blob: 9f9ee959957a2b0d431481bae98f79302c557d05 [file] [log] [blame]
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16package android.net;
17
18import static android.annotation.SystemApi.Client.MODULE_LIBRARIES;
Sooraj Sasindranf4a58dc2022-01-21 13:37:08 -080019import static android.net.NetworkCapabilities.NET_ENTERPRISE_ID_1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090020import static android.net.NetworkRequest.Type.BACKGROUND_REQUEST;
21import static android.net.NetworkRequest.Type.LISTEN;
junyulai7664f622021-03-12 20:05:08 +080022import static android.net.NetworkRequest.Type.LISTEN_FOR_BEST;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090023import static android.net.NetworkRequest.Type.REQUEST;
24import static android.net.NetworkRequest.Type.TRACK_DEFAULT;
Lorenzo Colittia77d05e2021-01-29 20:14:04 +090025import static android.net.NetworkRequest.Type.TRACK_SYSTEM_DEFAULT;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090026import static android.net.QosCallback.QosCallbackRegistrationException;
27
28import android.annotation.CallbackExecutor;
29import android.annotation.IntDef;
30import android.annotation.NonNull;
31import android.annotation.Nullable;
32import android.annotation.RequiresPermission;
33import android.annotation.SdkConstant;
34import android.annotation.SdkConstant.SdkConstantType;
35import android.annotation.SuppressLint;
36import android.annotation.SystemApi;
37import android.annotation.SystemService;
38import android.app.PendingIntent;
Lorenzo Colitti8ad58122021-03-18 00:54:57 +090039import android.app.admin.DevicePolicyManager;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090040import android.compat.annotation.UnsupportedAppUsage;
Lorenzo Colitti8ad58122021-03-18 00:54:57 +090041import android.content.ComponentName;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090042import android.content.Context;
43import android.content.Intent;
Remi NGUYEN VAN564f7f82021-04-08 16:26:20 +090044import android.net.ConnectivityDiagnosticsManager.DataStallReport.DetectionMethod;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090045import android.net.IpSecManager.UdpEncapsulationSocket;
46import android.net.SocketKeepalive.Callback;
47import android.net.TetheringManager.StartTetheringCallback;
48import android.net.TetheringManager.TetheringEventCallback;
49import android.net.TetheringManager.TetheringRequest;
50import android.os.Binder;
51import android.os.Build;
52import android.os.Build.VERSION_CODES;
53import android.os.Bundle;
54import android.os.Handler;
55import android.os.IBinder;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090056import android.os.Looper;
57import android.os.Message;
58import android.os.Messenger;
59import android.os.ParcelFileDescriptor;
60import android.os.PersistableBundle;
61import android.os.Process;
62import android.os.RemoteException;
63import android.os.ResultReceiver;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090064import android.os.ServiceSpecificException;
Chalard Jeanad565e22021-02-25 17:23:40 +090065import android.os.UserHandle;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090066import android.provider.Settings;
67import android.telephony.SubscriptionManager;
68import android.telephony.TelephonyManager;
69import android.util.ArrayMap;
70import android.util.Log;
71import android.util.Range;
72import android.util.SparseIntArray;
73
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090074import com.android.internal.annotations.GuardedBy;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +090075
76import libcore.net.event.NetworkEventDispatcher;
77
78import java.io.IOException;
79import java.io.UncheckedIOException;
80import java.lang.annotation.Retention;
81import java.lang.annotation.RetentionPolicy;
82import java.net.DatagramSocket;
83import java.net.InetAddress;
84import java.net.InetSocketAddress;
85import java.net.Socket;
86import java.util.ArrayList;
87import java.util.Collection;
88import java.util.HashMap;
89import java.util.List;
90import java.util.Map;
91import java.util.Objects;
92import java.util.concurrent.Executor;
93import java.util.concurrent.ExecutorService;
94import java.util.concurrent.Executors;
95import java.util.concurrent.RejectedExecutionException;
96
97/**
98 * Class that answers queries about the state of network connectivity. It also
99 * notifies applications when network connectivity changes.
100 * <p>
101 * The primary responsibilities of this class are to:
102 * <ol>
103 * <li>Monitor network connections (Wi-Fi, GPRS, UMTS, etc.)</li>
104 * <li>Send broadcast intents when network connectivity changes</li>
105 * <li>Attempt to "fail over" to another network when connectivity to a network
106 * is lost</li>
107 * <li>Provide an API that allows applications to query the coarse-grained or fine-grained
108 * state of the available networks</li>
109 * <li>Provide an API that allows applications to request and select networks for their data
110 * traffic</li>
111 * </ol>
112 */
113@SystemService(Context.CONNECTIVITY_SERVICE)
114public class ConnectivityManager {
115 private static final String TAG = "ConnectivityManager";
116 private static final boolean DEBUG = Log.isLoggable(TAG, Log.DEBUG);
117
118 /**
119 * A change in network connectivity has occurred. A default connection has either
120 * been established or lost. The NetworkInfo for the affected network is
121 * sent as an extra; it should be consulted to see what kind of
122 * connectivity event occurred.
123 * <p/>
124 * Apps targeting Android 7.0 (API level 24) and higher do not receive this
125 * broadcast if they declare the broadcast receiver in their manifest. Apps
126 * will still receive broadcasts if they register their
127 * {@link android.content.BroadcastReceiver} with
128 * {@link android.content.Context#registerReceiver Context.registerReceiver()}
129 * and that context is still valid.
130 * <p/>
131 * If this is a connection that was the result of failing over from a
132 * disconnected network, then the FAILOVER_CONNECTION boolean extra is
133 * set to true.
134 * <p/>
135 * For a loss of connectivity, if the connectivity manager is attempting
136 * to connect (or has already connected) to another network, the
137 * NetworkInfo for the new network is also passed as an extra. This lets
138 * any receivers of the broadcast know that they should not necessarily
139 * tell the user that no data traffic will be possible. Instead, the
140 * receiver should expect another broadcast soon, indicating either that
141 * the failover attempt succeeded (and so there is still overall data
142 * connectivity), or that the failover attempt failed, meaning that all
143 * connectivity has been lost.
144 * <p/>
145 * For a disconnect event, the boolean extra EXTRA_NO_CONNECTIVITY
146 * is set to {@code true} if there are no connected networks at all.
Chalard Jean025f40b2021-10-04 18:33:36 +0900147 * <p />
148 * Note that this broadcast is deprecated and generally tries to implement backwards
149 * compatibility with older versions of Android. As such, it may not reflect new
150 * capabilities of the system, like multiple networks being connected at the same
151 * time, the details of newer technology, or changes in tethering state.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900152 *
153 * @deprecated apps should use the more versatile {@link #requestNetwork},
154 * {@link #registerNetworkCallback} or {@link #registerDefaultNetworkCallback}
155 * functions instead for faster and more detailed updates about the network
156 * changes they care about.
157 */
158 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
159 @Deprecated
160 public static final String CONNECTIVITY_ACTION = "android.net.conn.CONNECTIVITY_CHANGE";
161
162 /**
163 * The device has connected to a network that has presented a captive
164 * portal, which is blocking Internet connectivity. The user was presented
165 * with a notification that network sign in is required,
166 * and the user invoked the notification's action indicating they
167 * desire to sign in to the network. Apps handling this activity should
168 * facilitate signing in to the network. This action includes a
169 * {@link Network} typed extra called {@link #EXTRA_NETWORK} that represents
170 * the network presenting the captive portal; all communication with the
171 * captive portal must be done using this {@code Network} object.
172 * <p/>
173 * This activity includes a {@link CaptivePortal} extra named
174 * {@link #EXTRA_CAPTIVE_PORTAL} that can be used to indicate different
175 * outcomes of the captive portal sign in to the system:
176 * <ul>
177 * <li> When the app handling this action believes the user has signed in to
178 * the network and the captive portal has been dismissed, the app should
179 * call {@link CaptivePortal#reportCaptivePortalDismissed} so the system can
180 * reevaluate the network. If reevaluation finds the network no longer
181 * subject to a captive portal, the network may become the default active
182 * data network.</li>
183 * <li> When the app handling this action believes the user explicitly wants
184 * to ignore the captive portal and the network, the app should call
185 * {@link CaptivePortal#ignoreNetwork}. </li>
186 * </ul>
187 */
188 @SdkConstant(SdkConstantType.ACTIVITY_INTENT_ACTION)
189 public static final String ACTION_CAPTIVE_PORTAL_SIGN_IN = "android.net.conn.CAPTIVE_PORTAL";
190
191 /**
192 * The lookup key for a {@link NetworkInfo} object. Retrieve with
193 * {@link android.content.Intent#getParcelableExtra(String)}.
194 *
195 * @deprecated The {@link NetworkInfo} object is deprecated, as many of its properties
196 * can't accurately represent modern network characteristics.
197 * Please obtain information about networks from the {@link NetworkCapabilities}
198 * or {@link LinkProperties} objects instead.
199 */
200 @Deprecated
201 public static final String EXTRA_NETWORK_INFO = "networkInfo";
202
203 /**
204 * Network type which triggered a {@link #CONNECTIVITY_ACTION} broadcast.
205 *
206 * @see android.content.Intent#getIntExtra(String, int)
207 * @deprecated The network type is not rich enough to represent the characteristics
208 * of modern networks. Please use {@link NetworkCapabilities} instead,
209 * in particular the transports.
210 */
211 @Deprecated
212 public static final String EXTRA_NETWORK_TYPE = "networkType";
213
214 /**
215 * The lookup key for a boolean that indicates whether a connect event
216 * is for a network to which the connectivity manager was failing over
217 * following a disconnect on another network.
218 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
219 *
220 * @deprecated See {@link NetworkInfo}.
221 */
222 @Deprecated
223 public static final String EXTRA_IS_FAILOVER = "isFailover";
224 /**
225 * The lookup key for a {@link NetworkInfo} object. This is supplied when
226 * there is another network that it may be possible to connect to. Retrieve with
227 * {@link android.content.Intent#getParcelableExtra(String)}.
228 *
229 * @deprecated See {@link NetworkInfo}.
230 */
231 @Deprecated
232 public static final String EXTRA_OTHER_NETWORK_INFO = "otherNetwork";
233 /**
234 * The lookup key for a boolean that indicates whether there is a
235 * complete lack of connectivity, i.e., no network is available.
236 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
237 */
238 public static final String EXTRA_NO_CONNECTIVITY = "noConnectivity";
239 /**
240 * The lookup key for a string that indicates why an attempt to connect
241 * to a network failed. The string has no particular structure. It is
242 * intended to be used in notifications presented to users. Retrieve
243 * it with {@link android.content.Intent#getStringExtra(String)}.
244 */
245 public static final String EXTRA_REASON = "reason";
246 /**
247 * The lookup key for a string that provides optionally supplied
248 * extra information about the network state. The information
249 * may be passed up from the lower networking layers, and its
250 * meaning may be specific to a particular network type. Retrieve
251 * it with {@link android.content.Intent#getStringExtra(String)}.
252 *
253 * @deprecated See {@link NetworkInfo#getExtraInfo()}.
254 */
255 @Deprecated
256 public static final String EXTRA_EXTRA_INFO = "extraInfo";
257 /**
258 * The lookup key for an int that provides information about
259 * our connection to the internet at large. 0 indicates no connection,
260 * 100 indicates a great connection. Retrieve it with
261 * {@link android.content.Intent#getIntExtra(String, int)}.
262 * {@hide}
263 */
264 public static final String EXTRA_INET_CONDITION = "inetCondition";
265 /**
266 * The lookup key for a {@link CaptivePortal} object included with the
267 * {@link #ACTION_CAPTIVE_PORTAL_SIGN_IN} intent. The {@code CaptivePortal}
268 * object can be used to either indicate to the system that the captive
269 * portal has been dismissed or that the user does not want to pursue
270 * signing in to captive portal. Retrieve it with
271 * {@link android.content.Intent#getParcelableExtra(String)}.
272 */
273 public static final String EXTRA_CAPTIVE_PORTAL = "android.net.extra.CAPTIVE_PORTAL";
274
275 /**
276 * Key for passing a URL to the captive portal login activity.
277 */
278 public static final String EXTRA_CAPTIVE_PORTAL_URL = "android.net.extra.CAPTIVE_PORTAL_URL";
279
280 /**
281 * Key for passing a {@link android.net.captiveportal.CaptivePortalProbeSpec} to the captive
282 * portal login activity.
283 * {@hide}
284 */
285 @SystemApi
286 public static final String EXTRA_CAPTIVE_PORTAL_PROBE_SPEC =
287 "android.net.extra.CAPTIVE_PORTAL_PROBE_SPEC";
288
289 /**
290 * Key for passing a user agent string to the captive portal login activity.
291 * {@hide}
292 */
293 @SystemApi
294 public static final String EXTRA_CAPTIVE_PORTAL_USER_AGENT =
295 "android.net.extra.CAPTIVE_PORTAL_USER_AGENT";
296
297 /**
298 * Broadcast action to indicate the change of data activity status
299 * (idle or active) on a network in a recent period.
300 * The network becomes active when data transmission is started, or
301 * idle if there is no data transmission for a period of time.
302 * {@hide}
303 */
304 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
305 public static final String ACTION_DATA_ACTIVITY_CHANGE =
306 "android.net.conn.DATA_ACTIVITY_CHANGE";
307 /**
308 * The lookup key for an enum that indicates the network device type on which this data activity
309 * change happens.
310 * {@hide}
311 */
312 public static final String EXTRA_DEVICE_TYPE = "deviceType";
313 /**
314 * The lookup key for a boolean that indicates the device is active or not. {@code true} means
315 * it is actively sending or receiving data and {@code false} means it is idle.
316 * {@hide}
317 */
318 public static final String EXTRA_IS_ACTIVE = "isActive";
319 /**
320 * The lookup key for a long that contains the timestamp (nanos) of the radio state change.
321 * {@hide}
322 */
323 public static final String EXTRA_REALTIME_NS = "tsNanos";
324
325 /**
326 * Broadcast Action: The setting for background data usage has changed
327 * values. Use {@link #getBackgroundDataSetting()} to get the current value.
328 * <p>
329 * If an application uses the network in the background, it should listen
330 * for this broadcast and stop using the background data if the value is
331 * {@code false}.
332 * <p>
333 *
334 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability
335 * of background data depends on several combined factors, and
336 * this broadcast is no longer sent. Instead, when background
337 * data is unavailable, {@link #getActiveNetworkInfo()} will now
338 * appear disconnected. During first boot after a platform
339 * upgrade, this broadcast will be sent once if
340 * {@link #getBackgroundDataSetting()} was {@code false} before
341 * the upgrade.
342 */
343 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
344 @Deprecated
345 public static final String ACTION_BACKGROUND_DATA_SETTING_CHANGED =
346 "android.net.conn.BACKGROUND_DATA_SETTING_CHANGED";
347
348 /**
349 * Broadcast Action: The network connection may not be good
350 * uses {@code ConnectivityManager.EXTRA_INET_CONDITION} and
351 * {@code ConnectivityManager.EXTRA_NETWORK_INFO} to specify
352 * the network and it's condition.
353 * @hide
354 */
355 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
356 @UnsupportedAppUsage
357 public static final String INET_CONDITION_ACTION =
358 "android.net.conn.INET_CONDITION_ACTION";
359
360 /**
361 * Broadcast Action: A tetherable connection has come or gone.
362 * Uses {@code ConnectivityManager.EXTRA_AVAILABLE_TETHER},
363 * {@code ConnectivityManager.EXTRA_ACTIVE_LOCAL_ONLY},
364 * {@code ConnectivityManager.EXTRA_ACTIVE_TETHER}, and
365 * {@code ConnectivityManager.EXTRA_ERRORED_TETHER} to indicate
366 * the current state of tethering. Each include a list of
367 * interface names in that state (may be empty).
368 * @hide
369 */
370 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
371 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
372 public static final String ACTION_TETHER_STATE_CHANGED =
373 TetheringManager.ACTION_TETHER_STATE_CHANGED;
374
375 /**
376 * @hide
377 * gives a String[] listing all the interfaces configured for
378 * tethering and currently available for tethering.
379 */
380 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
381 public static final String EXTRA_AVAILABLE_TETHER = TetheringManager.EXTRA_AVAILABLE_TETHER;
382
383 /**
384 * @hide
385 * gives a String[] listing all the interfaces currently in local-only
386 * mode (ie, has DHCPv4+IPv6-ULA support and no packet forwarding)
387 */
388 public static final String EXTRA_ACTIVE_LOCAL_ONLY = TetheringManager.EXTRA_ACTIVE_LOCAL_ONLY;
389
390 /**
391 * @hide
392 * gives a String[] listing all the interfaces currently tethered
393 * (ie, has DHCPv4 support and packets potentially forwarded/NATed)
394 */
395 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
396 public static final String EXTRA_ACTIVE_TETHER = TetheringManager.EXTRA_ACTIVE_TETHER;
397
398 /**
399 * @hide
400 * gives a String[] listing all the interfaces we tried to tether and
401 * failed. Use {@link #getLastTetherError} to find the error code
402 * for any interfaces listed here.
403 */
404 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
405 public static final String EXTRA_ERRORED_TETHER = TetheringManager.EXTRA_ERRORED_TETHER;
406
407 /**
408 * Broadcast Action: The captive portal tracker has finished its test.
409 * Sent only while running Setup Wizard, in lieu of showing a user
410 * notification.
411 * @hide
412 */
413 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
414 public static final String ACTION_CAPTIVE_PORTAL_TEST_COMPLETED =
415 "android.net.conn.CAPTIVE_PORTAL_TEST_COMPLETED";
416 /**
417 * The lookup key for a boolean that indicates whether a captive portal was detected.
418 * Retrieve it with {@link android.content.Intent#getBooleanExtra(String,boolean)}.
419 * @hide
420 */
421 public static final String EXTRA_IS_CAPTIVE_PORTAL = "captivePortal";
422
423 /**
424 * Action used to display a dialog that asks the user whether to connect to a network that is
425 * not validated. This intent is used to start the dialog in settings via startActivity.
426 *
lucaslin8bee2fd2021-04-21 10:43:15 +0800427 * This action includes a {@link Network} typed extra which is called
428 * {@link ConnectivityManager#EXTRA_NETWORK} that represents the network which is unvalidated.
429 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900430 * @hide
431 */
lucaslincf6d4502021-03-04 17:09:51 +0800432 @SystemApi(client = MODULE_LIBRARIES)
433 public static final String ACTION_PROMPT_UNVALIDATED = "android.net.action.PROMPT_UNVALIDATED";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900434
435 /**
436 * Action used to display a dialog that asks the user whether to avoid a network that is no
437 * longer validated. This intent is used to start the dialog in settings via startActivity.
438 *
lucaslin8bee2fd2021-04-21 10:43:15 +0800439 * This action includes a {@link Network} typed extra which is called
440 * {@link ConnectivityManager#EXTRA_NETWORK} that represents the network which is no longer
441 * validated.
442 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900443 * @hide
444 */
lucaslincf6d4502021-03-04 17:09:51 +0800445 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900446 public static final String ACTION_PROMPT_LOST_VALIDATION =
lucaslincf6d4502021-03-04 17:09:51 +0800447 "android.net.action.PROMPT_LOST_VALIDATION";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900448
449 /**
450 * Action used to display a dialog that asks the user whether to stay connected to a network
451 * that has not validated. This intent is used to start the dialog in settings via
452 * startActivity.
453 *
lucaslin8bee2fd2021-04-21 10:43:15 +0800454 * This action includes a {@link Network} typed extra which is called
455 * {@link ConnectivityManager#EXTRA_NETWORK} that represents the network which has partial
456 * connectivity.
457 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900458 * @hide
459 */
lucaslincf6d4502021-03-04 17:09:51 +0800460 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900461 public static final String ACTION_PROMPT_PARTIAL_CONNECTIVITY =
lucaslincf6d4502021-03-04 17:09:51 +0800462 "android.net.action.PROMPT_PARTIAL_CONNECTIVITY";
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900463
464 /**
paulhub49c8422021-04-07 16:18:13 +0800465 * Clear DNS Cache Action: This is broadcast when networks have changed and old
466 * DNS entries should be cleared.
467 * @hide
468 */
469 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
470 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
471 public static final String ACTION_CLEAR_DNS_CACHE = "android.net.action.CLEAR_DNS_CACHE";
472
473 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900474 * Invalid tethering type.
475 * @see #startTethering(int, boolean, OnStartTetheringCallback)
476 * @hide
477 */
478 public static final int TETHERING_INVALID = TetheringManager.TETHERING_INVALID;
479
480 /**
481 * Wifi tethering type.
482 * @see #startTethering(int, boolean, OnStartTetheringCallback)
483 * @hide
484 */
485 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900486 public static final int TETHERING_WIFI = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900487
488 /**
489 * USB tethering type.
490 * @see #startTethering(int, boolean, OnStartTetheringCallback)
491 * @hide
492 */
493 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900494 public static final int TETHERING_USB = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900495
496 /**
497 * Bluetooth tethering type.
498 * @see #startTethering(int, boolean, OnStartTetheringCallback)
499 * @hide
500 */
501 @SystemApi
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +0900502 public static final int TETHERING_BLUETOOTH = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900503
504 /**
505 * Wifi P2p tethering type.
506 * Wifi P2p tethering is set through events automatically, and don't
507 * need to start from #startTethering(int, boolean, OnStartTetheringCallback).
508 * @hide
509 */
510 public static final int TETHERING_WIFI_P2P = TetheringManager.TETHERING_WIFI_P2P;
511
512 /**
513 * Extra used for communicating with the TetherService. Includes the type of tethering to
514 * enable if any.
515 * @hide
516 */
517 public static final String EXTRA_ADD_TETHER_TYPE = TetheringConstants.EXTRA_ADD_TETHER_TYPE;
518
519 /**
520 * Extra used for communicating with the TetherService. Includes the type of tethering for
521 * which to cancel provisioning.
522 * @hide
523 */
524 public static final String EXTRA_REM_TETHER_TYPE = TetheringConstants.EXTRA_REM_TETHER_TYPE;
525
526 /**
527 * Extra used for communicating with the TetherService. True to schedule a recheck of tether
528 * provisioning.
529 * @hide
530 */
531 public static final String EXTRA_SET_ALARM = TetheringConstants.EXTRA_SET_ALARM;
532
533 /**
534 * Tells the TetherService to run a provision check now.
535 * @hide
536 */
537 public static final String EXTRA_RUN_PROVISION = TetheringConstants.EXTRA_RUN_PROVISION;
538
539 /**
540 * Extra used for communicating with the TetherService. Contains the {@link ResultReceiver}
541 * which will receive provisioning results. Can be left empty.
542 * @hide
543 */
544 public static final String EXTRA_PROVISION_CALLBACK =
545 TetheringConstants.EXTRA_PROVISION_CALLBACK;
546
547 /**
548 * The absence of a connection type.
549 * @hide
550 */
551 @SystemApi
552 public static final int TYPE_NONE = -1;
553
554 /**
555 * A Mobile data connection. Devices may support more than one.
556 *
557 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
558 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
559 * appropriate network. {@see NetworkCapabilities} for supported transports.
560 */
561 @Deprecated
562 public static final int TYPE_MOBILE = 0;
563
564 /**
565 * A WIFI data connection. Devices may support more than one.
566 *
567 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
568 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
569 * appropriate network. {@see NetworkCapabilities} for supported transports.
570 */
571 @Deprecated
572 public static final int TYPE_WIFI = 1;
573
574 /**
575 * An MMS-specific Mobile data connection. This network type may use the
576 * same network interface as {@link #TYPE_MOBILE} or it may use a different
577 * one. This is used by applications needing to talk to the carrier's
578 * Multimedia Messaging Service servers.
579 *
580 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
581 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
582 * provides the {@link NetworkCapabilities#NET_CAPABILITY_MMS} capability.
583 */
584 @Deprecated
585 public static final int TYPE_MOBILE_MMS = 2;
586
587 /**
588 * A SUPL-specific Mobile data connection. This network type may use the
589 * same network interface as {@link #TYPE_MOBILE} or it may use a different
590 * one. This is used by applications needing to talk to the carrier's
591 * Secure User Plane Location servers for help locating the device.
592 *
593 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
594 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
595 * provides the {@link NetworkCapabilities#NET_CAPABILITY_SUPL} capability.
596 */
597 @Deprecated
598 public static final int TYPE_MOBILE_SUPL = 3;
599
600 /**
601 * A DUN-specific Mobile data connection. This network type may use the
602 * same network interface as {@link #TYPE_MOBILE} or it may use a different
603 * one. This is sometimes by the system when setting up an upstream connection
604 * for tethering so that the carrier is aware of DUN traffic.
605 *
606 * @deprecated Applications should instead use {@link NetworkCapabilities#hasCapability} or
607 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request a network that
608 * provides the {@link NetworkCapabilities#NET_CAPABILITY_DUN} capability.
609 */
610 @Deprecated
611 public static final int TYPE_MOBILE_DUN = 4;
612
613 /**
614 * A High Priority Mobile data connection. This network type uses the
615 * same network interface as {@link #TYPE_MOBILE} but the routing setup
616 * is different.
617 *
618 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
619 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
620 * appropriate network. {@see NetworkCapabilities} for supported transports.
621 */
622 @Deprecated
623 public static final int TYPE_MOBILE_HIPRI = 5;
624
625 /**
626 * A WiMAX data connection.
627 *
628 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
629 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
630 * appropriate network. {@see NetworkCapabilities} for supported transports.
631 */
632 @Deprecated
633 public static final int TYPE_WIMAX = 6;
634
635 /**
636 * A Bluetooth data connection.
637 *
638 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
639 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
640 * appropriate network. {@see NetworkCapabilities} for supported transports.
641 */
642 @Deprecated
643 public static final int TYPE_BLUETOOTH = 7;
644
645 /**
646 * Fake data connection. This should not be used on shipping devices.
647 * @deprecated This is not used any more.
648 */
649 @Deprecated
650 public static final int TYPE_DUMMY = 8;
651
652 /**
653 * An Ethernet data connection.
654 *
655 * @deprecated Applications should instead use {@link NetworkCapabilities#hasTransport} or
656 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} to request an
657 * appropriate network. {@see NetworkCapabilities} for supported transports.
658 */
659 @Deprecated
660 public static final int TYPE_ETHERNET = 9;
661
662 /**
663 * Over the air Administration.
664 * @deprecated Use {@link NetworkCapabilities} instead.
665 * {@hide}
666 */
667 @Deprecated
668 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
669 public static final int TYPE_MOBILE_FOTA = 10;
670
671 /**
672 * IP Multimedia Subsystem.
673 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IMS} instead.
674 * {@hide}
675 */
676 @Deprecated
677 @UnsupportedAppUsage
678 public static final int TYPE_MOBILE_IMS = 11;
679
680 /**
681 * Carrier Branded Services.
682 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_CBS} instead.
683 * {@hide}
684 */
685 @Deprecated
686 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
687 public static final int TYPE_MOBILE_CBS = 12;
688
689 /**
690 * A Wi-Fi p2p connection. Only requesting processes will have access to
691 * the peers connected.
692 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_WIFI_P2P} instead.
693 * {@hide}
694 */
695 @Deprecated
696 @SystemApi
697 public static final int TYPE_WIFI_P2P = 13;
698
699 /**
700 * The network to use for initially attaching to the network
701 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_IA} instead.
702 * {@hide}
703 */
704 @Deprecated
705 @UnsupportedAppUsage
706 public static final int TYPE_MOBILE_IA = 14;
707
708 /**
709 * Emergency PDN connection for emergency services. This
710 * may include IMS and MMS in emergency situations.
711 * @deprecated Use {@link NetworkCapabilities#NET_CAPABILITY_EIMS} instead.
712 * {@hide}
713 */
714 @Deprecated
715 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
716 public static final int TYPE_MOBILE_EMERGENCY = 15;
717
718 /**
719 * The network that uses proxy to achieve connectivity.
720 * @deprecated Use {@link NetworkCapabilities} instead.
721 * {@hide}
722 */
723 @Deprecated
724 @SystemApi
725 public static final int TYPE_PROXY = 16;
726
727 /**
728 * A virtual network using one or more native bearers.
729 * It may or may not be providing security services.
730 * @deprecated Applications should use {@link NetworkCapabilities#TRANSPORT_VPN} instead.
731 */
732 @Deprecated
733 public static final int TYPE_VPN = 17;
734
735 /**
736 * A network that is exclusively meant to be used for testing
737 *
738 * @deprecated Use {@link NetworkCapabilities} instead.
739 * @hide
740 */
741 @Deprecated
742 public static final int TYPE_TEST = 18; // TODO: Remove this once NetworkTypes are unused.
743
744 /**
745 * @deprecated Use {@link NetworkCapabilities} instead.
746 * @hide
747 */
748 @Deprecated
749 @Retention(RetentionPolicy.SOURCE)
750 @IntDef(prefix = { "TYPE_" }, value = {
751 TYPE_NONE,
752 TYPE_MOBILE,
753 TYPE_WIFI,
754 TYPE_MOBILE_MMS,
755 TYPE_MOBILE_SUPL,
756 TYPE_MOBILE_DUN,
757 TYPE_MOBILE_HIPRI,
758 TYPE_WIMAX,
759 TYPE_BLUETOOTH,
760 TYPE_DUMMY,
761 TYPE_ETHERNET,
762 TYPE_MOBILE_FOTA,
763 TYPE_MOBILE_IMS,
764 TYPE_MOBILE_CBS,
765 TYPE_WIFI_P2P,
766 TYPE_MOBILE_IA,
767 TYPE_MOBILE_EMERGENCY,
768 TYPE_PROXY,
769 TYPE_VPN,
770 TYPE_TEST
771 })
772 public @interface LegacyNetworkType {}
773
774 // Deprecated constants for return values of startUsingNetworkFeature. They used to live
775 // in com.android.internal.telephony.PhoneConstants until they were made inaccessible.
776 private static final int DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE = 0;
777 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED = 1;
778 private static final int DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED = 3;
779
780 /** {@hide} */
781 public static final int MAX_RADIO_TYPE = TYPE_TEST;
782
783 /** {@hide} */
784 public static final int MAX_NETWORK_TYPE = TYPE_TEST;
785
786 private static final int MIN_NETWORK_TYPE = TYPE_MOBILE;
787
788 /**
789 * If you want to set the default network preference,you can directly
790 * change the networkAttributes array in framework's config.xml.
791 *
792 * @deprecated Since we support so many more networks now, the single
793 * network default network preference can't really express
794 * the hierarchy. Instead, the default is defined by the
795 * networkAttributes in config.xml. You can determine
796 * the current value by calling {@link #getNetworkPreference()}
797 * from an App.
798 */
799 @Deprecated
800 public static final int DEFAULT_NETWORK_PREFERENCE = TYPE_WIFI;
801
802 /**
803 * @hide
804 */
805 public static final int REQUEST_ID_UNSET = 0;
806
807 /**
808 * Static unique request used as a tombstone for NetworkCallbacks that have been unregistered.
809 * This allows to distinguish when unregistering NetworkCallbacks those that were never
810 * registered from those that were already unregistered.
811 * @hide
812 */
813 private static final NetworkRequest ALREADY_UNREGISTERED =
814 new NetworkRequest.Builder().clearCapabilities().build();
815
816 /**
817 * A NetID indicating no Network is selected.
