that the captive
263 * portal has been dismissed or that the user does not want to pursue
264 * signing in to captive portal. Retrieve it with
265 * {@link android.content.Intent#getParcelableExtra(String)}.
266 */
267 public static final String EXTRA_CAPTIVE_PORTAL = "android.net.extra.CAPTIVE_PORTAL";
268
269 /**
270 * Key for passing a URL to the captive portal login activity.
271 */
272 public static final String EXTRA_CAPTIVE_PORTAL_URL = "android.net.extra.CAPTIVE_PORTAL_URL";
273
274 /**
275 * Key for passing a {@link android.net.captiveportal.CaptivePortalProbeSpec} to the captive
276 * portal login activity.
277 * {@hide}
278 */
279 @SystemApi
280 public static final String EXTRA_CAPTIVE_PORTAL_PROBE_SPEC =
281 "android.net.extra.CAPTIVE_PORTAL_PROBE_SPEC";
282
283 /**
284 * Key for passing a user agent string to the captive portal login activity.
285 * {@hide}
286 */
287 @SystemApi
288 public static final String EXTRA_CAPTIVE_PORTAL_USER_AGENT =
289 "android.net.extra.CAPTIVE_PORTAL_USER_AGENT";
290
291 /**
292 * Broadcast action to indicate the change of data activity status
293 * (idle or active) on a network in a recent period.
294 * The network becomes active when data transmission is started, or
295 * idle if there is no data transmission for a period of time.
296 * {@hide}
297 */
298 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
299 public static final String ACTION_DATA_ACTIVITY_CHANGE =
300 "android.net.conn.DATA_ACTIVITY_CHANGE";
301 /**
302 * The lookup key for an enum that indicates the network device type on which this data activity
303 * change happens.
304 * {@hide}
305 */
306 public static final String EXTRA_DEVICE_TYPE = "deviceType";
307 /**
308 * The lookup key for a boolean that indicates the device is active or not. {@code true} means
309 * it is actively sending or receiving data and {@code false} means it is idle.
310 * {@hide}
311 */
312 public static final String EXTRA_IS_ACTIVE = "isActive";
313 /**
314 * The lookup key for a long that contains the timestamp (nanos) of the radio state change.
315 * {@hide}
316 */
317 public static final String EXTRA_REALTIME_NS = "tsNanos";
318
319 /**
320 * Broadcast Action: The setting for background data usage has changed
321 * values. Use {@link #getBackgroundDataSetting()} to get the current value.
322 * <p>
323 * If an application uses the network in the background, it should listen
324 * for this broadcast and stop using the background data if the value is
325 * {@code false}.
326 * <p>
327 *
328 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability
329 * of background data depends on several combined factors, and
330 * this broadcast is no longer sent. Instead, when background
331 * data is unavailable, {@link #getActiveNetworkInfo()} will now
332 * appear disconnected. During first boot after a platform
333 * upgrade, this broadcast will be sent once if
334 * {@link #getBackgroundDataSetting()} was {@code false} before
335 * the upgrade.
336 */
337 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
338 @Deprecated
339 public static final String ACTION_BACKGROUND_DATA_SETTING_CHANGED =
340 "android.net.conn.BACKGROUND_DATA_SETTING_CHANGED";
341
342 /**
343 * Broadcast Action: The network connection may not be good
344 * uses {@code ConnectivityManager.EXTRA_INET_CONDITION} and
345 * {@code ConnectivityManager.EXTRA_NETWORK_INFO} to specify
346 * the network and it's condition.
347 * @hide
348 */
349 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
350 @UnsupportedAppUsage
351 public static final String INET_CONDITION_ACTION =
352 "android.net.conn.INET_CONDITION_ACTION";
353
354 /**
355 * Broadcast Action: A tetherable connection has come or gone.
356 * Uses {@code ConnectivityManager.EXTRA_AVAILABLE_TETHER},
357 * {@code ConnectivityManager.EXTRA_ACTIVE_LOCAL_ONLY},
358 * {@code ConnectivityManager.EXTRA_ACTIVE_TETHER}, and
359 * {@code ConnectivityManager.EXTRA_ERRORED_TETHER} to indicate
360 * the current state of tethering. Each include a list of
361 * interface names in that state (may be empty).
362 * @hide
363 */
364 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
365 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
366 public static final String ACTION_TETHER_STATE_CHANGED =
367 TetheringManager.ACTION_TETHER_STATE_CHANGED;
368
369 /**
370 * @hide
371 * gives a String[] listing all the interfaces configured for
372 * tethering and currently available for tethering.
373 */
374 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
375 public static final String EXTRA_AVAILABLE_TETHER = TetheringManager.EXTRA_AVAILABLE_TETHER;
376
377 /**
378 * @hide
379 * gives a String[] listing all the interfaces currently in local-only
380 * mode (ie, has DHCPv4+IPv6-ULA support and no packet forwarding)
381 */
382 public static final String EXTRA_ACTIVE_LOCAL_ONLY = TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
383
384 /**
385 * @hide
386 * gives a String[] listing all the interfaces currently tethered
387 * (ie, has DHCPv4 support and packets potentially forwarded/NATed)
388 */
389 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
390 public static final String EXTRA_ACTIVE_TETHER = TetheringManager.EXTRA_ACTIVE_TETHER;
391
392 /**
393 * @hide
394 * gives a String[] listing all the interfaces we tried to tether and
395 * failed. Use {@link #getLastTetherError} to find the error code
396 * for any interfaces listed here.
397 */
398 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
399 public static final String EXTRA_ERRORED_TETHER = TetheringManager.EXTRA_ERRORED_TETHER;
400
401 /**
402 * Broadcast Action: The captive portal tracker has finished its test.
403 * Sent only while running Setup Wizard, in lieu of showing a user
404 * notification.
405 * @hide
406 */
407 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
408 public static final String ACTION_CAPTIVE_PORTAL_TEST_COMPLETED =
409 "android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED";
410 /**
411 * The lookup key for a boolean that indicates whether a captive portal was detected.
412 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
413 * @hide
414 */
415 public static final String EXTRA_IS_CAPTIVE_PORTAL = "captivePortal";
416
417 /**
418 * Action used to display a dialog that asks the user whether to connect to a network that is
419 * not validated. This intent is used to start the dialog in settings via startActivity.
420 *
421 * @hide
422 */
423 public static final String ACTION_PROMPT_UNVALIDATED = "android.net.conn.PROMPT_UNVALIDATED";
424
425 /**
426 * Action used to display a dialog that asks the user whether to avoid a network that is no
427 * longer validated. This intent is used to start the dialog in settings via startActivity.
428 *
429 * @hide
430 */
431 public static final String ACTION_PROMPT_LOST_VALIDATION =
432 "android.net.conn.PROMPT_LOST_VALIDATION";
433
434 /**
435 * Action used to display a dialog that asks the user whether to stay connected to a network
436 * that has not validated. This intent is used to start the dialog in settings via
437 * startActivity.
438 *
439 * @hide
440 */
441 public static final String ACTION_PROMPT_PARTIAL_CONNECTIVITY =
442 "android.net.conn.PROMPT_PARTIAL_CONNECTIVITY";
443
444 /**
445 * Invalid tethering type.
446 * @see #startTethering(int, boolean, OnStartTetheringCallback)
447 * @hide
448 */
449 public static final int TETHERING_INVALID = TetheringManager.TETHERING_INVALID;
450
451 /**
452 * Wifi tethering type.
453 * @see #startTethering(int, boolean, OnStartTetheringCallback)
454 * @hide
455 */
456 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900457 public static final int TETHERING_WIFI = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900458
459 /**
460 * USB tethering type.
461 * @see #startTethering(int, boolean, OnStartTetheringCallback)
462 * @hide
463 */
464 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900465 public static final int TETHERING_USB = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900466
467 /**
468 * Bluetooth tethering type.
469 * @see #startTethering(int, boolean, OnStartTetheringCallback)
470 * @hide
471 */
472 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900473 public static final int TETHERING_BLUETOOTH = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900474
475 /**
476 * Wifi P2p tethering type.
477 * Wifi P2p tethering is set through events automatically, and don't
478 * need to start from #startTethering(int, boolean, OnStartTetheringCallback).
479 * @hide
480 */
481 public static final int TETHERING_WIFI_P2P = TetheringManager.TETHERING_WIFI_P2P;
482
483 /**
484 * Extra used for communicating with the TetherService. Includes the type of tethering to
485 * enable if any.
486 * @hide
487 */
488 public static final String EXTRA_ADD_TETHER_TYPE = TetheringConstants.EXTRA_ADD_TETHER_TYPE;
489
490 /**
491 * Extra used for communicating with the TetherService. Includes the type of tethering for
492 * which to cancel provisioning.
493 * @hide
494 */
495 public static final String EXTRA_REM_TETHER_TYPE = TetheringConstants.EXTRA_REM_TETHER_TYPE;
496
497 /**
498 * Extra used for communicating with the TetherService. True to schedule a recheck of tether
499 * provisioning.
500 * @hide
501 */
502 public static final String EXTRA_SET_ALARM = TetheringConstants.EXTRA_SET_ALARM;
503
504 /**
505 * Tells the TetherService to run a provision check now.
506 * @hide
507 */
508 public static final String EXTRA_RUN_PROVISION = TetheringConstants.EXTRA_RUN_PROVISION;
509
510 /**
511 * Extra used for communicating with the TetherService. Contains the {@link ResultReceiver}
512 * which will receive provisioning results. Can be left empty.
513 * @hide
514 */
515 public static final String EXTRA_PROVISION_CALLBACK =
516 TetheringConstants.EXTRA_PROVISION_CALLBACK;
517
518 /**
519 * The absence of a connection type.
520 * @hide
521 */
522 @SystemApi
523 public static final int TYPE_NONE = -1;
524
525 /**
526 * A Mobile data connection. Devices may support more than one.
527 *
528 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
529 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
530 * appropriate network. {@see NetworkCapabilities} for supported transports.
531 */
532 @Deprecated
533 public static final int TYPE_MOBILE = 0;
534
535 /**
536 * A WIFI data connection. Devices may support more than one.
537 *
538 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
539 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
540 * appropriate network. {@see NetworkCapabilities} for supported transports.
541 */
542 @Deprecated
543 public static final int TYPE_WIFI = 1;
544
545 /**
546 * An MMS-specific Mobile data connection. This network type may use the
547 * same network interface as {@link #TYPE_MOBILE} or it may use a different
548 * one. This is used by applications needing to talk to the carrier's
549 * Multimedia Messaging Service servers.
550 *
551 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
552 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
553 * provides the {@link NetworkCapabilities#NET_CAPABILITY_MMS} capability.
554 */
555 @Deprecated
556 public static final int TYPE_MOBILE_MMS = 2;
557
558 /**
559 * A SUPL-specific Mobile data connection. This network type may use the
560 * same network interface as {@link #TYPE_MOBILE} or it may use a different
561 * one. This is used by applications needing to talk to the carrier's
562 * Secure User Plane Location servers for help locating the device.
563 *
564 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
565 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
566 * provides the {@link NetworkCapabilities#NET_CAPABILITY_SUPL} capability.
567 */
568 @Deprecated
569 public static final int TYPE_MOBILE_SUPL = 3;
570
571 /**
572 * A DUN-specific Mobile data connection. This network type may use the
573 * same network interface as {@link #TYPE_MOBILE} or it may use a different
574 * one. This is sometimes by the system when setting up an upstream connection
575 * for tethering so that the carrier is aware of DUN traffic.
576 *
577 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
578 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
579 * provides the {@link NetworkCapabilities#NET_CAPABILITY_DUN} capability.
580 */
581 @Deprecated
582 public static final int TYPE_MOBILE_DUN = 4;
583
584 /**
585 * A High Priority Mobile data connection. This network type uses the
586 * same network interface as {@link #TYPE_MOBILE} but the routing setup
587 * is different.
588 *
589 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
590 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
591 * appropriate network. {@see NetworkCapabilities} for supported transports.
592 */
593 @Deprecated
594 public static final int TYPE_MOBILE_HIPRI = 5;
595
596 /**
597 * A WiMAX data connection.
598 *
599 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
600 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
601 * appropriate network. {@see NetworkCapabilities} for supported transports.
602 */
603 @Deprecated
604 public static final int TYPE_WIMAX = 6;
605
606 /**
607 * A Bluetooth data connection.
608 *
609 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
610 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
611 * appropriate network. {@see NetworkCapabilities} for supported transports.
612 */
613 @Deprecated
614 public static final int TYPE_BLUETOOTH = 7;
615
616 /**
617 * Fake data connection. This should not be used on shipping devices.
618 * @deprecated This is not used any more.
619 */
620 @Deprecated
621 public static final int TYPE_DUMMY = 8;
622
623 /**
624 * An Ethernet data connection.
625 *
626 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
627 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
628 * appropriate network. {@see NetworkCapabilities} for supported transports.
629 */
630 @Deprecated
631 public static final int TYPE_ETHERNET = 9;
632
633 /**
634 * Over the air Administration.
635 * @deprecated Use {@link NetworkCapabilities} instead.
636 * {@hide}
637 */
638 @Deprecated
639 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
640 public static final int TYPE_MOBILE_FOTA = 10;
641
642 /**
643 * IP Multimedia Subsystem.
644 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IMS} instead.
645 * {@hide}
646 */
647 @Deprecated
648 @UnsupportedAppUsage
649 public static final int TYPE_MOBILE_IMS = 11;
650
651 /**
652 * Carrier Branded Services.
653 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_CBS} instead.
654 * {@hide}
655 */
656 @Deprecated
657 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
658 public static final int TYPE_MOBILE_CBS = 12;
659
660 /**
661 * A Wi-Fi p2p connection. Only requesting processes will have access to
662 * the peers connected.
663 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_WIFI_P2P} instead.
664 * {@hide}
665 */
666 @Deprecated
667 @SystemApi
668 public static final int TYPE_WIFI_P2P = 13;
669
670 /**
671 * The network to use for initially attaching to the network
672 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IA} instead.
673 * {@hide}
674 */
675 @Deprecated
676 @UnsupportedAppUsage
677 public static final int TYPE_MOBILE_IA = 14;
678
679 /**
680 * Emergency PDN connection for emergency services. This
681 * may include IMS and MMS in emergency situations.
682 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_EIMS} instead.
683 * {@hide}
684 */
685 @Deprecated
686 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
687 public static final int TYPE_MOBILE_EMERGENCY = 15;
688
689 /**
690 * The network that uses proxy to achieve connectivity.
691 * @deprecated Use {@link NetworkCapabilities} instead.
692 * {@hide}
693 */
694 @Deprecated
695 @SystemApi
696 public static final int TYPE_PROXY = 16;
697
698 /**
699 * A virtual network using one or more native bearers.
700 * It may or may not be providing security services.
701 * @deprecated Applications should use {@link NetworkCapabilities#TRANSPORT_VPN} instead.
702 */
703 @Deprecated
704 public static final int TYPE_VPN = 17;
705
706 /**
707 * A network that is exclusively meant to be used for testing
708 *
709 * @deprecated Use {@link NetworkCapabilities} instead.
710 * @hide
711 */
712 @Deprecated
713 public static final int TYPE_TEST = 18; // TODO: Remove this once NetworkTypes are unused.
714
715 /**
716 * @deprecated Use {@link NetworkCapabilities} instead.
717 * @hide
718 */
719 @Deprecated
720 @Retention(RetentionPolicy.SOURCE)
721 @IntDef(prefix = { "TYPE_" }, value = {
722 TYPE_NONE,
723 TYPE_MOBILE,
724 TYPE_WIFI,
725 TYPE_MOBILE_MMS,
726 TYPE_MOBILE_SUPL,
727 TYPE_MOBILE_DUN,
728 TYPE_MOBILE_HIPRI,
729 TYPE_WIMAX,
730 TYPE_BLUETOOTH,
731 TYPE_DUMMY,
732 TYPE_ETHERNET,
733 TYPE_MOBILE_FOTA,
734 TYPE_MOBILE_IMS,
735 TYPE_MOBILE_CBS,
736 TYPE_WIFI_P2P,
737 TYPE_MOBILE_IA,
738 TYPE_MOBILE_EMERGENCY,
739 TYPE_PROXY,
740 TYPE_VPN,
741 TYPE_TEST
742 })
743 public @interface LegacyNetworkType {}
744
745 // Deprecated constants for return values of startUsingNetworkFeature. They used to live
746 // in com.android.internal.telephony.PhoneConstants until they were made inaccessible.
747 private static final int DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE = 0;
748 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED = 1;
749 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED = 3;
750
751 /** {@hide} */
752 public static final int MAX_RADIO_TYPE = TYPE_TEST;
753
754 /** {@hide} */
755 public static final int MAX_NETWORK_TYPE = TYPE_TEST;
756
757 private static final int MIN_NETWORK_TYPE = TYPE_MOBILE;
758
759 /**
760 * If you want to set the default network preference,you can directly
761 * change the networkAttributes array in framework's config.xml.
762 *
763 * @deprecated Since we support so many more networks now, the single
764 * network default network preference can't really express
765 * the hierarchy. Instead, the default is defined by the
766 * networkAttributes in config.xml. You can determine
767 * the current value by calling {@link #getNetworkPreference()}
768 * from an App.
769 */
770 @Deprecated
771 public static final int DEFAULT_NETWORK_PREFERENCE = TYPE_WIFI;
772
773 /**
774 * @hide
775 */
776 public static final int REQUEST_ID_UNSET = 0;
777
778 /**
779 * Static unique request used as a tombstone for NetworkCallbacks that have been unregistered.
780 * This allows to distinguish when unregistering NetworkCallbacks those that were never
781 * registered from those that were already unregistered.
782 * @hide
783 */
784 private static final NetworkRequest ALREADY_UNREGISTERED =
785 new NetworkRequest.Builder().clearCapabilities().build();
786
787 /**
788 * A NetID indicating no Network is selected.
789 * Keep in sync with bionic/libc/dns/include/resolv_netid.h
790 * @hide
791 */
792 public static final int NETID_UNSET = 0;
793
794 /**
795 * Private DNS Mode values.
796 *
797 * The "private_dns_mode" global setting stores a String value which is
798 * expected to be one of the following.
799 */
800
801 /**
802 * @hide
803 */
804 public static final String PRIVATE_DNS_MODE_OFF = "off";
805 /**
806 * @hide
807 */
808 public static final String PRIVATE_DNS_MODE_OPPORTUNISTIC = "opportunistic";
809 /**
810 * @hide
811 */
812 public static final String PRIVATE_DNS_MODE_PROVIDER_HOSTNAME = "hostname";
813 /**
814 * The default Private DNS mode.
815 *
816 * This may change from release to release or may become dependent upon
817 * the capabilities of the underlying platform.
818 *
819 * @hide
820 */
821 public static final String PRIVATE_DNS_DEFAULT_MODE_FALLBACK = PRIVATE_DNS_MODE_OPPORTUNISTIC;
822
823 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
824 private final IConnectivityManager mService;
Lorenzo Colitti842075e2021-02-04 17:32:07 +0900825
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900826 /**
827 * A kludge to facilitate static access where a Context pointer isn't available, like in the
828 * case of the static set/getProcessDefaultNetwork methods and from the Network class.
829 * TODO: Remove this after deprecating the static methods in favor of non-static methods or
830 * methods that take a Context argument.
831 */
832 private static ConnectivityManager sInstance;
833
834 private final Context mContext;
835
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900836 private INetworkPolicyManager mNPManager;
837 private final TetheringManager mTetheringManager;
838
839 /**
840 * Tests if a given integer represents a valid network type.
841 * @param networkType the type to be tested
842 * @return a boolean. {@code true} if the type is valid, else {@code false}
843 * @deprecated All APIs accepting a network type are deprecated. There should be no need to
844 * validate a network type.
845 */
846 @Deprecated
847 public static boolean isNetworkTypeValid(int networkType) {
848 return MIN_NETWORK_TYPE <= networkType && networkType <= MAX_NETWORK_TYPE;
849 }
850
851 /**
852 * Returns a non-localized string representing a given network type.
853 * ONLY used for debugging output.
854 * @param type the type needing naming
855 * @return a String for the given type, or a string version of the type ("87")
856 * if no name is known.
857 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
858 * {@hide}
859 */
860 @Deprecated
861 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
862 public static String getNetworkTypeName(int type) {
863 switch (type) {
864 case TYPE_NONE:
865 return "NONE";
866 case TYPE_MOBILE:
867 return "MOBILE";
868 case TYPE_WIFI:
869 return "WIFI";
870 case TYPE_MOBILE_MMS:
871 return "MOBILE_MMS";
872 case TYPE_MOBILE_SUPL:
873 return "MOBILE_SUPL";
874 case TYPE_MOBILE_DUN:
875 return "MOBILE_DUN";
876 case TYPE_MOBILE_HIPRI:
877 return "MOBILE_HIPRI";
878 case TYPE_WIMAX:
879 return "WIMAX";
880 case TYPE_BLUETOOTH:
881 return "BLUETOOTH";
882 case TYPE_DUMMY:
883 return "DUMMY";
884 case TYPE_ETHERNET:
885 return "ETHERNET";
886 case TYPE_MOBILE_FOTA:
887 return "MOBILE_FOTA";
888 case TYPE_MOBILE_IMS:
889 return "MOBILE_IMS";
890 case TYPE_MOBILE_CBS:
891 return "MOBILE_CBS";
892 case TYPE_WIFI_P2P:
893 return "WIFI_P2P";
894 case TYPE_MOBILE_IA:
895 return "MOBILE_IA";
896 case TYPE_MOBILE_EMERGENCY:
897 return "MOBILE_EMERGENCY";
898 case TYPE_PROXY:
899 return "PROXY";
900 case TYPE_VPN:
901 return "VPN";
902 default:
903 return Integer.toString(type);
904 }
905 }
906
907 /**
908 * @hide
909 * TODO: Expose for SystemServer when becomes a module.
910 */
911 public void systemReady() {
912 try {
913 mService.systemReady();
914 } catch (RemoteException e) {
915 throw e.rethrowFromSystemServer();
916 }
917 }
918
919 /**
920 * Checks if a given type uses the cellular data connection.
921 * This should be replaced in the future by a network property.
922 * @param networkType the type to check
923 * @return a boolean - {@code true} if uses cellular network, else {@code false}
924 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
925 * {@hide}
926 */
927 @Deprecated
928 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
929 public static boolean isNetworkTypeMobile(int networkType) {
930 switch (networkType) {
931 case TYPE_MOBILE:
932 case TYPE_MOBILE_MMS:
933 case TYPE_MOBILE_SUPL:
934 case TYPE_MOBILE_DUN:
935 case TYPE_MOBILE_HIPRI:
936 case TYPE_MOBILE_FOTA:
937 case TYPE_MOBILE_IMS:
938 case TYPE_MOBILE_CBS:
939 case TYPE_MOBILE_IA:
940 case TYPE_MOBILE_EMERGENCY:
941 return true;
942 default:
943 return false;
944 }
945 }
946
947 /**
948 * Checks if the given network type is backed by a Wi-Fi radio.
949 *
950 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
951 * @hide
952 */
953 @Deprecated
954 public static boolean isNetworkTypeWifi(int networkType) {
955 switch (networkType) {
956 case TYPE_WIFI:
957 case TYPE_WIFI_P2P:
958 return true;
959 default:
960 return false;
961 }
962 }
963
964 /**
965 * Specifies the preferred network type. When the device has more
966 * than one type available the preferred network type will be used.
