blob: ff1e78f0326e9808257f178a5030c8b8d31c8a30 [file] [log] [blame]
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package android.net;
17
18import static android.annotation.SystemApi.Client.MODULE_LIBRARIES;
paulhuc9925e02021-03-17 20:30:33 +080019import static android.net.ConnectivitySettingsManager.PRIVATE_DNS_DEFAULT_MODE;
20import static android.net.ConnectivitySettingsManager.PRIVATE_DNS_MODE;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090021import static android.net.NetworkRequest.Type.BACKGROUND_REQUEST;
22import static android.net.NetworkRequest.Type.LISTEN;
junyulai7664f622021-03-12 20:05:08 +080023import static android.net.NetworkRequest.Type.LISTEN_FOR_BEST;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090024import static android.net.NetworkRequest.Type.REQUEST;
25import static android.net.NetworkRequest.Type.TRACK_DEFAULT;
Lorenzo Colittia77d05e2021-01-29 20:14:04 +090026import static android.net.NetworkRequest.Type.TRACK_SYSTEM_DEFAULT;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090027import static android.net.QosCallback.QosCallbackRegistrationException;
28
29import android.annotation.CallbackExecutor;
30import android.annotation.IntDef;
31import android.annotation.NonNull;
32import android.annotation.Nullable;
33import android.annotation.RequiresPermission;
34import android.annotation.SdkConstant;
35import android.annotation.SdkConstant.SdkConstantType;
lucaslin180f44f2021-03-12 16:11:27 +080036import android.annotation.StringDef;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090037import android.annotation.SuppressLint;
38import android.annotation.SystemApi;
39import android.annotation.SystemService;
40import android.app.PendingIntent;
41import android.compat.annotation.UnsupportedAppUsage;
lucaslin180f44f2021-03-12 16:11:27 +080042import android.content.ContentResolver;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090043import android.content.Context;
44import android.content.Intent;
45import android.net.IpSecManager.UdpEncapsulationSocket;
46import android.net.SocketKeepalive.Callback;
47import android.net.TetheringManager.StartTetheringCallback;
48import android.net.TetheringManager.TetheringEventCallback;
49import android.net.TetheringManager.TetheringRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -080050import android.net.wifi.WifiNetworkSuggestion;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090051import android.os.Binder;
52import android.os.Build;
53import android.os.Build.VERSION_CODES;
54import android.os.Bundle;
55import android.os.Handler;
56import android.os.IBinder;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090057import android.os.Looper;
58import android.os.Message;
59import android.os.Messenger;
60import android.os.ParcelFileDescriptor;
61import android.os.PersistableBundle;
62import android.os.Process;
63import android.os.RemoteException;
64import android.os.ResultReceiver;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090065import android.os.ServiceSpecificException;
Chalard Jeanad565e22021-02-25 17:23:40 +090066import android.os.UserHandle;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090067import android.provider.Settings;
68import android.telephony.SubscriptionManager;
69import android.telephony.TelephonyManager;
lucaslin180f44f2021-03-12 16:11:27 +080070import android.text.TextUtils;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090071import android.util.ArrayMap;
72import android.util.Log;
73import android.util.Range;
74import android.util.SparseIntArray;
75
76import com.android.connectivity.aidl.INetworkAgent;
77import com.android.internal.annotations.GuardedBy;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090078
79import libcore.net.event.NetworkEventDispatcher;
80
81import java.io.IOException;
82import java.io.UncheckedIOException;
83import java.lang.annotation.Retention;
84import java.lang.annotation.RetentionPolicy;
85import java.net.DatagramSocket;
86import java.net.InetAddress;
87import java.net.InetSocketAddress;
88import java.net.Socket;
89import java.util.ArrayList;
90import java.util.Collection;
91import java.util.HashMap;
92import java.util.List;
93import java.util.Map;
94import java.util.Objects;
95import java.util.concurrent.Executor;
96import java.util.concurrent.ExecutorService;
97import java.util.concurrent.Executors;
98import java.util.concurrent.RejectedExecutionException;
99
100/**
101 * Class that answers queries about the state of network connectivity. It also
102 * notifies applications when network connectivity changes.
103 * <p>
104 * The primary responsibilities of this class are to:
105 * <ol>
106 * <li>Monitor network connections (Wi-Fi, GPRS, UMTS, etc.)</li>
107 * <li>Send broadcast intents when network connectivity changes</li>
108 * <li>Attempt to "fail over" to another network when connectivity to a network
109 * is lost</li>
110 * <li>Provide an API that allows applications to query the coarse-grained or fine-grained
111 * state of the available networks</li>
112 * <li>Provide an API that allows applications to request and select networks for their data
113 * traffic</li>
114 * </ol>
115 */
116@SystemService(Context.CONNECTIVITY_SERVICE)
117public class ConnectivityManager {
118 private static final String TAG = "ConnectivityManager";
119 private static final boolean DEBUG = Log.isLoggable(TAG, Log.DEBUG);
120
121 /**
122 * A change in network connectivity has occurred. A default connection has either
123 * been established or lost. The NetworkInfo for the affected network is
124 * sent as an extra; it should be consulted to see what kind of
125 * connectivity event occurred.
126 * <p/>
127 * Apps targeting Android 7.0 (API level 24) and higher do not receive this
128 * broadcast if they declare the broadcast receiver in their manifest. Apps
129 * will still receive broadcasts if they register their
130 * {@link android.content.BroadcastReceiver} with
131 * {@link android.content.Context#registerReceiver Context.registerReceiver()}
132 * and that context is still valid.
133 * <p/>
134 * If this is a connection that was the result of failing over from a
135 * disconnected network, then the FAILOVER_CONNECTION boolean extra is
136 * set to true.
137 * <p/>
138 * For a loss of connectivity, if the connectivity manager is attempting
139 * to connect (or has already connected) to another network, the
140 * NetworkInfo for the new network is also passed as an extra. This lets
141 * any receivers of the broadcast know that they should not necessarily
142 * tell the user that no data traffic will be possible. Instead, the
143 * receiver should expect another broadcast soon, indicating either that
144 * the failover attempt succeeded (and so there is still overall data
145 * connectivity), or that the failover attempt failed, meaning that all
146 * connectivity has been lost.
147 * <p/>
148 * For a disconnect event, the boolean extra EXTRA_NO_CONNECTIVITY
149 * is set to {@code true} if there are no connected networks at all.
150 *
151 * @deprecated apps should use the more versatile {@link #requestNetwork},
152 * {@link #registerNetworkCallback} or {@link #registerDefaultNetworkCallback}
153 * functions instead for faster and more detailed updates about the network
154 * changes they care about.
155 */
156 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
157 @Deprecated
158 public static final String CONNECTIVITY_ACTION = "android.net.conn.CONNECTIVITY_CHANGE";
159
160 /**
161 * The device has connected to a network that has presented a captive
162 * portal, which is blocking Internet connectivity. The user was presented
163 * with a notification that network sign in is required,
164 * and the user invoked the notification's action indicating they
165 * desire to sign in to the network. Apps handling this activity should
166 * facilitate signing in to the network. This action includes a
167 * {@link Network} typed extra called {@link #EXTRA_NETWORK} that represents
168 * the network presenting the captive portal; all communication with the
169 * captive portal must be done using this {@code Network} object.
170 * <p/>
171 * This activity includes a {@link CaptivePortal} extra named
172 * {@link #EXTRA_CAPTIVE_PORTAL} that can be used to indicate different
173 * outcomes of the captive portal sign in to the system:
174 * <ul>
175 * <li> When the app handling this action believes the user has signed in to
176 * the network and the captive portal has been dismissed, the app should
177 * call {@link CaptivePortal#reportCaptivePortalDismissed} so the system can
178 * reevaluate the network. If reevaluation finds the network no longer
179 * subject to a captive portal, the network may become the default active
180 * data network.</li>
181 * <li> When the app handling this action believes the user explicitly wants
182 * to ignore the captive portal and the network, the app should call
183 * {@link CaptivePortal#ignoreNetwork}. </li>
184 * </ul>
185 */
186 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
187 public static final String ACTION_CAPTIVE_PORTAL_SIGN_IN = "android.net.conn.CAPTIVE_PORTAL";
188
189 /**
190 * The lookup key for a {@link NetworkInfo} object. Retrieve with
191 * {@link android.content.Intent#getParcelableExtra(String)}.
192 *
193 * @deprecated The {@link NetworkInfo} object is deprecated, as many of its properties
194 * can't accurately represent modern network characteristics.
195 * Please obtain information about networks from the {@link NetworkCapabilities}
196 * or {@link LinkProperties} objects instead.
197 */
198 @Deprecated
199 public static final String EXTRA_NETWORK_INFO = "networkInfo";
200
201 /**
202 * Network type which triggered a {@link #CONNECTIVITY_ACTION} broadcast.
203 *
204 * @see android.content.Intent#getIntExtra(String, int)
205 * @deprecated The network type is not rich enough to represent the characteristics
206 * of modern networks. Please use {@link NetworkCapabilities} instead,
207 * in particular the transports.
208 */
209 @Deprecated
210 public static final String EXTRA_NETWORK_TYPE = "networkType";
211
212 /**
213 * The lookup key for a boolean that indicates whether a connect event
214 * is for a network to which the connectivity manager was failing over
215 * following a disconnect on another network.
216 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
217 *
218 * @deprecated See {@link NetworkInfo}.
219 */
220 @Deprecated
221 public static final String EXTRA_IS_FAILOVER = "isFailover";
222 /**
223 * The lookup key for a {@link NetworkInfo} object. This is supplied when
224 * there is another network that it may be possible to connect to. Retrieve with
225 * {@link android.content.Intent#getParcelableExtra(String)}.
226 *
227 * @deprecated See {@link NetworkInfo}.
228 */
229 @Deprecated
230 public static final String EXTRA_OTHER_NETWORK_INFO = "otherNetwork";
231 /**
232 * The lookup key for a boolean that indicates whether there is a
233 * complete lack of connectivity, i.e., no network is available.
234 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
235 */
236 public static final String EXTRA_NO_CONNECTIVITY = "noConnectivity";
237 /**
238 * The lookup key for a string that indicates why an attempt to connect
239 * to a network failed. The string has no particular structure. It is
240 * intended to be used in notifications presented to users. Retrieve
241 * it with {@link android.content.Intent#getStringExtra(String)}.
242 */
243 public static final String EXTRA_REASON = "reason";
244 /**
245 * The lookup key for a string that provides optionally supplied
246 * extra information about the network state. The information
247 * may be passed up from the lower networking layers, and its
248 * meaning may be specific to a particular network type. Retrieve
249 * it with {@link android.content.Intent#getStringExtra(String)}.
250 *
251 * @deprecated See {@link NetworkInfo#getExtraInfo()}.
252 */
253 @Deprecated
254 public static final String EXTRA_EXTRA_INFO = "extraInfo";
255 /**
256 * The lookup key for an int that provides information about
257 * our connection to the internet at large. 0 indicates no connection,
258 * 100 indicates a great connection. Retrieve it with
259 * {@link android.content.Intent#getIntExtra(String, int)}.
260 * {@hide}
261 */
262 public static final String EXTRA_INET_CONDITION = "inetCondition";
263 /**
264 * The lookup key for a {@link CaptivePortal} object included with the
265 * {@link #ACTION_CAPTIVE_PORTAL_SIGN_IN} intent. The {@code CaptivePortal}
266 * object can be used to either indicate to the system that the captive
267 * portal has been dismissed or that the user does not want to pursue
268 * signing in to captive portal. Retrieve it with
269 * {@link android.content.Intent#getParcelableExtra(String)}.
270 */
271 public static final String EXTRA_CAPTIVE_PORTAL = "android.net.extra.CAPTIVE_PORTAL";
272
273 /**
274 * Key for passing a URL to the captive portal login activity.
275 */
276 public static final String EXTRA_CAPTIVE_PORTAL_URL = "android.net.extra.CAPTIVE_PORTAL_URL";
277
278 /**
279 * Key for passing a {@link android.net.captiveportal.CaptivePortalProbeSpec} to the captive
280 * portal login activity.
281 * {@hide}
282 */
283 @SystemApi
284 public static final String EXTRA_CAPTIVE_PORTAL_PROBE_SPEC =
285 "android.net.extra.CAPTIVE_PORTAL_PROBE_SPEC";
286
287 /**
288 * Key for passing a user agent string to the captive portal login activity.
289 * {@hide}
290 */
291 @SystemApi
292 public static final String EXTRA_CAPTIVE_PORTAL_USER_AGENT =
293 "android.net.extra.CAPTIVE_PORTAL_USER_AGENT";
294
295 /**
296 * Broadcast action to indicate the change of data activity status
297 * (idle or active) on a network in a recent period.
298 * The network becomes active when data transmission is started, or
299 * idle if there is no data transmission for a period of time.
300 * {@hide}
301 */
302 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
303 public static final String ACTION_DATA_ACTIVITY_CHANGE =
304 "android.net.conn.DATA_ACTIVITY_CHANGE";
305 /**
306 * The lookup key for an enum that indicates the network device type on which this data activity
307 * change happens.
308 * {@hide}
309 */
310 public static final String EXTRA_DEVICE_TYPE = "deviceType";
311 /**
312 * The lookup key for a boolean that indicates the device is active or not. {@code true} means
313 * it is actively sending or receiving data and {@code false} means it is idle.
314 * {@hide}
315 */
316 public static final String EXTRA_IS_ACTIVE = "isActive";
317 /**
318 * The lookup key for a long that contains the timestamp (nanos) of the radio state change.
319 * {@hide}
320 */
321 public static final String EXTRA_REALTIME_NS = "tsNanos";
322
323 /**
324 * Broadcast Action: The setting for background data usage has changed
325 * values. Use {@link #getBackgroundDataSetting()} to get the current value.
326 * <p>
327 * If an application uses the network in the background, it should listen
328 * for this broadcast and stop using the background data if the value is
329 * {@code false}.
330 * <p>
331 *
332 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability
333 * of background data depends on several combined factors, and
334 * this broadcast is no longer sent. Instead, when background
335 * data is unavailable, {@link #getActiveNetworkInfo()} will now
336 * appear disconnected. During first boot after a platform
337 * upgrade, this broadcast will be sent once if
338 * {@link #getBackgroundDataSetting()} was {@code false} before
339 * the upgrade.
340 */
341 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
342 @Deprecated
343 public static final String ACTION_BACKGROUND_DATA_SETTING_CHANGED =
344 "android.net.conn.BACKGROUND_DATA_SETTING_CHANGED";
345
346 /**
347 * Broadcast Action: The network connection may not be good
348 * uses {@code ConnectivityManager.EXTRA_INET_CONDITION} and
349 * {@code ConnectivityManager.EXTRA_NETWORK_INFO} to specify
350 * the network and it's condition.
351 * @hide
352 */
353 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
354 @UnsupportedAppUsage
355 public static final String INET_CONDITION_ACTION =
356 "android.net.conn.INET_CONDITION_ACTION";
357
358 /**
359 * Broadcast Action: A tetherable connection has come or gone.
360 * Uses {@code ConnectivityManager.EXTRA_AVAILABLE_TETHER},
361 * {@code ConnectivityManager.EXTRA_ACTIVE_LOCAL_ONLY},
362 * {@code ConnectivityManager.EXTRA_ACTIVE_TETHER}, and
363 * {@code ConnectivityManager.EXTRA_ERRORED_TETHER} to indicate
364 * the current state of tethering. Each include a list of
365 * interface names in that state (may be empty).
366 * @hide
367 */
368 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
369 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
370 public static final String ACTION_TETHER_STATE_CHANGED =
371 TetheringManager.ACTION_TETHER_STATE_CHANGED;
372
373 /**
374 * @hide
375 * gives a String[] listing all the interfaces configured for
376 * tethering and currently available for tethering.
377 */
378 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
379 public static final String EXTRA_AVAILABLE_TETHER = TetheringManager.EXTRA_AVAILABLE_TETHER;
380
381 /**
382 * @hide
383 * gives a String[] listing all the interfaces currently in local-only
384 * mode (ie, has DHCPv4+IPv6-ULA support and no packet forwarding)
385 */
386 public static final String EXTRA_ACTIVE_LOCAL_ONLY = TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
387
388 /**
389 * @hide
390 * gives a String[] listing all the interfaces currently tethered
391 * (ie, has DHCPv4 support and packets potentially forwarded/NATed)
392 */
393 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
394 public static final String EXTRA_ACTIVE_TETHER = TetheringManager.EXTRA_ACTIVE_TETHER;
395
396 /**
397 * @hide
398 * gives a String[] listing all the interfaces we tried to tether and
399 * failed. Use {@link #getLastTetherError} to find the error code
400 * for any interfaces listed here.
401 */
402 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
403 public static final String EXTRA_ERRORED_TETHER = TetheringManager.EXTRA_ERRORED_TETHER;
404
405 /**
406 * Broadcast Action: The captive portal tracker has finished its test.
407 * Sent only while running Setup Wizard, in lieu of showing a user
408 * notification.
409 * @hide
410 */
411 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
412 public static final String ACTION_CAPTIVE_PORTAL_TEST_COMPLETED =
413 "android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED";
414 /**
415 * The lookup key for a boolean that indicates whether a captive portal was detected.
416 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
417 * @hide
418 */
419 public static final String EXTRA_IS_CAPTIVE_PORTAL = "captivePortal";
420
421 /**
422 * Action used to display a dialog that asks the user whether to connect to a network that is
423 * not validated. This intent is used to start the dialog in settings via startActivity.
424 *
425 * @hide
426 */
lucaslincf6d4502021-03-04 17:09:51 +0800427 @SystemApi(client = MODULE_LIBRARIES)
428 public static final String ACTION_PROMPT_UNVALIDATED = "android.net.action.PROMPT_UNVALIDATED";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900429
430 /**
431 * Action used to display a dialog that asks the user whether to avoid a network that is no
432 * longer validated. This intent is used to start the dialog in settings via startActivity.
433 *
434 * @hide
435 */
lucaslincf6d4502021-03-04 17:09:51 +0800436 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900437 public static final String ACTION_PROMPT_LOST_VALIDATION =
lucaslincf6d4502021-03-04 17:09:51 +0800438 "android.net.action.PROMPT_LOST_VALIDATION";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900439
440 /**
441 * Action used to display a dialog that asks the user whether to stay connected to a network
442 * that has not validated. This intent is used to start the dialog in settings via
443 * startActivity.
444 *
445 * @hide
446 */
lucaslincf6d4502021-03-04 17:09:51 +0800447 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900448 public static final String ACTION_PROMPT_PARTIAL_CONNECTIVITY =
lucaslincf6d4502021-03-04 17:09:51 +0800449 "android.net.action.PROMPT_PARTIAL_CONNECTIVITY";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900450
451 /**
452 * Invalid tethering type.
453 * @see #startTethering(int, boolean, OnStartTetheringCallback)
454 * @hide
455 */
456 public static final int TETHERING_INVALID = TetheringManager.TETHERING_INVALID;
457
458 /**
459 * Wifi tethering type.
460 * @see #startTethering(int, boolean, OnStartTetheringCallback)
461 * @hide
462 */
463 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900464 public static final int TETHERING_WIFI = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900465
466 /**
467 * USB tethering type.
468 * @see #startTethering(int, boolean, OnStartTetheringCallback)
469 * @hide
470 */
471 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900472 public static final int TETHERING_USB = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900473
474 /**
475 * Bluetooth tethering type.
476 * @see #startTethering(int, boolean, OnStartTetheringCallback)
477 * @hide
478 */
479 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900480 public static final int TETHERING_BLUETOOTH = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900481
482 /**
483 * Wifi P2p tethering type.
484 * Wifi P2p tethering is set through events automatically, and don't
485 * need to start from #startTethering(int, boolean, OnStartTetheringCallback).
486 * @hide
487 */
488 public static final int TETHERING_WIFI_P2P = TetheringManager.TETHERING_WIFI_P2P;
489
490 /**
491 * Extra used for communicating with the TetherService. Includes the type of tethering to
492 * enable if any.
493 * @hide
494 */
495 public static final String EXTRA_ADD_TETHER_TYPE = TetheringConstants.EXTRA_ADD_TETHER_TYPE;
496
497 /**
498 * Extra used for communicating with the TetherService. Includes the type of tethering for
499 * which to cancel provisioning.
500 * @hide
501 */
502 public static final String EXTRA_REM_TETHER_TYPE = TetheringConstants.EXTRA_REM_TETHER_TYPE;
503
504 /**
505 * Extra used for communicating with the TetherService. True to schedule a recheck of tether
506 * provisioning.
507 * @hide
508 */
509 public static final String EXTRA_SET_ALARM = TetheringConstants.EXTRA_SET_ALARM;
510
511 /**
512 * Tells the TetherService to run a provision check now.
513 * @hide
514 */
515 public static final String EXTRA_RUN_PROVISION = TetheringConstants.EXTRA_RUN_PROVISION;
516
517 /**
518 * Extra used for communicating with the TetherService. Contains the {@link ResultReceiver}
519 * which will receive provisioning results. Can be left empty.
520 * @hide
521 */
522 public static final String EXTRA_PROVISION_CALLBACK =
523 TetheringConstants.EXTRA_PROVISION_CALLBACK;
524
525 /**
526 * The absence of a connection type.
527 * @hide
528 */
529 @SystemApi
530 public static final int TYPE_NONE = -1;
531
532 /**
533 * A Mobile data connection. Devices may support more than one.
534 *
535 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
536 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
537 * appropriate network. {@see NetworkCapabilities} for supported transports.
538 */
539 @Deprecated
540 public static final int TYPE_MOBILE = 0;
541
542 /**
543 * A WIFI data connection. Devices may support more than one.
544 *
545 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
546 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
547 * appropriate network. {@see NetworkCapabilities} for supported transports.
548 */
549 @Deprecated
550 public static final int TYPE_WIFI = 1;
551
552 /**
553 * An MMS-specific Mobile data connection. This network type may use the
554 * same network interface as {@link #TYPE_MOBILE} or it may use a different
555 * one. This is used by applications needing to talk to the carrier's
556 * Multimedia Messaging Service servers.
557 *
558 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
559 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
560 * provides the {@link NetworkCapabilities#NET_CAPABILITY_MMS} capability.
561 */
562 @Deprecated
563 public static final int TYPE_MOBILE_MMS = 2;
564
565 /**
566 * A SUPL-specific Mobile data connection. This network type may use the
567 * same network interface as {@link #TYPE_MOBILE} or it may use a different
568 * one. This is used by applications needing to talk to the carrier's
569 * Secure User Plane Location servers for help locating the device.
570 *
571 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
572 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
573 * provides the {@link NetworkCapabilities#NET_CAPABILITY_SUPL} capability.
574 */
575 @Deprecated
576 public static final int TYPE_MOBILE_SUPL = 3;
577
578 /**
579 * A DUN-specific Mobile data connection. This network type may use the
580 * same network interface as {@link #TYPE_MOBILE} or it may use a different
581 * one. This is sometimes by the system when setting up an upstream connection
582 * for tethering so that the carrier is aware of DUN traffic.
583 *
584 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
585 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
586 * provides the {@link NetworkCapabilities#NET_CAPABILITY_DUN} capability.
587 */
588 @Deprecated
589 public static final int TYPE_MOBILE_DUN = 4;
590
591 /**
592 * A High Priority Mobile data connection. This network type uses the
593 * same network interface as {@link #TYPE_MOBILE} but the routing setup
594 * is different.
595 *
596 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
597 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
598 * appropriate network. {@see NetworkCapabilities} for supported transports.
599 */
600 @Deprecated
601 public static final int TYPE_MOBILE_HIPRI = 5;
602
603 /**
604 * A WiMAX data connection.
605 *
606 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
607 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
608 * appropriate network. {@see NetworkCapabilities} for supported transports.
609 */
610 @Deprecated
611 public static final int TYPE_WIMAX = 6;
612
613 /**
614 * A Bluetooth data connection.
615 *
616 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
617 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
618 * appropriate network. {@see NetworkCapabilities} for supported transports.
619 */
620 @Deprecated
621 public static final int TYPE_BLUETOOTH = 7;
622
623 /**
624 * Fake data connection. This should not be used on shipping devices.
625 * @deprecated This is not used any more.
626 */
627 @Deprecated
628 public static final int TYPE_DUMMY = 8;
629
630 /**
631 * An Ethernet data connection.
632 *
633 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
634 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
635 * appropriate network. {@see NetworkCapabilities} for supported transports.
636 */
637 @Deprecated
638 public static final int TYPE_ETHERNET = 9;
639
640 /**
641 * Over the air Administration.
642 * @deprecated Use {@link NetworkCapabilities} instead.
643 * {@hide}
644 */
645 @Deprecated
646 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
647 public static final int TYPE_MOBILE_FOTA = 10;
648
649 /**
650 * IP Multimedia Subsystem.
651 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IMS} instead.
652 * {@hide}
653 */
654 @Deprecated
655 @UnsupportedAppUsage
656 public static final int TYPE_MOBILE_IMS = 11;
657
658 /**
659 * Carrier Branded Services.
660 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_CBS} instead.
661 * {@hide}
662 */
663 @Deprecated
664 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
665 public static final int TYPE_MOBILE_CBS = 12;
666
667 /**
668 * A Wi-Fi p2p connection. Only requesting processes will have access to
669 * the peers connected.
670 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_WIFI_P2P} instead.
671 * {@hide}
672 */
673 @Deprecated
674 @SystemApi
675 public static final int TYPE_WIFI_P2P = 13;
676
677 /**
678 * The network to use for initially attaching to the network
679 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IA} instead.