818 * Keep in sync with bionic/libc/dns/include/resolv_netid.h
819 * @hide
820 */
821 public static final int NETID_UNSET = 0;
822
823 /**
Sudheer Shanka1d0d9b42021-03-23 08:12:28 +0000824 * Flag to indicate that an app is not subject to any restrictions that could result in its
825 * network access blocked.
826 *
827 * @hide
828 */
829 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
830 public static final int BLOCKED_REASON_NONE = 0;
831
832 /**
833 * Flag to indicate that an app is subject to Battery saver restrictions that would
834 * result in its network access being blocked.
835 *
836 * @hide
837 */
838 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
839 public static final int BLOCKED_REASON_BATTERY_SAVER = 1 << 0;
840
841 /**
842 * Flag to indicate that an app is subject to Doze restrictions that would
843 * result in its network access being blocked.
844 *
845 * @hide
846 */
847 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
848 public static final int BLOCKED_REASON_DOZE = 1 << 1;
849
850 /**
851 * Flag to indicate that an app is subject to App Standby restrictions that would
852 * result in its network access being blocked.
853 *
854 * @hide
855 */
856 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
857 public static final int BLOCKED_REASON_APP_STANDBY = 1 << 2;
858
859 /**
860 * Flag to indicate that an app is subject to Restricted mode restrictions that would
861 * result in its network access being blocked.
862 *
863 * @hide
864 */
865 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
866 public static final int BLOCKED_REASON_RESTRICTED_MODE = 1 << 3;
867
868 /**
Lorenzo Colitti8ad58122021-03-18 00:54:57 +0900869 * Flag to indicate that an app is blocked because it is subject to an always-on VPN but the VPN
870 * is not currently connected.
871 *
872 * @see DevicePolicyManager#setAlwaysOnVpnPackage(ComponentName, String, boolean)
873 *
874 * @hide
875 */
876 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
877 public static final int BLOCKED_REASON_LOCKDOWN_VPN = 1 << 4;
878
879 /**
Robert Horvath2dac9482021-11-15 15:49:37 +0100880 * Flag to indicate that an app is subject to Low Power Standby restrictions that would
881 * result in its network access being blocked.
882 *
883 * @hide
884 */
885 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
886 public static final int BLOCKED_REASON_LOW_POWER_STANDBY = 1 << 5;
887
888 /**
Sudheer Shanka1d0d9b42021-03-23 08:12:28 +0000889 * Flag to indicate that an app is subject to Data saver restrictions that would
890 * result in its metered network access being blocked.
891 *
892 * @hide
893 */
894 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
895 public static final int BLOCKED_METERED_REASON_DATA_SAVER = 1 << 16;
896
897 /**
898 * Flag to indicate that an app is subject to user restrictions that would
899 * result in its metered network access being blocked.
900 *
901 * @hide
902 */
903 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
904 public static final int BLOCKED_METERED_REASON_USER_RESTRICTED = 1 << 17;
905
906 /**
907 * Flag to indicate that an app is subject to Device admin restrictions that would
908 * result in its metered network access being blocked.
909 *
910 * @hide
911 */
912 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
913 public static final int BLOCKED_METERED_REASON_ADMIN_DISABLED = 1 << 18;
914
915 /**
916 * @hide
917 */
918 @Retention(RetentionPolicy.SOURCE)
919 @IntDef(flag = true, prefix = {"BLOCKED_"}, value = {
920 BLOCKED_REASON_NONE,
921 BLOCKED_REASON_BATTERY_SAVER,
922 BLOCKED_REASON_DOZE,
923 BLOCKED_REASON_APP_STANDBY,
924 BLOCKED_REASON_RESTRICTED_MODE,
Lorenzo Colittia1bd6f62021-03-25 23:17:36 +0900925 BLOCKED_REASON_LOCKDOWN_VPN,
Robert Horvath2dac9482021-11-15 15:49:37 +0100926 BLOCKED_REASON_LOW_POWER_STANDBY,
Sudheer Shanka1d0d9b42021-03-23 08:12:28 +0000927 BLOCKED_METERED_REASON_DATA_SAVER,
928 BLOCKED_METERED_REASON_USER_RESTRICTED,
929 BLOCKED_METERED_REASON_ADMIN_DISABLED,
930 })
931 public @interface BlockedReason {}
932
Lorenzo Colitti8ad58122021-03-18 00:54:57 +0900933 /**
934 * Set of blocked reasons that are only applicable on metered networks.
935 *
936 * @hide
937 */
938 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
939 public static final int BLOCKED_METERED_REASON_MASK = 0xffff0000;
940
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900941 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
942 private final IConnectivityManager mService;
Lorenzo Colitti842075e2021-02-04 17:32:07 +0900943
Robert Horvathd945bf02022-01-27 19:55:16 +0100944 // LINT.IfChange(firewall_chain)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +0900945 /**
markchiene1561fa2021-12-09 22:00:56 +0800946 * Firewall chain for device idle (doze mode).
947 * Allowlist of apps that have network access in device idle.
948 * @hide
949 */
950 @SystemApi(client = MODULE_LIBRARIES)
951 public static final int FIREWALL_CHAIN_DOZABLE = 1;
952
953 /**
954 * Firewall chain used for app standby.
955 * Denylist of apps that do not have network access.
956 * @hide
957 */
958 @SystemApi(client = MODULE_LIBRARIES)
959 public static final int FIREWALL_CHAIN_STANDBY = 2;
960
961 /**
962 * Firewall chain used for battery saver.
963 * Allowlist of apps that have network access when battery saver is on.
964 * @hide
965 */
966 @SystemApi(client = MODULE_LIBRARIES)
967 public static final int FIREWALL_CHAIN_POWERSAVE = 3;
968
969 /**
970 * Firewall chain used for restricted networking mode.
971 * Allowlist of apps that have access in restricted networking mode.
972 * @hide
973 */
974 @SystemApi(client = MODULE_LIBRARIES)
975 public static final int FIREWALL_CHAIN_RESTRICTED = 4;
976
Robert Horvath34cba142022-01-27 19:52:43 +0100977 /**
978 * Firewall chain used for low power standby.
979 * Allowlist of apps that have access in low power standby.
980 * @hide
981 */
982 @SystemApi(client = MODULE_LIBRARIES)
983 public static final int FIREWALL_CHAIN_LOW_POWER_STANDBY = 5;
984
Motomu Utsumib08654c2022-05-11 05:56:26 +0000985 /**
986 * Firewall chain used for lockdown VPN.
987 * Denylist of apps that cannot receive incoming packets except on loopback because they are
988 * subject to an always-on VPN which is not currently connected.
989 *
990 * @see #BLOCKED_REASON_LOCKDOWN_VPN
991 * @hide
992 */
993 public static final int FIREWALL_CHAIN_LOCKDOWN_VPN = 6;
994
markchiene1561fa2021-12-09 22:00:56 +0800995 /** @hide */
996 @Retention(RetentionPolicy.SOURCE)
997 @IntDef(flag = false, prefix = "FIREWALL_CHAIN_", value = {
998 FIREWALL_CHAIN_DOZABLE,
999 FIREWALL_CHAIN_STANDBY,
1000 FIREWALL_CHAIN_POWERSAVE,
Robert Horvath34cba142022-01-27 19:52:43 +01001001 FIREWALL_CHAIN_RESTRICTED,
Motomu Utsumib08654c2022-05-11 05:56:26 +00001002 FIREWALL_CHAIN_LOW_POWER_STANDBY,
1003 FIREWALL_CHAIN_LOCKDOWN_VPN
markchiene1561fa2021-12-09 22:00:56 +08001004 })
1005 public @interface FirewallChain {}
Robert Horvathd945bf02022-01-27 19:55:16 +01001006 // LINT.ThenChange(packages/modules/Connectivity/service/native/include/Common.h)
markchiene1561fa2021-12-09 22:00:56 +08001007
1008 /**
markchien011a7f52022-03-29 01:07:22 +08001009 * A firewall rule which allows or drops packets depending on existing policy.
1010 * Used by {@link #setUidFirewallRule(int, int, int)} to follow existing policy to handle
1011 * specific uid's packets in specific firewall chain.
markchien3c04e662022-03-22 16:29:56 +08001012 * @hide
1013 */
1014 @SystemApi(client = MODULE_LIBRARIES)
1015 public static final int FIREWALL_RULE_DEFAULT = 0;
1016
1017 /**
markchien011a7f52022-03-29 01:07:22 +08001018 * A firewall rule which allows packets. Used by {@link #setUidFirewallRule(int, int, int)} to
1019 * allow specific uid's packets in specific firewall chain.
markchien3c04e662022-03-22 16:29:56 +08001020 * @hide
1021 */
1022 @SystemApi(client = MODULE_LIBRARIES)
1023 public static final int FIREWALL_RULE_ALLOW = 1;
1024
1025 /**
markchien011a7f52022-03-29 01:07:22 +08001026 * A firewall rule which drops packets. Used by {@link #setUidFirewallRule(int, int, int)} to
1027 * drop specific uid's packets in specific firewall chain.
markchien3c04e662022-03-22 16:29:56 +08001028 * @hide
1029 */
1030 @SystemApi(client = MODULE_LIBRARIES)
1031 public static final int FIREWALL_RULE_DENY = 2;
1032
1033 /** @hide */
1034 @Retention(RetentionPolicy.SOURCE)
1035 @IntDef(flag = false, prefix = "FIREWALL_RULE_", value = {
1036 FIREWALL_RULE_DEFAULT,
1037 FIREWALL_RULE_ALLOW,
1038 FIREWALL_RULE_DENY
1039 })
1040 public @interface FirewallRule {}
1041
1042 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001043 * A kludge to facilitate static access where a Context pointer isn't available, like in the
1044 * case of the static set/getProcessDefaultNetwork methods and from the Network class.
1045 * TODO: Remove this after deprecating the static methods in favor of non-static methods or
1046 * methods that take a Context argument.
1047 */
1048 private static ConnectivityManager sInstance;
1049
1050 private final Context mContext;
1051
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09001052 @GuardedBy("mTetheringEventCallbacks")
1053 private TetheringManager mTetheringManager;
1054
1055 private TetheringManager getTetheringManager() {
1056 synchronized (mTetheringEventCallbacks) {
1057 if (mTetheringManager == null) {
1058 mTetheringManager = mContext.getSystemService(TetheringManager.class);
1059 }
1060 return mTetheringManager;
1061 }
1062 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001063
1064 /**
1065 * Tests if a given integer represents a valid network type.
1066 * @param networkType the type to be tested
1067 * @return a boolean. {@code true} if the type is valid, else {@code false}
1068 * @deprecated All APIs accepting a network type are deprecated. There should be no need to
1069 * validate a network type.
1070 */
1071 @Deprecated
1072 public static boolean isNetworkTypeValid(int networkType) {
1073 return MIN_NETWORK_TYPE <= networkType && networkType <= MAX_NETWORK_TYPE;
1074 }
1075
1076 /**
1077 * Returns a non-localized string representing a given network type.
1078 * ONLY used for debugging output.
1079 * @param type the type needing naming
1080 * @return a String for the given type, or a string version of the type ("87")
1081 * if no name is known.
1082 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
1083 * {@hide}
1084 */
1085 @Deprecated
1086 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1087 public static String getNetworkTypeName(int type) {
1088 switch (type) {
1089 case TYPE_NONE:
1090 return "NONE";
1091 case TYPE_MOBILE:
1092 return "MOBILE";
1093 case TYPE_WIFI:
1094 return "WIFI";
1095 case TYPE_MOBILE_MMS:
1096 return "MOBILE_MMS";
1097 case TYPE_MOBILE_SUPL:
1098 return "MOBILE_SUPL";
1099 case TYPE_MOBILE_DUN:
1100 return "MOBILE_DUN";
1101 case TYPE_MOBILE_HIPRI:
1102 return "MOBILE_HIPRI";
1103 case TYPE_WIMAX:
1104 return "WIMAX";
1105 case TYPE_BLUETOOTH:
1106 return "BLUETOOTH";
1107 case TYPE_DUMMY:
1108 return "DUMMY";
1109 case TYPE_ETHERNET:
1110 return "ETHERNET";
1111 case TYPE_MOBILE_FOTA:
1112 return "MOBILE_FOTA";
1113 case TYPE_MOBILE_IMS:
1114 return "MOBILE_IMS";
1115 case TYPE_MOBILE_CBS:
1116 return "MOBILE_CBS";
1117 case TYPE_WIFI_P2P:
1118 return "WIFI_P2P";
1119 case TYPE_MOBILE_IA:
1120 return "MOBILE_IA";
1121 case TYPE_MOBILE_EMERGENCY:
1122 return "MOBILE_EMERGENCY";
1123 case TYPE_PROXY:
1124 return "PROXY";
1125 case TYPE_VPN:
1126 return "VPN";
1127 default:
1128 return Integer.toString(type);
1129 }
1130 }
1131
1132 /**
1133 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001134 */
lucaslin10774b72021-03-17 14:16:01 +08001135 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001136 public void systemReady() {
1137 try {
1138 mService.systemReady();
1139 } catch (RemoteException e) {
1140 throw e.rethrowFromSystemServer();
1141 }
1142 }
1143
1144 /**
1145 * Checks if a given type uses the cellular data connection.
1146 * This should be replaced in the future by a network property.
1147 * @param networkType the type to check
1148 * @return a boolean - {@code true} if uses cellular network, else {@code false}
1149 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
1150 * {@hide}
1151 */
1152 @Deprecated
1153 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
1154 public static boolean isNetworkTypeMobile(int networkType) {
1155 switch (networkType) {
1156 case TYPE_MOBILE:
1157 case TYPE_MOBILE_MMS:
1158 case TYPE_MOBILE_SUPL:
1159 case TYPE_MOBILE_DUN:
1160 case TYPE_MOBILE_HIPRI:
1161 case TYPE_MOBILE_FOTA:
1162 case TYPE_MOBILE_IMS:
1163 case TYPE_MOBILE_CBS:
1164 case TYPE_MOBILE_IA:
1165 case TYPE_MOBILE_EMERGENCY:
1166 return true;
1167 default:
1168 return false;
1169 }
1170 }
1171
1172 /**
1173 * Checks if the given network type is backed by a Wi-Fi radio.
1174 *
1175 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
1176 * @hide
1177 */
1178 @Deprecated
1179 public static boolean isNetworkTypeWifi(int networkType) {
1180 switch (networkType) {
1181 case TYPE_WIFI:
1182 case TYPE_WIFI_P2P:
1183 return true;
1184 default:
1185 return false;
1186 }
1187 }
1188
1189 /**
Sooraj Sasindran06baf4c2021-11-29 12:21:09 -08001190 * Preference for {@link ProfileNetworkPreference#setPreference(int)}.
1191 * {@see #setProfileNetworkPreferences(UserHandle, List, Executor, Runnable)}
Chalard Jeanad565e22021-02-25 17:23:40 +09001192 * Specify that the traffic for this user should by follow the default rules.
1193 * @hide
1194 */
Chalard Jeanbef6b092021-03-17 14:33:24 +09001195 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +09001196 public static final int PROFILE_NETWORK_PREFERENCE_DEFAULT = 0;
1197
1198 /**
Sooraj Sasindran06baf4c2021-11-29 12:21:09 -08001199 * Preference for {@link ProfileNetworkPreference#setPreference(int)}.
1200 * {@see #setProfileNetworkPreferences(UserHandle, List, Executor, Runnable)}
Chalard Jeanad565e22021-02-25 17:23:40 +09001201 * Specify that the traffic for this user should by default go on a network with
1202 * {@link NetworkCapabilities#NET_CAPABILITY_ENTERPRISE}, and on the system default network
1203 * if no such network is available.
1204 * @hide
1205 */
Chalard Jeanbef6b092021-03-17 14:33:24 +09001206 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +09001207 public static final int PROFILE_NETWORK_PREFERENCE_ENTERPRISE = 1;
1208
Sooraj Sasindran06baf4c2021-11-29 12:21:09 -08001209 /**
1210 * Preference for {@link ProfileNetworkPreference#setPreference(int)}.
1211 * {@see #setProfileNetworkPreferences(UserHandle, List, Executor, Runnable)}
1212 * Specify that the traffic for this user should by default go on a network with
1213 * {@link NetworkCapabilities#NET_CAPABILITY_ENTERPRISE} and if no such network is available
1214 * should not go on the system default network
1215 * @hide
1216 */
1217 @SystemApi(client = MODULE_LIBRARIES)
1218 public static final int PROFILE_NETWORK_PREFERENCE_ENTERPRISE_NO_FALLBACK = 2;
1219
Chalard Jeanad565e22021-02-25 17:23:40 +09001220 /** @hide */
1221 @Retention(RetentionPolicy.SOURCE)
1222 @IntDef(value = {
1223 PROFILE_NETWORK_PREFERENCE_DEFAULT,
Sooraj Sasindran06baf4c2021-11-29 12:21:09 -08001224 PROFILE_NETWORK_PREFERENCE_ENTERPRISE,
1225 PROFILE_NETWORK_PREFERENCE_ENTERPRISE_NO_FALLBACK
Chalard Jeanad565e22021-02-25 17:23:40 +09001226 })
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08001227 public @interface ProfileNetworkPreferencePolicy {
Chalard Jeanad565e22021-02-25 17:23:40 +09001228 }
1229
1230 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001231 * Specifies the preferred network type. When the device has more
1232 * than one type available the preferred network type will be used.
1233 *
1234 * @param preference the network type to prefer over all others. It is
1235 * unspecified what happens to the old preferred network in the
1236 * overall ordering.
1237 * @deprecated Functionality has been removed as it no longer makes sense,
1238 * with many more than two networks - we'd need an array to express
1239 * preference. Instead we use dynamic network properties of
1240 * the networks to describe their precedence.
1241 */
1242 @Deprecated
1243 public void setNetworkPreference(int preference) {
1244 }
1245
1246 /**
1247 * Retrieves the current preferred network type.
1248 *
1249 * @return an integer representing the preferred network type
1250 *
1251 * @deprecated Functionality has been removed as it no longer makes sense,
1252 * with many more than two networks - we'd need an array to express
1253 * preference. Instead we use dynamic network properties of
1254 * the networks to describe their precedence.
1255 */
1256 @Deprecated
1257 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1258 public int getNetworkPreference() {
1259 return TYPE_NONE;
1260 }
1261
1262 /**
1263 * Returns details about the currently active default data network. When
1264 * connected, this network is the default route for outgoing connections.
1265 * You should always check {@link NetworkInfo#isConnected()} before initiating
1266 * network traffic. This may return {@code null} when there is no default
1267 * network.
1268 * Note that if the default network is a VPN, this method will return the
1269 * NetworkInfo for one of its underlying networks instead, or null if the
1270 * VPN agent did not specify any. Apps interested in learning about VPNs
1271 * should use {@link #getNetworkInfo(android.net.Network)} instead.
1272 *
1273 * @return a {@link NetworkInfo} object for the current default network
1274 * or {@code null} if no default network is currently active
1275 * @deprecated See {@link NetworkInfo}.
1276 */
1277 @Deprecated
1278 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1279 @Nullable
1280 public NetworkInfo getActiveNetworkInfo() {
1281 try {
1282 return mService.getActiveNetworkInfo();
1283 } catch (RemoteException e) {
1284 throw e.rethrowFromSystemServer();
1285 }
1286 }
1287
1288 /**
1289 * Returns a {@link Network} object corresponding to the currently active
1290 * default data network. In the event that the current active default data
1291 * network disconnects, the returned {@code Network} object will no longer
1292 * be usable. This will return {@code null} when there is no default
Chalard Jean0d051512021-09-28 15:31:15 +09001293 * network, or when the default network is blocked.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001294 *
1295 * @return a {@link Network} object for the current default network or
Chalard Jean0d051512021-09-28 15:31:15 +09001296 * {@code null} if no default network is currently active or if
1297 * the default network is blocked for the caller
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001298 */
1299 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1300 @Nullable
1301 public Network getActiveNetwork() {
1302 try {
1303 return mService.getActiveNetwork();
1304 } catch (RemoteException e) {
1305 throw e.rethrowFromSystemServer();
1306 }
1307 }
1308
1309 /**
1310 * Returns a {@link Network} object corresponding to the currently active
1311 * default data network for a specific UID. In the event that the default data
1312 * network disconnects, the returned {@code Network} object will no longer
1313 * be usable. This will return {@code null} when there is no default
1314 * network for the UID.
1315 *
1316 * @return a {@link Network} object for the current default network for the
1317 * given UID or {@code null} if no default network is currently active
lifrdb7d6762021-03-30 21:04:53 +08001318 *
1319 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001320 */
1321 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1322 @Nullable
1323 public Network getActiveNetworkForUid(int uid) {
1324 return getActiveNetworkForUid(uid, false);
1325 }
1326
1327 /** {@hide} */
1328 public Network getActiveNetworkForUid(int uid, boolean ignoreBlocked) {
1329 try {
1330 return mService.getActiveNetworkForUid(uid, ignoreBlocked);
1331 } catch (RemoteException e) {
1332 throw e.rethrowFromSystemServer();
1333 }
1334 }
1335
1336 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001337 * Adds or removes a requirement for given UID ranges to use the VPN.
1338 *
1339 * If set to {@code true}, informs the system that the UIDs in the specified ranges must not
1340 * have any connectivity except if a VPN is connected and applies to the UIDs, or if the UIDs
1341 * otherwise have permission to bypass the VPN (e.g., because they have the
1342 * {@link android.Manifest.permission.CONNECTIVITY_USE_RESTRICTED_NETWORKS} permission, or when
1343 * using a socket protected by a method such as {@link VpnService#protect(DatagramSocket)}. If
1344 * set to {@code false}, a previously-added restriction is removed.
1345 * <p>
1346 * Each of the UID ranges specified by this method is added and removed as is, and no processing
1347 * is performed on the ranges to de-duplicate, merge, split, or intersect them. In order to
1348 * remove a previously-added range, the exact range must be removed as is.
1349 * <p>
1350 * The changes are applied asynchronously and may not have been applied by the time the method
1351 * returns. Apps will be notified about any changes that apply to them via
1352 * {@link NetworkCallback#onBlockedStatusChanged} callbacks called after the changes take
1353 * effect.
1354 * <p>
1355 * This method should be called only by the VPN code.
1356 *
1357 * @param ranges the UID ranges to restrict
1358 * @param requireVpn whether the specified UID ranges must use a VPN
1359 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001360 * @hide
1361 */
1362 @RequiresPermission(anyOf = {
1363 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
lucaslin97fb10a2021-03-22 11:51:27 +08001364 android.Manifest.permission.NETWORK_STACK,
1365 android.Manifest.permission.NETWORK_SETTINGS})
1366 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001367 public void setRequireVpnForUids(boolean requireVpn,
1368 @NonNull Collection<Range<Integer>> ranges) {
1369 Objects.requireNonNull(ranges);
1370 // The Range class is not parcelable. Convert to UidRange, which is what is used internally.
1371 // This method is not necessarily expected to be used outside the system server, so
1372 // parceling may not be necessary, but it could be used out-of-process, e.g., by the network
1373 // stack process, or by tests.
1374 UidRange[] rangesArray = new UidRange[ranges.size()];
1375 int index = 0;
1376 for (Range<Integer> range : ranges) {
1377 rangesArray[index++] = new UidRange(range.getLower(), range.getUpper());
1378 }
1379 try {
1380 mService.setRequireVpnForUids(requireVpn, rangesArray);
1381 } catch (RemoteException e) {
1382 throw e.rethrowFromSystemServer();
1383 }
1384 }
1385
1386 /**
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001387 * Informs ConnectivityService of whether the legacy lockdown VPN, as implemented by
1388 * LockdownVpnTracker, is in use. This is deprecated for new devices starting from Android 12
1389 * but is still supported for backwards compatibility.
1390 * <p>
1391 * This type of VPN is assumed always to use the system default network, and must always declare
1392 * exactly one underlying network, which is the network that was the default when the VPN
1393 * connected.
1394 * <p>
1395 * Calling this method with {@code true} enables legacy behaviour, specifically:
1396 * <ul>
1397 * <li>Any VPN that applies to userId 0 behaves specially with respect to deprecated
1398 * {@link #CONNECTIVITY_ACTION} broadcasts. Any such broadcasts will have the state in the
1399 * {@link #EXTRA_NETWORK_INFO} replaced by state of the VPN network. Also, any time the VPN
1400 * connects, a {@link #CONNECTIVITY_ACTION} broadcast will be sent for the network
1401 * underlying the VPN.</li>
1402 * <li>Deprecated APIs that return {@link NetworkInfo} objects will have their state
1403 * similarly replaced by the VPN network state.</li>
1404 * <li>Information on current network interfaces passed to NetworkStatsService will not
1405 * include any VPN interfaces.</li>
1406 * </ul>
1407 *
1408 * @param enabled whether legacy lockdown VPN is enabled or disabled
1409 *
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001410 * @hide
1411 */
1412 @RequiresPermission(anyOf = {
1413 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
lucaslin97fb10a2021-03-22 11:51:27 +08001414 android.Manifest.permission.NETWORK_STACK,
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001415 android.Manifest.permission.NETWORK_SETTINGS})
lucaslin97fb10a2021-03-22 11:51:27 +08001416 @SystemApi(client = MODULE_LIBRARIES)
Lorenzo Colittic71cff82021-01-15 01:29:01 +09001417 public void setLegacyLockdownVpnEnabled(boolean enabled) {
1418 try {
1419 mService.setLegacyLockdownVpnEnabled(enabled);
1420 } catch (RemoteException e) {
1421 throw e.rethrowFromSystemServer();
1422 }
1423 }
1424
1425 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001426 * Returns details about the currently active default data network
1427 * for a given uid. This is for internal use only to avoid spying
1428 * other apps.
1429 *
1430 * @return a {@link NetworkInfo} object for the current default network
1431 * for the given uid or {@code null} if no default network is
1432 * available for the specified uid.
1433 *
1434 * {@hide}
1435 */
1436 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
1437 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1438 public NetworkInfo getActiveNetworkInfoForUid(int uid) {
1439 return getActiveNetworkInfoForUid(uid, false);
1440 }
1441
1442 /** {@hide} */
1443 public NetworkInfo getActiveNetworkInfoForUid(int uid, boolean ignoreBlocked) {
1444 try {
1445 return mService.getActiveNetworkInfoForUid(uid, ignoreBlocked);
1446 } catch (RemoteException e) {
1447 throw e.rethrowFromSystemServer();
1448 }
1449 }
1450
1451 /**
1452 * Returns connection status information about a particular
1453 * network type.
1454 *
1455 * @param networkType integer specifying which networkType in
1456 * which you're interested.
1457 * @return a {@link NetworkInfo} object for the requested
1458 * network type or {@code null} if the type is not
1459 * supported by the device. If {@code networkType} is
1460 * TYPE_VPN and a VPN is active for the calling app,
1461 * then this method will try to return one of the
1462 * underlying networks for the VPN or null if the
1463 * VPN agent didn't specify any.
1464 *
1465 * @deprecated This method does not support multiple connected networks
1466 * of the same type. Use {@link #getAllNetworks} and
1467 * {@link #getNetworkInfo(android.net.Network)} instead.
1468 */
1469 @Deprecated
1470 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1471 @Nullable
1472 public NetworkInfo getNetworkInfo(int networkType) {
1473 try {
1474 return mService.getNetworkInfo(networkType);
1475 } catch (RemoteException e) {
1476 throw e.rethrowFromSystemServer();
1477 }
1478 }
1479
1480 /**
1481 * Returns connection status information about a particular
1482 * Network.
1483 *
1484 * @param network {@link Network} specifying which network
1485 * in which you're interested.
1486 * @return a {@link NetworkInfo} object for the requested
1487 * network or {@code null} if the {@code Network}
1488 * is not valid.
1489 * @deprecated See {@link NetworkInfo}.
1490 */
1491 @Deprecated
1492 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1493 @Nullable
1494 public NetworkInfo getNetworkInfo(@Nullable Network network) {
1495 return getNetworkInfoForUid(network, Process.myUid(), false);
1496 }
1497
1498 /** {@hide} */
1499 public NetworkInfo getNetworkInfoForUid(Network network, int uid, boolean ignoreBlocked) {
1500 try {
1501 return mService.getNetworkInfoForUid(network, uid, ignoreBlocked);
1502 } catch (RemoteException e) {
1503 throw e.rethrowFromSystemServer();
1504 }
1505 }
1506
1507 /**
1508 * Returns connection status information about all network
1509 * types supported by the device.
1510 *
1511 * @return an array of {@link NetworkInfo} objects. Check each
1512 * {@link NetworkInfo#getType} for which type each applies.
1513 *
1514 * @deprecated This method does not support multiple connected networks
1515 * of the same type. Use {@link #getAllNetworks} and
1516 * {@link #getNetworkInfo(android.net.Network)} instead.
1517 */
1518 @Deprecated
1519 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1520 @NonNull
1521 public NetworkInfo[] getAllNetworkInfo() {
1522 try {
1523 return mService.getAllNetworkInfo();
1524 } catch (RemoteException e) {
1525 throw e.rethrowFromSystemServer();
1526 }
1527 }
1528
1529 /**
junyulaib1211372021-03-03 12:09:05 +08001530 * Return a list of {@link NetworkStateSnapshot}s, one for each network that is currently
1531 * connected.
1532 * @hide
1533 */
1534 @SystemApi(client = MODULE_LIBRARIES)
1535 @RequiresPermission(anyOf = {
1536 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1537 android.Manifest.permission.NETWORK_STACK,
1538 android.Manifest.permission.NETWORK_SETTINGS})
1539 @NonNull
Aaron Huangab615e52021-04-17 13:46:25 +08001540 public List<NetworkStateSnapshot> getAllNetworkStateSnapshots() {
junyulaib1211372021-03-03 12:09:05 +08001541 try {
Aaron Huangab615e52021-04-17 13:46:25 +08001542 return mService.getAllNetworkStateSnapshots();
junyulaib1211372021-03-03 12:09:05 +08001543 } catch (RemoteException e) {
1544 throw e.rethrowFromSystemServer();
1545 }
1546 }
1547
1548 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001549 * Returns the {@link Network} object currently serving a given type, or
1550 * null if the given type is not connected.
1551 *
1552 * @hide
1553 * @deprecated This method does not support multiple connected networks
1554 * of the same type. Use {@link #getAllNetworks} and
1555 * {@link #getNetworkInfo(android.net.Network)} instead.
1556 */
1557 @Deprecated
1558 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1559 @UnsupportedAppUsage
1560 public Network getNetworkForType(int networkType) {
1561 try {
1562 return mService.getNetworkForType(networkType);
1563 } catch (RemoteException e) {
1564 throw e.rethrowFromSystemServer();
1565 }
1566 }
1567
1568 /**
1569 * Returns an array of all {@link Network} currently tracked by the
1570 * framework.
1571 *
Lorenzo Colitti86714b12021-05-17 20:31:21 +09001572 * @deprecated This method does not provide any notification of network state changes, forcing
1573 * apps to call it repeatedly. This is inefficient and prone to race conditions.
1574 * Apps should use methods such as
1575 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} instead.
1576 * Apps that desire to obtain information about networks that do not apply to them
1577 * can use {@link NetworkRequest.Builder#setIncludeOtherUidNetworks}.
1578 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001579 * @return an array of {@link Network} objects.