967 *
968 * @param preference the network type to prefer over all others. It is
969 * unspecified what happens to the old preferred network in the
970 * overall ordering.
971 * @deprecated Functionality has been removed as it no longer makes sense,
972 * with many more than two networks - we'd need an array to express
973 * preference. Instead we use dynamic network properties of
974 * the networks to describe their precedence.
975 */
976 @Deprecated
977 public void setNetworkPreference(int preference) {
978 }
979
980 /**
981 * Retrieves the current preferred network type.
982 *
983 * @return an integer representing the preferred network type
984 *
985 * @deprecated Functionality has been removed as it no longer makes sense,
986 * with many more than two networks - we'd need an array to express
987 * preference. Instead we use dynamic network properties of
988 * the networks to describe their precedence.
989 */
990 @Deprecated
991 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
992 public int getNetworkPreference() {
993 return TYPE_NONE;
994 }
995
996 /**
997 * Returns details about the currently active default data network. When
998 * connected, this network is the default route for outgoing connections.
999 * You should always check {@link NetworkInfo#isConnected()} before initiating
1000 * network traffic. This may return {@code null} when there is no default
1001 * network.
1002 * Note that if the default network is a VPN, this method will return the
1003 * NetworkInfo for one of its underlying networks instead, or null if the
1004 * VPN agent did not specify any. Apps interested in learning about VPNs
1005 * should use {@link #getNetworkInfo(android.net.Network)} instead.
1006 *
1007 * @return a {@link NetworkInfo} object for the current default network
1008 * or {@code null} if no default network is currently active
1009 * @deprecated See {@link NetworkInfo}.
1010 */
1011 @Deprecated
1012 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1013 @Nullable
1014 public NetworkInfo getActiveNetworkInfo() {
1015 try {
1016 return mService.getActiveNetworkInfo();
1017 } catch (RemoteException e) {
1018 throw e.rethrowFromSystemServer();
1019 }
1020 }
1021
1022 /**
1023 * Returns a {@link Network} object corresponding to the currently active
1024 * default data network. In the event that the current active default data
1025 * network disconnects, the returned {@code Network} object will no longer
1026 * be usable. This will return {@code null} when there is no default
1027 * network.
1028 *
1029 * @return a {@link Network} object for the current default network or
1030 * {@code null} if no default network is currently active
1031 */
1032 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1033 @Nullable
1034 public Network getActiveNetwork() {
1035 try {
1036 return mService.getActiveNetwork();
1037 } catch (RemoteException e) {
1038 throw e.rethrowFromSystemServer();
1039 }
1040 }
1041
1042 /**
1043 * Returns a {@link Network} object corresponding to the currently active
1044 * default data network for a specific UID. In the event that the default data
1045 * network disconnects, the returned {@code Network} object will no longer
1046 * be usable. This will return {@code null} when there is no default
1047 * network for the UID.
1048 *
1049 * @return a {@link Network} object for the current default network for the
1050 * given UID or {@code null} if no default network is currently active
1051 *
1052 * @hide
1053 */
1054 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1055 @Nullable
1056 public Network getActiveNetworkForUid(int uid) {
1057 return getActiveNetworkForUid(uid, false);
1058 }
1059
1060 /** {@hide} */
1061 public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) {
1062 try {
1063 return mService.getActiveNetworkForUid(uid, ignoreBlocked);
1064 } catch (RemoteException e) {
1065 throw e.rethrowFromSystemServer();
1066 }
1067 }
1068
1069 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001070 * Adds or removes a requirement for given UID ranges to use the VPN.
1071 *
1072 * If set to {@code true}, informs the system that the UIDs in the specified ranges must not
1073 * have any connectivity except if a VPN is connected and applies to the UIDs, or if the UIDs
1074 * otherwise have permission to bypass the VPN (e.g., because they have the
1075 * {@link android.Manifest.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS} permission, or when
1076 * using a socket protected by a method such as {@link VpnService#protect(DatagramSocket)}. If
1077 * set to {@code false}, a previously-added restriction is removed.
1078 * <p>
1079 * Each of the UID ranges specified by this method is added and removed as is, and no processing
1080 * is performed on the ranges to de-duplicate, merge, split, or intersect them. In order to
1081 * remove a previously-added range, the exact range must be removed as is.
1082 * <p>
1083 * The changes are applied asynchronously and may not have been applied by the time the method
1084 * returns. Apps will be notified about any changes that apply to them via
1085 * {@link NetworkCallback#onBlockedStatusChanged} callbacks called after the changes take
1086 * effect.
1087 * <p>
1088 * This method should be called only by the VPN code.
1089 *
1090 * @param ranges the UID ranges to restrict
1091 * @param requireVpn whether the specified UID ranges must use a VPN
1092 *
1093 * TODO: expose as @SystemApi.
1094 * @hide
1095 */
1096 @RequiresPermission(anyOf = {
1097 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1098 android.Manifest.permission.NETWORK_STACK})
1099 public void setRequireVpnForUids(boolean requireVpn,
1100 @NonNull Collection<Range<Integer>> ranges) {
1101 Objects.requireNonNull(ranges);
1102 // The Range class is not parcelable. Convert to UidRange, which is what is used internally.
1103 // This method is not necessarily expected to be used outside the system server, so
1104 // parceling may not be necessary, but it could be used out-of-process, e.g., by the network
1105 // stack process, or by tests.
1106 UidRange[] rangesArray = new UidRange[ranges.size()];
1107 int index = 0;
1108 for (Range<Integer> range : ranges) {
1109 rangesArray[index++] = new UidRange(range.getLower(), range.getUpper());
1110 }
1111 try {
1112 mService.setRequireVpnForUids(requireVpn, rangesArray);
1113 } catch (RemoteException e) {
1114 throw e.rethrowFromSystemServer();
1115 }
1116 }
1117
1118 /**
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001119 * Informs ConnectivityService of whether the legacy lockdown VPN, as implemented by
1120 * LockdownVpnTracker, is in use. This is deprecated for new devices starting from Android 12
1121 * but is still supported for backwards compatibility.
1122 * <p>
1123 * This type of VPN is assumed always to use the system default network, and must always declare
1124 * exactly one underlying network, which is the network that was the default when the VPN
1125 * connected.
1126 * <p>
1127 * Calling this method with {@code true} enables legacy behaviour, specifically:
1128 * <ul>
1129 * <li>Any VPN that applies to userId 0 behaves specially with respect to deprecated
1130 * {@link #CONNECTIVITY_ACTION} broadcasts. Any such broadcasts will have the state in the
1131 * {@link #EXTRA_NETWORK_INFO} replaced by state of the VPN network. Also, any time the VPN
1132 * connects, a {@link #CONNECTIVITY_ACTION} broadcast will be sent for the network
1133 * underlying the VPN.</li>
1134 * <li>Deprecated APIs that return {@link NetworkInfo} objects will have their state
1135 * similarly replaced by the VPN network state.</li>
1136 * <li>Information on current network interfaces passed to NetworkStatsService will not
1137 * include any VPN interfaces.</li>
1138 * </ul>
1139 *
1140 * @param enabled whether legacy lockdown VPN is enabled or disabled
1141 *
1142 * TODO: @SystemApi(client = MODULE_LIBRARIES)
1143 *
1144 * @hide
1145 */
1146 @RequiresPermission(anyOf = {
1147 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1148 android.Manifest.permission.NETWORK_SETTINGS})
1149 public void setLegacyLockdownVpnEnabled(boolean enabled) {
1150 try {
1151 mService.setLegacyLockdownVpnEnabled(enabled);
1152 } catch (RemoteException e) {
1153 throw e.rethrowFromSystemServer();
1154 }
1155 }
1156
1157 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001158 * Returns details about the currently active default data network
1159 * for a given uid. This is for internal use only to avoid spying
1160 * other apps.
1161 *
1162 * @return a {@link NetworkInfo} object for the current default network
1163 * for the given uid or {@code null} if no default network is
1164 * available for the specified uid.
1165 *
1166 * {@hide}
1167 */
1168 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1169 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1170 public NetworkInfo getActiveNetworkInfoForUid(int uid) {
1171 return getActiveNetworkInfoForUid(uid, false);
1172 }
1173
1174 /** {@hide} */
1175 public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) {
1176 try {
1177 return mService.getActiveNetworkInfoForUid(uid, ignoreBlocked);
1178 } catch (RemoteException e) {
1179 throw e.rethrowFromSystemServer();
1180 }
1181 }
1182
1183 /**
1184 * Returns connection status information about a particular
1185 * network type.
1186 *
1187 * @param networkType integer specifying which networkType in
1188 * which you're interested.
1189 * @return a {@link NetworkInfo} object for the requested
1190 * network type or {@code null} if the type is not
1191 * supported by the device. If {@code networkType} is
1192 * TYPE_VPN and a VPN is active for the calling app,
1193 * then this method will try to return one of the
1194 * underlying networks for the VPN or null if the
1195 * VPN agent didn't specify any.
1196 *
1197 * @deprecated This method does not support multiple connected networks
1198 * of the same type. Use {@link #getAllNetworks} and
1199 * {@link #getNetworkInfo(android.net.Network)} instead.
1200 */
1201 @Deprecated
1202 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1203 @Nullable
1204 public NetworkInfo getNetworkInfo(int networkType) {
1205 try {
1206 return mService.getNetworkInfo(networkType);
1207 } catch (RemoteException e) {
1208 throw e.rethrowFromSystemServer();
1209 }
1210 }
1211
1212 /**
1213 * Returns connection status information about a particular
1214 * Network.
1215 *
1216 * @param network {@link Network} specifying which network
1217 * in which you're interested.
1218 * @return a {@link NetworkInfo} object for the requested
1219 * network or {@code null} if the {@code Network}
1220 * is not valid.
1221 * @deprecated See {@link NetworkInfo}.
1222 */
1223 @Deprecated
1224 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1225 @Nullable
1226 public NetworkInfo getNetworkInfo(@Nullable Network network) {
1227 return getNetworkInfoForUid(network, Process.myUid(), false);
1228 }
1229
1230 /** {@hide} */
1231 public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) {
1232 try {
1233 return mService.getNetworkInfoForUid(network, uid, ignoreBlocked);
1234 } catch (RemoteException e) {
1235 throw e.rethrowFromSystemServer();
1236 }
1237 }
1238
1239 /**
1240 * Returns connection status information about all network
1241 * types supported by the device.
1242 *
1243 * @return an array of {@link NetworkInfo} objects. Check each
1244 * {@link NetworkInfo#getType} for which type each applies.
1245 *
1246 * @deprecated This method does not support multiple connected networks
1247 * of the same type. Use {@link #getAllNetworks} and
1248 * {@link #getNetworkInfo(android.net.Network)} instead.
1249 */
1250 @Deprecated
1251 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1252 @NonNull
1253 public NetworkInfo[] getAllNetworkInfo() {
1254 try {
1255 return mService.getAllNetworkInfo();
1256 } catch (RemoteException e) {
1257 throw e.rethrowFromSystemServer();
1258 }
1259 }
1260
1261 /**
junyulaib1211372021-03-03 12:09:05 +08001262 * Return a list of {@link NetworkStateSnapshot}s, one for each network that is currently
1263 * connected.
1264 * @hide
1265 */
1266 @SystemApi(client = MODULE_LIBRARIES)
1267 @RequiresPermission(anyOf = {
1268 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1269 android.Manifest.permission.NETWORK_STACK,
1270 android.Manifest.permission.NETWORK_SETTINGS})
1271 @NonNull
1272 public List<NetworkStateSnapshot> getAllNetworkStateSnapshot() {
1273 try {
1274 return mService.getAllNetworkStateSnapshot();
1275 } catch (RemoteException e) {
1276 throw e.rethrowFromSystemServer();
1277 }
1278 }
1279
1280 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001281 * Returns the {@link Network} object currently serving a given type, or
1282 * null if the given type is not connected.
1283 *
1284 * @hide
1285 * @deprecated This method does not support multiple connected networks
1286 * of the same type. Use {@link #getAllNetworks} and
1287 * {@link #getNetworkInfo(android.net.Network)} instead.
1288 */
1289 @Deprecated
1290 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1291 @UnsupportedAppUsage
1292 public Network getNetworkForType(int networkType) {
1293 try {
1294 return mService.getNetworkForType(networkType);
1295 } catch (RemoteException e) {
1296 throw e.rethrowFromSystemServer();
1297 }
1298 }
1299
1300 /**
1301 * Returns an array of all {@link Network} currently tracked by the
1302 * framework.
1303 *
1304 * @return an array of {@link Network} objects.
1305 */
1306 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1307 @NonNull
1308 public Network[] getAllNetworks() {
1309 try {
1310 return mService.getAllNetworks();
1311 } catch (RemoteException e) {
1312 throw e.rethrowFromSystemServer();
1313 }
1314 }
1315
1316 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001317 * Returns an array of {@link NetworkCapabilities} objects, representing
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001318 * the Networks that applications run by the given user will use by default.
1319 * @hide
1320 */
1321 @UnsupportedAppUsage
1322 public NetworkCapabilities[] getDefaultNetworkCapabilitiesForUser(int userId) {
1323 try {
1324 return mService.getDefaultNetworkCapabilitiesForUser(
Roshan Piusa8a477b2020-12-17 14:53:09 -08001325 userId, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001326 } catch (RemoteException e) {
1327 throw e.rethrowFromSystemServer();
1328 }
1329 }
1330
1331 /**
1332 * Returns the IP information for the current default network.
1333 *
1334 * @return a {@link LinkProperties} object describing the IP info
1335 * for the current default network, or {@code null} if there
1336 * is no current default network.
1337 *
1338 * {@hide}
1339 * @deprecated please use {@link #getLinkProperties(Network)} on the return
1340 * value of {@link #getActiveNetwork()} instead. In particular,
1341 * this method will return non-null LinkProperties even if the
1342 * app is blocked by policy from using this network.
1343 */
1344 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1345 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 109783091)
1346 public LinkProperties getActiveLinkProperties() {
1347 try {
1348 return mService.getActiveLinkProperties();
1349 } catch (RemoteException e) {
1350 throw e.rethrowFromSystemServer();
1351 }
1352 }
1353
1354 /**
1355 * Returns the IP information for a given network type.
1356 *
1357 * @param networkType the network type of interest.
1358 * @return a {@link LinkProperties} object describing the IP info
1359 * for the given networkType, or {@code null} if there is
1360 * no current default network.
1361 *
1362 * {@hide}
1363 * @deprecated This method does not support multiple connected networks
1364 * of the same type. Use {@link #getAllNetworks},
1365 * {@link #getNetworkInfo(android.net.Network)}, and
1366 * {@link #getLinkProperties(android.net.Network)} instead.
1367 */
1368 @Deprecated
1369 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1370 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
1371 public LinkProperties getLinkProperties(int networkType) {
1372 try {
1373 return mService.getLinkPropertiesForType(networkType);
1374 } catch (RemoteException e) {
1375 throw e.rethrowFromSystemServer();
1376 }
1377 }
1378
1379 /**
1380 * Get the {@link LinkProperties} for the given {@link Network}. This
1381 * will return {@code null} if the network is unknown.
1382 *
1383 * @param network The {@link Network} object identifying the network in question.
1384 * @return The {@link LinkProperties} for the network, or {@code null}.
1385 */
1386 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1387 @Nullable
1388 public LinkProperties getLinkProperties(@Nullable Network network) {
1389 try {
1390 return mService.getLinkProperties(network);
1391 } catch (RemoteException e) {
1392 throw e.rethrowFromSystemServer();
1393 }
1394 }
1395
1396 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001397 * Get the {@link NetworkCapabilities} for the given {@link Network}. This
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001398 * will return {@code null} if the network is unknown.
1399 *
Roshan Piuse08bc182020-12-22 15:10:42 -08001400 * This will remove any location sensitive data in {@link TransportInfo} embedded in
1401 * {@link NetworkCapabilities#getTransportInfo()}. Some transport info instances like
1402 * {@link android.net.wifi.WifiInfo} contain location sensitive information. Retrieving
1403 * this location sensitive information (subject to app's location permissions) will be
1404 * noted by system. To include any location sensitive data in {@link TransportInfo},
1405 * use a {@link NetworkCallback} with
1406 * {@link NetworkCallback#FLAG_INCLUDE_LOCATION_INFO} flag.
1407 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001408 * @param network The {@link Network} object identifying the network in question.
Roshan Piuse08bc182020-12-22 15:10:42 -08001409 * @return The {@link NetworkCapabilities} for the network, or {@code null}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001410 */
1411 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1412 @Nullable
1413 public NetworkCapabilities getNetworkCapabilities(@Nullable Network network) {
1414 try {
Roshan Piusa8a477b2020-12-17 14:53:09 -08001415 return mService.getNetworkCapabilities(
1416 network, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001417 } catch (RemoteException e) {
1418 throw e.rethrowFromSystemServer();
1419 }
1420 }
1421
1422 /**
1423 * Gets a URL that can be used for resolving whether a captive portal is present.
1424 * 1. This URL should respond with a 204 response to a GET request to indicate no captive
1425 * portal is present.
1426 * 2. This URL must be HTTP as redirect responses are used to find captive portal
1427 * sign-in pages. Captive portals cannot respond to HTTPS requests with redirects.
1428 *
1429 * The system network validation may be using different strategies to detect captive portals,
1430 * so this method does not necessarily return a URL used by the system. It only returns a URL
1431 * that may be relevant for other components trying to detect captive portals.
1432 *
1433 * @hide
1434 * @deprecated This API returns URL which is not guaranteed to be one of the URLs used by the
1435 * system.
1436 */
1437 @Deprecated
1438 @SystemApi
1439 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
1440 public String getCaptivePortalServerUrl() {
1441 try {
1442 return mService.getCaptivePortalServerUrl();
1443 } catch (RemoteException e) {
1444 throw e.rethrowFromSystemServer();
1445 }
1446 }
1447
1448 /**
1449 * Tells the underlying networking system that the caller wants to
1450 * begin using the named feature. The interpretation of {@code feature}
1451 * is completely up to each networking implementation.
1452 *
1453 * <p>This method requires the caller to hold either the
1454 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1455 * or the ability to modify system settings as determined by
1456 * {@link android.provider.Settings.System#canWrite}.</p>
1457 *
1458 * @param networkType specifies which network the request pertains to
1459 * @param feature the name of the feature to be used
1460 * @return an integer value representing the outcome of the request.
1461 * The interpretation of this value is specific to each networking
1462 * implementation+feature combination, except that the value {@code -1}
1463 * always indicates failure.
1464 *
1465 * @deprecated Deprecated in favor of the cleaner
1466 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} API.
1467 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1468 * throw {@code UnsupportedOperationException} if called.
1469 * @removed
1470 */
1471 @Deprecated
1472 public int startUsingNetworkFeature(int networkType, String feature) {
1473 checkLegacyRoutingApiAccess();
1474 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1475 if (netCap == null) {
1476 Log.d(TAG, "Can't satisfy startUsingNetworkFeature for " + networkType + ", " +
1477 feature);
1478 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1479 }
1480
1481 NetworkRequest request = null;
1482 synchronized (sLegacyRequests) {
1483 LegacyRequest l = sLegacyRequests.get(netCap);
1484 if (l != null) {
1485 Log.d(TAG, "renewing startUsingNetworkFeature request " + l.networkRequest);
1486 renewRequestLocked(l);
1487 if (l.currentNetwork != null) {
1488 return DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE;
1489 } else {
1490 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1491 }
1492 }
1493
1494 request = requestNetworkForFeatureLocked(netCap);
1495 }
1496 if (request != null) {
1497 Log.d(TAG, "starting startUsingNetworkFeature for request " + request);
1498 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1499 } else {
1500 Log.d(TAG, " request Failed");
1501 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1502 }
1503 }
1504
1505 /**
1506 * Tells the underlying networking system that the caller is finished
1507 * using the named feature. The interpretation of {@code feature}
1508 * is completely up to each networking implementation.
1509 *
1510 * <p>This method requires the caller to hold either the
1511 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1512 * or the ability to modify system settings as determined by
1513 * {@link android.provider.Settings.System#canWrite}.</p>
1514 *
1515 * @param networkType specifies which network the request pertains to
1516 * @param feature the name of the feature that is no longer needed
1517 * @return an integer value representing the outcome of the request.
1518 * The interpretation of this value is specific to each networking
1519 * implementation+feature combination, except that the value {@code -1}
1520 * always indicates failure.
1521 *
1522 * @deprecated Deprecated in favor of the cleaner
1523 * {@link #unregisterNetworkCallback(NetworkCallback)} API.
1524 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1525 * throw {@code UnsupportedOperationException} if called.