680 * {@hide}
681 */
682 @Deprecated
683 @UnsupportedAppUsage
684 public static final int TYPE_MOBILE_IA = 14;
685
686 /**
687 * Emergency PDN connection for emergency services. This
688 * may include IMS and MMS in emergency situations.
689 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_EIMS} instead.
690 * {@hide}
691 */
692 @Deprecated
693 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
694 public static final int TYPE_MOBILE_EMERGENCY = 15;
695
696 /**
697 * The network that uses proxy to achieve connectivity.
698 * @deprecated Use {@link NetworkCapabilities} instead.
699 * {@hide}
700 */
701 @Deprecated
702 @SystemApi
703 public static final int TYPE_PROXY = 16;
704
705 /**
706 * A virtual network using one or more native bearers.
707 * It may or may not be providing security services.
708 * @deprecated Applications should use {@link NetworkCapabilities#TRANSPORT_VPN} instead.
709 */
710 @Deprecated
711 public static final int TYPE_VPN = 17;
712
713 /**
714 * A network that is exclusively meant to be used for testing
715 *
716 * @deprecated Use {@link NetworkCapabilities} instead.
717 * @hide
718 */
719 @Deprecated
720 public static final int TYPE_TEST = 18; // TODO: Remove this once NetworkTypes are unused.
721
722 /**
723 * @deprecated Use {@link NetworkCapabilities} instead.
724 * @hide
725 */
726 @Deprecated
727 @Retention(RetentionPolicy.SOURCE)
728 @IntDef(prefix = { "TYPE_" }, value = {
729 TYPE_NONE,
730 TYPE_MOBILE,
731 TYPE_WIFI,
732 TYPE_MOBILE_MMS,
733 TYPE_MOBILE_SUPL,
734 TYPE_MOBILE_DUN,
735 TYPE_MOBILE_HIPRI,
736 TYPE_WIMAX,
737 TYPE_BLUETOOTH,
738 TYPE_DUMMY,
739 TYPE_ETHERNET,
740 TYPE_MOBILE_FOTA,
741 TYPE_MOBILE_IMS,
742 TYPE_MOBILE_CBS,
743 TYPE_WIFI_P2P,
744 TYPE_MOBILE_IA,
745 TYPE_MOBILE_EMERGENCY,
746 TYPE_PROXY,
747 TYPE_VPN,
748 TYPE_TEST
749 })
750 public @interface LegacyNetworkType {}
751
752 // Deprecated constants for return values of startUsingNetworkFeature. They used to live
753 // in com.android.internal.telephony.PhoneConstants until they were made inaccessible.
754 private static final int DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE = 0;
755 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED = 1;
756 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED = 3;
757
758 /** {@hide} */
759 public static final int MAX_RADIO_TYPE = TYPE_TEST;
760
761 /** {@hide} */
762 public static final int MAX_NETWORK_TYPE = TYPE_TEST;
763
764 private static final int MIN_NETWORK_TYPE = TYPE_MOBILE;
765
766 /**
767 * If you want to set the default network preference,you can directly
768 * change the networkAttributes array in framework's config.xml.
769 *
770 * @deprecated Since we support so many more networks now, the single
771 * network default network preference can't really express
772 * the hierarchy. Instead, the default is defined by the
773 * networkAttributes in config.xml. You can determine
774 * the current value by calling {@link #getNetworkPreference()}
775 * from an App.
776 */
777 @Deprecated
778 public static final int DEFAULT_NETWORK_PREFERENCE = TYPE_WIFI;
779
780 /**
781 * @hide
782 */
783 public static final int REQUEST_ID_UNSET = 0;
784
785 /**
786 * Static unique request used as a tombstone for NetworkCallbacks that have been unregistered.
787 * This allows to distinguish when unregistering NetworkCallbacks those that were never
788 * registered from those that were already unregistered.
789 * @hide
790 */
791 private static final NetworkRequest ALREADY_UNREGISTERED =
792 new NetworkRequest.Builder().clearCapabilities().build();
793
794 /**
795 * A NetID indicating no Network is selected.
796 * Keep in sync with bionic/libc/dns/include/resolv_netid.h
797 * @hide
798 */
799 public static final int NETID_UNSET = 0;
800
801 /**
802 * Private DNS Mode values.
803 *
804 * The "private_dns_mode" global setting stores a String value which is
805 * expected to be one of the following.
806 */
807
808 /**
809 * @hide
810 */
lucaslin180f44f2021-03-12 16:11:27 +0800811 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900812 public static final String PRIVATE_DNS_MODE_OFF = "off";
813 /**
814 * @hide
815 */
lucaslin180f44f2021-03-12 16:11:27 +0800816 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900817 public static final String PRIVATE_DNS_MODE_OPPORTUNISTIC = "opportunistic";
818 /**
819 * @hide
820 */
lucaslin180f44f2021-03-12 16:11:27 +0800821 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900822 public static final String PRIVATE_DNS_MODE_PROVIDER_HOSTNAME = "hostname";
lucaslin180f44f2021-03-12 16:11:27 +0800823
824 /** @hide */
825 @Retention(RetentionPolicy.SOURCE)
826 @StringDef(value = {
827 PRIVATE_DNS_MODE_OFF,
828 PRIVATE_DNS_MODE_OPPORTUNISTIC,
829 PRIVATE_DNS_MODE_PROVIDER_HOSTNAME,
830 })
831 public @interface PrivateDnsMode {}
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900832
833 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
834 private final IConnectivityManager mService;
Lorenzo Colitti842075e2021-02-04 17:32:07 +0900835
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900836 /**
837 * A kludge to facilitate static access where a Context pointer isn't available, like in the
838 * case of the static set/getProcessDefaultNetwork methods and from the Network class.
839 * TODO: Remove this after deprecating the static methods in favor of non-static methods or
840 * methods that take a Context argument.
841 */
842 private static ConnectivityManager sInstance;
843
844 private final Context mContext;
845
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900846 private final TetheringManager mTetheringManager;
847
848 /**
849 * Tests if a given integer represents a valid network type.
850 * @param networkType the type to be tested
851 * @return a boolean. {@code true} if the type is valid, else {@code false}
852 * @deprecated All APIs accepting a network type are deprecated. There should be no need to
853 * validate a network type.
854 */
855 @Deprecated
856 public static boolean isNetworkTypeValid(int networkType) {
857 return MIN_NETWORK_TYPE <= networkType && networkType <= MAX_NETWORK_TYPE;
858 }
859
860 /**
861 * Returns a non-localized string representing a given network type.
862 * ONLY used for debugging output.
863 * @param type the type needing naming
864 * @return a String for the given type, or a string version of the type ("87")
865 * if no name is known.
866 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
867 * {@hide}
868 */
869 @Deprecated
870 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
871 public static String getNetworkTypeName(int type) {
872 switch (type) {
873 case TYPE_NONE:
874 return "NONE";
875 case TYPE_MOBILE:
876 return "MOBILE";
877 case TYPE_WIFI:
878 return "WIFI";
879 case TYPE_MOBILE_MMS:
880 return "MOBILE_MMS";
881 case TYPE_MOBILE_SUPL:
882 return "MOBILE_SUPL";
883 case TYPE_MOBILE_DUN:
884 return "MOBILE_DUN";
885 case TYPE_MOBILE_HIPRI:
886 return "MOBILE_HIPRI";
887 case TYPE_WIMAX:
888 return "WIMAX";
889 case TYPE_BLUETOOTH:
890 return "BLUETOOTH";
891 case TYPE_DUMMY:
892 return "DUMMY";
893 case TYPE_ETHERNET:
894 return "ETHERNET";
895 case TYPE_MOBILE_FOTA:
896 return "MOBILE_FOTA";
897 case TYPE_MOBILE_IMS:
898 return "MOBILE_IMS";
899 case TYPE_MOBILE_CBS:
900 return "MOBILE_CBS";
901 case TYPE_WIFI_P2P:
902 return "WIFI_P2P";
903 case TYPE_MOBILE_IA:
904 return "MOBILE_IA";
905 case TYPE_MOBILE_EMERGENCY:
906 return "MOBILE_EMERGENCY";
907 case TYPE_PROXY:
908 return "PROXY";
909 case TYPE_VPN:
910 return "VPN";
911 default:
912 return Integer.toString(type);
913 }
914 }
915
916 /**
917 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900918 */
lucaslin10774b72021-03-17 14:16:01 +0800919 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900920 public void systemReady() {
921 try {
922 mService.systemReady();
923 } catch (RemoteException e) {
924 throw e.rethrowFromSystemServer();
925 }
926 }
927
928 /**
929 * Checks if a given type uses the cellular data connection.
930 * This should be replaced in the future by a network property.
931 * @param networkType the type to check
932 * @return a boolean - {@code true} if uses cellular network, else {@code false}
933 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
934 * {@hide}
935 */
936 @Deprecated
937 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
938 public static boolean isNetworkTypeMobile(int networkType) {
939 switch (networkType) {
940 case TYPE_MOBILE:
941 case TYPE_MOBILE_MMS:
942 case TYPE_MOBILE_SUPL:
943 case TYPE_MOBILE_DUN:
944 case TYPE_MOBILE_HIPRI:
945 case TYPE_MOBILE_FOTA:
946 case TYPE_MOBILE_IMS:
947 case TYPE_MOBILE_CBS:
948 case TYPE_MOBILE_IA:
949 case TYPE_MOBILE_EMERGENCY:
950 return true;
951 default:
952 return false;
953 }
954 }
955
956 /**
957 * Checks if the given network type is backed by a Wi-Fi radio.
958 *
959 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
960 * @hide
961 */
962 @Deprecated
963 public static boolean isNetworkTypeWifi(int networkType) {
964 switch (networkType) {
965 case TYPE_WIFI:
966 case TYPE_WIFI_P2P:
967 return true;
968 default:
969 return false;
970 }
971 }
972
973 /**
Chalard Jeanad565e22021-02-25 17:23:40 +0900974 * Preference for {@link #setNetworkPreferenceForUser(UserHandle, int, Executor, Runnable)}.
975 * Specify that the traffic for this user should by follow the default rules.
976 * @hide
977 */
Chalard Jeanbef6b092021-03-17 14:33:24 +0900978 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +0900979 public static final int PROFILE_NETWORK_PREFERENCE_DEFAULT = 0;
980
981 /**
982 * Preference for {@link #setNetworkPreferenceForUser(UserHandle, int, Executor, Runnable)}.
983 * Specify that the traffic for this user should by default go on a network with
984 * {@link NetworkCapabilities#NET_CAPABILITY_ENTERPRISE}, and on the system default network
985 * if no such network is available.
986 * @hide
987 */
Chalard Jeanbef6b092021-03-17 14:33:24 +0900988 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +0900989 public static final int PROFILE_NETWORK_PREFERENCE_ENTERPRISE = 1;
990
991 /** @hide */
992 @Retention(RetentionPolicy.SOURCE)
993 @IntDef(value = {
994 PROFILE_NETWORK_PREFERENCE_DEFAULT,
995 PROFILE_NETWORK_PREFERENCE_ENTERPRISE
996 })
997 public @interface ProfileNetworkPreference {
998 }
999
1000 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001001 * Specifies the preferred network type. When the device has more
1002 * than one type available the preferred network type will be used.
1003 *
1004 * @param preference the network type to prefer over all others. It is
1005 * unspecified what happens to the old preferred network in the
1006 * overall ordering.
1007 * @deprecated Functionality has been removed as it no longer makes sense,
1008 * with many more than two networks - we'd need an array to express
1009 * preference. Instead we use dynamic network properties of
1010 * the networks to describe their precedence.
1011 */
1012 @Deprecated
1013 public void setNetworkPreference(int preference) {
1014 }
1015
1016 /**
1017 * Retrieves the current preferred network type.
1018 *
1019 * @return an integer representing the preferred network type
1020 *
1021 * @deprecated Functionality has been removed as it no longer makes sense,
1022 * with many more than two networks - we'd need an array to express
1023 * preference. Instead we use dynamic network properties of
1024 * the networks to describe their precedence.
1025 */
1026 @Deprecated
1027 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1028 public int getNetworkPreference() {
1029 return TYPE_NONE;
1030 }
1031
1032 /**
1033 * Returns details about the currently active default data network. When
1034 * connected, this network is the default route for outgoing connections.
1035 * You should always check {@link NetworkInfo#isConnected()} before initiating
1036 * network traffic. This may return {@code null} when there is no default
1037 * network.
1038 * Note that if the default network is a VPN, this method will return the
1039 * NetworkInfo for one of its underlying networks instead, or null if the
1040 * VPN agent did not specify any. Apps interested in learning about VPNs
1041 * should use {@link #getNetworkInfo(android.net.Network)} instead.
1042 *
1043 * @return a {@link NetworkInfo} object for the current default network
1044 * or {@code null} if no default network is currently active
1045 * @deprecated See {@link NetworkInfo}.
1046 */
1047 @Deprecated
1048 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1049 @Nullable
1050 public NetworkInfo getActiveNetworkInfo() {
1051 try {
1052 return mService.getActiveNetworkInfo();
1053 } catch (RemoteException e) {
1054 throw e.rethrowFromSystemServer();
1055 }
1056 }
1057
1058 /**
1059 * Returns a {@link Network} object corresponding to the currently active
1060 * default data network. In the event that the current active default data
1061 * network disconnects, the returned {@code Network} object will no longer
1062 * be usable. This will return {@code null} when there is no default
1063 * network.
1064 *
1065 * @return a {@link Network} object for the current default network or
1066 * {@code null} if no default network is currently active
1067 */
1068 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1069 @Nullable
1070 public Network getActiveNetwork() {
1071 try {
1072 return mService.getActiveNetwork();
1073 } catch (RemoteException e) {
1074 throw e.rethrowFromSystemServer();
1075 }
1076 }
1077
1078 /**
1079 * Returns a {@link Network} object corresponding to the currently active
1080 * default data network for a specific UID. In the event that the default data
1081 * network disconnects, the returned {@code Network} object will no longer
1082 * be usable. This will return {@code null} when there is no default
1083 * network for the UID.
1084 *
1085 * @return a {@link Network} object for the current default network for the
1086 * given UID or {@code null} if no default network is currently active
1087 *
1088 * @hide
1089 */
1090 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1091 @Nullable
1092 public Network getActiveNetworkForUid(int uid) {
1093 return getActiveNetworkForUid(uid, false);
1094 }
1095
1096 /** {@hide} */
1097 public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) {
1098 try {
1099 return mService.getActiveNetworkForUid(uid, ignoreBlocked);
1100 } catch (RemoteException e) {
1101 throw e.rethrowFromSystemServer();
1102 }
1103 }
1104
1105 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001106 * Adds or removes a requirement for given UID ranges to use the VPN.
1107 *
1108 * If set to {@code true}, informs the system that the UIDs in the specified ranges must not
1109 * have any connectivity except if a VPN is connected and applies to the UIDs, or if the UIDs
1110 * otherwise have permission to bypass the VPN (e.g., because they have the
1111 * {@link android.Manifest.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS} permission, or when
1112 * using a socket protected by a method such as {@link VpnService#protect(DatagramSocket)}. If
1113 * set to {@code false}, a previously-added restriction is removed.
1114 * <p>
1115 * Each of the UID ranges specified by this method is added and removed as is, and no processing
1116 * is performed on the ranges to de-duplicate, merge, split, or intersect them. In order to
1117 * remove a previously-added range, the exact range must be removed as is.
1118 * <p>
1119 * The changes are applied asynchronously and may not have been applied by the time the method
1120 * returns. Apps will be notified about any changes that apply to them via
1121 * {@link NetworkCallback#onBlockedStatusChanged} callbacks called after the changes take
1122 * effect.
1123 * <p>
1124 * This method should be called only by the VPN code.
1125 *
1126 * @param ranges the UID ranges to restrict
1127 * @param requireVpn whether the specified UID ranges must use a VPN
1128 *
1129 * TODO: expose as @SystemApi.
1130 * @hide
1131 */
1132 @RequiresPermission(anyOf = {
1133 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1134 android.Manifest.permission.NETWORK_STACK})
1135 public void setRequireVpnForUids(boolean requireVpn,
1136 @NonNull Collection<Range<Integer>> ranges) {
1137 Objects.requireNonNull(ranges);
1138 // The Range class is not parcelable. Convert to UidRange, which is what is used internally.
1139 // This method is not necessarily expected to be used outside the system server, so
1140 // parceling may not be necessary, but it could be used out-of-process, e.g., by the network
1141 // stack process, or by tests.
1142 UidRange[] rangesArray = new UidRange[ranges.size()];
1143 int index = 0;
1144 for (Range<Integer> range : ranges) {
1145 rangesArray[index++] = new UidRange(range.getLower(), range.getUpper());
1146 }
1147 try {
1148 mService.setRequireVpnForUids(requireVpn, rangesArray);
1149 } catch (RemoteException e) {
1150 throw e.rethrowFromSystemServer();
1151 }
1152 }
1153
1154 /**
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001155 * Informs ConnectivityService of whether the legacy lockdown VPN, as implemented by
1156 * LockdownVpnTracker, is in use. This is deprecated for new devices starting from Android 12
1157 * but is still supported for backwards compatibility.
1158 * <p>
1159 * This type of VPN is assumed always to use the system default network, and must always declare
1160 * exactly one underlying network, which is the network that was the default when the VPN
1161 * connected.
1162 * <p>
1163 * Calling this method with {@code true} enables legacy behaviour, specifically:
1164 * <ul>
1165 * <li>Any VPN that applies to userId 0 behaves specially with respect to deprecated
1166 * {@link #CONNECTIVITY_ACTION} broadcasts. Any such broadcasts will have the state in the
1167 * {@link #EXTRA_NETWORK_INFO} replaced by state of the VPN network. Also, any time the VPN
1168 * connects, a {@link #CONNECTIVITY_ACTION} broadcast will be sent for the network
1169 * underlying the VPN.</li>
1170 * <li>Deprecated APIs that return {@link NetworkInfo} objects will have their state
1171 * similarly replaced by the VPN network state.</li>
1172 * <li>Information on current network interfaces passed to NetworkStatsService will not
1173 * include any VPN interfaces.</li>
1174 * </ul>
1175 *
1176 * @param enabled whether legacy lockdown VPN is enabled or disabled
1177 *
1178 * TODO: @SystemApi(client = MODULE_LIBRARIES)
1179 *
1180 * @hide
1181 */
1182 @RequiresPermission(anyOf = {
1183 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1184 android.Manifest.permission.NETWORK_SETTINGS})
1185 public void setLegacyLockdownVpnEnabled(boolean enabled) {
1186 try {
1187 mService.setLegacyLockdownVpnEnabled(enabled);
1188 } catch (RemoteException e) {
1189 throw e.rethrowFromSystemServer();
1190 }
1191 }
1192
1193 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001194 * Returns details about the currently active default data network
1195 * for a given uid. This is for internal use only to avoid spying
1196 * other apps.
1197 *
1198 * @return a {@link NetworkInfo} object for the current default network
1199 * for the given uid or {@code null} if no default network is
1200 * available for the specified uid.
1201 *
1202 * {@hide}
1203 */
1204 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1205 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1206 public NetworkInfo getActiveNetworkInfoForUid(int uid) {
1207 return getActiveNetworkInfoForUid(uid, false);
1208 }
1209
1210 /** {@hide} */
1211 public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) {
1212 try {
1213 return mService.getActiveNetworkInfoForUid(uid, ignoreBlocked);
1214 } catch (RemoteException e) {
1215 throw e.rethrowFromSystemServer();
1216 }
1217 }
1218
1219 /**
1220 * Returns connection status information about a particular
1221 * network type.
1222 *
1223 * @param networkType integer specifying which networkType in
1224 * which you're interested.
1225 * @return a {@link NetworkInfo} object for the requested
1226 * network type or {@code null} if the type is not
1227 * supported by the device. If {@code networkType} is
1228 * TYPE_VPN and a VPN is active for the calling app,
1229 * then this method will try to return one of the
1230 * underlying networks for the VPN or null if the
1231 * VPN agent didn't specify any.
1232 *
1233 * @deprecated This method does not support multiple connected networks
1234 * of the same type. Use {@link #getAllNetworks} and
1235 * {@link #getNetworkInfo(android.net.Network)} instead.
1236 */
1237 @Deprecated
1238 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1239 @Nullable
1240 public NetworkInfo getNetworkInfo(int networkType) {
1241 try {
1242 return mService.getNetworkInfo(networkType);
1243 } catch (RemoteException e) {
1244 throw e.rethrowFromSystemServer();
1245 }
1246 }
1247
1248 /**
1249 * Returns connection status information about a particular
1250 * Network.
1251 *
1252 * @param network {@link Network} specifying which network
1253 * in which you're interested.
1254 * @return a {@link NetworkInfo} object for the requested
1255 * network or {@code null} if the {@code Network}
1256 * is not valid.
1257 * @deprecated See {@link NetworkInfo}.
1258 */
1259 @Deprecated
1260 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1261 @Nullable
1262 public NetworkInfo getNetworkInfo(@Nullable Network network) {
1263 return getNetworkInfoForUid(network, Process.myUid(), false);
1264 }
1265
1266 /** {@hide} */
1267 public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) {
1268 try {
1269 return mService.getNetworkInfoForUid(network, uid, ignoreBlocked);
1270 } catch (RemoteException e) {
1271 throw e.rethrowFromSystemServer();
1272 }
1273 }
1274
1275 /**
1276 * Returns connection status information about all network
1277 * types supported by the device.
1278 *
1279 * @return an array of {@link NetworkInfo} objects. Check each
1280 * {@link NetworkInfo#getType} for which type each applies.
1281 *
1282 * @deprecated This method does not support multiple connected networks
1283 * of the same type. Use {@link #getAllNetworks} and
1284 * {@link #getNetworkInfo(android.net.Network)} instead.
1285 */
1286 @Deprecated
1287 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1288 @NonNull
1289 public NetworkInfo[] getAllNetworkInfo() {
1290 try {
1291 return mService.getAllNetworkInfo();
1292 } catch (RemoteException e) {
1293 throw e.rethrowFromSystemServer();
1294 }
1295 }
1296
1297 /**
junyulaib1211372021-03-03 12:09:05 +08001298 * Return a list of {@link NetworkStateSnapshot}s, one for each network that is currently
1299 * connected.
1300 * @hide
1301 */
1302 @SystemApi(client = MODULE_LIBRARIES)
1303 @RequiresPermission(anyOf = {
1304 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1305 android.Manifest.permission.NETWORK_STACK,
1306 android.Manifest.permission.NETWORK_SETTINGS})
1307 @NonNull
1308 public List<NetworkStateSnapshot> getAllNetworkStateSnapshot() {
1309 try {
1310 return mService.getAllNetworkStateSnapshot();
1311 } catch (RemoteException e) {
1312 throw e.rethrowFromSystemServer();
1313 }
1314 }
1315
1316 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001317 * Returns the {@link Network} object currently serving a given type, or
1318 * null if the given type is not connected.
1319 *
1320 * @hide
1321 * @deprecated This method does not support multiple connected networks
1322 * of the same type. Use {@link #getAllNetworks} and
1323 * {@link #getNetworkInfo(android.net.Network)} instead.
1324 */
1325 @Deprecated
1326 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1327 @UnsupportedAppUsage
1328 public Network getNetworkForType(int networkType) {
1329 try {
1330 return mService.getNetworkForType(networkType);
1331 } catch (RemoteException e) {
1332 throw e.rethrowFromSystemServer();
1333 }
1334 }
1335
1336 /**
1337 * Returns an array of all {@link Network} currently tracked by the
1338 * framework.
1339 *
1340 * @return an array of {@link Network} objects.
1341 */
1342 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1343 @NonNull
1344 public Network[] getAllNetworks() {
1345 try {
1346 return mService.getAllNetworks();
1347 } catch (RemoteException e) {
1348 throw e.rethrowFromSystemServer();
1349 }
1350 }
1351
1352 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001353 * Returns an array of {@link NetworkCapabilities} objects, representing
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001354 * the Networks that applications run by the given user will use by default.
1355 * @hide
1356 */
1357 @UnsupportedAppUsage
1358 public NetworkCapabilities[] getDefaultNetworkCapabilitiesForUser(int userId) {
1359 try {
1360 return mService.getDefaultNetworkCapabilitiesForUser(
Roshan Piusa8a477b2020-12-17 14:53:09 -08001361 userId, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001362 } catch (RemoteException e) {
1363 throw e.rethrowFromSystemServer();
1364 }
1365 }
1366
1367 /**
1368 * Returns the IP information for the current default network.
1369 *
1370 * @return a {@link LinkProperties} object describing the IP info
1371 * for the current default network, or {@code null} if there
1372 * is no current default network.
1373 *
1374 * {@hide}
1375 * @deprecated please use {@link #getLinkProperties(Network)} on the return
1376 * value of {@link #getActiveNetwork()} instead. In particular,
1377 * this method will return non-null LinkProperties even if the
1378 * app is blocked by policy from using this network.
1379 */
1380 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1381 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 109783091)
1382 public LinkProperties getActiveLinkProperties() {
1383 try {
1384 return mService.getActiveLinkProperties();
1385 } catch (RemoteException e) {
1386 throw e.rethrowFromSystemServer();
1387 }
1388 }
1389
1390 /**
1391 * Returns the IP information for a given network type.
1392 *
1393 * @param networkType the network type of interest.
1394 * @return a {@link LinkProperties} object describing the IP info
1395 * for the given networkType, or {@code null} if there is
1396 * no current default network.