1580 */
1581 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1582 @NonNull
Lorenzo Colitti86714b12021-05-17 20:31:21 +09001583 @Deprecated
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001584 public Network[] getAllNetworks() {
1585 try {
1586 return mService.getAllNetworks();
1587 } catch (RemoteException e) {
1588 throw e.rethrowFromSystemServer();
1589 }
1590 }
1591
1592 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08001593 * Returns an array of {@link NetworkCapabilities} objects, representing
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001594 * the Networks that applications run by the given user will use by default.
1595 * @hide
1596 */
1597 @UnsupportedAppUsage
1598 public NetworkCapabilities[] getDefaultNetworkCapabilitiesForUser(int userId) {
1599 try {
1600 return mService.getDefaultNetworkCapabilitiesForUser(
Roshan Piusa8a477b2020-12-17 14:53:09 -08001601 userId, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001602 } catch (RemoteException e) {
1603 throw e.rethrowFromSystemServer();
1604 }
1605 }
1606
1607 /**
1608 * Returns the IP information for the current default network.
1609 *
1610 * @return a {@link LinkProperties} object describing the IP info
1611 * for the current default network, or {@code null} if there
1612 * is no current default network.
1613 *
1614 * {@hide}
1615 * @deprecated please use {@link #getLinkProperties(Network)} on the return
1616 * value of {@link #getActiveNetwork()} instead. In particular,
1617 * this method will return non-null LinkProperties even if the
1618 * app is blocked by policy from using this network.
1619 */
1620 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1621 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 109783091)
1622 public LinkProperties getActiveLinkProperties() {
1623 try {
1624 return mService.getActiveLinkProperties();
1625 } catch (RemoteException e) {
1626 throw e.rethrowFromSystemServer();
1627 }
1628 }
1629
1630 /**
1631 * Returns the IP information for a given network type.
1632 *
1633 * @param networkType the network type of interest.
1634 * @return a {@link LinkProperties} object describing the IP info
1635 * for the given networkType, or {@code null} if there is
1636 * no current default network.
1637 *
1638 * {@hide}
1639 * @deprecated This method does not support multiple connected networks
1640 * of the same type. Use {@link #getAllNetworks},
1641 * {@link #getNetworkInfo(android.net.Network)}, and
1642 * {@link #getLinkProperties(android.net.Network)} instead.
1643 */
1644 @Deprecated
1645 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1646 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
1647 public LinkProperties getLinkProperties(int networkType) {
1648 try {
1649 return mService.getLinkPropertiesForType(networkType);
1650 } catch (RemoteException e) {
1651 throw e.rethrowFromSystemServer();
1652 }
1653 }
1654
1655 /**
1656 * Get the {@link LinkProperties} for the given {@link Network}. This
1657 * will return {@code null} if the network is unknown.
1658 *
1659 * @param network The {@link Network} object identifying the network in question.
1660 * @return The {@link LinkProperties} for the network, or {@code null}.
1661 */
1662 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1663 @Nullable
1664 public LinkProperties getLinkProperties(@Nullable Network network) {
1665 try {
1666 return mService.getLinkProperties(network);
1667 } catch (RemoteException e) {
1668 throw e.rethrowFromSystemServer();
1669 }
1670 }
1671
1672 /**
lucaslinc582d502022-01-27 09:07:00 +08001673 * Redact {@link LinkProperties} for a given package
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001674 *
lucaslinc582d502022-01-27 09:07:00 +08001675 * Returns an instance of the given {@link LinkProperties} appropriately redacted to send to the
1676 * given package, considering its permissions.
1677 *
1678 * @param lp A {@link LinkProperties} which will be redacted.
1679 * @param uid The target uid.
1680 * @param packageName The name of the package, for appops logging.
1681 * @return A redacted {@link LinkProperties} which is appropriate to send to the given uid,
1682 * or null if the uid lacks the ACCESS_NETWORK_STATE permission.
1683 * @hide
1684 */
1685 @RequiresPermission(anyOf = {
1686 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1687 android.Manifest.permission.NETWORK_STACK,
1688 android.Manifest.permission.NETWORK_SETTINGS})
1689 @SystemApi(client = MODULE_LIBRARIES)
1690 @Nullable
lucaslind2b06132022-03-02 10:56:57 +08001691 public LinkProperties getRedactedLinkPropertiesForPackage(@NonNull LinkProperties lp, int uid,
lucaslinc582d502022-01-27 09:07:00 +08001692 @NonNull String packageName) {
1693 try {
lucaslind2b06132022-03-02 10:56:57 +08001694 return mService.getRedactedLinkPropertiesForPackage(
lucaslinc582d502022-01-27 09:07:00 +08001695 lp, uid, packageName, getAttributionTag());
1696 } catch (RemoteException e) {
1697 throw e.rethrowFromSystemServer();
1698 }
1699 }
1700
1701 /**
1702 * Get the {@link NetworkCapabilities} for the given {@link Network}, or null.
1703 *
1704 * This will remove any location sensitive data in the returned {@link NetworkCapabilities}.
1705 * Some {@link TransportInfo} instances like {@link android.net.wifi.WifiInfo} contain location
1706 * sensitive information. To retrieve this location sensitive information (subject to
1707 * the caller's location permissions), use a {@link NetworkCallback} with the
1708 * {@link NetworkCallback#FLAG_INCLUDE_LOCATION_INFO} flag instead.
1709 *
1710 * This method returns {@code null} if the network is unknown or if the |network| argument
1711 * is null.
Roshan Piuse08bc182020-12-22 15:10:42 -08001712 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001713 * @param network The {@link Network} object identifying the network in question.
Roshan Piuse08bc182020-12-22 15:10:42 -08001714 * @return The {@link NetworkCapabilities} for the network, or {@code null}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001715 */
1716 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
1717 @Nullable
1718 public NetworkCapabilities getNetworkCapabilities(@Nullable Network network) {
1719 try {
Roshan Piusa8a477b2020-12-17 14:53:09 -08001720 return mService.getNetworkCapabilities(
1721 network, mContext.getOpPackageName(), getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001722 } catch (RemoteException e) {
1723 throw e.rethrowFromSystemServer();
1724 }
1725 }
1726
1727 /**
lucaslinc582d502022-01-27 09:07:00 +08001728 * Redact {@link NetworkCapabilities} for a given package.
1729 *
1730 * Returns an instance of {@link NetworkCapabilities} that is appropriately redacted to send
lucaslind2b06132022-03-02 10:56:57 +08001731 * to the given package, considering its permissions. If the passed capabilities contain
1732 * location-sensitive information, they will be redacted to the correct degree for the location
1733 * permissions of the app (COARSE or FINE), and will blame the UID accordingly for retrieving
1734 * that level of location. If the UID holds no location permission, the returned object will
1735 * contain no location-sensitive information and the UID is not blamed.
lucaslinc582d502022-01-27 09:07:00 +08001736 *
1737 * @param nc A {@link NetworkCapabilities} instance which will be redacted.
1738 * @param uid The target uid.
1739 * @param packageName The name of the package, for appops logging.
1740 * @return A redacted {@link NetworkCapabilities} which is appropriate to send to the given uid,
1741 * or null if the uid lacks the ACCESS_NETWORK_STATE permission.
1742 * @hide
1743 */
1744 @RequiresPermission(anyOf = {
1745 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
1746 android.Manifest.permission.NETWORK_STACK,
1747 android.Manifest.permission.NETWORK_SETTINGS})
1748 @SystemApi(client = MODULE_LIBRARIES)
1749 @Nullable
lucaslind2b06132022-03-02 10:56:57 +08001750 public NetworkCapabilities getRedactedNetworkCapabilitiesForPackage(
lucaslinc582d502022-01-27 09:07:00 +08001751 @NonNull NetworkCapabilities nc,
1752 int uid, @NonNull String packageName) {
1753 try {
lucaslind2b06132022-03-02 10:56:57 +08001754 return mService.getRedactedNetworkCapabilitiesForPackage(nc, uid, packageName,
lucaslinc582d502022-01-27 09:07:00 +08001755 getAttributionTag());
1756 } catch (RemoteException e) {
1757 throw e.rethrowFromSystemServer();
1758 }
1759 }
1760
1761 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09001762 * Gets a URL that can be used for resolving whether a captive portal is present.
1763 * 1. This URL should respond with a 204 response to a GET request to indicate no captive
1764 * portal is present.
1765 * 2. This URL must be HTTP as redirect responses are used to find captive portal
1766 * sign-in pages. Captive portals cannot respond to HTTPS requests with redirects.
1767 *
1768 * The system network validation may be using different strategies to detect captive portals,
1769 * so this method does not necessarily return a URL used by the system. It only returns a URL
1770 * that may be relevant for other components trying to detect captive portals.
1771 *
1772 * @hide
1773 * @deprecated This API returns URL which is not guaranteed to be one of the URLs used by the
1774 * system.
1775 */
1776 @Deprecated
1777 @SystemApi
1778 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
1779 public String getCaptivePortalServerUrl() {
1780 try {
1781 return mService.getCaptivePortalServerUrl();
1782 } catch (RemoteException e) {
1783 throw e.rethrowFromSystemServer();
1784 }
1785 }
1786
1787 /**
1788 * Tells the underlying networking system that the caller wants to
1789 * begin using the named feature. The interpretation of {@code feature}
1790 * is completely up to each networking implementation.
1791 *
1792 * <p>This method requires the caller to hold either the
1793 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1794 * or the ability to modify system settings as determined by
1795 * {@link android.provider.Settings.System#canWrite}.</p>
1796 *
1797 * @param networkType specifies which network the request pertains to
1798 * @param feature the name of the feature to be used
1799 * @return an integer value representing the outcome of the request.
1800 * The interpretation of this value is specific to each networking
1801 * implementation+feature combination, except that the value {@code -1}
1802 * always indicates failure.
1803 *
1804 * @deprecated Deprecated in favor of the cleaner
1805 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} API.
1806 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1807 * throw {@code UnsupportedOperationException} if called.
1808 * @removed
1809 */
1810 @Deprecated
1811 public int startUsingNetworkFeature(int networkType, String feature) {
1812 checkLegacyRoutingApiAccess();
1813 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1814 if (netCap == null) {
1815 Log.d(TAG, "Can't satisfy startUsingNetworkFeature for " + networkType + ", " +
1816 feature);
1817 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1818 }
1819
1820 NetworkRequest request = null;
1821 synchronized (sLegacyRequests) {
1822 LegacyRequest l = sLegacyRequests.get(netCap);
1823 if (l != null) {
1824 Log.d(TAG, "renewing startUsingNetworkFeature request " + l.networkRequest);
1825 renewRequestLocked(l);
1826 if (l.currentNetwork != null) {
1827 return DEPRECATED_PHONE_CONSTANT_APN_ALREADY_ACTIVE;
1828 } else {
1829 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1830 }
1831 }
1832
1833 request = requestNetworkForFeatureLocked(netCap);
1834 }
1835 if (request != null) {
1836 Log.d(TAG, "starting startUsingNetworkFeature for request " + request);
1837 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_STARTED;
1838 } else {
1839 Log.d(TAG, " request Failed");
1840 return DEPRECATED_PHONE_CONSTANT_APN_REQUEST_FAILED;
1841 }
1842 }
1843
1844 /**
1845 * Tells the underlying networking system that the caller is finished
1846 * using the named feature. The interpretation of {@code feature}
1847 * is completely up to each networking implementation.
1848 *
1849 * <p>This method requires the caller to hold either the
1850 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
1851 * or the ability to modify system settings as determined by
1852 * {@link android.provider.Settings.System#canWrite}.</p>
1853 *
1854 * @param networkType specifies which network the request pertains to
1855 * @param feature the name of the feature that is no longer needed
1856 * @return an integer value representing the outcome of the request.
1857 * The interpretation of this value is specific to each networking
1858 * implementation+feature combination, except that the value {@code -1}
1859 * always indicates failure.
1860 *
1861 * @deprecated Deprecated in favor of the cleaner
1862 * {@link #unregisterNetworkCallback(NetworkCallback)} API.
1863 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
1864 * throw {@code UnsupportedOperationException} if called.
1865 * @removed
1866 */
1867 @Deprecated
1868 public int stopUsingNetworkFeature(int networkType, String feature) {
1869 checkLegacyRoutingApiAccess();
1870 NetworkCapabilities netCap = networkCapabilitiesForFeature(networkType, feature);
1871 if (netCap == null) {
1872 Log.d(TAG, "Can't satisfy stopUsingNetworkFeature for " + networkType + ", " +
1873 feature);
1874 return -1;
1875 }
1876
1877 if (removeRequestForFeature(netCap)) {
1878 Log.d(TAG, "stopUsingNetworkFeature for " + networkType + ", " + feature);
1879 }
1880 return 1;
1881 }
1882
1883 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1884 private NetworkCapabilities networkCapabilitiesForFeature(int networkType, String feature) {
1885 if (networkType == TYPE_MOBILE) {
1886 switch (feature) {
1887 case "enableCBS":
1888 return networkCapabilitiesForType(TYPE_MOBILE_CBS);
1889 case "enableDUN":
1890 case "enableDUNAlways":
1891 return networkCapabilitiesForType(TYPE_MOBILE_DUN);
1892 case "enableFOTA":
1893 return networkCapabilitiesForType(TYPE_MOBILE_FOTA);
1894 case "enableHIPRI":
1895 return networkCapabilitiesForType(TYPE_MOBILE_HIPRI);
1896 case "enableIMS":
1897 return networkCapabilitiesForType(TYPE_MOBILE_IMS);
1898 case "enableMMS":
1899 return networkCapabilitiesForType(TYPE_MOBILE_MMS);
1900 case "enableSUPL":
1901 return networkCapabilitiesForType(TYPE_MOBILE_SUPL);
1902 default:
1903 return null;
1904 }
1905 } else if (networkType == TYPE_WIFI && "p2p".equals(feature)) {
1906 return networkCapabilitiesForType(TYPE_WIFI_P2P);
1907 }
1908 return null;
1909 }
1910
1911 private int legacyTypeForNetworkCapabilities(NetworkCapabilities netCap) {
1912 if (netCap == null) return TYPE_NONE;
1913 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_CBS)) {
1914 return TYPE_MOBILE_CBS;
1915 }
1916 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_IMS)) {
1917 return TYPE_MOBILE_IMS;
1918 }
1919 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_FOTA)) {
1920 return TYPE_MOBILE_FOTA;
1921 }
1922 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_DUN)) {
1923 return TYPE_MOBILE_DUN;
1924 }
1925 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_SUPL)) {
1926 return TYPE_MOBILE_SUPL;
1927 }
1928 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_MMS)) {
1929 return TYPE_MOBILE_MMS;
1930 }
1931 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_INTERNET)) {
1932 return TYPE_MOBILE_HIPRI;
1933 }
1934 if (netCap.hasCapability(NetworkCapabilities.NET_CAPABILITY_WIFI_P2P)) {
1935 return TYPE_WIFI_P2P;
1936 }
1937 return TYPE_NONE;
1938 }
1939
1940 private static class LegacyRequest {
1941 NetworkCapabilities networkCapabilities;
1942 NetworkRequest networkRequest;
1943 int expireSequenceNumber;
1944 Network currentNetwork;
1945 int delay = -1;
1946
1947 private void clearDnsBinding() {
1948 if (currentNetwork != null) {
1949 currentNetwork = null;
1950 setProcessDefaultNetworkForHostResolution(null);
1951 }
1952 }
1953
1954 NetworkCallback networkCallback = new NetworkCallback() {
1955 @Override
1956 public void onAvailable(Network network) {
1957 currentNetwork = network;
1958 Log.d(TAG, "startUsingNetworkFeature got Network:" + network);
1959 setProcessDefaultNetworkForHostResolution(network);
1960 }
1961 @Override
1962 public void onLost(Network network) {
1963 if (network.equals(currentNetwork)) clearDnsBinding();
1964 Log.d(TAG, "startUsingNetworkFeature lost Network:" + network);
1965 }
1966 };
1967 }
1968
1969 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1970 private static final HashMap<NetworkCapabilities, LegacyRequest> sLegacyRequests =
1971 new HashMap<>();
1972
1973 private NetworkRequest findRequestForFeature(NetworkCapabilities netCap) {
1974 synchronized (sLegacyRequests) {
1975 LegacyRequest l = sLegacyRequests.get(netCap);
1976 if (l != null) return l.networkRequest;
1977 }
1978 return null;
1979 }
1980
1981 private void renewRequestLocked(LegacyRequest l) {
1982 l.expireSequenceNumber++;
1983 Log.d(TAG, "renewing request to seqNum " + l.expireSequenceNumber);
1984 sendExpireMsgForFeature(l.networkCapabilities, l.expireSequenceNumber, l.delay);
1985 }
1986
1987 private void expireRequest(NetworkCapabilities netCap, int sequenceNum) {
1988 int ourSeqNum = -1;
1989 synchronized (sLegacyRequests) {
1990 LegacyRequest l = sLegacyRequests.get(netCap);
1991 if (l == null) return;
1992 ourSeqNum = l.expireSequenceNumber;
1993 if (l.expireSequenceNumber == sequenceNum) removeRequestForFeature(netCap);
1994 }
1995 Log.d(TAG, "expireRequest with " + ourSeqNum + ", " + sequenceNum);
1996 }
1997
1998 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
1999 private NetworkRequest requestNetworkForFeatureLocked(NetworkCapabilities netCap) {
2000 int delay = -1;
2001 int type = legacyTypeForNetworkCapabilities(netCap);
2002 try {
2003 delay = mService.getRestoreDefaultNetworkDelay(type);
2004 } catch (RemoteException e) {
2005 throw e.rethrowFromSystemServer();
2006 }
2007 LegacyRequest l = new LegacyRequest();
2008 l.networkCapabilities = netCap;
2009 l.delay = delay;
2010 l.expireSequenceNumber = 0;
2011 l.networkRequest = sendRequestForNetwork(
2012 netCap, l.networkCallback, 0, REQUEST, type, getDefaultHandler());
2013 if (l.networkRequest == null) return null;
2014 sLegacyRequests.put(netCap, l);
2015 sendExpireMsgForFeature(netCap, l.expireSequenceNumber, delay);
2016 return l.networkRequest;
2017 }
2018
2019 private void sendExpireMsgForFeature(NetworkCapabilities netCap, int seqNum, int delay) {
2020 if (delay >= 0) {
2021 Log.d(TAG, "sending expire msg with seqNum " + seqNum + " and delay " + delay);
2022 CallbackHandler handler = getDefaultHandler();
2023 Message msg = handler.obtainMessage(EXPIRE_LEGACY_REQUEST, seqNum, 0, netCap);
2024 handler.sendMessageDelayed(msg, delay);
2025 }
2026 }
2027
2028 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2029 private boolean removeRequestForFeature(NetworkCapabilities netCap) {
2030 final LegacyRequest l;
2031 synchronized (sLegacyRequests) {
2032 l = sLegacyRequests.remove(netCap);
2033 }
2034 if (l == null) return false;
2035 unregisterNetworkCallback(l.networkCallback);
2036 l.clearDnsBinding();
2037 return true;
2038 }
2039
2040 private static final SparseIntArray sLegacyTypeToTransport = new SparseIntArray();
2041 static {
2042 sLegacyTypeToTransport.put(TYPE_MOBILE, NetworkCapabilities.TRANSPORT_CELLULAR);
2043 sLegacyTypeToTransport.put(TYPE_MOBILE_CBS, NetworkCapabilities.TRANSPORT_CELLULAR);
2044 sLegacyTypeToTransport.put(TYPE_MOBILE_DUN, NetworkCapabilities.TRANSPORT_CELLULAR);
2045 sLegacyTypeToTransport.put(TYPE_MOBILE_FOTA, NetworkCapabilities.TRANSPORT_CELLULAR);
2046 sLegacyTypeToTransport.put(TYPE_MOBILE_HIPRI, NetworkCapabilities.TRANSPORT_CELLULAR);
2047 sLegacyTypeToTransport.put(TYPE_MOBILE_IMS, NetworkCapabilities.TRANSPORT_CELLULAR);
2048 sLegacyTypeToTransport.put(TYPE_MOBILE_MMS, NetworkCapabilities.TRANSPORT_CELLULAR);
2049 sLegacyTypeToTransport.put(TYPE_MOBILE_SUPL, NetworkCapabilities.TRANSPORT_CELLULAR);
2050 sLegacyTypeToTransport.put(TYPE_WIFI, NetworkCapabilities.TRANSPORT_WIFI);
2051 sLegacyTypeToTransport.put(TYPE_WIFI_P2P, NetworkCapabilities.TRANSPORT_WIFI);
2052 sLegacyTypeToTransport.put(TYPE_BLUETOOTH, NetworkCapabilities.TRANSPORT_BLUETOOTH);
2053 sLegacyTypeToTransport.put(TYPE_ETHERNET, NetworkCapabilities.TRANSPORT_ETHERNET);
2054 }
2055
2056 private static final SparseIntArray sLegacyTypeToCapability = new SparseIntArray();
2057 static {
2058 sLegacyTypeToCapability.put(TYPE_MOBILE_CBS, NetworkCapabilities.NET_CAPABILITY_CBS);
2059 sLegacyTypeToCapability.put(TYPE_MOBILE_DUN, NetworkCapabilities.NET_CAPABILITY_DUN);
2060 sLegacyTypeToCapability.put(TYPE_MOBILE_FOTA, NetworkCapabilities.NET_CAPABILITY_FOTA);
2061 sLegacyTypeToCapability.put(TYPE_MOBILE_IMS, NetworkCapabilities.NET_CAPABILITY_IMS);
2062 sLegacyTypeToCapability.put(TYPE_MOBILE_MMS, NetworkCapabilities.NET_CAPABILITY_MMS);
2063 sLegacyTypeToCapability.put(TYPE_MOBILE_SUPL, NetworkCapabilities.NET_CAPABILITY_SUPL);
2064 sLegacyTypeToCapability.put(TYPE_WIFI_P2P, NetworkCapabilities.NET_CAPABILITY_WIFI_P2P);
2065 }
2066
2067 /**
2068 * Given a legacy type (TYPE_WIFI, ...) returns a NetworkCapabilities
2069 * instance suitable for registering a request or callback. Throws an
2070 * IllegalArgumentException if no mapping from the legacy type to
2071 * NetworkCapabilities is known.
2072 *
2073 * @deprecated Types are deprecated. Use {@link NetworkCallback} or {@link NetworkRequest}
2074 * to find the network instead.
2075 * @hide
2076 */
2077 public static NetworkCapabilities networkCapabilitiesForType(int type) {
2078 final NetworkCapabilities nc = new NetworkCapabilities();
2079
2080 // Map from type to transports.
2081 final int NOT_FOUND = -1;
2082 final int transport = sLegacyTypeToTransport.get(type, NOT_FOUND);
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002083 if (transport == NOT_FOUND) {
2084 throw new IllegalArgumentException("unknown legacy type: " + type);
2085 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002086 nc.addTransportType(transport);
2087
2088 // Map from type to capabilities.
2089 nc.addCapability(sLegacyTypeToCapability.get(
2090 type, NetworkCapabilities.NET_CAPABILITY_INTERNET));
2091 nc.maybeMarkCapabilitiesRestricted();
2092 return nc;
2093 }
2094
2095 /** @hide */
2096 public static class PacketKeepaliveCallback {
2097 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2098 public PacketKeepaliveCallback() {
2099 }
2100 /** The requested keepalive was successfully started. */
2101 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2102 public void onStarted() {}
2103 /** The keepalive was successfully stopped. */
2104 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2105 public void onStopped() {}
2106 /** An error occurred. */
2107 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2108 public void onError(int error) {}
2109 }
2110
2111 /**
2112 * Allows applications to request that the system periodically send specific packets on their
2113 * behalf, using hardware offload to save battery power.
2114 *
2115 * To request that the system send keepalives, call one of the methods that return a
2116 * {@link ConnectivityManager.PacketKeepalive} object, such as {@link #startNattKeepalive},
2117 * passing in a non-null callback. If the callback is successfully started, the callback's
2118 * {@code onStarted} method will be called. If an error occurs, {@code onError} will be called,
2119 * specifying one of the {@code ERROR_*} constants in this class.
2120 *
2121 * To stop an existing keepalive, call {@link PacketKeepalive#stop}. The system will call
2122 * {@link PacketKeepaliveCallback#onStopped} if the operation was successful or
2123 * {@link PacketKeepaliveCallback#onError} if an error occurred.
2124 *
2125 * @deprecated Use {@link SocketKeepalive} instead.
2126 *
2127 * @hide
2128 */
2129 public class PacketKeepalive {
2130
2131 private static final String TAG = "PacketKeepalive";
2132
2133 /** @hide */
2134 public static final int SUCCESS = 0;
2135
2136 /** @hide */
2137 public static final int NO_KEEPALIVE = -1;
2138
2139 /** @hide */
2140 public static final int BINDER_DIED = -10;
2141
2142 /** The specified {@code Network} is not connected. */
2143 public static final int ERROR_INVALID_NETWORK = -20;
2144 /** The specified IP addresses are invalid. For example, the specified source IP address is
2145 * not configured on the specified {@code Network}. */
2146 public static final int ERROR_INVALID_IP_ADDRESS = -21;
2147 /** The requested port is invalid. */
2148 public static final int ERROR_INVALID_PORT = -22;
2149 /** The packet length is invalid (e.g., too long). */
2150 public static final int ERROR_INVALID_LENGTH = -23;
2151 /** The packet transmission interval is invalid (e.g., too short). */
2152 public static final int ERROR_INVALID_INTERVAL = -24;
2153
2154 /** The hardware does not support this request. */
2155 public static final int ERROR_HARDWARE_UNSUPPORTED = -30;
2156 /** The hardware returned an error. */
2157 public static final int ERROR_HARDWARE_ERROR = -31;
2158
2159 /** The NAT-T destination port for IPsec */
2160 public static final int NATT_PORT = 4500;
2161
2162 /** The minimum interval in seconds between keepalive packet transmissions */
2163 public static final int MIN_INTERVAL = 10;
2164
2165 private final Network mNetwork;
2166 private final ISocketKeepaliveCallback mCallback;
2167 private final ExecutorService mExecutor;
2168
2169 private volatile Integer mSlot;
2170
2171 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2172 public void stop() {
2173 try {
2174 mExecutor.execute(() -> {
2175 try {
2176 if (mSlot != null) {
2177 mService.stopKeepalive(mNetwork, mSlot);
2178 }
2179 } catch (RemoteException e) {
2180 Log.e(TAG, "Error stopping packet keepalive: ", e);
2181 throw e.rethrowFromSystemServer();
2182 }
2183 });
2184 } catch (RejectedExecutionException e) {
2185 // The internal executor has already stopped due to previous event.
2186 }
2187 }
2188
2189 private PacketKeepalive(Network network, PacketKeepaliveCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002190 Objects.requireNonNull(network, "network cannot be null");
2191 Objects.requireNonNull(callback, "callback cannot be null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002192 mNetwork = network;
2193 mExecutor = Executors.newSingleThreadExecutor();
2194 mCallback = new ISocketKeepaliveCallback.Stub() {
2195 @Override
2196 public void onStarted(int slot) {
2197 final long token = Binder.clearCallingIdentity();
2198 try {
2199 mExecutor.execute(() -> {
2200 mSlot = slot;
2201 callback.onStarted();
2202 });
2203 } finally {
2204 Binder.restoreCallingIdentity(token);
2205 }
2206 }
2207
2208 @Override
2209 public void onStopped() {
2210 final long token = Binder.clearCallingIdentity();
2211 try {
2212 mExecutor.execute(() -> {
2213 mSlot = null;
2214 callback.onStopped();
2215 });
2216 } finally {
2217 Binder.restoreCallingIdentity(token);
2218 }
2219 mExecutor.shutdown();
2220 }
2221
2222 @Override
2223 public void onError(int error) {
2224 final long token = Binder.clearCallingIdentity();
2225 try {
2226 mExecutor.execute(() -> {
2227 mSlot = null;
2228 callback.onError(error);
2229 });
2230 } finally {
2231 Binder.restoreCallingIdentity(token);
2232 }
2233 mExecutor.shutdown();
2234 }
2235
2236 @Override
2237 public void onDataReceived() {
2238 // PacketKeepalive is only used for Nat-T keepalive and as such does not invoke
2239 // this callback when data is received.
2240 }
2241 };
2242 }
2243 }
2244
2245 /**
2246 * Starts an IPsec NAT-T keepalive packet with the specified parameters.
2247 *
2248 * @deprecated Use {@link #createSocketKeepalive} instead.
2249 *
2250 * @hide
2251 */
2252 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2253 public PacketKeepalive startNattKeepalive(
2254 Network network, int intervalSeconds, PacketKeepaliveCallback callback,
2255 InetAddress srcAddr, int srcPort, InetAddress dstAddr) {
2256 final PacketKeepalive k = new PacketKeepalive(network, callback);
2257 try {
2258 mService.startNattKeepalive(network, intervalSeconds, k.mCallback,
2259 srcAddr.getHostAddress(), srcPort, dstAddr.getHostAddress());
2260 } catch (RemoteException e) {
2261 Log.e(TAG, "Error starting packet keepalive: ", e);
2262 throw e.rethrowFromSystemServer();
2263 }
2264 return k;
2265 }
2266
2267 // Construct an invalid fd.
2268 private ParcelFileDescriptor createInvalidFd() {
2269 final int invalidFd = -1;
2270 return ParcelFileDescriptor.adoptFd(invalidFd);
2271 }
2272
2273 /**
2274 * Request that keepalives be started on a IPsec NAT-T socket.
2275 *
2276 * @param network The {@link Network} the socket is on.
2277 * @param socket The socket that needs to be kept alive.
2278 * @param source The source address of the {@link UdpEncapsulationSocket}.
2279 * @param destination The destination address of the {@link UdpEncapsulationSocket}.
2280 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
2281 * must run callback sequentially, otherwise the order of callbacks cannot be
2282 * guaranteed.
2283 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2284 * changes. Must be extended by applications that use this API.
2285 *
2286 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2287 * given socket.
2288 **/
2289 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
2290 @NonNull UdpEncapsulationSocket socket,
2291 @NonNull InetAddress source,
2292 @NonNull InetAddress destination,
2293 @NonNull @CallbackExecutor Executor executor,
2294 @NonNull Callback callback) {
2295 ParcelFileDescriptor dup;
2296 try {
2297 // Dup is needed here as the pfd inside the socket is owned by the IpSecService,
2298 // which cannot be obtained by the app process.
2299 dup = ParcelFileDescriptor.dup(socket.getFileDescriptor());
2300 } catch (IOException ignored) {
2301 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2302 // ERROR_INVALID_SOCKET.
2303 dup = createInvalidFd();
2304 }
2305 return new NattSocketKeepalive(mService, network, dup, socket.getResourceId(), source,
2306 destination, executor, callback);
2307 }
2308
2309 /**
2310 * Request that keepalives be started on a IPsec NAT-T socket file descriptor. Directly called
2311 * by system apps which don't use IpSecService to create {@link UdpEncapsulationSocket}.
2312 *
2313 * @param network The {@link Network} the socket is on.
2314 * @param pfd The {@link ParcelFileDescriptor} that needs to be kept alive. The provided
2315 * {@link ParcelFileDescriptor} must be bound to a port and the keepalives will be sent
2316 * from that port.
2317 * @param source The source address of the {@link UdpEncapsulationSocket}.
2318 * @param destination The destination address of the {@link UdpEncapsulationSocket}. The
2319 * keepalive packets will always be sent to port 4500 of the given {@code destination}.