1526 * @removed
1527 */
1528 @Deprecated
1529 public int stopUsingNetworkFeature(int networkType, String feature) {
1530 checkLegacyRoutingApiAccess();
1531 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1532 if (netCap == null) {
1533 Log.d(TAG, "Can't satisfy stopUsingNetworkFeature for " + networkType + ", " +
1534 feature);
1535 return -1;
1536 }
1537
1538 if (removeRequestForFeature(netCap)) {
1539 Log.d(TAG, "stopUsingNetworkFeature for " + networkType + ", " + feature);
1540 }
1541 return 1;
1542 }
1543
1544 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1545 private NetworkCapabilities networkCapabilitiesForFeature(int networkType, String feature) {
1546 if (networkType == TYPE_MOBILE) {
1547 switch (feature) {
1548 case "enableCBS":
1549 return networkCapabilitiesForType(TYPE_MOBILE_CBS);
1550 case "enableDUN":
1551 case "enableDUNAlways":
1552 return networkCapabilitiesForType(TYPE_MOBILE_DUN);
1553 case "enableFOTA":
1554 return networkCapabilitiesForType(TYPE_MOBILE_FOTA);
1555 case "enableHIPRI":
1556 return networkCapabilitiesForType(TYPE_MOBILE_HIPRI);
1557 case "enableIMS":
1558 return networkCapabilitiesForType(TYPE_MOBILE_IMS);
1559 case "enableMMS":
1560 return networkCapabilitiesForType(TYPE_MOBILE_MMS);
1561 case "enableSUPL":
1562 return networkCapabilitiesForType(TYPE_MOBILE_SUPL);
1563 default:
1564 return null;
1565 }
1566 } else if (networkType == TYPE_WIFI && "p2p".equals(feature)) {
1567 return networkCapabilitiesForType(TYPE_WIFI_P2P);
1568 }
1569 return null;
1570 }
1571
1572 private int legacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1573 if (netCap == null) return TYPE_NONE;
1574 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1575 return TYPE_MOBILE_CBS;
1576 }
1577 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1578 return TYPE_MOBILE_IMS;
1579 }
1580 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1581 return TYPE_MOBILE_FOTA;
1582 }
1583 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1584 return TYPE_MOBILE_DUN;
1585 }
1586 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1587 return TYPE_MOBILE_SUPL;
1588 }
1589 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1590 return TYPE_MOBILE_MMS;
1591 }
1592 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1593 return TYPE_MOBILE_HIPRI;
1594 }
1595 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P)) {
1596 return TYPE_WIFI_P2P;
1597 }
1598 return TYPE_NONE;
1599 }
1600
1601 private static class LegacyRequest {
1602 NetworkCapabilities networkCapabilities;
1603 NetworkRequest networkRequest;
1604 int expireSequenceNumber;
1605 Network currentNetwork;
1606 int delay = -1;
1607
1608 private void clearDnsBinding() {
1609 if (currentNetwork != null) {
1610 currentNetwork = null;
1611 setProcessDefaultNetworkForHostResolution(null);
1612 }
1613 }
1614
1615 NetworkCallback networkCallback = new NetworkCallback() {
1616 @Override
1617 public void onAvailable(Network network) {
1618 currentNetwork = network;
1619 Log.d(TAG, "startUsingNetworkFeature got Network:" + network);
1620 setProcessDefaultNetworkForHostResolution(network);
1621 }
1622 @Override
1623 public void onLost(Network network) {
1624 if (network.equals(currentNetwork)) clearDnsBinding();
1625 Log.d(TAG, "startUsingNetworkFeature lost Network:" + network);
1626 }
1627 };
1628 }
1629
1630 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1631 private static final HashMap<NetworkCapabilities, LegacyRequest> sLegacyRequests =
1632 new HashMap<>();
1633
1634 private NetworkRequest findRequestForFeature(NetworkCapabilities netCap) {
1635 synchronized (sLegacyRequests) {
1636 LegacyRequest l = sLegacyRequests.get(netCap);
1637 if (l != null) return l.networkRequest;
1638 }
1639 return null;
1640 }
1641
1642 private void renewRequestLocked(LegacyRequest l) {
1643 l.expireSequenceNumber++;
1644 Log.d(TAG, "renewing request to seqNum " + l.expireSequenceNumber);
1645 sendExpireMsgForFeature(l.networkCapabilities, l.expireSequenceNumber, l.delay);
1646 }
1647
1648 private void expireRequest(NetworkCapabilities netCap, int sequenceNum) {
1649 int ourSeqNum = -1;
1650 synchronized (sLegacyRequests) {
1651 LegacyRequest l = sLegacyRequests.get(netCap);
1652 if (l == null) return;
1653 ourSeqNum = l.expireSequenceNumber;
1654 if (l.expireSequenceNumber == sequenceNum) removeRequestForFeature(netCap);
1655 }
1656 Log.d(TAG, "expireRequest with " + ourSeqNum + ", " + sequenceNum);
1657 }
1658
1659 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1660 private NetworkRequest requestNetworkForFeatureLocked(NetworkCapabilities netCap) {
1661 int delay = -1;
1662 int type = legacyTypeForNetworkCapabilities(netCap);
1663 try {
1664 delay = mService.getRestoreDefaultNetworkDelay(type);
1665 } catch (RemoteException e) {
1666 throw e.rethrowFromSystemServer();
1667 }
1668 LegacyRequest l = new LegacyRequest();
1669 l.networkCapabilities = netCap;
1670 l.delay = delay;
1671 l.expireSequenceNumber = 0;
1672 l.networkRequest = sendRequestForNetwork(
1673 netCap, l.networkCallback, 0, REQUEST, type, getDefaultHandler());
1674 if (l.networkRequest == null) return null;
1675 sLegacyRequests.put(netCap, l);
1676 sendExpireMsgForFeature(netCap, l.expireSequenceNumber, delay);
1677 return l.networkRequest;
1678 }
1679
1680 private void sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay) {
1681 if (delay >= 0) {
1682 Log.d(TAG, "sending expire msg with seqNum " + seqNum + " and delay " + delay);
1683 CallbackHandler handler = getDefaultHandler();
1684 Message msg = handler.obtainMessage(EXPIRE_LEGACY_REQUEST, seqNum, 0, netCap);
1685 handler.sendMessageDelayed(msg, delay);
1686 }
1687 }
1688
1689 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1690 private boolean removeRequestForFeature(NetworkCapabilities netCap) {
1691 final LegacyRequest l;
1692 synchronized (sLegacyRequests) {
1693 l = sLegacyRequests.remove(netCap);
1694 }
1695 if (l == null) return false;
1696 unregisterNetworkCallback(l.networkCallback);
1697 l.clearDnsBinding();
1698 return true;
1699 }
1700
1701 private static final SparseIntArray sLegacyTypeToTransport = new SparseIntArray();
1702 static {
1703 sLegacyTypeToTransport.put(TYPE_MOBILE, NetworkCapabilities.TRANSPORT_CELLULAR);
1704 sLegacyTypeToTransport.put(TYPE_MOBILE_CBS, NetworkCapabilities.TRANSPORT_CELLULAR);
1705 sLegacyTypeToTransport.put(TYPE_MOBILE_DUN, NetworkCapabilities.TRANSPORT_CELLULAR);
1706 sLegacyTypeToTransport.put(TYPE_MOBILE_FOTA, NetworkCapabilities.TRANSPORT_CELLULAR);
1707 sLegacyTypeToTransport.put(TYPE_MOBILE_HIPRI, NetworkCapabilities.TRANSPORT_CELLULAR);
1708 sLegacyTypeToTransport.put(TYPE_MOBILE_IMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1709 sLegacyTypeToTransport.put(TYPE_MOBILE_MMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1710 sLegacyTypeToTransport.put(TYPE_MOBILE_SUPL, NetworkCapabilities.TRANSPORT_CELLULAR);
1711 sLegacyTypeToTransport.put(TYPE_WIFI, NetworkCapabilities.TRANSPORT_WIFI);
1712 sLegacyTypeToTransport.put(TYPE_WIFI_P2P, NetworkCapabilities.TRANSPORT_WIFI);
1713 sLegacyTypeToTransport.put(TYPE_BLUETOOTH, NetworkCapabilities.TRANSPORT_BLUETOOTH);
1714 sLegacyTypeToTransport.put(TYPE_ETHERNET, NetworkCapabilities.TRANSPORT_ETHERNET);
1715 }
1716
1717 private static final SparseIntArray sLegacyTypeToCapability = new SparseIntArray();
1718 static {
1719 sLegacyTypeToCapability.put(TYPE_MOBILE_CBS, NetworkCapabilities.NET_CAPABILITY_CBS);
1720 sLegacyTypeToCapability.put(TYPE_MOBILE_DUN, NetworkCapabilities.NET_CAPABILITY_DUN);
1721 sLegacyTypeToCapability.put(TYPE_MOBILE_FOTA, NetworkCapabilities.NET_CAPABILITY_FOTA);
1722 sLegacyTypeToCapability.put(TYPE_MOBILE_IMS, NetworkCapabilities.NET_CAPABILITY_IMS);
1723 sLegacyTypeToCapability.put(TYPE_MOBILE_MMS, NetworkCapabilities.NET_CAPABILITY_MMS);
1724 sLegacyTypeToCapability.put(TYPE_MOBILE_SUPL, NetworkCapabilities.NET_CAPABILITY_SUPL);
1725 sLegacyTypeToCapability.put(TYPE_WIFI_P2P, NetworkCapabilities.NET_CAPABILITY_WIFI_P2P);
1726 }
1727
1728 /**
1729 * Given a legacy type (TYPE_WIFI, ...) returns a NetworkCapabilities
1730 * instance suitable for registering a request or callback. Throws an
1731 * IllegalArgumentException if no mapping from the legacy type to
1732 * NetworkCapabilities is known.
1733 *
1734 * @deprecated Types are deprecated. Use {@link NetworkCallback} or {@link NetworkRequest}
1735 * to find the network instead.
1736 * @hide
1737 */
1738 public static NetworkCapabilities networkCapabilitiesForType(int type) {
1739 final NetworkCapabilities nc = new NetworkCapabilities();
1740
1741 // Map from type to transports.
1742 final int NOT_FOUND = -1;
1743 final int transport = sLegacyTypeToTransport.get(type, NOT_FOUND);
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09001744 if (transport == NOT_FOUND) {
1745 throw new IllegalArgumentException("unknown legacy type: " + type);
1746 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001747 nc.addTransportType(transport);
1748
1749 // Map from type to capabilities.
1750 nc.addCapability(sLegacyTypeToCapability.get(
1751 type, NetworkCapabilities.NET_CAPABILITY_INTERNET));
1752 nc.maybeMarkCapabilitiesRestricted();
1753 return nc;
1754 }
1755
1756 /** @hide */
1757 public static class PacketKeepaliveCallback {
1758 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1759 public PacketKeepaliveCallback() {
1760 }
1761 /** The requested keepalive was successfully started. */
1762 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1763 public void onStarted() {}
1764 /** The keepalive was successfully stopped. */
1765 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1766 public void onStopped() {}
1767 /** An error occurred. */
1768 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1769 public void onError(int error) {}
1770 }
1771
1772 /**
1773 * Allows applications to request that the system periodically send specific packets on their
1774 * behalf, using hardware offload to save battery power.
1775 *
1776 * To request that the system send keepalives, call one of the methods that return a
1777 * {@link ConnectivityManager.PacketKeepalive} object, such as {@link #startNattKeepalive},
1778 * passing in a non-null callback. If the callback is successfully started, the callback's
1779 * {@code onStarted} method will be called. If an error occurs, {@code onError} will be called,
1780 * specifying one of the {@code ERROR_*} constants in this class.
1781 *
1782 * To stop an existing keepalive, call {@link PacketKeepalive#stop}. The system will call
1783 * {@link PacketKeepaliveCallback#onStopped} if the operation was successful or
1784 * {@link PacketKeepaliveCallback#onError} if an error occurred.
1785 *
1786 * @deprecated Use {@link SocketKeepalive} instead.
1787 *
1788 * @hide
1789 */
1790 public class PacketKeepalive {
1791
1792 private static final String TAG = "PacketKeepalive";
1793
1794 /** @hide */
1795 public static final int SUCCESS = 0;
1796
1797 /** @hide */
1798 public static final int NO_KEEPALIVE = -1;
1799
1800 /** @hide */
1801 public static final int BINDER_DIED = -10;
1802
1803 /** The specified {@code Network} is not connected. */
1804 public static final int ERROR_INVALID_NETWORK = -20;
1805 /** The specified IP addresses are invalid. For example, the specified source IP address is
1806 * not configured on the specified {@code Network}. */
1807 public static final int ERROR_INVALID_IP_ADDRESS = -21;
1808 /** The requested port is invalid. */
1809 public static final int ERROR_INVALID_PORT = -22;
1810 /** The packet length is invalid (e.g., too long). */
1811 public static final int ERROR_INVALID_LENGTH = -23;
1812 /** The packet transmission interval is invalid (e.g., too short). */
1813 public static final int ERROR_INVALID_INTERVAL = -24;
1814
1815 /** The hardware does not support this request. */
1816 public static final int ERROR_HARDWARE_UNSUPPORTED = -30;
1817 /** The hardware returned an error. */
1818 public static final int ERROR_HARDWARE_ERROR = -31;
1819
1820 /** The NAT-T destination port for IPsec */
1821 public static final int NATT_PORT = 4500;
1822
1823 /** The minimum interval in seconds between keepalive packet transmissions */
1824 public static final int MIN_INTERVAL = 10;
1825
1826 private final Network mNetwork;
1827 private final ISocketKeepaliveCallback mCallback;
1828 private final ExecutorService mExecutor;
1829
1830 private volatile Integer mSlot;
1831
1832 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1833 public void stop() {
1834 try {
1835 mExecutor.execute(() -> {
1836 try {
1837 if (mSlot != null) {
1838 mService.stopKeepalive(mNetwork, mSlot);
1839 }
1840 } catch (RemoteException e) {
1841 Log.e(TAG, "Error stopping packet keepalive: ", e);
1842 throw e.rethrowFromSystemServer();
1843 }
1844 });
1845 } catch (RejectedExecutionException e) {
1846 // The internal executor has already stopped due to previous event.
1847 }
1848 }
1849
1850 private PacketKeepalive(Network network, PacketKeepaliveCallback callback) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09001851 Objects.requireNonNull(network, "network cannot be null");
1852 Objects.requireNonNull(callback, "callback cannot be null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001853 mNetwork = network;
1854 mExecutor = Executors.newSingleThreadExecutor();
1855 mCallback = new ISocketKeepaliveCallback.Stub() {
1856 @Override
1857 public void onStarted(int slot) {
1858 final long token = Binder.clearCallingIdentity();
1859 try {
1860 mExecutor.execute(() -> {
1861 mSlot = slot;
1862 callback.onStarted();
1863 });
1864 } finally {
1865 Binder.restoreCallingIdentity(token);
1866 }
1867 }
1868
1869 @Override
1870 public void onStopped() {
1871 final long token = Binder.clearCallingIdentity();
1872 try {
1873 mExecutor.execute(() -> {
1874 mSlot = null;
1875 callback.onStopped();
1876 });
1877 } finally {
1878 Binder.restoreCallingIdentity(token);
1879 }
1880 mExecutor.shutdown();
1881 }
1882
1883 @Override
1884 public void onError(int error) {
1885 final long token = Binder.clearCallingIdentity();
1886 try {
1887 mExecutor.execute(() -> {
1888 mSlot = null;
1889 callback.onError(error);
1890 });
1891 } finally {
1892 Binder.restoreCallingIdentity(token);
1893 }
1894 mExecutor.shutdown();
1895 }
1896
1897 @Override
1898 public void onDataReceived() {
1899 // PacketKeepalive is only used for Nat-T keepalive and as such does not invoke
1900 // this callback when data is received.
1901 }
1902 };
1903 }
1904 }
1905
1906 /**
1907 * Starts an IPsec NAT-T keepalive packet with the specified parameters.
1908 *
1909 * @deprecated Use {@link #createSocketKeepalive} instead.
1910 *
1911 * @hide
1912 */
1913 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1914 public PacketKeepalive startNattKeepalive(
1915 Network network, int intervalSeconds, PacketKeepaliveCallback callback,
1916 InetAddress srcAddr, int srcPort, InetAddress dstAddr) {
1917 final PacketKeepalive k = new PacketKeepalive(network, callback);
1918 try {
1919 mService.startNattKeepalive(network, intervalSeconds, k.mCallback,
1920 srcAddr.getHostAddress(), srcPort, dstAddr.getHostAddress());
1921 } catch (RemoteException e) {
1922 Log.e(TAG, "Error starting packet keepalive: ", e);
1923 throw e.rethrowFromSystemServer();
1924 }
1925 return k;
1926 }
1927
1928 // Construct an invalid fd.
1929 private ParcelFileDescriptor createInvalidFd() {
1930 final int invalidFd = -1;
1931 return ParcelFileDescriptor.adoptFd(invalidFd);
1932 }
1933
1934 /**
1935 * Request that keepalives be started on a IPsec NAT-T socket.
1936 *
1937 * @param network The {@link Network} the socket is on.
1938 * @param socket The socket that needs to be kept alive.
1939 * @param source The source address of the {@link UdpEncapsulationSocket}.
1940 * @param destination The destination address of the {@link UdpEncapsulationSocket}.
1941 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
1942 * must run callback sequentially, otherwise the order of callbacks cannot be
1943 * guaranteed.
1944 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
1945 * changes. Must be extended by applications that use this API.
1946 *
1947 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
1948 * given socket.
1949 **/
1950 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
1951 @NonNull UdpEncapsulationSocket socket,
1952 @NonNull InetAddress source,
1953 @NonNull InetAddress destination,
1954 @NonNull @CallbackExecutor Executor executor,
1955 @NonNull Callback callback) {
1956 ParcelFileDescriptor dup;
1957 try {
1958 // Dup is needed here as the pfd inside the socket is owned by the IpSecService,
1959 // which cannot be obtained by the app process.
1960 dup = ParcelFileDescriptor.dup(socket.getFileDescriptor());
1961 } catch (IOException ignored) {
1962 // Construct an invalid fd, so that if the user later calls start(), it will fail with
1963 // ERROR_INVALID_SOCKET.
1964 dup = createInvalidFd();
1965 }
1966 return new NattSocketKeepalive(mService, network, dup, socket.getResourceId(), source,
1967 destination, executor, callback);
1968 }
1969
1970 /**
1971 * Request that keepalives be started on a IPsec NAT-T socket file descriptor. Directly called
1972 * by system apps which don't use IpSecService to create {@link UdpEncapsulationSocket}.
1973 *
1974 * @param network The {@link Network} the socket is on.
1975 * @param pfd The {@link ParcelFileDescriptor} that needs to be kept alive. The provided
1976 * {@link ParcelFileDescriptor} must be bound to a port and the keepalives will be sent
1977 * from that port.
1978 * @param source The source address of the {@link UdpEncapsulationSocket}.
1979 * @param destination The destination address of the {@link UdpEncapsulationSocket}. The
1980 * keepalive packets will always be sent to port 4500 of the given {@code destination}.
1981 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
1982 * must run callback sequentially, otherwise the order of callbacks cannot be
1983 * guaranteed.
1984 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
1985 * changes. Must be extended by applications that use this API.
1986 *
1987 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
1988 * given socket.
1989 * @hide
1990 */
1991 @SystemApi
1992 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
1993 public @NonNull SocketKeepalive createNattKeepalive(@NonNull Network network,
1994 @NonNull ParcelFileDescriptor pfd,
1995 @NonNull InetAddress source,
1996 @NonNull InetAddress destination,
1997 @NonNull @CallbackExecutor Executor executor,
1998 @NonNull Callback callback) {
1999 ParcelFileDescriptor dup;
2000 try {
2001 // TODO: Consider remove unnecessary dup.
2002 dup = pfd.dup();
2003 } catch (IOException ignored) {
2004 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2005 // ERROR_INVALID_SOCKET.
2006 dup = createInvalidFd();
2007 }
2008 return new NattSocketKeepalive(mService, network, dup,
Remi NGUYEN VANa29be5c2021-03-11 10:56:49 +00002009 -1 /* Unused */, source, destination, executor, callback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002010 }
2011
2012 /**
2013 * Request that keepalives be started on a TCP socket.
2014 * The socket must be established.
2015 *
2016 * @param network The {@link Network} the socket is on.
2017 * @param socket The socket that needs to be kept alive.
2018 * @param executor The executor on which callback will be invoked. This implementation assumes
2019 * the provided {@link Executor} runs the callbacks in sequence with no
2020 * concurrency. Failing this, no guarantee of correctness can be made. It is
2021 * the responsibility of the caller to ensure the executor provides this
2022 * guarantee. A simple way of creating such an executor is with the standard
2023 * tool {@code Executors.newSingleThreadExecutor}.
2024 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2025 * changes. Must be extended by applications that use this API.
2026 *
2027 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2028 * given socket.
2029 * @hide
2030 */
2031 @SystemApi
2032 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2033 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
2034 @NonNull Socket socket,
2035 @NonNull Executor executor,
2036 @NonNull Callback callback) {
2037 ParcelFileDescriptor dup;
2038 try {
2039 dup = ParcelFileDescriptor.fromSocket(socket);
2040 } catch (UncheckedIOException ignored) {
2041 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2042 // ERROR_INVALID_SOCKET.
2043 dup = createInvalidFd();
2044 }
2045 return new TcpSocketKeepalive(mService, network, dup, executor, callback);
2046 }
2047
2048 /**
2049 * Ensure that a network route exists to deliver traffic to the specified
2050 * host via the specified network interface. An attempt to add a route that
2051 * already exists is ignored, but treated as successful.
2052 *
2053 * <p>This method requires the caller to hold either the
2054 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2055 * or the ability to modify system settings as determined by
2056 * {@link android.provider.Settings.System#canWrite}.</p>
2057 *
2058 * @param networkType the type of the network over which traffic to the specified
2059 * host is to be routed
2060 * @param hostAddress the IP address of the host to which the route is desired
2061 * @return {@code true} on success, {@code false} on failure
2062 *
2063 * @deprecated Deprecated in favor of the
2064 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
2065 * {@link #bindProcessToNetwork} and {@link Network#getSocketFactory} API.
2066 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
2067 * throw {@code UnsupportedOperationException} if called.
2068 * @removed
2069 */
2070 @Deprecated
2071 public boolean requestRouteToHost(int networkType, int hostAddress) {
2072 return requestRouteToHostAddress(networkType, NetworkUtils.intToInetAddress(hostAddress));
2073 }
2074
2075 /**
2076 * Ensure that a network route exists to deliver traffic to the specified
2077 * host via the specified network interface. An attempt to add a route that
2078 * already exists is ignored, but treated as successful.
2079 *
2080 * <p>This method requires the caller to hold either the
2081 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2082 * or the ability to modify system settings as determined by
2083 * {@link android.provider.Settings.System#canWrite}.</p>
2084 *
2085 * @param networkType the type of the network over which traffic to the specified
2086 * host is to be routed
2087 * @param hostAddress the IP address of the host to which the route is desired
2088 * @return {@code true} on success, {@code false} on failure
2089 * @hide
2090 * @deprecated Deprecated in favor of the {@link #requestNetwork} and
2091 * {@link #bindProcessToNetwork} API.
2092 */
2093 @Deprecated
2094 @UnsupportedAppUsage
2095 public boolean requestRouteToHostAddress(int networkType, InetAddress hostAddress) {
2096 checkLegacyRoutingApiAccess();
2097 try {
2098 return mService.requestRouteToHostAddress(networkType, hostAddress.getAddress(),
2099 mContext.getOpPackageName(), getAttributionTag());
2100 } catch (RemoteException e) {
2101 throw e.rethrowFromSystemServer();
2102 }
2103 }
2104
2105 /**
2106 * @return the context's attribution tag
2107 */
2108 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2109 private @Nullable String getAttributionTag() {
Roshan Piusa8a477b2020-12-17 14:53:09 -08002110 return mContext.getAttributionTag();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002111 }
2112
2113 /**
2114 * Returns the value of the setting for background data usage. If false,
2115 * applications should not use the network if the application is not in the
2116 * foreground. Developers should respect this setting, and check the value
2117 * of this before performing any background data operations.
2118 * <p>
2119 * All applications that have background services that use the network
2120 * should listen to {@link #ACTION_BACKGROUND_DATA_SETTING_CHANGED}.
2121 * <p>
2122 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability of
2123 * background data depends on several combined factors, and this method will
2124 * always return {@code true}. Instead, when background data is unavailable,
2125 * {@link #getActiveNetworkInfo()} will now appear disconnected.
2126 *
2127 * @return Whether background data usage is allowed.
2128 */
2129 @Deprecated
2130 public boolean getBackgroundDataSetting() {
2131 // assume that background data is allowed; final authority is
2132 // NetworkInfo which may be blocked.
2133 return true;
2134 }
2135
2136 /**
2137 * Sets the value of the setting for background data usage.
2138 *
2139 * @param allowBackgroundData Whether an application should use data while
2140 * it is in the background.
2141 *
2142 * @attr ref android.Manifest.permission#CHANGE_BACKGROUND_DATA_SETTING
2143 * @see #getBackgroundDataSetting()
2144 * @hide
2145 */
2146 @Deprecated
2147 @UnsupportedAppUsage
2148 public void setBackgroundDataSetting(boolean allowBackgroundData) {
2149 // ignored
2150 }
2151
2152 /**
2153 * @hide
2154 * @deprecated Talk to TelephonyManager directly
2155 */
2156 @Deprecated
2157 @UnsupportedAppUsage
2158 public boolean getMobileDataEnabled() {
2159 TelephonyManager tm = mContext.getSystemService(TelephonyManager.class);
2160 if (tm != null) {
2161 int subId = SubscriptionManager.getDefaultDataSubscriptionId();
2162 Log.d("ConnectivityManager", "getMobileDataEnabled()+ subId=" + subId);
2163 boolean retVal = tm.createForSubscriptionId(subId).isDataEnabled();
2164 Log.d("ConnectivityManager", "getMobileDataEnabled()- subId=" + subId
2165 + " retVal=" + retVal);
2166 return retVal;
2167 }
2168 Log.d("ConnectivityManager", "getMobileDataEnabled()- remote exception retVal=false");
2169 return false;
2170 }
2171
2172 /**
2173 * Callback for use with {@link ConnectivityManager#addDefaultNetworkActiveListener}
2174 * to find out when the system default network has gone in to a high power state.