1397 *
1398 * {@hide}
1399 * @deprecated This method does not support multiple connected networks
1400 * of the same type. Use {@link #getAllNetworks},
1401 * {@link #getNetworkInfo(android.net.Network)}, and
1402 * {@link #getLinkProperties(android.net.Network)} instead.
1403 */
1404 @Deprecated
1405 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1406 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
1407 public LinkProperties getLinkProperties(int networkType) {
1408 try {
1409 return mService.getLinkPropertiesForType(networkType);
1410 } catch (RemoteException e) {
1411 throw e.rethrowFromSystemServer();
1412 }
1413 }
1414
1415 /**
1416 * Get the {@link LinkProperties} for the given {@link Network}. This
1417 * will return {@code null} if the network is unknown.
1418 *
1419 * @param network The {@link Network} object identifying the network in question.
1420 * @return The {@link LinkProperties} for the network, or {@code null}.
1421 */
1422 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1423 @Nullable
1424 public LinkProperties getLinkProperties(@Nullable Network network) {
1425 try {
1426 return mService.getLinkProperties(network);
1427 } catch (RemoteException e) {
1428 throw e.rethrowFromSystemServer();
1429 }
1430 }
1431
1432 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001433 * Get the {@link NetworkCapabilities} for the given {@link Network}. This
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001434 * will return {@code null} if the network is unknown.
1435 *
Roshan Piuse08bc182020-12-22 15:10:42 -08001436 * This will remove any location sensitive data in {@link TransportInfo} embedded in
1437 * {@link NetworkCapabilities#getTransportInfo()}. Some transport info instances like
1438 * {@link android.net.wifi.WifiInfo} contain location sensitive information. Retrieving
1439 * this location sensitive information (subject to app's location permissions) will be
1440 * noted by system. To include any location sensitive data in {@link TransportInfo},
1441 * use a {@link NetworkCallback} with
1442 * {@link NetworkCallback#FLAG_INCLUDE_LOCATION_INFO} flag.
1443 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001444 * @param network The {@link Network} object identifying the network in question.
Roshan Piuse08bc182020-12-22 15:10:42 -08001445 * @return The {@link NetworkCapabilities} for the network, or {@code null}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001446 */
1447 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1448 @Nullable
1449 public NetworkCapabilities getNetworkCapabilities(@Nullable Network network) {
1450 try {
Roshan Piusa8a477b2020-12-17 14:53:09 -08001451 return mService.getNetworkCapabilities(
1452 network, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001453 } catch (RemoteException e) {
1454 throw e.rethrowFromSystemServer();
1455 }
1456 }
1457
1458 /**
1459 * Gets a URL that can be used for resolving whether a captive portal is present.
1460 * 1. This URL should respond with a 204 response to a GET request to indicate no captive
1461 * portal is present.
1462 * 2. This URL must be HTTP as redirect responses are used to find captive portal
1463 * sign-in pages. Captive portals cannot respond to HTTPS requests with redirects.
1464 *
1465 * The system network validation may be using different strategies to detect captive portals,
1466 * so this method does not necessarily return a URL used by the system. It only returns a URL
1467 * that may be relevant for other components trying to detect captive portals.
1468 *
1469 * @hide
1470 * @deprecated This API returns URL which is not guaranteed to be one of the URLs used by the
1471 * system.
1472 */
1473 @Deprecated
1474 @SystemApi
1475 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
1476 public String getCaptivePortalServerUrl() {
1477 try {
1478 return mService.getCaptivePortalServerUrl();
1479 } catch (RemoteException e) {
1480 throw e.rethrowFromSystemServer();
1481 }
1482 }
1483
1484 /**
1485 * Tells the underlying networking system that the caller wants to
1486 * begin using the named feature. The interpretation of {@code feature}
1487 * is completely up to each networking implementation.
1488 *
1489 * <p>This method requires the caller to hold either the
1490 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1491 * or the ability to modify system settings as determined by
1492 * {@link android.provider.Settings.System#canWrite}.</p>
1493 *
1494 * @param networkType specifies which network the request pertains to
1495 * @param feature the name of the feature to be used
1496 * @return an integer value representing the outcome of the request.
1497 * The interpretation of this value is specific to each networking
1498 * implementation+feature combination, except that the value {@code -1}
1499 * always indicates failure.
1500 *
1501 * @deprecated Deprecated in favor of the cleaner
1502 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} API.
1503 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1504 * throw {@code UnsupportedOperationException} if called.
1505 * @removed
1506 */
1507 @Deprecated
1508 public int startUsingNetworkFeature(int networkType, String feature) {
1509 checkLegacyRoutingApiAccess();
1510 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1511 if (netCap == null) {
1512 Log.d(TAG, "Can't satisfy startUsingNetworkFeature for " + networkType + ", " +
1513 feature);
1514 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1515 }
1516
1517 NetworkRequest request = null;
1518 synchronized (sLegacyRequests) {
1519 LegacyRequest l = sLegacyRequests.get(netCap);
1520 if (l != null) {
1521 Log.d(TAG, "renewing startUsingNetworkFeature request " + l.networkRequest);
1522 renewRequestLocked(l);
1523 if (l.currentNetwork != null) {
1524 return DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE;
1525 } else {
1526 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1527 }
1528 }
1529
1530 request = requestNetworkForFeatureLocked(netCap);
1531 }
1532 if (request != null) {
1533 Log.d(TAG, "starting startUsingNetworkFeature for request " + request);
1534 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1535 } else {
1536 Log.d(TAG, " request Failed");
1537 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1538 }
1539 }
1540
1541 /**
1542 * Tells the underlying networking system that the caller is finished
1543 * using the named feature. The interpretation of {@code feature}
1544 * is completely up to each networking implementation.
1545 *
1546 * <p>This method requires the caller to hold either the
1547 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1548 * or the ability to modify system settings as determined by
1549 * {@link android.provider.Settings.System#canWrite}.</p>
1550 *
1551 * @param networkType specifies which network the request pertains to
1552 * @param feature the name of the feature that is no longer needed
1553 * @return an integer value representing the outcome of the request.
1554 * The interpretation of this value is specific to each networking
1555 * implementation+feature combination, except that the value {@code -1}
1556 * always indicates failure.
1557 *
1558 * @deprecated Deprecated in favor of the cleaner
1559 * {@link #unregisterNetworkCallback(NetworkCallback)} API.
1560 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1561 * throw {@code UnsupportedOperationException} if called.
1562 * @removed
1563 */
1564 @Deprecated
1565 public int stopUsingNetworkFeature(int networkType, String feature) {
1566 checkLegacyRoutingApiAccess();
1567 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1568 if (netCap == null) {
1569 Log.d(TAG, "Can't satisfy stopUsingNetworkFeature for " + networkType + ", " +
1570 feature);
1571 return -1;
1572 }
1573
1574 if (removeRequestForFeature(netCap)) {
1575 Log.d(TAG, "stopUsingNetworkFeature for " + networkType + ", " + feature);
1576 }
1577 return 1;
1578 }
1579
1580 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1581 private NetworkCapabilities networkCapabilitiesForFeature(int networkType, String feature) {
1582 if (networkType == TYPE_MOBILE) {
1583 switch (feature) {
1584 case "enableCBS":
1585 return networkCapabilitiesForType(TYPE_MOBILE_CBS);
1586 case "enableDUN":
1587 case "enableDUNAlways":
1588 return networkCapabilitiesForType(TYPE_MOBILE_DUN);
1589 case "enableFOTA":
1590 return networkCapabilitiesForType(TYPE_MOBILE_FOTA);
1591 case "enableHIPRI":
1592 return networkCapabilitiesForType(TYPE_MOBILE_HIPRI);
1593 case "enableIMS":
1594 return networkCapabilitiesForType(TYPE_MOBILE_IMS);
1595 case "enableMMS":
1596 return networkCapabilitiesForType(TYPE_MOBILE_MMS);
1597 case "enableSUPL":
1598 return networkCapabilitiesForType(TYPE_MOBILE_SUPL);
1599 default:
1600 return null;
1601 }
1602 } else if (networkType == TYPE_WIFI && "p2p".equals(feature)) {
1603 return networkCapabilitiesForType(TYPE_WIFI_P2P);
1604 }
1605 return null;
1606 }
1607
1608 private int legacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1609 if (netCap == null) return TYPE_NONE;
1610 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1611 return TYPE_MOBILE_CBS;
1612 }
1613 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1614 return TYPE_MOBILE_IMS;
1615 }
1616 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1617 return TYPE_MOBILE_FOTA;
1618 }
1619 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1620 return TYPE_MOBILE_DUN;
1621 }
1622 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1623 return TYPE_MOBILE_SUPL;
1624 }
1625 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1626 return TYPE_MOBILE_MMS;
1627 }
1628 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1629 return TYPE_MOBILE_HIPRI;
1630 }
1631 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P)) {
1632 return TYPE_WIFI_P2P;
1633 }
1634 return TYPE_NONE;
1635 }
1636
1637 private static class LegacyRequest {
1638 NetworkCapabilities networkCapabilities;
1639 NetworkRequest networkRequest;
1640 int expireSequenceNumber;
1641 Network currentNetwork;
1642 int delay = -1;
1643
1644 private void clearDnsBinding() {
1645 if (currentNetwork != null) {
1646 currentNetwork = null;
1647 setProcessDefaultNetworkForHostResolution(null);
1648 }
1649 }
1650
1651 NetworkCallback networkCallback = new NetworkCallback() {
1652 @Override
1653 public void onAvailable(Network network) {
1654 currentNetwork = network;
1655 Log.d(TAG, "startUsingNetworkFeature got Network:" + network);
1656 setProcessDefaultNetworkForHostResolution(network);
1657 }
1658 @Override
1659 public void onLost(Network network) {
1660 if (network.equals(currentNetwork)) clearDnsBinding();
1661 Log.d(TAG, "startUsingNetworkFeature lost Network:" + network);
1662 }
1663 };
1664 }
1665
1666 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1667 private static final HashMap<NetworkCapabilities, LegacyRequest> sLegacyRequests =
1668 new HashMap<>();
1669
1670 private NetworkRequest findRequestForFeature(NetworkCapabilities netCap) {
1671 synchronized (sLegacyRequests) {
1672 LegacyRequest l = sLegacyRequests.get(netCap);
1673 if (l != null) return l.networkRequest;
1674 }
1675 return null;
1676 }
1677
1678 private void renewRequestLocked(LegacyRequest l) {
1679 l.expireSequenceNumber++;
1680 Log.d(TAG, "renewing request to seqNum " + l.expireSequenceNumber);
1681 sendExpireMsgForFeature(l.networkCapabilities, l.expireSequenceNumber, l.delay);
1682 }
1683
1684 private void expireRequest(NetworkCapabilities netCap, int sequenceNum) {
1685 int ourSeqNum = -1;
1686 synchronized (sLegacyRequests) {
1687 LegacyRequest l = sLegacyRequests.get(netCap);
1688 if (l == null) return;
1689 ourSeqNum = l.expireSequenceNumber;
1690 if (l.expireSequenceNumber == sequenceNum) removeRequestForFeature(netCap);
1691 }
1692 Log.d(TAG, "expireRequest with " + ourSeqNum + ", " + sequenceNum);
1693 }
1694
1695 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1696 private NetworkRequest requestNetworkForFeatureLocked(NetworkCapabilities netCap) {
1697 int delay = -1;
1698 int type = legacyTypeForNetworkCapabilities(netCap);
1699 try {
1700 delay = mService.getRestoreDefaultNetworkDelay(type);
1701 } catch (RemoteException e) {
1702 throw e.rethrowFromSystemServer();
1703 }
1704 LegacyRequest l = new LegacyRequest();
1705 l.networkCapabilities = netCap;
1706 l.delay = delay;
1707 l.expireSequenceNumber = 0;
1708 l.networkRequest = sendRequestForNetwork(
1709 netCap, l.networkCallback, 0, REQUEST, type, getDefaultHandler());
1710 if (l.networkRequest == null) return null;
1711 sLegacyRequests.put(netCap, l);
1712 sendExpireMsgForFeature(netCap, l.expireSequenceNumber, delay);
1713 return l.networkRequest;
1714 }
1715
1716 private void sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay) {
1717 if (delay >= 0) {
1718 Log.d(TAG, "sending expire msg with seqNum " + seqNum + " and delay " + delay);
1719 CallbackHandler handler = getDefaultHandler();
1720 Message msg = handler.obtainMessage(EXPIRE_LEGACY_REQUEST, seqNum, 0, netCap);
1721 handler.sendMessageDelayed(msg, delay);
1722 }
1723 }
1724
1725 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1726 private boolean removeRequestForFeature(NetworkCapabilities netCap) {
1727 final LegacyRequest l;
1728 synchronized (sLegacyRequests) {
1729 l = sLegacyRequests.remove(netCap);
1730 }
1731 if (l == null) return false;
1732 unregisterNetworkCallback(l.networkCallback);
1733 l.clearDnsBinding();
1734 return true;
1735 }
1736
1737 private static final SparseIntArray sLegacyTypeToTransport = new SparseIntArray();
1738 static {
1739 sLegacyTypeToTransport.put(TYPE_MOBILE, NetworkCapabilities.TRANSPORT_CELLULAR);
1740 sLegacyTypeToTransport.put(TYPE_MOBILE_CBS, NetworkCapabilities.TRANSPORT_CELLULAR);
1741 sLegacyTypeToTransport.put(TYPE_MOBILE_DUN, NetworkCapabilities.TRANSPORT_CELLULAR);
1742 sLegacyTypeToTransport.put(TYPE_MOBILE_FOTA, NetworkCapabilities.TRANSPORT_CELLULAR);
1743 sLegacyTypeToTransport.put(TYPE_MOBILE_HIPRI, NetworkCapabilities.TRANSPORT_CELLULAR);
1744 sLegacyTypeToTransport.put(TYPE_MOBILE_IMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1745 sLegacyTypeToTransport.put(TYPE_MOBILE_MMS, NetworkCapabilities.TRANSPORT_CELLULAR);
1746 sLegacyTypeToTransport.put(TYPE_MOBILE_SUPL, NetworkCapabilities.TRANSPORT_CELLULAR);
1747 sLegacyTypeToTransport.put(TYPE_WIFI, NetworkCapabilities.TRANSPORT_WIFI);
1748 sLegacyTypeToTransport.put(TYPE_WIFI_P2P, NetworkCapabilities.TRANSPORT_WIFI);
1749 sLegacyTypeToTransport.put(TYPE_BLUETOOTH, NetworkCapabilities.TRANSPORT_BLUETOOTH);
1750 sLegacyTypeToTransport.put(TYPE_ETHERNET, NetworkCapabilities.TRANSPORT_ETHERNET);
1751 }
1752
1753 private static final SparseIntArray sLegacyTypeToCapability = new SparseIntArray();
1754 static {
1755 sLegacyTypeToCapability.put(TYPE_MOBILE_CBS, NetworkCapabilities.NET_CAPABILITY_CBS);
1756 sLegacyTypeToCapability.put(TYPE_MOBILE_DUN, NetworkCapabilities.NET_CAPABILITY_DUN);
1757 sLegacyTypeToCapability.put(TYPE_MOBILE_FOTA, NetworkCapabilities.NET_CAPABILITY_FOTA);
1758 sLegacyTypeToCapability.put(TYPE_MOBILE_IMS, NetworkCapabilities.NET_CAPABILITY_IMS);
1759 sLegacyTypeToCapability.put(TYPE_MOBILE_MMS, NetworkCapabilities.NET_CAPABILITY_MMS);
1760 sLegacyTypeToCapability.put(TYPE_MOBILE_SUPL, NetworkCapabilities.NET_CAPABILITY_SUPL);
1761 sLegacyTypeToCapability.put(TYPE_WIFI_P2P, NetworkCapabilities.NET_CAPABILITY_WIFI_P2P);
1762 }
1763
1764 /**
1765 * Given a legacy type (TYPE_WIFI, ...) returns a NetworkCapabilities
1766 * instance suitable for registering a request or callback. Throws an
1767 * IllegalArgumentException if no mapping from the legacy type to
1768 * NetworkCapabilities is known.
1769 *
1770 * @deprecated Types are deprecated. Use {@link NetworkCallback} or {@link NetworkRequest}
1771 * to find the network instead.
1772 * @hide
1773 */
1774 public static NetworkCapabilities networkCapabilitiesForType(int type) {
1775 final NetworkCapabilities nc = new NetworkCapabilities();
1776
1777 // Map from type to transports.
1778 final int NOT_FOUND = -1;
1779 final int transport = sLegacyTypeToTransport.get(type, NOT_FOUND);
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00001780 if (transport == NOT_FOUND) {
1781 throw new IllegalArgumentException("unknown legacy type: " + type);
1782 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001783 nc.addTransportType(transport);
1784
1785 // Map from type to capabilities.
1786 nc.addCapability(sLegacyTypeToCapability.get(
1787 type, NetworkCapabilities.NET_CAPABILITY_INTERNET));
1788 nc.maybeMarkCapabilitiesRestricted();
1789 return nc;
1790 }
1791
1792 /** @hide */
1793 public static class PacketKeepaliveCallback {
1794 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1795 public PacketKeepaliveCallback() {
1796 }
1797 /** The requested keepalive was successfully started. */
1798 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1799 public void onStarted() {}
1800 /** The keepalive was successfully stopped. */
1801 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1802 public void onStopped() {}
1803 /** An error occurred. */
1804 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1805 public void onError(int error) {}
1806 }
1807
1808 /**
1809 * Allows applications to request that the system periodically send specific packets on their
1810 * behalf, using hardware offload to save battery power.
1811 *
1812 * To request that the system send keepalives, call one of the methods that return a
1813 * {@link ConnectivityManager.PacketKeepalive} object, such as {@link #startNattKeepalive},
1814 * passing in a non-null callback. If the callback is successfully started, the callback's
1815 * {@code onStarted} method will be called. If an error occurs, {@code onError} will be called,
1816 * specifying one of the {@code ERROR_*} constants in this class.
1817 *
1818 * To stop an existing keepalive, call {@link PacketKeepalive#stop}. The system will call
1819 * {@link PacketKeepaliveCallback#onStopped} if the operation was successful or
1820 * {@link PacketKeepaliveCallback#onError} if an error occurred.
1821 *
1822 * @deprecated Use {@link SocketKeepalive} instead.
1823 *
1824 * @hide
1825 */
1826 public class PacketKeepalive {
1827
1828 private static final String TAG = "PacketKeepalive";
1829
1830 /** @hide */
1831 public static final int SUCCESS = 0;
1832
1833 /** @hide */
1834 public static final int NO_KEEPALIVE = -1;
1835
1836 /** @hide */
1837 public static final int BINDER_DIED = -10;
1838
1839 /** The specified {@code Network} is not connected. */
1840 public static final int ERROR_INVALID_NETWORK = -20;
1841 /** The specified IP addresses are invalid. For example, the specified source IP address is
1842 * not configured on the specified {@code Network}. */
1843 public static final int ERROR_INVALID_IP_ADDRESS = -21;
1844 /** The requested port is invalid. */
1845 public static final int ERROR_INVALID_PORT = -22;
1846 /** The packet length is invalid (e.g., too long). */
1847 public static final int ERROR_INVALID_LENGTH = -23;
1848 /** The packet transmission interval is invalid (e.g., too short). */
1849 public static final int ERROR_INVALID_INTERVAL = -24;
1850
1851 /** The hardware does not support this request. */
1852 public static final int ERROR_HARDWARE_UNSUPPORTED = -30;
1853 /** The hardware returned an error. */
1854 public static final int ERROR_HARDWARE_ERROR = -31;
1855
1856 /** The NAT-T destination port for IPsec */
1857 public static final int NATT_PORT = 4500;
1858
1859 /** The minimum interval in seconds between keepalive packet transmissions */
1860 public static final int MIN_INTERVAL = 10;
1861
1862 private final Network mNetwork;
1863 private final ISocketKeepaliveCallback mCallback;
1864 private final ExecutorService mExecutor;
1865
1866 private volatile Integer mSlot;
1867
1868 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1869 public void stop() {
1870 try {
1871 mExecutor.execute(() -> {
1872 try {
1873 if (mSlot != null) {
1874 mService.stopKeepalive(mNetwork, mSlot);
1875 }
1876 } catch (RemoteException e) {
1877 Log.e(TAG, "Error stopping packet keepalive: ", e);
1878 throw e.rethrowFromSystemServer();
1879 }
1880 });
1881 } catch (RejectedExecutionException e) {
1882 // The internal executor has already stopped due to previous event.
1883 }
1884 }
1885
1886 private PacketKeepalive(Network network, PacketKeepaliveCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00001887 Objects.requireNonNull(network, "network cannot be null");
1888 Objects.requireNonNull(callback, "callback cannot be null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001889 mNetwork = network;
1890 mExecutor = Executors.newSingleThreadExecutor();
1891 mCallback = new ISocketKeepaliveCallback.Stub() {
1892 @Override
1893 public void onStarted(int slot) {
1894 final long token = Binder.clearCallingIdentity();
1895 try {
1896 mExecutor.execute(() -> {
1897 mSlot = slot;
1898 callback.onStarted();
1899 });
1900 } finally {
1901 Binder.restoreCallingIdentity(token);
1902 }
1903 }
1904
1905 @Override
1906 public void onStopped() {
1907 final long token = Binder.clearCallingIdentity();
1908 try {
1909 mExecutor.execute(() -> {
1910 mSlot = null;
1911 callback.onStopped();
1912 });
1913 } finally {
1914 Binder.restoreCallingIdentity(token);
1915 }
1916 mExecutor.shutdown();
1917 }
1918
1919 @Override
1920 public void onError(int error) {
1921 final long token = Binder.clearCallingIdentity();
1922 try {
1923 mExecutor.execute(() -> {
1924 mSlot = null;
1925 callback.onError(error);
1926 });
1927 } finally {
1928 Binder.restoreCallingIdentity(token);
1929 }
1930 mExecutor.shutdown();
1931 }
1932
1933 @Override
1934 public void onDataReceived() {
1935 // PacketKeepalive is only used for Nat-T keepalive and as such does not invoke
1936 // this callback when data is received.
1937 }
1938 };
1939 }
1940 }
1941
1942 /**
1943 * Starts an IPsec NAT-T keepalive packet with the specified parameters.
1944 *
1945 * @deprecated Use {@link #createSocketKeepalive} instead.
1946 *
1947 * @hide
1948 */
1949 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1950 public PacketKeepalive startNattKeepalive(
1951 Network network, int intervalSeconds, PacketKeepaliveCallback callback,
1952 InetAddress srcAddr, int srcPort, InetAddress dstAddr) {
1953 final PacketKeepalive k = new PacketKeepalive(network, callback);
1954 try {
1955 mService.startNattKeepalive(network, intervalSeconds, k.mCallback,
1956 srcAddr.getHostAddress(), srcPort, dstAddr.getHostAddress());
1957 } catch (RemoteException e) {
1958 Log.e(TAG, "Error starting packet keepalive: ", e);
1959 throw e.rethrowFromSystemServer();
1960 }
1961 return k;
1962 }
1963
1964 // Construct an invalid fd.
1965 private ParcelFileDescriptor createInvalidFd() {
1966 final int invalidFd = -1;
1967 return ParcelFileDescriptor.adoptFd(invalidFd);
1968 }
1969
1970 /**
1971 * Request that keepalives be started on a IPsec NAT-T socket.
1972 *
1973 * @param network The {@link Network} the socket is on.
1974 * @param socket The socket that needs to be kept alive.
1975 * @param source The source address of the {@link UdpEncapsulationSocket}.
1976 * @param destination The destination address of the {@link UdpEncapsulationSocket}.
1977 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
1978 * must run callback sequentially, otherwise the order of callbacks cannot be
1979 * guaranteed.
1980 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
1981 * changes. Must be extended by applications that use this API.
1982 *
1983 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
1984 * given socket.
1985 **/
1986 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
1987 @NonNull UdpEncapsulationSocket socket,
1988 @NonNull InetAddress source,
1989 @NonNull InetAddress destination,
1990 @NonNull @CallbackExecutor Executor executor,
1991 @NonNull Callback callback) {
1992 ParcelFileDescriptor dup;
1993 try {
1994 // Dup is needed here as the pfd inside the socket is owned by the IpSecService,
1995 // which cannot be obtained by the app process.
1996 dup = ParcelFileDescriptor.dup(socket.getFileDescriptor());
1997 } catch (IOException ignored) {
1998 // Construct an invalid fd, so that if the user later calls start(), it will fail with
1999 // ERROR_INVALID_SOCKET.
2000 dup = createInvalidFd();
2001 }
2002 return new NattSocketKeepalive(mService, network, dup, socket.getResourceId(), source,
2003 destination, executor, callback);
2004 }
2005
2006 /**
2007 * Request that keepalives be started on a IPsec NAT-T socket file descriptor. Directly called
2008 * by system apps which don't use IpSecService to create {@link UdpEncapsulationSocket}.
2009 *
2010 * @param network The {@link Network} the socket is on.
2011 * @param pfd The {@link ParcelFileDescriptor} that needs to be kept alive. The provided
2012 * {@link ParcelFileDescriptor} must be bound to a port and the keepalives will be sent
2013 * from that port.
2014 * @param source The source address of the {@link UdpEncapsulationSocket}.
2015 * @param destination The destination address of the {@link UdpEncapsulationSocket}. The
2016 * keepalive packets will always be sent to port 4500 of the given {@code destination}.