2320 * @param executor The executor on which callback will be invoked. The provided {@link Executor}
2321 * must run callback sequentially, otherwise the order of callbacks cannot be
2322 * guaranteed.
2323 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2324 * changes. Must be extended by applications that use this API.
2325 *
2326 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2327 * given socket.
2328 * @hide
2329 */
2330 @SystemApi
2331 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2332 public @NonNull SocketKeepalive createNattKeepalive(@NonNull Network network,
2333 @NonNull ParcelFileDescriptor pfd,
2334 @NonNull InetAddress source,
2335 @NonNull InetAddress destination,
2336 @NonNull @CallbackExecutor Executor executor,
2337 @NonNull Callback callback) {
2338 ParcelFileDescriptor dup;
2339 try {
2340 // TODO: Consider remove unnecessary dup.
2341 dup = pfd.dup();
2342 } catch (IOException ignored) {
2343 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2344 // ERROR_INVALID_SOCKET.
2345 dup = createInvalidFd();
2346 }
2347 return new NattSocketKeepalive(mService, network, dup,
Remi NGUYEN VANa29be5c2021-03-11 10:56:49 +00002348 -1 /* Unused */, source, destination, executor, callback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002349 }
2350
2351 /**
2352 * Request that keepalives be started on a TCP socket.
2353 * The socket must be established.
2354 *
2355 * @param network The {@link Network} the socket is on.
2356 * @param socket The socket that needs to be kept alive.
2357 * @param executor The executor on which callback will be invoked. This implementation assumes
2358 * the provided {@link Executor} runs the callbacks in sequence with no
2359 * concurrency. Failing this, no guarantee of correctness can be made. It is
2360 * the responsibility of the caller to ensure the executor provides this
2361 * guarantee. A simple way of creating such an executor is with the standard
2362 * tool {@code Executors.newSingleThreadExecutor}.
2363 * @param callback A {@link SocketKeepalive.Callback}. Used for notifications about keepalive
2364 * changes. Must be extended by applications that use this API.
2365 *
2366 * @return A {@link SocketKeepalive} object that can be used to control the keepalive on the
2367 * given socket.
2368 * @hide
2369 */
2370 @SystemApi
2371 @RequiresPermission(android.Manifest.permission.PACKET_KEEPALIVE_OFFLOAD)
2372 public @NonNull SocketKeepalive createSocketKeepalive(@NonNull Network network,
2373 @NonNull Socket socket,
2374 @NonNull Executor executor,
2375 @NonNull Callback callback) {
2376 ParcelFileDescriptor dup;
2377 try {
2378 dup = ParcelFileDescriptor.fromSocket(socket);
2379 } catch (UncheckedIOException ignored) {
2380 // Construct an invalid fd, so that if the user later calls start(), it will fail with
2381 // ERROR_INVALID_SOCKET.
2382 dup = createInvalidFd();
2383 }
2384 return new TcpSocketKeepalive(mService, network, dup, executor, callback);
2385 }
2386
2387 /**
2388 * Ensure that a network route exists to deliver traffic to the specified
2389 * host via the specified network interface. An attempt to add a route that
2390 * already exists is ignored, but treated as successful.
2391 *
2392 * <p>This method requires the caller to hold either the
2393 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2394 * or the ability to modify system settings as determined by
2395 * {@link android.provider.Settings.System#canWrite}.</p>
2396 *
2397 * @param networkType the type of the network over which traffic to the specified
2398 * host is to be routed
2399 * @param hostAddress the IP address of the host to which the route is desired
2400 * @return {@code true} on success, {@code false} on failure
2401 *
2402 * @deprecated Deprecated in favor of the
2403 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
2404 * {@link #bindProcessToNetwork} and {@link Network#getSocketFactory} API.
2405 * In {@link VERSION_CODES#M}, and above, this method is unsupported and will
2406 * throw {@code UnsupportedOperationException} if called.
2407 * @removed
2408 */
2409 @Deprecated
2410 public boolean requestRouteToHost(int networkType, int hostAddress) {
2411 return requestRouteToHostAddress(networkType, NetworkUtils.intToInetAddress(hostAddress));
2412 }
2413
2414 /**
2415 * Ensure that a network route exists to deliver traffic to the specified
2416 * host via the specified network interface. An attempt to add a route that
2417 * already exists is ignored, but treated as successful.
2418 *
2419 * <p>This method requires the caller to hold either the
2420 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2421 * or the ability to modify system settings as determined by
2422 * {@link android.provider.Settings.System#canWrite}.</p>
2423 *
2424 * @param networkType the type of the network over which traffic to the specified
2425 * host is to be routed
2426 * @param hostAddress the IP address of the host to which the route is desired
2427 * @return {@code true} on success, {@code false} on failure
2428 * @hide
2429 * @deprecated Deprecated in favor of the {@link #requestNetwork} and
2430 * {@link #bindProcessToNetwork} API.
2431 */
2432 @Deprecated
2433 @UnsupportedAppUsage
lucaslin97fb10a2021-03-22 11:51:27 +08002434 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002435 public boolean requestRouteToHostAddress(int networkType, InetAddress hostAddress) {
2436 checkLegacyRoutingApiAccess();
2437 try {
2438 return mService.requestRouteToHostAddress(networkType, hostAddress.getAddress(),
2439 mContext.getOpPackageName(), getAttributionTag());
2440 } catch (RemoteException e) {
2441 throw e.rethrowFromSystemServer();
2442 }
2443 }
2444
2445 /**
2446 * @return the context's attribution tag
2447 */
2448 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2449 private @Nullable String getAttributionTag() {
Remi NGUYEN VANa522fc22021-02-01 10:25:24 +00002450 return mContext.getAttributionTag();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002451 }
2452
2453 /**
2454 * Returns the value of the setting for background data usage. If false,
2455 * applications should not use the network if the application is not in the
2456 * foreground. Developers should respect this setting, and check the value
2457 * of this before performing any background data operations.
2458 * <p>
2459 * All applications that have background services that use the network
2460 * should listen to {@link #ACTION_BACKGROUND_DATA_SETTING_CHANGED}.
2461 * <p>
2462 * @deprecated As of {@link VERSION_CODES#ICE_CREAM_SANDWICH}, availability of
2463 * background data depends on several combined factors, and this method will
2464 * always return {@code true}. Instead, when background data is unavailable,
2465 * {@link #getActiveNetworkInfo()} will now appear disconnected.
2466 *
2467 * @return Whether background data usage is allowed.
2468 */
2469 @Deprecated
2470 public boolean getBackgroundDataSetting() {
2471 // assume that background data is allowed; final authority is
2472 // NetworkInfo which may be blocked.
2473 return true;
2474 }
2475
2476 /**
2477 * Sets the value of the setting for background data usage.
2478 *
2479 * @param allowBackgroundData Whether an application should use data while
2480 * it is in the background.
2481 *
2482 * @attr ref android.Manifest.permission#CHANGE_BACKGROUND_DATA_SETTING
2483 * @see #getBackgroundDataSetting()
2484 * @hide
2485 */
2486 @Deprecated
2487 @UnsupportedAppUsage
2488 public void setBackgroundDataSetting(boolean allowBackgroundData) {
2489 // ignored
2490 }
2491
2492 /**
2493 * @hide
2494 * @deprecated Talk to TelephonyManager directly
2495 */
2496 @Deprecated
2497 @UnsupportedAppUsage
2498 public boolean getMobileDataEnabled() {
2499 TelephonyManager tm = mContext.getSystemService(TelephonyManager.class);
2500 if (tm != null) {
2501 int subId = SubscriptionManager.getDefaultDataSubscriptionId();
2502 Log.d("ConnectivityManager", "getMobileDataEnabled()+ subId=" + subId);
2503 boolean retVal = tm.createForSubscriptionId(subId).isDataEnabled();
2504 Log.d("ConnectivityManager", "getMobileDataEnabled()- subId=" + subId
2505 + " retVal=" + retVal);
2506 return retVal;
2507 }
2508 Log.d("ConnectivityManager", "getMobileDataEnabled()- remote exception retVal=false");
2509 return false;
2510 }
2511
2512 /**
2513 * Callback for use with {@link ConnectivityManager#addDefaultNetworkActiveListener}
2514 * to find out when the system default network has gone in to a high power state.
2515 */
2516 public interface OnNetworkActiveListener {
2517 /**
2518 * Called on the main thread of the process to report that the current data network
2519 * has become active, and it is now a good time to perform any pending network
2520 * operations. Note that this listener only tells you when the network becomes
2521 * active; if at any other time you want to know whether it is active (and thus okay
2522 * to initiate network traffic), you can retrieve its instantaneous state with
2523 * {@link ConnectivityManager#isDefaultNetworkActive}.
2524 */
2525 void onNetworkActive();
2526 }
2527
Chiachang Wang2de41682021-09-23 10:46:03 +08002528 @GuardedBy("mNetworkActivityListeners")
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002529 private final ArrayMap<OnNetworkActiveListener, INetworkActivityListener>
2530 mNetworkActivityListeners = new ArrayMap<>();
2531
2532 /**
2533 * Start listening to reports when the system's default data network is active, meaning it is
2534 * a good time to perform network traffic. Use {@link #isDefaultNetworkActive()}
2535 * to determine the current state of the system's default network after registering the
2536 * listener.
2537 * <p>
2538 * If the process default network has been set with
2539 * {@link ConnectivityManager#bindProcessToNetwork} this function will not
2540 * reflect the process's default, but the system default.
2541 *
2542 * @param l The listener to be told when the network is active.
2543 */
2544 public void addDefaultNetworkActiveListener(final OnNetworkActiveListener l) {
Chiachang Wang2de41682021-09-23 10:46:03 +08002545 final INetworkActivityListener rl = new INetworkActivityListener.Stub() {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002546 @Override
2547 public void onNetworkActive() throws RemoteException {
2548 l.onNetworkActive();
2549 }
2550 };
2551
Chiachang Wang2de41682021-09-23 10:46:03 +08002552 synchronized (mNetworkActivityListeners) {
2553 try {
2554 mService.registerNetworkActivityListener(rl);
2555 mNetworkActivityListeners.put(l, rl);
2556 } catch (RemoteException e) {
2557 throw e.rethrowFromSystemServer();
2558 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002559 }
2560 }
2561
2562 /**
2563 * Remove network active listener previously registered with
2564 * {@link #addDefaultNetworkActiveListener}.
2565 *
2566 * @param l Previously registered listener.
2567 */
2568 public void removeDefaultNetworkActiveListener(@NonNull OnNetworkActiveListener l) {
Chiachang Wang2de41682021-09-23 10:46:03 +08002569 synchronized (mNetworkActivityListeners) {
2570 final INetworkActivityListener rl = mNetworkActivityListeners.get(l);
2571 if (rl == null) {
2572 throw new IllegalArgumentException("Listener was not registered.");
2573 }
2574 try {
2575 mService.unregisterNetworkActivityListener(rl);
2576 mNetworkActivityListeners.remove(l);
2577 } catch (RemoteException e) {
2578 throw e.rethrowFromSystemServer();
2579 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002580 }
2581 }
2582
2583 /**
2584 * Return whether the data network is currently active. An active network means that
2585 * it is currently in a high power state for performing data transmission. On some
2586 * types of networks, it may be expensive to move and stay in such a state, so it is
2587 * more power efficient to batch network traffic together when the radio is already in
2588 * this state. This method tells you whether right now is currently a good time to
2589 * initiate network traffic, as the network is already active.
2590 */
2591 public boolean isDefaultNetworkActive() {
2592 try {
lucaslin709eb842021-01-21 02:04:15 +08002593 return mService.isDefaultNetworkActive();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002594 } catch (RemoteException e) {
2595 throw e.rethrowFromSystemServer();
2596 }
2597 }
2598
2599 /**
2600 * {@hide}
2601 */
2602 public ConnectivityManager(Context context, IConnectivityManager service) {
markchiend2015662022-04-26 18:08:03 +08002603 this(context, service, true /* newStatic */);
2604 }
2605
2606 private ConnectivityManager(Context context, IConnectivityManager service, boolean newStatic) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002607 mContext = Objects.requireNonNull(context, "missing context");
2608 mService = Objects.requireNonNull(service, "missing IConnectivityManager");
markchiend2015662022-04-26 18:08:03 +08002609 // sInstance is accessed without a lock, so it may actually be reassigned several times with
2610 // different ConnectivityManager, but that's still OK considering its usage.
2611 if (sInstance == null && newStatic) {
2612 final Context appContext = mContext.getApplicationContext();
2613 // Don't create static ConnectivityManager instance again to prevent infinite loop.
2614 // If the application context is null, we're either in the system process or
2615 // it's the application context very early in app initialization. In both these
2616 // cases, the passed-in Context will not be freed, so it's safe to pass it to the
2617 // service. http://b/27532714 .
2618 sInstance = new ConnectivityManager(appContext != null ? appContext : context, service,
2619 false /* newStatic */);
2620 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002621 }
2622
2623 /** {@hide} */
2624 @UnsupportedAppUsage
2625 public static ConnectivityManager from(Context context) {
2626 return (ConnectivityManager) context.getSystemService(Context.CONNECTIVITY_SERVICE);
2627 }
2628
2629 /** @hide */
2630 public NetworkRequest getDefaultRequest() {
2631 try {
2632 // This is not racy as the default request is final in ConnectivityService.
2633 return mService.getDefaultRequest();
2634 } catch (RemoteException e) {
2635 throw e.rethrowFromSystemServer();
2636 }
2637 }
2638
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002639 /**
2640 * Check if the package is a allowed to write settings. This also accounts that such an access
2641 * happened.
2642 *
2643 * @return {@code true} iff the package is allowed to write settings.
2644 */
2645 // TODO: Remove method and replace with direct call once R code is pushed to AOSP
2646 private static boolean checkAndNoteWriteSettingsOperation(@NonNull Context context, int uid,
2647 @NonNull String callingPackage, @Nullable String callingAttributionTag,
2648 boolean throwException) {
2649 return Settings.checkAndNoteWriteSettingsOperation(context, uid, callingPackage,
Remi NGUYEN VANa522fc22021-02-01 10:25:24 +00002650 callingAttributionTag, throwException);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002651 }
2652
2653 /**
2654 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2655 * situations where a Context pointer is unavailable.
2656 * @hide
2657 */
2658 @Deprecated
2659 static ConnectivityManager getInstanceOrNull() {
2660 return sInstance;
2661 }
2662
2663 /**
2664 * @deprecated - use getSystemService. This is a kludge to support static access in certain
2665 * situations where a Context pointer is unavailable.
2666 * @hide
2667 */
2668 @Deprecated
2669 @UnsupportedAppUsage
2670 private static ConnectivityManager getInstance() {
2671 if (getInstanceOrNull() == null) {
2672 throw new IllegalStateException("No ConnectivityManager yet constructed");
2673 }
2674 return getInstanceOrNull();
2675 }
2676
2677 /**
2678 * Get the set of tetherable, available interfaces. This list is limited by
2679 * device configuration and current interface existence.
2680 *
2681 * @return an array of 0 or more Strings of tetherable interface names.
2682 *
2683 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2684 * {@hide}
2685 */
2686 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2687 @UnsupportedAppUsage
2688 @Deprecated
2689 public String[] getTetherableIfaces() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002690 return getTetheringManager().getTetherableIfaces();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002691 }
2692
2693 /**
2694 * Get the set of tethered interfaces.
2695 *
2696 * @return an array of 0 or more String of currently tethered interface names.
2697 *
2698 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfacesChanged(List)} instead.
2699 * {@hide}
2700 */
2701 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2702 @UnsupportedAppUsage
2703 @Deprecated
2704 public String[] getTetheredIfaces() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002705 return getTetheringManager().getTetheredIfaces();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002706 }
2707
2708 /**
2709 * Get the set of interface names which attempted to tether but
2710 * failed. Re-attempting to tether may cause them to reset to the Tethered
2711 * state. Alternatively, causing the interface to be destroyed and recreated
2712 * may cause them to reset to the available state.
2713 * {@link ConnectivityManager#getLastTetherError} can be used to get more
2714 * information on the cause of the errors.
2715 *
2716 * @return an array of 0 or more String indicating the interface names
2717 * which failed to tether.
2718 *
2719 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
2720 * {@hide}
2721 */
2722 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
2723 @UnsupportedAppUsage
2724 @Deprecated
2725 public String[] getTetheringErroredIfaces() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002726 return getTetheringManager().getTetheringErroredIfaces();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002727 }
2728
2729 /**
2730 * Get the set of tethered dhcp ranges.
2731 *
2732 * @deprecated This method is not supported.
2733 * TODO: remove this function when all of clients are removed.
2734 * {@hide}
2735 */
2736 @RequiresPermission(android.Manifest.permission.NETWORK_SETTINGS)
2737 @Deprecated
2738 public String[] getTetheredDhcpRanges() {
2739 throw new UnsupportedOperationException("getTetheredDhcpRanges is not supported");
2740 }
2741
2742 /**
2743 * Attempt to tether the named interface. This will setup a dhcp server
2744 * on the interface, forward and NAT IP packets and forward DNS requests
2745 * to the best active upstream network interface. Note that if no upstream
2746 * IP network interface is available, dhcp will still run and traffic will be
2747 * allowed between the tethered devices and this device, though upstream net
2748 * access will of course fail until an upstream network interface becomes
2749 * active.
2750 *
2751 * <p>This method requires the caller to hold either the
2752 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2753 * or the ability to modify system settings as determined by
2754 * {@link android.provider.Settings.System#canWrite}.</p>
2755 *
2756 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2757 * and WifiStateMachine which need direct access. All other clients should use
2758 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2759 * logic.</p>
2760 *
2761 * @param iface the interface name to tether.
2762 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2763 * @deprecated Use {@link TetheringManager#startTethering} instead
2764 *
2765 * {@hide}
2766 */
2767 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
2768 @Deprecated
2769 public int tether(String iface) {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002770 return getTetheringManager().tether(iface);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002771 }
2772
2773 /**
2774 * Stop tethering the named interface.
2775 *
2776 * <p>This method requires the caller to hold either the
2777 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
2778 * or the ability to modify system settings as determined by
2779 * {@link android.provider.Settings.System#canWrite}.</p>
2780 *
2781 * <p>WARNING: New clients should not use this function. The only usages should be in PanService
2782 * and WifiStateMachine which need direct access. All other clients should use
2783 * {@link #startTethering} and {@link #stopTethering} which encapsulate proper provisioning
2784 * logic.</p>
2785 *
2786 * @param iface the interface name to untether.
2787 * @return error a {@code TETHER_ERROR} value indicating success or failure type
2788 *
2789 * {@hide}
2790 */
2791 @UnsupportedAppUsage
2792 @Deprecated
2793 public int untether(String iface) {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002794 return getTetheringManager().untether(iface);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002795 }
2796
2797 /**
2798 * Check if the device allows for tethering. It may be disabled via
2799 * {@code ro.tether.denied} system property, Settings.TETHER_SUPPORTED or
2800 * due to device configuration.
2801 *
2802 * <p>If this app does not have permission to use this API, it will always
2803 * return false rather than throw an exception.</p>
2804 *
2805 * <p>If the device has a hotspot provisioning app, the caller is required to hold the
2806 * {@link android.Manifest.permission.TETHER_PRIVILEGED} permission.</p>
2807 *
2808 * <p>Otherwise, this method requires the caller to hold the ability to modify system
2809 * settings as determined by {@link android.provider.Settings.System#canWrite}.</p>
2810 *
2811 * @return a boolean - {@code true} indicating Tethering is supported.
2812 *
2813 * @deprecated Use {@link TetheringEventCallback#onTetheringSupported(boolean)} instead.
2814 * {@hide}
2815 */
2816 @SystemApi
2817 @RequiresPermission(anyOf = {android.Manifest.permission.TETHER_PRIVILEGED,
2818 android.Manifest.permission.WRITE_SETTINGS})
2819 public boolean isTetheringSupported() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002820 return getTetheringManager().isTetheringSupported();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002821 }
2822
2823 /**
2824 * Callback for use with {@link #startTethering} to find out whether tethering succeeded.
2825 *
2826 * @deprecated Use {@link TetheringManager.StartTetheringCallback} instead.
2827 * @hide
2828 */
2829 @SystemApi
2830 @Deprecated
2831 public static abstract class OnStartTetheringCallback {
2832 /**
2833 * Called when tethering has been successfully started.
2834 */
2835 public void onTetheringStarted() {}
2836
2837 /**
2838 * Called when starting tethering failed.
2839 */
2840 public void onTetheringFailed() {}
2841 }
2842
2843 /**
2844 * Convenient overload for
2845 * {@link #startTethering(int, boolean, OnStartTetheringCallback, Handler)} which passes a null
2846 * handler to run on the current thread's {@link Looper}.
2847 *
2848 * @deprecated Use {@link TetheringManager#startTethering} instead.
2849 * @hide
2850 */
2851 @SystemApi
2852 @Deprecated
2853 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2854 public void startTethering(int type, boolean showProvisioningUi,
2855 final OnStartTetheringCallback callback) {
2856 startTethering(type, showProvisioningUi, callback, null);
2857 }
2858
2859 /**
2860 * Runs tether provisioning for the given type if needed and then starts tethering if
2861 * the check succeeds. If no carrier provisioning is required for tethering, tethering is
2862 * enabled immediately. If provisioning fails, tethering will not be enabled. It also
2863 * schedules tether provisioning re-checks if appropriate.
2864 *
2865 * @param type The type of tethering to start. Must be one of
2866 * {@link ConnectivityManager.TETHERING_WIFI},
2867 * {@link ConnectivityManager.TETHERING_USB}, or
2868 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2869 * @param showProvisioningUi a boolean indicating to show the provisioning app UI if there
2870 * is one. This should be true the first time this function is called and also any time
2871 * the user can see this UI. It gives users information from their carrier about the
2872 * check failing and how they can sign up for tethering if possible.
2873 * @param callback an {@link OnStartTetheringCallback} which will be called to notify the caller
2874 * of the result of trying to tether.
2875 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
2876 *
2877 * @deprecated Use {@link TetheringManager#startTethering} instead.
2878 * @hide
2879 */
2880 @SystemApi
2881 @Deprecated
2882 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2883 public void startTethering(int type, boolean showProvisioningUi,
2884 final OnStartTetheringCallback callback, Handler handler) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002885 Objects.requireNonNull(callback, "OnStartTetheringCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002886
2887 final Executor executor = new Executor() {
2888 @Override
2889 public void execute(Runnable command) {
2890 if (handler == null) {
2891 command.run();
2892 } else {
2893 handler.post(command);
2894 }
2895 }
2896 };
2897
2898 final StartTetheringCallback tetheringCallback = new StartTetheringCallback() {
2899 @Override
2900 public void onTetheringStarted() {
2901 callback.onTetheringStarted();
2902 }
2903
2904 @Override
2905 public void onTetheringFailed(final int error) {
2906 callback.onTetheringFailed();
2907 }
2908 };
2909
2910 final TetheringRequest request = new TetheringRequest.Builder(type)
2911 .setShouldShowEntitlementUi(showProvisioningUi).build();
2912
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002913 getTetheringManager().startTethering(request, executor, tetheringCallback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002914 }
2915
2916 /**
2917 * Stops tethering for the given type. Also cancels any provisioning rechecks for that type if
2918 * applicable.
2919 *
2920 * @param type The type of tethering to stop. Must be one of
2921 * {@link ConnectivityManager.TETHERING_WIFI},
2922 * {@link ConnectivityManager.TETHERING_USB}, or
2923 * {@link ConnectivityManager.TETHERING_BLUETOOTH}.
2924 *
2925 * @deprecated Use {@link TetheringManager#stopTethering} instead.
2926 * @hide
2927 */
2928 @SystemApi
2929 @Deprecated
2930 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2931 public void stopTethering(int type) {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002932 getTetheringManager().stopTethering(type);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002933 }
2934
2935 /**
2936 * Callback for use with {@link registerTetheringEventCallback} to find out tethering
2937 * upstream status.
2938 *
2939 * @deprecated Use {@link TetheringManager#OnTetheringEventCallback} instead.
2940 * @hide
2941 */
2942 @SystemApi
2943 @Deprecated
2944 public abstract static class OnTetheringEventCallback {
2945
2946 /**
2947 * Called when tethering upstream changed. This can be called multiple times and can be
2948 * called any time.
2949 *
2950 * @param network the {@link Network} of tethering upstream. Null means tethering doesn't
2951 * have any upstream.
2952 */
2953 public void onUpstreamChanged(@Nullable Network network) {}
2954 }
2955
2956 @GuardedBy("mTetheringEventCallbacks")
2957 private final ArrayMap<OnTetheringEventCallback, TetheringEventCallback>
2958 mTetheringEventCallbacks = new ArrayMap<>();
2959
2960 /**
2961 * Start listening to tethering change events. Any new added callback will receive the last
2962 * tethering status right away. If callback is registered when tethering has no upstream or
2963 * disabled, {@link OnTetheringEventCallback#onUpstreamChanged} will immediately be called
2964 * with a null argument. The same callback object cannot be registered twice.
2965 *
2966 * @param executor the executor on which callback will be invoked.
2967 * @param callback the callback to be called when tethering has change events.
2968 *
2969 * @deprecated Use {@link TetheringManager#registerTetheringEventCallback} instead.
2970 * @hide
2971 */
2972 @SystemApi
2973 @Deprecated
2974 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
2975 public void registerTetheringEventCallback(
2976 @NonNull @CallbackExecutor Executor executor,
2977 @NonNull final OnTetheringEventCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00002978 Objects.requireNonNull(callback, "OnTetheringEventCallback cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002979
2980 final TetheringEventCallback tetherCallback =
2981 new TetheringEventCallback() {
2982 @Override
2983 public void onUpstreamChanged(@Nullable Network network) {
2984 callback.onUpstreamChanged(network);
2985 }
2986 };
2987
2988 synchronized (mTetheringEventCallbacks) {
2989 mTetheringEventCallbacks.put(callback, tetherCallback);
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09002990 getTetheringManager().registerTetheringEventCallback(executor, tetherCallback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09002991 }
2992 }
2993
2994 /**
2995 * Remove tethering event callback previously registered with
2996 * {@link #registerTetheringEventCallback}.
2997 *
2998 * @param callback previously registered callback.
2999 *
3000 * @deprecated Use {@link TetheringManager#unregisterTetheringEventCallback} instead.
3001 * @hide
3002 */
3003 @SystemApi
3004 @Deprecated
3005 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
3006 public void unregisterTetheringEventCallback(
3007 @NonNull final OnTetheringEventCallback callback) {
3008 Objects.requireNonNull(callback, "The callback must be non-null");
3009 synchronized (mTetheringEventCallbacks) {
3010 final TetheringEventCallback tetherCallback =
3011 mTetheringEventCallbacks.remove(callback);
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003012 getTetheringManager().unregisterTetheringEventCallback(tetherCallback);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003013 }
3014 }
3015
3016
3017 /**
3018 * Get the list of regular expressions that define any tetherable
3019 * USB network interfaces. If USB tethering is not supported by the
3020 * device, this list should be empty.
3021 *
3022 * @return an array of 0 or more regular expression Strings defining
3023 * what interfaces are considered tetherable usb interfaces.
3024 *
3025 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
3026 * {@hide}
3027 */
3028 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3029 @UnsupportedAppUsage
3030 @Deprecated
3031 public String[] getTetherableUsbRegexs() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003032 return getTetheringManager().getTetherableUsbRegexs();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003033 }
3034
3035 /**
3036 * Get the list of regular expressions that define any tetherable
3037 * Wifi network interfaces. If Wifi tethering is not supported by the
3038 * device, this list should be empty.
3039 *
3040 * @return an array of 0 or more regular expression Strings defining
3041 * what interfaces are considered tetherable wifi interfaces.
3042 *
3043 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged} instead.
3044 * {@hide}
3045 */
3046 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3047 @UnsupportedAppUsage
3048 @Deprecated
3049 public String[] getTetherableWifiRegexs() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003050 return getTetheringManager().getTetherableWifiRegexs();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003051 }
3052
3053 /**
3054 * Get the list of regular expressions that define any tetherable
3055 * Bluetooth network interfaces. If Bluetooth tethering is not supported by the
3056 * device, this list should be empty.
3057 *
3058 * @return an array of 0 or more regular expression Strings defining
3059 * what interfaces are considered tetherable bluetooth interfaces.
3060 *
3061 * @deprecated Use {@link TetheringEventCallback#onTetherableInterfaceRegexpsChanged(
3062 *TetheringManager.TetheringInterfaceRegexps)} instead.
3063 * {@hide}
3064 */
3065 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3066 @UnsupportedAppUsage
3067 @Deprecated
3068 public String[] getTetherableBluetoothRegexs() {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003069 return getTetheringManager().getTetherableBluetoothRegexs();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003070 }
3071
3072 /**
3073 * Attempt to both alter the mode of USB and Tethering of USB. A
3074 * utility method to deal with some of the complexity of USB - will
3075 * attempt to switch to Rndis and subsequently tether the resulting
3076 * interface on {@code true} or turn off tethering and switch off
3077 * Rndis on {@code false}.
3078 *
3079 * <p>This method requires the caller to hold either the
3080 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
3081 * or the ability to modify system settings as determined by
3082 * {@link android.provider.Settings.System#canWrite}.</p>
3083 *
3084 * @param enable a boolean - {@code true} to enable tethering
3085 * @return error a {@code TETHER_ERROR} value indicating success or failure type
3086 * @deprecated Use {@link TetheringManager#startTethering} instead
3087 *
3088 * {@hide}
3089 */
3090 @UnsupportedAppUsage
3091 @Deprecated
3092 public int setUsbTethering(boolean enable) {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003093 return getTetheringManager().setUsbTethering(enable);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003094 }
3095
3096 /**
3097 * @deprecated Use {@link TetheringManager#TETHER_ERROR_NO_ERROR}.
3098 * {@hide}
3099 */
3100 @SystemApi
3101 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09003102 public static final int TETHER_ERROR_NO_ERROR = 0;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003103 /**
3104 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNKNOWN_IFACE}.
3105 * {@hide}
3106 */
3107 @Deprecated
3108 public static final int TETHER_ERROR_UNKNOWN_IFACE =
3109 TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
3110 /**
3111 * @deprecated Use {@link TetheringManager#TETHER_ERROR_SERVICE_UNAVAIL}.
3112 * {@hide}
3113 */
3114 @Deprecated
3115 public static final int TETHER_ERROR_SERVICE_UNAVAIL =
3116 TetheringManager.TETHER_ERROR_SERVICE_UNAVAIL;
3117 /**
3118 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNSUPPORTED}.
3119 * {@hide}
3120 */
3121 @Deprecated
3122 public static final int TETHER_ERROR_UNSUPPORTED = TetheringManager.TETHER_ERROR_UNSUPPORTED;
3123 /**
3124 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNAVAIL_IFACE}.
3125 * {@hide}
3126 */
3127 @Deprecated
3128 public static final int TETHER_ERROR_UNAVAIL_IFACE =
3129 TetheringManager.TETHER_ERROR_UNAVAIL_IFACE;
3130 /**
3131 * @deprecated Use {@link TetheringManager#TETHER_ERROR_INTERNAL_ERROR}.
3132 * {@hide}
3133 */
3134 @Deprecated
3135 public static final int TETHER_ERROR_MASTER_ERROR =
3136 TetheringManager.TETHER_ERROR_INTERNAL_ERROR;
3137 /**
3138 * @deprecated Use {@link TetheringManager#TETHER_ERROR_TETHER_IFACE_ERROR}.