2175 */
2176 public interface OnNetworkActiveListener {
2177 /**
2178 * Called on the main thread of the process to report that the current data network
2179 * has become active, and it is now a good time to perform any pending network
2180 * operations. Note that this listener only tells you when the network becomes
2181 * active; if at any other time you want to know whether it is active (and thus okay
2182 * to initiate network traffic), you can retrieve its instantaneous state with
2183 * {@link ConnectivityManager#isDefaultNetworkActive}.
2184 */
2185 void onNetworkActive();
2186 }
2187
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002188 private final ArrayMap<OnNetworkActiveListener, INetworkActivityListener>
2189 mNetworkActivityListeners = new ArrayMap<>();
2190
2191 /**
2192 * Start listening to reports when the system's default data network is active, meaning it is
2193 * a good time to perform network traffic. Use {@link #isDefaultNetworkActive()}
2194 * to determine the current state of the system's default network after registering the
2195 * listener.
2196 * <p>
2197 * If the process default network has been set with
2198 * {@link ConnectivityManager#bindProcessToNetwork} this function will not
2199 * reflect the process's default, but the system default.
2200 *
2201 * @param l The listener to be told when the network is active.
2202 */
2203 public void addDefaultNetworkActiveListener(final OnNetworkActiveListener l) {
2204 INetworkActivityListener rl = new INetworkActivityListener.Stub() {
2205 @Override
2206 public void onNetworkActive() throws RemoteException {
2207 l.onNetworkActive();
2208 }
2209 };
2210
2211 try {
lucaslin709eb842021-01-21 02:04:15 +08002212 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002213 mNetworkActivityListeners.put(l, rl);
2214 } catch (RemoteException e) {
2215 throw e.rethrowFromSystemServer();
2216 }
2217 }
2218
2219 /**
2220 * Remove network active listener previously registered with
2221 * {@link #addDefaultNetworkActiveListener}.
2222 *
2223 * @param l Previously registered listener.
2224 */
2225 public void removeDefaultNetworkActiveListener(@NonNull OnNetworkActiveListener l) {
2226 INetworkActivityListener rl = mNetworkActivityListeners.get(l);
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09002227 if (rl == null) {
2228 throw new IllegalArgumentException("Listener was not registered.");
2229 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002230 try {
lucaslin709eb842021-01-21 02:04:15 +08002231 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002232 } catch (RemoteException e) {
2233 throw e.rethrowFromSystemServer();
2234 }
2235 }
2236
2237 /**
2238 * Return whether the data network is currently active. An active network means that
2239 * it is currently in a high power state for performing data transmission. On some
2240 * types of networks, it may be expensive to move and stay in such a state, so it is
2241 * more power efficient to batch network traffic together when the radio is already in
2242 * this state. This method tells you whether right now is currently a good time to
2243 * initiate network traffic, as the network is already active.
2244 */
2245 public boolean isDefaultNetworkActive() {
2246 try {
lucaslin709eb842021-01-21 02:04:15 +08002247 return mService.isDefaultNetworkActive();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002248 } catch (RemoteException e) {
2249 throw e.rethrowFromSystemServer();
2250 }
2251 }
2252
2253 /**
2254 * {@hide}
2255 */
2256 public ConnectivityManager(Context context, IConnectivityManager service) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09002257 mContext = Objects.requireNonNull(context, "missing context");
2258 mService = Objects.requireNonNull(service, "missing IConnectivityManager");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002259 mTetheringManager = (TetheringManager) mContext.getSystemService(Context.TETHERING_SERVICE);
2260 sInstance = this;
2261 }
2262
2263 /** {@hide} */
2264 @UnsupportedAppUsage
2265 public static ConnectivityManager from(Context context) {
2266 return (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);
2267 }
2268
2269 /** @hide */
2270 public NetworkRequest getDefaultRequest() {
2271 try {
2272 // This is not racy as the default request is final in ConnectivityService.
2273 return mService.getDefaultRequest();
2274 } catch (RemoteException e) {
2275 throw e.rethrowFromSystemServer();
2276 }
2277 }
2278
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002279 /**
2280 * Check if the package is a allowed to write settings. This also accounts that such an access
2281 * happened.
2282 *
2283 * @return {@code true} iff the package is allowed to write settings.
2284 */
2285 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2286 private static boolean checkAndNoteWriteSettingsOperation(@NonNull Context context, int uid,
2287 @NonNull String callingPackage, @Nullable String callingAttributionTag,
2288 boolean throwException) {
2289 return Settings.checkAndNoteWriteSettingsOperation(context, uid, callingPackage,
2290 throwException);
2291 }
2292
2293 /**
2294 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2295 * situations where a Context pointer is unavailable.
2296 * @hide
2297 */
2298 @Deprecated
2299 static ConnectivityManager getInstanceOrNull() {
2300 return sInstance;
2301 }
2302
2303 /**
2304 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2305 * situations where a Context pointer is unavailable.
2306 * @hide
2307 */
2308 @Deprecated
2309 @UnsupportedAppUsage
2310 private static ConnectivityManager getInstance() {
2311 if (getInstanceOrNull() == null) {
2312 throw new IllegalStateException("No ConnectivityManager yet constructed");
2313 }
2314 return getInstanceOrNull();
2315 }
2316
2317 /**
2318 * Get the set of tetherable, available interfaces. This list is limited by
2319 * device configuration and current interface existence.
2320 *
2321 * @return an array of 0 or more Strings of tetherable interface names.
2322 *
2323 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2324 * {@hide}
2325 */
2326 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2327 @UnsupportedAppUsage
2328 @Deprecated
2329 public String[] getTetherableIfaces() {
2330 return mTetheringManager.getTetherableIfaces();
2331 }
2332
2333 /**
2334 * Get the set of tethered interfaces.
2335 *
2336 * @return an array of 0 or more String of currently tethered interface names.
2337 *
2338 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2339 * {@hide}
2340 */
2341 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2342 @UnsupportedAppUsage
2343 @Deprecated
2344 public String[] getTetheredIfaces() {
2345 return mTetheringManager.getTetheredIfaces();
2346 }
2347
2348 /**
2349 * Get the set of interface names which attempted to tether but
2350 * failed. Re-attempting to tether may cause them to reset to the Tethered
2351 * state. Alternatively, causing the interface to be destroyed and recreated
2352 * may cause them to reset to the available state.
2353 * {@link ConnectivityManager#getLastTetherError} can be used to get more
2354 * information on the cause of the errors.
2355 *
2356 * @return an array of 0 or more String indicating the interface names
2357 * which failed to tether.
2358 *
2359 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2360 * {@hide}
2361 */
2362 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2363 @UnsupportedAppUsage
2364 @Deprecated
2365 public String[] getTetheringErroredIfaces() {
2366 return mTetheringManager.getTetheringErroredIfaces();
2367 }
2368
2369 /**
2370 * Get the set of tethered dhcp ranges.
2371 *
2372 * @deprecated This method is not supported.
2373 * TODO: remove this function when all of clients are removed.
2374 * {@hide}
2375 */
2376 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
2377 @Deprecated
2378 public String[] getTetheredDhcpRanges() {
2379 throw new UnsupportedOperationException("getTetheredDhcpRanges is not supported");
2380 }
2381
2382 /**
2383 * Attempt to tether the named interface. This will setup a dhcp server
2384 * on the interface, forward and NAT IP packets and forward DNS requests
2385 * to the best active upstream network interface. Note that if no upstream
2386 * IP network interface is available, dhcp will still run and traffic will be
2387 * allowed between the tethered devices and this device, though upstream net
2388 * access will of course fail until an upstream network interface becomes
2389 * active.
2390 *
2391 * <p>This method requires the caller to hold either the
2392 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2393 * or the ability to modify system settings as determined by
2394 * {@link android.provider.Settings.System#canWrite}.</p>
2395 *
2396 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2397 * and WifiStateMachine which need direct access. All other clients should use
2398 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2399 * logic.</p>
2400 *
2401 * @param iface the interface name to tether.
2402 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2403 * @deprecated Use {@link TetheringManager#startTethering} instead
2404 *
2405 * {@hide}
2406 */
2407 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2408 @Deprecated
2409 public int tether(String iface) {
2410 return mTetheringManager.tether(iface);
2411 }
2412
2413 /**
2414 * Stop tethering the named interface.
2415 *
2416 * <p>This method requires the caller to hold either the
2417 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2418 * or the ability to modify system settings as determined by
2419 * {@link android.provider.Settings.System#canWrite}.</p>
2420 *
2421 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2422 * and WifiStateMachine which need direct access. All other clients should use
2423 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2424 * logic.</p>
2425 *
2426 * @param iface the interface name to untether.
2427 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2428 *
2429 * {@hide}
2430 */
2431 @UnsupportedAppUsage
2432 @Deprecated
2433 public int untether(String iface) {
2434 return mTetheringManager.untether(iface);
2435 }
2436
2437 /**
2438 * Check if the device allows for tethering. It may be disabled via
2439 * {@code ro.tether.denied} system property, Settings.TETHER_SUPPORTED or
2440 * due to device configuration.
2441 *
2442 * <p>If this app does not have permission to use this API, it will always
2443 * return false rather than throw an exception.</p>
2444 *
2445 * <p>If the device has a hotspot provisioning app, the caller is required to hold the
2446 * {@link android.Manifest.permission.TETHER_PRIVILEGED} permission.</p>
2447 *
2448 * <p>Otherwise, this method requires the caller to hold the ability to modify system
2449 * settings as determined by {@link android.provider.Settings.System#canWrite}.</p>
2450 *
2451 * @return a boolean - {@code true} indicating Tethering is supported.
2452 *
2453 * @deprecated Use {@link TetheringEventCallback#onTetheringSupported(boolean)} instead.
2454 * {@hide}
2455 */
2456 @SystemApi
2457 @RequiresPermission(anyOf = {android.Manifest.permission.TETHER_PRIVILEGED,
2458 android.Manifest.permission.WRITE_SETTINGS})
2459 public boolean isTetheringSupported() {
2460 return mTetheringManager.isTetheringSupported();
2461 }
2462
2463 /**
2464 * Callback for use with {@link #startTethering} to find out whether tethering succeeded.
2465 *
2466 * @deprecated Use {@link TetheringManager.StartTetheringCallback} instead.
2467 * @hide
2468 */
2469 @SystemApi
2470 @Deprecated
2471 public static abstract class OnStartTetheringCallback {
2472 /**
2473 * Called when tethering has been successfully started.
2474 */
2475 public void onTetheringStarted() {}
2476
2477 /**
2478 * Called when starting tethering failed.
2479 */
2480 public void onTetheringFailed() {}
2481 }
2482
2483 /**
2484 * Convenient overload for
2485 * {@link #startTethering(int, boolean, OnStartTetheringCallback, Handler)} which passes a null
2486 * handler to run on the current thread's {@link Looper}.
2487 *
2488 * @deprecated Use {@link TetheringManager#startTethering} instead.
2489 * @hide
2490 */
2491 @SystemApi
2492 @Deprecated
2493 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2494 public void startTethering(int type, boolean showProvisioningUi,
2495 final OnStartTetheringCallback callback) {
2496 startTethering(type, showProvisioningUi, callback, null);
2497 }
2498
2499 /**
2500 * Runs tether provisioning for the given type if needed and then starts tethering if
2501 * the check succeeds. If no carrier provisioning is required for tethering, tethering is
2502 * enabled immediately. If provisioning fails, tethering will not be enabled. It also
2503 * schedules tether provisioning re-checks if appropriate.
2504 *
2505 * @param type The type of tethering to start. Must be one of
2506 * {@link ConnectivityManager.TETHERING_WIFI},
2507 * {@link ConnectivityManager.TETHERING_USB}, or
2508 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2509 * @param showProvisioningUi a boolean indicating to show the provisioning app UI if there
2510 * is one. This should be true the first time this function is called and also any time
2511 * the user can see this UI. It gives users information from their carrier about the
2512 * check failing and how they can sign up for tethering if possible.
2513 * @param callback an {@link OnStartTetheringCallback} which will be called to notify the caller
2514 * of the result of trying to tether.
2515 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
2516 *
2517 * @deprecated Use {@link TetheringManager#startTethering} instead.
2518 * @hide
2519 */
2520 @SystemApi
2521 @Deprecated
2522 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2523 public void startTethering(int type, boolean showProvisioningUi,
2524 final OnStartTetheringCallback callback, Handler handler) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09002525 Objects.requireNonNull(callback, "OnStartTetheringCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002526
2527 final Executor executor = new Executor() {
2528 @Override
2529 public void execute(Runnable command) {
2530 if (handler == null) {
2531 command.run();
2532 } else {
2533 handler.post(command);
2534 }
2535 }
2536 };
2537
2538 final StartTetheringCallback tetheringCallback = new StartTetheringCallback() {
2539 @Override
2540 public void onTetheringStarted() {
2541 callback.onTetheringStarted();
2542 }
2543
2544 @Override
2545 public void onTetheringFailed(final int error) {
2546 callback.onTetheringFailed();
2547 }
2548 };
2549
2550 final TetheringRequest request = new TetheringRequest.Builder(type)
2551 .setShouldShowEntitlementUi(showProvisioningUi).build();
2552
2553 mTetheringManager.startTethering(request, executor, tetheringCallback);
2554 }
2555
2556 /**
2557 * Stops tethering for the given type. Also cancels any provisioning rechecks for that type if
2558 * applicable.
2559 *
2560 * @param type The type of tethering to stop. Must be one of
2561 * {@link ConnectivityManager.TETHERING_WIFI},
2562 * {@link ConnectivityManager.TETHERING_USB}, or
2563 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2564 *
2565 * @deprecated Use {@link TetheringManager#stopTethering} instead.
2566 * @hide
2567 */
2568 @SystemApi
2569 @Deprecated
2570 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2571 public void stopTethering(int type) {
2572 mTetheringManager.stopTethering(type);
2573 }
2574
2575 /**
2576 * Callback for use with {@link registerTetheringEventCallback} to find out tethering
2577 * upstream status.
2578 *
2579 * @deprecated Use {@link TetheringManager#OnTetheringEventCallback} instead.
2580 * @hide
2581 */
2582 @SystemApi
2583 @Deprecated
2584 public abstract static class OnTetheringEventCallback {
2585
2586 /**
2587 * Called when tethering upstream changed. This can be called multiple times and can be
2588 * called any time.
2589 *
2590 * @param network the {@link Network} of tethering upstream. Null means tethering doesn't
2591 * have any upstream.
2592 */
2593 public void onUpstreamChanged(@Nullable Network network) {}
2594 }
2595
2596 @GuardedBy("mTetheringEventCallbacks")
2597 private final ArrayMap<OnTetheringEventCallback, TetheringEventCallback>
2598 mTetheringEventCallbacks = new ArrayMap<>();
2599
2600 /**
2601 * Start listening to tethering change events. Any new added callback will receive the last
2602 * tethering status right away. If callback is registered when tethering has no upstream or
2603 * disabled, {@link OnTetheringEventCallback#onUpstreamChanged} will immediately be called
2604 * with a null argument. The same callback object cannot be registered twice.
2605 *
2606 * @param executor the executor on which callback will be invoked.
2607 * @param callback the callback to be called when tethering has change events.
2608 *
2609 * @deprecated Use {@link TetheringManager#registerTetheringEventCallback} instead.
2610 * @hide
2611 */
2612 @SystemApi
2613 @Deprecated
2614 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2615 public void registerTetheringEventCallback(
2616 @NonNull @CallbackExecutor Executor executor,
2617 @NonNull final OnTetheringEventCallback callback) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09002618 Objects.requireNonNull(callback, "OnTetheringEventCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002619
2620 final TetheringEventCallback tetherCallback =
2621 new TetheringEventCallback() {
2622 @Override
2623 public void onUpstreamChanged(@Nullable Network network) {
2624 callback.onUpstreamChanged(network);
2625 }
2626 };
2627
2628 synchronized (mTetheringEventCallbacks) {
2629 mTetheringEventCallbacks.put(callback, tetherCallback);
2630 mTetheringManager.registerTetheringEventCallback(executor, tetherCallback);
2631 }
2632 }
2633
2634 /**
2635 * Remove tethering event callback previously registered with
2636 * {@link #registerTetheringEventCallback}.
2637 *
2638 * @param callback previously registered callback.
2639 *
2640 * @deprecated Use {@link TetheringManager#unregisterTetheringEventCallback} instead.
2641 * @hide
2642 */
2643 @SystemApi
2644 @Deprecated
2645 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2646 public void unregisterTetheringEventCallback(
2647 @NonNull final OnTetheringEventCallback callback) {
2648 Objects.requireNonNull(callback, "The callback must be non-null");
2649 synchronized (mTetheringEventCallbacks) {
2650 final TetheringEventCallback tetherCallback =
2651 mTetheringEventCallbacks.remove(callback);
2652 mTetheringManager.unregisterTetheringEventCallback(tetherCallback);
2653 }
2654 }
2655
2656
2657 /**
2658 * Get the list of regular expressions that define any tetherable
2659 * USB network interfaces. If USB tethering is not supported by the
2660 * device, this list should be empty.
2661 *
2662 * @return an array of 0 or more regular expression Strings defining
2663 * what interfaces are considered tetherable usb interfaces.
2664 *
2665 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2666 * {@hide}
2667 */
2668 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2669 @UnsupportedAppUsage
2670 @Deprecated
2671 public String[] getTetherableUsbRegexs() {
2672 return mTetheringManager.getTetherableUsbRegexs();
2673 }
2674
2675 /**
2676 * Get the list of regular expressions that define any tetherable
2677 * Wifi network interfaces. If Wifi tethering is not supported by the
2678 * device, this list should be empty.
2679 *
2680 * @return an array of 0 or more regular expression Strings defining
2681 * what interfaces are considered tetherable wifi interfaces.
2682 *
2683 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2684 * {@hide}
2685 */
2686 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2687 @UnsupportedAppUsage
2688 @Deprecated
2689 public String[] getTetherableWifiRegexs() {
2690 return mTetheringManager.getTetherableWifiRegexs();
2691 }
2692
2693 /**
2694 * Get the list of regular expressions that define any tetherable
2695 * Bluetooth network interfaces. If Bluetooth tethering is not supported by the
2696 * device, this list should be empty.
2697 *
2698 * @return an array of 0 or more regular expression Strings defining
2699 * what interfaces are considered tetherable bluetooth interfaces.
2700 *
2701 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged(
2702 *TetheringManager.TetheringInterfaceRegexps)} instead.
2703 * {@hide}
2704 */
2705 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2706 @UnsupportedAppUsage
2707 @Deprecated
2708 public String[] getTetherableBluetoothRegexs() {
2709 return mTetheringManager.getTetherableBluetoothRegexs();
2710 }
2711
2712 /**
2713 * Attempt to both alter the mode of USB and Tethering of USB. A
2714 * utility method to deal with some of the complexity of USB - will
2715 * attempt to switch to Rndis and subsequently tether the resulting
2716 * interface on {@code true} or turn off tethering and switch off
2717 * Rndis on {@code false}.
2718 *
2719 * <p>This method requires the caller to hold either the
2720 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2721 * or the ability to modify system settings as determined by
2722 * {@link android.provider.Settings.System#canWrite}.</p>
2723 *
2724 * @param enable a boolean - {@code true} to enable tethering
2725 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2726 * @deprecated Use {@link TetheringManager#startTethering} instead
2727 *
2728 * {@hide}
2729 */
2730 @UnsupportedAppUsage
2731 @Deprecated
2732 public int setUsbTethering(boolean enable) {
2733 return mTetheringManager.setUsbTethering(enable);
2734 }
2735
2736 /**
2737 * @deprecated Use {@link TetheringManager#TETHER_ERROR_NO_ERROR}.
2738 * {@hide}
2739 */
2740 @SystemApi
2741 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002742 public static final int TETHER_ERROR_NO_ERROR = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002743 /**
2744 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNKNOWN_IFACE}.
2745 * {@hide}
2746 */
2747 @Deprecated
2748 public static final int TETHER_ERROR_UNKNOWN_IFACE =
2749 TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2750 /**
2751 * @deprecated Use {@link TetheringManager#TETHER_ERROR_SERVICE_UNAVAIL}.
2752 * {@hide}
2753 */
2754 @Deprecated
2755 public static final int TETHER_ERROR_SERVICE_UNAVAIL =
2756 TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
2757 /**
2758 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNSUPPORTED}.
2759 * {@hide}
2760 */
2761 @Deprecated
2762 public static final int TETHER_ERROR_UNSUPPORTED = TetheringManager.TETHER_ERROR_UNSUPPORTED;
2763 /**
2764 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNAVAIL_IFACE}.
2765 * {@hide}
2766 */
2767 @Deprecated
2768 public static final int TETHER_ERROR_UNAVAIL_IFACE =
2769 TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
2770 /**
2771 * @deprecated Use {@link TetheringManager#TETHER_ERROR_INTERNAL_ERROR}.
2772 * {@hide}
2773 */
2774 @Deprecated
2775 public static final int TETHER_ERROR_MASTER_ERROR =
2776 TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
2777 /**
2778 * @deprecated Use {@link TetheringManager#TETHER_ERROR_TETHER_IFACE_ERROR}.
2779 * {@hide}
2780 */
2781 @Deprecated
2782 public static final int TETHER_ERROR_TETHER_IFACE_ERROR =
2783 TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR;
2784 /**
2785 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNTETHER_IFACE_ERROR}.
2786 * {@hide}
2787 */
2788 @Deprecated
2789 public static final int TETHER_ERROR_UNTETHER_IFACE_ERROR =
2790 TetheringManager.TETHER_ERROR_UNTETHER_IFACE_ERROR;
2791 /**
2792 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENABLE_FORWARDING_ERROR}.
2793 * {@hide}
2794 */
2795 @Deprecated
2796 public static final int TETHER_ERROR_ENABLE_NAT_ERROR =
2797 TetheringManager.TETHER_ERROR_ENABLE_FORWARDING_ERROR;
2798 /**
2799 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DISABLE_FORWARDING_ERROR}.
2800 * {@hide}
2801 */
2802 @Deprecated
2803 public static final int TETHER_ERROR_DISABLE_NAT_ERROR =
2804 TetheringManager.TETHER_ERROR_DISABLE_FORWARDING_ERROR;
2805 /**
2806 * @deprecated Use {@link TetheringManager#TETHER_ERROR_IFACE_CFG_ERROR}.
2807 * {@hide}
2808 */
2809 @Deprecated
2810 public static final int TETHER_ERROR_IFACE_CFG_ERROR =
2811 TetheringManager.TETHER_ERROR_IFACE_CFG_ERROR;
2812 /**
2813 * @deprecated Use {@link TetheringManager#TETHER_ERROR_PROVISIONING_FAILED}.