2017 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
2018 * must run callback sequentially, otherwise the order of callbacks cannot be
2019 * guaranteed.
2020 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2021 * changes. Must be extended by applications that use this API.
2022 *
2023 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2024 * given socket.
2025 * @hide
2026 */
2027 @SystemApi
2028 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2029 public @NonNull SocketKeepalive createNattKeepalive(@NonNull Network network,
2030 @NonNull ParcelFileDescriptor pfd,
2031 @NonNull InetAddress source,
2032 @NonNull InetAddress destination,
2033 @NonNull @CallbackExecutor Executor executor,
2034 @NonNull Callback callback) {
2035 ParcelFileDescriptor dup;
2036 try {
2037 // TODO: Consider remove unnecessary dup.
2038 dup = pfd.dup();
2039 } catch (IOException ignored) {
2040 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2041 // ERROR_INVALID_SOCKET.
2042 dup = createInvalidFd();
2043 }
2044 return new NattSocketKeepalive(mService, network, dup,
Remi NGUYEN VANa29be5c2021-03-11 10:56:49 +00002045 -1 /* Unused */, source, destination, executor, callback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002046 }
2047
2048 /**
2049 * Request that keepalives be started on a TCP socket.
2050 * The socket must be established.
2051 *
2052 * @param network The {@link Network} the socket is on.
2053 * @param socket The socket that needs to be kept alive.
2054 * @param executor The executor on which callback will be invoked. This implementation assumes
2055 * the provided {@link Executor} runs the callbacks in sequence with no
2056 * concurrency. Failing this, no guarantee of correctness can be made. It is
2057 * the responsibility of the caller to ensure the executor provides this
2058 * guarantee. A simple way of creating such an executor is with the standard
2059 * tool {@code Executors.newSingleThreadExecutor}.
2060 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2061 * changes. Must be extended by applications that use this API.
2062 *
2063 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2064 * given socket.
2065 * @hide
2066 */
2067 @SystemApi
2068 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2069 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
2070 @NonNull Socket socket,
2071 @NonNull Executor executor,
2072 @NonNull Callback callback) {
2073 ParcelFileDescriptor dup;
2074 try {
2075 dup = ParcelFileDescriptor.fromSocket(socket);
2076 } catch (UncheckedIOException ignored) {
2077 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2078 // ERROR_INVALID_SOCKET.
2079 dup = createInvalidFd();
2080 }
2081 return new TcpSocketKeepalive(mService, network, dup, executor, callback);
2082 }
2083
2084 /**
2085 * Ensure that a network route exists to deliver traffic to the specified
2086 * host via the specified network interface. An attempt to add a route that
2087 * already exists is ignored, but treated as successful.
2088 *
2089 * <p>This method requires the caller to hold either the
2090 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2091 * or the ability to modify system settings as determined by
2092 * {@link android.provider.Settings.System#canWrite}.</p>
2093 *
2094 * @param networkType the type of the network over which traffic to the specified
2095 * host is to be routed
2096 * @param hostAddress the IP address of the host to which the route is desired
2097 * @return {@code true} on success, {@code false} on failure
2098 *
2099 * @deprecated Deprecated in favor of the
2100 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
2101 * {@link #bindProcessToNetwork} and {@link Network#getSocketFactory} API.
2102 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
2103 * throw {@code UnsupportedOperationException} if called.
2104 * @removed
2105 */
2106 @Deprecated
2107 public boolean requestRouteToHost(int networkType, int hostAddress) {
2108 return requestRouteToHostAddress(networkType, NetworkUtils.intToInetAddress(hostAddress));
2109 }
2110
2111 /**
2112 * Ensure that a network route exists to deliver traffic to the specified
2113 * host via the specified network interface. An attempt to add a route that
2114 * already exists is ignored, but treated as successful.
2115 *
2116 * <p>This method requires the caller to hold either the
2117 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2118 * or the ability to modify system settings as determined by
2119 * {@link android.provider.Settings.System#canWrite}.</p>
2120 *
2121 * @param networkType the type of the network over which traffic to the specified
2122 * host is to be routed
2123 * @param hostAddress the IP address of the host to which the route is desired
2124 * @return {@code true} on success, {@code false} on failure
2125 * @hide
2126 * @deprecated Deprecated in favor of the {@link #requestNetwork} and
2127 * {@link #bindProcessToNetwork} API.
2128 */
2129 @Deprecated
2130 @UnsupportedAppUsage
2131 public boolean requestRouteToHostAddress(int networkType, InetAddress hostAddress) {
2132 checkLegacyRoutingApiAccess();
2133 try {
2134 return mService.requestRouteToHostAddress(networkType, hostAddress.getAddress(),
2135 mContext.getOpPackageName(), getAttributionTag());
2136 } catch (RemoteException e) {
2137 throw e.rethrowFromSystemServer();
2138 }
2139 }
2140
2141 /**
2142 * @return the context's attribution tag
2143 */
2144 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2145 private @Nullable String getAttributionTag() {
Remi NGUYEN VANa522fc22021-02-01 10:25:24 +00002146 return mContext.getAttributionTag();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002147 }
2148
2149 /**
2150 * Returns the value of the setting for background data usage. If false,
2151 * applications should not use the network if the application is not in the
2152 * foreground. Developers should respect this setting, and check the value
2153 * of this before performing any background data operations.
2154 * <p>
2155 * All applications that have background services that use the network
2156 * should listen to {@link #ACTION_BACKGROUND_DATA_SETTING_CHANGED}.
2157 * <p>
2158 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability of
2159 * background data depends on several combined factors, and this method will
2160 * always return {@code true}. Instead, when background data is unavailable,
2161 * {@link #getActiveNetworkInfo()} will now appear disconnected.
2162 *
2163 * @return Whether background data usage is allowed.
2164 */
2165 @Deprecated
2166 public boolean getBackgroundDataSetting() {
2167 // assume that background data is allowed; final authority is
2168 // NetworkInfo which may be blocked.
2169 return true;
2170 }
2171
2172 /**
2173 * Sets the value of the setting for background data usage.
2174 *
2175 * @param allowBackgroundData Whether an application should use data while
2176 * it is in the background.
2177 *
2178 * @attr ref android.Manifest.permission#CHANGE_BACKGROUND_DATA_SETTING
2179 * @see #getBackgroundDataSetting()
2180 * @hide
2181 */
2182 @Deprecated
2183 @UnsupportedAppUsage
2184 public void setBackgroundDataSetting(boolean allowBackgroundData) {
2185 // ignored
2186 }
2187
2188 /**
2189 * @hide
2190 * @deprecated Talk to TelephonyManager directly
2191 */
2192 @Deprecated
2193 @UnsupportedAppUsage
2194 public boolean getMobileDataEnabled() {
2195 TelephonyManager tm = mContext.getSystemService(TelephonyManager.class);
2196 if (tm != null) {
2197 int subId = SubscriptionManager.getDefaultDataSubscriptionId();
2198 Log.d("ConnectivityManager", "getMobileDataEnabled()+ subId=" + subId);
2199 boolean retVal = tm.createForSubscriptionId(subId).isDataEnabled();
2200 Log.d("ConnectivityManager", "getMobileDataEnabled()- subId=" + subId
2201 + " retVal=" + retVal);
2202 return retVal;
2203 }
2204 Log.d("ConnectivityManager", "getMobileDataEnabled()- remote exception retVal=false");
2205 return false;
2206 }
2207
2208 /**
2209 * Callback for use with {@link ConnectivityManager#addDefaultNetworkActiveListener}
2210 * to find out when the system default network has gone in to a high power state.
2211 */
2212 public interface OnNetworkActiveListener {
2213 /**
2214 * Called on the main thread of the process to report that the current data network
2215 * has become active, and it is now a good time to perform any pending network
2216 * operations. Note that this listener only tells you when the network becomes
2217 * active; if at any other time you want to know whether it is active (and thus okay
2218 * to initiate network traffic), you can retrieve its instantaneous state with
2219 * {@link ConnectivityManager#isDefaultNetworkActive}.
2220 */
2221 void onNetworkActive();
2222 }
2223
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002224 private final ArrayMap<OnNetworkActiveListener, INetworkActivityListener>
2225 mNetworkActivityListeners = new ArrayMap<>();
2226
2227 /**
2228 * Start listening to reports when the system's default data network is active, meaning it is
2229 * a good time to perform network traffic. Use {@link #isDefaultNetworkActive()}
2230 * to determine the current state of the system's default network after registering the
2231 * listener.
2232 * <p>
2233 * If the process default network has been set with
2234 * {@link ConnectivityManager#bindProcessToNetwork} this function will not
2235 * reflect the process's default, but the system default.
2236 *
2237 * @param l The listener to be told when the network is active.
2238 */
2239 public void addDefaultNetworkActiveListener(final OnNetworkActiveListener l) {
2240 INetworkActivityListener rl = new INetworkActivityListener.Stub() {
2241 @Override
2242 public void onNetworkActive() throws RemoteException {
2243 l.onNetworkActive();
2244 }
2245 };
2246
2247 try {
lucaslin709eb842021-01-21 02:04:15 +08002248 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002249 mNetworkActivityListeners.put(l, rl);
2250 } catch (RemoteException e) {
2251 throw e.rethrowFromSystemServer();
2252 }
2253 }
2254
2255 /**
2256 * Remove network active listener previously registered with
2257 * {@link #addDefaultNetworkActiveListener}.
2258 *
2259 * @param l Previously registered listener.
2260 */
2261 public void removeDefaultNetworkActiveListener(@NonNull OnNetworkActiveListener l) {
2262 INetworkActivityListener rl = mNetworkActivityListeners.get(l);
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002263 if (rl == null) {
2264 throw new IllegalArgumentException("Listener was not registered.");
2265 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002266 try {
lucaslin709eb842021-01-21 02:04:15 +08002267 mService.registerNetworkActivityListener(rl);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002268 } catch (RemoteException e) {
2269 throw e.rethrowFromSystemServer();
2270 }
2271 }
2272
2273 /**
2274 * Return whether the data network is currently active. An active network means that
2275 * it is currently in a high power state for performing data transmission. On some
2276 * types of networks, it may be expensive to move and stay in such a state, so it is
2277 * more power efficient to batch network traffic together when the radio is already in
2278 * this state. This method tells you whether right now is currently a good time to
2279 * initiate network traffic, as the network is already active.
2280 */
2281 public boolean isDefaultNetworkActive() {
2282 try {
lucaslin709eb842021-01-21 02:04:15 +08002283 return mService.isDefaultNetworkActive();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002284 } catch (RemoteException e) {
2285 throw e.rethrowFromSystemServer();
2286 }
2287 }
2288
2289 /**
2290 * {@hide}
2291 */
2292 public ConnectivityManager(Context context, IConnectivityManager service) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002293 mContext = Objects.requireNonNull(context, "missing context");
2294 mService = Objects.requireNonNull(service, "missing IConnectivityManager");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002295 mTetheringManager = (TetheringManager) mContext.getSystemService(Context.TETHERING_SERVICE);
2296 sInstance = this;
2297 }
2298
2299 /** {@hide} */
2300 @UnsupportedAppUsage
2301 public static ConnectivityManager from(Context context) {
2302 return (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);
2303 }
2304
2305 /** @hide */
2306 public NetworkRequest getDefaultRequest() {
2307 try {
2308 // This is not racy as the default request is final in ConnectivityService.
2309 return mService.getDefaultRequest();
2310 } catch (RemoteException e) {
2311 throw e.rethrowFromSystemServer();
2312 }
2313 }
2314
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002315 /**
2316 * Check if the package is a allowed to write settings. This also accounts that such an access
2317 * happened.
2318 *
2319 * @return {@code true} iff the package is allowed to write settings.
2320 */
2321 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2322 private static boolean checkAndNoteWriteSettingsOperation(@NonNull Context context, int uid,
2323 @NonNull String callingPackage, @Nullable String callingAttributionTag,
2324 boolean throwException) {
2325 return Settings.checkAndNoteWriteSettingsOperation(context, uid, callingPackage,
Remi NGUYEN VANa522fc22021-02-01 10:25:24 +00002326 callingAttributionTag, throwException);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002327 }
2328
2329 /**
2330 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2331 * situations where a Context pointer is unavailable.
2332 * @hide
2333 */
2334 @Deprecated
2335 static ConnectivityManager getInstanceOrNull() {
2336 return sInstance;
2337 }
2338
2339 /**
2340 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2341 * situations where a Context pointer is unavailable.
2342 * @hide
2343 */
2344 @Deprecated
2345 @UnsupportedAppUsage
2346 private static ConnectivityManager getInstance() {
2347 if (getInstanceOrNull() == null) {
2348 throw new IllegalStateException("No ConnectivityManager yet constructed");
2349 }
2350 return getInstanceOrNull();
2351 }
2352
2353 /**
2354 * Get the set of tetherable, available interfaces. This list is limited by
2355 * device configuration and current interface existence.
2356 *
2357 * @return an array of 0 or more Strings of tetherable interface names.
2358 *
2359 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2360 * {@hide}
2361 */
2362 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2363 @UnsupportedAppUsage
2364 @Deprecated
2365 public String[] getTetherableIfaces() {
2366 return mTetheringManager.getTetherableIfaces();
2367 }
2368
2369 /**
2370 * Get the set of tethered interfaces.
2371 *
2372 * @return an array of 0 or more String of currently tethered interface names.
2373 *
2374 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2375 * {@hide}
2376 */
2377 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2378 @UnsupportedAppUsage
2379 @Deprecated
2380 public String[] getTetheredIfaces() {
2381 return mTetheringManager.getTetheredIfaces();
2382 }
2383
2384 /**
2385 * Get the set of interface names which attempted to tether but
2386 * failed. Re-attempting to tether may cause them to reset to the Tethered
2387 * state. Alternatively, causing the interface to be destroyed and recreated
2388 * may cause them to reset to the available state.
2389 * {@link ConnectivityManager#getLastTetherError} can be used to get more
2390 * information on the cause of the errors.
2391 *
2392 * @return an array of 0 or more String indicating the interface names
2393 * which failed to tether.
2394 *
2395 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2396 * {@hide}
2397 */
2398 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2399 @UnsupportedAppUsage
2400 @Deprecated
2401 public String[] getTetheringErroredIfaces() {
2402 return mTetheringManager.getTetheringErroredIfaces();
2403 }
2404
2405 /**
2406 * Get the set of tethered dhcp ranges.
2407 *
2408 * @deprecated This method is not supported.
2409 * TODO: remove this function when all of clients are removed.
2410 * {@hide}
2411 */
2412 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
2413 @Deprecated
2414 public String[] getTetheredDhcpRanges() {
2415 throw new UnsupportedOperationException("getTetheredDhcpRanges is not supported");
2416 }
2417
2418 /**
2419 * Attempt to tether the named interface. This will setup a dhcp server
2420 * on the interface, forward and NAT IP packets and forward DNS requests
2421 * to the best active upstream network interface. Note that if no upstream
2422 * IP network interface is available, dhcp will still run and traffic will be
2423 * allowed between the tethered devices and this device, though upstream net
2424 * access will of course fail until an upstream network interface becomes
2425 * active.
2426 *
2427 * <p>This method requires the caller to hold either the
2428 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2429 * or the ability to modify system settings as determined by
2430 * {@link android.provider.Settings.System#canWrite}.</p>
2431 *
2432 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2433 * and WifiStateMachine which need direct access. All other clients should use
2434 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2435 * logic.</p>
2436 *
2437 * @param iface the interface name to tether.
2438 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2439 * @deprecated Use {@link TetheringManager#startTethering} instead
2440 *
2441 * {@hide}
2442 */
2443 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2444 @Deprecated
2445 public int tether(String iface) {
2446 return mTetheringManager.tether(iface);
2447 }
2448
2449 /**
2450 * Stop tethering the named interface.
2451 *
2452 * <p>This method requires the caller to hold either the
2453 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2454 * or the ability to modify system settings as determined by
2455 * {@link android.provider.Settings.System#canWrite}.</p>
2456 *
2457 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2458 * and WifiStateMachine which need direct access. All other clients should use
2459 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2460 * logic.</p>
2461 *
2462 * @param iface the interface name to untether.
2463 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2464 *
2465 * {@hide}
2466 */
2467 @UnsupportedAppUsage
2468 @Deprecated
2469 public int untether(String iface) {
2470 return mTetheringManager.untether(iface);
2471 }
2472
2473 /**
2474 * Check if the device allows for tethering. It may be disabled via
2475 * {@code ro.tether.denied} system property, Settings.TETHER_SUPPORTED or
2476 * due to device configuration.
2477 *
2478 * <p>If this app does not have permission to use this API, it will always
2479 * return false rather than throw an exception.</p>
2480 *
2481 * <p>If the device has a hotspot provisioning app, the caller is required to hold the
2482 * {@link android.Manifest.permission.TETHER_PRIVILEGED} permission.</p>
2483 *
2484 * <p>Otherwise, this method requires the caller to hold the ability to modify system
2485 * settings as determined by {@link android.provider.Settings.System#canWrite}.</p>
2486 *
2487 * @return a boolean - {@code true} indicating Tethering is supported.
2488 *
2489 * @deprecated Use {@link TetheringEventCallback#onTetheringSupported(boolean)} instead.
2490 * {@hide}
2491 */
2492 @SystemApi
2493 @RequiresPermission(anyOf = {android.Manifest.permission.TETHER_PRIVILEGED,
2494 android.Manifest.permission.WRITE_SETTINGS})
2495 public boolean isTetheringSupported() {
2496 return mTetheringManager.isTetheringSupported();
2497 }
2498
2499 /**
2500 * Callback for use with {@link #startTethering} to find out whether tethering succeeded.
2501 *
2502 * @deprecated Use {@link TetheringManager.StartTetheringCallback} instead.
2503 * @hide
2504 */
2505 @SystemApi
2506 @Deprecated
2507 public static abstract class OnStartTetheringCallback {
2508 /**
2509 * Called when tethering has been successfully started.
2510 */
2511 public void onTetheringStarted() {}
2512
2513 /**
2514 * Called when starting tethering failed.
2515 */
2516 public void onTetheringFailed() {}
2517 }
2518
2519 /**
2520 * Convenient overload for
2521 * {@link #startTethering(int, boolean, OnStartTetheringCallback, Handler)} which passes a null
2522 * handler to run on the current thread's {@link Looper}.
2523 *
2524 * @deprecated Use {@link TetheringManager#startTethering} instead.
2525 * @hide
2526 */
2527 @SystemApi
2528 @Deprecated
2529 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2530 public void startTethering(int type, boolean showProvisioningUi,
2531 final OnStartTetheringCallback callback) {
2532 startTethering(type, showProvisioningUi, callback, null);
2533 }
2534
2535 /**
2536 * Runs tether provisioning for the given type if needed and then starts tethering if
2537 * the check succeeds. If no carrier provisioning is required for tethering, tethering is
2538 * enabled immediately. If provisioning fails, tethering will not be enabled. It also
2539 * schedules tether provisioning re-checks if appropriate.
2540 *
2541 * @param type The type of tethering to start. Must be one of
2542 * {@link ConnectivityManager.TETHERING_WIFI},
2543 * {@link ConnectivityManager.TETHERING_USB}, or
2544 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2545 * @param showProvisioningUi a boolean indicating to show the provisioning app UI if there
2546 * is one. This should be true the first time this function is called and also any time
2547 * the user can see this UI. It gives users information from their carrier about the
2548 * check failing and how they can sign up for tethering if possible.
2549 * @param callback an {@link OnStartTetheringCallback} which will be called to notify the caller
2550 * of the result of trying to tether.
2551 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
2552 *
2553 * @deprecated Use {@link TetheringManager#startTethering} instead.
2554 * @hide
2555 */
2556 @SystemApi
2557 @Deprecated
2558 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2559 public void startTethering(int type, boolean showProvisioningUi,
2560 final OnStartTetheringCallback callback, Handler handler) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002561 Objects.requireNonNull(callback, "OnStartTetheringCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002562
2563 final Executor executor = new Executor() {
2564 @Override
2565 public void execute(Runnable command) {
2566 if (handler == null) {
2567 command.run();
2568 } else {
2569 handler.post(command);
2570 }
2571 }
2572 };
2573
2574 final StartTetheringCallback tetheringCallback = new StartTetheringCallback() {
2575 @Override
2576 public void onTetheringStarted() {
2577 callback.onTetheringStarted();
2578 }
2579
2580 @Override
2581 public void onTetheringFailed(final int error) {
2582 callback.onTetheringFailed();
2583 }
2584 };
2585
2586 final TetheringRequest request = new TetheringRequest.Builder(type)
2587 .setShouldShowEntitlementUi(showProvisioningUi).build();
2588
2589 mTetheringManager.startTethering(request, executor, tetheringCallback);
2590 }
2591
2592 /**
2593 * Stops tethering for the given type. Also cancels any provisioning rechecks for that type if
2594 * applicable.
2595 *
2596 * @param type The type of tethering to stop. Must be one of
2597 * {@link ConnectivityManager.TETHERING_WIFI},
2598 * {@link ConnectivityManager.TETHERING_USB}, or
2599 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2600 *
2601 * @deprecated Use {@link TetheringManager#stopTethering} instead.
2602 * @hide
2603 */
2604 @SystemApi
2605 @Deprecated
2606 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2607 public void stopTethering(int type) {
2608 mTetheringManager.stopTethering(type);
2609 }
2610
2611 /**
2612 * Callback for use with {@link registerTetheringEventCallback} to find out tethering
2613 * upstream status.
2614 *
2615 * @deprecated Use {@link TetheringManager#OnTetheringEventCallback} instead.
2616 * @hide
2617 */
2618 @SystemApi
2619 @Deprecated
2620 public abstract static class OnTetheringEventCallback {
2621
2622 /**
2623 * Called when tethering upstream changed. This can be called multiple times and can be
2624 * called any time.
2625 *
2626 * @param network the {@link Network} of tethering upstream. Null means tethering doesn't
2627 * have any upstream.
2628 */
2629 public void onUpstreamChanged(@Nullable Network network) {}
2630 }
2631
2632 @GuardedBy("mTetheringEventCallbacks")
2633 private final ArrayMap<OnTetheringEventCallback, TetheringEventCallback>
2634 mTetheringEventCallbacks = new ArrayMap<>();
2635
2636 /**
2637 * Start listening to tethering change events. Any new added callback will receive the last
2638 * tethering status right away. If callback is registered when tethering has no upstream or
2639 * disabled, {@link OnTetheringEventCallback#onUpstreamChanged} will immediately be called
2640 * with a null argument. The same callback object cannot be registered twice.
2641 *
2642 * @param executor the executor on which callback will be invoked.
2643 * @param callback the callback to be called when tethering has change events.
2644 *
2645 * @deprecated Use {@link TetheringManager#registerTetheringEventCallback} instead.
2646 * @hide
2647 */
2648 @SystemApi
2649 @Deprecated
2650 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2651 public void registerTetheringEventCallback(
2652 @NonNull @CallbackExecutor Executor executor,
2653 @NonNull final OnTetheringEventCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002654 Objects.requireNonNull(callback, "OnTetheringEventCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002655
2656 final TetheringEventCallback tetherCallback =
2657 new TetheringEventCallback() {
2658 @Override
2659 public void onUpstreamChanged(@Nullable Network network) {
2660 callback.onUpstreamChanged(network);
2661 }
2662 };
2663
2664 synchronized (mTetheringEventCallbacks) {
2665 mTetheringEventCallbacks.put(callback, tetherCallback);
2666 mTetheringManager.registerTetheringEventCallback(executor, tetherCallback);
2667 }
2668 }
2669
2670 /**
2671 * Remove tethering event callback previously registered with
2672 * {@link #registerTetheringEventCallback}.
2673 *
2674 * @param callback previously registered callback.
2675 *
2676 * @deprecated Use {@link TetheringManager#unregisterTetheringEventCallback} instead.
2677 * @hide
2678 */
2679 @SystemApi
2680 @Deprecated
2681 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2682 public void unregisterTetheringEventCallback(
2683 @NonNull final OnTetheringEventCallback callback) {
2684 Objects.requireNonNull(callback, "The callback must be non-null");
2685 synchronized (mTetheringEventCallbacks) {
2686 final TetheringEventCallback tetherCallback =
2687 mTetheringEventCallbacks.remove(callback);
2688 mTetheringManager.unregisterTetheringEventCallback(tetherCallback);
2689 }
2690 }
2691
2692
2693 /**
2694 * Get the list of regular expressions that define any tetherable
2695 * USB network interfaces. If USB tethering is not supported by the
2696 * device, this list should be empty.
2697 *
2698 * @return an array of 0 or more regular expression Strings defining
2699 * what interfaces are considered tetherable usb interfaces.
2700 *
2701 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2702 * {@hide}
2703 */
2704 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2705 @UnsupportedAppUsage
2706 @Deprecated
2707 public String[] getTetherableUsbRegexs() {
2708 return mTetheringManager.getTetherableUsbRegexs();
2709 }
2710
2711 /**
2712 * Get the list of regular expressions that define any tetherable
2713 * Wifi network interfaces. If Wifi tethering is not supported by the
2714 * device, this list should be empty.
2715 *
2716 * @return an array of 0 or more regular expression Strings defining
2717 * what interfaces are considered tetherable wifi interfaces.
2718 *
2719 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
2720 * {@hide}
2721 */
2722 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2723 @UnsupportedAppUsage
2724 @Deprecated
2725 public String[] getTetherableWifiRegexs() {
2726 return mTetheringManager.getTetherableWifiRegexs();
2727 }
2728
2729 /**
2730 * Get the list of regular expressions that define any tetherable
2731 * Bluetooth network interfaces. If Bluetooth tethering is not supported by the
2732 * device, this list should be empty.