3139 * {@hide}
3140 */
3141 @Deprecated
3142 public static final int TETHER_ERROR_TETHER_IFACE_ERROR =
3143 TetheringManager.TETHER_ERROR_TETHER_IFACE_ERROR;
3144 /**
3145 * @deprecated Use {@link TetheringManager#TETHER_ERROR_UNTETHER_IFACE_ERROR}.
3146 * {@hide}
3147 */
3148 @Deprecated
3149 public static final int TETHER_ERROR_UNTETHER_IFACE_ERROR =
3150 TetheringManager.TETHER_ERROR_UNTETHER_IFACE_ERROR;
3151 /**
3152 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENABLE_FORWARDING_ERROR}.
3153 * {@hide}
3154 */
3155 @Deprecated
3156 public static final int TETHER_ERROR_ENABLE_NAT_ERROR =
3157 TetheringManager.TETHER_ERROR_ENABLE_FORWARDING_ERROR;
3158 /**
3159 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DISABLE_FORWARDING_ERROR}.
3160 * {@hide}
3161 */
3162 @Deprecated
3163 public static final int TETHER_ERROR_DISABLE_NAT_ERROR =
3164 TetheringManager.TETHER_ERROR_DISABLE_FORWARDING_ERROR;
3165 /**
3166 * @deprecated Use {@link TetheringManager#TETHER_ERROR_IFACE_CFG_ERROR}.
3167 * {@hide}
3168 */
3169 @Deprecated
3170 public static final int TETHER_ERROR_IFACE_CFG_ERROR =
3171 TetheringManager.TETHER_ERROR_IFACE_CFG_ERROR;
3172 /**
3173 * @deprecated Use {@link TetheringManager#TETHER_ERROR_PROVISIONING_FAILED}.
3174 * {@hide}
3175 */
3176 @SystemApi
3177 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09003178 public static final int TETHER_ERROR_PROVISION_FAILED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003179 /**
3180 * @deprecated Use {@link TetheringManager#TETHER_ERROR_DHCPSERVER_ERROR}.
3181 * {@hide}
3182 */
3183 @Deprecated
3184 public static final int TETHER_ERROR_DHCPSERVER_ERROR =
3185 TetheringManager.TETHER_ERROR_DHCPSERVER_ERROR;
3186 /**
3187 * @deprecated Use {@link TetheringManager#TETHER_ERROR_ENTITLEMENT_UNKNOWN}.
3188 * {@hide}
3189 */
3190 @SystemApi
3191 @Deprecated
Remi NGUYEN VAN71ced8e2021-02-15 18:52:06 +09003192 public static final int TETHER_ERROR_ENTITLEMENT_UNKONWN = 13;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003193
3194 /**
3195 * Get a more detailed error code after a Tethering or Untethering
3196 * request asynchronously failed.
3197 *
3198 * @param iface The name of the interface of interest
3199 * @return error The error code of the last error tethering or untethering the named
3200 * interface
3201 *
3202 * @deprecated Use {@link TetheringEventCallback#onError(String, int)} instead.
3203 * {@hide}
3204 */
3205 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3206 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
3207 @Deprecated
3208 public int getLastTetherError(String iface) {
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003209 int error = getTetheringManager().getLastTetherError(iface);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003210 if (error == TetheringManager.TETHER_ERROR_UNKNOWN_TYPE) {
3211 // TETHER_ERROR_UNKNOWN_TYPE was introduced with TetheringManager and has never been
3212 // returned by ConnectivityManager. Convert it to the legacy TETHER_ERROR_UNKNOWN_IFACE
3213 // instead.
3214 error = TetheringManager.TETHER_ERROR_UNKNOWN_IFACE;
3215 }
3216 return error;
3217 }
3218
3219 /** @hide */
3220 @Retention(RetentionPolicy.SOURCE)
3221 @IntDef(value = {
3222 TETHER_ERROR_NO_ERROR,
3223 TETHER_ERROR_PROVISION_FAILED,
3224 TETHER_ERROR_ENTITLEMENT_UNKONWN,
3225 })
3226 public @interface EntitlementResultCode {
3227 }
3228
3229 /**
3230 * Callback for use with {@link #getLatestTetheringEntitlementResult} to find out whether
3231 * entitlement succeeded.
3232 *
3233 * @deprecated Use {@link TetheringManager#OnTetheringEntitlementResultListener} instead.
3234 * @hide
3235 */
3236 @SystemApi
3237 @Deprecated
3238 public interface OnTetheringEntitlementResultListener {
3239 /**
3240 * Called to notify entitlement result.
3241 *
3242 * @param resultCode an int value of entitlement result. It may be one of
3243 * {@link #TETHER_ERROR_NO_ERROR},
3244 * {@link #TETHER_ERROR_PROVISION_FAILED}, or
3245 * {@link #TETHER_ERROR_ENTITLEMENT_UNKONWN}.
3246 */
3247 void onTetheringEntitlementResult(@EntitlementResultCode int resultCode);
3248 }
3249
3250 /**
3251 * Get the last value of the entitlement check on this downstream. If the cached value is
3252 * {@link #TETHER_ERROR_NO_ERROR} or showEntitlementUi argument is false, it just return the
3253 * cached value. Otherwise, a UI-based entitlement check would be performed. It is not
3254 * guaranteed that the UI-based entitlement check will complete in any specific time period
3255 * and may in fact never complete. Any successful entitlement check the platform performs for
3256 * any reason will update the cached value.
3257 *
3258 * @param type the downstream type of tethering. Must be one of
3259 * {@link #TETHERING_WIFI},
3260 * {@link #TETHERING_USB}, or
3261 * {@link #TETHERING_BLUETOOTH}.
3262 * @param showEntitlementUi a boolean indicating whether to run UI-based entitlement check.
3263 * @param executor the executor on which callback will be invoked.
3264 * @param listener an {@link OnTetheringEntitlementResultListener} which will be called to
3265 * notify the caller of the result of entitlement check. The listener may be called zero
3266 * or one time.
3267 * @deprecated Use {@link TetheringManager#requestLatestTetheringEntitlementResult} instead.
3268 * {@hide}
3269 */
3270 @SystemApi
3271 @Deprecated
3272 @RequiresPermission(android.Manifest.permission.TETHER_PRIVILEGED)
3273 public void getLatestTetheringEntitlementResult(int type, boolean showEntitlementUi,
3274 @NonNull @CallbackExecutor Executor executor,
3275 @NonNull final OnTetheringEntitlementResultListener listener) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00003276 Objects.requireNonNull(listener, "TetheringEntitlementResultListener cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003277 ResultReceiver wrappedListener = new ResultReceiver(null) {
3278 @Override
3279 protected void onReceiveResult(int resultCode, Bundle resultData) {
lucaslineaff72d2021-03-04 09:38:21 +08003280 final long token = Binder.clearCallingIdentity();
3281 try {
3282 executor.execute(() -> {
3283 listener.onTetheringEntitlementResult(resultCode);
3284 });
3285 } finally {
3286 Binder.restoreCallingIdentity(token);
3287 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003288 }
3289 };
3290
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09003291 getTetheringManager().requestLatestTetheringEntitlementResult(type, wrappedListener,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003292 showEntitlementUi);
3293 }
3294
3295 /**
3296 * Report network connectivity status. This is currently used only
3297 * to alter status bar UI.
3298 * <p>This method requires the caller to hold the permission
3299 * {@link android.Manifest.permission#STATUS_BAR}.
3300 *
3301 * @param networkType The type of network you want to report on
3302 * @param percentage The quality of the connection 0 is bad, 100 is good
3303 * @deprecated Types are deprecated. Use {@link #reportNetworkConnectivity} instead.
3304 * {@hide}
3305 */
3306 public void reportInetCondition(int networkType, int percentage) {
3307 printStackTrace();
3308 try {
3309 mService.reportInetCondition(networkType, percentage);
3310 } catch (RemoteException e) {
3311 throw e.rethrowFromSystemServer();
3312 }
3313 }
3314
3315 /**
3316 * Report a problem network to the framework. This provides a hint to the system
3317 * that there might be connectivity problems on this network and may cause
3318 * the framework to re-evaluate network connectivity and/or switch to another
3319 * network.
3320 *
3321 * @param network The {@link Network} the application was attempting to use
3322 * or {@code null} to indicate the current default network.
3323 * @deprecated Use {@link #reportNetworkConnectivity} which allows reporting both
3324 * working and non-working connectivity.
3325 */
3326 @Deprecated
3327 public void reportBadNetwork(@Nullable Network network) {
3328 printStackTrace();
3329 try {
3330 // One of these will be ignored because it matches system's current state.
3331 // The other will trigger the necessary reevaluation.
3332 mService.reportNetworkConnectivity(network, true);
3333 mService.reportNetworkConnectivity(network, false);
3334 } catch (RemoteException e) {
3335 throw e.rethrowFromSystemServer();
3336 }
3337 }
3338
3339 /**
3340 * Report to the framework whether a network has working connectivity.
3341 * This provides a hint to the system that a particular network is providing
3342 * working connectivity or not. In response the framework may re-evaluate
3343 * the network's connectivity and might take further action thereafter.
3344 *
3345 * @param network The {@link Network} the application was attempting to use
3346 * or {@code null} to indicate the current default network.
3347 * @param hasConnectivity {@code true} if the application was able to successfully access the
3348 * Internet using {@code network} or {@code false} if not.
3349 */
3350 public void reportNetworkConnectivity(@Nullable Network network, boolean hasConnectivity) {
3351 printStackTrace();
3352 try {
3353 mService.reportNetworkConnectivity(network, hasConnectivity);
3354 } catch (RemoteException e) {
3355 throw e.rethrowFromSystemServer();
3356 }
3357 }
3358
3359 /**
Chalard Jeane1ce6ae2021-03-17 17:03:34 +09003360 * Set a network-independent global HTTP proxy.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003361 *
Chalard Jeane1ce6ae2021-03-17 17:03:34 +09003362 * This sets an HTTP proxy that applies to all networks and overrides any network-specific
3363 * proxy. If set, HTTP libraries that are proxy-aware will use this global proxy when
3364 * accessing any network, regardless of what the settings for that network are.
3365 *
3366 * Note that HTTP proxies are by nature typically network-dependent, and setting a global
3367 * proxy is likely to break networking on multiple networks. This method is only meant
3368 * for device policy clients looking to do general internal filtering or similar use cases.
3369 *
3370 * {@see #getGlobalProxy}
3371 * {@see LinkProperties#getHttpProxy}
3372 *
3373 * @param p A {@link ProxyInfo} object defining the new global HTTP proxy. Calling this
3374 * method with a {@code null} value will clear the global HTTP proxy.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003375 * @hide
3376 */
Chalard Jeane1ce6ae2021-03-17 17:03:34 +09003377 // Used by Device Policy Manager to set the global proxy.
Chiachang Wangf9294e72021-03-18 09:44:34 +08003378 @SystemApi(client = MODULE_LIBRARIES)
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003379 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
Chalard Jeane1ce6ae2021-03-17 17:03:34 +09003380 public void setGlobalProxy(@Nullable final ProxyInfo p) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003381 try {
3382 mService.setGlobalProxy(p);
3383 } catch (RemoteException e) {
3384 throw e.rethrowFromSystemServer();
3385 }
3386 }
3387
3388 /**
3389 * Retrieve any network-independent global HTTP proxy.
3390 *
3391 * @return {@link ProxyInfo} for the current global HTTP proxy or {@code null}
3392 * if no global HTTP proxy is set.
3393 * @hide
3394 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08003395 @SystemApi(client = MODULE_LIBRARIES)
3396 @Nullable
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003397 public ProxyInfo getGlobalProxy() {
3398 try {
3399 return mService.getGlobalProxy();
3400 } catch (RemoteException e) {
3401 throw e.rethrowFromSystemServer();
3402 }
3403 }
3404
3405 /**
3406 * Retrieve the global HTTP proxy, or if no global HTTP proxy is set, a
3407 * network-specific HTTP proxy. If {@code network} is null, the
3408 * network-specific proxy returned is the proxy of the default active
3409 * network.
3410 *
3411 * @return {@link ProxyInfo} for the current global HTTP proxy, or if no
3412 * global HTTP proxy is set, {@code ProxyInfo} for {@code network},
3413 * or when {@code network} is {@code null},
3414 * the {@code ProxyInfo} for the default active network. Returns
3415 * {@code null} when no proxy applies or the caller doesn't have
3416 * permission to use {@code network}.
3417 * @hide
3418 */
3419 public ProxyInfo getProxyForNetwork(Network network) {
3420 try {
3421 return mService.getProxyForNetwork(network);
3422 } catch (RemoteException e) {
3423 throw e.rethrowFromSystemServer();
3424 }
3425 }
3426
3427 /**
3428 * Get the current default HTTP proxy settings. If a global proxy is set it will be returned,
3429 * otherwise if this process is bound to a {@link Network} using
3430 * {@link #bindProcessToNetwork} then that {@code Network}'s proxy is returned, otherwise
3431 * the default network's proxy is returned.
3432 *
3433 * @return the {@link ProxyInfo} for the current HTTP proxy, or {@code null} if no
3434 * HTTP proxy is active.
3435 */
3436 @Nullable
3437 public ProxyInfo getDefaultProxy() {
3438 return getProxyForNetwork(getBoundNetworkForProcess());
3439 }
3440
3441 /**
3442 * Returns true if the hardware supports the given network type
3443 * else it returns false. This doesn't indicate we have coverage
3444 * or are authorized onto a network, just whether or not the
3445 * hardware supports it. For example a GSM phone without a SIM
3446 * should still return {@code true} for mobile data, but a wifi only
3447 * tablet would return {@code false}.
3448 *
3449 * @param networkType The network type we'd like to check
3450 * @return {@code true} if supported, else {@code false}
3451 * @deprecated Types are deprecated. Use {@link NetworkCapabilities} instead.
3452 * @hide
3453 */
3454 @Deprecated
3455 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3456 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.P, trackingBug = 130143562)
3457 public boolean isNetworkSupported(int networkType) {
3458 try {
3459 return mService.isNetworkSupported(networkType);
3460 } catch (RemoteException e) {
3461 throw e.rethrowFromSystemServer();
3462 }
3463 }
3464
3465 /**
3466 * Returns if the currently active data network is metered. A network is
3467 * classified as metered when the user is sensitive to heavy data usage on
3468 * that connection due to monetary costs, data limitations or
3469 * battery/performance issues. You should check this before doing large
3470 * data transfers, and warn the user or delay the operation until another
3471 * network is available.
3472 *
3473 * @return {@code true} if large transfers should be avoided, otherwise
3474 * {@code false}.
3475 */
3476 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
3477 public boolean isActiveNetworkMetered() {
3478 try {
3479 return mService.isActiveNetworkMetered();
3480 } catch (RemoteException e) {
3481 throw e.rethrowFromSystemServer();
3482 }
3483 }
3484
3485 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003486 * Set sign in error notification to visible or invisible
3487 *
3488 * @hide
3489 * @deprecated Doesn't properly deal with multiple connected networks of the same type.
3490 */
3491 @Deprecated
3492 public void setProvisioningNotificationVisible(boolean visible, int networkType,
3493 String action) {
3494 try {
3495 mService.setProvisioningNotificationVisible(visible, networkType, action);
3496 } catch (RemoteException e) {
3497 throw e.rethrowFromSystemServer();
3498 }
3499 }
3500
3501 /**
3502 * Set the value for enabling/disabling airplane mode
3503 *
3504 * @param enable whether to enable airplane mode or not
3505 *
3506 * @hide
3507 */
3508 @RequiresPermission(anyOf = {
3509 android.Manifest.permission.NETWORK_AIRPLANE_MODE,
3510 android.Manifest.permission.NETWORK_SETTINGS,
3511 android.Manifest.permission.NETWORK_SETUP_WIZARD,
3512 android.Manifest.permission.NETWORK_STACK})
3513 @SystemApi
3514 public void setAirplaneMode(boolean enable) {
3515 try {
3516 mService.setAirplaneMode(enable);
3517 } catch (RemoteException e) {
3518 throw e.rethrowFromSystemServer();
3519 }
3520 }
3521
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003522 /**
3523 * Registers the specified {@link NetworkProvider}.
3524 * Each listener must only be registered once. The listener can be unregistered with
3525 * {@link #unregisterNetworkProvider}.
3526 *
3527 * @param provider the provider to register
3528 * @return the ID of the provider. This ID must be used by the provider when registering
3529 * {@link android.net.NetworkAgent}s.
3530 * @hide
3531 */
3532 @SystemApi
3533 @RequiresPermission(anyOf = {
3534 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3535 android.Manifest.permission.NETWORK_FACTORY})
3536 public int registerNetworkProvider(@NonNull NetworkProvider provider) {
3537 if (provider.getProviderId() != NetworkProvider.ID_NONE) {
3538 throw new IllegalStateException("NetworkProviders can only be registered once");
3539 }
3540
3541 try {
3542 int providerId = mService.registerNetworkProvider(provider.getMessenger(),
3543 provider.getName());
3544 provider.setProviderId(providerId);
3545 } catch (RemoteException e) {
3546 throw e.rethrowFromSystemServer();
3547 }
3548 return provider.getProviderId();
3549 }
3550
3551 /**
3552 * Unregisters the specified NetworkProvider.
3553 *
3554 * @param provider the provider to unregister
3555 * @hide
3556 */
3557 @SystemApi
3558 @RequiresPermission(anyOf = {
3559 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3560 android.Manifest.permission.NETWORK_FACTORY})
3561 public void unregisterNetworkProvider(@NonNull NetworkProvider provider) {
3562 try {
3563 mService.unregisterNetworkProvider(provider.getMessenger());
3564 } catch (RemoteException e) {
3565 throw e.rethrowFromSystemServer();
3566 }
3567 provider.setProviderId(NetworkProvider.ID_NONE);
3568 }
3569
Chalard Jeand1b498b2021-01-05 08:40:09 +09003570 /**
3571 * Register or update a network offer with ConnectivityService.
3572 *
3573 * ConnectivityService keeps track of offers made by the various providers and matches
Chalard Jean61e231f2021-03-24 17:43:10 +09003574 * them to networking requests made by apps or the system. A callback identifies an offer
3575 * uniquely, and later calls with the same callback update the offer. The provider supplies a
3576 * score and the capabilities of the network it might be able to bring up ; these act as
3577 * filters used by ConnectivityService to only send those requests that can be fulfilled by the
Chalard Jeand1b498b2021-01-05 08:40:09 +09003578 * provider.
3579 *
3580 * The provider is under no obligation to be able to bring up the network it offers at any
3581 * given time. Instead, this mechanism is meant to limit requests received by providers
3582 * to those they actually have a chance to fulfill, as providers don't have a way to compare
3583 * the quality of the network satisfying a given request to their own offer.
3584 *
3585 * An offer can be updated by calling this again with the same callback object. This is
3586 * similar to calling unofferNetwork and offerNetwork again, but will only update the
3587 * provider with the changes caused by the changes in the offer.
3588 *
3589 * @param provider The provider making this offer.
3590 * @param score The prospective score of the network.
3591 * @param caps The prospective capabilities of the network.
3592 * @param callback The callback to call when this offer is needed or unneeded.
Chalard Jean428b9132021-01-12 10:58:56 +09003593 * @hide exposed via the NetworkProvider class.
Chalard Jeand1b498b2021-01-05 08:40:09 +09003594 */
3595 @RequiresPermission(anyOf = {
3596 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3597 android.Manifest.permission.NETWORK_FACTORY})
Chalard Jean148dcce2021-03-22 22:44:02 +09003598 public void offerNetwork(@NonNull final int providerId,
Chalard Jeand1b498b2021-01-05 08:40:09 +09003599 @NonNull final NetworkScore score, @NonNull final NetworkCapabilities caps,
3600 @NonNull final INetworkOfferCallback callback) {
3601 try {
Chalard Jean148dcce2021-03-22 22:44:02 +09003602 mService.offerNetwork(providerId,
Chalard Jeand1b498b2021-01-05 08:40:09 +09003603 Objects.requireNonNull(score, "null score"),
3604 Objects.requireNonNull(caps, "null caps"),
3605 Objects.requireNonNull(callback, "null callback"));
3606 } catch (RemoteException e) {
3607 throw e.rethrowFromSystemServer();
3608 }
3609 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003610
Chalard Jeand1b498b2021-01-05 08:40:09 +09003611 /**
3612 * Withdraw a network offer made with {@link #offerNetwork}.
3613 *
3614 * @param callback The callback passed at registration time. This must be the same object
3615 * that was passed to {@link #offerNetwork}
Chalard Jean428b9132021-01-12 10:58:56 +09003616 * @hide exposed via the NetworkProvider class.
Chalard Jeand1b498b2021-01-05 08:40:09 +09003617 */
3618 public void unofferNetwork(@NonNull final INetworkOfferCallback callback) {
3619 try {
3620 mService.unofferNetwork(Objects.requireNonNull(callback));
3621 } catch (RemoteException e) {
3622 throw e.rethrowFromSystemServer();
3623 }
3624 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003625 /** @hide exposed via the NetworkProvider class. */
3626 @RequiresPermission(anyOf = {
3627 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3628 android.Manifest.permission.NETWORK_FACTORY})
3629 public void declareNetworkRequestUnfulfillable(@NonNull NetworkRequest request) {
3630 try {
3631 mService.declareNetworkRequestUnfulfillable(request);
3632 } catch (RemoteException e) {
3633 throw e.rethrowFromSystemServer();
3634 }
3635 }
3636
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003637 /**
3638 * @hide
3639 * Register a NetworkAgent with ConnectivityService.
3640 * @return Network corresponding to NetworkAgent.
3641 */
3642 @RequiresPermission(anyOf = {
3643 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
3644 android.Manifest.permission.NETWORK_FACTORY})
3645 public Network registerNetworkAgent(INetworkAgent na, NetworkInfo ni, LinkProperties lp,
Chalard Jeand6372722020-12-21 18:36:52 +09003646 NetworkCapabilities nc, @NonNull NetworkScore score, NetworkAgentConfig config,
3647 int providerId) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003648 try {
3649 return mService.registerNetworkAgent(na, ni, lp, nc, score, config, providerId);
3650 } catch (RemoteException e) {
3651 throw e.rethrowFromSystemServer();
3652 }
3653 }
3654
3655 /**
3656 * Base class for {@code NetworkRequest} callbacks. Used for notifications about network
3657 * changes. Should be extended by applications wanting notifications.
3658 *
3659 * A {@code NetworkCallback} is registered by calling
3660 * {@link #requestNetwork(NetworkRequest, NetworkCallback)},
3661 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)},
3662 * or {@link #registerDefaultNetworkCallback(NetworkCallback)}. A {@code NetworkCallback} is
3663 * unregistered by calling {@link #unregisterNetworkCallback(NetworkCallback)}.
3664 * A {@code NetworkCallback} should be registered at most once at any time.
3665 * A {@code NetworkCallback} that has been unregistered can be registered again.
3666 */
3667 public static class NetworkCallback {
3668 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08003669 * No flags associated with this callback.
3670 * @hide
3671 */
3672 public static final int FLAG_NONE = 0;
lucaslinc582d502022-01-27 09:07:00 +08003673
Roshan Piuse08bc182020-12-22 15:10:42 -08003674 /**
lucaslinc582d502022-01-27 09:07:00 +08003675 * Inclusion of this flag means location-sensitive redaction requests keeping location info.
3676 *
3677 * Some objects like {@link NetworkCapabilities} may contain location-sensitive information.
3678 * Prior to Android 12, this information is always returned to apps holding the appropriate
3679 * permission, possibly noting that the app has used location.
3680 * <p>In Android 12 and above, by default the sent objects do not contain any location
3681 * information, even if the app holds the necessary permissions, and the system does not
3682 * take note of location usage by the app. Apps can request that location information is
3683 * included, in which case the system will check location permission and the location
3684 * toggle state, and take note of location usage by the app if any such information is
3685 * returned.
3686 *
Roshan Piuse08bc182020-12-22 15:10:42 -08003687 * Use this flag to include any location sensitive data in {@link NetworkCapabilities} sent
3688 * via {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}.
3689 * <p>
3690 * These include:
3691 * <li> Some transport info instances (retrieved via
3692 * {@link NetworkCapabilities#getTransportInfo()}) like {@link android.net.wifi.WifiInfo}
3693 * contain location sensitive information.
3694 * <li> OwnerUid (retrieved via {@link NetworkCapabilities#getOwnerUid()} is location
Anton Hanssondf401092021-10-20 11:27:13 +01003695 * sensitive for wifi suggestor apps (i.e using
3696 * {@link android.net.wifi.WifiNetworkSuggestion WifiNetworkSuggestion}).</li>
Roshan Piuse08bc182020-12-22 15:10:42 -08003697 * </p>
3698 * <p>
3699 * Note:
3700 * <li> Retrieving this location sensitive information (subject to app's location
3701 * permissions) will be noted by system. </li>
3702 * <li> Without this flag any {@link NetworkCapabilities} provided via the callback does
lucaslinc582d502022-01-27 09:07:00 +08003703 * not include location sensitive information.
Roshan Piuse08bc182020-12-22 15:10:42 -08003704 */
Roshan Pius189d0092021-03-11 21:16:44 -08003705 // Note: Some existing fields which are location sensitive may still be included without
3706 // this flag if the app targets SDK < S (to maintain backwards compatibility).
Roshan Piuse08bc182020-12-22 15:10:42 -08003707 public static final int FLAG_INCLUDE_LOCATION_INFO = 1 << 0;
3708
3709 /** @hide */
3710 @Retention(RetentionPolicy.SOURCE)
3711 @IntDef(flag = true, prefix = "FLAG_", value = {
3712 FLAG_NONE,
3713 FLAG_INCLUDE_LOCATION_INFO
3714 })
3715 public @interface Flag { }
3716
3717 /**
3718 * All the valid flags for error checking.
3719 */
3720 private static final int VALID_FLAGS = FLAG_INCLUDE_LOCATION_INFO;
3721
3722 public NetworkCallback() {
3723 this(FLAG_NONE);
3724 }
3725
3726 public NetworkCallback(@Flag int flags) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00003727 if ((flags & VALID_FLAGS) != flags) {
3728 throw new IllegalArgumentException("Invalid flags");
3729 }
Roshan Piuse08bc182020-12-22 15:10:42 -08003730 mFlags = flags;
3731 }
3732
3733 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003734 * Called when the framework connects to a new network to evaluate whether it satisfies this
3735 * request. If evaluation succeeds, this callback may be followed by an {@link #onAvailable}
3736 * callback. There is no guarantee that this new network will satisfy any requests, or that
3737 * the network will stay connected for longer than the time necessary to evaluate it.
3738 * <p>
3739 * Most applications <b>should not</b> act on this callback, and should instead use
3740 * {@link #onAvailable}. This callback is intended for use by applications that can assist
3741 * the framework in properly evaluating the network &mdash; for example, an application that
3742 * can automatically log in to a captive portal without user intervention.
3743 *
3744 * @param network The {@link Network} of the network that is being evaluated.
3745 *
3746 * @hide
3747 */
3748 public void onPreCheck(@NonNull Network network) {}
3749
3750 /**
3751 * Called when the framework connects and has declared a new network ready for use.
3752 * This callback may be called more than once if the {@link Network} that is
3753 * satisfying the request changes.
3754 *
3755 * @param network The {@link Network} of the satisfying network.
3756 * @param networkCapabilities The {@link NetworkCapabilities} of the satisfying network.
3757 * @param linkProperties The {@link LinkProperties} of the satisfying network.
3758 * @param blocked Whether access to the {@link Network} is blocked due to system policy.
3759 * @hide
3760 */
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003761 public final void onAvailable(@NonNull Network network,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003762 @NonNull NetworkCapabilities networkCapabilities,
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003763 @NonNull LinkProperties linkProperties, @BlockedReason int blocked) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003764 // Internally only this method is called when a new network is available, and
3765 // it calls the callback in the same way and order that older versions used
3766 // to call so as not to change the behavior.
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003767 onAvailable(network, networkCapabilities, linkProperties, blocked != 0);
3768 onBlockedStatusChanged(network, blocked);
3769 }
3770
3771 /**
3772 * Legacy variant of onAvailable that takes a boolean blocked reason.
3773 *
3774 * This method has never been public API, but it's not final, so there may be apps that
3775 * implemented it and rely on it being called. Do our best not to break them.
3776 * Note: such apps will also get a second call to onBlockedStatusChanged immediately after
3777 * this method is called. There does not seem to be a way to avoid this.
3778 * TODO: add a compat check to move apps off this method, and eventually stop calling it.
3779 *
3780 * @hide
3781 */
3782 public void onAvailable(@NonNull Network network,
3783 @NonNull NetworkCapabilities networkCapabilities,
3784 @NonNull LinkProperties linkProperties, boolean blocked) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003785 onAvailable(network);
3786 if (!networkCapabilities.hasCapability(
3787 NetworkCapabilities.NET_CAPABILITY_NOT_SUSPENDED)) {
3788 onNetworkSuspended(network);
3789 }
3790 onCapabilitiesChanged(network, networkCapabilities);
3791 onLinkPropertiesChanged(network, linkProperties);
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003792 // No call to onBlockedStatusChanged here. That is done by the caller.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003793 }
3794
3795 /**
3796 * Called when the framework connects and has declared a new network ready for use.
3797 *
3798 * <p>For callbacks registered with {@link #registerNetworkCallback}, multiple networks may
3799 * be available at the same time, and onAvailable will be called for each of these as they
3800 * appear.
3801 *
3802 * <p>For callbacks registered with {@link #requestNetwork} and
3803 * {@link #registerDefaultNetworkCallback}, this means the network passed as an argument
3804 * is the new best network for this request and is now tracked by this callback ; this
3805 * callback will no longer receive method calls about other networks that may have been
3806 * passed to this method previously. The previously-best network may have disconnected, or
3807 * it may still be around and the newly-best network may simply be better.
3808 *
3809 * <p>Starting with {@link android.os.Build.VERSION_CODES#O}, this will always immediately
3810 * be followed by a call to {@link #onCapabilitiesChanged(Network, NetworkCapabilities)}
3811 * then by a call to {@link #onLinkPropertiesChanged(Network, LinkProperties)}, and a call
3812 * to {@link #onBlockedStatusChanged(Network, boolean)}.
3813 *
3814 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3815 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3816 * this callback as this is prone to race conditions (there is no guarantee the objects
3817 * returned by these methods will be current). Instead, wait for a call to
3818 * {@link #onCapabilitiesChanged(Network, NetworkCapabilities)} and
3819 * {@link #onLinkPropertiesChanged(Network, LinkProperties)} whose arguments are guaranteed
3820 * to be well-ordered with respect to other callbacks.
3821 *
3822 * @param network The {@link Network} of the satisfying network.
3823 */
3824 public void onAvailable(@NonNull Network network) {}
3825
3826 /**
3827 * Called when the network is about to be lost, typically because there are no outstanding
3828 * requests left for it. This may be paired with a {@link NetworkCallback#onAvailable} call
3829 * with the new replacement network for graceful handover. This method is not guaranteed
3830 * to be called before {@link NetworkCallback#onLost} is called, for example in case a
3831 * network is suddenly disconnected.
3832 *
3833 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3834 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3835 * this callback as this is prone to race conditions ; calling these methods while in a
3836 * callback may return an outdated or even a null object.