2814 * {@hide}
2815 */
2816 @SystemApi
2817 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002818 public static final int TETHER_ERROR_PROVISION_FAILED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002819 /**
2820 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DHCPSERVER_ERROR}.
2821 * {@hide}
2822 */
2823 @Deprecated
2824 public static final int TETHER_ERROR_DHCPSERVER_ERROR =
2825 TetheringManager.TETHER_ERROR_DHCPSERVER_ERROR;
2826 /**
2827 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENTITLEMENT_UNKNOWN}.
2828 * {@hide}
2829 */
2830 @SystemApi
2831 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002832 public static final int TETHER_ERROR_ENTITLEMENT_UNKONWN = 13;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002833
2834 /**
2835 * Get a more detailed error code after a Tethering or Untethering
2836 * request asynchronously failed.
2837 *
2838 * @param iface The name of the interface of interest
2839 * @return error The error code of the last error tethering or untethering the named
2840 * interface
2841 *
2842 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2843 * {@hide}
2844 */
2845 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2846 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2847 @Deprecated
2848 public int getLastTetherError(String iface) {
2849 int error = mTetheringManager.getLastTetherError(iface);
2850 if (error == TetheringManager.TETHER_ERROR_UNKNOWN_TYPE) {
2851 // TETHER_ERROR_UNKNOWN_TYPE was introduced with TetheringManager and has never been
2852 // returned by ConnectivityManager. Convert it to the legacy TETHER_ERROR_UNKNOWN_IFACE
2853 // instead.
2854 error = TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2855 }
2856 return error;
2857 }
2858
2859 /** @hide */
2860 @Retention(RetentionPolicy.SOURCE)
2861 @IntDef(value = {
2862 TETHER_ERROR_NO_ERROR,
2863 TETHER_ERROR_PROVISION_FAILED,
2864 TETHER_ERROR_ENTITLEMENT_UNKONWN,
2865 })
2866 public @interface EntitlementResultCode {
2867 }
2868
2869 /**
2870 * Callback for use with {@link #getLatestTetheringEntitlementResult} to find out whether
2871 * entitlement succeeded.
2872 *
2873 * @deprecated Use {@link TetheringManager#OnTetheringEntitlementResultListener} instead.
2874 * @hide
2875 */
2876 @SystemApi
2877 @Deprecated
2878 public interface OnTetheringEntitlementResultListener {
2879 /**
2880 * Called to notify entitlement result.
2881 *
2882 * @param resultCode an int value of entitlement result. It may be one of
2883 * {@link #TETHER_ERROR_NO_ERROR},
2884 * {@link #TETHER_ERROR_PROVISION_FAILED}, or
2885 * {@link #TETHER_ERROR_ENTITLEMENT_UNKONWN}.
2886 */
2887 void onTetheringEntitlementResult(@EntitlementResultCode int resultCode);
2888 }
2889
2890 /**
2891 * Get the last value of the entitlement check on this downstream. If the cached value is
2892 * {@link #TETHER_ERROR_NO_ERROR} or showEntitlementUi argument is false, it just return the
2893 * cached value. Otherwise, a UI-based entitlement check would be performed. It is not
2894 * guaranteed that the UI-based entitlement check will complete in any specific time period
2895 * and may in fact never complete. Any successful entitlement check the platform performs for
2896 * any reason will update the cached value.
2897 *
2898 * @param type the downstream type of tethering. Must be one of
2899 * {@link #TETHERING_WIFI},
2900 * {@link #TETHERING_USB}, or
2901 * {@link #TETHERING_BLUETOOTH}.
2902 * @param showEntitlementUi a boolean indicating whether to run UI-based entitlement check.
2903 * @param executor the executor on which callback will be invoked.
2904 * @param listener an {@link OnTetheringEntitlementResultListener} which will be called to
2905 * notify the caller of the result of entitlement check. The listener may be called zero
2906 * or one time.
2907 * @deprecated Use {@link TetheringManager#requestLatestTetheringEntitlementResult} instead.
2908 * {@hide}
2909 */
2910 @SystemApi
2911 @Deprecated
2912 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2913 public void getLatestTetheringEntitlementResult(int type, boolean showEntitlementUi,
2914 @NonNull @CallbackExecutor Executor executor,
2915 @NonNull final OnTetheringEntitlementResultListener listener) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09002916 Objects.requireNonNull(listener, "TetheringEntitlementResultListener cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002917 ResultReceiver wrappedListener = new ResultReceiver(null) {
2918 @Override
2919 protected void onReceiveResult(int resultCode, Bundle resultData) {
lucaslineaff72d2021-03-04 09:38:21 +08002920 final long token = Binder.clearCallingIdentity();
2921 try {
2922 executor.execute(() -> {
2923 listener.onTetheringEntitlementResult(resultCode);
2924 });
2925 } finally {
2926 Binder.restoreCallingIdentity(token);
2927 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002928 }
2929 };
2930
2931 mTetheringManager.requestLatestTetheringEntitlementResult(type, wrappedListener,
2932 showEntitlementUi);
2933 }
2934
2935 /**
2936 * Report network connectivity status. This is currently used only
2937 * to alter status bar UI.
2938 * <p>This method requires the caller to hold the permission
2939 * {@link android.Manifest.permission#STATUS_BAR}.
2940 *
2941 * @param networkType The type of network you want to report on
2942 * @param percentage The quality of the connection 0 is bad, 100 is good
2943 * @deprecated Types are deprecated. Use {@link #reportNetworkConnectivity} instead.
2944 * {@hide}
2945 */
2946 public void reportInetCondition(int networkType, int percentage) {
2947 printStackTrace();
2948 try {
2949 mService.reportInetCondition(networkType, percentage);
2950 } catch (RemoteException e) {
2951 throw e.rethrowFromSystemServer();
2952 }
2953 }
2954
2955 /**
2956 * Report a problem network to the framework. This provides a hint to the system
2957 * that there might be connectivity problems on this network and may cause
2958 * the framework to re-evaluate network connectivity and/or switch to another
2959 * network.
2960 *
2961 * @param network The {@link Network} the application was attempting to use
2962 * or {@code null} to indicate the current default network.
2963 * @deprecated Use {@link #reportNetworkConnectivity} which allows reporting both
2964 * working and non-working connectivity.
2965 */
2966 @Deprecated
2967 public void reportBadNetwork(@Nullable Network network) {
2968 printStackTrace();
2969 try {
2970 // One of these will be ignored because it matches system's current state.
2971 // The other will trigger the necessary reevaluation.
2972 mService.reportNetworkConnectivity(network, true);
2973 mService.reportNetworkConnectivity(network, false);
2974 } catch (RemoteException e) {
2975 throw e.rethrowFromSystemServer();
2976 }
2977 }
2978
2979 /**
2980 * Report to the framework whether a network has working connectivity.
2981 * This provides a hint to the system that a particular network is providing
2982 * working connectivity or not. In response the framework may re-evaluate
2983 * the network's connectivity and might take further action thereafter.
2984 *
2985 * @param network The {@link Network} the application was attempting to use
2986 * or {@code null} to indicate the current default network.
2987 * @param hasConnectivity {@code true} if the application was able to successfully access the
2988 * Internet using {@code network} or {@code false} if not.
2989 */
2990 public void reportNetworkConnectivity(@Nullable Network network, boolean hasConnectivity) {
2991 printStackTrace();
2992 try {
2993 mService.reportNetworkConnectivity(network, hasConnectivity);
2994 } catch (RemoteException e) {
2995 throw e.rethrowFromSystemServer();
2996 }
2997 }
2998
2999 /**
3000 * Set a network-independent global http proxy. This is not normally what you want
3001 * for typical HTTP proxies - they are general network dependent. However if you're
3002 * doing something unusual like general internal filtering this may be useful. On
3003 * a private network where the proxy is not accessible, you may break HTTP using this.
3004 *
3005 * @param p A {@link ProxyInfo} object defining the new global
3006 * HTTP proxy. A {@code null} value will clear the global HTTP proxy.
3007 * @hide
3008 */
3009 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
3010 public void setGlobalProxy(ProxyInfo p) {
3011 try {
3012 mService.setGlobalProxy(p);
3013 } catch (RemoteException e) {
3014 throw e.rethrowFromSystemServer();
3015 }
3016 }
3017
3018 /**
3019 * Retrieve any network-independent global HTTP proxy.
3020 *
3021 * @return {@link ProxyInfo} for the current global HTTP proxy or {@code null}
3022 * if no global HTTP proxy is set.
3023 * @hide
3024 */
3025 public ProxyInfo getGlobalProxy() {
3026 try {
3027 return mService.getGlobalProxy();
3028 } catch (RemoteException e) {
3029 throw e.rethrowFromSystemServer();
3030 }
3031 }
3032
3033 /**
3034 * Retrieve the global HTTP proxy, or if no global HTTP proxy is set, a
3035 * network-specific HTTP proxy. If {@code network} is null, the
3036 * network-specific proxy returned is the proxy of the default active
3037 * network.
3038 *
3039 * @return {@link ProxyInfo} for the current global HTTP proxy, or if no
3040 * global HTTP proxy is set, {@code ProxyInfo} for {@code network},
3041 * or when {@code network} is {@code null},
3042 * the {@code ProxyInfo} for the default active network. Returns
3043 * {@code null} when no proxy applies or the caller doesn't have
3044 * permission to use {@code network}.
3045 * @hide
3046 */
3047 public ProxyInfo getProxyForNetwork(Network network) {
3048 try {
3049 return mService.getProxyForNetwork(network);
3050 } catch (RemoteException e) {
3051 throw e.rethrowFromSystemServer();
3052 }
3053 }
3054
3055 /**
3056 * Get the current default HTTP proxy settings. If a global proxy is set it will be returned,
3057 * otherwise if this process is bound to a {@link Network} using
3058 * {@link #bindProcessToNetwork} then that {@code Network}'s proxy is returned, otherwise
3059 * the default network's proxy is returned.
3060 *
3061 * @return the {@link ProxyInfo} for the current HTTP proxy, or {@code null} if no
3062 * HTTP proxy is active.
3063 */
3064 @Nullable
3065 public ProxyInfo getDefaultProxy() {
3066 return getProxyForNetwork(getBoundNetworkForProcess());
3067 }
3068
3069 /**
3070 * Returns true if the hardware supports the given network type
3071 * else it returns false. This doesn't indicate we have coverage
3072 * or are authorized onto a network, just whether or not the
3073 * hardware supports it. For example a GSM phone without a SIM
3074 * should still return {@code true} for mobile data, but a wifi only
3075 * tablet would return {@code false}.
3076 *
3077 * @param networkType The network type we'd like to check
3078 * @return {@code true} if supported, else {@code false}
3079 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
3080 * @hide
3081 */
3082 @Deprecated
3083 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3084 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
3085 public boolean isNetworkSupported(int networkType) {
3086 try {
3087 return mService.isNetworkSupported(networkType);
3088 } catch (RemoteException e) {
3089 throw e.rethrowFromSystemServer();
3090 }
3091 }
3092
3093 /**
3094 * Returns if the currently active data network is metered. A network is
3095 * classified as metered when the user is sensitive to heavy data usage on
3096 * that connection due to monetary costs, data limitations or
3097 * battery/performance issues. You should check this before doing large
3098 * data transfers, and warn the user or delay the operation until another
3099 * network is available.
3100 *
3101 * @return {@code true} if large transfers should be avoided, otherwise
3102 * {@code false}.
3103 */
3104 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3105 public boolean isActiveNetworkMetered() {
3106 try {
3107 return mService.isActiveNetworkMetered();
3108 } catch (RemoteException e) {
3109 throw e.rethrowFromSystemServer();
3110 }
3111 }
3112
3113 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003114 * Set sign in error notification to visible or invisible
3115 *
3116 * @hide
3117 * @deprecated Doesn't properly deal with multiple connected networks of the same type.
3118 */
3119 @Deprecated
3120 public void setProvisioningNotificationVisible(boolean visible, int networkType,
3121 String action) {
3122 try {
3123 mService.setProvisioningNotificationVisible(visible, networkType, action);
3124 } catch (RemoteException e) {
3125 throw e.rethrowFromSystemServer();
3126 }
3127 }
3128
3129 /**
3130 * Set the value for enabling/disabling airplane mode
3131 *
3132 * @param enable whether to enable airplane mode or not
3133 *
3134 * @hide
3135 */
3136 @RequiresPermission(anyOf = {
3137 android.Manifest.permission.NETWORK_AIRPLANE_MODE,
3138 android.Manifest.permission.NETWORK_SETTINGS,
3139 android.Manifest.permission.NETWORK_SETUP_WIZARD,
3140 android.Manifest.permission.NETWORK_STACK})
3141 @SystemApi
3142 public void setAirplaneMode(boolean enable) {
3143 try {
3144 mService.setAirplaneMode(enable);
3145 } catch (RemoteException e) {
3146 throw e.rethrowFromSystemServer();
3147 }
3148 }
3149
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003150 /**
3151 * Registers the specified {@link NetworkProvider}.
3152 * Each listener must only be registered once. The listener can be unregistered with
3153 * {@link #unregisterNetworkProvider}.
3154 *
3155 * @param provider the provider to register
3156 * @return the ID of the provider. This ID must be used by the provider when registering
3157 * {@link android.net.NetworkAgent}s.
3158 * @hide
3159 */
3160 @SystemApi
3161 @RequiresPermission(anyOf = {
3162 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3163 android.Manifest.permission.NETWORK_FACTORY})
3164 public int registerNetworkProvider(@NonNull NetworkProvider provider) {
3165 if (provider.getProviderId() != NetworkProvider.ID_NONE) {
3166 throw new IllegalStateException("NetworkProviders can only be registered once");
3167 }
3168
3169 try {
3170 int providerId = mService.registerNetworkProvider(provider.getMessenger(),
3171 provider.getName());
3172 provider.setProviderId(providerId);
3173 } catch (RemoteException e) {
3174 throw e.rethrowFromSystemServer();
3175 }
3176 return provider.getProviderId();
3177 }
3178
3179 /**
3180 * Unregisters the specified NetworkProvider.
3181 *
3182 * @param provider the provider to unregister
3183 * @hide
3184 */
3185 @SystemApi
3186 @RequiresPermission(anyOf = {
3187 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3188 android.Manifest.permission.NETWORK_FACTORY})
3189 public void unregisterNetworkProvider(@NonNull NetworkProvider provider) {
3190 try {
3191 mService.unregisterNetworkProvider(provider.getMessenger());
3192 } catch (RemoteException e) {
3193 throw e.rethrowFromSystemServer();
3194 }
3195 provider.setProviderId(NetworkProvider.ID_NONE);
3196 }
3197
3198
3199 /** @hide exposed via the NetworkProvider class. */
3200 @RequiresPermission(anyOf = {
3201 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3202 android.Manifest.permission.NETWORK_FACTORY})
3203 public void declareNetworkRequestUnfulfillable(@NonNull NetworkRequest request) {
3204 try {
3205 mService.declareNetworkRequestUnfulfillable(request);
3206 } catch (RemoteException e) {
3207 throw e.rethrowFromSystemServer();
3208 }
3209 }
3210
3211 // TODO : remove this method. It is a stopgap measure to help sheperding a number
3212 // of dependent changes that would conflict throughout the automerger graph. Having this
3213 // temporarily helps with the process of going through with all these dependent changes across
3214 // the entire tree.
3215 /**
3216 * @hide
3217 * Register a NetworkAgent with ConnectivityService.
3218 * @return Network corresponding to NetworkAgent.
3219 */
3220 @RequiresPermission(anyOf = {
3221 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3222 android.Manifest.permission.NETWORK_FACTORY})
3223 public Network registerNetworkAgent(INetworkAgent na, NetworkInfo ni, LinkProperties lp,
3224 NetworkCapabilities nc, int score, NetworkAgentConfig config) {
3225 return registerNetworkAgent(na, ni, lp, nc, score, config, NetworkProvider.ID_NONE);
3226 }
3227
3228 /**
3229 * @hide
3230 * Register a NetworkAgent with ConnectivityService.
3231 * @return Network corresponding to NetworkAgent.
3232 */
3233 @RequiresPermission(anyOf = {
3234 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3235 android.Manifest.permission.NETWORK_FACTORY})
3236 public Network registerNetworkAgent(INetworkAgent na, NetworkInfo ni, LinkProperties lp,
3237 NetworkCapabilities nc, int score, NetworkAgentConfig config, int providerId) {
3238 try {
3239 return mService.registerNetworkAgent(na, ni, lp, nc, score, config, providerId);
3240 } catch (RemoteException e) {
3241 throw e.rethrowFromSystemServer();
3242 }
3243 }
3244
3245 /**
3246 * Base class for {@code NetworkRequest} callbacks. Used for notifications about network
3247 * changes. Should be extended by applications wanting notifications.
3248 *
3249 * A {@code NetworkCallback} is registered by calling
3250 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
3251 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)},
3252 * or {@link #registerDefaultNetworkCallback(NetworkCallback)}. A {@code NetworkCallback} is
3253 * unregistered by calling {@link #unregisterNetworkCallback(NetworkCallback)}.
3254 * A {@code NetworkCallback} should be registered at most once at any time.
3255 * A {@code NetworkCallback} that has been unregistered can be registered again.
3256 */
3257 public static class NetworkCallback {
3258 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003259 * No flags associated with this callback.
3260 * @hide
3261 */
3262 public static final int FLAG_NONE = 0;
3263 /**
3264 * Use this flag to include any location sensitive data in {@link NetworkCapabilities} sent
3265 * via {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}.
3266 * <p>
3267 * These include:
3268 * <li> Some transport info instances (retrieved via
3269 * {@link NetworkCapabilities#getTransportInfo()}) like {@link android.net.wifi.WifiInfo}
3270 * contain location sensitive information.
3271 * <li> OwnerUid (retrieved via {@link NetworkCapabilities#getOwnerUid()} is location
3272 * sensitive for wifi suggestor apps (i.e using {@link WifiNetworkSuggestion}).</li>
3273 * </p>
3274 * <p>
3275 * Note:
3276 * <li> Retrieving this location sensitive information (subject to app's location
3277 * permissions) will be noted by system. </li>
3278 * <li> Without this flag any {@link NetworkCapabilities} provided via the callback does
3279 * not include location sensitive info.
3280 * </p>
3281 */
3282 public static final int FLAG_INCLUDE_LOCATION_INFO = 1 << 0;
3283
3284 /** @hide */
3285 @Retention(RetentionPolicy.SOURCE)
3286 @IntDef(flag = true, prefix = "FLAG_", value = {
3287 FLAG_NONE,
3288 FLAG_INCLUDE_LOCATION_INFO
3289 })
3290 public @interface Flag { }
3291
3292 /**
3293 * All the valid flags for error checking.
3294 */
3295 private static final int VALID_FLAGS = FLAG_INCLUDE_LOCATION_INFO;
3296
3297 public NetworkCallback() {
3298 this(FLAG_NONE);
3299 }
3300
3301 public NetworkCallback(@Flag int flags) {
3302 Preconditions.checkArgument((flags & VALID_FLAGS) == flags);
3303 mFlags = flags;
3304 }
3305
3306 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003307 * Called when the framework connects to a new network to evaluate whether it satisfies this
3308 * request. If evaluation succeeds, this callback may be followed by an {@link #onAvailable}
3309 * callback. There is no guarantee that this new network will satisfy any requests, or that
3310 * the network will stay connected for longer than the time necessary to evaluate it.
3311 * <p>
3312 * Most applications <b>should not</b> act on this callback, and should instead use
3313 * {@link #onAvailable}. This callback is intended for use by applications that can assist
3314 * the framework in properly evaluating the network &mdash; for example, an application that
3315 * can automatically log in to a captive portal without user intervention.
3316 *
3317 * @param network The {@link Network} of the network that is being evaluated.
3318 *
3319 * @hide
3320 */
3321 public void onPreCheck(@NonNull Network network) {}
3322
3323 /**
3324 * Called when the framework connects and has declared a new network ready for use.
3325 * This callback may be called more than once if the {@link Network} that is
3326 * satisfying the request changes.
3327 *
3328 * @param network The {@link Network} of the satisfying network.
3329 * @param networkCapabilities The {@link NetworkCapabilities} of the satisfying network.
3330 * @param linkProperties The {@link LinkProperties} of the satisfying network.
3331 * @param blocked Whether access to the {@link Network} is blocked due to system policy.
3332 * @hide
3333 */
3334 public void onAvailable(@NonNull Network network,
3335 @NonNull NetworkCapabilities networkCapabilities,
3336 @NonNull LinkProperties linkProperties, boolean blocked) {
3337 // Internally only this method is called when a new network is available, and
3338 // it calls the callback in the same way and order that older versions used
3339 // to call so as not to change the behavior.
3340 onAvailable(network);
3341 if (!networkCapabilities.hasCapability(
3342 NetworkCapabilities.NET_CAPABILITY_NOT_SUSPENDED)) {
3343 onNetworkSuspended(network);
3344 }
3345 onCapabilitiesChanged(network, networkCapabilities);
3346 onLinkPropertiesChanged(network, linkProperties);
3347 onBlockedStatusChanged(network, blocked);
3348 }
3349
3350 /**
3351 * Called when the framework connects and has declared a new network ready for use.
3352 *
3353 * <p>For callbacks registered with {@link #registerNetworkCallback}, multiple networks may
3354 * be available at the same time, and onAvailable will be called for each of these as they
3355 * appear.
3356 *
3357 * <p>For callbacks registered with {@link #requestNetwork} and
3358 * {@link #registerDefaultNetworkCallback}, this means the network passed as an argument
3359 * is the new best network for this request and is now tracked by this callback ; this
3360 * callback will no longer receive method calls about other networks that may have been
3361 * passed to this method previously. The previously-best network may have disconnected, or
3362 * it may still be around and the newly-best network may simply be better.
3363 *
3364 * <p>Starting with {@link android.os.Build.VERSION_CODES#O}, this will always immediately
3365 * be followed by a call to {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}
3366 * then by a call to {@link #onLinkPropertiesChanged(Network, LinkProperties)}, and a call
3367 * to {@link #onBlockedStatusChanged(Network, boolean)}.
3368 *
3369 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3370 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3371 * this callback as this is prone to race conditions (there is no guarantee the objects
3372 * returned by these methods will be current). Instead, wait for a call to
3373 * {@link #onCapabilitiesChanged(Network, NetworkCapabilities)} and
3374 * {@link #onLinkPropertiesChanged(Network, LinkProperties)} whose arguments are guaranteed
3375 * to be well-ordered with respect to other callbacks.
3376 *
3377 * @param network The {@link Network} of the satisfying network.
3378 */
3379 public void onAvailable(@NonNull Network network) {}
3380
3381 /**
3382 * Called when the network is about to be lost, typically because there are no outstanding
3383 * requests left for it. This may be paired with a {@link NetworkCallback#onAvailable} call
3384 * with the new replacement network for graceful handover. This method is not guaranteed
3385 * to be called before {@link NetworkCallback#onLost} is called, for example in case a
3386 * network is suddenly disconnected.
3387 *
3388 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3389 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3390 * this callback as this is prone to race conditions ; calling these methods while in a
3391 * callback may return an outdated or even a null object.
3392 *
3393 * @param network The {@link Network} that is about to be lost.
3394 * @param maxMsToLive The time in milliseconds the system intends to keep the network
3395 * connected for graceful handover; note that the network may still
3396 * suffer a hard loss at any time.