2733 *
2734 * @return an array of 0 or more regular expression Strings defining
2735 * what interfaces are considered tetherable bluetooth interfaces.
2736 *
2737 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged(
2738 *TetheringManager.TetheringInterfaceRegexps)} instead.
2739 * {@hide}
2740 */
2741 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2742 @UnsupportedAppUsage
2743 @Deprecated
2744 public String[] getTetherableBluetoothRegexs() {
2745 return mTetheringManager.getTetherableBluetoothRegexs();
2746 }
2747
2748 /**
2749 * Attempt to both alter the mode of USB and Tethering of USB. A
2750 * utility method to deal with some of the complexity of USB - will
2751 * attempt to switch to Rndis and subsequently tether the resulting
2752 * interface on {@code true} or turn off tethering and switch off
2753 * Rndis on {@code false}.
2754 *
2755 * <p>This method requires the caller to hold either the
2756 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2757 * or the ability to modify system settings as determined by
2758 * {@link android.provider.Settings.System#canWrite}.</p>
2759 *
2760 * @param enable a boolean - {@code true} to enable tethering
2761 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2762 * @deprecated Use {@link TetheringManager#startTethering} instead
2763 *
2764 * {@hide}
2765 */
2766 @UnsupportedAppUsage
2767 @Deprecated
2768 public int setUsbTethering(boolean enable) {
2769 return mTetheringManager.setUsbTethering(enable);
2770 }
2771
2772 /**
2773 * @deprecated Use {@link TetheringManager#TETHER_ERROR_NO_ERROR}.
2774 * {@hide}
2775 */
2776 @SystemApi
2777 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002778 public static final int TETHER_ERROR_NO_ERROR = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002779 /**
2780 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNKNOWN_IFACE}.
2781 * {@hide}
2782 */
2783 @Deprecated
2784 public static final int TETHER_ERROR_UNKNOWN_IFACE =
2785 TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2786 /**
2787 * @deprecated Use {@link TetheringManager#TETHER_ERROR_SERVICE_UNAVAIL}.
2788 * {@hide}
2789 */
2790 @Deprecated
2791 public static final int TETHER_ERROR_SERVICE_UNAVAIL =
2792 TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
2793 /**
2794 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNSUPPORTED}.
2795 * {@hide}
2796 */
2797 @Deprecated
2798 public static final int TETHER_ERROR_UNSUPPORTED = TetheringManager.TETHER_ERROR_UNSUPPORTED;
2799 /**
2800 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNAVAIL_IFACE}.
2801 * {@hide}
2802 */
2803 @Deprecated
2804 public static final int TETHER_ERROR_UNAVAIL_IFACE =
2805 TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
2806 /**
2807 * @deprecated Use {@link TetheringManager#TETHER_ERROR_INTERNAL_ERROR}.
2808 * {@hide}
2809 */
2810 @Deprecated
2811 public static final int TETHER_ERROR_MASTER_ERROR =
2812 TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
2813 /**
2814 * @deprecated Use {@link TetheringManager#TETHER_ERROR_TETHER_IFACE_ERROR}.
2815 * {@hide}
2816 */
2817 @Deprecated
2818 public static final int TETHER_ERROR_TETHER_IFACE_ERROR =
2819 TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR;
2820 /**
2821 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNTETHER_IFACE_ERROR}.
2822 * {@hide}
2823 */
2824 @Deprecated
2825 public static final int TETHER_ERROR_UNTETHER_IFACE_ERROR =
2826 TetheringManager.TETHER_ERROR_UNTETHER_IFACE_ERROR;
2827 /**
2828 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENABLE_FORWARDING_ERROR}.
2829 * {@hide}
2830 */
2831 @Deprecated
2832 public static final int TETHER_ERROR_ENABLE_NAT_ERROR =
2833 TetheringManager.TETHER_ERROR_ENABLE_FORWARDING_ERROR;
2834 /**
2835 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DISABLE_FORWARDING_ERROR}.
2836 * {@hide}
2837 */
2838 @Deprecated
2839 public static final int TETHER_ERROR_DISABLE_NAT_ERROR =
2840 TetheringManager.TETHER_ERROR_DISABLE_FORWARDING_ERROR;
2841 /**
2842 * @deprecated Use {@link TetheringManager#TETHER_ERROR_IFACE_CFG_ERROR}.
2843 * {@hide}
2844 */
2845 @Deprecated
2846 public static final int TETHER_ERROR_IFACE_CFG_ERROR =
2847 TetheringManager.TETHER_ERROR_IFACE_CFG_ERROR;
2848 /**
2849 * @deprecated Use {@link TetheringManager#TETHER_ERROR_PROVISIONING_FAILED}.
2850 * {@hide}
2851 */
2852 @SystemApi
2853 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002854 public static final int TETHER_ERROR_PROVISION_FAILED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002855 /**
2856 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DHCPSERVER_ERROR}.
2857 * {@hide}
2858 */
2859 @Deprecated
2860 public static final int TETHER_ERROR_DHCPSERVER_ERROR =
2861 TetheringManager.TETHER_ERROR_DHCPSERVER_ERROR;
2862 /**
2863 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENTITLEMENT_UNKNOWN}.
2864 * {@hide}
2865 */
2866 @SystemApi
2867 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09002868 public static final int TETHER_ERROR_ENTITLEMENT_UNKONWN = 13;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002869
2870 /**
2871 * Get a more detailed error code after a Tethering or Untethering
2872 * request asynchronously failed.
2873 *
2874 * @param iface The name of the interface of interest
2875 * @return error The error code of the last error tethering or untethering the named
2876 * interface
2877 *
2878 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2879 * {@hide}
2880 */
2881 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2882 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2883 @Deprecated
2884 public int getLastTetherError(String iface) {
2885 int error = mTetheringManager.getLastTetherError(iface);
2886 if (error == TetheringManager.TETHER_ERROR_UNKNOWN_TYPE) {
2887 // TETHER_ERROR_UNKNOWN_TYPE was introduced with TetheringManager and has never been
2888 // returned by ConnectivityManager. Convert it to the legacy TETHER_ERROR_UNKNOWN_IFACE
2889 // instead.
2890 error = TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
2891 }
2892 return error;
2893 }
2894
2895 /** @hide */
2896 @Retention(RetentionPolicy.SOURCE)
2897 @IntDef(value = {
2898 TETHER_ERROR_NO_ERROR,
2899 TETHER_ERROR_PROVISION_FAILED,
2900 TETHER_ERROR_ENTITLEMENT_UNKONWN,
2901 })
2902 public @interface EntitlementResultCode {
2903 }
2904
2905 /**
2906 * Callback for use with {@link #getLatestTetheringEntitlementResult} to find out whether
2907 * entitlement succeeded.
2908 *
2909 * @deprecated Use {@link TetheringManager#OnTetheringEntitlementResultListener} instead.
2910 * @hide
2911 */
2912 @SystemApi
2913 @Deprecated
2914 public interface OnTetheringEntitlementResultListener {
2915 /**
2916 * Called to notify entitlement result.
2917 *
2918 * @param resultCode an int value of entitlement result. It may be one of
2919 * {@link #TETHER_ERROR_NO_ERROR},
2920 * {@link #TETHER_ERROR_PROVISION_FAILED}, or
2921 * {@link #TETHER_ERROR_ENTITLEMENT_UNKONWN}.
2922 */
2923 void onTetheringEntitlementResult(@EntitlementResultCode int resultCode);
2924 }
2925
2926 /**
2927 * Get the last value of the entitlement check on this downstream. If the cached value is
2928 * {@link #TETHER_ERROR_NO_ERROR} or showEntitlementUi argument is false, it just return the
2929 * cached value. Otherwise, a UI-based entitlement check would be performed. It is not
2930 * guaranteed that the UI-based entitlement check will complete in any specific time period
2931 * and may in fact never complete. Any successful entitlement check the platform performs for
2932 * any reason will update the cached value.
2933 *
2934 * @param type the downstream type of tethering. Must be one of
2935 * {@link #TETHERING_WIFI},
2936 * {@link #TETHERING_USB}, or
2937 * {@link #TETHERING_BLUETOOTH}.
2938 * @param showEntitlementUi a boolean indicating whether to run UI-based entitlement check.
2939 * @param executor the executor on which callback will be invoked.
2940 * @param listener an {@link OnTetheringEntitlementResultListener} which will be called to
2941 * notify the caller of the result of entitlement check. The listener may be called zero
2942 * or one time.
2943 * @deprecated Use {@link TetheringManager#requestLatestTetheringEntitlementResult} instead.
2944 * {@hide}
2945 */
2946 @SystemApi
2947 @Deprecated
2948 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2949 public void getLatestTetheringEntitlementResult(int type, boolean showEntitlementUi,
2950 @NonNull @CallbackExecutor Executor executor,
2951 @NonNull final OnTetheringEntitlementResultListener listener) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002952 Objects.requireNonNull(listener, "TetheringEntitlementResultListener cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002953 ResultReceiver wrappedListener = new ResultReceiver(null) {
2954 @Override
2955 protected void onReceiveResult(int resultCode, Bundle resultData) {
lucaslineaff72d2021-03-04 09:38:21 +08002956 final long token = Binder.clearCallingIdentity();
2957 try {
2958 executor.execute(() -> {
2959 listener.onTetheringEntitlementResult(resultCode);
2960 });
2961 } finally {
2962 Binder.restoreCallingIdentity(token);
2963 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002964 }
2965 };
2966
2967 mTetheringManager.requestLatestTetheringEntitlementResult(type, wrappedListener,
2968 showEntitlementUi);
2969 }
2970
2971 /**
2972 * Report network connectivity status. This is currently used only
2973 * to alter status bar UI.
2974 * <p>This method requires the caller to hold the permission
2975 * {@link android.Manifest.permission#STATUS_BAR}.
2976 *
2977 * @param networkType The type of network you want to report on
2978 * @param percentage The quality of the connection 0 is bad, 100 is good
2979 * @deprecated Types are deprecated. Use {@link #reportNetworkConnectivity} instead.
2980 * {@hide}
2981 */
2982 public void reportInetCondition(int networkType, int percentage) {
2983 printStackTrace();
2984 try {
2985 mService.reportInetCondition(networkType, percentage);
2986 } catch (RemoteException e) {
2987 throw e.rethrowFromSystemServer();
2988 }
2989 }
2990
2991 /**
2992 * Report a problem network to the framework. This provides a hint to the system
2993 * that there might be connectivity problems on this network and may cause
2994 * the framework to re-evaluate network connectivity and/or switch to another
2995 * network.
2996 *
2997 * @param network The {@link Network} the application was attempting to use
2998 * or {@code null} to indicate the current default network.
2999 * @deprecated Use {@link #reportNetworkConnectivity} which allows reporting both
3000 * working and non-working connectivity.
3001 */
3002 @Deprecated
3003 public void reportBadNetwork(@Nullable Network network) {
3004 printStackTrace();
3005 try {
3006 // One of these will be ignored because it matches system's current state.
3007 // The other will trigger the necessary reevaluation.
3008 mService.reportNetworkConnectivity(network, true);
3009 mService.reportNetworkConnectivity(network, false);
3010 } catch (RemoteException e) {
3011 throw e.rethrowFromSystemServer();
3012 }
3013 }
3014
3015 /**
3016 * Report to the framework whether a network has working connectivity.
3017 * This provides a hint to the system that a particular network is providing
3018 * working connectivity or not. In response the framework may re-evaluate
3019 * the network's connectivity and might take further action thereafter.
3020 *
3021 * @param network The {@link Network} the application was attempting to use
3022 * or {@code null} to indicate the current default network.
3023 * @param hasConnectivity {@code true} if the application was able to successfully access the
3024 * Internet using {@code network} or {@code false} if not.
3025 */
3026 public void reportNetworkConnectivity(@Nullable Network network, boolean hasConnectivity) {
3027 printStackTrace();
3028 try {
3029 mService.reportNetworkConnectivity(network, hasConnectivity);
3030 } catch (RemoteException e) {
3031 throw e.rethrowFromSystemServer();
3032 }
3033 }
3034
3035 /**
3036 * Set a network-independent global http proxy. This is not normally what you want
3037 * for typical HTTP proxies - they are general network dependent. However if you're
3038 * doing something unusual like general internal filtering this may be useful. On
3039 * a private network where the proxy is not accessible, you may break HTTP using this.
3040 *
3041 * @param p A {@link ProxyInfo} object defining the new global
3042 * HTTP proxy. A {@code null} value will clear the global HTTP proxy.
3043 * @hide
3044 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08003045 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003046 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
Chiachang Wangf9294e72021-03-18 09:44:34 +08003047 public void setGlobalProxy(@Nullable ProxyInfo p) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003048 try {
3049 mService.setGlobalProxy(p);
3050 } catch (RemoteException e) {
3051 throw e.rethrowFromSystemServer();
3052 }
3053 }
3054
3055 /**
3056 * Retrieve any network-independent global HTTP proxy.
3057 *
3058 * @return {@link ProxyInfo} for the current global HTTP proxy or {@code null}
3059 * if no global HTTP proxy is set.
3060 * @hide
3061 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08003062 @SystemApi(client = MODULE_LIBRARIES)
3063 @Nullable
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003064 public ProxyInfo getGlobalProxy() {
3065 try {
3066 return mService.getGlobalProxy();
3067 } catch (RemoteException e) {
3068 throw e.rethrowFromSystemServer();
3069 }
3070 }
3071
3072 /**
3073 * Retrieve the global HTTP proxy, or if no global HTTP proxy is set, a
3074 * network-specific HTTP proxy. If {@code network} is null, the
3075 * network-specific proxy returned is the proxy of the default active
3076 * network.
3077 *
3078 * @return {@link ProxyInfo} for the current global HTTP proxy, or if no
3079 * global HTTP proxy is set, {@code ProxyInfo} for {@code network},
3080 * or when {@code network} is {@code null},
3081 * the {@code ProxyInfo} for the default active network. Returns
3082 * {@code null} when no proxy applies or the caller doesn't have
3083 * permission to use {@code network}.
3084 * @hide
3085 */
3086 public ProxyInfo getProxyForNetwork(Network network) {
3087 try {
3088 return mService.getProxyForNetwork(network);
3089 } catch (RemoteException e) {
3090 throw e.rethrowFromSystemServer();
3091 }
3092 }
3093
3094 /**
3095 * Get the current default HTTP proxy settings. If a global proxy is set it will be returned,
3096 * otherwise if this process is bound to a {@link Network} using
3097 * {@link #bindProcessToNetwork} then that {@code Network}'s proxy is returned, otherwise
3098 * the default network's proxy is returned.
3099 *
3100 * @return the {@link ProxyInfo} for the current HTTP proxy, or {@code null} if no
3101 * HTTP proxy is active.
3102 */
3103 @Nullable
3104 public ProxyInfo getDefaultProxy() {
3105 return getProxyForNetwork(getBoundNetworkForProcess());
3106 }
3107
3108 /**
3109 * Returns true if the hardware supports the given network type
3110 * else it returns false. This doesn't indicate we have coverage
3111 * or are authorized onto a network, just whether or not the
3112 * hardware supports it. For example a GSM phone without a SIM
3113 * should still return {@code true} for mobile data, but a wifi only
3114 * tablet would return {@code false}.
3115 *
3116 * @param networkType The network type we'd like to check
3117 * @return {@code true} if supported, else {@code false}
3118 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
3119 * @hide
3120 */
3121 @Deprecated
3122 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3123 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
3124 public boolean isNetworkSupported(int networkType) {
3125 try {
3126 return mService.isNetworkSupported(networkType);
3127 } catch (RemoteException e) {
3128 throw e.rethrowFromSystemServer();
3129 }
3130 }
3131
3132 /**
3133 * Returns if the currently active data network is metered. A network is
3134 * classified as metered when the user is sensitive to heavy data usage on
3135 * that connection due to monetary costs, data limitations or
3136 * battery/performance issues. You should check this before doing large
3137 * data transfers, and warn the user or delay the operation until another
3138 * network is available.
3139 *
3140 * @return {@code true} if large transfers should be avoided, otherwise
3141 * {@code false}.
3142 */
3143 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3144 public boolean isActiveNetworkMetered() {
3145 try {
3146 return mService.isActiveNetworkMetered();
3147 } catch (RemoteException e) {
3148 throw e.rethrowFromSystemServer();
3149 }
3150 }
3151
3152 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003153 * Set sign in error notification to visible or invisible
3154 *
3155 * @hide
3156 * @deprecated Doesn't properly deal with multiple connected networks of the same type.
3157 */
3158 @Deprecated
3159 public void setProvisioningNotificationVisible(boolean visible, int networkType,
3160 String action) {
3161 try {
3162 mService.setProvisioningNotificationVisible(visible, networkType, action);
3163 } catch (RemoteException e) {
3164 throw e.rethrowFromSystemServer();
3165 }
3166 }
3167
3168 /**
3169 * Set the value for enabling/disabling airplane mode
3170 *
3171 * @param enable whether to enable airplane mode or not
3172 *
3173 * @hide
3174 */
3175 @RequiresPermission(anyOf = {
3176 android.Manifest.permission.NETWORK_AIRPLANE_MODE,
3177 android.Manifest.permission.NETWORK_SETTINGS,
3178 android.Manifest.permission.NETWORK_SETUP_WIZARD,
3179 android.Manifest.permission.NETWORK_STACK})
3180 @SystemApi
3181 public void setAirplaneMode(boolean enable) {
3182 try {
3183 mService.setAirplaneMode(enable);
3184 } catch (RemoteException e) {
3185 throw e.rethrowFromSystemServer();
3186 }
3187 }
3188
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003189 /**
3190 * Registers the specified {@link NetworkProvider}.
3191 * Each listener must only be registered once. The listener can be unregistered with
3192 * {@link #unregisterNetworkProvider}.
3193 *
3194 * @param provider the provider to register
3195 * @return the ID of the provider. This ID must be used by the provider when registering
3196 * {@link android.net.NetworkAgent}s.
3197 * @hide
3198 */
3199 @SystemApi
3200 @RequiresPermission(anyOf = {
3201 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3202 android.Manifest.permission.NETWORK_FACTORY})
3203 public int registerNetworkProvider(@NonNull NetworkProvider provider) {
3204 if (provider.getProviderId() != NetworkProvider.ID_NONE) {
3205 throw new IllegalStateException("NetworkProviders can only be registered once");
3206 }
3207
3208 try {
3209 int providerId = mService.registerNetworkProvider(provider.getMessenger(),
3210 provider.getName());
3211 provider.setProviderId(providerId);
3212 } catch (RemoteException e) {
3213 throw e.rethrowFromSystemServer();
3214 }
3215 return provider.getProviderId();
3216 }
3217
3218 /**
3219 * Unregisters the specified NetworkProvider.
3220 *
3221 * @param provider the provider to unregister
3222 * @hide
3223 */
3224 @SystemApi
3225 @RequiresPermission(anyOf = {
3226 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3227 android.Manifest.permission.NETWORK_FACTORY})
3228 public void unregisterNetworkProvider(@NonNull NetworkProvider provider) {
3229 try {
3230 mService.unregisterNetworkProvider(provider.getMessenger());
3231 } catch (RemoteException e) {
3232 throw e.rethrowFromSystemServer();
3233 }
3234 provider.setProviderId(NetworkProvider.ID_NONE);
3235 }
3236
3237
3238 /** @hide exposed via the NetworkProvider class. */
3239 @RequiresPermission(anyOf = {
3240 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3241 android.Manifest.permission.NETWORK_FACTORY})
3242 public void declareNetworkRequestUnfulfillable(@NonNull NetworkRequest request) {
3243 try {
3244 mService.declareNetworkRequestUnfulfillable(request);
3245 } catch (RemoteException e) {
3246 throw e.rethrowFromSystemServer();
3247 }
3248 }
3249
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003250 /**
3251 * @hide
3252 * Register a NetworkAgent with ConnectivityService.
3253 * @return Network corresponding to NetworkAgent.
3254 */
3255 @RequiresPermission(anyOf = {
3256 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3257 android.Manifest.permission.NETWORK_FACTORY})
3258 public Network registerNetworkAgent(INetworkAgent na, NetworkInfo ni, LinkProperties lp,
Chalard Jeand6372722020-12-21 18:36:52 +09003259 NetworkCapabilities nc, @NonNull NetworkScore score, NetworkAgentConfig config,
3260 int providerId) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003261 try {
3262 return mService.registerNetworkAgent(na, ni, lp, nc, score, config, providerId);
3263 } catch (RemoteException e) {
3264 throw e.rethrowFromSystemServer();
3265 }
3266 }
3267
3268 /**
3269 * Base class for {@code NetworkRequest} callbacks. Used for notifications about network
3270 * changes. Should be extended by applications wanting notifications.
3271 *
3272 * A {@code NetworkCallback} is registered by calling
3273 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
3274 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)},
3275 * or {@link #registerDefaultNetworkCallback(NetworkCallback)}. A {@code NetworkCallback} is
3276 * unregistered by calling {@link #unregisterNetworkCallback(NetworkCallback)}.
3277 * A {@code NetworkCallback} should be registered at most once at any time.
3278 * A {@code NetworkCallback} that has been unregistered can be registered again.
3279 */
3280 public static class NetworkCallback {
3281 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003282 * No flags associated with this callback.
3283 * @hide
3284 */
3285 public static final int FLAG_NONE = 0;
3286 /**
3287 * Use this flag to include any location sensitive data in {@link NetworkCapabilities} sent
3288 * via {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}.
3289 * <p>
3290 * These include:
3291 * <li> Some transport info instances (retrieved via
3292 * {@link NetworkCapabilities#getTransportInfo()}) like {@link android.net.wifi.WifiInfo}
3293 * contain location sensitive information.
3294 * <li> OwnerUid (retrieved via {@link NetworkCapabilities#getOwnerUid()} is location
3295 * sensitive for wifi suggestor apps (i.e using {@link WifiNetworkSuggestion}).</li>
3296 * </p>
3297 * <p>
3298 * Note:
3299 * <li> Retrieving this location sensitive information (subject to app's location
3300 * permissions) will be noted by system. </li>
3301 * <li> Without this flag any {@link NetworkCapabilities} provided via the callback does
3302 * not include location sensitive info.
3303 * </p>
3304 */
3305 public static final int FLAG_INCLUDE_LOCATION_INFO = 1 << 0;
3306
3307 /** @hide */
3308 @Retention(RetentionPolicy.SOURCE)
3309 @IntDef(flag = true, prefix = "FLAG_", value = {
3310 FLAG_NONE,
3311 FLAG_INCLUDE_LOCATION_INFO
3312 })
3313 public @interface Flag { }
3314
3315 /**
3316 * All the valid flags for error checking.
3317 */
3318 private static final int VALID_FLAGS = FLAG_INCLUDE_LOCATION_INFO;
3319
3320 public NetworkCallback() {
3321 this(FLAG_NONE);
3322 }
3323
3324 public NetworkCallback(@Flag int flags) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00003325 if ((flags & VALID_FLAGS) != flags) {
3326 throw new IllegalArgumentException("Invalid flags");
3327 }
Roshan Piuse08bc182020-12-22 15:10:42 -08003328 mFlags = flags;
3329 }
3330
3331 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003332 * Called when the framework connects to a new network to evaluate whether it satisfies this
3333 * request. If evaluation succeeds, this callback may be followed by an {@link #onAvailable}
3334 * callback. There is no guarantee that this new network will satisfy any requests, or that
3335 * the network will stay connected for longer than the time necessary to evaluate it.
3336 * <p>
3337 * Most applications <b>should not</b> act on this callback, and should instead use
3338 * {@link #onAvailable}. This callback is intended for use by applications that can assist
3339 * the framework in properly evaluating the network &mdash; for example, an application that
3340 * can automatically log in to a captive portal without user intervention.
3341 *
3342 * @param network The {@link Network} of the network that is being evaluated.
3343 *
3344 * @hide
3345 */
3346 public void onPreCheck(@NonNull Network network) {}
3347
3348 /**
3349 * Called when the framework connects and has declared a new network ready for use.
3350 * This callback may be called more than once if the {@link Network} that is
3351 * satisfying the request changes.
3352 *
3353 * @param network The {@link Network} of the satisfying network.
3354 * @param networkCapabilities The {@link NetworkCapabilities} of the satisfying network.
3355 * @param linkProperties The {@link LinkProperties} of the satisfying network.
3356 * @param blocked Whether access to the {@link Network} is blocked due to system policy.
3357 * @hide
3358 */
3359 public void onAvailable(@NonNull Network network,
3360 @NonNull NetworkCapabilities networkCapabilities,
3361 @NonNull LinkProperties linkProperties, boolean blocked) {
3362 // Internally only this method is called when a new network is available, and
3363 // it calls the callback in the same way and order that older versions used
3364 // to call so as not to change the behavior.
3365 onAvailable(network);
3366 if (!networkCapabilities.hasCapability(
3367 NetworkCapabilities.NET_CAPABILITY_NOT_SUSPENDED)) {
3368 onNetworkSuspended(network);
3369 }
3370 onCapabilitiesChanged(network, networkCapabilities);
3371 onLinkPropertiesChanged(network, linkProperties);
3372 onBlockedStatusChanged(network, blocked);
3373 }
3374
3375 /**
3376 * Called when the framework connects and has declared a new network ready for use.