3837 *
3838 * @param network The {@link Network} that is about to be lost.
3839 * @param maxMsToLive The time in milliseconds the system intends to keep the network
3840 * connected for graceful handover; note that the network may still
3841 * suffer a hard loss at any time.
3842 */
3843 public void onLosing(@NonNull Network network, int maxMsToLive) {}
3844
3845 /**
3846 * Called when a network disconnects or otherwise no longer satisfies this request or
3847 * callback.
3848 *
3849 * <p>If the callback was registered with requestNetwork() or
3850 * registerDefaultNetworkCallback(), it will only be invoked against the last network
3851 * returned by onAvailable() when that network is lost and no other network satisfies
3852 * the criteria of the request.
3853 *
3854 * <p>If the callback was registered with registerNetworkCallback() it will be called for
3855 * each network which no longer satisfies the criteria of the callback.
3856 *
3857 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3858 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3859 * this callback as this is prone to race conditions ; calling these methods while in a
3860 * callback may return an outdated or even a null object.
3861 *
3862 * @param network The {@link Network} lost.
3863 */
3864 public void onLost(@NonNull Network network) {}
3865
3866 /**
3867 * Called if no network is found within the timeout time specified in
3868 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} call or if the
3869 * requested network request cannot be fulfilled (whether or not a timeout was
3870 * specified). When this callback is invoked the associated
3871 * {@link NetworkRequest} will have already been removed and released, as if
3872 * {@link #unregisterNetworkCallback(NetworkCallback)} had been called.
3873 */
3874 public void onUnavailable() {}
3875
3876 /**
3877 * Called when the network corresponding to this request changes capabilities but still
3878 * satisfies the requested criteria.
3879 *
3880 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3881 * to be called immediately after {@link #onAvailable}.
3882 *
3883 * <p>Do NOT call {@link #getLinkProperties(Network)} or other synchronous
3884 * ConnectivityManager methods in this callback as this is prone to race conditions :
3885 * calling these methods while in a callback may return an outdated or even a null object.
3886 *
3887 * @param network The {@link Network} whose capabilities have changed.
Roshan Piuse08bc182020-12-22 15:10:42 -08003888 * @param networkCapabilities The new {@link NetworkCapabilities} for this
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003889 * network.
3890 */
3891 public void onCapabilitiesChanged(@NonNull Network network,
3892 @NonNull NetworkCapabilities networkCapabilities) {}
3893
3894 /**
3895 * Called when the network corresponding to this request changes {@link LinkProperties}.
3896 *
3897 * <p>Starting with {@link android.os.Build.VERSION_CODES#O} this method is guaranteed
3898 * to be called immediately after {@link #onAvailable}.
3899 *
3900 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or other synchronous
3901 * ConnectivityManager methods in this callback as this is prone to race conditions :
3902 * calling these methods while in a callback may return an outdated or even a null object.
3903 *
3904 * @param network The {@link Network} whose link properties have changed.
3905 * @param linkProperties The new {@link LinkProperties} for this network.
3906 */
3907 public void onLinkPropertiesChanged(@NonNull Network network,
3908 @NonNull LinkProperties linkProperties) {}
3909
3910 /**
3911 * Called when the network the framework connected to for this request suspends data
3912 * transmission temporarily.
3913 *
3914 * <p>This generally means that while the TCP connections are still live temporarily
3915 * network data fails to transfer. To give a specific example, this is used on cellular
3916 * networks to mask temporary outages when driving through a tunnel, etc. In general this
3917 * means read operations on sockets on this network will block once the buffers are
3918 * drained, and write operations will block once the buffers are full.
3919 *
3920 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3921 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3922 * this callback as this is prone to race conditions (there is no guarantee the objects
3923 * returned by these methods will be current).
3924 *
3925 * @hide
3926 */
3927 public void onNetworkSuspended(@NonNull Network network) {}
3928
3929 /**
3930 * Called when the network the framework connected to for this request
3931 * returns from a {@link NetworkInfo.State#SUSPENDED} state. This should always be
3932 * preceded by a matching {@link NetworkCallback#onNetworkSuspended} call.
3933
3934 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3935 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3936 * this callback as this is prone to race conditions : calling these methods while in a
3937 * callback may return an outdated or even a null object.
3938 *
3939 * @hide
3940 */
3941 public void onNetworkResumed(@NonNull Network network) {}
3942
3943 /**
3944 * Called when access to the specified network is blocked or unblocked.
3945 *
3946 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3947 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3948 * this callback as this is prone to race conditions : calling these methods while in a
3949 * callback may return an outdated or even a null object.
3950 *
3951 * @param network The {@link Network} whose blocked status has changed.
3952 * @param blocked The blocked status of this {@link Network}.
3953 */
3954 public void onBlockedStatusChanged(@NonNull Network network, boolean blocked) {}
3955
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003956 /**
Lorenzo Colittia1bd6f62021-03-25 23:17:36 +09003957 * Called when access to the specified network is blocked or unblocked, or the reason for
3958 * access being blocked changes.
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09003959 *
3960 * If a NetworkCallback object implements this method,
3961 * {@link #onBlockedStatusChanged(Network, boolean)} will not be called.
3962 *
3963 * <p>Do NOT call {@link #getNetworkCapabilities(Network)} or
3964 * {@link #getLinkProperties(Network)} or other synchronous ConnectivityManager methods in
3965 * this callback as this is prone to race conditions : calling these methods while in a
3966 * callback may return an outdated or even a null object.
3967 *
3968 * @param network The {@link Network} whose blocked status has changed.
3969 * @param blocked The blocked status of this {@link Network}.
3970 * @hide
3971 */
3972 @SystemApi(client = MODULE_LIBRARIES)
3973 public void onBlockedStatusChanged(@NonNull Network network, @BlockedReason int blocked) {
3974 onBlockedStatusChanged(network, blocked != 0);
3975 }
3976
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003977 private NetworkRequest networkRequest;
Roshan Piuse08bc182020-12-22 15:10:42 -08003978 private final int mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09003979 }
3980
3981 /**
3982 * Constant error codes used by ConnectivityService to communicate about failures and errors
3983 * across a Binder boundary.
3984 * @hide
3985 */
3986 public interface Errors {
3987 int TOO_MANY_REQUESTS = 1;
3988 }
3989
3990 /** @hide */
3991 public static class TooManyRequestsException extends RuntimeException {}
3992
3993 private static RuntimeException convertServiceException(ServiceSpecificException e) {
3994 switch (e.errorCode) {
3995 case Errors.TOO_MANY_REQUESTS:
3996 return new TooManyRequestsException();
3997 default:
3998 Log.w(TAG, "Unknown service error code " + e.errorCode);
3999 return new RuntimeException(e);
4000 }
4001 }
4002
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004003 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004004 public static final int CALLBACK_PRECHECK = 1;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004005 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004006 public static final int CALLBACK_AVAILABLE = 2;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004007 /** @hide arg1 = TTL */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004008 public static final int CALLBACK_LOSING = 3;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004009 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004010 public static final int CALLBACK_LOST = 4;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004011 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004012 public static final int CALLBACK_UNAVAIL = 5;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004013 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004014 public static final int CALLBACK_CAP_CHANGED = 6;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004015 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004016 public static final int CALLBACK_IP_CHANGED = 7;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004017 /** @hide obj = NetworkCapabilities, arg1 = seq number */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004018 private static final int EXPIRE_LEGACY_REQUEST = 8;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004019 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004020 public static final int CALLBACK_SUSPENDED = 9;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004021 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004022 public static final int CALLBACK_RESUMED = 10;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004023 /** @hide */
Remi NGUYEN VAN1b9f03a2021-03-12 15:24:06 +09004024 public static final int CALLBACK_BLK_CHANGED = 11;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004025
4026 /** @hide */
4027 public static String getCallbackName(int whichCallback) {
4028 switch (whichCallback) {
4029 case CALLBACK_PRECHECK: return "CALLBACK_PRECHECK";
4030 case CALLBACK_AVAILABLE: return "CALLBACK_AVAILABLE";
4031 case CALLBACK_LOSING: return "CALLBACK_LOSING";
4032 case CALLBACK_LOST: return "CALLBACK_LOST";
4033 case CALLBACK_UNAVAIL: return "CALLBACK_UNAVAIL";
4034 case CALLBACK_CAP_CHANGED: return "CALLBACK_CAP_CHANGED";
4035 case CALLBACK_IP_CHANGED: return "CALLBACK_IP_CHANGED";
4036 case EXPIRE_LEGACY_REQUEST: return "EXPIRE_LEGACY_REQUEST";
4037 case CALLBACK_SUSPENDED: return "CALLBACK_SUSPENDED";
4038 case CALLBACK_RESUMED: return "CALLBACK_RESUMED";
4039 case CALLBACK_BLK_CHANGED: return "CALLBACK_BLK_CHANGED";
4040 default:
4041 return Integer.toString(whichCallback);
4042 }
4043 }
4044
4045 private class CallbackHandler extends Handler {
4046 private static final String TAG = "ConnectivityManager.CallbackHandler";
4047 private static final boolean DBG = false;
4048
4049 CallbackHandler(Looper looper) {
4050 super(looper);
4051 }
4052
4053 CallbackHandler(Handler handler) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004054 this(Objects.requireNonNull(handler, "Handler cannot be null.").getLooper());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004055 }
4056
4057 @Override
4058 public void handleMessage(Message message) {
4059 if (message.what == EXPIRE_LEGACY_REQUEST) {
4060 expireRequest((NetworkCapabilities) message.obj, message.arg1);
4061 return;
4062 }
4063
4064 final NetworkRequest request = getObject(message, NetworkRequest.class);
4065 final Network network = getObject(message, Network.class);
4066 final NetworkCallback callback;
4067 synchronized (sCallbacks) {
4068 callback = sCallbacks.get(request);
4069 if (callback == null) {
4070 Log.w(TAG,
4071 "callback not found for " + getCallbackName(message.what) + " message");
4072 return;
4073 }
4074 if (message.what == CALLBACK_UNAVAIL) {
4075 sCallbacks.remove(request);
4076 callback.networkRequest = ALREADY_UNREGISTERED;
4077 }
4078 }
4079 if (DBG) {
4080 Log.d(TAG, getCallbackName(message.what) + " for network " + network);
4081 }
4082
4083 switch (message.what) {
4084 case CALLBACK_PRECHECK: {
4085 callback.onPreCheck(network);
4086 break;
4087 }
4088 case CALLBACK_AVAILABLE: {
4089 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
4090 LinkProperties lp = getObject(message, LinkProperties.class);
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09004091 callback.onAvailable(network, cap, lp, message.arg1);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004092 break;
4093 }
4094 case CALLBACK_LOSING: {
4095 callback.onLosing(network, message.arg1);
4096 break;
4097 }
4098 case CALLBACK_LOST: {
4099 callback.onLost(network);
4100 break;
4101 }
4102 case CALLBACK_UNAVAIL: {
4103 callback.onUnavailable();
4104 break;
4105 }
4106 case CALLBACK_CAP_CHANGED: {
4107 NetworkCapabilities cap = getObject(message, NetworkCapabilities.class);
4108 callback.onCapabilitiesChanged(network, cap);
4109 break;
4110 }
4111 case CALLBACK_IP_CHANGED: {
4112 LinkProperties lp = getObject(message, LinkProperties.class);
4113 callback.onLinkPropertiesChanged(network, lp);
4114 break;
4115 }
4116 case CALLBACK_SUSPENDED: {
4117 callback.onNetworkSuspended(network);
4118 break;
4119 }
4120 case CALLBACK_RESUMED: {
4121 callback.onNetworkResumed(network);
4122 break;
4123 }
4124 case CALLBACK_BLK_CHANGED: {
Lorenzo Colitti8ad58122021-03-18 00:54:57 +09004125 callback.onBlockedStatusChanged(network, message.arg1);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004126 }
4127 }
4128 }
4129
4130 private <T> T getObject(Message msg, Class<T> c) {
4131 return (T) msg.getData().getParcelable(c.getSimpleName());
4132 }
4133 }
4134
4135 private CallbackHandler getDefaultHandler() {
4136 synchronized (sCallbacks) {
4137 if (sCallbackHandler == null) {
4138 sCallbackHandler = new CallbackHandler(ConnectivityThread.getInstanceLooper());
4139 }
4140 return sCallbackHandler;
4141 }
4142 }
4143
4144 private static final HashMap<NetworkRequest, NetworkCallback> sCallbacks = new HashMap<>();
4145 private static CallbackHandler sCallbackHandler;
4146
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004147 private NetworkRequest sendRequestForNetwork(int asUid, NetworkCapabilities need,
4148 NetworkCallback callback, int timeoutMs, NetworkRequest.Type reqType, int legacyType,
4149 CallbackHandler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004150 printStackTrace();
4151 checkCallbackNotNull(callback);
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004152 if (reqType != TRACK_DEFAULT && reqType != TRACK_SYSTEM_DEFAULT && need == null) {
4153 throw new IllegalArgumentException("null NetworkCapabilities");
4154 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004155 final NetworkRequest request;
4156 final String callingPackageName = mContext.getOpPackageName();
4157 try {
4158 synchronized(sCallbacks) {
4159 if (callback.networkRequest != null
4160 && callback.networkRequest != ALREADY_UNREGISTERED) {
4161 // TODO: throw exception instead and enforce 1:1 mapping of callbacks
4162 // and requests (http://b/20701525).
4163 Log.e(TAG, "NetworkCallback was already registered");
4164 }
4165 Messenger messenger = new Messenger(handler);
4166 Binder binder = new Binder();
Roshan Piuse08bc182020-12-22 15:10:42 -08004167 final int callbackFlags = callback.mFlags;
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004168 if (reqType == LISTEN) {
4169 request = mService.listenForNetwork(
Roshan Piuse08bc182020-12-22 15:10:42 -08004170 need, messenger, binder, callbackFlags, callingPackageName,
Roshan Piusa8a477b2020-12-17 14:53:09 -08004171 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004172 } else {
4173 request = mService.requestNetwork(
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004174 asUid, need, reqType.ordinal(), messenger, timeoutMs, binder,
4175 legacyType, callbackFlags, callingPackageName, getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004176 }
4177 if (request != null) {
4178 sCallbacks.put(request, callback);
4179 }
4180 callback.networkRequest = request;
4181 }
4182 } catch (RemoteException e) {
4183 throw e.rethrowFromSystemServer();
4184 } catch (ServiceSpecificException e) {
4185 throw convertServiceException(e);
4186 }
4187 return request;
4188 }
4189
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004190 private NetworkRequest sendRequestForNetwork(NetworkCapabilities need, NetworkCallback callback,
4191 int timeoutMs, NetworkRequest.Type reqType, int legacyType, CallbackHandler handler) {
4192 return sendRequestForNetwork(Process.INVALID_UID, need, callback, timeoutMs, reqType,
4193 legacyType, handler);
4194 }
4195
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004196 /**
4197 * Helper function to request a network with a particular legacy type.
4198 *
4199 * This API is only for use in internal system code that requests networks with legacy type and
4200 * relies on CONNECTIVITY_ACTION broadcasts instead of NetworkCallbacks. New caller should use
4201 * {@link #requestNetwork(NetworkRequest, NetworkCallback, Handler)} instead.
4202 *
4203 * @param request {@link NetworkRequest} describing this request.
4204 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
4205 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
4206 * be a positive value (i.e. >0).
4207 * @param legacyType to specify the network type(#TYPE_*).
4208 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4209 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
4210 * the callback must not be shared - it uniquely specifies this request.
4211 *
4212 * @hide
4213 */
4214 @SystemApi
4215 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
4216 public void requestNetwork(@NonNull NetworkRequest request,
4217 int timeoutMs, int legacyType, @NonNull Handler handler,
4218 @NonNull NetworkCallback networkCallback) {
4219 if (legacyType == TYPE_NONE) {
4220 throw new IllegalArgumentException("TYPE_NONE is meaningless legacy type");
4221 }
4222 CallbackHandler cbHandler = new CallbackHandler(handler);
4223 NetworkCapabilities nc = request.networkCapabilities;
4224 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, legacyType, cbHandler);
4225 }
4226
4227 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004228 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004229 *
4230 * <p>This method will attempt to find the best network that matches the passed
4231 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
4232 * criteria. The platform will evaluate which network is the best at its own discretion.
4233 * Throughput, latency, cost per byte, policy, user preference and other considerations
4234 * may be factored in the decision of what is considered the best network.
4235 *
4236 * <p>As long as this request is outstanding, the platform will try to maintain the best network
4237 * matching this request, while always attempting to match the request to a better network if
4238 * possible. If a better match is found, the platform will switch this request to the now-best
4239 * network and inform the app of the newly best network by invoking
4240 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
4241 * will not try to maintain any other network than the best one currently matching the request:
4242 * a network not matching any network request may be disconnected at any time.
4243 *
4244 * <p>For example, an application could use this method to obtain a connected cellular network
4245 * even if the device currently has a data connection over Ethernet. This may cause the cellular
4246 * radio to consume additional power. Or, an application could inform the system that it wants
4247 * a network supporting sending MMSes and have the system let it know about the currently best
4248 * MMS-supporting network through the provided {@link NetworkCallback}.
4249 *
4250 * <p>The status of the request can be followed by listening to the various callbacks described
4251 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
4252 * used to direct traffic to the network (although accessing some networks may be subject to
4253 * holding specific permissions). Callers will learn about the specific characteristics of the
4254 * network through
4255 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
4256 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
4257 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
4258 * matching the request at any given time; therefore when a better network matching the request
4259 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
4260 * with the new network after which no further updates are given about the previously-best
4261 * network, unless it becomes the best again at some later time. All callbacks are invoked
4262 * in order on the same thread, which by default is a thread created by the framework running
4263 * in the app.
4264 * {@see #requestNetwork(NetworkRequest, NetworkCallback, Handler)} to change where the
4265 * callbacks are invoked.
4266 *
4267 * <p>This{@link NetworkRequest} will live until released via
4268 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
4269 * which point the system may let go of the network at any time.
4270 *
4271 * <p>A version of this method which takes a timeout is
4272 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)}, that an app can use to only
4273 * wait for a limited amount of time for the network to become unavailable.
4274 *
4275 * <p>It is presently unsupported to request a network with mutable
4276 * {@link NetworkCapabilities} such as
4277 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
4278 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
4279 * as these {@code NetworkCapabilities} represent states that a particular
4280 * network may never attain, and whether a network will attain these states
4281 * is unknown prior to bringing up the network so the framework does not
4282 * know how to go about satisfying a request with these capabilities.
4283 *
4284 * <p>This method requires the caller to hold either the
4285 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
4286 * or the ability to modify system settings as determined by
4287 * {@link android.provider.Settings.System#canWrite}.</p>
4288 *
4289 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4290 * number of outstanding requests to 100 per app (identified by their UID), shared with
4291 * all variants of this method, of {@link #registerNetworkCallback} as well as
4292 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4293 * Requesting a network with this method will count toward this limit. If this limit is
4294 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4295 * make sure to unregister the callbacks with
4296 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4297 *
4298 * @param request {@link NetworkRequest} describing this request.
4299 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
4300 * the callback must not be shared - it uniquely specifies this request.
4301 * The callback is invoked on the default internal Handler.
4302 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
4303 * @throws SecurityException if missing the appropriate permissions.
4304 * @throws RuntimeException if the app already has too many callbacks registered.
4305 */
4306 public void requestNetwork(@NonNull NetworkRequest request,
4307 @NonNull NetworkCallback networkCallback) {
4308 requestNetwork(request, networkCallback, getDefaultHandler());
4309 }
4310
4311 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004312 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004313 *
4314 * This method behaves identically to {@link #requestNetwork(NetworkRequest, NetworkCallback)}
4315 * but runs all the callbacks on the passed Handler.
4316 *
4317 * <p>This method has the same permission requirements as
4318 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
4319 * and throws the same exceptions in the same conditions.
4320 *
4321 * @param request {@link NetworkRequest} describing this request.
4322 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
4323 * the callback must not be shared - it uniquely specifies this request.
4324 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4325 */
4326 public void requestNetwork(@NonNull NetworkRequest request,
4327 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4328 CallbackHandler cbHandler = new CallbackHandler(handler);
4329 NetworkCapabilities nc = request.networkCapabilities;
4330 sendRequestForNetwork(nc, networkCallback, 0, REQUEST, TYPE_NONE, cbHandler);
4331 }
4332
4333 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004334 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004335 * by a timeout.
4336 *
4337 * This function behaves identically to the non-timed-out version
4338 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, but if a suitable network
4339 * is not found within the given time (in milliseconds) the
4340 * {@link NetworkCallback#onUnavailable()} callback is called. The request can still be
4341 * released normally by calling {@link #unregisterNetworkCallback(NetworkCallback)} but does
4342 * not have to be released if timed-out (it is automatically released). Unregistering a
4343 * request that timed out is not an error.
4344 *
4345 * <p>Do not use this method to poll for the existence of specific networks (e.g. with a small
4346 * timeout) - {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} is provided
4347 * for that purpose. Calling this method will attempt to bring up the requested network.
4348 *
4349 * <p>This method has the same permission requirements as
4350 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
4351 * and throws the same exceptions in the same conditions.
4352 *
4353 * @param request {@link NetworkRequest} describing this request.
4354 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
4355 * the callback must not be shared - it uniquely specifies this request.
4356 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
4357 * before {@link NetworkCallback#onUnavailable()} is called. The timeout must
4358 * be a positive value (i.e. >0).
4359 */
4360 public void requestNetwork(@NonNull NetworkRequest request,
4361 @NonNull NetworkCallback networkCallback, int timeoutMs) {
4362 checkTimeout(timeoutMs);
4363 NetworkCapabilities nc = request.networkCapabilities;
4364 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE,
4365 getDefaultHandler());
4366 }
4367
4368 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004369 * Request a network to satisfy a set of {@link NetworkCapabilities}, limited
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004370 * by a timeout.
4371 *
4372 * This method behaves identically to
4373 * {@link #requestNetwork(NetworkRequest, NetworkCallback, int)} but runs all the callbacks
4374 * on the passed Handler.
4375 *
4376 * <p>This method has the same permission requirements as
4377 * {@link #requestNetwork(NetworkRequest, NetworkCallback)}, is subject to the same limitations,
4378 * and throws the same exceptions in the same conditions.
4379 *
4380 * @param request {@link NetworkRequest} describing this request.
4381 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
4382 * the callback must not be shared - it uniquely specifies this request.
4383 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4384 * @param timeoutMs The time in milliseconds to attempt looking for a suitable network
4385 * before {@link NetworkCallback#onUnavailable} is called.
4386 */
4387 public void requestNetwork(@NonNull NetworkRequest request,
4388 @NonNull NetworkCallback networkCallback, @NonNull Handler handler, int timeoutMs) {
4389 checkTimeout(timeoutMs);
4390 CallbackHandler cbHandler = new CallbackHandler(handler);
4391 NetworkCapabilities nc = request.networkCapabilities;
4392 sendRequestForNetwork(nc, networkCallback, timeoutMs, REQUEST, TYPE_NONE, cbHandler);
4393 }
4394
4395 /**
4396 * The lookup key for a {@link Network} object included with the intent after
4397 * successfully finding a network for the applications request. Retrieve it with
4398 * {@link android.content.Intent#getParcelableExtra(String)}.
4399 * <p>
4400 * Note that if you intend to invoke {@link Network#openConnection(java.net.URL)}
4401 * then you must get a ConnectivityManager instance before doing so.
4402 */
4403 public static final String EXTRA_NETWORK = "android.net.extra.NETWORK";
4404
4405 /**
4406 * The lookup key for a {@link NetworkRequest} object included with the intent after
4407 * successfully finding a network for the applications request. Retrieve it with
4408 * {@link android.content.Intent#getParcelableExtra(String)}.
4409 */
4410 public static final String EXTRA_NETWORK_REQUEST = "android.net.extra.NETWORK_REQUEST";
4411
4412
4413 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08004414 * Request a network to satisfy a set of {@link NetworkCapabilities}.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004415 *
4416 * This function behaves identically to the version that takes a NetworkCallback, but instead
4417 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
4418 * the request may outlive the calling application and get called back when a suitable
4419 * network is found.
4420 * <p>
4421 * The operation is an Intent broadcast that goes to a broadcast receiver that
4422 * you registered with {@link Context#registerReceiver} or through the
4423 * &lt;receiver&gt; tag in an AndroidManifest.xml file
4424 * <p>
4425 * The operation Intent is delivered with two extras, a {@link Network} typed
4426 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
4427 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
4428 * the original requests parameters. It is important to create a new,
4429 * {@link NetworkCallback} based request before completing the processing of the
4430 * Intent to reserve the network or it will be released shortly after the Intent
4431 * is processed.
4432 * <p>
4433 * If there is already a request for this Intent registered (with the equality of
4434 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
4435 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
4436 * <p>
4437 * The request may be released normally by calling
4438 * {@link #releaseNetworkRequest(android.app.PendingIntent)}.
4439 * <p>It is presently unsupported to request a network with either
4440 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
4441 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
4442 * as these {@code NetworkCapabilities} represent states that a particular
4443 * network may never attain, and whether a network will attain these states
4444 * is unknown prior to bringing up the network so the framework does not
4445 * know how to go about satisfying a request with these capabilities.
4446 *
4447 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4448 * number of outstanding requests to 100 per app (identified by their UID), shared with
4449 * all variants of this method, of {@link #registerNetworkCallback} as well as
4450 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4451 * Requesting a network with this method will count toward this limit. If this limit is
4452 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4453 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4454 * or {@link #releaseNetworkRequest(PendingIntent)}.
4455 *
4456 * <p>This method requires the caller to hold either the
4457 * {@link android.Manifest.permission#CHANGE_NETWORK_STATE} permission
4458 * or the ability to modify system settings as determined by
4459 * {@link android.provider.Settings.System#canWrite}.</p>
4460 *
4461 * @param request {@link NetworkRequest} describing this request.
4462 * @param operation Action to perform when the network is available (corresponds
4463 * to the {@link NetworkCallback#onAvailable} call. Typically
4464 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4465 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
4466 * @throws SecurityException if missing the appropriate permissions.
4467 * @throws RuntimeException if the app already has too many callbacks registered.
4468 */
4469 public void requestNetwork(@NonNull NetworkRequest request,
4470 @NonNull PendingIntent operation) {
4471 printStackTrace();
4472 checkPendingIntentNotNull(operation);
4473 try {
4474 mService.pendingRequestForNetwork(
4475 request.networkCapabilities, operation, mContext.getOpPackageName(),
4476 getAttributionTag());
4477 } catch (RemoteException e) {
4478 throw e.rethrowFromSystemServer();
4479 } catch (ServiceSpecificException e) {
4480 throw convertServiceException(e);
4481 }
4482 }
4483
4484 /**
4485 * Removes a request made via {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)}
4486 * <p>
4487 * This method has the same behavior as
4488 * {@link #unregisterNetworkCallback(android.app.PendingIntent)} with respect to
4489 * releasing network resources and disconnecting.
4490 *
4491 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4492 * PendingIntent passed to
4493 * {@link #requestNetwork(NetworkRequest, android.app.PendingIntent)} with the
4494 * corresponding NetworkRequest you'd like to remove. Cannot be null.
4495 */
4496 public void releaseNetworkRequest(@NonNull PendingIntent operation) {
4497 printStackTrace();
4498 checkPendingIntentNotNull(operation);
4499 try {
4500 mService.releasePendingNetworkRequest(operation);
4501 } catch (RemoteException e) {
4502 throw e.rethrowFromSystemServer();
4503 }
4504 }
4505
4506 private static void checkPendingIntentNotNull(PendingIntent intent) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004507 Objects.requireNonNull(intent, "PendingIntent cannot be null.");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004508 }
4509
4510 private static void checkCallbackNotNull(NetworkCallback callback) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004511 Objects.requireNonNull(callback, "null NetworkCallback");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004512 }
4513
4514 private static void checkTimeout(int timeoutMs) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004515 if (timeoutMs <= 0) {
4516 throw new IllegalArgumentException("timeoutMs must be strictly positive.");
4517 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004518 }
4519
4520 /**
4521 * Registers to receive notifications about all networks which satisfy the given
4522 * {@link NetworkRequest}. The callbacks will continue to be called until
4523 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4524 * called.
4525 *
4526 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4527 * number of outstanding requests to 100 per app (identified by their UID), shared with
4528 * all variants of this method, of {@link #requestNetwork} as well as
4529 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4530 * Requesting a network with this method will count toward this limit. If this limit is
4531 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4532 * make sure to unregister the callbacks with
4533 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4534 *
4535 * @param request {@link NetworkRequest} describing this request.
4536 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4537 * networks change state.
4538 * The callback is invoked on the default internal Handler.
4539 * @throws RuntimeException if the app already has too many callbacks registered.
4540 */
4541 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4542 public void registerNetworkCallback(@NonNull NetworkRequest request,
4543 @NonNull NetworkCallback networkCallback) {
4544 registerNetworkCallback(request, networkCallback, getDefaultHandler());
4545 }
4546
4547 /**
4548 * Registers to receive notifications about all networks which satisfy the given
4549 * {@link NetworkRequest}. The callbacks will continue to be called until
4550 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4551 * called.
4552 *
4553 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4554 * number of outstanding requests to 100 per app (identified by their UID), shared with
4555 * all variants of this method, of {@link #requestNetwork} as well as
4556 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4557 * Requesting a network with this method will count toward this limit. If this limit is
4558 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4559 * make sure to unregister the callbacks with
4560 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4561 *
4562 *
4563 * @param request {@link NetworkRequest} describing this request.
4564 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4565 * networks change state.
4566 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4567 * @throws RuntimeException if the app already has too many callbacks registered.
4568 */
4569 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4570 public void registerNetworkCallback(@NonNull NetworkRequest request,
4571 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4572 CallbackHandler cbHandler = new CallbackHandler(handler);
4573 NetworkCapabilities nc = request.networkCapabilities;
4574 sendRequestForNetwork(nc, networkCallback, 0, LISTEN, TYPE_NONE, cbHandler);
4575 }
4576
4577 /**
4578 * Registers a PendingIntent to be sent when a network is available which satisfies the given
4579 * {@link NetworkRequest}.
4580 *
4581 * This function behaves identically to the version that takes a NetworkCallback, but instead
4582 * of {@link NetworkCallback} a {@link PendingIntent} is used. This means
4583 * the request may outlive the calling application and get called back when a suitable
4584 * network is found.
4585 * <p>
4586 * The operation is an Intent broadcast that goes to a broadcast receiver that
4587 * you registered with {@link Context#registerReceiver} or through the
4588 * &lt;receiver&gt; tag in an AndroidManifest.xml file
4589 * <p>
4590 * The operation Intent is delivered with two extras, a {@link Network} typed
4591 * extra called {@link #EXTRA_NETWORK} and a {@link NetworkRequest}
4592 * typed extra called {@link #EXTRA_NETWORK_REQUEST} containing
4593 * the original requests parameters.
4594 * <p>
4595 * If there is already a request for this Intent registered (with the equality of
4596 * two Intents defined by {@link Intent#filterEquals}), then it will be removed and
4597 * replaced by this one, effectively releasing the previous {@link NetworkRequest}.
4598 * <p>
4599 * The request may be released normally by calling
4600 * {@link #unregisterNetworkCallback(android.app.PendingIntent)}.