3397 */
3398 public void onLosing(@NonNull Network network, int maxMsToLive) {}
3399
3400 /**
3401 * Called when a network disconnects or otherwise no longer satisfies this request or
3402 * callback.
3403 *
3404 * <p>If the callback was registered with requestNetwork() or
3405 * registerDefaultNetworkCallback(), it will only be invoked against the last network
3406 * returned by onAvailable() when that network is lost and no other network satisfies
3407 * the criteria of the request.
3408 *
3409 * <p>If the callback was registered with registerNetworkCallback() it will be called for
3410 * each network which no longer satisfies the criteria of the callback.
3411 *
3412 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3413 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3414 * this callback as this is prone to race conditions ; calling these methods while in a
3415 * callback may return an outdated or even a null object.
3416 *
3417 * @param network The {@link Network} lost.
3418 */
3419 public void onLost(@NonNull Network network) {}
3420
3421 /**
3422 * Called if no network is found within the timeout time specified in
3423 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} call or if the
3424 * requested network request cannot be fulfilled (whether or not a timeout was
3425 * specified). When this callback is invoked the associated
3426 * {@link NetworkRequest} will have already been removed and released, as if
3427 * {@link #unregisterNetworkCallback(NetworkCallback)} had been called.
3428 */
3429 public void onUnavailable() {}
3430
3431 /**
3432 * Called when the network corresponding to this request changes capabilities but still
3433 * satisfies the requested criteria.
3434 *
3435 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3436 * to be called immediately after {@link #onAvailable}.
3437 *
3438 * <p>Do NOT call {@link #getLinkProperties(Network)} or other synchronous
3439 * ConnectivityManager methods in this callback as this is prone to race conditions :
3440 * calling these methods while in a callback may return an outdated or even a null object.
3441 *
3442 * @param network The {@link Network} whose capabilities have changed.
Roshan Piuse08bc182020-12-22 15:10:42 -08003443 * @param networkCapabilities The new {@link NetworkCapabilities} for this
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003444 * network.
3445 */
3446 public void onCapabilitiesChanged(@NonNull Network network,
3447 @NonNull NetworkCapabilities networkCapabilities) {}
3448
3449 /**
3450 * Called when the network corresponding to this request changes {@link LinkProperties}.
3451 *
3452 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3453 * to be called immediately after {@link #onAvailable}.
3454 *
3455 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or other synchronous
3456 * ConnectivityManager methods in this callback as this is prone to race conditions :
3457 * calling these methods while in a callback may return an outdated or even a null object.
3458 *
3459 * @param network The {@link Network} whose link properties have changed.
3460 * @param linkProperties The new {@link LinkProperties} for this network.
3461 */
3462 public void onLinkPropertiesChanged(@NonNull Network network,
3463 @NonNull LinkProperties linkProperties) {}
3464
3465 /**
3466 * Called when the network the framework connected to for this request suspends data
3467 * transmission temporarily.
3468 *
3469 * <p>This generally means that while the TCP connections are still live temporarily
3470 * network data fails to transfer. To give a specific example, this is used on cellular
3471 * networks to mask temporary outages when driving through a tunnel, etc. In general this
3472 * means read operations on sockets on this network will block once the buffers are
3473 * drained, and write operations will block once the buffers are full.
3474 *
3475 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3476 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3477 * this callback as this is prone to race conditions (there is no guarantee the objects
3478 * returned by these methods will be current).
3479 *
3480 * @hide
3481 */
3482 public void onNetworkSuspended(@NonNull Network network) {}
3483
3484 /**
3485 * Called when the network the framework connected to for this request
3486 * returns from a {@link NetworkInfo.State#SUSPENDED} state. This should always be
3487 * preceded by a matching {@link NetworkCallback#onNetworkSuspended} call.
3488
3489 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3490 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3491 * this callback as this is prone to race conditions : calling these methods while in a
3492 * callback may return an outdated or even a null object.
3493 *
3494 * @hide
3495 */
3496 public void onNetworkResumed(@NonNull Network network) {}
3497
3498 /**
3499 * Called when access to the specified network is blocked or unblocked.
3500 *
3501 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3502 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3503 * this callback as this is prone to race conditions : calling these methods while in a
3504 * callback may return an outdated or even a null object.
3505 *
3506 * @param network The {@link Network} whose blocked status has changed.
3507 * @param blocked The blocked status of this {@link Network}.
3508 */
3509 public void onBlockedStatusChanged(@NonNull Network network, boolean blocked) {}
3510
3511 private NetworkRequest networkRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -08003512 private final int mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003513 }
3514
3515 /**
3516 * Constant error codes used by ConnectivityService to communicate about failures and errors
3517 * across a Binder boundary.
3518 * @hide
3519 */
3520 public interface Errors {
3521 int TOO_MANY_REQUESTS = 1;
3522 }
3523
3524 /** @hide */
3525 public static class TooManyRequestsException extends RuntimeException {}
3526
3527 private static RuntimeException convertServiceException(ServiceSpecificException e) {
3528 switch (e.errorCode) {
3529 case Errors.TOO_MANY_REQUESTS:
3530 return new TooManyRequestsException();
3531 default:
3532 Log.w(TAG, "Unknown service error code " + e.errorCode);
3533 return new RuntimeException(e);
3534 }
3535 }
3536
3537 private static final int BASE = Protocol.BASE_CONNECTIVITY_MANAGER;
3538 /** @hide */
3539 public static final int CALLBACK_PRECHECK = BASE + 1;
3540 /** @hide */
3541 public static final int CALLBACK_AVAILABLE = BASE + 2;
3542 /** @hide arg1 = TTL */
3543 public static final int CALLBACK_LOSING = BASE + 3;
3544 /** @hide */
3545 public static final int CALLBACK_LOST = BASE + 4;
3546 /** @hide */
3547 public static final int CALLBACK_UNAVAIL = BASE + 5;
3548 /** @hide */
3549 public static final int CALLBACK_CAP_CHANGED = BASE + 6;
3550 /** @hide */
3551 public static final int CALLBACK_IP_CHANGED = BASE + 7;
3552 /** @hide obj = NetworkCapabilities, arg1 = seq number */
3553 private static final int EXPIRE_LEGACY_REQUEST = BASE + 8;
3554 /** @hide */
3555 public static final int CALLBACK_SUSPENDED = BASE + 9;
3556 /** @hide */
3557 public static final int CALLBACK_RESUMED = BASE + 10;
3558 /** @hide */
3559 public static final int CALLBACK_BLK_CHANGED = BASE + 11;
3560
3561 /** @hide */
3562 public static String getCallbackName(int whichCallback) {
3563 switch (whichCallback) {
3564 case CALLBACK_PRECHECK: return "CALLBACK_PRECHECK";
3565 case CALLBACK_AVAILABLE: return "CALLBACK_AVAILABLE";
3566 case CALLBACK_LOSING: return "CALLBACK_LOSING";
3567 case CALLBACK_LOST: return "CALLBACK_LOST";
3568 case CALLBACK_UNAVAIL: return "CALLBACK_UNAVAIL";
3569 case CALLBACK_CAP_CHANGED: return "CALLBACK_CAP_CHANGED";
3570 case CALLBACK_IP_CHANGED: return "CALLBACK_IP_CHANGED";
3571 case EXPIRE_LEGACY_REQUEST: return "EXPIRE_LEGACY_REQUEST";
3572 case CALLBACK_SUSPENDED: return "CALLBACK_SUSPENDED";
3573 case CALLBACK_RESUMED: return "CALLBACK_RESUMED";
3574 case CALLBACK_BLK_CHANGED: return "CALLBACK_BLK_CHANGED";
3575 default:
3576 return Integer.toString(whichCallback);
3577 }
3578 }
3579
3580 private class CallbackHandler extends Handler {
3581 private static final String TAG = "ConnectivityManager.CallbackHandler";
3582 private static final boolean DBG = false;
3583
3584 CallbackHandler(Looper looper) {
3585 super(looper);
3586 }
3587
3588 CallbackHandler(Handler handler) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09003589 this(Objects.requireNonNull(handler, "Handler cannot be null.").getLooper());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003590 }
3591
3592 @Override
3593 public void handleMessage(Message message) {
3594 if (message.what == EXPIRE_LEGACY_REQUEST) {
3595 expireRequest((NetworkCapabilities) message.obj, message.arg1);
3596 return;
3597 }
3598
3599 final NetworkRequest request = getObject(message, NetworkRequest.class);
3600 final Network network = getObject(message, Network.class);
3601 final NetworkCallback callback;
3602 synchronized (sCallbacks) {
3603 callback = sCallbacks.get(request);
3604 if (callback == null) {
3605 Log.w(TAG,
3606 "callback not found for " + getCallbackName(message.what) + " message");
3607 return;
3608 }
3609 if (message.what == CALLBACK_UNAVAIL) {
3610 sCallbacks.remove(request);
3611 callback.networkRequest = ALREADY_UNREGISTERED;
3612 }
3613 }
3614 if (DBG) {
3615 Log.d(TAG, getCallbackName(message.what) + " for network " + network);
3616 }
3617
3618 switch (message.what) {
3619 case CALLBACK_PRECHECK: {
3620 callback.onPreCheck(network);
3621 break;
3622 }
3623 case CALLBACK_AVAILABLE: {
3624 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3625 LinkProperties lp = getObject(message, LinkProperties.class);
3626 callback.onAvailable(network, cap, lp, message.arg1 != 0);
3627 break;
3628 }
3629 case CALLBACK_LOSING: {
3630 callback.onLosing(network, message.arg1);
3631 break;
3632 }
3633 case CALLBACK_LOST: {
3634 callback.onLost(network);
3635 break;
3636 }
3637 case CALLBACK_UNAVAIL: {
3638 callback.onUnavailable();
3639 break;
3640 }
3641 case CALLBACK_CAP_CHANGED: {
3642 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3643 callback.onCapabilitiesChanged(network, cap);
3644 break;
3645 }
3646 case CALLBACK_IP_CHANGED: {
3647 LinkProperties lp = getObject(message, LinkProperties.class);
3648 callback.onLinkPropertiesChanged(network, lp);
3649 break;
3650 }
3651 case CALLBACK_SUSPENDED: {
3652 callback.onNetworkSuspended(network);
3653 break;
3654 }
3655 case CALLBACK_RESUMED: {
3656 callback.onNetworkResumed(network);
3657 break;
3658 }
3659 case CALLBACK_BLK_CHANGED: {
3660 boolean blocked = message.arg1 != 0;
3661 callback.onBlockedStatusChanged(network, blocked);
3662 }
3663 }
3664 }
3665
3666 private <T> T getObject(Message msg, Class<T> c) {
3667 return (T) msg.getData().getParcelable(c.getSimpleName());
3668 }
3669 }
3670
3671 private CallbackHandler getDefaultHandler() {
3672 synchronized (sCallbacks) {
3673 if (sCallbackHandler == null) {
3674 sCallbackHandler = new CallbackHandler(ConnectivityThread.getInstanceLooper());
3675 }
3676 return sCallbackHandler;
3677 }
3678 }
3679
3680 private static final HashMap<NetworkRequest, NetworkCallback> sCallbacks = new HashMap<>();
3681 private static CallbackHandler sCallbackHandler;
3682
3683 private NetworkRequest sendRequestForNetwork(NetworkCapabilities need, NetworkCallback callback,
3684 int timeoutMs, NetworkRequest.Type reqType, int legacyType, CallbackHandler handler) {
3685 printStackTrace();
3686 checkCallbackNotNull(callback);
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09003687 if (reqType != TRACK_DEFAULT && reqType != TRACK_SYSTEM_DEFAULT && need == null) {
3688 throw new IllegalArgumentException("null NetworkCapabilities");
3689 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003690 final NetworkRequest request;
3691 final String callingPackageName = mContext.getOpPackageName();
3692 try {
3693 synchronized(sCallbacks) {
3694 if (callback.networkRequest != null
3695 && callback.networkRequest != ALREADY_UNREGISTERED) {
3696 // TODO: throw exception instead and enforce 1:1 mapping of callbacks
3697 // and requests (http://b/20701525).
3698 Log.e(TAG, "NetworkCallback was already registered");
3699 }
3700 Messenger messenger = new Messenger(handler);
3701 Binder binder = new Binder();
Roshan Piuse08bc182020-12-22 15:10:42 -08003702 final int callbackFlags = callback.mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003703 if (reqType == LISTEN) {
3704 request = mService.listenForNetwork(
Roshan Piuse08bc182020-12-22 15:10:42 -08003705 need, messenger, binder, callbackFlags, callingPackageName,
Roshan Piusa8a477b2020-12-17 14:53:09 -08003706 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003707 } else {
3708 request = mService.requestNetwork(
3709 need, reqType.ordinal(), messenger, timeoutMs, binder, legacyType,
Roshan Piuse08bc182020-12-22 15:10:42 -08003710 callbackFlags, callingPackageName, getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003711 }
3712 if (request != null) {
3713 sCallbacks.put(request, callback);
3714 }
3715 callback.networkRequest = request;
3716 }
3717 } catch (RemoteException e) {
3718 throw e.rethrowFromSystemServer();
3719 } catch (ServiceSpecificException e) {
3720 throw convertServiceException(e);
3721 }
3722 return request;
3723 }
3724
3725 /**
3726 * Helper function to request a network with a particular legacy type.
3727 *
3728 * This API is only for use in internal system code that requests networks with legacy type and
3729 * relies on CONNECTIVITY_ACTION broadcasts instead of NetworkCallbacks. New caller should use
3730 * {@link #requestNetwork(NetworkRequest, NetworkCallback, Handler)} instead.
3731 *
3732 * @param request {@link NetworkRequest} describing this request.
3733 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3734 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3735 * be a positive value (i.e. >0).
3736 * @param legacyType to specify the network type(#TYPE_*).
3737 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3738 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3739 * the callback must not be shared - it uniquely specifies this request.
3740 *
3741 * @hide
3742 */
3743 @SystemApi
3744 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
3745 public void requestNetwork(@NonNull NetworkRequest request,
3746 int timeoutMs, int legacyType, @NonNull Handler handler,
3747 @NonNull NetworkCallback networkCallback) {
3748 if (legacyType == TYPE_NONE) {
3749 throw new IllegalArgumentException("TYPE_NONE is meaningless legacy type");
3750 }
3751 CallbackHandler cbHandler = new CallbackHandler(handler);
3752 NetworkCapabilities nc = request.networkCapabilities;
3753 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, legacyType, cbHandler);
3754 }
3755
3756 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003757 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003758 *
3759 * <p>This method will attempt to find the best network that matches the passed
3760 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
3761 * criteria. The platform will evaluate which network is the best at its own discretion.
3762 * Throughput, latency, cost per byte, policy, user preference and other considerations
3763 * may be factored in the decision of what is considered the best network.
3764 *
3765 * <p>As long as this request is outstanding, the platform will try to maintain the best network
3766 * matching this request, while always attempting to match the request to a better network if
3767 * possible. If a better match is found, the platform will switch this request to the now-best
3768 * network and inform the app of the newly best network by invoking
3769 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
3770 * will not try to maintain any other network than the best one currently matching the request:
3771 * a network not matching any network request may be disconnected at any time.
3772 *
3773 * <p>For example, an application could use this method to obtain a connected cellular network
3774 * even if the device currently has a data connection over Ethernet. This may cause the cellular
3775 * radio to consume additional power. Or, an application could inform the system that it wants
3776 * a network supporting sending MMSes and have the system let it know about the currently best
3777 * MMS-supporting network through the provided {@link NetworkCallback}.
3778 *
3779 * <p>The status of the request can be followed by listening to the various callbacks described
3780 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
3781 * used to direct traffic to the network (although accessing some networks may be subject to
3782 * holding specific permissions). Callers will learn about the specific characteristics of the
3783 * network through
3784 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
3785 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
3786 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
3787 * matching the request at any given time; therefore when a better network matching the request
3788 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
3789 * with the new network after which no further updates are given about the previously-best
3790 * network, unless it becomes the best again at some later time. All callbacks are invoked
3791 * in order on the same thread, which by default is a thread created by the framework running
3792 * in the app.
3793 * {@see #requestNetwork(NetworkRequest, NetworkCallback, Handler)} to change where the
3794 * callbacks are invoked.
3795 *
3796 * <p>This{@link NetworkRequest} will live until released via
3797 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
3798 * which point the system may let go of the network at any time.
3799 *
3800 * <p>A version of this method which takes a timeout is
3801 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)}, that an app can use to only
3802 * wait for a limited amount of time for the network to become unavailable.
3803 *
3804 * <p>It is presently unsupported to request a network with mutable
3805 * {@link NetworkCapabilities} such as
3806 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3807 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3808 * as these {@code NetworkCapabilities} represent states that a particular
3809 * network may never attain, and whether a network will attain these states
3810 * is unknown prior to bringing up the network so the framework does not
3811 * know how to go about satisfying a request with these capabilities.
3812 *
3813 * <p>This method requires the caller to hold either the
3814 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3815 * or the ability to modify system settings as determined by
3816 * {@link android.provider.Settings.System#canWrite}.</p>
3817 *
3818 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
3819 * number of outstanding requests to 100 per app (identified by their UID), shared with
3820 * all variants of this method, of {@link #registerNetworkCallback} as well as
3821 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
3822 * Requesting a network with this method will count toward this limit. If this limit is
3823 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
3824 * make sure to unregister the callbacks with
3825 * {@link #unregisterNetworkCallback(NetworkCallback)}.
3826 *
3827 * @param request {@link NetworkRequest} describing this request.
3828 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3829 * the callback must not be shared - it uniquely specifies this request.
3830 * The callback is invoked on the default internal Handler.
3831 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
3832 * @throws SecurityException if missing the appropriate permissions.
3833 * @throws RuntimeException if the app already has too many callbacks registered.
3834 */
3835 public void requestNetwork(@NonNull NetworkRequest request,
3836 @NonNull NetworkCallback networkCallback) {
3837 requestNetwork(request, networkCallback, getDefaultHandler());
3838 }
3839
3840 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003841 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003842 *
3843 * This method behaves identically to {@link #requestNetwork(NetworkRequest, NetworkCallback)}
3844 * but runs all the callbacks on the passed Handler.
3845 *
3846 * <p>This method has the same permission requirements as
3847 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3848 * and throws the same exceptions in the same conditions.
3849 *
3850 * @param request {@link NetworkRequest} describing this request.
3851 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3852 * the callback must not be shared - it uniquely specifies this request.
3853 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3854 */
3855 public void requestNetwork(@NonNull NetworkRequest request,
3856 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
3857 CallbackHandler cbHandler = new CallbackHandler(handler);
3858 NetworkCapabilities nc = request.networkCapabilities;
3859 sendRequestForNetwork(nc, networkCallback, 0, REQUEST, TYPE_NONE, cbHandler);
3860 }
3861
3862 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003863 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003864 * by a timeout.
3865 *
3866 * This function behaves identically to the non-timed-out version
3867 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, but if a suitable network
3868 * is not found within the given time (in milliseconds) the
3869 * {@link NetworkCallback#onUnavailable()} callback is called. The request can still be
3870 * released normally by calling {@link #unregisterNetworkCallback(NetworkCallback)} but does
3871 * not have to be released if timed-out (it is automatically released). Unregistering a
3872 * request that timed out is not an error.
3873 *
3874 * <p>Do not use this method to poll for the existence of specific networks (e.g. with a small
3875 * timeout) - {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} is provided
3876 * for that purpose. Calling this method will attempt to bring up the requested network.
3877 *
3878 * <p>This method has the same permission requirements as
3879 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3880 * and throws the same exceptions in the same conditions.
3881 *
3882 * @param request {@link NetworkRequest} describing this request.
3883 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3884 * the callback must not be shared - it uniquely specifies this request.
3885 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3886 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3887 * be a positive value (i.e. >0).
3888 */
3889 public void requestNetwork(@NonNull NetworkRequest request,
3890 @NonNull NetworkCallback networkCallback, int timeoutMs) {
3891 checkTimeout(timeoutMs);
3892 NetworkCapabilities nc = request.networkCapabilities;
3893 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE,
3894 getDefaultHandler());
3895 }
3896
3897 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003898 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003899 * by a timeout.
3900 *
3901 * This method behaves identically to
3902 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} but runs all the callbacks
3903 * on the passed Handler.
3904 *
3905 * <p>This method has the same permission requirements as
3906 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3907 * and throws the same exceptions in the same conditions.
3908 *
3909 * @param request {@link NetworkRequest} describing this request.
3910 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3911 * the callback must not be shared - it uniquely specifies this request.
3912 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3913 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3914 * before {@link NetworkCallback#onUnavailable} is called.
3915 */
3916 public void requestNetwork(@NonNull NetworkRequest request,
3917 @NonNull NetworkCallback networkCallback, @NonNull Handler handler, int timeoutMs) {
3918 checkTimeout(timeoutMs);
3919 CallbackHandler cbHandler = new CallbackHandler(handler);
3920 NetworkCapabilities nc = request.networkCapabilities;
3921 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE, cbHandler);
3922 }
3923
3924 /**
3925 * The lookup key for a {@link Network} object included with the intent after
3926 * successfully finding a network for the applications request. Retrieve it with
3927 * {@link android.content.Intent#getParcelableExtra(String)}.
3928 * <p>
3929 * Note that if you intend to invoke {@link Network#openConnection(java.net.URL)}
3930 * then you must get a ConnectivityManager instance before doing so.
3931 */
3932 public static final String EXTRA_NETWORK = "android.net.extra.NETWORK";
3933
3934 /**
3935 * The lookup key for a {@link NetworkRequest} object included with the intent after
3936 * successfully finding a network for the applications request. Retrieve it with
3937 * {@link android.content.Intent#getParcelableExtra(String)}.
3938 */
3939 public static final String EXTRA_NETWORK_REQUEST = "android.net.extra.NETWORK_REQUEST";
3940
3941
3942 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003943 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003944 *
3945 * This function behaves identically to the version that takes a NetworkCallback, but instead
3946 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
3947 * the request may outlive the calling application and get called back when a suitable
3948 * network is found.
3949 * <p>
3950 * The operation is an Intent broadcast that goes to a broadcast receiver that
3951 * you registered with {@link Context#registerReceiver} or through the
3952 * &lt;receiver&gt; tag in an AndroidManifest.xml file
3953 * <p>
3954 * The operation Intent is delivered with two extras, a {@link Network} typed
3955 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
3956 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
3957 * the original requests parameters. It is important to create a new,
3958 * {@link NetworkCallback} based request before completing the processing of the
3959 * Intent to reserve the network or it will be released shortly after the Intent
3960 * is processed.
3961 * <p>
3962 * If there is already a request for this Intent registered (with the equality of
3963 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
3964 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
3965 * <p>
3966 * The request may be released normally by calling
3967 * {@link #releaseNetworkRequest(android.app.PendingIntent)}.
3968 * <p>It is presently unsupported to request a network with either
3969 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3970 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3971 * as these {@code NetworkCapabilities} represent states that a particular
3972 * network may never attain, and whether a network will attain these states
3973 * is unknown prior to bringing up the network so the framework does not
3974 * know how to go about satisfying a request with these capabilities.