3377 *
3378 * <p>For callbacks registered with {@link #registerNetworkCallback}, multiple networks may
3379 * be available at the same time, and onAvailable will be called for each of these as they
3380 * appear.
3381 *
3382 * <p>For callbacks registered with {@link #requestNetwork} and
3383 * {@link #registerDefaultNetworkCallback}, this means the network passed as an argument
3384 * is the new best network for this request and is now tracked by this callback ; this
3385 * callback will no longer receive method calls about other networks that may have been
3386 * passed to this method previously. The previously-best network may have disconnected, or
3387 * it may still be around and the newly-best network may simply be better.
3388 *
3389 * <p>Starting with {@link android.os.Build.VERSION_CODES#O}, this will always immediately
3390 * be followed by a call to {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}
3391 * then by a call to {@link #onLinkPropertiesChanged(Network, LinkProperties)}, and a call
3392 * to {@link #onBlockedStatusChanged(Network, boolean)}.
3393 *
3394 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3395 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3396 * this callback as this is prone to race conditions (there is no guarantee the objects
3397 * returned by these methods will be current). Instead, wait for a call to
3398 * {@link #onCapabilitiesChanged(Network, NetworkCapabilities)} and
3399 * {@link #onLinkPropertiesChanged(Network, LinkProperties)} whose arguments are guaranteed
3400 * to be well-ordered with respect to other callbacks.
3401 *
3402 * @param network The {@link Network} of the satisfying network.
3403 */
3404 public void onAvailable(@NonNull Network network) {}
3405
3406 /**
3407 * Called when the network is about to be lost, typically because there are no outstanding
3408 * requests left for it. This may be paired with a {@link NetworkCallback#onAvailable} call
3409 * with the new replacement network for graceful handover. This method is not guaranteed
3410 * to be called before {@link NetworkCallback#onLost} is called, for example in case a
3411 * network is suddenly disconnected.
3412 *
3413 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3414 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3415 * this callback as this is prone to race conditions ; calling these methods while in a
3416 * callback may return an outdated or even a null object.
3417 *
3418 * @param network The {@link Network} that is about to be lost.
3419 * @param maxMsToLive The time in milliseconds the system intends to keep the network
3420 * connected for graceful handover; note that the network may still
3421 * suffer a hard loss at any time.
3422 */
3423 public void onLosing(@NonNull Network network, int maxMsToLive) {}
3424
3425 /**
3426 * Called when a network disconnects or otherwise no longer satisfies this request or
3427 * callback.
3428 *
3429 * <p>If the callback was registered with requestNetwork() or
3430 * registerDefaultNetworkCallback(), it will only be invoked against the last network
3431 * returned by onAvailable() when that network is lost and no other network satisfies
3432 * the criteria of the request.
3433 *
3434 * <p>If the callback was registered with registerNetworkCallback() it will be called for
3435 * each network which no longer satisfies the criteria of the callback.
3436 *
3437 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3438 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3439 * this callback as this is prone to race conditions ; calling these methods while in a
3440 * callback may return an outdated or even a null object.
3441 *
3442 * @param network The {@link Network} lost.
3443 */
3444 public void onLost(@NonNull Network network) {}
3445
3446 /**
3447 * Called if no network is found within the timeout time specified in
3448 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} call or if the
3449 * requested network request cannot be fulfilled (whether or not a timeout was
3450 * specified). When this callback is invoked the associated
3451 * {@link NetworkRequest} will have already been removed and released, as if
3452 * {@link #unregisterNetworkCallback(NetworkCallback)} had been called.
3453 */
3454 public void onUnavailable() {}
3455
3456 /**
3457 * Called when the network corresponding to this request changes capabilities but still
3458 * satisfies the requested criteria.
3459 *
3460 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3461 * to be called immediately after {@link #onAvailable}.
3462 *
3463 * <p>Do NOT call {@link #getLinkProperties(Network)} or other synchronous
3464 * ConnectivityManager methods in this callback as this is prone to race conditions :
3465 * calling these methods while in a callback may return an outdated or even a null object.
3466 *
3467 * @param network The {@link Network} whose capabilities have changed.
Roshan Piuse08bc182020-12-22 15:10:42 -08003468 * @param networkCapabilities The new {@link NetworkCapabilities} for this
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003469 * network.
3470 */
3471 public void onCapabilitiesChanged(@NonNull Network network,
3472 @NonNull NetworkCapabilities networkCapabilities) {}
3473
3474 /**
3475 * Called when the network corresponding to this request changes {@link LinkProperties}.
3476 *
3477 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3478 * to be called immediately after {@link #onAvailable}.
3479 *
3480 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or other synchronous
3481 * ConnectivityManager methods in this callback as this is prone to race conditions :
3482 * calling these methods while in a callback may return an outdated or even a null object.
3483 *
3484 * @param network The {@link Network} whose link properties have changed.
3485 * @param linkProperties The new {@link LinkProperties} for this network.
3486 */
3487 public void onLinkPropertiesChanged(@NonNull Network network,
3488 @NonNull LinkProperties linkProperties) {}
3489
3490 /**
3491 * Called when the network the framework connected to for this request suspends data
3492 * transmission temporarily.
3493 *
3494 * <p>This generally means that while the TCP connections are still live temporarily
3495 * network data fails to transfer. To give a specific example, this is used on cellular
3496 * networks to mask temporary outages when driving through a tunnel, etc. In general this
3497 * means read operations on sockets on this network will block once the buffers are
3498 * drained, and write operations will block once the buffers are full.
3499 *
3500 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3501 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3502 * this callback as this is prone to race conditions (there is no guarantee the objects
3503 * returned by these methods will be current).
3504 *
3505 * @hide
3506 */
3507 public void onNetworkSuspended(@NonNull Network network) {}
3508
3509 /**
3510 * Called when the network the framework connected to for this request
3511 * returns from a {@link NetworkInfo.State#SUSPENDED} state. This should always be
3512 * preceded by a matching {@link NetworkCallback#onNetworkSuspended} call.
3513
3514 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3515 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3516 * this callback as this is prone to race conditions : calling these methods while in a
3517 * callback may return an outdated or even a null object.
3518 *
3519 * @hide
3520 */
3521 public void onNetworkResumed(@NonNull Network network) {}
3522
3523 /**
3524 * Called when access to the specified network is blocked or unblocked.
3525 *
3526 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3527 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3528 * this callback as this is prone to race conditions : calling these methods while in a
3529 * callback may return an outdated or even a null object.
3530 *
3531 * @param network The {@link Network} whose blocked status has changed.
3532 * @param blocked The blocked status of this {@link Network}.
3533 */
3534 public void onBlockedStatusChanged(@NonNull Network network, boolean blocked) {}
3535
3536 private NetworkRequest networkRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -08003537 private final int mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003538 }
3539
3540 /**
3541 * Constant error codes used by ConnectivityService to communicate about failures and errors
3542 * across a Binder boundary.
3543 * @hide
3544 */
3545 public interface Errors {
3546 int TOO_MANY_REQUESTS = 1;
3547 }
3548
3549 /** @hide */
3550 public static class TooManyRequestsException extends RuntimeException {}
3551
3552 private static RuntimeException convertServiceException(ServiceSpecificException e) {
3553 switch (e.errorCode) {
3554 case Errors.TOO_MANY_REQUESTS:
3555 return new TooManyRequestsException();
3556 default:
3557 Log.w(TAG, "Unknown service error code " + e.errorCode);
3558 return new RuntimeException(e);
3559 }
3560 }
3561
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003562 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003563 public static final int CALLBACK_PRECHECK = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003564 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003565 public static final int CALLBACK_AVAILABLE = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003566 /** @hide arg1 = TTL */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003567 public static final int CALLBACK_LOSING = 3;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003568 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003569 public static final int CALLBACK_LOST = 4;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003570 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003571 public static final int CALLBACK_UNAVAIL = 5;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003572 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003573 public static final int CALLBACK_CAP_CHANGED = 6;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003574 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003575 public static final int CALLBACK_IP_CHANGED = 7;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003576 /** @hide obj = NetworkCapabilities, arg1 = seq number */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003577 private static final int EXPIRE_LEGACY_REQUEST = 8;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003578 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003579 public static final int CALLBACK_SUSPENDED = 9;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003580 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003581 public static final int CALLBACK_RESUMED = 10;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003582 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09003583 public static final int CALLBACK_BLK_CHANGED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003584
3585 /** @hide */
3586 public static String getCallbackName(int whichCallback) {
3587 switch (whichCallback) {
3588 case CALLBACK_PRECHECK: return "CALLBACK_PRECHECK";
3589 case CALLBACK_AVAILABLE: return "CALLBACK_AVAILABLE";
3590 case CALLBACK_LOSING: return "CALLBACK_LOSING";
3591 case CALLBACK_LOST: return "CALLBACK_LOST";
3592 case CALLBACK_UNAVAIL: return "CALLBACK_UNAVAIL";
3593 case CALLBACK_CAP_CHANGED: return "CALLBACK_CAP_CHANGED";
3594 case CALLBACK_IP_CHANGED: return "CALLBACK_IP_CHANGED";
3595 case EXPIRE_LEGACY_REQUEST: return "EXPIRE_LEGACY_REQUEST";
3596 case CALLBACK_SUSPENDED: return "CALLBACK_SUSPENDED";
3597 case CALLBACK_RESUMED: return "CALLBACK_RESUMED";
3598 case CALLBACK_BLK_CHANGED: return "CALLBACK_BLK_CHANGED";
3599 default:
3600 return Integer.toString(whichCallback);
3601 }
3602 }
3603
3604 private class CallbackHandler extends Handler {
3605 private static final String TAG = "ConnectivityManager.CallbackHandler";
3606 private static final boolean DBG = false;
3607
3608 CallbackHandler(Looper looper) {
3609 super(looper);
3610 }
3611
3612 CallbackHandler(Handler handler) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00003613 this(Objects.requireNonNull(handler, "Handler cannot be null.").getLooper());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003614 }
3615
3616 @Override
3617 public void handleMessage(Message message) {
3618 if (message.what == EXPIRE_LEGACY_REQUEST) {
3619 expireRequest((NetworkCapabilities) message.obj, message.arg1);
3620 return;
3621 }
3622
3623 final NetworkRequest request = getObject(message, NetworkRequest.class);
3624 final Network network = getObject(message, Network.class);
3625 final NetworkCallback callback;
3626 synchronized (sCallbacks) {
3627 callback = sCallbacks.get(request);
3628 if (callback == null) {
3629 Log.w(TAG,
3630 "callback not found for " + getCallbackName(message.what) + " message");
3631 return;
3632 }
3633 if (message.what == CALLBACK_UNAVAIL) {
3634 sCallbacks.remove(request);
3635 callback.networkRequest = ALREADY_UNREGISTERED;
3636 }
3637 }
3638 if (DBG) {
3639 Log.d(TAG, getCallbackName(message.what) + " for network " + network);
3640 }
3641
3642 switch (message.what) {
3643 case CALLBACK_PRECHECK: {
3644 callback.onPreCheck(network);
3645 break;
3646 }
3647 case CALLBACK_AVAILABLE: {
3648 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3649 LinkProperties lp = getObject(message, LinkProperties.class);
3650 callback.onAvailable(network, cap, lp, message.arg1 != 0);
3651 break;
3652 }
3653 case CALLBACK_LOSING: {
3654 callback.onLosing(network, message.arg1);
3655 break;
3656 }
3657 case CALLBACK_LOST: {
3658 callback.onLost(network);
3659 break;
3660 }
3661 case CALLBACK_UNAVAIL: {
3662 callback.onUnavailable();
3663 break;
3664 }
3665 case CALLBACK_CAP_CHANGED: {
3666 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
3667 callback.onCapabilitiesChanged(network, cap);
3668 break;
3669 }
3670 case CALLBACK_IP_CHANGED: {
3671 LinkProperties lp = getObject(message, LinkProperties.class);
3672 callback.onLinkPropertiesChanged(network, lp);
3673 break;
3674 }
3675 case CALLBACK_SUSPENDED: {
3676 callback.onNetworkSuspended(network);
3677 break;
3678 }
3679 case CALLBACK_RESUMED: {
3680 callback.onNetworkResumed(network);
3681 break;
3682 }
3683 case CALLBACK_BLK_CHANGED: {
3684 boolean blocked = message.arg1 != 0;
3685 callback.onBlockedStatusChanged(network, blocked);
3686 }
3687 }
3688 }
3689
3690 private <T> T getObject(Message msg, Class<T> c) {
3691 return (T) msg.getData().getParcelable(c.getSimpleName());
3692 }
3693 }
3694
3695 private CallbackHandler getDefaultHandler() {
3696 synchronized (sCallbacks) {
3697 if (sCallbackHandler == null) {
3698 sCallbackHandler = new CallbackHandler(ConnectivityThread.getInstanceLooper());
3699 }
3700 return sCallbackHandler;
3701 }
3702 }
3703
3704 private static final HashMap<NetworkRequest, NetworkCallback> sCallbacks = new HashMap<>();
3705 private static CallbackHandler sCallbackHandler;
3706
3707 private NetworkRequest sendRequestForNetwork(NetworkCapabilities need, NetworkCallback callback,
3708 int timeoutMs, NetworkRequest.Type reqType, int legacyType, CallbackHandler handler) {
3709 printStackTrace();
3710 checkCallbackNotNull(callback);
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00003711 if (reqType != TRACK_DEFAULT && reqType != TRACK_SYSTEM_DEFAULT && need == null) {
3712 throw new IllegalArgumentException("null NetworkCapabilities");
3713 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003714 final NetworkRequest request;
3715 final String callingPackageName = mContext.getOpPackageName();
3716 try {
3717 synchronized(sCallbacks) {
3718 if (callback.networkRequest != null
3719 && callback.networkRequest != ALREADY_UNREGISTERED) {
3720 // TODO: throw exception instead and enforce 1:1 mapping of callbacks
3721 // and requests (http://b/20701525).
3722 Log.e(TAG, "NetworkCallback was already registered");
3723 }
3724 Messenger messenger = new Messenger(handler);
3725 Binder binder = new Binder();
Roshan Piuse08bc182020-12-22 15:10:42 -08003726 final int callbackFlags = callback.mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003727 if (reqType == LISTEN) {
3728 request = mService.listenForNetwork(
Roshan Piuse08bc182020-12-22 15:10:42 -08003729 need, messenger, binder, callbackFlags, callingPackageName,
Roshan Piusa8a477b2020-12-17 14:53:09 -08003730 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003731 } else {
3732 request = mService.requestNetwork(
3733 need, reqType.ordinal(), messenger, timeoutMs, binder, legacyType,
Roshan Piuse08bc182020-12-22 15:10:42 -08003734 callbackFlags, callingPackageName, getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003735 }
3736 if (request != null) {
3737 sCallbacks.put(request, callback);
3738 }
3739 callback.networkRequest = request;
3740 }
3741 } catch (RemoteException e) {
3742 throw e.rethrowFromSystemServer();
3743 } catch (ServiceSpecificException e) {
3744 throw convertServiceException(e);
3745 }
3746 return request;
3747 }
3748
3749 /**
3750 * Helper function to request a network with a particular legacy type.
3751 *
3752 * This API is only for use in internal system code that requests networks with legacy type and
3753 * relies on CONNECTIVITY_ACTION broadcasts instead of NetworkCallbacks. New caller should use
3754 * {@link #requestNetwork(NetworkRequest, NetworkCallback, Handler)} instead.
3755 *
3756 * @param request {@link NetworkRequest} describing this request.
3757 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3758 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3759 * be a positive value (i.e. >0).
3760 * @param legacyType to specify the network type(#TYPE_*).
3761 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3762 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3763 * the callback must not be shared - it uniquely specifies this request.
3764 *
3765 * @hide
3766 */
3767 @SystemApi
3768 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
3769 public void requestNetwork(@NonNull NetworkRequest request,
3770 int timeoutMs, int legacyType, @NonNull Handler handler,
3771 @NonNull NetworkCallback networkCallback) {
3772 if (legacyType == TYPE_NONE) {
3773 throw new IllegalArgumentException("TYPE_NONE is meaningless legacy type");
3774 }
3775 CallbackHandler cbHandler = new CallbackHandler(handler);
3776 NetworkCapabilities nc = request.networkCapabilities;
3777 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, legacyType, cbHandler);
3778 }
3779
3780 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003781 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003782 *
3783 * <p>This method will attempt to find the best network that matches the passed
3784 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
3785 * criteria. The platform will evaluate which network is the best at its own discretion.
3786 * Throughput, latency, cost per byte, policy, user preference and other considerations
3787 * may be factored in the decision of what is considered the best network.
3788 *
3789 * <p>As long as this request is outstanding, the platform will try to maintain the best network
3790 * matching this request, while always attempting to match the request to a better network if
3791 * possible. If a better match is found, the platform will switch this request to the now-best
3792 * network and inform the app of the newly best network by invoking
3793 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
3794 * will not try to maintain any other network than the best one currently matching the request:
3795 * a network not matching any network request may be disconnected at any time.
3796 *
3797 * <p>For example, an application could use this method to obtain a connected cellular network
3798 * even if the device currently has a data connection over Ethernet. This may cause the cellular
3799 * radio to consume additional power. Or, an application could inform the system that it wants
3800 * a network supporting sending MMSes and have the system let it know about the currently best
3801 * MMS-supporting network through the provided {@link NetworkCallback}.
3802 *
3803 * <p>The status of the request can be followed by listening to the various callbacks described
3804 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
3805 * used to direct traffic to the network (although accessing some networks may be subject to
3806 * holding specific permissions). Callers will learn about the specific characteristics of the
3807 * network through
3808 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
3809 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
3810 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
3811 * matching the request at any given time; therefore when a better network matching the request
3812 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
3813 * with the new network after which no further updates are given about the previously-best
3814 * network, unless it becomes the best again at some later time. All callbacks are invoked
3815 * in order on the same thread, which by default is a thread created by the framework running
3816 * in the app.
3817 * {@see #requestNetwork(NetworkRequest, NetworkCallback, Handler)} to change where the
3818 * callbacks are invoked.
3819 *
3820 * <p>This{@link NetworkRequest} will live until released via
3821 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
3822 * which point the system may let go of the network at any time.
3823 *
3824 * <p>A version of this method which takes a timeout is
3825 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)}, that an app can use to only
3826 * wait for a limited amount of time for the network to become unavailable.
3827 *
3828 * <p>It is presently unsupported to request a network with mutable
3829 * {@link NetworkCapabilities} such as
3830 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3831 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3832 * as these {@code NetworkCapabilities} represent states that a particular
3833 * network may never attain, and whether a network will attain these states
3834 * is unknown prior to bringing up the network so the framework does not
3835 * know how to go about satisfying a request with these capabilities.
3836 *
3837 * <p>This method requires the caller to hold either the
3838 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3839 * or the ability to modify system settings as determined by
3840 * {@link android.provider.Settings.System#canWrite}.</p>
3841 *
3842 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
3843 * number of outstanding requests to 100 per app (identified by their UID), shared with
3844 * all variants of this method, of {@link #registerNetworkCallback} as well as
3845 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
3846 * Requesting a network with this method will count toward this limit. If this limit is
3847 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
3848 * make sure to unregister the callbacks with
3849 * {@link #unregisterNetworkCallback(NetworkCallback)}.
3850 *
3851 * @param request {@link NetworkRequest} describing this request.
3852 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3853 * the callback must not be shared - it uniquely specifies this request.
3854 * The callback is invoked on the default internal Handler.
3855 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
3856 * @throws SecurityException if missing the appropriate permissions.
3857 * @throws RuntimeException if the app already has too many callbacks registered.
3858 */
3859 public void requestNetwork(@NonNull NetworkRequest request,
3860 @NonNull NetworkCallback networkCallback) {
3861 requestNetwork(request, networkCallback, getDefaultHandler());
3862 }
3863
3864 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003865 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003866 *
3867 * This method behaves identically to {@link #requestNetwork(NetworkRequest, NetworkCallback)}
3868 * but runs all the callbacks on the passed Handler.
3869 *
3870 * <p>This method has the same permission requirements as
3871 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3872 * and throws the same exceptions in the same conditions.
3873 *
3874 * @param request {@link NetworkRequest} describing this request.
3875 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3876 * the callback must not be shared - it uniquely specifies this request.
3877 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3878 */
3879 public void requestNetwork(@NonNull NetworkRequest request,
3880 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
3881 CallbackHandler cbHandler = new CallbackHandler(handler);
3882 NetworkCapabilities nc = request.networkCapabilities;
3883 sendRequestForNetwork(nc, networkCallback, 0, REQUEST, TYPE_NONE, cbHandler);
3884 }
3885
3886 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003887 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003888 * by a timeout.
3889 *
3890 * This function behaves identically to the non-timed-out version
3891 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, but if a suitable network
3892 * is not found within the given time (in milliseconds) the
3893 * {@link NetworkCallback#onUnavailable()} callback is called. The request can still be
3894 * released normally by calling {@link #unregisterNetworkCallback(NetworkCallback)} but does
3895 * not have to be released if timed-out (it is automatically released). Unregistering a
3896 * request that timed out is not an error.
3897 *
3898 * <p>Do not use this method to poll for the existence of specific networks (e.g. with a small
3899 * timeout) - {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} is provided
3900 * for that purpose. Calling this method will attempt to bring up the requested network.
3901 *
3902 * <p>This method has the same permission requirements as
3903 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3904 * and throws the same exceptions in the same conditions.
3905 *
3906 * @param request {@link NetworkRequest} describing this request.
3907 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3908 * the callback must not be shared - it uniquely specifies this request.
3909 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3910 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
3911 * be a positive value (i.e. >0).
3912 */
3913 public void requestNetwork(@NonNull NetworkRequest request,
3914 @NonNull NetworkCallback networkCallback, int timeoutMs) {
3915 checkTimeout(timeoutMs);
3916 NetworkCapabilities nc = request.networkCapabilities;
3917 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE,
3918 getDefaultHandler());
3919 }
3920
3921 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003922 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003923 * by a timeout.
3924 *
3925 * This method behaves identically to
3926 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} but runs all the callbacks
3927 * on the passed Handler.
3928 *
3929 * <p>This method has the same permission requirements as
3930 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
3931 * and throws the same exceptions in the same conditions.
3932 *
3933 * @param request {@link NetworkRequest} describing this request.
3934 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
3935 * the callback must not be shared - it uniquely specifies this request.
3936 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
3937 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
3938 * before {@link NetworkCallback#onUnavailable} is called.
3939 */
3940 public void requestNetwork(@NonNull NetworkRequest request,
3941 @NonNull NetworkCallback networkCallback, @NonNull Handler handler, int timeoutMs) {
3942 checkTimeout(timeoutMs);
3943 CallbackHandler cbHandler = new CallbackHandler(handler);
3944 NetworkCapabilities nc = request.networkCapabilities;
3945 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE, cbHandler);
3946 }
3947
3948 /**
3949 * The lookup key for a {@link Network} object included with the intent after
3950 * successfully finding a network for the applications request. Retrieve it with
3951 * {@link android.content.Intent#getParcelableExtra(String)}.
3952 * <p>
3953 * Note that if you intend to invoke {@link Network#openConnection(java.net.URL)}
3954 * then you must get a ConnectivityManager instance before doing so.
3955 */
3956 public static final String EXTRA_NETWORK = "android.net.extra.NETWORK";
3957
3958 /**
3959 * The lookup key for a {@link NetworkRequest} object included with the intent after
3960 * successfully finding a network for the applications request. Retrieve it with
3961 * {@link android.content.Intent#getParcelableExtra(String)}.
3962 */
3963 public static final String EXTRA_NETWORK_REQUEST = "android.net.extra.NETWORK_REQUEST";
3964
3965
3966 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003967 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003968 *
3969 * This function behaves identically to the version that takes a NetworkCallback, but instead
3970 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
3971 * the request may outlive the calling application and get called back when a suitable
3972 * network is found.
3973 * <p>
3974 * The operation is an Intent broadcast that goes to a broadcast receiver that
3975 * you registered with {@link Context#registerReceiver} or through the
3976 * &lt;receiver&gt; tag in an AndroidManifest.xml file
3977 * <p>
3978 * The operation Intent is delivered with two extras, a {@link Network} typed
3979 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
3980 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
3981 * the original requests parameters. It is important to create a new,
3982 * {@link NetworkCallback} based request before completing the processing of the
3983 * Intent to reserve the network or it will be released shortly after the Intent
3984 * is processed.
3985 * <p>
3986 * If there is already a request for this Intent registered (with the equality of
3987 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
3988 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
3989 * <p>
3990 * The request may be released normally by calling
3991 * {@link #releaseNetworkRequest(android.app.PendingIntent)}.
3992 * <p>It is presently unsupported to request a network with either
3993 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
3994 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
3995 * as these {@code NetworkCapabilities} represent states that a particular
3996 * network may never attain, and whether a network will attain these states
3997 * is unknown prior to bringing up the network so the framework does not
3998 * know how to go about satisfying a request with these capabilities.
3999 *
4000 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4001 * number of outstanding requests to 100 per app (identified by their UID), shared with
4002 * all variants of this method, of {@link #registerNetworkCallback} as well as
4003 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4004 * Requesting a network with this method will count toward this limit. If this limit is
4005 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4006 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4007 * or {@link #releaseNetworkRequest(PendingIntent)}.
4008 *
4009 * <p>This method requires the caller to hold either the
4010 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
4011 * or the ability to modify system settings as determined by
4012 * {@link android.provider.Settings.System#canWrite}.</p>
4013 *
4014 * @param request {@link NetworkRequest} describing this request.