4601 *
4602 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4603 * number of outstanding requests to 100 per app (identified by their UID), shared with
4604 * all variants of this method, of {@link #requestNetwork} as well as
4605 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4606 * Requesting a network with this method will count toward this limit. If this limit is
4607 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4608 * make sure to unregister the callbacks with {@link #unregisterNetworkCallback(PendingIntent)}
4609 * or {@link #releaseNetworkRequest(PendingIntent)}.
4610 *
4611 * @param request {@link NetworkRequest} describing this request.
4612 * @param operation Action to perform when the network is available (corresponds
4613 * to the {@link NetworkCallback#onAvailable} call. Typically
4614 * comes from {@link PendingIntent#getBroadcast}. Cannot be null.
4615 * @throws RuntimeException if the app already has too many callbacks registered.
4616 */
4617 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4618 public void registerNetworkCallback(@NonNull NetworkRequest request,
4619 @NonNull PendingIntent operation) {
4620 printStackTrace();
4621 checkPendingIntentNotNull(operation);
4622 try {
4623 mService.pendingListenForNetwork(
Roshan Piusa8a477b2020-12-17 14:53:09 -08004624 request.networkCapabilities, operation, mContext.getOpPackageName(),
4625 getAttributionTag());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004626 } catch (RemoteException e) {
4627 throw e.rethrowFromSystemServer();
4628 } catch (ServiceSpecificException e) {
4629 throw convertServiceException(e);
4630 }
4631 }
4632
4633 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004634 * Registers to receive notifications about changes in the application's default network. This
4635 * may be a physical network or a virtual network, such as a VPN that applies to the
4636 * application. The callbacks will continue to be called until either the application exits or
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004637 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4638 *
4639 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4640 * number of outstanding requests to 100 per app (identified by their UID), shared with
4641 * all variants of this method, of {@link #requestNetwork} as well as
4642 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4643 * Requesting a network with this method will count toward this limit. If this limit is
4644 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4645 * make sure to unregister the callbacks with
4646 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4647 *
4648 * @param networkCallback The {@link NetworkCallback} that the system will call as the
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004649 * application's default network changes.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004650 * The callback is invoked on the default internal Handler.
4651 * @throws RuntimeException if the app already has too many callbacks registered.
4652 */
4653 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4654 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback) {
4655 registerDefaultNetworkCallback(networkCallback, getDefaultHandler());
4656 }
4657
4658 /**
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004659 * Registers to receive notifications about changes in the application's default network. This
4660 * may be a physical network or a virtual network, such as a VPN that applies to the
4661 * application. The callbacks will continue to be called until either the application exits or
4662 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4663 *
4664 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4665 * number of outstanding requests to 100 per app (identified by their UID), shared with
4666 * all variants of this method, of {@link #requestNetwork} as well as
4667 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4668 * Requesting a network with this method will count toward this limit. If this limit is
4669 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4670 * make sure to unregister the callbacks with
4671 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4672 *
4673 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4674 * application's default network changes.
4675 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4676 * @throws RuntimeException if the app already has too many callbacks registered.
4677 */
4678 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
4679 public void registerDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
4680 @NonNull Handler handler) {
Chiachang Wangc7d203d2021-04-20 15:41:24 +08004681 registerDefaultNetworkCallbackForUid(Process.INVALID_UID, networkCallback, handler);
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004682 }
4683
4684 /**
4685 * Registers to receive notifications about changes in the default network for the specified
4686 * UID. This may be a physical network or a virtual network, such as a VPN that applies to the
4687 * UID. The callbacks will continue to be called until either the application exits or
4688 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4689 *
4690 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4691 * number of outstanding requests to 100 per app (identified by their UID), shared with
4692 * all variants of this method, of {@link #requestNetwork} as well as
4693 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4694 * Requesting a network with this method will count toward this limit. If this limit is
4695 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4696 * make sure to unregister the callbacks with
4697 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4698 *
4699 * @param uid the UID for which to track default network changes.
4700 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4701 * UID's default network changes.
4702 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4703 * @throws RuntimeException if the app already has too many callbacks registered.
4704 * @hide
4705 */
Lorenzo Colittib90bdbd2021-03-22 18:23:21 +09004706 @SystemApi(client = MODULE_LIBRARIES)
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004707 @SuppressLint({"ExecutorRegistration", "PairedRegistration"})
4708 @RequiresPermission(anyOf = {
4709 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4710 android.Manifest.permission.NETWORK_SETTINGS})
Chiachang Wangc7d203d2021-04-20 15:41:24 +08004711 public void registerDefaultNetworkCallbackForUid(int uid,
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004712 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004713 CallbackHandler cbHandler = new CallbackHandler(handler);
Lorenzo Colitti5f26b192021-03-12 22:48:07 +09004714 sendRequestForNetwork(uid, null /* need */, networkCallback, 0 /* timeoutMs */,
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004715 TRACK_DEFAULT, TYPE_NONE, cbHandler);
4716 }
4717
4718 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004719 * Registers to receive notifications about changes in the system default network. The callbacks
4720 * will continue to be called until either the application exits or
4721 * {@link #unregisterNetworkCallback(NetworkCallback)} is called.
4722 *
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004723 * This method should not be used to determine networking state seen by applications, because in
4724 * many cases, most or even all application traffic may not use the default network directly,
4725 * and traffic from different applications may go on different networks by default. As an
4726 * example, if a VPN is connected, traffic from all applications might be sent through the VPN
4727 * and not onto the system default network. Applications or system components desiring to do
4728 * determine network state as seen by applications should use other methods such as
4729 * {@link #registerDefaultNetworkCallback(NetworkCallback, Handler)}.
4730 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004731 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4732 * number of outstanding requests to 100 per app (identified by their UID), shared with
4733 * all variants of this method, of {@link #requestNetwork} as well as
4734 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4735 * Requesting a network with this method will count toward this limit. If this limit is
4736 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4737 * make sure to unregister the callbacks with
4738 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4739 *
4740 * @param networkCallback The {@link NetworkCallback} that the system will call as the
4741 * system default network changes.
4742 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4743 * @throws RuntimeException if the app already has too many callbacks registered.
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004744 *
4745 * @hide
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004746 */
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004747 @SystemApi(client = MODULE_LIBRARIES)
4748 @SuppressLint({"ExecutorRegistration", "PairedRegistration"})
4749 @RequiresPermission(anyOf = {
4750 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
4751 android.Manifest.permission.NETWORK_SETTINGS})
4752 public void registerSystemDefaultNetworkCallback(@NonNull NetworkCallback networkCallback,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004753 @NonNull Handler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004754 CallbackHandler cbHandler = new CallbackHandler(handler);
4755 sendRequestForNetwork(null /* NetworkCapabilities need */, networkCallback, 0,
Lorenzo Colittia77d05e2021-01-29 20:14:04 +09004756 TRACK_SYSTEM_DEFAULT, TYPE_NONE, cbHandler);
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004757 }
4758
4759 /**
junyulaibd123062021-03-15 11:48:48 +08004760 * Registers to receive notifications about the best matching network which satisfy the given
4761 * {@link NetworkRequest}. The callbacks will continue to be called until
4762 * either the application exits or {@link #unregisterNetworkCallback(NetworkCallback)} is
4763 * called.
4764 *
4765 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
4766 * number of outstanding requests to 100 per app (identified by their UID), shared with
4767 * {@link #registerNetworkCallback} and its variants and {@link #requestNetwork} as well as
4768 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
4769 * Requesting a network with this method will count toward this limit. If this limit is
4770 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
4771 * make sure to unregister the callbacks with
4772 * {@link #unregisterNetworkCallback(NetworkCallback)}.
4773 *
4774 *
4775 * @param request {@link NetworkRequest} describing this request.
4776 * @param networkCallback The {@link NetworkCallback} that the system will call as suitable
4777 * networks change state.
4778 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
4779 * @throws RuntimeException if the app already has too many callbacks registered.
junyulai5a5c99b2021-03-05 15:51:17 +08004780 */
junyulai5a5c99b2021-03-05 15:51:17 +08004781 @SuppressLint("ExecutorRegistration")
4782 public void registerBestMatchingNetworkCallback(@NonNull NetworkRequest request,
4783 @NonNull NetworkCallback networkCallback, @NonNull Handler handler) {
4784 final NetworkCapabilities nc = request.networkCapabilities;
4785 final CallbackHandler cbHandler = new CallbackHandler(handler);
junyulai7664f622021-03-12 20:05:08 +08004786 sendRequestForNetwork(nc, networkCallback, 0, LISTEN_FOR_BEST, TYPE_NONE, cbHandler);
junyulai5a5c99b2021-03-05 15:51:17 +08004787 }
4788
4789 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004790 * Requests bandwidth update for a given {@link Network} and returns whether the update request
4791 * is accepted by ConnectivityService. Once accepted, ConnectivityService will poll underlying
4792 * network connection for updated bandwidth information. The caller will be notified via
4793 * {@link ConnectivityManager.NetworkCallback} if there is an update. Notice that this
4794 * method assumes that the caller has previously called
4795 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} to listen for network
4796 * changes.
4797 *
4798 * @param network {@link Network} specifying which network you're interested.
4799 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
4800 */
4801 public boolean requestBandwidthUpdate(@NonNull Network network) {
4802 try {
4803 return mService.requestBandwidthUpdate(network);
4804 } catch (RemoteException e) {
4805 throw e.rethrowFromSystemServer();
4806 }
4807 }
4808
4809 /**
4810 * Unregisters a {@code NetworkCallback} and possibly releases networks originating from
4811 * {@link #requestNetwork(NetworkRequest, NetworkCallback)} and
4812 * {@link #registerNetworkCallback(NetworkRequest, NetworkCallback)} calls.
4813 * If the given {@code NetworkCallback} had previously been used with
4814 * {@code #requestNetwork}, any networks that had been connected to only to satisfy that request
4815 * will be disconnected.
4816 *
4817 * Notifications that would have triggered that {@code NetworkCallback} will immediately stop
4818 * triggering it as soon as this call returns.
4819 *
4820 * @param networkCallback The {@link NetworkCallback} used when making the request.
4821 */
4822 public void unregisterNetworkCallback(@NonNull NetworkCallback networkCallback) {
4823 printStackTrace();
4824 checkCallbackNotNull(networkCallback);
4825 final List<NetworkRequest> reqs = new ArrayList<>();
4826 // Find all requests associated to this callback and stop callback triggers immediately.
4827 // Callback is reusable immediately. http://b/20701525, http://b/35921499.
4828 synchronized (sCallbacks) {
Remi NGUYEN VAN1818dbb2021-03-15 07:31:54 +00004829 if (networkCallback.networkRequest == null) {
4830 throw new IllegalArgumentException("NetworkCallback was not registered");
4831 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004832 if (networkCallback.networkRequest == ALREADY_UNREGISTERED) {
4833 Log.d(TAG, "NetworkCallback was already unregistered");
4834 return;
4835 }
4836 for (Map.Entry<NetworkRequest, NetworkCallback> e : sCallbacks.entrySet()) {
4837 if (e.getValue() == networkCallback) {
4838 reqs.add(e.getKey());
4839 }
4840 }
4841 // TODO: throw exception if callback was registered more than once (http://b/20701525).
4842 for (NetworkRequest r : reqs) {
4843 try {
4844 mService.releaseNetworkRequest(r);
4845 } catch (RemoteException e) {
4846 throw e.rethrowFromSystemServer();
4847 }
4848 // Only remove mapping if rpc was successful.
4849 sCallbacks.remove(r);
4850 }
4851 networkCallback.networkRequest = ALREADY_UNREGISTERED;
4852 }
4853 }
4854
4855 /**
4856 * Unregisters a callback previously registered via
4857 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4858 *
4859 * @param operation A PendingIntent equal (as defined by {@link Intent#filterEquals}) to the
4860 * PendingIntent passed to
4861 * {@link #registerNetworkCallback(NetworkRequest, android.app.PendingIntent)}.
4862 * Cannot be null.
4863 */
4864 public void unregisterNetworkCallback(@NonNull PendingIntent operation) {
4865 releaseNetworkRequest(operation);
4866 }
4867
4868 /**
4869 * Informs the system whether it should switch to {@code network} regardless of whether it is
4870 * validated or not. If {@code accept} is true, and the network was explicitly selected by the
4871 * user (e.g., by selecting a Wi-Fi network in the Settings app), then the network will become
4872 * the system default network regardless of any other network that's currently connected. If
4873 * {@code always} is true, then the choice is remembered, so that the next time the user
4874 * connects to this network, the system will switch to it.
4875 *
4876 * @param network The network to accept.
4877 * @param accept Whether to accept the network even if unvalidated.
4878 * @param always Whether to remember this choice in the future.
4879 *
4880 * @hide
4881 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004882 @SystemApi(client = MODULE_LIBRARIES)
4883 @RequiresPermission(anyOf = {
4884 android.Manifest.permission.NETWORK_SETTINGS,
4885 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4886 android.Manifest.permission.NETWORK_STACK,
4887 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4888 public void setAcceptUnvalidated(@NonNull Network network, boolean accept, boolean always) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004889 try {
4890 mService.setAcceptUnvalidated(network, accept, always);
4891 } catch (RemoteException e) {
4892 throw e.rethrowFromSystemServer();
4893 }
4894 }
4895
4896 /**
4897 * Informs the system whether it should consider the network as validated even if it only has
4898 * partial connectivity. If {@code accept} is true, then the network will be considered as
4899 * validated even if connectivity is only partial. If {@code always} is true, then the choice
4900 * is remembered, so that the next time the user connects to this network, the system will
4901 * switch to it.
4902 *
4903 * @param network The network to accept.
4904 * @param accept Whether to consider the network as validated even if it has partial
4905 * connectivity.
4906 * @param always Whether to remember this choice in the future.
4907 *
4908 * @hide
4909 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004910 @SystemApi(client = MODULE_LIBRARIES)
4911 @RequiresPermission(anyOf = {
4912 android.Manifest.permission.NETWORK_SETTINGS,
4913 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4914 android.Manifest.permission.NETWORK_STACK,
4915 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4916 public void setAcceptPartialConnectivity(@NonNull Network network, boolean accept,
4917 boolean always) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004918 try {
4919 mService.setAcceptPartialConnectivity(network, accept, always);
4920 } catch (RemoteException e) {
4921 throw e.rethrowFromSystemServer();
4922 }
4923 }
4924
4925 /**
4926 * Informs the system to penalize {@code network}'s score when it becomes unvalidated. This is
4927 * only meaningful if the system is configured not to penalize such networks, e.g., if the
4928 * {@code config_networkAvoidBadWifi} configuration variable is set to 0 and the {@code
4929 * NETWORK_AVOID_BAD_WIFI setting is unset}.
4930 *
4931 * @param network The network to accept.
4932 *
4933 * @hide
4934 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08004935 @SystemApi(client = MODULE_LIBRARIES)
4936 @RequiresPermission(anyOf = {
4937 android.Manifest.permission.NETWORK_SETTINGS,
4938 android.Manifest.permission.NETWORK_SETUP_WIZARD,
4939 android.Manifest.permission.NETWORK_STACK,
4940 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
4941 public void setAvoidUnvalidated(@NonNull Network network) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004942 try {
4943 mService.setAvoidUnvalidated(network);
4944 } catch (RemoteException e) {
4945 throw e.rethrowFromSystemServer();
4946 }
4947 }
4948
4949 /**
Chiachang Wang6eac9fb2021-06-17 22:11:30 +08004950 * Temporarily allow bad wifi to override {@code config_networkAvoidBadWifi} configuration.
4951 *
4952 * @param timeMs The expired current time. The value should be set within a limited time from
4953 * now.
4954 *
4955 * @hide
4956 */
4957 public void setTestAllowBadWifiUntil(long timeMs) {
4958 try {
4959 mService.setTestAllowBadWifiUntil(timeMs);
4960 } catch (RemoteException e) {
4961 throw e.rethrowFromSystemServer();
4962 }
4963 }
4964
4965 /**
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004966 * Requests that the system open the captive portal app on the specified network.
4967 *
Remi NGUYEN VAN8238a762021-03-16 18:06:06 +09004968 * <p>This is to be used on networks where a captive portal was detected, as per
4969 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}.
4970 *
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004971 * @param network The network to log into.
4972 *
4973 * @hide
4974 */
Remi NGUYEN VAN8238a762021-03-16 18:06:06 +09004975 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
4976 @RequiresPermission(anyOf = {
4977 android.Manifest.permission.NETWORK_SETTINGS,
4978 android.Manifest.permission.NETWORK_STACK,
4979 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
4980 })
4981 public void startCaptivePortalApp(@NonNull Network network) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09004982 try {
4983 mService.startCaptivePortalApp(network);
4984 } catch (RemoteException e) {
4985 throw e.rethrowFromSystemServer();
4986 }
4987 }
4988
4989 /**
4990 * Requests that the system open the captive portal app with the specified extras.
4991 *
4992 * <p>This endpoint is exclusively for use by the NetworkStack and is protected by the
4993 * corresponding permission.
4994 * @param network Network on which the captive portal was detected.
4995 * @param appExtras Extras to include in the app start intent.
4996 * @hide
4997 */
4998 @SystemApi
4999 @RequiresPermission(NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK)
5000 public void startCaptivePortalApp(@NonNull Network network, @NonNull Bundle appExtras) {
5001 try {
5002 mService.startCaptivePortalAppInternal(network, appExtras);
5003 } catch (RemoteException e) {
5004 throw e.rethrowFromSystemServer();
5005 }
5006 }
5007
5008 /**
5009 * Determine whether the device is configured to avoid bad wifi.
5010 * @hide
5011 */
5012 @SystemApi
5013 @RequiresPermission(anyOf = {
5014 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK,
5015 android.Manifest.permission.NETWORK_STACK})
5016 public boolean shouldAvoidBadWifi() {
5017 try {
5018 return mService.shouldAvoidBadWifi();
5019 } catch (RemoteException e) {
5020 throw e.rethrowFromSystemServer();
5021 }
5022 }
5023
5024 /**
5025 * It is acceptable to briefly use multipath data to provide seamless connectivity for
5026 * time-sensitive user-facing operations when the system default network is temporarily
5027 * unresponsive. The amount of data should be limited (less than one megabyte for every call to
5028 * this method), and the operation should be infrequent to ensure that data usage is limited.
5029 *
5030 * An example of such an operation might be a time-sensitive foreground activity, such as a
5031 * voice command, that the user is performing while walking out of range of a Wi-Fi network.
5032 */
5033 public static final int MULTIPATH_PREFERENCE_HANDOVER = 1 << 0;
5034
5035 /**
5036 * It is acceptable to use small amounts of multipath data on an ongoing basis to provide
5037 * a backup channel for traffic that is primarily going over another network.
5038 *
5039 * An example might be maintaining backup connections to peers or servers for the purpose of
5040 * fast fallback if the default network is temporarily unresponsive or disconnects. The traffic
5041 * on backup paths should be negligible compared to the traffic on the main path.
5042 */
5043 public static final int MULTIPATH_PREFERENCE_RELIABILITY = 1 << 1;
5044
5045 /**
5046 * It is acceptable to use metered data to improve network latency and performance.
5047 */
5048 public static final int MULTIPATH_PREFERENCE_PERFORMANCE = 1 << 2;
5049
5050 /**
5051 * Return value to use for unmetered networks. On such networks we currently set all the flags
5052 * to true.
5053 * @hide
5054 */
5055 public static final int MULTIPATH_PREFERENCE_UNMETERED =
5056 MULTIPATH_PREFERENCE_HANDOVER |
5057 MULTIPATH_PREFERENCE_RELIABILITY |
5058 MULTIPATH_PREFERENCE_PERFORMANCE;
5059
Aaron Huangcff22942021-05-27 16:31:26 +08005060 /** @hide */
5061 @Retention(RetentionPolicy.SOURCE)
5062 @IntDef(flag = true, value = {
5063 MULTIPATH_PREFERENCE_HANDOVER,
5064 MULTIPATH_PREFERENCE_RELIABILITY,
5065 MULTIPATH_PREFERENCE_PERFORMANCE,
5066 })
5067 public @interface MultipathPreference {
5068 }
5069
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005070 /**
5071 * Provides a hint to the calling application on whether it is desirable to use the
5072 * multinetwork APIs (e.g., {@link Network#openConnection}, {@link Network#bindSocket}, etc.)
5073 * for multipath data transfer on this network when it is not the system default network.
5074 * Applications desiring to use multipath network protocols should call this method before
5075 * each such operation.
5076 *
5077 * @param network The network on which the application desires to use multipath data.
5078 * If {@code null}, this method will return the a preference that will generally
5079 * apply to metered networks.
5080 * @return a bitwise OR of zero or more of the {@code MULTIPATH_PREFERENCE_*} constants.
5081 */
5082 @RequiresPermission(android.Manifest.permission.ACCESS_NETWORK_STATE)
5083 public @MultipathPreference int getMultipathPreference(@Nullable Network network) {
5084 try {
5085 return mService.getMultipathPreference(network);
5086 } catch (RemoteException e) {
5087 throw e.rethrowFromSystemServer();
5088 }
5089 }
5090
5091 /**
5092 * Resets all connectivity manager settings back to factory defaults.
5093 * @hide
5094 */
Chiachang Wangf9294e72021-03-18 09:44:34 +08005095 @SystemApi(client = MODULE_LIBRARIES)
5096 @RequiresPermission(anyOf = {
5097 android.Manifest.permission.NETWORK_SETTINGS,
5098 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK})
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005099 public void factoryReset() {
5100 try {
5101 mService.factoryReset();
Remi NGUYEN VANe4d1cd92021-06-17 16:27:31 +09005102 getTetheringManager().stopAllTethering();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005103 } catch (RemoteException e) {
5104 throw e.rethrowFromSystemServer();
5105 }
5106 }
5107
5108 /**
5109 * Binds the current process to {@code network}. All Sockets created in the future
5110 * (and not explicitly bound via a bound SocketFactory from
5111 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
5112 * {@code network}. All host name resolutions will be limited to {@code network} as well.
5113 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
5114 * work and all host name resolutions will fail. This is by design so an application doesn't
5115 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
5116 * To clear binding pass {@code null} for {@code network}. Using individually bound
5117 * Sockets created by Network.getSocketFactory().createSocket() and
5118 * performing network-specific host name resolutions via
5119 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
5120 * {@code bindProcessToNetwork}.
5121 *
5122 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
5123 * the current binding.
5124 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
5125 */
5126 public boolean bindProcessToNetwork(@Nullable Network network) {
5127 // Forcing callers to call through non-static function ensures ConnectivityManager
5128 // instantiated.
5129 return setProcessDefaultNetwork(network);
5130 }
5131
5132 /**
5133 * Binds the current process to {@code network}. All Sockets created in the future
5134 * (and not explicitly bound via a bound SocketFactory from
5135 * {@link Network#getSocketFactory() Network.getSocketFactory()}) will be bound to
5136 * {@code network}. All host name resolutions will be limited to {@code network} as well.
5137 * Note that if {@code network} ever disconnects, all Sockets created in this way will cease to
5138 * work and all host name resolutions will fail. This is by design so an application doesn't
5139 * accidentally use Sockets it thinks are still bound to a particular {@link Network}.
5140 * To clear binding pass {@code null} for {@code network}. Using individually bound
5141 * Sockets created by Network.getSocketFactory().createSocket() and
5142 * performing network-specific host name resolutions via
5143 * {@link Network#getAllByName Network.getAllByName} is preferred to calling
5144 * {@code setProcessDefaultNetwork}.
5145 *
5146 * @param network The {@link Network} to bind the current process to, or {@code null} to clear
5147 * the current binding.
5148 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
5149 * @deprecated This function can throw {@link IllegalStateException}. Use
5150 * {@link #bindProcessToNetwork} instead. {@code bindProcessToNetwork}
5151 * is a direct replacement.
5152 */
5153 @Deprecated
5154 public static boolean setProcessDefaultNetwork(@Nullable Network network) {
5155 int netId = (network == null) ? NETID_UNSET : network.netId;
5156 boolean isSameNetId = (netId == NetworkUtils.getBoundNetworkForProcess());
5157
5158 if (netId != NETID_UNSET) {
5159 netId = network.getNetIdForResolv();
5160 }
5161
5162 if (!NetworkUtils.bindProcessToNetwork(netId)) {
5163 return false;
5164 }
5165
5166 if (!isSameNetId) {
5167 // Set HTTP proxy system properties to match network.
5168 // TODO: Deprecate this static method and replace it with a non-static version.
5169 try {
Remi NGUYEN VAN8a831d62021-02-03 10:18:20 +09005170 Proxy.setHttpProxyConfiguration(getInstance().getDefaultProxy());
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005171 } catch (SecurityException e) {
5172 // The process doesn't have ACCESS_NETWORK_STATE, so we can't fetch the proxy.
5173 Log.e(TAG, "Can't set proxy properties", e);
5174 }
5175 // Must flush DNS cache as new network may have different DNS resolutions.
Remi NGUYEN VANb2e919f2021-07-02 09:34:36 +09005176 InetAddress.clearDnsCache();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005177 // Must flush socket pool as idle sockets will be bound to previous network and may
5178 // cause subsequent fetches to be performed on old network.
Orion Hodson1f4fa9f2021-05-25 21:02:02 +01005179 NetworkEventDispatcher.getInstance().dispatchNetworkConfigurationChange();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005180 }
5181
5182 return true;
5183 }
5184
5185 /**
5186 * Returns the {@link Network} currently bound to this process via
5187 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
5188 *
5189 * @return {@code Network} to which this process is bound, or {@code null}.
5190 */
5191 @Nullable
5192 public Network getBoundNetworkForProcess() {
5193 // Forcing callers to call thru non-static function ensures ConnectivityManager
5194 // instantiated.
5195 return getProcessDefaultNetwork();
5196 }
5197
5198 /**
5199 * Returns the {@link Network} currently bound to this process via
5200 * {@link #bindProcessToNetwork}, or {@code null} if no {@link Network} is explicitly bound.
5201 *
5202 * @return {@code Network} to which this process is bound, or {@code null}.
5203 * @deprecated Using this function can lead to other functions throwing
5204 * {@link IllegalStateException}. Use {@link #getBoundNetworkForProcess} instead.
5205 * {@code getBoundNetworkForProcess} is a direct replacement.
5206 */
5207 @Deprecated
5208 @Nullable
5209 public static Network getProcessDefaultNetwork() {
5210 int netId = NetworkUtils.getBoundNetworkForProcess();
5211 if (netId == NETID_UNSET) return null;
5212 return new Network(netId);
5213 }
5214
5215 private void unsupportedStartingFrom(int version) {
5216 if (Process.myUid() == Process.SYSTEM_UID) {
5217 // The getApplicationInfo() call we make below is not supported in system context. Let
5218 // the call through here, and rely on the fact that ConnectivityService will refuse to
5219 // allow the system to use these APIs anyway.
5220 return;
5221 }
5222
5223 if (mContext.getApplicationInfo().targetSdkVersion >= version) {
5224 throw new UnsupportedOperationException(
5225 "This method is not supported in target SDK version " + version + " and above");
5226 }
5227 }
5228
5229 // Checks whether the calling app can use the legacy routing API (startUsingNetworkFeature,
5230 // stopUsingNetworkFeature, requestRouteToHost), and if not throw UnsupportedOperationException.
5231 // TODO: convert the existing system users (Tethering, GnssLocationProvider) to the new APIs and
5232 // remove these exemptions. Note that this check is not secure, and apps can still access these
5233 // functions by accessing ConnectivityService directly. However, it should be clear that doing
5234 // so is unsupported and may break in the future. http://b/22728205
5235 private void checkLegacyRoutingApiAccess() {
5236 unsupportedStartingFrom(VERSION_CODES.M);
5237 }
5238
5239 /**
5240 * Binds host resolutions performed by this process to {@code network}.
5241 * {@link #bindProcessToNetwork} takes precedence over this setting.
5242 *
5243 * @param network The {@link Network} to bind host resolutions from the current process to, or
5244 * {@code null} to clear the current binding.
5245 * @return {@code true} on success, {@code false} if the {@link Network} is no longer valid.
5246 * @hide
5247 * @deprecated This is strictly for legacy usage to support {@link #startUsingNetworkFeature}.
5248 */
5249 @Deprecated
5250 @UnsupportedAppUsage(maxTargetSdk = Build.VERSION_CODES.R, trackingBug = 170729553)
5251 public static boolean setProcessDefaultNetworkForHostResolution(Network network) {
5252 return NetworkUtils.bindProcessToNetworkForHostResolution(
5253 (network == null) ? NETID_UNSET : network.getNetIdForResolv());
5254 }
5255
5256 /**
5257 * Device is not restricting metered network activity while application is running on
5258 * background.
5259 */
5260 public static final int RESTRICT_BACKGROUND_STATUS_DISABLED = 1;
5261
5262 /**
5263 * Device is restricting metered network activity while application is running on background,
5264 * but application is allowed to bypass it.
5265 * <p>
5266 * In this state, application should take action to mitigate metered network access.
5267 * For example, a music streaming application should switch to a low-bandwidth bitrate.
5268 */
5269 public static final int RESTRICT_BACKGROUND_STATUS_WHITELISTED = 2;
5270
5271 /**
5272 * Device is restricting metered network activity while application is running on background.
5273 * <p>
5274 * In this state, application should not try to use the network while running on background,
5275 * because it would be denied.
5276 */
5277 public static final int RESTRICT_BACKGROUND_STATUS_ENABLED = 3;
5278
5279 /**
5280 * A change in the background metered network activity restriction has occurred.
5281 * <p>
5282 * Applications should call {@link #getRestrictBackgroundStatus()} to check if the restriction
5283 * applies to them.
5284 * <p>
5285 * This is only sent to registered receivers, not manifest receivers.
5286 */
5287 @SdkConstant(SdkConstantType.BROADCAST_INTENT_ACTION)
5288 public static final String ACTION_RESTRICT_BACKGROUND_CHANGED =
5289 "android.net.conn.RESTRICT_BACKGROUND_CHANGED";
5290
Aaron Huangcff22942021-05-27 16:31:26 +08005291 /** @hide */
5292 @Retention(RetentionPolicy.SOURCE)
5293 @IntDef(flag = false, value = {
5294 RESTRICT_BACKGROUND_STATUS_DISABLED,
5295 RESTRICT_BACKGROUND_STATUS_WHITELISTED,
5296 RESTRICT_BACKGROUND_STATUS_ENABLED,
5297 })
5298 public @interface RestrictBackgroundStatus {
5299 }
5300
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005301 /**
5302 * Determines if the calling application is subject to metered network restrictions while
5303 * running on background.
5304 *
5305 * @return {@link #RESTRICT_BACKGROUND_STATUS_DISABLED},
5306 * {@link #RESTRICT_BACKGROUND_STATUS_ENABLED},
5307 * or {@link #RESTRICT_BACKGROUND_STATUS_WHITELISTED}
5308 */
5309 public @RestrictBackgroundStatus int getRestrictBackgroundStatus() {
5310 try {
Remi NGUYEN VAN1fdeb502021-03-18 14:23:12 +09005311 return mService.getRestrictBackgroundStatusByCaller();
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005312 } catch (RemoteException e) {
5313 throw e.rethrowFromSystemServer();
5314 }
5315 }
5316
5317 /**
5318 * The network watchlist is a list of domains and IP addresses that are associated with
5319 * potentially harmful apps. This method returns the SHA-256 of the watchlist config file
5320 * currently used by the system for validation purposes.
5321 *
5322 * @return Hash of network watchlist config file. Null if config does not exist.