3975 *
3976 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
3977 * number of outstanding requests to 100 per app (identified by their UID), shared with
3978 * all variants of this method, of {@link #registerNetworkCallback} as well as
3979 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
3980 * Requesting a network with this method will count toward this limit. If this limit is
3981 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
3982 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
3983 * or {@link #releaseNetworkRequest(PendingIntent)}.
3984 *
3985 * <p>This method requires the caller to hold either the
3986 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3987 * or the ability to modify system settings as determined by
3988 * {@link android.provider.Settings.System#canWrite}.</p>
3989 *
3990 * @param request {@link NetworkRequest} describing this request.
3991 * @param operation Action to perform when the network is available (corresponds
3992 * to the {@link NetworkCallback#onAvailable} call. Typically
3993 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
3994 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
3995 * @throws SecurityException if missing the appropriate permissions.
3996 * @throws RuntimeException if the app already has too many callbacks registered.
3997 */
3998 public void requestNetwork(@NonNull NetworkRequest request,
3999 @NonNull PendingIntent operation) {
4000 printStackTrace();
4001 checkPendingIntentNotNull(operation);
4002 try {
4003 mService.pendingRequestForNetwork(
4004 request.networkCapabilities, operation, mContext.getOpPackageName(),
4005 getAttributionTag());
4006 } catch (RemoteException e) {
4007 throw e.rethrowFromSystemServer();
4008 } catch (ServiceSpecificException e) {
4009 throw convertServiceException(e);
4010 }
4011 }
4012
4013 /**
4014 * Removes a request made via {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)}
4015 * <p>
4016 * This method has the same behavior as
4017 * {@link #unregisterNetworkCallback(android.app.PendingIntent)} with respect to
4018 * releasing network resources and disconnecting.
4019 *
4020 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4021 * PendingIntent passed to
4022 * {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)} with the
4023 * corresponding NetworkRequest you'd like to remove. Cannot be null.
4024 */
4025 public void releaseNetworkRequest(@NonNull PendingIntent operation) {
4026 printStackTrace();
4027 checkPendingIntentNotNull(operation);
4028 try {
4029 mService.releasePendingNetworkRequest(operation);
4030 } catch (RemoteException e) {
4031 throw e.rethrowFromSystemServer();
4032 }
4033 }
4034
4035 private static void checkPendingIntentNotNull(PendingIntent intent) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09004036 Objects.requireNonNull(intent, "PendingIntent cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004037 }
4038
4039 private static void checkCallbackNotNull(NetworkCallback callback) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09004040 Objects.requireNonNull(callback, "null NetworkCallback");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004041 }
4042
4043 private static void checkTimeout(int timeoutMs) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09004044 if (timeoutMs <= 0) {
4045 throw new IllegalArgumentException("timeoutMs must be strictly positive.");
4046 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004047 }
4048
4049 /**
4050 * Registers to receive notifications about all networks which satisfy the given
4051 * {@link NetworkRequest}. The callbacks will continue to be called until
4052 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4053 * called.
4054 *
4055 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4056 * number of outstanding requests to 100 per app (identified by their UID), shared with
4057 * all variants of this method, of {@link #requestNetwork} as well as
4058 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4059 * Requesting a network with this method will count toward this limit. If this limit is
4060 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4061 * make sure to unregister the callbacks with
4062 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4063 *
4064 * @param request {@link NetworkRequest} describing this request.
4065 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4066 * networks change state.
4067 * The callback is invoked on the default internal Handler.
4068 * @throws RuntimeException if the app already has too many callbacks registered.
4069 */
4070 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4071 public void registerNetworkCallback(@NonNull NetworkRequest request,
4072 @NonNull NetworkCallback networkCallback) {
4073 registerNetworkCallback(request, networkCallback, getDefaultHandler());
4074 }
4075
4076 /**
4077 * Registers to receive notifications about all networks which satisfy the given
4078 * {@link NetworkRequest}. The callbacks will continue to be called until
4079 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4080 * called.
4081 *
4082 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4083 * number of outstanding requests to 100 per app (identified by their UID), shared with
4084 * all variants of this method, of {@link #requestNetwork} as well as
4085 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4086 * Requesting a network with this method will count toward this limit. If this limit is
4087 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4088 * make sure to unregister the callbacks with
4089 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4090 *
4091 *
4092 * @param request {@link NetworkRequest} describing this request.
4093 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4094 * networks change state.
4095 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4096 * @throws RuntimeException if the app already has too many callbacks registered.
4097 */
4098 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4099 public void registerNetworkCallback(@NonNull NetworkRequest request,
4100 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4101 CallbackHandler cbHandler = new CallbackHandler(handler);
4102 NetworkCapabilities nc = request.networkCapabilities;
4103 sendRequestForNetwork(nc, networkCallback, 0, LISTEN, TYPE_NONE, cbHandler);
4104 }
4105
4106 /**
4107 * Registers a PendingIntent to be sent when a network is available which satisfies the given
4108 * {@link NetworkRequest}.
4109 *
4110 * This function behaves identically to the version that takes a NetworkCallback, but instead
4111 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
4112 * the request may outlive the calling application and get called back when a suitable
4113 * network is found.
4114 * <p>
4115 * The operation is an Intent broadcast that goes to a broadcast receiver that
4116 * you registered with {@link Context#registerReceiver} or through the
4117 * &lt;receiver&gt; tag in an AndroidManifest.xml file
4118 * <p>
4119 * The operation Intent is delivered with two extras, a {@link Network} typed
4120 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
4121 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
4122 * the original requests parameters.
4123 * <p>
4124 * If there is already a request for this Intent registered (with the equality of
4125 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
4126 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
4127 * <p>
4128 * The request may be released normally by calling
4129 * {@link #unregisterNetworkCallback(android.app.PendingIntent)}.
4130 *
4131 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4132 * number of outstanding requests to 100 per app (identified by their UID), shared with
4133 * all variants of this method, of {@link #requestNetwork} as well as
4134 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4135 * Requesting a network with this method will count toward this limit. If this limit is
4136 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4137 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4138 * or {@link #releaseNetworkRequest(PendingIntent)}.
4139 *
4140 * @param request {@link NetworkRequest} describing this request.
4141 * @param operation Action to perform when the network is available (corresponds
4142 * to the {@link NetworkCallback#onAvailable} call. Typically
4143 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4144 * @throws RuntimeException if the app already has too many callbacks registered.
4145 */
4146 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4147 public void registerNetworkCallback(@NonNull NetworkRequest request,
4148 @NonNull PendingIntent operation) {
4149 printStackTrace();
4150 checkPendingIntentNotNull(operation);
4151 try {
4152 mService.pendingListenForNetwork(
Roshan Piusa8a477b2020-12-17 14:53:09 -08004153 request.networkCapabilities, operation, mContext.getOpPackageName(),
4154 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004155 } catch (RemoteException e) {
4156 throw e.rethrowFromSystemServer();
4157 } catch (ServiceSpecificException e) {
4158 throw convertServiceException(e);
4159 }
4160 }
4161
4162 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004163 * Registers to receive notifications about changes in the application's default network. This
4164 * may be a physical network or a virtual network, such as a VPN that applies to the
4165 * application. The callbacks will continue to be called until either the application exits or
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004166 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4167 *
4168 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4169 * number of outstanding requests to 100 per app (identified by their UID), shared with
4170 * all variants of this method, of {@link #requestNetwork} as well as
4171 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4172 * Requesting a network with this method will count toward this limit. If this limit is
4173 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4174 * make sure to unregister the callbacks with
4175 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4176 *
4177 * @param networkCallback The {@link NetworkCallback} that the system will call as the
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004178 * application's default network changes.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004179 * The callback is invoked on the default internal Handler.
4180 * @throws RuntimeException if the app already has too many callbacks registered.
4181 */
4182 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4183 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback) {
4184 registerDefaultNetworkCallback(networkCallback, getDefaultHandler());
4185 }
4186
4187 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004188 * Registers to receive notifications about changes in the application's default network. This
4189 * may be a physical network or a virtual network, such as a VPN that applies to the
4190 * application. The callbacks will continue to be called until either the application exits or
4191 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4192 *
4193 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4194 * number of outstanding requests to 100 per app (identified by their UID), shared with
4195 * all variants of this method, of {@link #requestNetwork} as well as
4196 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4197 * Requesting a network with this method will count toward this limit. If this limit is
4198 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4199 * make sure to unregister the callbacks with
4200 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4201 *
4202 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4203 * application's default network changes.
4204 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4205 * @throws RuntimeException if the app already has too many callbacks registered.
4206 */
4207 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4208 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
4209 @NonNull Handler handler) {
4210 CallbackHandler cbHandler = new CallbackHandler(handler);
4211 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
4212 TRACK_DEFAULT, TYPE_NONE, cbHandler);
4213 }
4214
4215 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004216 * Registers to receive notifications about changes in the system default network. The callbacks
4217 * will continue to be called until either the application exits or
4218 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4219 *
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004220 * This method should not be used to determine networking state seen by applications, because in
4221 * many cases, most or even all application traffic may not use the default network directly,
4222 * and traffic from different applications may go on different networks by default. As an
4223 * example, if a VPN is connected, traffic from all applications might be sent through the VPN
4224 * and not onto the system default network. Applications or system components desiring to do
4225 * determine network state as seen by applications should use other methods such as
4226 * {@link #registerDefaultNetworkCallback(NetworkCallback, Handler)}.
4227 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004228 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4229 * number of outstanding requests to 100 per app (identified by their UID), shared with
4230 * all variants of this method, of {@link #requestNetwork} as well as
4231 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4232 * Requesting a network with this method will count toward this limit. If this limit is
4233 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4234 * make sure to unregister the callbacks with
4235 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4236 *
4237 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4238 * system default network changes.
4239 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4240 * @throws RuntimeException if the app already has too many callbacks registered.
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004241 *
4242 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004243 */
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004244 @SystemApi(client = MODULE_LIBRARIES)
4245 @SuppressLint({"ExecutorRegistration", "PairedRegistration"})
4246 @RequiresPermission(anyOf = {
4247 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4248 android.Manifest.permission.NETWORK_SETTINGS})
4249 public void registerSystemDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004250 @NonNull Handler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004251 CallbackHandler cbHandler = new CallbackHandler(handler);
4252 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004253 TRACK_SYSTEM_DEFAULT, TYPE_NONE, cbHandler);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004254 }
4255
4256 /**
junyulai5a5c99b2021-03-05 15:51:17 +08004257 * @hide
4258 */
4259 // TODO: Make it public api.
4260 @SuppressLint("ExecutorRegistration")
4261 public void registerBestMatchingNetworkCallback(@NonNull NetworkRequest request,
4262 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4263 final NetworkCapabilities nc = request.networkCapabilities;
4264 final CallbackHandler cbHandler = new CallbackHandler(handler);
4265 sendRequestForNetwork(nc, networkCallback, 0, TRACK_BEST, TYPE_NONE, cbHandler);
4266 }
4267
4268 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004269 * Requests bandwidth update for a given {@link Network} and returns whether the update request
4270 * is accepted by ConnectivityService. Once accepted, ConnectivityService will poll underlying
4271 * network connection for updated bandwidth information. The caller will be notified via
4272 * {@link ConnectivityManager.NetworkCallback} if there is an update. Notice that this
4273 * method assumes that the caller has previously called
4274 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} to listen for network
4275 * changes.
4276 *
4277 * @param network {@link Network} specifying which network you're interested.
4278 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4279 */
4280 public boolean requestBandwidthUpdate(@NonNull Network network) {
4281 try {
4282 return mService.requestBandwidthUpdate(network);
4283 } catch (RemoteException e) {
4284 throw e.rethrowFromSystemServer();
4285 }
4286 }
4287
4288 /**
4289 * Unregisters a {@code NetworkCallback} and possibly releases networks originating from
4290 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} and
4291 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} calls.
4292 * If the given {@code NetworkCallback} had previously been used with
4293 * {@code #requestNetwork}, any networks that had been connected to only to satisfy that request
4294 * will be disconnected.
4295 *
4296 * Notifications that would have triggered that {@code NetworkCallback} will immediately stop
4297 * triggering it as soon as this call returns.
4298 *
4299 * @param networkCallback The {@link NetworkCallback} used when making the request.
4300 */
4301 public void unregisterNetworkCallback(@NonNull NetworkCallback networkCallback) {
4302 printStackTrace();
4303 checkCallbackNotNull(networkCallback);
4304 final List<NetworkRequest> reqs = new ArrayList<>();
4305 // Find all requests associated to this callback and stop callback triggers immediately.
4306 // Callback is reusable immediately. http://b/20701525, http://b/35921499.
4307 synchronized (sCallbacks) {
Remi NGUYEN VANfa5eacc2021-03-11 20:49:13 +09004308 if (networkCallback.networkRequest == null) {
4309 throw new IllegalArgumentException("NetworkCallback was not registered");
4310 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004311 if (networkCallback.networkRequest == ALREADY_UNREGISTERED) {
4312 Log.d(TAG, "NetworkCallback was already unregistered");
4313 return;
4314 }
4315 for (Map.Entry<NetworkRequest, NetworkCallback> e : sCallbacks.entrySet()) {
4316 if (e.getValue() == networkCallback) {
4317 reqs.add(e.getKey());
4318 }
4319 }
4320 // TODO: throw exception if callback was registered more than once (http://b/20701525).
4321 for (NetworkRequest r : reqs) {
4322 try {
4323 mService.releaseNetworkRequest(r);
4324 } catch (RemoteException e) {
4325 throw e.rethrowFromSystemServer();
4326 }
4327 // Only remove mapping if rpc was successful.
4328 sCallbacks.remove(r);
4329 }
4330 networkCallback.networkRequest = ALREADY_UNREGISTERED;
4331 }
4332 }
4333
4334 /**
4335 * Unregisters a callback previously registered via
4336 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4337 *
4338 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4339 * PendingIntent passed to
4340 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4341 * Cannot be null.
4342 */
4343 public void unregisterNetworkCallback(@NonNull PendingIntent operation) {
4344 releaseNetworkRequest(operation);
4345 }
4346
4347 /**
4348 * Informs the system whether it should switch to {@code network} regardless of whether it is
4349 * validated or not. If {@code accept} is true, and the network was explicitly selected by the
4350 * user (e.g., by selecting a Wi-Fi network in the Settings app), then the network will become
4351 * the system default network regardless of any other network that's currently connected. If
4352 * {@code always} is true, then the choice is remembered, so that the next time the user
4353 * connects to this network, the system will switch to it.
4354 *
4355 * @param network The network to accept.
4356 * @param accept Whether to accept the network even if unvalidated.
4357 * @param always Whether to remember this choice in the future.
4358 *
4359 * @hide
4360 */
4361 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4362 public void setAcceptUnvalidated(Network network, boolean accept, boolean always) {
4363 try {
4364 mService.setAcceptUnvalidated(network, accept, always);
4365 } catch (RemoteException e) {
4366 throw e.rethrowFromSystemServer();
4367 }
4368 }
4369
4370 /**
4371 * Informs the system whether it should consider the network as validated even if it only has
4372 * partial connectivity. If {@code accept} is true, then the network will be considered as
4373 * validated even if connectivity is only partial. If {@code always} is true, then the choice
4374 * is remembered, so that the next time the user connects to this network, the system will
4375 * switch to it.
4376 *
4377 * @param network The network to accept.
4378 * @param accept Whether to consider the network as validated even if it has partial
4379 * connectivity.
4380 * @param always Whether to remember this choice in the future.
4381 *
4382 * @hide
4383 */
4384 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
4385 public void setAcceptPartialConnectivity(Network network, boolean accept, boolean always) {
4386 try {
4387 mService.setAcceptPartialConnectivity(network, accept, always);
4388 } catch (RemoteException e) {
4389 throw e.rethrowFromSystemServer();
4390 }
4391 }
4392
4393 /**
4394 * Informs the system to penalize {@code network}'s score when it becomes unvalidated. This is
4395 * only meaningful if the system is configured not to penalize such networks, e.g., if the
4396 * {@code config_networkAvoidBadWifi} configuration variable is set to 0 and the {@code
4397 * NETWORK_AVOID_BAD_WIFI setting is unset}.
4398 *
4399 * @param network The network to accept.
4400 *
4401 * @hide
4402 */
4403 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4404 public void setAvoidUnvalidated(Network network) {
4405 try {
4406 mService.setAvoidUnvalidated(network);
4407 } catch (RemoteException e) {
4408 throw e.rethrowFromSystemServer();
4409 }
4410 }
4411
4412 /**
4413 * Requests that the system open the captive portal app on the specified network.
4414 *
4415 * @param network The network to log into.
4416 *
4417 * @hide
4418 */
4419 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4420 public void startCaptivePortalApp(Network network) {
4421 try {
4422 mService.startCaptivePortalApp(network);
4423 } catch (RemoteException e) {
4424 throw e.rethrowFromSystemServer();
4425 }
4426 }
4427
4428 /**
4429 * Requests that the system open the captive portal app with the specified extras.
4430 *
4431 * <p>This endpoint is exclusively for use by the NetworkStack and is protected by the
4432 * corresponding permission.
4433 * @param network Network on which the captive portal was detected.
4434 * @param appExtras Extras to include in the app start intent.
4435 * @hide
4436 */
4437 @SystemApi
4438 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
4439 public void startCaptivePortalApp(@NonNull Network network, @NonNull Bundle appExtras) {
4440 try {
4441 mService.startCaptivePortalAppInternal(network, appExtras);
4442 } catch (RemoteException e) {
4443 throw e.rethrowFromSystemServer();
4444 }
4445 }
4446
4447 /**
4448 * Determine whether the device is configured to avoid bad wifi.
4449 * @hide
4450 */
4451 @SystemApi
4452 @RequiresPermission(anyOf = {
4453 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4454 android.Manifest.permission.NETWORK_STACK})
4455 public boolean shouldAvoidBadWifi() {
4456 try {
4457 return mService.shouldAvoidBadWifi();
4458 } catch (RemoteException e) {
4459 throw e.rethrowFromSystemServer();
4460 }
4461 }
4462
4463 /**
4464 * It is acceptable to briefly use multipath data to provide seamless connectivity for
4465 * time-sensitive user-facing operations when the system default network is temporarily
4466 * unresponsive. The amount of data should be limited (less than one megabyte for every call to
4467 * this method), and the operation should be infrequent to ensure that data usage is limited.
4468 *
4469 * An example of such an operation might be a time-sensitive foreground activity, such as a
4470 * voice command, that the user is performing while walking out of range of a Wi-Fi network.
4471 */
4472 public static final int MULTIPATH_PREFERENCE_HANDOVER = 1 << 0;
4473
4474 /**
4475 * It is acceptable to use small amounts of multipath data on an ongoing basis to provide
4476 * a backup channel for traffic that is primarily going over another network.
4477 *
4478 * An example might be maintaining backup connections to peers or servers for the purpose of
4479 * fast fallback if the default network is temporarily unresponsive or disconnects. The traffic
4480 * on backup paths should be negligible compared to the traffic on the main path.
4481 */
4482 public static final int MULTIPATH_PREFERENCE_RELIABILITY = 1 << 1;
4483
4484 /**
4485 * It is acceptable to use metered data to improve network latency and performance.
4486 */
4487 public static final int MULTIPATH_PREFERENCE_PERFORMANCE = 1 << 2;
4488
4489 /**
4490 * Return value to use for unmetered networks. On such networks we currently set all the flags
4491 * to true.
4492 * @hide
4493 */
4494 public static final int MULTIPATH_PREFERENCE_UNMETERED =
4495 MULTIPATH_PREFERENCE_HANDOVER |
4496 MULTIPATH_PREFERENCE_RELIABILITY |
4497 MULTIPATH_PREFERENCE_PERFORMANCE;
4498
4499 /** @hide */
4500 @Retention(RetentionPolicy.SOURCE)
4501 @IntDef(flag = true, value = {
4502 MULTIPATH_PREFERENCE_HANDOVER,
4503 MULTIPATH_PREFERENCE_RELIABILITY,
4504 MULTIPATH_PREFERENCE_PERFORMANCE,
4505 })
4506 public @interface MultipathPreference {
4507 }
4508
4509 /**
4510 * Provides a hint to the calling application on whether it is desirable to use the
4511 * multinetwork APIs (e.g., {@link Network#openConnection}, {@link Network#bindSocket}, etc.)
4512 * for multipath data transfer on this network when it is not the system default network.
4513 * Applications desiring to use multipath network protocols should call this method before
4514 * each such operation.
4515 *
4516 * @param network The network on which the application desires to use multipath data.
4517 * If {@code null}, this method will return the a preference that will generally
4518 * apply to metered networks.
4519 * @return a bitwise OR of zero or more of the {@code MULTIPATH_PREFERENCE_*} constants.
4520 */
4521 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4522 public @MultipathPreference int getMultipathPreference(@Nullable Network network) {
4523 try {
4524 return mService.getMultipathPreference(network);
4525 } catch (RemoteException e) {
4526 throw e.rethrowFromSystemServer();
4527 }
4528 }
4529
4530 /**
4531 * Resets all connectivity manager settings back to factory defaults.
4532 * @hide
4533 */
4534 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4535 public void factoryReset() {
4536 try {
4537 mService.factoryReset();
4538 mTetheringManager.stopAllTethering();
4539 } catch (RemoteException e) {
4540 throw e.rethrowFromSystemServer();
4541 }
4542 }
4543
4544 /**
4545 * Binds the current process to {@code network}. All Sockets created in the future
4546 * (and not explicitly bound via a bound SocketFactory from
4547 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4548 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4549 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4550 * work and all host name resolutions will fail. This is by design so an application doesn't
4551 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4552 * To clear binding pass {@code null} for {@code network}. Using individually bound
4553 * Sockets created by Network.getSocketFactory().createSocket() and
4554 * performing network-specific host name resolutions via
4555 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4556 * {@code bindProcessToNetwork}.
4557 *
4558 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4559 * the current binding.
4560 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4561 */
4562 public boolean bindProcessToNetwork(@Nullable Network network) {
4563 // Forcing callers to call through non-static function ensures ConnectivityManager
4564 // instantiated.
4565 return setProcessDefaultNetwork(network);
4566 }
4567
4568 /**
4569 * Binds the current process to {@code network}. All Sockets created in the future
4570 * (and not explicitly bound via a bound SocketFactory from
4571 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4572 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4573 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4574 * work and all host name resolutions will fail. This is by design so an application doesn't
4575 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4576 * To clear binding pass {@code null} for {@code network}. Using individually bound
4577 * Sockets created by Network.getSocketFactory().createSocket() and
4578 * performing network-specific host name resolutions via
4579 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4580 * {@code setProcessDefaultNetwork}.
4581 *
4582 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4583 * the current binding.
4584 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4585 * @deprecated This function can throw {@link IllegalStateException}. Use
4586 * {@link #bindProcessToNetwork} instead. {@code bindProcessToNetwork}
4587 * is a direct replacement.
4588 */
4589 @Deprecated
4590 public static boolean setProcessDefaultNetwork(@Nullable Network network) {
4591 int netId = (network == null) ? NETID_UNSET : network.netId;
4592 boolean isSameNetId = (netId == NetworkUtils.getBoundNetworkForProcess());
4593
4594 if (netId != NETID_UNSET) {
4595 netId = network.getNetIdForResolv();
4596 }
4597
4598 if (!NetworkUtils.bindProcessToNetwork(netId)) {
4599 return false;
4600 }
4601
4602 if (!isSameNetId) {
4603 // Set HTTP proxy system properties to match network.