4015 * @param operation Action to perform when the network is available (corresponds
4016 * to the {@link NetworkCallback#onAvailable} call. Typically
4017 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4018 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
4019 * @throws SecurityException if missing the appropriate permissions.
4020 * @throws RuntimeException if the app already has too many callbacks registered.
4021 */
4022 public void requestNetwork(@NonNull NetworkRequest request,
4023 @NonNull PendingIntent operation) {
4024 printStackTrace();
4025 checkPendingIntentNotNull(operation);
4026 try {
4027 mService.pendingRequestForNetwork(
4028 request.networkCapabilities, operation, mContext.getOpPackageName(),
4029 getAttributionTag());
4030 } catch (RemoteException e) {
4031 throw e.rethrowFromSystemServer();
4032 } catch (ServiceSpecificException e) {
4033 throw convertServiceException(e);
4034 }
4035 }
4036
4037 /**
4038 * Removes a request made via {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)}
4039 * <p>
4040 * This method has the same behavior as
4041 * {@link #unregisterNetworkCallback(android.app.PendingIntent)} with respect to
4042 * releasing network resources and disconnecting.
4043 *
4044 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4045 * PendingIntent passed to
4046 * {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)} with the
4047 * corresponding NetworkRequest you'd like to remove. Cannot be null.
4048 */
4049 public void releaseNetworkRequest(@NonNull PendingIntent operation) {
4050 printStackTrace();
4051 checkPendingIntentNotNull(operation);
4052 try {
4053 mService.releasePendingNetworkRequest(operation);
4054 } catch (RemoteException e) {
4055 throw e.rethrowFromSystemServer();
4056 }
4057 }
4058
4059 private static void checkPendingIntentNotNull(PendingIntent intent) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004060 Objects.requireNonNull(intent, "PendingIntent cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004061 }
4062
4063 private static void checkCallbackNotNull(NetworkCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004064 Objects.requireNonNull(callback, "null NetworkCallback");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004065 }
4066
4067 private static void checkTimeout(int timeoutMs) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004068 if (timeoutMs <= 0) {
4069 throw new IllegalArgumentException("timeoutMs must be strictly positive.");
4070 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004071 }
4072
4073 /**
4074 * Registers to receive notifications about all networks which satisfy the given
4075 * {@link NetworkRequest}. The callbacks will continue to be called until
4076 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4077 * called.
4078 *
4079 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4080 * number of outstanding requests to 100 per app (identified by their UID), shared with
4081 * all variants of this method, of {@link #requestNetwork} as well as
4082 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4083 * Requesting a network with this method will count toward this limit. If this limit is
4084 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4085 * make sure to unregister the callbacks with
4086 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4087 *
4088 * @param request {@link NetworkRequest} describing this request.
4089 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4090 * networks change state.
4091 * The callback is invoked on the default internal Handler.
4092 * @throws RuntimeException if the app already has too many callbacks registered.
4093 */
4094 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4095 public void registerNetworkCallback(@NonNull NetworkRequest request,
4096 @NonNull NetworkCallback networkCallback) {
4097 registerNetworkCallback(request, networkCallback, getDefaultHandler());
4098 }
4099
4100 /**
4101 * Registers to receive notifications about all networks which satisfy the given
4102 * {@link NetworkRequest}. The callbacks will continue to be called until
4103 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4104 * called.
4105 *
4106 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4107 * number of outstanding requests to 100 per app (identified by their UID), shared with
4108 * all variants of this method, of {@link #requestNetwork} as well as
4109 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4110 * Requesting a network with this method will count toward this limit. If this limit is
4111 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4112 * make sure to unregister the callbacks with
4113 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4114 *
4115 *
4116 * @param request {@link NetworkRequest} describing this request.
4117 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4118 * networks change state.
4119 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4120 * @throws RuntimeException if the app already has too many callbacks registered.
4121 */
4122 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4123 public void registerNetworkCallback(@NonNull NetworkRequest request,
4124 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4125 CallbackHandler cbHandler = new CallbackHandler(handler);
4126 NetworkCapabilities nc = request.networkCapabilities;
4127 sendRequestForNetwork(nc, networkCallback, 0, LISTEN, TYPE_NONE, cbHandler);
4128 }
4129
4130 /**
4131 * Registers a PendingIntent to be sent when a network is available which satisfies the given
4132 * {@link NetworkRequest}.
4133 *
4134 * This function behaves identically to the version that takes a NetworkCallback, but instead
4135 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
4136 * the request may outlive the calling application and get called back when a suitable
4137 * network is found.
4138 * <p>
4139 * The operation is an Intent broadcast that goes to a broadcast receiver that
4140 * you registered with {@link Context#registerReceiver} or through the
4141 * &lt;receiver&gt; tag in an AndroidManifest.xml file
4142 * <p>
4143 * The operation Intent is delivered with two extras, a {@link Network} typed
4144 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
4145 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
4146 * the original requests parameters.
4147 * <p>
4148 * If there is already a request for this Intent registered (with the equality of
4149 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
4150 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
4151 * <p>
4152 * The request may be released normally by calling
4153 * {@link #unregisterNetworkCallback(android.app.PendingIntent)}.
4154 *
4155 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4156 * number of outstanding requests to 100 per app (identified by their UID), shared with
4157 * all variants of this method, of {@link #requestNetwork} as well as
4158 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4159 * Requesting a network with this method will count toward this limit. If this limit is
4160 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4161 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4162 * or {@link #releaseNetworkRequest(PendingIntent)}.
4163 *
4164 * @param request {@link NetworkRequest} describing this request.
4165 * @param operation Action to perform when the network is available (corresponds
4166 * to the {@link NetworkCallback#onAvailable} call. Typically
4167 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4168 * @throws RuntimeException if the app already has too many callbacks registered.
4169 */
4170 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4171 public void registerNetworkCallback(@NonNull NetworkRequest request,
4172 @NonNull PendingIntent operation) {
4173 printStackTrace();
4174 checkPendingIntentNotNull(operation);
4175 try {
4176 mService.pendingListenForNetwork(
Roshan Piusa8a477b2020-12-17 14:53:09 -08004177 request.networkCapabilities, operation, mContext.getOpPackageName(),
4178 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004179 } catch (RemoteException e) {
4180 throw e.rethrowFromSystemServer();
4181 } catch (ServiceSpecificException e) {
4182 throw convertServiceException(e);
4183 }
4184 }
4185
4186 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004187 * Registers to receive notifications about changes in the application's default network. This
4188 * may be a physical network or a virtual network, such as a VPN that applies to the
4189 * application. The callbacks will continue to be called until either the application exits or
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004190 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4191 *
4192 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4193 * number of outstanding requests to 100 per app (identified by their UID), shared with
4194 * all variants of this method, of {@link #requestNetwork} as well as
4195 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4196 * Requesting a network with this method will count toward this limit. If this limit is
4197 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4198 * make sure to unregister the callbacks with
4199 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4200 *
4201 * @param networkCallback The {@link NetworkCallback} that the system will call as the
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004202 * application's default network changes.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004203 * The callback is invoked on the default internal Handler.
4204 * @throws RuntimeException if the app already has too many callbacks registered.
4205 */
4206 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4207 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback) {
4208 registerDefaultNetworkCallback(networkCallback, getDefaultHandler());
4209 }
4210
4211 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004212 * Registers to receive notifications about changes in the application's default network. This
4213 * may be a physical network or a virtual network, such as a VPN that applies to the
4214 * application. The callbacks will continue to be called until either the application exits or
4215 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4216 *
4217 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4218 * number of outstanding requests to 100 per app (identified by their UID), shared with
4219 * all variants of this method, of {@link #requestNetwork} as well as
4220 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4221 * Requesting a network with this method will count toward this limit. If this limit is
4222 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4223 * make sure to unregister the callbacks with
4224 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4225 *
4226 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4227 * application's default network changes.
4228 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4229 * @throws RuntimeException if the app already has too many callbacks registered.
4230 */
4231 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4232 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
4233 @NonNull Handler handler) {
4234 CallbackHandler cbHandler = new CallbackHandler(handler);
4235 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
4236 TRACK_DEFAULT, TYPE_NONE, cbHandler);
4237 }
4238
4239 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004240 * Registers to receive notifications about changes in the system default network. The callbacks
4241 * will continue to be called until either the application exits or
4242 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4243 *
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004244 * This method should not be used to determine networking state seen by applications, because in
4245 * many cases, most or even all application traffic may not use the default network directly,
4246 * and traffic from different applications may go on different networks by default. As an
4247 * example, if a VPN is connected, traffic from all applications might be sent through the VPN
4248 * and not onto the system default network. Applications or system components desiring to do
4249 * determine network state as seen by applications should use other methods such as
4250 * {@link #registerDefaultNetworkCallback(NetworkCallback, Handler)}.
4251 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004252 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4253 * number of outstanding requests to 100 per app (identified by their UID), shared with
4254 * all variants of this method, of {@link #requestNetwork} as well as
4255 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4256 * Requesting a network with this method will count toward this limit. If this limit is
4257 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4258 * make sure to unregister the callbacks with
4259 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4260 *
4261 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4262 * system default network changes.
4263 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4264 * @throws RuntimeException if the app already has too many callbacks registered.
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004265 *
4266 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004267 */
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004268 @SystemApi(client = MODULE_LIBRARIES)
4269 @SuppressLint({"ExecutorRegistration", "PairedRegistration"})
4270 @RequiresPermission(anyOf = {
4271 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4272 android.Manifest.permission.NETWORK_SETTINGS})
4273 public void registerSystemDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004274 @NonNull Handler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004275 CallbackHandler cbHandler = new CallbackHandler(handler);
4276 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004277 TRACK_SYSTEM_DEFAULT, TYPE_NONE, cbHandler);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004278 }
4279
4280 /**
junyulaibd123062021-03-15 11:48:48 +08004281 * Registers to receive notifications about the best matching network which satisfy the given
4282 * {@link NetworkRequest}. The callbacks will continue to be called until
4283 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4284 * called.
4285 *
4286 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4287 * number of outstanding requests to 100 per app (identified by their UID), shared with
4288 * {@link #registerNetworkCallback} and its variants and {@link #requestNetwork} as well as
4289 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4290 * Requesting a network with this method will count toward this limit. If this limit is
4291 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4292 * make sure to unregister the callbacks with
4293 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4294 *
4295 *
4296 * @param request {@link NetworkRequest} describing this request.
4297 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4298 * networks change state.
4299 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4300 * @throws RuntimeException if the app already has too many callbacks registered.
junyulai5a5c99b2021-03-05 15:51:17 +08004301 */
junyulai5a5c99b2021-03-05 15:51:17 +08004302 @SuppressLint("ExecutorRegistration")
4303 public void registerBestMatchingNetworkCallback(@NonNull NetworkRequest request,
4304 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4305 final NetworkCapabilities nc = request.networkCapabilities;
4306 final CallbackHandler cbHandler = new CallbackHandler(handler);
junyulai7664f622021-03-12 20:05:08 +08004307 sendRequestForNetwork(nc, networkCallback, 0, LISTEN_FOR_BEST, TYPE_NONE, cbHandler);
junyulai5a5c99b2021-03-05 15:51:17 +08004308 }
4309
4310 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004311 * Requests bandwidth update for a given {@link Network} and returns whether the update request
4312 * is accepted by ConnectivityService. Once accepted, ConnectivityService will poll underlying
4313 * network connection for updated bandwidth information. The caller will be notified via
4314 * {@link ConnectivityManager.NetworkCallback} if there is an update. Notice that this
4315 * method assumes that the caller has previously called
4316 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} to listen for network
4317 * changes.
4318 *
4319 * @param network {@link Network} specifying which network you're interested.
4320 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4321 */
4322 public boolean requestBandwidthUpdate(@NonNull Network network) {
4323 try {
4324 return mService.requestBandwidthUpdate(network);
4325 } catch (RemoteException e) {
4326 throw e.rethrowFromSystemServer();
4327 }
4328 }
4329
4330 /**
4331 * Unregisters a {@code NetworkCallback} and possibly releases networks originating from
4332 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} and
4333 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} calls.
4334 * If the given {@code NetworkCallback} had previously been used with
4335 * {@code #requestNetwork}, any networks that had been connected to only to satisfy that request
4336 * will be disconnected.
4337 *
4338 * Notifications that would have triggered that {@code NetworkCallback} will immediately stop
4339 * triggering it as soon as this call returns.
4340 *
4341 * @param networkCallback The {@link NetworkCallback} used when making the request.
4342 */
4343 public void unregisterNetworkCallback(@NonNull NetworkCallback networkCallback) {
4344 printStackTrace();
4345 checkCallbackNotNull(networkCallback);
4346 final List<NetworkRequest> reqs = new ArrayList<>();
4347 // Find all requests associated to this callback and stop callback triggers immediately.
4348 // Callback is reusable immediately. http://b/20701525, http://b/35921499.
4349 synchronized (sCallbacks) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004350 if (networkCallback.networkRequest == null) {
4351 throw new IllegalArgumentException("NetworkCallback was not registered");
4352 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004353 if (networkCallback.networkRequest == ALREADY_UNREGISTERED) {
4354 Log.d(TAG, "NetworkCallback was already unregistered");
4355 return;
4356 }
4357 for (Map.Entry<NetworkRequest, NetworkCallback> e : sCallbacks.entrySet()) {
4358 if (e.getValue() == networkCallback) {
4359 reqs.add(e.getKey());
4360 }
4361 }
4362 // TODO: throw exception if callback was registered more than once (http://b/20701525).
4363 for (NetworkRequest r : reqs) {
4364 try {
4365 mService.releaseNetworkRequest(r);
4366 } catch (RemoteException e) {
4367 throw e.rethrowFromSystemServer();
4368 }
4369 // Only remove mapping if rpc was successful.
4370 sCallbacks.remove(r);
4371 }
4372 networkCallback.networkRequest = ALREADY_UNREGISTERED;
4373 }
4374 }
4375
4376 /**
4377 * Unregisters a callback previously registered via
4378 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4379 *
4380 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4381 * PendingIntent passed to
4382 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4383 * Cannot be null.
4384 */
4385 public void unregisterNetworkCallback(@NonNull PendingIntent operation) {
4386 releaseNetworkRequest(operation);
4387 }
4388
4389 /**
4390 * Informs the system whether it should switch to {@code network} regardless of whether it is
4391 * validated or not. If {@code accept} is true, and the network was explicitly selected by the
4392 * user (e.g., by selecting a Wi-Fi network in the Settings app), then the network will become
4393 * the system default network regardless of any other network that's currently connected. If
4394 * {@code always} is true, then the choice is remembered, so that the next time the user
4395 * connects to this network, the system will switch to it.
4396 *
4397 * @param network The network to accept.
4398 * @param accept Whether to accept the network even if unvalidated.
4399 * @param always Whether to remember this choice in the future.
4400 *
4401 * @hide
4402 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004403 @SystemApi(client = MODULE_LIBRARIES)
4404 @RequiresPermission(anyOf = {
4405 android.Manifest.permission.NETWORK_SETTINGS,
4406 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4407 android.Manifest.permission.NETWORK_STACK,
4408 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4409 public void setAcceptUnvalidated(@NonNull Network network, boolean accept, boolean always) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004410 try {
4411 mService.setAcceptUnvalidated(network, accept, always);
4412 } catch (RemoteException e) {
4413 throw e.rethrowFromSystemServer();
4414 }
4415 }
4416
4417 /**
4418 * Informs the system whether it should consider the network as validated even if it only has
4419 * partial connectivity. If {@code accept} is true, then the network will be considered as
4420 * validated even if connectivity is only partial. If {@code always} is true, then the choice
4421 * is remembered, so that the next time the user connects to this network, the system will
4422 * switch to it.
4423 *
4424 * @param network The network to accept.
4425 * @param accept Whether to consider the network as validated even if it has partial
4426 * connectivity.
4427 * @param always Whether to remember this choice in the future.
4428 *
4429 * @hide
4430 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004431 @SystemApi(client = MODULE_LIBRARIES)
4432 @RequiresPermission(anyOf = {
4433 android.Manifest.permission.NETWORK_SETTINGS,
4434 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4435 android.Manifest.permission.NETWORK_STACK,
4436 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4437 public void setAcceptPartialConnectivity(@NonNull Network network, boolean accept,
4438 boolean always) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004439 try {
4440 mService.setAcceptPartialConnectivity(network, accept, always);
4441 } catch (RemoteException e) {
4442 throw e.rethrowFromSystemServer();
4443 }
4444 }
4445
4446 /**
4447 * Informs the system to penalize {@code network}'s score when it becomes unvalidated. This is
4448 * only meaningful if the system is configured not to penalize such networks, e.g., if the
4449 * {@code config_networkAvoidBadWifi} configuration variable is set to 0 and the {@code
4450 * NETWORK_AVOID_BAD_WIFI setting is unset}.
4451 *
4452 * @param network The network to accept.
4453 *
4454 * @hide
4455 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004456 @SystemApi(client = MODULE_LIBRARIES)
4457 @RequiresPermission(anyOf = {
4458 android.Manifest.permission.NETWORK_SETTINGS,
4459 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4460 android.Manifest.permission.NETWORK_STACK,
4461 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4462 public void setAvoidUnvalidated(@NonNull Network network) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004463 try {
4464 mService.setAvoidUnvalidated(network);
4465 } catch (RemoteException e) {
4466 throw e.rethrowFromSystemServer();
4467 }
4468 }
4469
4470 /**
4471 * Requests that the system open the captive portal app on the specified network.
4472 *
4473 * @param network The network to log into.
4474 *
4475 * @hide
4476 */
4477 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
4478 public void startCaptivePortalApp(Network network) {
4479 try {
4480 mService.startCaptivePortalApp(network);
4481 } catch (RemoteException e) {
4482 throw e.rethrowFromSystemServer();
4483 }
4484 }
4485
4486 /**
4487 * Requests that the system open the captive portal app with the specified extras.
4488 *
4489 * <p>This endpoint is exclusively for use by the NetworkStack and is protected by the
4490 * corresponding permission.
4491 * @param network Network on which the captive portal was detected.
4492 * @param appExtras Extras to include in the app start intent.
4493 * @hide
4494 */
4495 @SystemApi
4496 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
4497 public void startCaptivePortalApp(@NonNull Network network, @NonNull Bundle appExtras) {
4498 try {
4499 mService.startCaptivePortalAppInternal(network, appExtras);
4500 } catch (RemoteException e) {
4501 throw e.rethrowFromSystemServer();
4502 }
4503 }
4504
4505 /**
4506 * Determine whether the device is configured to avoid bad wifi.
4507 * @hide
4508 */
4509 @SystemApi
4510 @RequiresPermission(anyOf = {
4511 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4512 android.Manifest.permission.NETWORK_STACK})
4513 public boolean shouldAvoidBadWifi() {
4514 try {
4515 return mService.shouldAvoidBadWifi();
4516 } catch (RemoteException e) {
4517 throw e.rethrowFromSystemServer();
4518 }
4519 }
4520
4521 /**
4522 * It is acceptable to briefly use multipath data to provide seamless connectivity for
4523 * time-sensitive user-facing operations when the system default network is temporarily
4524 * unresponsive. The amount of data should be limited (less than one megabyte for every call to
4525 * this method), and the operation should be infrequent to ensure that data usage is limited.
4526 *
4527 * An example of such an operation might be a time-sensitive foreground activity, such as a
4528 * voice command, that the user is performing while walking out of range of a Wi-Fi network.
4529 */
4530 public static final int MULTIPATH_PREFERENCE_HANDOVER = 1 << 0;
4531
4532 /**
4533 * It is acceptable to use small amounts of multipath data on an ongoing basis to provide
4534 * a backup channel for traffic that is primarily going over another network.
4535 *
4536 * An example might be maintaining backup connections to peers or servers for the purpose of
4537 * fast fallback if the default network is temporarily unresponsive or disconnects. The traffic
4538 * on backup paths should be negligible compared to the traffic on the main path.
4539 */
4540 public static final int MULTIPATH_PREFERENCE_RELIABILITY = 1 << 1;
4541
4542 /**
4543 * It is acceptable to use metered data to improve network latency and performance.
4544 */
4545 public static final int MULTIPATH_PREFERENCE_PERFORMANCE = 1 << 2;
4546
4547 /**
4548 * Return value to use for unmetered networks. On such networks we currently set all the flags
4549 * to true.
4550 * @hide
4551 */
4552 public static final int MULTIPATH_PREFERENCE_UNMETERED =
4553 MULTIPATH_PREFERENCE_HANDOVER |
4554 MULTIPATH_PREFERENCE_RELIABILITY |
4555 MULTIPATH_PREFERENCE_PERFORMANCE;
4556
4557 /** @hide */
4558 @Retention(RetentionPolicy.SOURCE)
4559 @IntDef(flag = true, value = {
4560 MULTIPATH_PREFERENCE_HANDOVER,
4561 MULTIPATH_PREFERENCE_RELIABILITY,
4562 MULTIPATH_PREFERENCE_PERFORMANCE,
4563 })
4564 public @interface MultipathPreference {
4565 }
4566
4567 /**
4568 * Provides a hint to the calling application on whether it is desirable to use the
4569 * multinetwork APIs (e.g., {@link Network#openConnection}, {@link Network#bindSocket}, etc.)
4570 * for multipath data transfer on this network when it is not the system default network.
4571 * Applications desiring to use multipath network protocols should call this method before
4572 * each such operation.
4573 *
4574 * @param network The network on which the application desires to use multipath data.
4575 * If {@code null}, this method will return the a preference that will generally
4576 * apply to metered networks.
4577 * @return a bitwise OR of zero or more of the {@code MULTIPATH_PREFERENCE_*} constants.
4578 */
4579 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4580 public @MultipathPreference int getMultipathPreference(@Nullable Network network) {
4581 try {
4582 return mService.getMultipathPreference(network);
4583 } catch (RemoteException e) {
4584 throw e.rethrowFromSystemServer();
4585 }
4586 }
4587
4588 /**
4589 * Resets all connectivity manager settings back to factory defaults.
4590 * @hide
4591 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004592 @SystemApi(client = MODULE_LIBRARIES)
4593 @RequiresPermission(anyOf = {
4594 android.Manifest.permission.NETWORK_SETTINGS,
4595 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004596 public void factoryReset() {
4597 try {
4598 mService.factoryReset();
4599 mTetheringManager.stopAllTethering();
4600 } catch (RemoteException e) {
4601 throw e.rethrowFromSystemServer();
4602 }
4603 }
4604
4605 /**
4606 * Binds the current process to {@code network}. All Sockets created in the future
4607 * (and not explicitly bound via a bound SocketFactory from
4608 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4609 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4610 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4611 * work and all host name resolutions will fail. This is by design so an application doesn't
4612 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4613 * To clear binding pass {@code null} for {@code network}. Using individually bound
4614 * Sockets created by Network.getSocketFactory().createSocket() and
4615 * performing network-specific host name resolutions via
4616 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4617 * {@code bindProcessToNetwork}.
4618 *
4619 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4620 * the current binding.
4621 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4622 */
4623 public boolean bindProcessToNetwork(@Nullable Network network) {
4624 // Forcing callers to call through non-static function ensures ConnectivityManager
4625 // instantiated.
4626 return setProcessDefaultNetwork(network);
4627 }
4628
4629 /**
4630 * Binds the current process to {@code network}. All Sockets created in the future
4631 * (and not explicitly bound via a bound SocketFactory from
4632 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
4633 * {@code network}. All host name resolutions will be limited to {@code network} as well.
4634 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
4635 * work and all host name resolutions will fail. This is by design so an application doesn't
4636 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
4637 * To clear binding pass {@code null} for {@code network}. Using individually bound
4638 * Sockets created by Network.getSocketFactory().createSocket() and
4639 * performing network-specific host name resolutions via
4640 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
4641 * {@code setProcessDefaultNetwork}.
4642 *
4643 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
4644 * the current binding.
4645 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4646 * @deprecated This function can throw {@link IllegalStateException}. Use
4647 * {@link #bindProcessToNetwork} instead. {@code bindProcessToNetwork}
4648 * is a direct replacement.
4649 */
4650 @Deprecated
4651 public static boolean setProcessDefaultNetwork(@Nullable Network network) {
4652 int netId = (network == null) ? NETID_UNSET : network.netId;
4653 boolean isSameNetId = (netId == NetworkUtils.getBoundNetworkForProcess());
4654
4655 if (netId != NETID_UNSET) {
4656 netId = network.getNetIdForResolv();
4657 }
4658
4659 if (!NetworkUtils.bindProcessToNetwork(netId)) {
4660 return false;
4661 }
4662
4663 if (!isSameNetId) {
4664 // Set HTTP proxy system properties to match network.
4665 // TODO: Deprecate this static method and replace it with a non-static version.
4666 try {
Remi NGUYEN VAN8a831d62021-02-03 10:18:20 +09004667 Proxy.setHttpProxyConfiguration(getInstance().getDefaultProxy());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004668 } catch (SecurityException e) {
4669 // The process doesn't have ACCESS_NETWORK_STATE, so we can't fetch the proxy.
4670 Log.e(TAG, "Can't set proxy properties", e);
4671 }
4672 // Must flush DNS cache as new network may have different DNS resolutions.
Remi NGUYEN VAN342dddd2021-03-18 23:27:19 +09004673 InetAddressCompat.clearDnsCache();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004674 // Must flush socket pool as idle sockets will be bound to previous network and may
4675 // cause subsequent fetches to be performed on old network.