5323 */
5324 @Nullable
5325 public byte[] getNetworkWatchlistConfigHash() {
5326 try {
5327 return mService.getNetworkWatchlistConfigHash();
5328 } catch (RemoteException e) {
5329 Log.e(TAG, "Unable to get watchlist config hash");
5330 throw e.rethrowFromSystemServer();
5331 }
5332 }
5333
5334 /**
5335 * Returns the {@code uid} of the owner of a network connection.
5336 *
5337 * @param protocol The protocol of the connection. Only {@code IPPROTO_TCP} and {@code
5338 * IPPROTO_UDP} currently supported.
5339 * @param local The local {@link InetSocketAddress} of a connection.
5340 * @param remote The remote {@link InetSocketAddress} of a connection.
5341 * @return {@code uid} if the connection is found and the app has permission to observe it
5342 * (e.g., if it is associated with the calling VPN app's VpnService tunnel) or {@link
5343 * android.os.Process#INVALID_UID} if the connection is not found.
5344 * @throws {@link SecurityException} if the caller is not the active VpnService for the current
5345 * user.
5346 * @throws {@link IllegalArgumentException} if an unsupported protocol is requested.
5347 */
5348 public int getConnectionOwnerUid(
5349 int protocol, @NonNull InetSocketAddress local, @NonNull InetSocketAddress remote) {
5350 ConnectionInfo connectionInfo = new ConnectionInfo(protocol, local, remote);
5351 try {
5352 return mService.getConnectionOwnerUid(connectionInfo);
5353 } catch (RemoteException e) {
5354 throw e.rethrowFromSystemServer();
5355 }
5356 }
5357
5358 private void printStackTrace() {
5359 if (DEBUG) {
5360 final StackTraceElement[] callStack = Thread.currentThread().getStackTrace();
5361 final StringBuffer sb = new StringBuffer();
5362 for (int i = 3; i < callStack.length; i++) {
5363 final String stackTrace = callStack[i].toString();
5364 if (stackTrace == null || stackTrace.contains("android.os")) {
5365 break;
5366 }
5367 sb.append(" [").append(stackTrace).append("]");
5368 }
5369 Log.d(TAG, "StackLog:" + sb.toString());
5370 }
5371 }
5372
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09005373 /** @hide */
5374 public TestNetworkManager startOrGetTestNetworkManager() {
5375 final IBinder tnBinder;
5376 try {
5377 tnBinder = mService.startOrGetTestNetworkService();
5378 } catch (RemoteException e) {
5379 throw e.rethrowFromSystemServer();
5380 }
5381
5382 return new TestNetworkManager(ITestNetworkManager.Stub.asInterface(tnBinder));
5383 }
5384
Remi NGUYEN VAN91444ca2021-01-15 23:02:47 +09005385 /** @hide */
5386 public ConnectivityDiagnosticsManager createDiagnosticsManager() {
5387 return new ConnectivityDiagnosticsManager(mContext, mService);
5388 }
5389
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005390 /**
5391 * Simulates a Data Stall for the specified Network.
5392 *
5393 * <p>This method should only be used for tests.
5394 *
Remi NGUYEN VAN564f7f82021-04-08 16:26:20 +09005395 * <p>The caller must be the owner of the specified Network. This simulates a data stall to
5396 * have the system behave as if it had happened, but does not actually stall connectivity.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005397 *
5398 * @param detectionMethod The detection method used to identify the Data Stall.
Remi NGUYEN VAN564f7f82021-04-08 16:26:20 +09005399 * See ConnectivityDiagnosticsManager.DataStallReport.DETECTION_METHOD_*.
5400 * @param timestampMillis The timestamp at which the stall 'occurred', in milliseconds, as per
5401 * SystemClock.elapsedRealtime.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005402 * @param network The Network for which a Data Stall is being simluated.
5403 * @param extras The PersistableBundle of extras included in the Data Stall notification.
5404 * @throws SecurityException if the caller is not the owner of the given network.
5405 * @hide
5406 */
5407 @SystemApi(client = SystemApi.Client.MODULE_LIBRARIES)
5408 @RequiresPermission(anyOf = {android.Manifest.permission.MANAGE_TEST_NETWORKS,
5409 android.Manifest.permission.NETWORK_STACK})
Remi NGUYEN VAN564f7f82021-04-08 16:26:20 +09005410 public void simulateDataStall(@DetectionMethod int detectionMethod, long timestampMillis,
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005411 @NonNull Network network, @NonNull PersistableBundle extras) {
5412 try {
5413 mService.simulateDataStall(detectionMethod, timestampMillis, network, extras);
5414 } catch (RemoteException e) {
5415 e.rethrowFromSystemServer();
5416 }
5417 }
5418
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005419 @NonNull
5420 private final List<QosCallbackConnection> mQosCallbackConnections = new ArrayList<>();
5421
5422 /**
5423 * Registers a {@link QosSocketInfo} with an associated {@link QosCallback}. The callback will
5424 * receive available QoS events related to the {@link Network} and local ip + port
5425 * specified within socketInfo.
5426 * <p/>
5427 * The same {@link QosCallback} must be unregistered before being registered a second time,
5428 * otherwise {@link QosCallbackRegistrationException} is thrown.
5429 * <p/>
5430 * This API does not, in itself, require any permission if called with a network that is not
5431 * restricted. However, the underlying implementation currently only supports the IMS network,
5432 * which is always restricted. That means non-preinstalled callers can't possibly find this API
5433 * useful, because they'd never be called back on networks that they would have access to.
5434 *
5435 * @throws SecurityException if {@link QosSocketInfo#getNetwork()} is restricted and the app is
5436 * missing CONNECTIVITY_USE_RESTRICTED_NETWORKS permission.
5437 * @throws QosCallback.QosCallbackRegistrationException if qosCallback is already registered.
5438 * @throws RuntimeException if the app already has too many callbacks registered.
5439 *
5440 * Exceptions after the time of registration is passed through
5441 * {@link QosCallback#onError(QosCallbackException)}. see: {@link QosCallbackException}.
5442 *
5443 * @param socketInfo the socket information used to match QoS events
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005444 * @param executor The executor on which the callback will be invoked. The provided
5445 * {@link Executor} must run callback sequentially, otherwise the order of
Daniel Bright686d5d22021-03-10 11:51:50 -08005446 * callbacks cannot be guaranteed.onQosCallbackRegistered
5447 * @param callback receives qos events that satisfy socketInfo
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005448 *
5449 * @hide
5450 */
5451 @SystemApi
5452 public void registerQosCallback(@NonNull final QosSocketInfo socketInfo,
Daniel Bright686d5d22021-03-10 11:51:50 -08005453 @CallbackExecutor @NonNull final Executor executor,
5454 @NonNull final QosCallback callback) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005455 Objects.requireNonNull(socketInfo, "socketInfo must be non-null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005456 Objects.requireNonNull(executor, "executor must be non-null");
Daniel Bright686d5d22021-03-10 11:51:50 -08005457 Objects.requireNonNull(callback, "callback must be non-null");
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005458
5459 try {
5460 synchronized (mQosCallbackConnections) {
5461 if (getQosCallbackConnection(callback) == null) {
5462 final QosCallbackConnection connection =
5463 new QosCallbackConnection(this, callback, executor);
5464 mQosCallbackConnections.add(connection);
5465 mService.registerQosSocketCallback(socketInfo, connection);
5466 } else {
5467 Log.e(TAG, "registerQosCallback: Callback already registered");
5468 throw new QosCallbackRegistrationException();
5469 }
5470 }
5471 } catch (final RemoteException e) {
5472 Log.e(TAG, "registerQosCallback: Error while registering ", e);
5473
5474 // The same unregister method method is called for consistency even though nothing
5475 // will be sent to the ConnectivityService since the callback was never successfully
5476 // registered.
5477 unregisterQosCallback(callback);
5478 e.rethrowFromSystemServer();
5479 } catch (final ServiceSpecificException e) {
5480 Log.e(TAG, "registerQosCallback: Error while registering ", e);
5481 unregisterQosCallback(callback);
5482 throw convertServiceException(e);
5483 }
5484 }
5485
5486 /**
5487 * Unregisters the given {@link QosCallback}. The {@link QosCallback} will no longer receive
5488 * events once unregistered and can be registered a second time.
5489 * <p/>
5490 * If the {@link QosCallback} does not have an active registration, it is a no-op.
5491 *
5492 * @param callback the callback being unregistered
5493 *
5494 * @hide
5495 */
5496 @SystemApi
5497 public void unregisterQosCallback(@NonNull final QosCallback callback) {
5498 Objects.requireNonNull(callback, "The callback must be non-null");
5499 try {
5500 synchronized (mQosCallbackConnections) {
5501 final QosCallbackConnection connection = getQosCallbackConnection(callback);
5502 if (connection != null) {
5503 connection.stopReceivingMessages();
5504 mService.unregisterQosCallback(connection);
5505 mQosCallbackConnections.remove(connection);
5506 } else {
5507 Log.d(TAG, "unregisterQosCallback: Callback not registered");
5508 }
5509 }
5510 } catch (final RemoteException e) {
5511 Log.e(TAG, "unregisterQosCallback: Error while unregistering ", e);
5512 e.rethrowFromSystemServer();
5513 }
5514 }
5515
5516 /**
5517 * Gets the connection related to the callback.
5518 *
5519 * @param callback the callback to look up
5520 * @return the related connection
5521 */
5522 @Nullable
5523 private QosCallbackConnection getQosCallbackConnection(final QosCallback callback) {
5524 for (final QosCallbackConnection connection : mQosCallbackConnections) {
5525 // Checking by reference here is intentional
5526 if (connection.getCallback() == callback) {
5527 return connection;
5528 }
5529 }
5530 return null;
5531 }
5532
5533 /**
Roshan Piuse08bc182020-12-22 15:10:42 -08005534 * Request a network to satisfy a set of {@link NetworkCapabilities}, but
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005535 * does not cause any networks to retain the NET_CAPABILITY_FOREGROUND capability. This can
5536 * be used to request that the system provide a network without causing the network to be
5537 * in the foreground.
5538 *
5539 * <p>This method will attempt to find the best network that matches the passed
5540 * {@link NetworkRequest}, and to bring up one that does if none currently satisfies the
5541 * criteria. The platform will evaluate which network is the best at its own discretion.
5542 * Throughput, latency, cost per byte, policy, user preference and other considerations
5543 * may be factored in the decision of what is considered the best network.
5544 *
5545 * <p>As long as this request is outstanding, the platform will try to maintain the best network
5546 * matching this request, while always attempting to match the request to a better network if
5547 * possible. If a better match is found, the platform will switch this request to the now-best
5548 * network and inform the app of the newly best network by invoking
5549 * {@link NetworkCallback#onAvailable(Network)} on the provided callback. Note that the platform
5550 * will not try to maintain any other network than the best one currently matching the request:
5551 * a network not matching any network request may be disconnected at any time.
5552 *
5553 * <p>For example, an application could use this method to obtain a connected cellular network
5554 * even if the device currently has a data connection over Ethernet. This may cause the cellular
5555 * radio to consume additional power. Or, an application could inform the system that it wants
5556 * a network supporting sending MMSes and have the system let it know about the currently best
5557 * MMS-supporting network through the provided {@link NetworkCallback}.
5558 *
5559 * <p>The status of the request can be followed by listening to the various callbacks described
5560 * in {@link NetworkCallback}. The {@link Network} object passed to the callback methods can be
5561 * used to direct traffic to the network (although accessing some networks may be subject to
5562 * holding specific permissions). Callers will learn about the specific characteristics of the
5563 * network through
5564 * {@link NetworkCallback#onCapabilitiesChanged(Network, NetworkCapabilities)} and
5565 * {@link NetworkCallback#onLinkPropertiesChanged(Network, LinkProperties)}. The methods of the
5566 * provided {@link NetworkCallback} will only be invoked due to changes in the best network
5567 * matching the request at any given time; therefore when a better network matching the request
5568 * becomes available, the {@link NetworkCallback#onAvailable(Network)} method is called
5569 * with the new network after which no further updates are given about the previously-best
5570 * network, unless it becomes the best again at some later time. All callbacks are invoked
5571 * in order on the same thread, which by default is a thread created by the framework running
5572 * in the app.
5573 *
5574 * <p>This{@link NetworkRequest} will live until released via
5575 * {@link #unregisterNetworkCallback(NetworkCallback)} or the calling application exits, at
5576 * which point the system may let go of the network at any time.
5577 *
5578 * <p>It is presently unsupported to request a network with mutable
5579 * {@link NetworkCapabilities} such as
5580 * {@link NetworkCapabilities#NET_CAPABILITY_VALIDATED} or
5581 * {@link NetworkCapabilities#NET_CAPABILITY_CAPTIVE_PORTAL}
5582 * as these {@code NetworkCapabilities} represent states that a particular
5583 * network may never attain, and whether a network will attain these states
5584 * is unknown prior to bringing up the network so the framework does not
5585 * know how to go about satisfying a request with these capabilities.
5586 *
5587 * <p>To avoid performance issues due to apps leaking callbacks, the system will limit the
5588 * number of outstanding requests to 100 per app (identified by their UID), shared with
5589 * all variants of this method, of {@link #registerNetworkCallback} as well as
5590 * {@link ConnectivityDiagnosticsManager#registerConnectivityDiagnosticsCallback}.
5591 * Requesting a network with this method will count toward this limit. If this limit is
5592 * exceeded, an exception will be thrown. To avoid hitting this issue and to conserve resources,
5593 * make sure to unregister the callbacks with
5594 * {@link #unregisterNetworkCallback(NetworkCallback)}.
5595 *
5596 * @param request {@link NetworkRequest} describing this request.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005597 * @param networkCallback The {@link NetworkCallback} to be utilized for this request. Note
5598 * the callback must not be shared - it uniquely specifies this request.
junyulaica657cb2021-04-15 00:39:49 +08005599 * @param handler {@link Handler} to specify the thread upon which the callback will be invoked.
5600 * If null, the callback is invoked on the default internal Handler.
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005601 * @throws IllegalArgumentException if {@code request} contains invalid network capabilities.
5602 * @throws SecurityException if missing the appropriate permissions.
5603 * @throws RuntimeException if the app already has too many callbacks registered.
5604 *
5605 * @hide
5606 */
5607 @SystemApi(client = MODULE_LIBRARIES)
5608 @SuppressLint("ExecutorRegistration")
5609 @RequiresPermission(anyOf = {
5610 android.Manifest.permission.NETWORK_SETTINGS,
5611 android.Manifest.permission.NETWORK_STACK,
5612 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5613 })
5614 public void requestBackgroundNetwork(@NonNull NetworkRequest request,
junyulaica657cb2021-04-15 00:39:49 +08005615 @NonNull NetworkCallback networkCallback,
5616 @SuppressLint("ListenerLast") @NonNull Handler handler) {
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005617 final NetworkCapabilities nc = request.networkCapabilities;
5618 sendRequestForNetwork(nc, networkCallback, 0, BACKGROUND_REQUEST,
junyulaidbb70462021-03-09 20:49:48 +08005619 TYPE_NONE, new CallbackHandler(handler));
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005620 }
James Mattis12aeab82021-01-10 14:24:24 -08005621
5622 /**
James Mattis12aeab82021-01-10 14:24:24 -08005623 * Used by automotive devices to set the network preferences used to direct traffic at an
5624 * application level as per the given OemNetworkPreferences. An example use-case would be an
5625 * automotive OEM wanting to provide connectivity for applications critical to the usage of a
5626 * vehicle via a particular network.
5627 *
5628 * Calling this will overwrite the existing preference.
5629 *
5630 * @param preference {@link OemNetworkPreferences} The application network preference to be set.
5631 * @param executor the executor on which listener will be invoked.
5632 * @param listener {@link OnSetOemNetworkPreferenceListener} optional listener used to
5633 * communicate completion of setOemNetworkPreference(). This will only be
5634 * called once upon successful completion of setOemNetworkPreference().
5635 * @throws IllegalArgumentException if {@code preference} contains invalid preference values.
5636 * @throws SecurityException if missing the appropriate permissions.
5637 * @throws UnsupportedOperationException if called on a non-automotive device.
James Mattis6e2d7022021-01-26 16:23:52 -08005638 * @hide
James Mattis12aeab82021-01-10 14:24:24 -08005639 */
James Mattis6e2d7022021-01-26 16:23:52 -08005640 @SystemApi
James Mattisa46c1442021-01-26 14:05:36 -08005641 @RequiresPermission(android.Manifest.permission.CONTROL_OEM_PAID_NETWORK_PREFERENCE)
James Mattis6e2d7022021-01-26 16:23:52 -08005642 public void setOemNetworkPreference(@NonNull final OemNetworkPreferences preference,
James Mattis12aeab82021-01-10 14:24:24 -08005643 @Nullable @CallbackExecutor final Executor executor,
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005644 @Nullable final Runnable listener) {
James Mattis12aeab82021-01-10 14:24:24 -08005645 Objects.requireNonNull(preference, "OemNetworkPreferences must be non-null");
5646 if (null != listener) {
5647 Objects.requireNonNull(executor, "Executor must be non-null");
5648 }
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005649 final IOnCompleteListener listenerInternal = listener == null ? null :
5650 new IOnCompleteListener.Stub() {
James Mattis12aeab82021-01-10 14:24:24 -08005651 @Override
5652 public void onComplete() {
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005653 executor.execute(listener::run);
James Mattis12aeab82021-01-10 14:24:24 -08005654 }
5655 };
5656
5657 try {
5658 mService.setOemNetworkPreference(preference, listenerInternal);
5659 } catch (RemoteException e) {
5660 Log.e(TAG, "setOemNetworkPreference() failed for preference: " + preference.toString());
5661 throw e.rethrowFromSystemServer();
5662 }
5663 }
lucaslin5cdbcfb2021-03-12 00:46:33 +08005664
Chalard Jeanad565e22021-02-25 17:23:40 +09005665 /**
5666 * Request that a user profile is put by default on a network matching a given preference.
5667 *
5668 * See the documentation for the individual preferences for a description of the supported
5669 * behaviors.
5670 *
5671 * @param profile the profile concerned.
5672 * @param preference the preference for this profile.
5673 * @param executor an executor to execute the listener on. Optional if listener is null.
5674 * @param listener an optional listener to listen for completion of the operation.
5675 * @throws IllegalArgumentException if {@code profile} is not a valid user profile.
5676 * @throws SecurityException if missing the appropriate permissions.
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08005677 * @deprecated Use {@link #setProfileNetworkPreferences(UserHandle, List, Executor, Runnable)}
5678 * instead as it provides a more flexible API with more options.
Chalard Jeanad565e22021-02-25 17:23:40 +09005679 * @hide
5680 */
Chalard Jean0a4aefc2021-03-03 16:37:13 +09005681 // This function is for establishing per-profile default networking and can only be called by
5682 // the device policy manager, running as the system server. It would make no sense to call it
5683 // on a context for a user because it does not establish a setting on behalf of a user, rather
5684 // it establishes a setting for a user on behalf of the DPM.
5685 @SuppressLint({"UserHandle"})
5686 @SystemApi(client = MODULE_LIBRARIES)
Chalard Jeanad565e22021-02-25 17:23:40 +09005687 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08005688 @Deprecated
Chalard Jeanad565e22021-02-25 17:23:40 +09005689 public void setProfileNetworkPreference(@NonNull final UserHandle profile,
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08005690 @ProfileNetworkPreferencePolicy final int preference,
5691 @Nullable @CallbackExecutor final Executor executor,
5692 @Nullable final Runnable listener) {
5693
5694 ProfileNetworkPreference.Builder preferenceBuilder =
5695 new ProfileNetworkPreference.Builder();
5696 preferenceBuilder.setPreference(preference);
Sooraj Sasindranf4a58dc2022-01-21 13:37:08 -08005697 if (preference != PROFILE_NETWORK_PREFERENCE_DEFAULT) {
5698 preferenceBuilder.setPreferenceEnterpriseId(NET_ENTERPRISE_ID_1);
5699 }
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08005700 setProfileNetworkPreferences(profile,
5701 List.of(preferenceBuilder.build()), executor, listener);
5702 }
5703
5704 /**
5705 * Set a list of default network selection policies for a user profile.
5706 *
5707 * Calling this API with a user handle defines the entire policy for that user handle.
5708 * It will overwrite any setting previously set for the same user profile,
5709 * and not affect previously set settings for other handles.
5710 *
5711 * Call this API with an empty list to remove settings for this user profile.
5712 *
5713 * See {@link ProfileNetworkPreference} for more details on each preference
5714 * parameter.
5715 *
5716 * @param profile the user profile for which the preference is being set.
5717 * @param profileNetworkPreferences the list of profile network preferences for the
5718 * provided profile.
5719 * @param executor an executor to execute the listener on. Optional if listener is null.
5720 * @param listener an optional listener to listen for completion of the operation.
5721 * @throws IllegalArgumentException if {@code profile} is not a valid user profile.
5722 * @throws SecurityException if missing the appropriate permissions.
5723 * @hide
5724 */
5725 @SystemApi(client = MODULE_LIBRARIES)
5726 @RequiresPermission(android.Manifest.permission.NETWORK_STACK)
5727 public void setProfileNetworkPreferences(
5728 @NonNull final UserHandle profile,
5729 @NonNull List<ProfileNetworkPreference> profileNetworkPreferences,
Chalard Jeanad565e22021-02-25 17:23:40 +09005730 @Nullable @CallbackExecutor final Executor executor,
5731 @Nullable final Runnable listener) {
5732 if (null != listener) {
5733 Objects.requireNonNull(executor, "Pass a non-null executor, or a null listener");
5734 }
5735 final IOnCompleteListener proxy;
5736 if (null == listener) {
5737 proxy = null;
5738 } else {
5739 proxy = new IOnCompleteListener.Stub() {
5740 @Override
5741 public void onComplete() {
5742 executor.execute(listener::run);
5743 }
5744 };
5745 }
5746 try {
Sooraj Sasindrane7aee272021-11-24 20:26:55 -08005747 mService.setProfileNetworkPreferences(profile, profileNetworkPreferences, proxy);
Chalard Jeanad565e22021-02-25 17:23:40 +09005748 } catch (RemoteException e) {
5749 throw e.rethrowFromSystemServer();
5750 }
5751 }
5752
lucaslin5cdbcfb2021-03-12 00:46:33 +08005753 // The first network ID of IPSec tunnel interface.
lucaslinc296fcc2021-03-15 17:24:12 +08005754 private static final int TUN_INTF_NETID_START = 0xFC00; // 0xFC00 = 64512
lucaslin5cdbcfb2021-03-12 00:46:33 +08005755 // The network ID range of IPSec tunnel interface.
lucaslinc296fcc2021-03-15 17:24:12 +08005756 private static final int TUN_INTF_NETID_RANGE = 0x0400; // 0x0400 = 1024
lucaslin5cdbcfb2021-03-12 00:46:33 +08005757
5758 /**
5759 * Get the network ID range reserved for IPSec tunnel interfaces.
5760 *
5761 * @return A Range which indicates the network ID range of IPSec tunnel interface.
5762 * @hide
5763 */
5764 @SystemApi(client = MODULE_LIBRARIES)
5765 @NonNull
5766 public static Range<Integer> getIpSecNetIdRange() {
5767 return new Range(TUN_INTF_NETID_START, TUN_INTF_NETID_START + TUN_INTF_NETID_RANGE - 1);
5768 }
markchien738ad912021-12-09 18:15:45 +08005769
5770 /**
markchiene46042b2022-03-02 18:07:35 +08005771 * Adds the specified UID to the list of UIds that are allowed to use data on metered networks
5772 * even when background data is restricted. The deny list takes precedence over the allow list.
markchien738ad912021-12-09 18:15:45 +08005773 *
5774 * @param uid uid of target app
markchien68cfadc2022-01-14 13:39:54 +08005775 * @throws IllegalStateException if updating allow list failed.
markchien738ad912021-12-09 18:15:45 +08005776 * @hide
5777 */
5778 @SystemApi(client = MODULE_LIBRARIES)
5779 @RequiresPermission(anyOf = {
5780 android.Manifest.permission.NETWORK_SETTINGS,
5781 android.Manifest.permission.NETWORK_STACK,
5782 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5783 })
markchiene46042b2022-03-02 18:07:35 +08005784 public void addUidToMeteredNetworkAllowList(final int uid) {
markchien738ad912021-12-09 18:15:45 +08005785 try {
markchiene46042b2022-03-02 18:07:35 +08005786 mService.updateMeteredNetworkAllowList(uid, true /* add */);
markchien738ad912021-12-09 18:15:45 +08005787 } catch (RemoteException e) {
5788 throw e.rethrowFromSystemServer();
markchien738ad912021-12-09 18:15:45 +08005789 }
5790 }
5791
5792 /**
markchiene46042b2022-03-02 18:07:35 +08005793 * Removes the specified UID from the list of UIDs that are allowed to use background data on
5794 * metered networks when background data is restricted. The deny list takes precedence over
5795 * the allow list.
5796 *
5797 * @param uid uid of target app
5798 * @throws IllegalStateException if updating allow list failed.
5799 * @hide
5800 */
5801 @SystemApi(client = MODULE_LIBRARIES)
5802 @RequiresPermission(anyOf = {
5803 android.Manifest.permission.NETWORK_SETTINGS,
5804 android.Manifest.permission.NETWORK_STACK,
5805 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5806 })
5807 public void removeUidFromMeteredNetworkAllowList(final int uid) {
5808 try {
5809 mService.updateMeteredNetworkAllowList(uid, false /* remove */);
5810 } catch (RemoteException e) {
5811 throw e.rethrowFromSystemServer();
5812 }
5813 }
5814
5815 /**
5816 * Adds the specified UID to the list of UIDs that are not allowed to use background data on
5817 * metered networks. Takes precedence over {@link #addUidToMeteredNetworkAllowList}.
markchien738ad912021-12-09 18:15:45 +08005818 *
5819 * @param uid uid of target app
markchien68cfadc2022-01-14 13:39:54 +08005820 * @throws IllegalStateException if updating deny list failed.
markchien738ad912021-12-09 18:15:45 +08005821 * @hide
5822 */
5823 @SystemApi(client = MODULE_LIBRARIES)
5824 @RequiresPermission(anyOf = {
5825 android.Manifest.permission.NETWORK_SETTINGS,
5826 android.Manifest.permission.NETWORK_STACK,
5827 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5828 })
markchiene46042b2022-03-02 18:07:35 +08005829 public void addUidToMeteredNetworkDenyList(final int uid) {
markchien738ad912021-12-09 18:15:45 +08005830 try {
markchiene46042b2022-03-02 18:07:35 +08005831 mService.updateMeteredNetworkDenyList(uid, true /* add */);
5832 } catch (RemoteException e) {
5833 throw e.rethrowFromSystemServer();
5834 }
5835 }
5836
5837 /**
5838 * Removes the specified UID from the list of UIds that can use use background data on metered
5839 * networks if background data is not restricted. The deny list takes precedence over the
5840 * allow list.
5841 *
5842 * @param uid uid of target app
5843 * @throws IllegalStateException if updating deny list failed.
5844 * @hide
5845 */
5846 @SystemApi(client = MODULE_LIBRARIES)
5847 @RequiresPermission(anyOf = {
5848 android.Manifest.permission.NETWORK_SETTINGS,
5849 android.Manifest.permission.NETWORK_STACK,
5850 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5851 })
5852 public void removeUidFromMeteredNetworkDenyList(final int uid) {
5853 try {
5854 mService.updateMeteredNetworkDenyList(uid, false /* remove */);
markchien738ad912021-12-09 18:15:45 +08005855 } catch (RemoteException e) {
5856 throw e.rethrowFromSystemServer();
markchiene1561fa2021-12-09 22:00:56 +08005857 }
5858 }
5859
5860 /**
5861 * Sets a firewall rule for the specified UID on the specified chain.
5862 *
5863 * @param chain target chain.
5864 * @param uid uid to allow/deny.
markchien3c04e662022-03-22 16:29:56 +08005865 * @param rule firewall rule to allow/drop packets.
markchien68cfadc2022-01-14 13:39:54 +08005866 * @throws IllegalStateException if updating firewall rule failed.
markchien3c04e662022-03-22 16:29:56 +08005867 * @throws IllegalArgumentException if {@code rule} is not a valid rule.
markchiene1561fa2021-12-09 22:00:56 +08005868 * @hide
5869 */
5870 @SystemApi(client = MODULE_LIBRARIES)
5871 @RequiresPermission(anyOf = {
5872 android.Manifest.permission.NETWORK_SETTINGS,
5873 android.Manifest.permission.NETWORK_STACK,
5874 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5875 })
markchien3c04e662022-03-22 16:29:56 +08005876 public void setUidFirewallRule(@FirewallChain final int chain, final int uid,
5877 @FirewallRule final int rule) {
markchiene1561fa2021-12-09 22:00:56 +08005878 try {
markchien3c04e662022-03-22 16:29:56 +08005879 mService.setUidFirewallRule(chain, uid, rule);
markchiene1561fa2021-12-09 22:00:56 +08005880 } catch (RemoteException e) {
5881 throw e.rethrowFromSystemServer();
markchien738ad912021-12-09 18:15:45 +08005882 }
5883 }
markchien98a6f952022-01-13 23:43:53 +08005884
5885 /**
5886 * Enables or disables the specified firewall chain.
5887 *
5888 * @param chain target chain.
5889 * @param enable whether the chain should be enabled.
markchien68cfadc2022-01-14 13:39:54 +08005890 * @throws IllegalStateException if enabling or disabling the firewall chain failed.
markchien98a6f952022-01-13 23:43:53 +08005891 * @hide
5892 */
5893 @SystemApi(client = MODULE_LIBRARIES)
5894 @RequiresPermission(anyOf = {
5895 android.Manifest.permission.NETWORK_SETTINGS,
5896 android.Manifest.permission.NETWORK_STACK,
5897 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5898 })
5899 public void setFirewallChainEnabled(@FirewallChain final int chain, final boolean enable) {
5900 try {
5901 mService.setFirewallChainEnabled(chain, enable);
5902 } catch (RemoteException e) {
5903 throw e.rethrowFromSystemServer();
5904 }
5905 }
markchien00a0bed2022-01-13 23:46:13 +08005906
5907 /**
5908 * Replaces the contents of the specified UID-based firewall chain.
5909 *
5910 * @param chain target chain to replace.
5911 * @param uids The list of UIDs to be placed into chain.
markchien68cfadc2022-01-14 13:39:54 +08005912 * @throws IllegalStateException if replacing the firewall chain failed.
markchien00a0bed2022-01-13 23:46:13 +08005913 * @throws IllegalArgumentException if {@code chain} is not a valid chain.
5914 * @hide
5915 */
5916 @SystemApi(client = MODULE_LIBRARIES)
5917 @RequiresPermission(anyOf = {
5918 android.Manifest.permission.NETWORK_SETTINGS,
5919 android.Manifest.permission.NETWORK_STACK,
5920 NetworkStack.PERMISSION_MAINLINE_NETWORK_STACK
5921 })
5922 public void replaceFirewallChain(@FirewallChain final int chain, @NonNull final int[] uids) {
5923 Objects.requireNonNull(uids);
5924 try {
5925 mService.replaceFirewallChain(chain, uids);
5926 } catch (RemoteException e) {
5927 throw e.rethrowFromSystemServer();
5928 }
5929 }
Remi NGUYEN VANfbbccbc2021-01-15 18:08:24 +09005930}