4604 // TODO: Deprecate this static method and replace it with a non-static version.
4605 try {
Remi NGUYEN VAN345c2df2021-02-03 10:18:20 +09004606 Proxy.setHttpProxyConfiguration(getInstance().getDefaultProxy());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004607 } catch (SecurityException e) {
4608 // The process doesn't have ACCESS_NETWORK_STATE, so we can't fetch the proxy.
4609 Log.e(TAG, "Can't set proxy properties", e);
4610 }
4611 // Must flush DNS cache as new network may have different DNS resolutions.
4612 InetAddress.clearDnsCache();
4613 // Must flush socket pool as idle sockets will be bound to previous network and may
4614 // cause subsequent fetches to be performed on old network.
4615 NetworkEventDispatcher.getInstance().onNetworkConfigurationChanged();
4616 }
4617
4618 return true;
4619 }
4620
4621 /**
4622 * Returns the {@link Network} currently bound to this process via
4623 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4624 *
4625 * @return {@code Network} to which this process is bound, or {@code null}.
4626 */
4627 @Nullable
4628 public Network getBoundNetworkForProcess() {
4629 // Forcing callers to call thru non-static function ensures ConnectivityManager
4630 // instantiated.
4631 return getProcessDefaultNetwork();
4632 }
4633
4634 /**
4635 * Returns the {@link Network} currently bound to this process via
4636 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4637 *
4638 * @return {@code Network} to which this process is bound, or {@code null}.
4639 * @deprecated Using this function can lead to other functions throwing
4640 * {@link IllegalStateException}. Use {@link #getBoundNetworkForProcess} instead.
4641 * {@code getBoundNetworkForProcess} is a direct replacement.
4642 */
4643 @Deprecated
4644 @Nullable
4645 public static Network getProcessDefaultNetwork() {
4646 int netId = NetworkUtils.getBoundNetworkForProcess();
4647 if (netId == NETID_UNSET) return null;
4648 return new Network(netId);
4649 }
4650
4651 private void unsupportedStartingFrom(int version) {
4652 if (Process.myUid() == Process.SYSTEM_UID) {
4653 // The getApplicationInfo() call we make below is not supported in system context. Let
4654 // the call through here, and rely on the fact that ConnectivityService will refuse to
4655 // allow the system to use these APIs anyway.
4656 return;
4657 }
4658
4659 if (mContext.getApplicationInfo().targetSdkVersion >= version) {
4660 throw new UnsupportedOperationException(
4661 "This method is not supported in target SDK version " + version + " and above");
4662 }
4663 }
4664
4665 // Checks whether the calling app can use the legacy routing API (startUsingNetworkFeature,
4666 // stopUsingNetworkFeature, requestRouteToHost), and if not throw UnsupportedOperationException.
4667 // TODO: convert the existing system users (Tethering, GnssLocationProvider) to the new APIs and
4668 // remove these exemptions. Note that this check is not secure, and apps can still access these
4669 // functions by accessing ConnectivityService directly. However, it should be clear that doing
4670 // so is unsupported and may break in the future. http://b/22728205
4671 private void checkLegacyRoutingApiAccess() {
4672 unsupportedStartingFrom(VERSION_CODES.M);
4673 }
4674
4675 /**
4676 * Binds host resolutions performed by this process to {@code network}.
4677 * {@link #bindProcessToNetwork} takes precedence over this setting.
4678 *
4679 * @param network The {@link Network} to bind host resolutions from the current process to, or
4680 * {@code null} to clear the current binding.
4681 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4682 * @hide
4683 * @deprecated This is strictly for legacy usage to support {@link #startUsingNetworkFeature}.
4684 */
4685 @Deprecated
4686 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
4687 public static boolean setProcessDefaultNetworkForHostResolution(Network network) {
4688 return NetworkUtils.bindProcessToNetworkForHostResolution(
4689 (network == null) ? NETID_UNSET : network.getNetIdForResolv());
4690 }
4691
4692 /**
4693 * Device is not restricting metered network activity while application is running on
4694 * background.
4695 */
4696 public static final int RESTRICT_BACKGROUND_STATUS_DISABLED = 1;
4697
4698 /**
4699 * Device is restricting metered network activity while application is running on background,
4700 * but application is allowed to bypass it.
4701 * <p>
4702 * In this state, application should take action to mitigate metered network access.
4703 * For example, a music streaming application should switch to a low-bandwidth bitrate.
4704 */
4705 public static final int RESTRICT_BACKGROUND_STATUS_WHITELISTED = 2;
4706
4707 /**
4708 * Device is restricting metered network activity while application is running on background.
4709 * <p>
4710 * In this state, application should not try to use the network while running on background,
4711 * because it would be denied.
4712 */
4713 public static final int RESTRICT_BACKGROUND_STATUS_ENABLED = 3;
4714
4715 /**
4716 * A change in the background metered network activity restriction has occurred.
4717 * <p>
4718 * Applications should call {@link #getRestrictBackgroundStatus()} to check if the restriction
4719 * applies to them.
4720 * <p>
4721 * This is only sent to registered receivers, not manifest receivers.
4722 */
4723 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
4724 public static final String ACTION_RESTRICT_BACKGROUND_CHANGED =
4725 "android.net.conn.RESTRICT_BACKGROUND_CHANGED";
4726
4727 /** @hide */
4728 @Retention(RetentionPolicy.SOURCE)
4729 @IntDef(flag = false, value = {
4730 RESTRICT_BACKGROUND_STATUS_DISABLED,
4731 RESTRICT_BACKGROUND_STATUS_WHITELISTED,
4732 RESTRICT_BACKGROUND_STATUS_ENABLED,
4733 })
4734 public @interface RestrictBackgroundStatus {
4735 }
4736
4737 private INetworkPolicyManager getNetworkPolicyManager() {
4738 synchronized (this) {
4739 if (mNPManager != null) {
4740 return mNPManager;
4741 }
4742 mNPManager = INetworkPolicyManager.Stub.asInterface(ServiceManager
4743 .getService(Context.NETWORK_POLICY_SERVICE));
4744 return mNPManager;
4745 }
4746 }
4747
4748 /**
4749 * Determines if the calling application is subject to metered network restrictions while
4750 * running on background.
4751 *
4752 * @return {@link #RESTRICT_BACKGROUND_STATUS_DISABLED},
4753 * {@link #RESTRICT_BACKGROUND_STATUS_ENABLED},
4754 * or {@link #RESTRICT_BACKGROUND_STATUS_WHITELISTED}
4755 */
4756 public @RestrictBackgroundStatus int getRestrictBackgroundStatus() {
4757 try {
4758 return getNetworkPolicyManager().getRestrictBackgroundByCaller();
4759 } catch (RemoteException e) {
4760 throw e.rethrowFromSystemServer();
4761 }
4762 }
4763
4764 /**
4765 * The network watchlist is a list of domains and IP addresses that are associated with
4766 * potentially harmful apps. This method returns the SHA-256 of the watchlist config file
4767 * currently used by the system for validation purposes.
4768 *
4769 * @return Hash of network watchlist config file. Null if config does not exist.
4770 */
4771 @Nullable
4772 public byte[] getNetworkWatchlistConfigHash() {
4773 try {
4774 return mService.getNetworkWatchlistConfigHash();
4775 } catch (RemoteException e) {
4776 Log.e(TAG, "Unable to get watchlist config hash");
4777 throw e.rethrowFromSystemServer();
4778 }
4779 }
4780
4781 /**
4782 * Returns the {@code uid} of the owner of a network connection.
4783 *
4784 * @param protocol The protocol of the connection. Only {@code IPPROTO_TCP} and {@code
4785 * IPPROTO_UDP} currently supported.
4786 * @param local The local {@link InetSocketAddress} of a connection.
4787 * @param remote The remote {@link InetSocketAddress} of a connection.
4788 * @return {@code uid} if the connection is found and the app has permission to observe it
4789 * (e.g., if it is associated with the calling VPN app's VpnService tunnel) or {@link
4790 * android.os.Process#INVALID_UID} if the connection is not found.
4791 * @throws {@link SecurityException} if the caller is not the active VpnService for the current
4792 * user.
4793 * @throws {@link IllegalArgumentException} if an unsupported protocol is requested.
4794 */
4795 public int getConnectionOwnerUid(
4796 int protocol, @NonNull InetSocketAddress local, @NonNull InetSocketAddress remote) {
4797 ConnectionInfo connectionInfo = new ConnectionInfo(protocol, local, remote);
4798 try {
4799 return mService.getConnectionOwnerUid(connectionInfo);
4800 } catch (RemoteException e) {
4801 throw e.rethrowFromSystemServer();
4802 }
4803 }
4804
4805 private void printStackTrace() {
4806 if (DEBUG) {
4807 final StackTraceElement[] callStack = Thread.currentThread().getStackTrace();
4808 final StringBuffer sb = new StringBuffer();
4809 for (int i = 3; i < callStack.length; i++) {
4810 final String stackTrace = callStack[i].toString();
4811 if (stackTrace == null || stackTrace.contains("android.os")) {
4812 break;
4813 }
4814 sb.append(" [").append(stackTrace).append("]");
4815 }
4816 Log.d(TAG, "StackLog:" + sb.toString());
4817 }
4818 }
4819
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004820 /** @hide */
4821 public TestNetworkManager startOrGetTestNetworkManager() {
4822 final IBinder tnBinder;
4823 try {
4824 tnBinder = mService.startOrGetTestNetworkService();
4825 } catch (RemoteException e) {
4826 throw e.rethrowFromSystemServer();
4827 }
4828
4829 return new TestNetworkManager(ITestNetworkManager.Stub.asInterface(tnBinder));
4830 }
4831
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004832 /** @hide */
4833 public ConnectivityDiagnosticsManager createDiagnosticsManager() {
4834 return new ConnectivityDiagnosticsManager(mContext, mService);
4835 }
4836
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004837 /**
4838 * Simulates a Data Stall for the specified Network.
4839 *
4840 * <p>This method should only be used for tests.
4841 *
4842 * <p>The caller must be the owner of the specified Network.
4843 *
4844 * @param detectionMethod The detection method used to identify the Data Stall.
4845 * @param timestampMillis The timestamp at which the stall 'occurred', in milliseconds.
4846 * @param network The Network for which a Data Stall is being simluated.
4847 * @param extras The PersistableBundle of extras included in the Data Stall notification.
4848 * @throws SecurityException if the caller is not the owner of the given network.
4849 * @hide
4850 */
4851 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
4852 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_TEST_NETWORKS,
4853 android.Manifest.permission.NETWORK_STACK})
4854 public void simulateDataStall(int detectionMethod, long timestampMillis,
4855 @NonNull Network network, @NonNull PersistableBundle extras) {
4856 try {
4857 mService.simulateDataStall(detectionMethod, timestampMillis, network, extras);
4858 } catch (RemoteException e) {
4859 e.rethrowFromSystemServer();
4860 }
4861 }
4862
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004863 @NonNull
4864 private final List<QosCallbackConnection> mQosCallbackConnections = new ArrayList<>();
4865
4866 /**
4867 * Registers a {@link QosSocketInfo} with an associated {@link QosCallback}. The callback will
4868 * receive available QoS events related to the {@link Network} and local ip + port
4869 * specified within socketInfo.
4870 * <p/>
4871 * The same {@link QosCallback} must be unregistered before being registered a second time,
4872 * otherwise {@link QosCallbackRegistrationException} is thrown.
4873 * <p/>
4874 * This API does not, in itself, require any permission if called with a network that is not
4875 * restricted. However, the underlying implementation currently only supports the IMS network,
4876 * which is always restricted. That means non-preinstalled callers can't possibly find this API
4877 * useful, because they'd never be called back on networks that they would have access to.
4878 *
4879 * @throws SecurityException if {@link QosSocketInfo#getNetwork()} is restricted and the app is
4880 * missing CONNECTIVITY_USE_RESTRICTED_NETWORKS permission.
4881 * @throws QosCallback.QosCallbackRegistrationException if qosCallback is already registered.
4882 * @throws RuntimeException if the app already has too many callbacks registered.
4883 *
4884 * Exceptions after the time of registration is passed through
4885 * {@link QosCallback#onError(QosCallbackException)}. see: {@link QosCallbackException}.
4886 *
4887 * @param socketInfo the socket information used to match QoS events
4888 * @param callback receives qos events that satisfy socketInfo
4889 * @param executor The executor on which the callback will be invoked. The provided
4890 * {@link Executor} must run callback sequentially, otherwise the order of
4891 * callbacks cannot be guaranteed.
4892 *
4893 * @hide
4894 */
4895 @SystemApi
4896 public void registerQosCallback(@NonNull final QosSocketInfo socketInfo,
4897 @NonNull final QosCallback callback,
4898 @CallbackExecutor @NonNull final Executor executor) {
4899 Objects.requireNonNull(socketInfo, "socketInfo must be non-null");
4900 Objects.requireNonNull(callback, "callback must be non-null");
4901 Objects.requireNonNull(executor, "executor must be non-null");
4902
4903 try {
4904 synchronized (mQosCallbackConnections) {
4905 if (getQosCallbackConnection(callback) == null) {
4906 final QosCallbackConnection connection =
4907 new QosCallbackConnection(this, callback, executor);
4908 mQosCallbackConnections.add(connection);
4909 mService.registerQosSocketCallback(socketInfo, connection);
4910 } else {
4911 Log.e(TAG, "registerQosCallback: Callback already registered");
4912 throw new QosCallbackRegistrationException();
4913 }
4914 }
4915 } catch (final RemoteException e) {
4916 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4917
4918 // The same unregister method method is called for consistency even though nothing
4919 // will be sent to the ConnectivityService since the callback was never successfully
4920 // registered.
4921 unregisterQosCallback(callback);
4922 e.rethrowFromSystemServer();
4923 } catch (final ServiceSpecificException e) {
4924 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4925 unregisterQosCallback(callback);
4926 throw convertServiceException(e);
4927 }
4928 }
4929
4930 /**
4931 * Unregisters the given {@link QosCallback}. The {@link QosCallback} will no longer receive
4932 * events once unregistered and can be registered a second time.
4933 * <p/>
4934 * If the {@link QosCallback} does not have an active registration, it is a no-op.
4935 *
4936 * @param callback the callback being unregistered
4937 *
4938 * @hide
4939 */
4940 @SystemApi
4941 public void unregisterQosCallback(@NonNull final QosCallback callback) {
4942 Objects.requireNonNull(callback, "The callback must be non-null");
4943 try {
4944 synchronized (mQosCallbackConnections) {
4945 final QosCallbackConnection connection = getQosCallbackConnection(callback);
4946 if (connection != null) {
4947 connection.stopReceivingMessages();
4948 mService.unregisterQosCallback(connection);
4949 mQosCallbackConnections.remove(connection);
4950 } else {
4951 Log.d(TAG, "unregisterQosCallback: Callback not registered");
4952 }
4953 }
4954 } catch (final RemoteException e) {
4955 Log.e(TAG, "unregisterQosCallback: Error while unregistering ", e);
4956 e.rethrowFromSystemServer();
4957 }
4958 }
4959
4960 /**
4961 * Gets the connection related to the callback.
4962 *
4963 * @param callback the callback to look up
4964 * @return the related connection
4965 */
4966 @Nullable
4967 private QosCallbackConnection getQosCallbackConnection(final QosCallback callback) {
4968 for (final QosCallbackConnection connection : mQosCallbackConnections) {
4969 // Checking by reference here is intentional
4970 if (connection.getCallback() == callback) {
4971 return connection;
4972 }
4973 }
4974 return null;
4975 }
4976
4977 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004978 * Request a network to satisfy a set of {@link NetworkCapabilities}, but
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004979 * does not cause any networks to retain the NET_CAPABILITY_FOREGROUND capability. This can
4980 * be used to request that the system provide a network without causing the network to be
4981 * in the foreground.
4982 *
4983 * <p>This method will attempt to find the best network that matches the passed
4984 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
4985 * criteria. The platform will evaluate which network is the best at its own discretion.
4986 * Throughput, latency, cost per byte, policy, user preference and other considerations
4987 * may be factored in the decision of what is considered the best network.
4988 *
4989 * <p>As long as this request is outstanding, the platform will try to maintain the best network
4990 * matching this request, while always attempting to match the request to a better network if
4991 * possible. If a better match is found, the platform will switch this request to the now-best
4992 * network and inform the app of the newly best network by invoking
4993 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
4994 * will not try to maintain any other network than the best one currently matching the request:
4995 * a network not matching any network request may be disconnected at any time.
4996 *
4997 * <p>For example, an application could use this method to obtain a connected cellular network
4998 * even if the device currently has a data connection over Ethernet. This may cause the cellular
4999 * radio to consume additional power. Or, an application could inform the system that it wants
5000 * a network supporting sending MMSes and have the system let it know about the currently best
5001 * MMS-supporting network through the provided {@link NetworkCallback}.
5002 *
5003 * <p>The status of the request can be followed by listening to the various callbacks described
5004 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
5005 * used to direct traffic to the network (although accessing some networks may be subject to
5006 * holding specific permissions). Callers will learn about the specific characteristics of the
5007 * network through
5008 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
5009 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
5010 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
5011 * matching the request at any given time; therefore when a better network matching the request
5012 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
5013 * with the new network after which no further updates are given about the previously-best
5014 * network, unless it becomes the best again at some later time. All callbacks are invoked
5015 * in order on the same thread, which by default is a thread created by the framework running
5016 * in the app.
5017 *
5018 * <p>This{@link NetworkRequest} will live until released via
5019 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
5020 * which point the system may let go of the network at any time.
5021 *
5022 * <p>It is presently unsupported to request a network with mutable
5023 * {@link NetworkCapabilities} such as
5024 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
5025 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
5026 * as these {@code NetworkCapabilities} represent states that a particular
5027 * network may never attain, and whether a network will attain these states
5028 * is unknown prior to bringing up the network so the framework does not
5029 * know how to go about satisfying a request with these capabilities.
5030 *
5031 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
5032 * number of outstanding requests to 100 per app (identified by their UID), shared with
5033 * all variants of this method, of {@link #registerNetworkCallback} as well as
5034 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
5035 * Requesting a network with this method will count toward this limit. If this limit is
5036 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
5037 * make sure to unregister the callbacks with
5038 * {@link #unregisterNetworkCallback(NetworkCallback)}.
5039 *
5040 * @param request {@link NetworkRequest} describing this request.
5041 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
5042 * If null, the callback is invoked on the default internal Handler.
5043 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
5044 * the callback must not be shared - it uniquely specifies this request.
5045 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
5046 * @throws SecurityException if missing the appropriate permissions.
5047 * @throws RuntimeException if the app already has too many callbacks registered.
5048 *
5049 * @hide
5050 */
5051 @SystemApi(client = MODULE_LIBRARIES)
5052 @SuppressLint("ExecutorRegistration")
5053 @RequiresPermission(anyOf = {
5054 android.Manifest.permission.NETWORK_SETTINGS,
5055 android.Manifest.permission.NETWORK_STACK,
5056 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5057 })
5058 public void requestBackgroundNetwork(@NonNull NetworkRequest request,
junyulaidbb70462021-03-09 20:49:48 +08005059 @NonNull Handler handler, @NonNull NetworkCallback networkCallback) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005060 final NetworkCapabilities nc = request.networkCapabilities;
5061 sendRequestForNetwork(nc, networkCallback, 0, BACKGROUND_REQUEST,
junyulaidbb70462021-03-09 20:49:48 +08005062 TYPE_NONE, new CallbackHandler(handler));
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005063 }
James Mattis12aeab82021-01-10 14:24:24 -08005064
5065 /**
5066 * Listener for {@link #setOemNetworkPreference(OemNetworkPreferences, Executor,
5067 * OnSetOemNetworkPreferenceListener)}.
James Mattis6e2d7022021-01-26 16:23:52 -08005068 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005069 */
James Mattis6e2d7022021-01-26 16:23:52 -08005070 @SystemApi
5071 public interface OnSetOemNetworkPreferenceListener {
James Mattis12aeab82021-01-10 14:24:24 -08005072 /**
5073 * Called when setOemNetworkPreference() successfully completes.
5074 */
5075 void onComplete();
5076 }
5077
5078 /**
5079 * Used by automotive devices to set the network preferences used to direct traffic at an
5080 * application level as per the given OemNetworkPreferences. An example use-case would be an
5081 * automotive OEM wanting to provide connectivity for applications critical to the usage of a
5082 * vehicle via a particular network.
5083 *
5084 * Calling this will overwrite the existing preference.
5085 *
5086 * @param preference {@link OemNetworkPreferences} The application network preference to be set.
5087 * @param executor the executor on which listener will be invoked.
5088 * @param listener {@link OnSetOemNetworkPreferenceListener} optional listener used to
5089 * communicate completion of setOemNetworkPreference(). This will only be
5090 * called once upon successful completion of setOemNetworkPreference().
5091 * @throws IllegalArgumentException if {@code preference} contains invalid preference values.
5092 * @throws SecurityException if missing the appropriate permissions.
5093 * @throws UnsupportedOperationException if called on a non-automotive device.
James Mattis6e2d7022021-01-26 16:23:52 -08005094 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005095 */
James Mattis6e2d7022021-01-26 16:23:52 -08005096 @SystemApi
James Mattisa46c1442021-01-26 14:05:36 -08005097 @RequiresPermission(android.Manifest.permission.CONTROL_OEM_PAID_NETWORK_PREFERENCE)
James Mattis6e2d7022021-01-26 16:23:52 -08005098 public void setOemNetworkPreference(@NonNull final OemNetworkPreferences preference,
James Mattis12aeab82021-01-10 14:24:24 -08005099 @Nullable @CallbackExecutor final Executor executor,
5100 @Nullable final OnSetOemNetworkPreferenceListener listener) {
5101 Objects.requireNonNull(preference, "OemNetworkPreferences must be non-null");
5102 if (null != listener) {
5103 Objects.requireNonNull(executor, "Executor must be non-null");
5104 }
5105 final IOnSetOemNetworkPreferenceListener listenerInternal = listener == null ? null :
5106 new IOnSetOemNetworkPreferenceListener.Stub() {
5107 @Override
5108 public void onComplete() {
5109 executor.execute(listener::onComplete);
5110 }
5111 };
5112
5113 try {
5114 mService.setOemNetworkPreference(preference, listenerInternal);
5115 } catch (RemoteException e) {
5116 Log.e(TAG, "setOemNetworkPreference() failed for preference: " + preference.toString());
5117 throw e.rethrowFromSystemServer();
5118 }
5119 }
lucaslin5cdbcfb2021-03-12 00:46:33 +08005120
5121 // The first network ID of IPSec tunnel interface.
5122 private static final int TUN_INTF_NETID_START = 0xFC00;
5123 // The network ID range of IPSec tunnel interface.
5124 private static final int TUN_INTF_NETID_RANGE = 0x0400;
5125
5126 /**
5127 * Get the network ID range reserved for IPSec tunnel interfaces.
5128 *
5129 * @return A Range which indicates the network ID range of IPSec tunnel interface.
5130 * @hide
5131 */
5132 @SystemApi(client = MODULE_LIBRARIES)
5133 @NonNull
5134 public static Range<Integer> getIpSecNetIdRange() {
5135 return new Range(TUN_INTF_NETID_START, TUN_INTF_NETID_START + TUN_INTF_NETID_RANGE - 1);
5136 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005137}