4676 NetworkEventDispatcher.getInstance().onNetworkConfigurationChanged();
4677 }
4678
4679 return true;
4680 }
4681
4682 /**
4683 * Returns the {@link Network} currently bound to this process via
4684 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4685 *
4686 * @return {@code Network} to which this process is bound, or {@code null}.
4687 */
4688 @Nullable
4689 public Network getBoundNetworkForProcess() {
4690 // Forcing callers to call thru non-static function ensures ConnectivityManager
4691 // instantiated.
4692 return getProcessDefaultNetwork();
4693 }
4694
4695 /**
4696 * Returns the {@link Network} currently bound to this process via
4697 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
4698 *
4699 * @return {@code Network} to which this process is bound, or {@code null}.
4700 * @deprecated Using this function can lead to other functions throwing
4701 * {@link IllegalStateException}. Use {@link #getBoundNetworkForProcess} instead.
4702 * {@code getBoundNetworkForProcess} is a direct replacement.
4703 */
4704 @Deprecated
4705 @Nullable
4706 public static Network getProcessDefaultNetwork() {
4707 int netId = NetworkUtils.getBoundNetworkForProcess();
4708 if (netId == NETID_UNSET) return null;
4709 return new Network(netId);
4710 }
4711
4712 private void unsupportedStartingFrom(int version) {
4713 if (Process.myUid() == Process.SYSTEM_UID) {
4714 // The getApplicationInfo() call we make below is not supported in system context. Let
4715 // the call through here, and rely on the fact that ConnectivityService will refuse to
4716 // allow the system to use these APIs anyway.
4717 return;
4718 }
4719
4720 if (mContext.getApplicationInfo().targetSdkVersion >= version) {
4721 throw new UnsupportedOperationException(
4722 "This method is not supported in target SDK version " + version + " and above");
4723 }
4724 }
4725
4726 // Checks whether the calling app can use the legacy routing API (startUsingNetworkFeature,
4727 // stopUsingNetworkFeature, requestRouteToHost), and if not throw UnsupportedOperationException.
4728 // TODO: convert the existing system users (Tethering, GnssLocationProvider) to the new APIs and
4729 // remove these exemptions. Note that this check is not secure, and apps can still access these
4730 // functions by accessing ConnectivityService directly. However, it should be clear that doing
4731 // so is unsupported and may break in the future. http://b/22728205
4732 private void checkLegacyRoutingApiAccess() {
4733 unsupportedStartingFrom(VERSION_CODES.M);
4734 }
4735
4736 /**
4737 * Binds host resolutions performed by this process to {@code network}.
4738 * {@link #bindProcessToNetwork} takes precedence over this setting.
4739 *
4740 * @param network The {@link Network} to bind host resolutions from the current process to, or
4741 * {@code null} to clear the current binding.
4742 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4743 * @hide
4744 * @deprecated This is strictly for legacy usage to support {@link #startUsingNetworkFeature}.
4745 */
4746 @Deprecated
4747 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
4748 public static boolean setProcessDefaultNetworkForHostResolution(Network network) {
4749 return NetworkUtils.bindProcessToNetworkForHostResolution(
4750 (network == null) ? NETID_UNSET : network.getNetIdForResolv());
4751 }
4752
4753 /**
4754 * Device is not restricting metered network activity while application is running on
4755 * background.
4756 */
4757 public static final int RESTRICT_BACKGROUND_STATUS_DISABLED = 1;
4758
4759 /**
4760 * Device is restricting metered network activity while application is running on background,
4761 * but application is allowed to bypass it.
4762 * <p>
4763 * In this state, application should take action to mitigate metered network access.
4764 * For example, a music streaming application should switch to a low-bandwidth bitrate.
4765 */
4766 public static final int RESTRICT_BACKGROUND_STATUS_WHITELISTED = 2;
4767
4768 /**
4769 * Device is restricting metered network activity while application is running on background.
4770 * <p>
4771 * In this state, application should not try to use the network while running on background,
4772 * because it would be denied.
4773 */
4774 public static final int RESTRICT_BACKGROUND_STATUS_ENABLED = 3;
4775
4776 /**
4777 * A change in the background metered network activity restriction has occurred.
4778 * <p>
4779 * Applications should call {@link #getRestrictBackgroundStatus()} to check if the restriction
4780 * applies to them.
4781 * <p>
4782 * This is only sent to registered receivers, not manifest receivers.
4783 */
4784 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
4785 public static final String ACTION_RESTRICT_BACKGROUND_CHANGED =
4786 "android.net.conn.RESTRICT_BACKGROUND_CHANGED";
4787
4788 /** @hide */
4789 @Retention(RetentionPolicy.SOURCE)
4790 @IntDef(flag = false, value = {
4791 RESTRICT_BACKGROUND_STATUS_DISABLED,
4792 RESTRICT_BACKGROUND_STATUS_WHITELISTED,
4793 RESTRICT_BACKGROUND_STATUS_ENABLED,
4794 })
4795 public @interface RestrictBackgroundStatus {
4796 }
4797
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004798 /**
4799 * Determines if the calling application is subject to metered network restrictions while
4800 * running on background.
4801 *
4802 * @return {@link #RESTRICT_BACKGROUND_STATUS_DISABLED},
4803 * {@link #RESTRICT_BACKGROUND_STATUS_ENABLED},
4804 * or {@link #RESTRICT_BACKGROUND_STATUS_WHITELISTED}
4805 */
4806 public @RestrictBackgroundStatus int getRestrictBackgroundStatus() {
4807 try {
Remi NGUYEN VAN1fdeb502021-03-18 14:23:12 +09004808 return mService.getRestrictBackgroundStatusByCaller();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004809 } catch (RemoteException e) {
4810 throw e.rethrowFromSystemServer();
4811 }
4812 }
4813
4814 /**
4815 * The network watchlist is a list of domains and IP addresses that are associated with
4816 * potentially harmful apps. This method returns the SHA-256 of the watchlist config file
4817 * currently used by the system for validation purposes.
4818 *
4819 * @return Hash of network watchlist config file. Null if config does not exist.
4820 */
4821 @Nullable
4822 public byte[] getNetworkWatchlistConfigHash() {
4823 try {
4824 return mService.getNetworkWatchlistConfigHash();
4825 } catch (RemoteException e) {
4826 Log.e(TAG, "Unable to get watchlist config hash");
4827 throw e.rethrowFromSystemServer();
4828 }
4829 }
4830
4831 /**
4832 * Returns the {@code uid} of the owner of a network connection.
4833 *
4834 * @param protocol The protocol of the connection. Only {@code IPPROTO_TCP} and {@code
4835 * IPPROTO_UDP} currently supported.
4836 * @param local The local {@link InetSocketAddress} of a connection.
4837 * @param remote The remote {@link InetSocketAddress} of a connection.
4838 * @return {@code uid} if the connection is found and the app has permission to observe it
4839 * (e.g., if it is associated with the calling VPN app's VpnService tunnel) or {@link
4840 * android.os.Process#INVALID_UID} if the connection is not found.
4841 * @throws {@link SecurityException} if the caller is not the active VpnService for the current
4842 * user.
4843 * @throws {@link IllegalArgumentException} if an unsupported protocol is requested.
4844 */
4845 public int getConnectionOwnerUid(
4846 int protocol, @NonNull InetSocketAddress local, @NonNull InetSocketAddress remote) {
4847 ConnectionInfo connectionInfo = new ConnectionInfo(protocol, local, remote);
4848 try {
4849 return mService.getConnectionOwnerUid(connectionInfo);
4850 } catch (RemoteException e) {
4851 throw e.rethrowFromSystemServer();
4852 }
4853 }
4854
4855 private void printStackTrace() {
4856 if (DEBUG) {
4857 final StackTraceElement[] callStack = Thread.currentThread().getStackTrace();
4858 final StringBuffer sb = new StringBuffer();
4859 for (int i = 3; i < callStack.length; i++) {
4860 final String stackTrace = callStack[i].toString();
4861 if (stackTrace == null || stackTrace.contains("android.os")) {
4862 break;
4863 }
4864 sb.append(" [").append(stackTrace).append("]");
4865 }
4866 Log.d(TAG, "StackLog:" + sb.toString());
4867 }
4868 }
4869
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004870 /** @hide */
4871 public TestNetworkManager startOrGetTestNetworkManager() {
4872 final IBinder tnBinder;
4873 try {
4874 tnBinder = mService.startOrGetTestNetworkService();
4875 } catch (RemoteException e) {
4876 throw e.rethrowFromSystemServer();
4877 }
4878
4879 return new TestNetworkManager(ITestNetworkManager.Stub.asInterface(tnBinder));
4880 }
4881
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09004882 /** @hide */
4883 public ConnectivityDiagnosticsManager createDiagnosticsManager() {
4884 return new ConnectivityDiagnosticsManager(mContext, mService);
4885 }
4886
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004887 /**
4888 * Simulates a Data Stall for the specified Network.
4889 *
4890 * <p>This method should only be used for tests.
4891 *
4892 * <p>The caller must be the owner of the specified Network.
4893 *
4894 * @param detectionMethod The detection method used to identify the Data Stall.
4895 * @param timestampMillis The timestamp at which the stall 'occurred', in milliseconds.
4896 * @param network The Network for which a Data Stall is being simluated.
4897 * @param extras The PersistableBundle of extras included in the Data Stall notification.
4898 * @throws SecurityException if the caller is not the owner of the given network.
4899 * @hide
4900 */
4901 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
4902 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_TEST_NETWORKS,
4903 android.Manifest.permission.NETWORK_STACK})
4904 public void simulateDataStall(int detectionMethod, long timestampMillis,
4905 @NonNull Network network, @NonNull PersistableBundle extras) {
4906 try {
4907 mService.simulateDataStall(detectionMethod, timestampMillis, network, extras);
4908 } catch (RemoteException e) {
4909 e.rethrowFromSystemServer();
4910 }
4911 }
4912
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004913 @NonNull
4914 private final List<QosCallbackConnection> mQosCallbackConnections = new ArrayList<>();
4915
4916 /**
4917 * Registers a {@link QosSocketInfo} with an associated {@link QosCallback}. The callback will
4918 * receive available QoS events related to the {@link Network} and local ip + port
4919 * specified within socketInfo.
4920 * <p/>
4921 * The same {@link QosCallback} must be unregistered before being registered a second time,
4922 * otherwise {@link QosCallbackRegistrationException} is thrown.
4923 * <p/>
4924 * This API does not, in itself, require any permission if called with a network that is not
4925 * restricted. However, the underlying implementation currently only supports the IMS network,
4926 * which is always restricted. That means non-preinstalled callers can't possibly find this API
4927 * useful, because they'd never be called back on networks that they would have access to.
4928 *
4929 * @throws SecurityException if {@link QosSocketInfo#getNetwork()} is restricted and the app is
4930 * missing CONNECTIVITY_USE_RESTRICTED_NETWORKS permission.
4931 * @throws QosCallback.QosCallbackRegistrationException if qosCallback is already registered.
4932 * @throws RuntimeException if the app already has too many callbacks registered.
4933 *
4934 * Exceptions after the time of registration is passed through
4935 * {@link QosCallback#onError(QosCallbackException)}. see: {@link QosCallbackException}.
4936 *
4937 * @param socketInfo the socket information used to match QoS events
4938 * @param callback receives qos events that satisfy socketInfo
4939 * @param executor The executor on which the callback will be invoked. The provided
4940 * {@link Executor} must run callback sequentially, otherwise the order of
4941 * callbacks cannot be guaranteed.
4942 *
4943 * @hide
4944 */
4945 @SystemApi
4946 public void registerQosCallback(@NonNull final QosSocketInfo socketInfo,
4947 @NonNull final QosCallback callback,
4948 @CallbackExecutor @NonNull final Executor executor) {
4949 Objects.requireNonNull(socketInfo, "socketInfo must be non-null");
4950 Objects.requireNonNull(callback, "callback must be non-null");
4951 Objects.requireNonNull(executor, "executor must be non-null");
4952
4953 try {
4954 synchronized (mQosCallbackConnections) {
4955 if (getQosCallbackConnection(callback) == null) {
4956 final QosCallbackConnection connection =
4957 new QosCallbackConnection(this, callback, executor);
4958 mQosCallbackConnections.add(connection);
4959 mService.registerQosSocketCallback(socketInfo, connection);
4960 } else {
4961 Log.e(TAG, "registerQosCallback: Callback already registered");
4962 throw new QosCallbackRegistrationException();
4963 }
4964 }
4965 } catch (final RemoteException e) {
4966 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4967
4968 // The same unregister method method is called for consistency even though nothing
4969 // will be sent to the ConnectivityService since the callback was never successfully
4970 // registered.
4971 unregisterQosCallback(callback);
4972 e.rethrowFromSystemServer();
4973 } catch (final ServiceSpecificException e) {
4974 Log.e(TAG, "registerQosCallback: Error while registering ", e);
4975 unregisterQosCallback(callback);
4976 throw convertServiceException(e);
4977 }
4978 }
4979
4980 /**
4981 * Unregisters the given {@link QosCallback}. The {@link QosCallback} will no longer receive
4982 * events once unregistered and can be registered a second time.
4983 * <p/>
4984 * If the {@link QosCallback} does not have an active registration, it is a no-op.
4985 *
4986 * @param callback the callback being unregistered
4987 *
4988 * @hide
4989 */
4990 @SystemApi
4991 public void unregisterQosCallback(@NonNull final QosCallback callback) {
4992 Objects.requireNonNull(callback, "The callback must be non-null");
4993 try {
4994 synchronized (mQosCallbackConnections) {
4995 final QosCallbackConnection connection = getQosCallbackConnection(callback);
4996 if (connection != null) {
4997 connection.stopReceivingMessages();
4998 mService.unregisterQosCallback(connection);
4999 mQosCallbackConnections.remove(connection);
5000 } else {
5001 Log.d(TAG, "unregisterQosCallback: Callback not registered");
5002 }
5003 }
5004 } catch (final RemoteException e) {
5005 Log.e(TAG, "unregisterQosCallback: Error while unregistering ", e);
5006 e.rethrowFromSystemServer();
5007 }
5008 }
5009
5010 /**
5011 * Gets the connection related to the callback.
5012 *
5013 * @param callback the callback to look up
5014 * @return the related connection
5015 */
5016 @Nullable
5017 private QosCallbackConnection getQosCallbackConnection(final QosCallback callback) {
5018 for (final QosCallbackConnection connection : mQosCallbackConnections) {
5019 // Checking by reference here is intentional
5020 if (connection.getCallback() == callback) {
5021 return connection;
5022 }
5023 }
5024 return null;
5025 }
5026
5027 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08005028 * Request a network to satisfy a set of {@link NetworkCapabilities}, but
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005029 * does not cause any networks to retain the NET_CAPABILITY_FOREGROUND capability. This can
5030 * be used to request that the system provide a network without causing the network to be
5031 * in the foreground.
5032 *
5033 * <p>This method will attempt to find the best network that matches the passed
5034 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
5035 * criteria. The platform will evaluate which network is the best at its own discretion.
5036 * Throughput, latency, cost per byte, policy, user preference and other considerations
5037 * may be factored in the decision of what is considered the best network.
5038 *
5039 * <p>As long as this request is outstanding, the platform will try to maintain the best network
5040 * matching this request, while always attempting to match the request to a better network if
5041 * possible. If a better match is found, the platform will switch this request to the now-best
5042 * network and inform the app of the newly best network by invoking
5043 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
5044 * will not try to maintain any other network than the best one currently matching the request:
5045 * a network not matching any network request may be disconnected at any time.
5046 *
5047 * <p>For example, an application could use this method to obtain a connected cellular network
5048 * even if the device currently has a data connection over Ethernet. This may cause the cellular
5049 * radio to consume additional power. Or, an application could inform the system that it wants
5050 * a network supporting sending MMSes and have the system let it know about the currently best
5051 * MMS-supporting network through the provided {@link NetworkCallback}.
5052 *
5053 * <p>The status of the request can be followed by listening to the various callbacks described
5054 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
5055 * used to direct traffic to the network (although accessing some networks may be subject to
5056 * holding specific permissions). Callers will learn about the specific characteristics of the
5057 * network through
5058 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
5059 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
5060 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
5061 * matching the request at any given time; therefore when a better network matching the request
5062 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
5063 * with the new network after which no further updates are given about the previously-best
5064 * network, unless it becomes the best again at some later time. All callbacks are invoked
5065 * in order on the same thread, which by default is a thread created by the framework running
5066 * in the app.
5067 *
5068 * <p>This{@link NetworkRequest} will live until released via
5069 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
5070 * which point the system may let go of the network at any time.
5071 *
5072 * <p>It is presently unsupported to request a network with mutable
5073 * {@link NetworkCapabilities} such as
5074 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
5075 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
5076 * as these {@code NetworkCapabilities} represent states that a particular
5077 * network may never attain, and whether a network will attain these states
5078 * is unknown prior to bringing up the network so the framework does not
5079 * know how to go about satisfying a request with these capabilities.
5080 *
5081 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
5082 * number of outstanding requests to 100 per app (identified by their UID), shared with
5083 * all variants of this method, of {@link #registerNetworkCallback} as well as
5084 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
5085 * Requesting a network with this method will count toward this limit. If this limit is
5086 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
5087 * make sure to unregister the callbacks with
5088 * {@link #unregisterNetworkCallback(NetworkCallback)}.
5089 *
5090 * @param request {@link NetworkRequest} describing this request.
5091 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
5092 * If null, the callback is invoked on the default internal Handler.
5093 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
5094 * the callback must not be shared - it uniquely specifies this request.
5095 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
5096 * @throws SecurityException if missing the appropriate permissions.
5097 * @throws RuntimeException if the app already has too many callbacks registered.
5098 *
5099 * @hide
5100 */
5101 @SystemApi(client = MODULE_LIBRARIES)
5102 @SuppressLint("ExecutorRegistration")
5103 @RequiresPermission(anyOf = {
5104 android.Manifest.permission.NETWORK_SETTINGS,
5105 android.Manifest.permission.NETWORK_STACK,
5106 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5107 })
5108 public void requestBackgroundNetwork(@NonNull NetworkRequest request,
junyulaidbb70462021-03-09 20:49:48 +08005109 @NonNull Handler handler, @NonNull NetworkCallback networkCallback) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005110 final NetworkCapabilities nc = request.networkCapabilities;
5111 sendRequestForNetwork(nc, networkCallback, 0, BACKGROUND_REQUEST,
junyulaidbb70462021-03-09 20:49:48 +08005112 TYPE_NONE, new CallbackHandler(handler));
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005113 }
James Mattis12aeab82021-01-10 14:24:24 -08005114
5115 /**
James Mattis12aeab82021-01-10 14:24:24 -08005116 * Used by automotive devices to set the network preferences used to direct traffic at an
5117 * application level as per the given OemNetworkPreferences. An example use-case would be an
5118 * automotive OEM wanting to provide connectivity for applications critical to the usage of a
5119 * vehicle via a particular network.
5120 *
5121 * Calling this will overwrite the existing preference.
5122 *
5123 * @param preference {@link OemNetworkPreferences} The application network preference to be set.
5124 * @param executor the executor on which listener will be invoked.
5125 * @param listener {@link OnSetOemNetworkPreferenceListener} optional listener used to
5126 * communicate completion of setOemNetworkPreference(). This will only be
5127 * called once upon successful completion of setOemNetworkPreference().
5128 * @throws IllegalArgumentException if {@code preference} contains invalid preference values.
5129 * @throws SecurityException if missing the appropriate permissions.
5130 * @throws UnsupportedOperationException if called on a non-automotive device.
James Mattis6e2d7022021-01-26 16:23:52 -08005131 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005132 */
James Mattis6e2d7022021-01-26 16:23:52 -08005133 @SystemApi
James Mattisa46c1442021-01-26 14:05:36 -08005134 @RequiresPermission(android.Manifest.permission.CONTROL_OEM_PAID_NETWORK_PREFERENCE)
James Mattis6e2d7022021-01-26 16:23:52 -08005135 public void setOemNetworkPreference(@NonNull final OemNetworkPreferences preference,
James Mattis12aeab82021-01-10 14:24:24 -08005136 @Nullable @CallbackExecutor final Executor executor,
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005137 @Nullable final Runnable listener) {
James Mattis12aeab82021-01-10 14:24:24 -08005138 Objects.requireNonNull(preference, "OemNetworkPreferences must be non-null");
5139 if (null != listener) {
5140 Objects.requireNonNull(executor, "Executor must be non-null");
5141 }
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005142 final IOnCompleteListener listenerInternal = listener == null ? null :
5143 new IOnCompleteListener.Stub() {
James Mattis12aeab82021-01-10 14:24:24 -08005144 @Override
5145 public void onComplete() {
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005146 executor.execute(listener::run);
James Mattis12aeab82021-01-10 14:24:24 -08005147 }
5148 };
5149
5150 try {
5151 mService.setOemNetworkPreference(preference, listenerInternal);
5152 } catch (RemoteException e) {
5153 Log.e(TAG, "setOemNetworkPreference() failed for preference: " + preference.toString());
5154 throw e.rethrowFromSystemServer();
5155 }
5156 }
lucaslin5cdbcfb2021-03-12 00:46:33 +08005157
Chalard Jeanad565e22021-02-25 17:23:40 +09005158 /**
5159 * Request that a user profile is put by default on a network matching a given preference.
5160 *
5161 * See the documentation for the individual preferences for a description of the supported
5162 * behaviors.
5163 *
5164 * @param profile the profile concerned.
5165 * @param preference the preference for this profile.
5166 * @param executor an executor to execute the listener on. Optional if listener is null.
5167 * @param listener an optional listener to listen for completion of the operation.
5168 * @throws IllegalArgumentException if {@code profile} is not a valid user profile.
5169 * @throws SecurityException if missing the appropriate permissions.
5170 * @hide
5171 */
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005172 // This function is for establishing per-profile default networking and can only be called by
5173 // the device policy manager, running as the system server. It would make no sense to call it
5174 // on a context for a user because it does not establish a setting on behalf of a user, rather
5175 // it establishes a setting for a user on behalf of the DPM.
5176 @SuppressLint({"UserHandle"})
5177 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +09005178 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
5179 public void setProfileNetworkPreference(@NonNull final UserHandle profile,
5180 @ProfileNetworkPreference final int preference,
5181 @Nullable @CallbackExecutor final Executor executor,
5182 @Nullable final Runnable listener) {
5183 if (null != listener) {
5184 Objects.requireNonNull(executor, "Pass a non-null executor, or a null listener");
5185 }
5186 final IOnCompleteListener proxy;
5187 if (null == listener) {
5188 proxy = null;
5189 } else {
5190 proxy = new IOnCompleteListener.Stub() {
5191 @Override
5192 public void onComplete() {
5193 executor.execute(listener::run);
5194 }
5195 };
5196 }
5197 try {
5198 mService.setProfileNetworkPreference(profile, preference, proxy);
5199 } catch (RemoteException e) {
5200 throw e.rethrowFromSystemServer();
5201 }
5202 }
5203
lucaslin5cdbcfb2021-03-12 00:46:33 +08005204 // The first network ID of IPSec tunnel interface.
lucaslinc296fcc2021-03-15 17:24:12 +08005205 private static final int TUN_INTF_NETID_START = 0xFC00; // 0xFC00 = 64512
lucaslin5cdbcfb2021-03-12 00:46:33 +08005206 // The network ID range of IPSec tunnel interface.
lucaslinc296fcc2021-03-15 17:24:12 +08005207 private static final int TUN_INTF_NETID_RANGE = 0x0400; // 0x0400 = 1024
lucaslin5cdbcfb2021-03-12 00:46:33 +08005208
5209 /**
5210 * Get the network ID range reserved for IPSec tunnel interfaces.
5211 *
5212 * @return A Range which indicates the network ID range of IPSec tunnel interface.
5213 * @hide
5214 */
5215 @SystemApi(client = MODULE_LIBRARIES)
5216 @NonNull
5217 public static Range<Integer> getIpSecNetIdRange() {
5218 return new Range(TUN_INTF_NETID_START, TUN_INTF_NETID_START + TUN_INTF_NETID_RANGE - 1);
5219 }
lucaslin180f44f2021-03-12 16:11:27 +08005220
5221 /**
5222 * Get private DNS mode from settings.
5223 *
lucaslindebfe602021-03-17 14:53:35 +08005224 * @param context The Context to query the private DNS mode from settings.
lucaslin180f44f2021-03-12 16:11:27 +08005225 * @return A string of private DNS mode as one of the PRIVATE_DNS_MODE_* constants.
5226 *
5227 * @hide
5228 */
5229 @SystemApi(client = MODULE_LIBRARIES)
5230 @NonNull
5231 @PrivateDnsMode
lucaslin2a4c17c2021-03-16 17:11:14 +08005232 public static String getPrivateDnsMode(@NonNull Context context) {
5233 final ContentResolver cr = context.getContentResolver();
lucaslin180f44f2021-03-12 16:11:27 +08005234 String mode = Settings.Global.getString(cr, PRIVATE_DNS_MODE);
5235 if (TextUtils.isEmpty(mode)) mode = Settings.Global.getString(cr, PRIVATE_DNS_DEFAULT_MODE);
5236 // If both PRIVATE_DNS_MODE and PRIVATE_DNS_DEFAULT_MODE are not set, choose
5237 // PRIVATE_DNS_MODE_OPPORTUNISTIC as default mode.
5238 if (TextUtils.isEmpty(mode)) mode = PRIVATE_DNS_MODE_OPPORTUNISTIC;
5239 return mode;
5240 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005241}